Date
June 18, 2025, 6:43 a.m.
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 23.739581] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 23.765516] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 23.473155] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 23.482137] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 23.503001] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[ 54.627419] ================================================================== [ 54.627537] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 54.627537] [ 54.627647] Use-after-free read at 0x00000000bf2479c0 (in kfence-#185): [ 54.627705] test_krealloc+0x51c/0x830 [ 54.627756] kunit_try_run_case+0x170/0x3f0 [ 54.627803] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.627849] kthread+0x328/0x630 [ 54.627888] ret_from_fork+0x10/0x20 [ 54.627932] [ 54.627958] kfence-#185: 0x00000000bf2479c0-0x000000006d64db30, size=32, cache=kmalloc-32 [ 54.627958] [ 54.628031] allocated by task 347 on cpu 0 at 54.626679s (0.001335s ago): [ 54.628116] test_alloc+0x29c/0x628 [ 54.628162] test_krealloc+0xc0/0x830 [ 54.628204] kunit_try_run_case+0x170/0x3f0 [ 54.628248] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.628298] kthread+0x328/0x630 [ 54.628348] ret_from_fork+0x10/0x20 [ 54.628395] [ 54.628423] freed by task 347 on cpu 0 at 54.626957s (0.001462s ago): [ 54.628493] krealloc_noprof+0x148/0x360 [ 54.628547] test_krealloc+0x1dc/0x830 [ 54.628593] kunit_try_run_case+0x170/0x3f0 [ 54.628639] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.628688] kthread+0x328/0x630 [ 54.628727] ret_from_fork+0x10/0x20 [ 54.628769] [ 54.628819] CPU: 0 UID: 0 PID: 347 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 54.628915] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 54.628950] Hardware name: linux,dummy-virt (DT) [ 54.628990] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[ 54.552690] ================================================================== [ 54.552819] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 54.552819] [ 54.552939] Use-after-free read at 0x00000000893680a9 (in kfence-#184): [ 54.553004] test_memcache_typesafe_by_rcu+0x280/0x560 [ 54.553090] kunit_try_run_case+0x170/0x3f0 [ 54.553144] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.553196] kthread+0x328/0x630 [ 54.553244] ret_from_fork+0x10/0x20 [ 54.553294] [ 54.553324] kfence-#184: 0x00000000893680a9-0x00000000a3f335d4, size=32, cache=test [ 54.553324] [ 54.553396] allocated by task 345 on cpu 0 at 54.530749s (0.022641s ago): [ 54.553479] test_alloc+0x230/0x628 [ 54.553528] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 54.553575] kunit_try_run_case+0x170/0x3f0 [ 54.553617] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.553666] kthread+0x328/0x630 [ 54.553704] ret_from_fork+0x10/0x20 [ 54.553746] [ 54.553774] freed by task 345 on cpu 0 at 54.530895s (0.022875s ago): [ 54.553839] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 54.553885] kunit_try_run_case+0x170/0x3f0 [ 54.553928] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.553975] kthread+0x328/0x630 [ 54.554024] ret_from_fork+0x10/0x20 [ 54.554071] [ 54.554152] CPU: 0 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 54.554248] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 54.554285] Hardware name: linux,dummy-virt (DT) [ 54.554325] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[ 33.120048] ================================================================== [ 33.120238] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 33.120238] [ 33.120383] Invalid read at 0x000000006744ba8a: [ 33.120484] test_invalid_access+0xdc/0x1f0 [ 33.120588] kunit_try_run_case+0x170/0x3f0 [ 33.120672] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.120730] kthread+0x328/0x630 [ 33.120781] ret_from_fork+0x10/0x20 [ 33.120951] [ 33.121112] CPU: 1 UID: 0 PID: 341 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 33.121234] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 33.121571] Hardware name: linux,dummy-virt (DT) [ 33.121724] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[ 32.891482] ================================================================== [ 32.891617] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 32.891617] [ 32.891699] Corrupted memory at 0x000000006cc145f8 [ ! . . . . . . . . . . . . . . . ] (in kfence-#180): [ 32.892059] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 32.892118] kunit_try_run_case+0x170/0x3f0 [ 32.892167] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.892215] kthread+0x328/0x630 [ 32.892260] ret_from_fork+0x10/0x20 [ 32.892303] [ 32.892331] kfence-#180: 0x00000000aa429175-0x00000000a243a04d, size=73, cache=kmalloc-96 [ 32.892331] [ 32.892397] allocated by task 335 on cpu 1 at 32.890774s (0.001619s ago): [ 32.892471] test_alloc+0x29c/0x628 [ 32.892520] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 32.892594] kunit_try_run_case+0x170/0x3f0 [ 32.892642] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.892691] kthread+0x328/0x630 [ 32.892732] ret_from_fork+0x10/0x20 [ 32.892775] [ 32.892801] freed by task 335 on cpu 1 at 32.890958s (0.001838s ago): [ 32.892870] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 32.892920] kunit_try_run_case+0x170/0x3f0 [ 32.892963] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.893008] kthread+0x328/0x630 [ 32.893224] ret_from_fork+0x10/0x20 [ 32.893269] [ 32.893321] CPU: 1 UID: 0 PID: 335 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 32.893413] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.893448] Hardware name: linux,dummy-virt (DT) [ 32.893484] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[ 32.787074] ================================================================== [ 32.787192] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 32.787192] [ 32.787317] Out-of-bounds read at 0x000000006ee3efa1 (105B right of kfence-#179): [ 32.787387] test_kmalloc_aligned_oob_read+0x238/0x468 [ 32.787446] kunit_try_run_case+0x170/0x3f0 [ 32.787495] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.787541] kthread+0x328/0x630 [ 32.787581] ret_from_fork+0x10/0x20 [ 32.787624] [ 32.787651] kfence-#179: 0x000000001eabcc01-0x000000009cba9f8d, size=73, cache=kmalloc-96 [ 32.787651] [ 32.787707] allocated by task 333 on cpu 1 at 32.786774s (0.000928s ago): [ 32.787786] test_alloc+0x29c/0x628 [ 32.787831] test_kmalloc_aligned_oob_read+0x100/0x468 [ 32.787876] kunit_try_run_case+0x170/0x3f0 [ 32.787917] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.787962] kthread+0x328/0x630 [ 32.787998] ret_from_fork+0x10/0x20 [ 32.788059] [ 32.788114] CPU: 1 UID: 0 PID: 333 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 32.788208] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 32.788242] Hardware name: linux,dummy-virt (DT) [ 32.788278] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[ 27.587138] ================================================================== [ 27.587317] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 27.587317] [ 27.587463] Corrupted memory at 0x0000000032dfd060 [ ! ] (in kfence-#129): [ 27.587622] test_corruption+0x1d8/0x378 [ 27.587687] kunit_try_run_case+0x170/0x3f0 [ 27.587740] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.587803] kthread+0x328/0x630 [ 27.587857] ret_from_fork+0x10/0x20 [ 27.587902] [ 27.587942] kfence-#129: 0x000000009ad0e9d3-0x00000000a2a14000, size=32, cache=test [ 27.587942] [ 27.588045] allocated by task 323 on cpu 1 at 27.586880s (0.001157s ago): [ 27.588144] test_alloc+0x230/0x628 [ 27.588193] test_corruption+0x198/0x378 [ 27.588240] kunit_try_run_case+0x170/0x3f0 [ 27.588286] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.588334] kthread+0x328/0x630 [ 27.588377] ret_from_fork+0x10/0x20 [ 27.588422] [ 27.588448] freed by task 323 on cpu 1 at 27.586980s (0.001464s ago): [ 27.588520] test_corruption+0x1d8/0x378 [ 27.588586] kunit_try_run_case+0x170/0x3f0 [ 27.588631] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.588680] kthread+0x328/0x630 [ 27.588719] ret_from_fork+0x10/0x20 [ 27.588762] [ 27.588811] CPU: 1 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 27.588904] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.588940] Hardware name: linux,dummy-virt (DT) [ 27.588976] ================================================================== [ 27.275292] ================================================================== [ 27.275438] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 27.275438] [ 27.275517] Corrupted memory at 0x00000000e26a5453 [ ! . . . . . . . . . . . . . . . ] (in kfence-#126): [ 27.275964] test_corruption+0x278/0x378 [ 27.276036] kunit_try_run_case+0x170/0x3f0 [ 27.276092] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.276139] kthread+0x328/0x630 [ 27.276180] ret_from_fork+0x10/0x20 [ 27.276219] [ 27.276245] kfence-#126: 0x00000000dfd7219b-0x000000001d9d6907, size=32, cache=kmalloc-32 [ 27.276245] [ 27.276305] allocated by task 321 on cpu 1 at 27.274826s (0.001474s ago): [ 27.276369] test_alloc+0x29c/0x628 [ 27.276413] test_corruption+0xdc/0x378 [ 27.276453] kunit_try_run_case+0x170/0x3f0 [ 27.276494] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.276559] kthread+0x328/0x630 [ 27.276603] ret_from_fork+0x10/0x20 [ 27.276648] [ 27.276676] freed by task 321 on cpu 1 at 27.274984s (0.001688s ago): [ 27.276744] test_corruption+0x278/0x378 [ 27.276790] kunit_try_run_case+0x170/0x3f0 [ 27.276832] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.276879] kthread+0x328/0x630 [ 27.276916] ret_from_fork+0x10/0x20 [ 27.276961] [ 27.277012] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 27.277126] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.277163] Hardware name: linux,dummy-virt (DT) [ 27.277200] ================================================================== [ 27.483038] ================================================================== [ 27.483160] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 27.483160] [ 27.483240] Corrupted memory at 0x000000000af60ac5 [ ! . . . . . . . . . . . . . . . ] (in kfence-#128): [ 27.483573] test_corruption+0x120/0x378 [ 27.483624] kunit_try_run_case+0x170/0x3f0 [ 27.483667] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.483713] kthread+0x328/0x630 [ 27.483751] ret_from_fork+0x10/0x20 [ 27.483792] [ 27.483819] kfence-#128: 0x00000000af4b653b-0x00000000334fb788, size=32, cache=test [ 27.483819] [ 27.483878] allocated by task 323 on cpu 1 at 27.482764s (0.001110s ago): [ 27.483942] test_alloc+0x230/0x628 [ 27.483986] test_corruption+0xdc/0x378 [ 27.484040] kunit_try_run_case+0x170/0x3f0 [ 27.484088] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.484134] kthread+0x328/0x630 [ 27.484172] ret_from_fork+0x10/0x20 [ 27.484215] [ 27.484241] freed by task 323 on cpu 1 at 27.482869s (0.001367s ago): [ 27.484308] test_corruption+0x120/0x378 [ 27.484351] kunit_try_run_case+0x170/0x3f0 [ 27.484394] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.484441] kthread+0x328/0x630 [ 27.484478] ret_from_fork+0x10/0x20 [ 27.484521] [ 27.484585] CPU: 1 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 27.484682] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.484715] Hardware name: linux,dummy-virt (DT) [ 27.484750] ================================================================== [ 27.379376] ================================================================== [ 27.379499] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 27.379499] [ 27.379568] Corrupted memory at 0x00000000a04eec4f [ ! ] (in kfence-#127): [ 27.379709] test_corruption+0x284/0x378 [ 27.379757] kunit_try_run_case+0x170/0x3f0 [ 27.379801] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.379844] kthread+0x328/0x630 [ 27.379886] ret_from_fork+0x10/0x20 [ 27.379924] [ 27.379949] kfence-#127: 0x00000000400c312c-0x000000009511f299, size=32, cache=kmalloc-32 [ 27.379949] [ 27.380008] allocated by task 321 on cpu 1 at 27.378923s (0.001080s ago): [ 27.380100] test_alloc+0x29c/0x628 [ 27.380147] test_corruption+0x198/0x378 [ 27.380189] kunit_try_run_case+0x170/0x3f0 [ 27.380231] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.380275] kthread+0x328/0x630 [ 27.380312] ret_from_fork+0x10/0x20 [ 27.380354] [ 27.380380] freed by task 321 on cpu 1 at 27.379105s (0.001270s ago): [ 27.380447] test_corruption+0x284/0x378 [ 27.380492] kunit_try_run_case+0x170/0x3f0 [ 27.380546] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.380596] kthread+0x328/0x630 [ 27.380637] ret_from_fork+0x10/0x20 [ 27.380681] [ 27.380731] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 27.380826] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.380862] Hardware name: linux,dummy-virt (DT) [ 27.380900] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[ 27.171155] ================================================================== [ 27.171331] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 27.171331] [ 27.171446] Invalid free of 0x000000009175ca9d (in kfence-#125): [ 27.171515] test_invalid_addr_free+0xec/0x238 [ 27.171569] kunit_try_run_case+0x170/0x3f0 [ 27.171613] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.171658] kthread+0x328/0x630 [ 27.171696] ret_from_fork+0x10/0x20 [ 27.171738] [ 27.171764] kfence-#125: 0x000000005d93cbea-0x00000000413512fd, size=32, cache=test [ 27.171764] [ 27.171824] allocated by task 319 on cpu 0 at 27.170932s (0.000887s ago): [ 27.171891] test_alloc+0x230/0x628 [ 27.171936] test_invalid_addr_free+0xd4/0x238 [ 27.171980] kunit_try_run_case+0x170/0x3f0 [ 27.172043] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.172095] kthread+0x328/0x630 [ 27.172133] ret_from_fork+0x10/0x20 [ 27.172174] [ 27.172228] CPU: 0 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 27.172319] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.172353] Hardware name: linux,dummy-virt (DT) [ 27.172390] ================================================================== [ 27.066969] ================================================================== [ 27.067106] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 27.067106] [ 27.067184] Invalid free of 0x00000000ce2b9955 (in kfence-#124): [ 27.067247] test_invalid_addr_free+0x1ac/0x238 [ 27.067302] kunit_try_run_case+0x170/0x3f0 [ 27.067352] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.067401] kthread+0x328/0x630 [ 27.067443] ret_from_fork+0x10/0x20 [ 27.067486] [ 27.067513] kfence-#124: 0x00000000c2c2a5e2-0x00000000fad8ab2a, size=32, cache=kmalloc-32 [ 27.067513] [ 27.067577] allocated by task 317 on cpu 0 at 27.066791s (0.000781s ago): [ 27.067650] test_alloc+0x29c/0x628 [ 27.067697] test_invalid_addr_free+0xd4/0x238 [ 27.067744] kunit_try_run_case+0x170/0x3f0 [ 27.067785] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.067833] kthread+0x328/0x630 [ 27.067873] ret_from_fork+0x10/0x20 [ 27.067917] [ 27.067973] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 27.068103] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 27.068142] Hardware name: linux,dummy-virt (DT) [ 27.068184] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[ 26.859326] ================================================================== [ 26.859474] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 26.859474] [ 26.859554] Invalid free of 0x0000000070a93324 (in kfence-#122): [ 26.859664] test_double_free+0x1bc/0x238 [ 26.859718] kunit_try_run_case+0x170/0x3f0 [ 26.859766] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.859810] kthread+0x328/0x630 [ 26.859851] ret_from_fork+0x10/0x20 [ 26.859891] [ 26.859917] kfence-#122: 0x0000000070a93324-0x00000000a7880c6d, size=32, cache=kmalloc-32 [ 26.859917] [ 26.859977] allocated by task 313 on cpu 1 at 26.858813s (0.001160s ago): [ 26.860065] test_alloc+0x29c/0x628 [ 26.860111] test_double_free+0xd4/0x238 [ 26.860151] kunit_try_run_case+0x170/0x3f0 [ 26.860193] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.860237] kthread+0x328/0x630 [ 26.860272] ret_from_fork+0x10/0x20 [ 26.860311] [ 26.860336] freed by task 313 on cpu 1 at 26.858935s (0.001396s ago): [ 26.860403] test_double_free+0x1ac/0x238 [ 26.860445] kunit_try_run_case+0x170/0x3f0 [ 26.860487] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.860541] kthread+0x328/0x630 [ 26.860584] ret_from_fork+0x10/0x20 [ 26.860624] [ 26.860678] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 26.860776] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.860810] Hardware name: linux,dummy-virt (DT) [ 26.860850] ================================================================== [ 26.963297] ================================================================== [ 26.963414] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 26.963414] [ 26.963487] Invalid free of 0x00000000648091d1 (in kfence-#123): [ 26.963545] test_double_free+0x100/0x238 [ 26.963594] kunit_try_run_case+0x170/0x3f0 [ 26.963638] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.963682] kthread+0x328/0x630 [ 26.963721] ret_from_fork+0x10/0x20 [ 26.963760] [ 26.963789] kfence-#123: 0x00000000648091d1-0x000000003da281d6, size=32, cache=test [ 26.963789] [ 26.963846] allocated by task 315 on cpu 1 at 26.963047s (0.000795s ago): [ 26.963915] test_alloc+0x230/0x628 [ 26.963960] test_double_free+0xd4/0x238 [ 26.964005] kunit_try_run_case+0x170/0x3f0 [ 26.964072] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.964118] kthread+0x328/0x630 [ 26.964155] ret_from_fork+0x10/0x20 [ 26.964198] [ 26.964224] freed by task 315 on cpu 1 at 26.963121s (0.001099s ago): [ 26.964296] test_double_free+0xf0/0x238 [ 26.964344] kunit_try_run_case+0x170/0x3f0 [ 26.964389] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.964436] kthread+0x328/0x630 [ 26.964475] ret_from_fork+0x10/0x20 [ 26.964519] [ 26.964580] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 26.964678] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.964714] Hardware name: linux,dummy-virt (DT) [ 26.964751] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[ 26.445336] ================================================================== [ 26.445631] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 26.445631] [ 26.445906] Use-after-free read at 0x00000000c0889b1e (in kfence-#118): [ 26.446111] test_use_after_free_read+0x114/0x248 [ 26.446231] kunit_try_run_case+0x170/0x3f0 [ 26.446511] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.447059] kthread+0x328/0x630 [ 26.447186] ret_from_fork+0x10/0x20 [ 26.447277] [ 26.447337] kfence-#118: 0x00000000c0889b1e-0x00000000c38675c2, size=32, cache=kmalloc-32 [ 26.447337] [ 26.447523] allocated by task 305 on cpu 0 at 26.444078s (0.003422s ago): [ 26.447778] test_alloc+0x29c/0x628 [ 26.448087] test_use_after_free_read+0xd0/0x248 [ 26.448655] kunit_try_run_case+0x170/0x3f0 [ 26.449122] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.449350] kthread+0x328/0x630 [ 26.449552] ret_from_fork+0x10/0x20 [ 26.449972] [ 26.450472] freed by task 305 on cpu 0 at 26.444202s (0.005953s ago): [ 26.450778] test_use_after_free_read+0x1c0/0x248 [ 26.450929] kunit_try_run_case+0x170/0x3f0 [ 26.451056] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.451142] kthread+0x328/0x630 [ 26.451258] ret_from_fork+0x10/0x20 [ 26.451414] [ 26.451569] CPU: 0 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 26.451778] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.451861] Hardware name: linux,dummy-virt (DT) [ 26.451978] ================================================================== [ 26.547141] ================================================================== [ 26.547294] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 26.547294] [ 26.547401] Use-after-free read at 0x00000000460ab3d8 (in kfence-#119): [ 26.547460] test_use_after_free_read+0x114/0x248 [ 26.547511] kunit_try_run_case+0x170/0x3f0 [ 26.547555] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.547599] kthread+0x328/0x630 [ 26.547635] ret_from_fork+0x10/0x20 [ 26.547674] [ 26.547701] kfence-#119: 0x00000000460ab3d8-0x000000005d08bfd4, size=32, cache=test [ 26.547701] [ 26.547756] allocated by task 307 on cpu 0 at 26.546819s (0.000933s ago): [ 26.547830] test_alloc+0x230/0x628 [ 26.547872] test_use_after_free_read+0xd0/0x248 [ 26.547915] kunit_try_run_case+0x170/0x3f0 [ 26.547954] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.547998] kthread+0x328/0x630 [ 26.548060] ret_from_fork+0x10/0x20 [ 26.548101] [ 26.548127] freed by task 307 on cpu 0 at 26.546926s (0.001197s ago): [ 26.548241] test_use_after_free_read+0xf0/0x248 [ 26.548289] kunit_try_run_case+0x170/0x3f0 [ 26.548330] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.548376] kthread+0x328/0x630 [ 26.548416] ret_from_fork+0x10/0x20 [ 26.548459] [ 26.548510] CPU: 0 UID: 0 PID: 307 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 26.548620] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.548659] Hardware name: linux,dummy-virt (DT) [ 26.548694] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[ 26.341806] ================================================================== [ 26.341966] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 26.341966] [ 26.342241] Out-of-bounds write at 0x00000000b6b30645 (1B left of kfence-#117): [ 26.342359] test_out_of_bounds_write+0x100/0x240 [ 26.342745] kunit_try_run_case+0x170/0x3f0 [ 26.342838] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.342919] kthread+0x328/0x630 [ 26.343030] ret_from_fork+0x10/0x20 [ 26.343112] [ 26.343371] kfence-#117: 0x0000000019c7b1c4-0x0000000028c6c457, size=32, cache=test [ 26.343371] [ 26.343513] allocated by task 303 on cpu 0 at 26.341345s (0.002160s ago): [ 26.343672] test_alloc+0x230/0x628 [ 26.343757] test_out_of_bounds_write+0xc8/0x240 [ 26.343855] kunit_try_run_case+0x170/0x3f0 [ 26.343948] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.344067] kthread+0x328/0x630 [ 26.344148] ret_from_fork+0x10/0x20 [ 26.344490] [ 26.344826] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 26.345089] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 26.345198] Hardware name: linux,dummy-virt (DT) [ 26.345304] ================================================================== [ 25.924137] ================================================================== [ 25.924386] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 25.924386] [ 25.924619] Out-of-bounds write at 0x000000004c01fd49 (1B left of kfence-#113): [ 25.924811] test_out_of_bounds_write+0x100/0x240 [ 25.924965] kunit_try_run_case+0x170/0x3f0 [ 25.925294] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.925420] kthread+0x328/0x630 [ 25.926183] ret_from_fork+0x10/0x20 [ 25.926307] [ 25.926367] kfence-#113: 0x00000000c3b8976a-0x00000000a8d69b67, size=32, cache=kmalloc-32 [ 25.926367] [ 25.926657] allocated by task 301 on cpu 0 at 25.923697s (0.002951s ago): [ 25.927069] test_alloc+0x29c/0x628 [ 25.927148] test_out_of_bounds_write+0xc8/0x240 [ 25.927230] kunit_try_run_case+0x170/0x3f0 [ 25.927425] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.927560] kthread+0x328/0x630 [ 25.927674] ret_from_fork+0x10/0x20 [ 25.927886] [ 25.928353] CPU: 0 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 25.928795] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 25.929058] Hardware name: linux,dummy-virt (DT) [ 25.929139] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[ 24.876812] ================================================================== [ 24.876908] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 24.876908] [ 24.877742] Out-of-bounds read at 0x000000006bcaba83 (32B right of kfence-#103): [ 24.877986] test_out_of_bounds_read+0x1c8/0x3e0 [ 24.878128] kunit_try_run_case+0x170/0x3f0 [ 24.878197] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.878348] kthread+0x328/0x630 [ 24.878391] ret_from_fork+0x10/0x20 [ 24.878623] [ 24.878677] kfence-#103: 0x0000000064c0b209-0x00000000d5ae9473, size=32, cache=kmalloc-32 [ 24.878677] [ 24.878751] allocated by task 297 on cpu 0 at 24.876501s (0.002245s ago): [ 24.878837] test_alloc+0x29c/0x628 [ 24.878883] test_out_of_bounds_read+0x198/0x3e0 [ 24.878927] kunit_try_run_case+0x170/0x3f0 [ 24.878966] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.879010] kthread+0x328/0x630 [ 24.879060] ret_from_fork+0x10/0x20 [ 24.879207] [ 24.879268] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.879374] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.879615] Hardware name: linux,dummy-virt (DT) [ 24.879701] ================================================================== [ 24.669476] ================================================================== [ 24.669675] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 24.669675] [ 24.669835] Out-of-bounds read at 0x00000000e5f78e1a (1B left of kfence-#101): [ 24.670501] test_out_of_bounds_read+0x114/0x3e0 [ 24.670664] kunit_try_run_case+0x170/0x3f0 [ 24.670720] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.670818] kthread+0x328/0x630 [ 24.670857] ret_from_fork+0x10/0x20 [ 24.670918] [ 24.671250] kfence-#101: 0x00000000f3bf45a1-0x0000000002bed2e6, size=32, cache=kmalloc-32 [ 24.671250] [ 24.671508] allocated by task 297 on cpu 0 at 24.667491s (0.003952s ago): [ 24.672047] test_alloc+0x29c/0x628 [ 24.672121] test_out_of_bounds_read+0xdc/0x3e0 [ 24.672516] kunit_try_run_case+0x170/0x3f0 [ 24.672709] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.672763] kthread+0x328/0x630 [ 24.673095] ret_from_fork+0x10/0x20 [ 24.673292] [ 24.673423] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.673526] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.673563] Hardware name: linux,dummy-virt (DT) [ 24.673621] ================================================================== [ 25.608234] ================================================================== [ 25.608448] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 25.608448] [ 25.608693] Out-of-bounds read at 0x00000000672096f6 (1B left of kfence-#110): [ 25.608878] test_out_of_bounds_read+0x114/0x3e0 [ 25.609004] kunit_try_run_case+0x170/0x3f0 [ 25.609171] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.609313] kthread+0x328/0x630 [ 25.609768] ret_from_fork+0x10/0x20 [ 25.609854] [ 25.609884] kfence-#110: 0x00000000b1202df7-0x0000000004b72a34, size=32, cache=test [ 25.609884] [ 25.609944] allocated by task 299 on cpu 0 at 25.607989s (0.001951s ago): [ 25.610177] test_alloc+0x230/0x628 [ 25.610326] test_out_of_bounds_read+0xdc/0x3e0 [ 25.610606] kunit_try_run_case+0x170/0x3f0 [ 25.610771] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.610881] kthread+0x328/0x630 [ 25.611128] ret_from_fork+0x10/0x20 [ 25.611256] [ 25.611371] CPU: 0 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 25.611579] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 25.611656] Hardware name: linux,dummy-virt (DT) [ 25.611739] ================================================================== [ 25.711491] ================================================================== [ 25.711665] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 25.711665] [ 25.711831] Out-of-bounds read at 0x00000000aff40815 (32B right of kfence-#111): [ 25.711978] test_out_of_bounds_read+0x1c8/0x3e0 [ 25.712093] kunit_try_run_case+0x170/0x3f0 [ 25.712177] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.712287] kthread+0x328/0x630 [ 25.712364] ret_from_fork+0x10/0x20 [ 25.712447] [ 25.712495] kfence-#111: 0x000000003ed9b202-0x000000000fe4ae00, size=32, cache=test [ 25.712495] [ 25.712634] allocated by task 299 on cpu 0 at 25.711346s (0.001269s ago): [ 25.712830] test_alloc+0x230/0x628 [ 25.712932] test_out_of_bounds_read+0x198/0x3e0 [ 25.713050] kunit_try_run_case+0x170/0x3f0 [ 25.713160] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 25.713264] kthread+0x328/0x630 [ 25.713357] ret_from_fork+0x10/0x20 [ 25.713459] [ 25.713562] CPU: 0 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 25.713786] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 25.713901] Hardware name: linux,dummy-virt (DT) [ 25.713995] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[ 24.565063] ================================================================== [ 24.565145] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 24.565227] Write of size 121 at addr fff00000c641b000 by task kunit_try_catch/295 [ 24.565289] [ 24.565328] CPU: 0 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.565432] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.565469] Hardware name: linux,dummy-virt (DT) [ 24.565507] Call trace: [ 24.565538] show_stack+0x20/0x38 (C) [ 24.565599] dump_stack_lvl+0x8c/0xd0 [ 24.565657] print_report+0x118/0x608 [ 24.565713] kasan_report+0xdc/0x128 [ 24.565769] kasan_check_range+0x100/0x1a8 [ 24.565826] __kasan_check_write+0x20/0x30 [ 24.565884] strncpy_from_user+0x3c/0x2a0 [ 24.565942] copy_user_test_oob+0x5c0/0xec8 [ 24.565996] kunit_try_run_case+0x170/0x3f0 [ 24.567635] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.567733] kthread+0x328/0x630 [ 24.567790] ret_from_fork+0x10/0x20 [ 24.567880] [ 24.567908] Allocated by task 295: [ 24.567945] kasan_save_stack+0x3c/0x68 [ 24.567998] kasan_save_track+0x20/0x40 [ 24.568060] kasan_save_alloc_info+0x40/0x58 [ 24.568108] __kasan_kmalloc+0xd4/0xd8 [ 24.568153] __kmalloc_noprof+0x198/0x4c8 [ 24.568231] kunit_kmalloc_array+0x34/0x88 [ 24.568317] copy_user_test_oob+0xac/0xec8 [ 24.568368] kunit_try_run_case+0x170/0x3f0 [ 24.568471] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.568526] kthread+0x328/0x630 [ 24.568584] ret_from_fork+0x10/0x20 [ 24.568630] [ 24.568656] The buggy address belongs to the object at fff00000c641b000 [ 24.568656] which belongs to the cache kmalloc-128 of size 128 [ 24.568726] The buggy address is located 0 bytes inside of [ 24.568726] allocated 120-byte region [fff00000c641b000, fff00000c641b078) [ 24.568801] [ 24.568826] The buggy address belongs to the physical page: [ 24.568903] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10641b [ 24.569011] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.569083] page_type: f5(slab) [ 24.569165] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.569229] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.569278] page dumped because: kasan: bad access detected [ 24.569317] [ 24.569340] Memory state around the buggy address: [ 24.569377] fff00000c641af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.569427] fff00000c641af80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.569478] >fff00000c641b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.569521] ^ [ 24.569567] fff00000c641b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.569616] fff00000c641b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.569660] ================================================================== [ 24.570103] ================================================================== [ 24.570179] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 24.570250] Write of size 1 at addr fff00000c641b078 by task kunit_try_catch/295 [ 24.570346] [ 24.570400] CPU: 0 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.570503] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.570541] Hardware name: linux,dummy-virt (DT) [ 24.570580] Call trace: [ 24.570609] show_stack+0x20/0x38 (C) [ 24.570666] dump_stack_lvl+0x8c/0xd0 [ 24.570721] print_report+0x118/0x608 [ 24.570775] kasan_report+0xdc/0x128 [ 24.570832] __asan_report_store1_noabort+0x20/0x30 [ 24.570913] strncpy_from_user+0x270/0x2a0 [ 24.570987] copy_user_test_oob+0x5c0/0xec8 [ 24.571093] kunit_try_run_case+0x170/0x3f0 [ 24.571209] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.571278] kthread+0x328/0x630 [ 24.571330] ret_from_fork+0x10/0x20 [ 24.571399] [ 24.571427] Allocated by task 295: [ 24.571464] kasan_save_stack+0x3c/0x68 [ 24.571563] kasan_save_track+0x20/0x40 [ 24.571630] kasan_save_alloc_info+0x40/0x58 [ 24.571681] __kasan_kmalloc+0xd4/0xd8 [ 24.571726] __kmalloc_noprof+0x198/0x4c8 [ 24.571771] kunit_kmalloc_array+0x34/0x88 [ 24.571817] copy_user_test_oob+0xac/0xec8 [ 24.571861] kunit_try_run_case+0x170/0x3f0 [ 24.571906] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.571958] kthread+0x328/0x630 [ 24.572015] ret_from_fork+0x10/0x20 [ 24.572126] [ 24.572180] The buggy address belongs to the object at fff00000c641b000 [ 24.572180] which belongs to the cache kmalloc-128 of size 128 [ 24.572274] The buggy address is located 0 bytes to the right of [ 24.572274] allocated 120-byte region [fff00000c641b000, fff00000c641b078) [ 24.572387] [ 24.572414] The buggy address belongs to the physical page: [ 24.572451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10641b [ 24.572547] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.572620] page_type: f5(slab) [ 24.572682] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.572770] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.572864] page dumped because: kasan: bad access detected [ 24.572940] [ 24.572963] Memory state around the buggy address: [ 24.573002] fff00000c641af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.573065] fff00000c641af80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.573138] >fff00000c641b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.573182] ^ [ 24.573229] fff00000c641b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.573279] fff00000c641b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.573323] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[ 24.548974] ================================================================== [ 24.549038] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 24.549097] Write of size 121 at addr fff00000c641b000 by task kunit_try_catch/295 [ 24.549151] [ 24.549185] CPU: 0 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.549375] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.549450] Hardware name: linux,dummy-virt (DT) [ 24.549518] Call trace: [ 24.549570] show_stack+0x20/0x38 (C) [ 24.549681] dump_stack_lvl+0x8c/0xd0 [ 24.549794] print_report+0x118/0x608 [ 24.549864] kasan_report+0xdc/0x128 [ 24.549913] kasan_check_range+0x100/0x1a8 [ 24.549965] __kasan_check_write+0x20/0x30 [ 24.550013] copy_user_test_oob+0x434/0xec8 [ 24.550121] kunit_try_run_case+0x170/0x3f0 [ 24.550190] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.550249] kthread+0x328/0x630 [ 24.550293] ret_from_fork+0x10/0x20 [ 24.550346] [ 24.550377] Allocated by task 295: [ 24.550415] kasan_save_stack+0x3c/0x68 [ 24.550477] kasan_save_track+0x20/0x40 [ 24.550522] kasan_save_alloc_info+0x40/0x58 [ 24.550580] __kasan_kmalloc+0xd4/0xd8 [ 24.550661] __kmalloc_noprof+0x198/0x4c8 [ 24.550705] kunit_kmalloc_array+0x34/0x88 [ 24.550813] copy_user_test_oob+0xac/0xec8 [ 24.550997] kunit_try_run_case+0x170/0x3f0 [ 24.551080] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.551138] kthread+0x328/0x630 [ 24.551217] ret_from_fork+0x10/0x20 [ 24.551354] [ 24.551399] The buggy address belongs to the object at fff00000c641b000 [ 24.551399] which belongs to the cache kmalloc-128 of size 128 [ 24.551650] The buggy address is located 0 bytes inside of [ 24.551650] allocated 120-byte region [fff00000c641b000, fff00000c641b078) [ 24.551761] [ 24.551787] The buggy address belongs to the physical page: [ 24.551836] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10641b [ 24.551894] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.551948] page_type: f5(slab) [ 24.551992] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.552077] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.552186] page dumped because: kasan: bad access detected [ 24.552244] [ 24.552267] Memory state around the buggy address: [ 24.552493] fff00000c641af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.552587] fff00000c641af80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.552843] >fff00000c641b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.552997] ^ [ 24.553293] fff00000c641b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.553352] fff00000c641b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.553400] ================================================================== [ 24.511252] ================================================================== [ 24.511439] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 24.511540] Write of size 121 at addr fff00000c641b000 by task kunit_try_catch/295 [ 24.511597] [ 24.511648] CPU: 0 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.511776] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.511816] Hardware name: linux,dummy-virt (DT) [ 24.511854] Call trace: [ 24.511885] show_stack+0x20/0x38 (C) [ 24.511944] dump_stack_lvl+0x8c/0xd0 [ 24.512033] print_report+0x118/0x608 [ 24.512090] kasan_report+0xdc/0x128 [ 24.512229] kasan_check_range+0x100/0x1a8 [ 24.512371] __kasan_check_write+0x20/0x30 [ 24.512433] copy_user_test_oob+0x234/0xec8 [ 24.512488] kunit_try_run_case+0x170/0x3f0 [ 24.512561] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.512625] kthread+0x328/0x630 [ 24.512678] ret_from_fork+0x10/0x20 [ 24.512746] [ 24.512769] Allocated by task 295: [ 24.512805] kasan_save_stack+0x3c/0x68 [ 24.512855] kasan_save_track+0x20/0x40 [ 24.512898] kasan_save_alloc_info+0x40/0x58 [ 24.512941] __kasan_kmalloc+0xd4/0xd8 [ 24.512980] __kmalloc_noprof+0x198/0x4c8 [ 24.514524] kunit_kmalloc_array+0x34/0x88 [ 24.515430] copy_user_test_oob+0xac/0xec8 [ 24.515929] kunit_try_run_case+0x170/0x3f0 [ 24.515988] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.516559] kthread+0x328/0x630 [ 24.516635] ret_from_fork+0x10/0x20 [ 24.516820] [ 24.516849] The buggy address belongs to the object at fff00000c641b000 [ 24.516849] which belongs to the cache kmalloc-128 of size 128 [ 24.517253] The buggy address is located 0 bytes inside of [ 24.517253] allocated 120-byte region [fff00000c641b000, fff00000c641b078) [ 24.517328] [ 24.517358] The buggy address belongs to the physical page: [ 24.518109] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10641b [ 24.518196] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.518365] page_type: f5(slab) [ 24.518476] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.518534] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.518580] page dumped because: kasan: bad access detected [ 24.518621] [ 24.518645] Memory state around the buggy address: [ 24.518683] fff00000c641af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.518732] fff00000c641af80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.518780] >fff00000c641b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.519008] ^ [ 24.519142] fff00000c641b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.519264] fff00000c641b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.519310] ================================================================== [ 24.555964] ================================================================== [ 24.556054] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 24.556576] Read of size 121 at addr fff00000c641b000 by task kunit_try_catch/295 [ 24.556810] [ 24.556964] CPU: 0 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.557198] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.557236] Hardware name: linux,dummy-virt (DT) [ 24.557275] Call trace: [ 24.557304] show_stack+0x20/0x38 (C) [ 24.557477] dump_stack_lvl+0x8c/0xd0 [ 24.557711] print_report+0x118/0x608 [ 24.557781] kasan_report+0xdc/0x128 [ 24.557992] kasan_check_range+0x100/0x1a8 [ 24.558234] __kasan_check_read+0x20/0x30 [ 24.558337] copy_user_test_oob+0x4a0/0xec8 [ 24.558395] kunit_try_run_case+0x170/0x3f0 [ 24.558448] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.558506] kthread+0x328/0x630 [ 24.558797] ret_from_fork+0x10/0x20 [ 24.558925] [ 24.558961] Allocated by task 295: [ 24.559309] kasan_save_stack+0x3c/0x68 [ 24.559460] kasan_save_track+0x20/0x40 [ 24.559513] kasan_save_alloc_info+0x40/0x58 [ 24.559563] __kasan_kmalloc+0xd4/0xd8 [ 24.559607] __kmalloc_noprof+0x198/0x4c8 [ 24.559652] kunit_kmalloc_array+0x34/0x88 [ 24.559696] copy_user_test_oob+0xac/0xec8 [ 24.560214] kunit_try_run_case+0x170/0x3f0 [ 24.560353] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.560468] kthread+0x328/0x630 [ 24.560627] ret_from_fork+0x10/0x20 [ 24.560821] [ 24.561049] The buggy address belongs to the object at fff00000c641b000 [ 24.561049] which belongs to the cache kmalloc-128 of size 128 [ 24.561135] The buggy address is located 0 bytes inside of [ 24.561135] allocated 120-byte region [fff00000c641b000, fff00000c641b078) [ 24.561221] [ 24.561250] The buggy address belongs to the physical page: [ 24.561288] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10641b [ 24.561349] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.561692] page_type: f5(slab) [ 24.561807] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.562138] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.562217] page dumped because: kasan: bad access detected [ 24.562349] [ 24.562379] Memory state around the buggy address: [ 24.562430] fff00000c641af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.562485] fff00000c641af80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.562769] >fff00000c641b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.562835] ^ [ 24.562909] fff00000c641b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.563082] fff00000c641b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.563328] ================================================================== [ 24.527745] ================================================================== [ 24.527934] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 24.528030] Read of size 121 at addr fff00000c641b000 by task kunit_try_catch/295 [ 24.528178] [ 24.528281] CPU: 0 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.528749] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.528879] Hardware name: linux,dummy-virt (DT) [ 24.528937] Call trace: [ 24.528985] show_stack+0x20/0x38 (C) [ 24.529083] dump_stack_lvl+0x8c/0xd0 [ 24.529141] print_report+0x118/0x608 [ 24.529199] kasan_report+0xdc/0x128 [ 24.529252] kasan_check_range+0x100/0x1a8 [ 24.529309] __kasan_check_read+0x20/0x30 [ 24.529363] copy_user_test_oob+0x728/0xec8 [ 24.529419] kunit_try_run_case+0x170/0x3f0 [ 24.529474] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.529932] kthread+0x328/0x630 [ 24.530068] ret_from_fork+0x10/0x20 [ 24.530163] [ 24.530189] Allocated by task 295: [ 24.530346] kasan_save_stack+0x3c/0x68 [ 24.530629] kasan_save_track+0x20/0x40 [ 24.530723] kasan_save_alloc_info+0x40/0x58 [ 24.530946] __kasan_kmalloc+0xd4/0xd8 [ 24.531006] __kmalloc_noprof+0x198/0x4c8 [ 24.531065] kunit_kmalloc_array+0x34/0x88 [ 24.531110] copy_user_test_oob+0xac/0xec8 [ 24.531153] kunit_try_run_case+0x170/0x3f0 [ 24.531195] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.531242] kthread+0x328/0x630 [ 24.531278] ret_from_fork+0x10/0x20 [ 24.531316] [ 24.531345] The buggy address belongs to the object at fff00000c641b000 [ 24.531345] which belongs to the cache kmalloc-128 of size 128 [ 24.531940] The buggy address is located 0 bytes inside of [ 24.531940] allocated 120-byte region [fff00000c641b000, fff00000c641b078) [ 24.532066] [ 24.532328] The buggy address belongs to the physical page: [ 24.532423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10641b [ 24.532755] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.532930] page_type: f5(slab) [ 24.533036] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.533138] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.533200] page dumped because: kasan: bad access detected [ 24.533363] [ 24.533472] Memory state around the buggy address: [ 24.533616] fff00000c641af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.533708] fff00000c641af80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.533855] >fff00000c641b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.534171] ^ [ 24.534254] fff00000c641b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.534308] fff00000c641b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.534361] ================================================================== [ 24.545473] ================================================================== [ 24.545543] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 24.545606] Read of size 121 at addr fff00000c641b000 by task kunit_try_catch/295 [ 24.545666] [ 24.545704] CPU: 0 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.545892] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.545926] Hardware name: linux,dummy-virt (DT) [ 24.545992] Call trace: [ 24.546092] show_stack+0x20/0x38 (C) [ 24.546215] dump_stack_lvl+0x8c/0xd0 [ 24.546275] print_report+0x118/0x608 [ 24.546328] kasan_report+0xdc/0x128 [ 24.546377] kasan_check_range+0x100/0x1a8 [ 24.546456] __kasan_check_read+0x20/0x30 [ 24.546504] copy_user_test_oob+0x3c8/0xec8 [ 24.546569] kunit_try_run_case+0x170/0x3f0 [ 24.546636] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.546694] kthread+0x328/0x630 [ 24.546738] ret_from_fork+0x10/0x20 [ 24.546804] [ 24.546859] Allocated by task 295: [ 24.546894] kasan_save_stack+0x3c/0x68 [ 24.546943] kasan_save_track+0x20/0x40 [ 24.546985] kasan_save_alloc_info+0x40/0x58 [ 24.547048] __kasan_kmalloc+0xd4/0xd8 [ 24.547133] __kmalloc_noprof+0x198/0x4c8 [ 24.547202] kunit_kmalloc_array+0x34/0x88 [ 24.547258] copy_user_test_oob+0xac/0xec8 [ 24.547345] kunit_try_run_case+0x170/0x3f0 [ 24.547477] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.547532] kthread+0x328/0x630 [ 24.547569] ret_from_fork+0x10/0x20 [ 24.547607] [ 24.547633] The buggy address belongs to the object at fff00000c641b000 [ 24.547633] which belongs to the cache kmalloc-128 of size 128 [ 24.547695] The buggy address is located 0 bytes inside of [ 24.547695] allocated 120-byte region [fff00000c641b000, fff00000c641b078) [ 24.547760] [ 24.547801] The buggy address belongs to the physical page: [ 24.547836] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10641b [ 24.547903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.547970] page_type: f5(slab) [ 24.548030] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.548153] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.548203] page dumped because: kasan: bad access detected [ 24.548242] [ 24.548265] Memory state around the buggy address: [ 24.548302] fff00000c641af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.548352] fff00000c641af80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.548400] >fff00000c641b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.548444] ^ [ 24.548490] fff00000c641b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.548553] fff00000c641b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.548601] ================================================================== [ 24.540303] ================================================================== [ 24.540466] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 24.540750] Write of size 121 at addr fff00000c641b000 by task kunit_try_catch/295 [ 24.540884] [ 24.541087] CPU: 0 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.541361] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.541430] Hardware name: linux,dummy-virt (DT) [ 24.541598] Call trace: [ 24.541671] show_stack+0x20/0x38 (C) [ 24.541935] dump_stack_lvl+0x8c/0xd0 [ 24.542169] print_report+0x118/0x608 [ 24.542270] kasan_report+0xdc/0x128 [ 24.542361] kasan_check_range+0x100/0x1a8 [ 24.542444] __kasan_check_write+0x20/0x30 [ 24.542497] copy_user_test_oob+0x35c/0xec8 [ 24.542548] kunit_try_run_case+0x170/0x3f0 [ 24.542633] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.542714] kthread+0x328/0x630 [ 24.542761] ret_from_fork+0x10/0x20 [ 24.542815] [ 24.542840] Allocated by task 295: [ 24.542872] kasan_save_stack+0x3c/0x68 [ 24.542945] kasan_save_track+0x20/0x40 [ 24.542993] kasan_save_alloc_info+0x40/0x58 [ 24.543048] __kasan_kmalloc+0xd4/0xd8 [ 24.543090] __kmalloc_noprof+0x198/0x4c8 [ 24.543133] kunit_kmalloc_array+0x34/0x88 [ 24.543188] copy_user_test_oob+0xac/0xec8 [ 24.543240] kunit_try_run_case+0x170/0x3f0 [ 24.543307] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.543400] kthread+0x328/0x630 [ 24.543490] ret_from_fork+0x10/0x20 [ 24.543535] [ 24.543559] The buggy address belongs to the object at fff00000c641b000 [ 24.543559] which belongs to the cache kmalloc-128 of size 128 [ 24.543624] The buggy address is located 0 bytes inside of [ 24.543624] allocated 120-byte region [fff00000c641b000, fff00000c641b078) [ 24.543692] [ 24.543717] The buggy address belongs to the physical page: [ 24.543768] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10641b [ 24.543901] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.543968] page_type: f5(slab) [ 24.544064] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.544164] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.544218] page dumped because: kasan: bad access detected [ 24.544299] [ 24.544325] Memory state around the buggy address: [ 24.544363] fff00000c641af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.544412] fff00000c641af80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.544461] >fff00000c641b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.544505] ^ [ 24.544564] fff00000c641b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.544617] fff00000c641b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.544663] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[ 24.459544] ================================================================== [ 24.459637] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 24.460178] Write of size 8 at addr fff00000c7791f78 by task kunit_try_catch/291 [ 24.460272] [ 24.460593] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.460718] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.460758] Hardware name: linux,dummy-virt (DT) [ 24.461033] Call trace: [ 24.461081] show_stack+0x20/0x38 (C) [ 24.461170] dump_stack_lvl+0x8c/0xd0 [ 24.461594] print_report+0x118/0x608 [ 24.461850] kasan_report+0xdc/0x128 [ 24.462080] kasan_check_range+0x100/0x1a8 [ 24.462305] __kasan_check_write+0x20/0x30 [ 24.462398] copy_to_kernel_nofault+0x8c/0x250 [ 24.462523] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 24.462612] kunit_try_run_case+0x170/0x3f0 [ 24.463031] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.463224] kthread+0x328/0x630 [ 24.463287] ret_from_fork+0x10/0x20 [ 24.463413] [ 24.463461] Allocated by task 291: [ 24.463502] kasan_save_stack+0x3c/0x68 [ 24.463584] kasan_save_track+0x20/0x40 [ 24.463797] kasan_save_alloc_info+0x40/0x58 [ 24.463896] __kasan_kmalloc+0xd4/0xd8 [ 24.463960] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.464321] copy_to_kernel_nofault_oob+0xc8/0x418 [ 24.464399] kunit_try_run_case+0x170/0x3f0 [ 24.464451] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.464503] kthread+0x328/0x630 [ 24.464686] ret_from_fork+0x10/0x20 [ 24.464749] [ 24.464821] The buggy address belongs to the object at fff00000c7791f00 [ 24.464821] which belongs to the cache kmalloc-128 of size 128 [ 24.464906] The buggy address is located 0 bytes to the right of [ 24.464906] allocated 120-byte region [fff00000c7791f00, fff00000c7791f78) [ 24.464982] [ 24.465010] The buggy address belongs to the physical page: [ 24.465066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107791 [ 24.465135] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.465201] page_type: f5(slab) [ 24.465255] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.465324] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.465375] page dumped because: kasan: bad access detected [ 24.465427] [ 24.465469] Memory state around the buggy address: [ 24.465516] fff00000c7791e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.465581] fff00000c7791e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.465639] >fff00000c7791f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.465685] ^ [ 24.465736] fff00000c7791f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.465787] fff00000c7792000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.465835] ================================================================== [ 24.445786] ================================================================== [ 24.445906] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 24.445999] Read of size 8 at addr fff00000c7791f78 by task kunit_try_catch/291 [ 24.446827] [ 24.446930] CPU: 0 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.447059] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.447495] Hardware name: linux,dummy-virt (DT) [ 24.447761] Call trace: [ 24.448056] show_stack+0x20/0x38 (C) [ 24.448143] dump_stack_lvl+0x8c/0xd0 [ 24.448211] print_report+0x118/0x608 [ 24.448602] kasan_report+0xdc/0x128 [ 24.448682] __asan_report_load8_noabort+0x20/0x30 [ 24.449057] copy_to_kernel_nofault+0x204/0x250 [ 24.449260] copy_to_kernel_nofault_oob+0x158/0x418 [ 24.449331] kunit_try_run_case+0x170/0x3f0 [ 24.449862] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.449984] kthread+0x328/0x630 [ 24.450213] ret_from_fork+0x10/0x20 [ 24.450430] [ 24.450685] Allocated by task 291: [ 24.450735] kasan_save_stack+0x3c/0x68 [ 24.451040] kasan_save_track+0x20/0x40 [ 24.451102] kasan_save_alloc_info+0x40/0x58 [ 24.451151] __kasan_kmalloc+0xd4/0xd8 [ 24.451458] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.451790] copy_to_kernel_nofault_oob+0xc8/0x418 [ 24.451855] kunit_try_run_case+0x170/0x3f0 [ 24.452074] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.452234] kthread+0x328/0x630 [ 24.452664] ret_from_fork+0x10/0x20 [ 24.452894] [ 24.452976] The buggy address belongs to the object at fff00000c7791f00 [ 24.452976] which belongs to the cache kmalloc-128 of size 128 [ 24.453231] The buggy address is located 0 bytes to the right of [ 24.453231] allocated 120-byte region [fff00000c7791f00, fff00000c7791f78) [ 24.453423] [ 24.453459] The buggy address belongs to the physical page: [ 24.453885] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107791 [ 24.453982] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.454431] page_type: f5(slab) [ 24.454576] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 24.454646] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 24.454716] page dumped because: kasan: bad access detected [ 24.455126] [ 24.455162] Memory state around the buggy address: [ 24.455214] fff00000c7791e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 24.455508] fff00000c7791e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.455565] >fff00000c7791f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 24.455612] ^ [ 24.455676] fff00000c7791f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.455726] fff00000c7792000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.455772] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 24.368207] ================================================================== [ 24.368578] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 24.369098] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/279 [ 24.369187] [ 24.369236] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.369339] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.369374] Hardware name: linux,dummy-virt (DT) [ 24.369625] Call trace: [ 24.369670] show_stack+0x20/0x38 (C) [ 24.370043] dump_stack_lvl+0x8c/0xd0 [ 24.370223] print_report+0x310/0x608 [ 24.370520] kasan_report+0xdc/0x128 [ 24.370854] __asan_report_load1_noabort+0x20/0x30 [ 24.370977] vmalloc_oob+0x51c/0x5d0 [ 24.371042] kunit_try_run_case+0x170/0x3f0 [ 24.371419] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.371804] kthread+0x328/0x630 [ 24.372071] ret_from_fork+0x10/0x20 [ 24.372194] [ 24.372256] The buggy address belongs to the virtual mapping at [ 24.372256] [ffff8000800fe000, ffff800080100000) created by: [ 24.372256] vmalloc_oob+0x98/0x5d0 [ 24.372608] [ 24.372652] The buggy address belongs to the physical page: [ 24.372697] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107794 [ 24.372911] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.373317] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 24.373390] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 24.373719] page dumped because: kasan: bad access detected [ 24.373776] [ 24.373836] Memory state around the buggy address: [ 24.373884] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.374099] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.374296] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 24.374348] ^ [ 24.374400] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 24.374450] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 24.374747] ================================================================== [ 24.361115] ================================================================== [ 24.361218] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 24.361305] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/279 [ 24.361366] [ 24.361415] CPU: 0 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.361520] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.361556] Hardware name: linux,dummy-virt (DT) [ 24.361596] Call trace: [ 24.361628] show_stack+0x20/0x38 (C) [ 24.361690] dump_stack_lvl+0x8c/0xd0 [ 24.361748] print_report+0x310/0x608 [ 24.361803] kasan_report+0xdc/0x128 [ 24.361854] __asan_report_load1_noabort+0x20/0x30 [ 24.361915] vmalloc_oob+0x578/0x5d0 [ 24.361968] kunit_try_run_case+0x170/0x3f0 [ 24.362462] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.363537] kthread+0x328/0x630 [ 24.364509] ret_from_fork+0x10/0x20 [ 24.364686] [ 24.364765] The buggy address belongs to the virtual mapping at [ 24.364765] [ffff8000800fe000, ffff800080100000) created by: [ 24.364765] vmalloc_oob+0x98/0x5d0 [ 24.364859] [ 24.364888] The buggy address belongs to the physical page: [ 24.364960] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107794 [ 24.365040] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.365393] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 24.365563] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 24.365621] page dumped because: kasan: bad access detected [ 24.365910] [ 24.365973] Memory state around the buggy address: [ 24.366040] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.366097] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 24.366151] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 24.366212] ^ [ 24.366258] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 24.366304] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 24.366345] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 24.047078] ================================================================== [ 24.047210] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 24.047326] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.047429] [ 24.047513] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.047743] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.048188] Hardware name: linux,dummy-virt (DT) [ 24.048287] Call trace: [ 24.048345] show_stack+0x20/0x38 (C) [ 24.048481] dump_stack_lvl+0x8c/0xd0 [ 24.048621] print_report+0x118/0x608 [ 24.048743] kasan_report+0xdc/0x128 [ 24.048861] kasan_check_range+0x100/0x1a8 [ 24.048989] __kasan_check_write+0x20/0x30 [ 24.049122] kasan_atomics_helper+0xeb8/0x4858 [ 24.049246] kasan_atomics+0x198/0x2e0 [ 24.049360] kunit_try_run_case+0x170/0x3f0 [ 24.049487] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.049622] kthread+0x328/0x630 [ 24.049731] ret_from_fork+0x10/0x20 [ 24.049853] [ 24.049903] Allocated by task 275: [ 24.049978] kasan_save_stack+0x3c/0x68 [ 24.050606] kasan_save_track+0x20/0x40 [ 24.050734] kasan_save_alloc_info+0x40/0x58 [ 24.050846] __kasan_kmalloc+0xd4/0xd8 [ 24.050941] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.051162] kasan_atomics+0xb8/0x2e0 [ 24.051336] kunit_try_run_case+0x170/0x3f0 [ 24.051450] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.052044] kthread+0x328/0x630 [ 24.052385] ret_from_fork+0x10/0x20 [ 24.052514] [ 24.052580] The buggy address belongs to the object at fff00000c63eb100 [ 24.052580] which belongs to the cache kmalloc-64 of size 64 [ 24.052724] The buggy address is located 0 bytes to the right of [ 24.052724] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.053047] [ 24.053120] The buggy address belongs to the physical page: [ 24.053540] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.053820] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.053962] page_type: f5(slab) [ 24.054103] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.054252] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.054406] page dumped because: kasan: bad access detected [ 24.054490] [ 24.054542] Memory state around the buggy address: [ 24.054614] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.054736] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.054848] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.054944] ^ [ 24.055041] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.055369] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.055497] ================================================================== [ 23.838043] ================================================================== [ 23.838646] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 23.839188] Write of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 23.839307] [ 23.839714] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 23.840356] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.840484] Hardware name: linux,dummy-virt (DT) [ 23.840666] Call trace: [ 23.840736] show_stack+0x20/0x38 (C) [ 23.840941] dump_stack_lvl+0x8c/0xd0 [ 23.841072] print_report+0x118/0x608 [ 23.841189] kasan_report+0xdc/0x128 [ 23.841358] kasan_check_range+0x100/0x1a8 [ 23.841471] __kasan_check_write+0x20/0x30 [ 23.841582] kasan_atomics_helper+0xa04/0x4858 [ 23.841698] kasan_atomics+0x198/0x2e0 [ 23.841816] kunit_try_run_case+0x170/0x3f0 [ 23.841967] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.842163] kthread+0x328/0x630 [ 23.842257] ret_from_fork+0x10/0x20 [ 23.842413] [ 23.842454] Allocated by task 275: [ 23.842535] kasan_save_stack+0x3c/0x68 [ 23.842634] kasan_save_track+0x20/0x40 [ 23.842718] kasan_save_alloc_info+0x40/0x58 [ 23.842846] __kasan_kmalloc+0xd4/0xd8 [ 23.842941] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.843047] kasan_atomics+0xb8/0x2e0 [ 23.843174] kunit_try_run_case+0x170/0x3f0 [ 23.843257] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.843385] kthread+0x328/0x630 [ 23.843559] ret_from_fork+0x10/0x20 [ 23.843668] [ 23.843730] The buggy address belongs to the object at fff00000c63eb100 [ 23.843730] which belongs to the cache kmalloc-64 of size 64 [ 23.843864] The buggy address is located 0 bytes to the right of [ 23.843864] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 23.844028] [ 23.844100] The buggy address belongs to the physical page: [ 23.844255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 23.844365] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.844472] page_type: f5(slab) [ 23.844600] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.844767] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.844890] page dumped because: kasan: bad access detected [ 23.844965] [ 23.845032] Memory state around the buggy address: [ 23.845132] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.845236] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.845340] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.845430] ^ [ 23.845507] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.845611] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.845706] ================================================================== [ 24.089663] ================================================================== [ 24.089796] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 24.089927] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.090062] [ 24.090909] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.091649] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.091889] Hardware name: linux,dummy-virt (DT) [ 24.092321] Call trace: [ 24.092407] show_stack+0x20/0x38 (C) [ 24.093157] dump_stack_lvl+0x8c/0xd0 [ 24.093583] print_report+0x118/0x608 [ 24.093712] kasan_report+0xdc/0x128 [ 24.093822] kasan_check_range+0x100/0x1a8 [ 24.094567] __kasan_check_write+0x20/0x30 [ 24.094804] kasan_atomics_helper+0x1058/0x4858 [ 24.095294] kasan_atomics+0x198/0x2e0 [ 24.095494] kunit_try_run_case+0x170/0x3f0 [ 24.095670] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.095998] kthread+0x328/0x630 [ 24.096346] ret_from_fork+0x10/0x20 [ 24.096475] [ 24.096538] Allocated by task 275: [ 24.096618] kasan_save_stack+0x3c/0x68 [ 24.096731] kasan_save_track+0x20/0x40 [ 24.097481] kasan_save_alloc_info+0x40/0x58 [ 24.097932] __kasan_kmalloc+0xd4/0xd8 [ 24.098330] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.098482] kasan_atomics+0xb8/0x2e0 [ 24.098570] kunit_try_run_case+0x170/0x3f0 [ 24.099030] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.099227] kthread+0x328/0x630 [ 24.099320] ret_from_fork+0x10/0x20 [ 24.099755] [ 24.099808] The buggy address belongs to the object at fff00000c63eb100 [ 24.099808] which belongs to the cache kmalloc-64 of size 64 [ 24.100592] The buggy address is located 0 bytes to the right of [ 24.100592] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.100813] [ 24.100876] The buggy address belongs to the physical page: [ 24.101295] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.101492] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.101722] page_type: f5(slab) [ 24.101974] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.102639] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.103143] page dumped because: kasan: bad access detected [ 24.103316] [ 24.103671] Memory state around the buggy address: [ 24.103790] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.103902] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.104006] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.104698] ^ [ 24.104923] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.105289] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.105867] ================================================================== [ 24.067121] ================================================================== [ 24.067252] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 24.067439] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.067782] [ 24.067904] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.068146] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.068349] Hardware name: linux,dummy-virt (DT) [ 24.068550] Call trace: [ 24.068652] show_stack+0x20/0x38 (C) [ 24.069201] dump_stack_lvl+0x8c/0xd0 [ 24.069383] print_report+0x118/0x608 [ 24.069507] kasan_report+0xdc/0x128 [ 24.069617] kasan_check_range+0x100/0x1a8 [ 24.069732] __kasan_check_write+0x20/0x30 [ 24.069839] kasan_atomics_helper+0xf88/0x4858 [ 24.070171] kasan_atomics+0x198/0x2e0 [ 24.070428] kunit_try_run_case+0x170/0x3f0 [ 24.070560] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.070696] kthread+0x328/0x630 [ 24.070795] ret_from_fork+0x10/0x20 [ 24.070921] [ 24.070966] Allocated by task 275: [ 24.071066] kasan_save_stack+0x3c/0x68 [ 24.071163] kasan_save_track+0x20/0x40 [ 24.071257] kasan_save_alloc_info+0x40/0x58 [ 24.071360] __kasan_kmalloc+0xd4/0xd8 [ 24.071456] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.071603] kasan_atomics+0xb8/0x2e0 [ 24.071704] kunit_try_run_case+0x170/0x3f0 [ 24.071837] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.071987] kthread+0x328/0x630 [ 24.072113] ret_from_fork+0x10/0x20 [ 24.072240] [ 24.072294] The buggy address belongs to the object at fff00000c63eb100 [ 24.072294] which belongs to the cache kmalloc-64 of size 64 [ 24.072439] The buggy address is located 0 bytes to the right of [ 24.072439] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.072628] [ 24.072709] The buggy address belongs to the physical page: [ 24.072821] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.072962] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.073077] page_type: f5(slab) [ 24.073171] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.073295] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.073433] page dumped because: kasan: bad access detected [ 24.073519] [ 24.073562] Memory state around the buggy address: [ 24.073644] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.073758] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.073870] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.073988] ^ [ 24.074125] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.074183] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.074230] ================================================================== [ 23.824818] ================================================================== [ 23.824953] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 23.825108] Write of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 23.825243] [ 23.825353] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 23.825570] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.825631] Hardware name: linux,dummy-virt (DT) [ 23.825700] Call trace: [ 23.825753] show_stack+0x20/0x38 (C) [ 23.825844] dump_stack_lvl+0x8c/0xd0 [ 23.825940] print_report+0x118/0x608 [ 23.826052] kasan_report+0xdc/0x128 [ 23.826242] kasan_check_range+0x100/0x1a8 [ 23.826440] __kasan_check_write+0x20/0x30 [ 23.826552] kasan_atomics_helper+0x934/0x4858 [ 23.826676] kasan_atomics+0x198/0x2e0 [ 23.826782] kunit_try_run_case+0x170/0x3f0 [ 23.826879] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.826981] kthread+0x328/0x630 [ 23.827112] ret_from_fork+0x10/0x20 [ 23.827219] [ 23.827258] Allocated by task 275: [ 23.827318] kasan_save_stack+0x3c/0x68 [ 23.827414] kasan_save_track+0x20/0x40 [ 23.827490] kasan_save_alloc_info+0x40/0x58 [ 23.827554] __kasan_kmalloc+0xd4/0xd8 [ 23.827621] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.827691] kasan_atomics+0xb8/0x2e0 [ 23.827752] kunit_try_run_case+0x170/0x3f0 [ 23.827822] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.828459] The buggy address is located 0 bytes to the right of [ 23.828459] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 23.828636] [ 23.828717] The buggy address belongs to the physical page: [ 23.828842] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 23.828987] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.829118] page_type: f5(slab) [ 23.829210] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.829346] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.829441] page dumped because: kasan: bad access detected [ 23.829601] [ 23.829653] Memory state around the buggy address: [ 23.829737] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.829844] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.829952] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.830099] ^ [ 23.830176] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.830295] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.830415] ================================================================== [ 24.240386] ================================================================== [ 24.240856] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 24.240933] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.240992] [ 24.241049] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.241154] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.241190] Hardware name: linux,dummy-virt (DT) [ 24.241229] Call trace: [ 24.241261] show_stack+0x20/0x38 (C) [ 24.241321] dump_stack_lvl+0x8c/0xd0 [ 24.241378] print_report+0x118/0x608 [ 24.241433] kasan_report+0xdc/0x128 [ 24.241487] kasan_check_range+0x100/0x1a8 [ 24.241543] __kasan_check_write+0x20/0x30 [ 24.241594] kasan_atomics_helper+0x1644/0x4858 [ 24.241650] kasan_atomics+0x198/0x2e0 [ 24.241702] kunit_try_run_case+0x170/0x3f0 [ 24.241756] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.241816] kthread+0x328/0x630 [ 24.241865] ret_from_fork+0x10/0x20 [ 24.241921] [ 24.241947] Allocated by task 275: [ 24.241982] kasan_save_stack+0x3c/0x68 [ 24.244610] kasan_save_track+0x20/0x40 [ 24.244762] kasan_save_alloc_info+0x40/0x58 [ 24.245046] __kasan_kmalloc+0xd4/0xd8 [ 24.245277] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.245373] kasan_atomics+0xb8/0x2e0 [ 24.245419] kunit_try_run_case+0x170/0x3f0 [ 24.245509] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.245916] kthread+0x328/0x630 [ 24.246063] ret_from_fork+0x10/0x20 [ 24.247008] [ 24.247055] The buggy address belongs to the object at fff00000c63eb100 [ 24.247055] which belongs to the cache kmalloc-64 of size 64 [ 24.247312] The buggy address is located 0 bytes to the right of [ 24.247312] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.247561] [ 24.247759] The buggy address belongs to the physical page: [ 24.248321] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.248772] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.249373] page_type: f5(slab) [ 24.249672] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.250130] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.250190] page dumped because: kasan: bad access detected [ 24.250712] [ 24.251050] Memory state around the buggy address: [ 24.251144] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.251200] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.251248] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.251290] ^ [ 24.251329] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.252212] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.252838] ================================================================== [ 23.871287] ================================================================== [ 23.871639] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 23.871773] Read of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 23.872109] [ 23.872208] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 23.872912] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.873003] Hardware name: linux,dummy-virt (DT) [ 23.873103] Call trace: [ 23.873165] show_stack+0x20/0x38 (C) [ 23.873686] dump_stack_lvl+0x8c/0xd0 [ 23.874189] print_report+0x118/0x608 [ 23.874363] kasan_report+0xdc/0x128 [ 23.874553] __asan_report_load4_noabort+0x20/0x30 [ 23.875116] kasan_atomics_helper+0x3dcc/0x4858 [ 23.875328] kasan_atomics+0x198/0x2e0 [ 23.875485] kunit_try_run_case+0x170/0x3f0 [ 23.875691] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.875835] kthread+0x328/0x630 [ 23.875950] ret_from_fork+0x10/0x20 [ 23.876809] [ 23.876917] Allocated by task 275: [ 23.877050] kasan_save_stack+0x3c/0x68 [ 23.877165] kasan_save_track+0x20/0x40 [ 23.877259] kasan_save_alloc_info+0x40/0x58 [ 23.877363] __kasan_kmalloc+0xd4/0xd8 [ 23.878000] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.878347] kasan_atomics+0xb8/0x2e0 [ 23.878470] kunit_try_run_case+0x170/0x3f0 [ 23.878824] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.878961] kthread+0x328/0x630 [ 23.879071] ret_from_fork+0x10/0x20 [ 23.879521] [ 23.879696] The buggy address belongs to the object at fff00000c63eb100 [ 23.879696] which belongs to the cache kmalloc-64 of size 64 [ 23.880257] The buggy address is located 0 bytes to the right of [ 23.880257] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 23.880635] [ 23.880730] The buggy address belongs to the physical page: [ 23.880823] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 23.880969] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.881118] page_type: f5(slab) [ 23.881854] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.882060] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.882386] page dumped because: kasan: bad access detected [ 23.882478] [ 23.882710] Memory state around the buggy address: [ 23.882801] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.883388] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.883547] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.883727] ^ [ 23.883814] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.884359] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.884485] ================================================================== [ 24.178660] ================================================================== [ 24.178865] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 24.179009] Read of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.179137] [ 24.179254] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.179459] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.179531] Hardware name: linux,dummy-virt (DT) [ 24.179598] Call trace: [ 24.179643] show_stack+0x20/0x38 (C) [ 24.179745] dump_stack_lvl+0x8c/0xd0 [ 24.179855] print_report+0x118/0x608 [ 24.179972] kasan_report+0xdc/0x128 [ 24.180111] __asan_report_load8_noabort+0x20/0x30 [ 24.180275] kasan_atomics_helper+0x3f04/0x4858 [ 24.180437] kasan_atomics+0x198/0x2e0 [ 24.180569] kunit_try_run_case+0x170/0x3f0 [ 24.180694] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.180831] kthread+0x328/0x630 [ 24.180943] ret_from_fork+0x10/0x20 [ 24.181077] [ 24.181127] Allocated by task 275: [ 24.181201] kasan_save_stack+0x3c/0x68 [ 24.181303] kasan_save_track+0x20/0x40 [ 24.181399] kasan_save_alloc_info+0x40/0x58 [ 24.181498] __kasan_kmalloc+0xd4/0xd8 [ 24.181589] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.181686] kasan_atomics+0xb8/0x2e0 [ 24.181774] kunit_try_run_case+0x170/0x3f0 [ 24.181867] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.181975] kthread+0x328/0x630 [ 24.182089] ret_from_fork+0x10/0x20 [ 24.182181] [ 24.182269] The buggy address belongs to the object at fff00000c63eb100 [ 24.182269] which belongs to the cache kmalloc-64 of size 64 [ 24.182410] The buggy address is located 0 bytes to the right of [ 24.182410] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.182583] [ 24.182653] The buggy address belongs to the physical page: [ 24.182751] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.182894] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.183057] page_type: f5(slab) [ 24.183152] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.183282] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.183386] page dumped because: kasan: bad access detected [ 24.183465] [ 24.183511] Memory state around the buggy address: [ 24.183587] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.183694] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.183798] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.183903] ^ [ 24.184027] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.184128] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.184247] ================================================================== [ 23.788348] ================================================================== [ 23.788718] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858 [ 23.788873] Write of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 23.789501] Hardware name: linux,dummy-virt (DT) [ 23.790327] dump_stack_lvl+0x8c/0xd0 [ 23.790444] print_report+0x118/0x608 [ 23.790544] kasan_report+0xdc/0x128 [ 23.790982] kasan_atomics_helper+0x760/0x4858 [ 23.791114] kasan_atomics+0x198/0x2e0 [ 23.791331] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.791468] kthread+0x328/0x630 [ 23.792015] [ 23.792079] Allocated by task 275: [ 23.792427] kasan_save_alloc_info+0x40/0x58 [ 23.792821] kunit_try_run_case+0x170/0x3f0 [ 23.792921] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.793417] The buggy address is located 0 bytes to the right of [ 23.793417] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 23.794585] page_type: f5(slab) [ 23.794894] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.795222] ================================================================== [ 23.885736] ================================================================== [ 23.885885] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 23.886501] Write of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 23.886649] [ 23.886722] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 23.886950] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.887263] Hardware name: linux,dummy-virt (DT) [ 23.887504] Call trace: [ 23.887649] show_stack+0x20/0x38 (C) [ 23.888201] dump_stack_lvl+0x8c/0xd0 [ 23.888578] print_report+0x118/0x608 [ 23.889117] kasan_report+0xdc/0x128 [ 23.889333] kasan_check_range+0x100/0x1a8 [ 23.889468] __kasan_check_write+0x20/0x30 [ 23.889784] kasan_atomics_helper+0xb70/0x4858 [ 23.890198] kasan_atomics+0x198/0x2e0 [ 23.890489] kunit_try_run_case+0x170/0x3f0 [ 23.890627] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.890756] kthread+0x328/0x630 [ 23.890861] ret_from_fork+0x10/0x20 [ 23.891357] [ 23.891441] Allocated by task 275: [ 23.891866] kasan_save_stack+0x3c/0x68 [ 23.892003] kasan_save_track+0x20/0x40 [ 23.892114] kasan_save_alloc_info+0x40/0x58 [ 23.892468] __kasan_kmalloc+0xd4/0xd8 [ 23.892670] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.892789] kasan_atomics+0xb8/0x2e0 [ 23.893141] kunit_try_run_case+0x170/0x3f0 [ 23.893284] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.893642] kthread+0x328/0x630 [ 23.894183] ret_from_fork+0x10/0x20 [ 23.894321] [ 23.894375] The buggy address belongs to the object at fff00000c63eb100 [ 23.894375] which belongs to the cache kmalloc-64 of size 64 [ 23.894504] The buggy address is located 0 bytes to the right of [ 23.894504] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 23.894656] [ 23.894714] The buggy address belongs to the physical page: [ 23.894810] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 23.894940] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.896038] page_type: f5(slab) [ 23.896590] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.897224] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.897339] page dumped because: kasan: bad access detected [ 23.897429] [ 23.897844] Memory state around the buggy address: [ 23.897946] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.901544] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 23.908518] ret_from_fork+0x10/0x20 [ 23.911463] page_type: f5(slab) [ 23.912377] [ 23.912576] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.912733] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.913074] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.913417] ^ [ 23.913868] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.916069] [ 23.916704] Hardware name: linux,dummy-virt (DT) [ 23.918877] __kasan_check_write+0x20/0x30 [ 23.920551] kthread+0x328/0x630 [ 23.922769] kasan_atomics+0xb8/0x2e0 [ 23.924860] [ 23.926836] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.927618] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.927934] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.928271] ^ [ 23.928923] ================================================================== [ 24.279157] ================================================================== [ 24.279226] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 24.279294] Read of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.279353] [ 24.279396] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.279498] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.279536] Hardware name: linux,dummy-virt (DT) [ 24.279575] Call trace: [ 24.279604] show_stack+0x20/0x38 (C) [ 24.279665] dump_stack_lvl+0x8c/0xd0 [ 24.279722] print_report+0x118/0x608 [ 24.279777] kasan_report+0xdc/0x128 [ 24.279832] __asan_report_load8_noabort+0x20/0x30 [ 24.279895] kasan_atomics_helper+0x3e10/0x4858 [ 24.279951] kasan_atomics+0x198/0x2e0 [ 24.280005] kunit_try_run_case+0x170/0x3f0 [ 24.280079] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.280141] kthread+0x328/0x630 [ 24.280191] ret_from_fork+0x10/0x20 [ 24.283218] [ 24.283572] Allocated by task 275: [ 24.283622] kasan_save_stack+0x3c/0x68 [ 24.284440] kasan_save_track+0x20/0x40 [ 24.284947] kasan_save_alloc_info+0x40/0x58 [ 24.285221] __kasan_kmalloc+0xd4/0xd8 [ 24.285992] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.286215] kasan_atomics+0xb8/0x2e0 [ 24.286374] kunit_try_run_case+0x170/0x3f0 [ 24.286474] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.286522] kthread+0x328/0x630 [ 24.286559] ret_from_fork+0x10/0x20 [ 24.286597] [ 24.286624] The buggy address belongs to the object at fff00000c63eb100 [ 24.286624] which belongs to the cache kmalloc-64 of size 64 [ 24.287848] The buggy address is located 0 bytes to the right of [ 24.287848] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.287937] [ 24.287965] The buggy address belongs to the physical page: [ 24.288654] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.288750] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.288824] page_type: f5(slab) [ 24.288876] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.289659] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.289889] page dumped because: kasan: bad access detected [ 24.290484] [ 24.290604] Memory state around the buggy address: [ 24.290657] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.290713] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.290763] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.290807] ^ [ 24.290846] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.290892] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.290933] ================================================================== [ 24.292574] ================================================================== [ 24.293327] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 24.294093] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.294247] [ 24.294444] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.294840] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.294876] Hardware name: linux,dummy-virt (DT) [ 24.294914] Call trace: [ 24.294944] show_stack+0x20/0x38 (C) [ 24.295009] dump_stack_lvl+0x8c/0xd0 [ 24.295081] print_report+0x118/0x608 [ 24.296428] kasan_report+0xdc/0x128 [ 24.296696] kasan_check_range+0x100/0x1a8 [ 24.296762] __kasan_check_write+0x20/0x30 [ 24.296818] kasan_atomics_helper+0x175c/0x4858 [ 24.296875] kasan_atomics+0x198/0x2e0 [ 24.298262] kunit_try_run_case+0x170/0x3f0 [ 24.298323] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.298382] kthread+0x328/0x630 [ 24.299231] ret_from_fork+0x10/0x20 [ 24.299316] [ 24.299345] Allocated by task 275: [ 24.299714] kasan_save_stack+0x3c/0x68 [ 24.299907] kasan_save_track+0x20/0x40 [ 24.300113] kasan_save_alloc_info+0x40/0x58 [ 24.300307] __kasan_kmalloc+0xd4/0xd8 [ 24.300520] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.300587] kasan_atomics+0xb8/0x2e0 [ 24.300634] kunit_try_run_case+0x170/0x3f0 [ 24.301491] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.301625] kthread+0x328/0x630 [ 24.301770] ret_from_fork+0x10/0x20 [ 24.302166] [ 24.302199] The buggy address belongs to the object at fff00000c63eb100 [ 24.302199] which belongs to the cache kmalloc-64 of size 64 [ 24.302269] The buggy address is located 0 bytes to the right of [ 24.302269] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.302659] [ 24.302760] The buggy address belongs to the physical page: [ 24.303043] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.303567] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.303755] page_type: f5(slab) [ 24.303811] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.303871] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.303917] page dumped because: kasan: bad access detected [ 24.303956] [ 24.303978] Memory state around the buggy address: [ 24.304029] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.304089] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.304140] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.304186] ^ [ 24.304228] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.304278] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.304379] ================================================================== [ 24.109346] ================================================================== [ 24.110059] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 24.111013] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.111322] [ 24.111635] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.112758] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.112843] Hardware name: linux,dummy-virt (DT) [ 24.113423] Call trace: [ 24.113622] show_stack+0x20/0x38 (C) [ 24.114244] dump_stack_lvl+0x8c/0xd0 [ 24.114699] print_report+0x118/0x608 [ 24.114992] kasan_report+0xdc/0x128 [ 24.115638] kasan_check_range+0x100/0x1a8 [ 24.116001] __kasan_check_write+0x20/0x30 [ 24.116970] kasan_atomics_helper+0x10c0/0x4858 [ 24.117561] kasan_atomics+0x198/0x2e0 [ 24.117724] kunit_try_run_case+0x170/0x3f0 [ 24.117889] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.118089] kthread+0x328/0x630 [ 24.118190] ret_from_fork+0x10/0x20 [ 24.118420] [ 24.118593] Allocated by task 275: [ 24.118733] kasan_save_stack+0x3c/0x68 [ 24.118842] kasan_save_track+0x20/0x40 [ 24.118927] kasan_save_alloc_info+0x40/0x58 [ 24.119008] __kasan_kmalloc+0xd4/0xd8 [ 24.119289] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.119388] kasan_atomics+0xb8/0x2e0 [ 24.119476] kunit_try_run_case+0x170/0x3f0 [ 24.119832] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.120003] kthread+0x328/0x630 [ 24.120099] ret_from_fork+0x10/0x20 [ 24.120407] [ 24.120502] The buggy address belongs to the object at fff00000c63eb100 [ 24.120502] which belongs to the cache kmalloc-64 of size 64 [ 24.120702] The buggy address is located 0 bytes to the right of [ 24.120702] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.120901] [ 24.120976] The buggy address belongs to the physical page: [ 24.121078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.121229] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.121518] page_type: f5(slab) [ 24.121629] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.121757] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.121861] page dumped because: kasan: bad access detected [ 24.121952] [ 24.122029] Memory state around the buggy address: [ 24.122146] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.122295] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.122437] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.122570] ^ [ 24.122683] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.122823] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.122925] ================================================================== [ 24.254313] ================================================================== [ 24.254514] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 24.255301] Read of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.255488] [ 24.255582] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.256039] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.256189] Hardware name: linux,dummy-virt (DT) [ 24.256324] Call trace: [ 24.256447] show_stack+0x20/0x38 (C) [ 24.256555] dump_stack_lvl+0x8c/0xd0 [ 24.256944] print_report+0x118/0x608 [ 24.257008] kasan_report+0xdc/0x128 [ 24.257082] __asan_report_load8_noabort+0x20/0x30 [ 24.257261] kasan_atomics_helper+0x3df4/0x4858 [ 24.257331] kasan_atomics+0x198/0x2e0 [ 24.257434] kunit_try_run_case+0x170/0x3f0 [ 24.257494] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.257557] kthread+0x328/0x630 [ 24.257606] ret_from_fork+0x10/0x20 [ 24.257665] [ 24.257924] Allocated by task 275: [ 24.258114] kasan_save_stack+0x3c/0x68 [ 24.258319] kasan_save_track+0x20/0x40 [ 24.258371] kasan_save_alloc_info+0x40/0x58 [ 24.258814] __kasan_kmalloc+0xd4/0xd8 [ 24.258865] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.259318] kasan_atomics+0xb8/0x2e0 [ 24.259816] kunit_try_run_case+0x170/0x3f0 [ 24.259878] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.259931] kthread+0x328/0x630 [ 24.259969] ret_from_fork+0x10/0x20 [ 24.260662] [ 24.260981] The buggy address belongs to the object at fff00000c63eb100 [ 24.260981] which belongs to the cache kmalloc-64 of size 64 [ 24.261440] The buggy address is located 0 bytes to the right of [ 24.261440] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.261815] [ 24.262011] The buggy address belongs to the physical page: [ 24.262167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.262256] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.262318] page_type: f5(slab) [ 24.262366] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.262426] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.262473] page dumped because: kasan: bad access detected [ 24.262511] [ 24.262534] Memory state around the buggy address: [ 24.262574] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.262625] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.262675] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.264697] ^ [ 24.264898] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.264955] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.265003] ================================================================== [ 23.962843] ================================================================== [ 23.963652] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 23.963821] Read of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 23.963957] [ 23.964068] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 23.964293] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.964378] Hardware name: linux,dummy-virt (DT) [ 23.964466] Call trace: [ 23.964541] show_stack+0x20/0x38 (C) [ 23.964680] dump_stack_lvl+0x8c/0xd0 [ 23.964811] print_report+0x118/0x608 [ 23.964940] kasan_report+0xdc/0x128 [ 23.965079] __asan_report_load4_noabort+0x20/0x30 [ 23.967145] kasan_atomics_helper+0x3dd8/0x4858 [ 23.967408] kasan_atomics+0x198/0x2e0 [ 23.967986] kunit_try_run_case+0x170/0x3f0 [ 23.968217] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.968786] kthread+0x328/0x630 [ 23.968931] ret_from_fork+0x10/0x20 [ 23.969070] [ 23.969326] Allocated by task 275: [ 23.969452] kasan_save_stack+0x3c/0x68 [ 23.970082] kasan_save_track+0x20/0x40 [ 23.970203] kasan_save_alloc_info+0x40/0x58 [ 23.970680] __kasan_kmalloc+0xd4/0xd8 [ 23.970800] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.970907] kasan_atomics+0xb8/0x2e0 [ 23.971512] kunit_try_run_case+0x170/0x3f0 [ 23.971871] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.972224] kthread+0x328/0x630 [ 23.972373] ret_from_fork+0x10/0x20 [ 23.972465] [ 23.972514] The buggy address belongs to the object at fff00000c63eb100 [ 23.972514] which belongs to the cache kmalloc-64 of size 64 [ 23.972939] The buggy address is located 0 bytes to the right of [ 23.972939] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 23.973588] [ 23.973676] The buggy address belongs to the physical page: [ 23.974049] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 23.974300] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.974434] page_type: f5(slab) [ 23.974529] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.974910] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.975476] page dumped because: kasan: bad access detected [ 23.975573] [ 23.975678] Memory state around the buggy address: [ 23.975780] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.976462] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.976607] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.976716] ^ [ 23.977048] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.977568] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.978070] ================================================================== [ 24.199140] ================================================================== [ 24.199309] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 24.199479] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.199648] [ 24.199756] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.200069] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.200185] Hardware name: linux,dummy-virt (DT) [ 24.200293] Call trace: [ 24.200359] show_stack+0x20/0x38 (C) [ 24.200462] dump_stack_lvl+0x8c/0xd0 [ 24.200566] print_report+0x118/0x608 [ 24.200655] kasan_report+0xdc/0x128 [ 24.200739] kasan_check_range+0x100/0x1a8 [ 24.200855] __kasan_check_write+0x20/0x30 [ 24.200979] kasan_atomics_helper+0x14e4/0x4858 [ 24.201107] kasan_atomics+0x198/0x2e0 [ 24.201213] kunit_try_run_case+0x170/0x3f0 [ 24.201376] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.201507] kthread+0x328/0x630 [ 24.201602] ret_from_fork+0x10/0x20 [ 24.201738] [ 24.201792] Allocated by task 275: [ 24.201890] kasan_save_stack+0x3c/0x68 [ 24.201993] kasan_save_track+0x20/0x40 [ 24.202111] kasan_save_alloc_info+0x40/0x58 [ 24.202266] __kasan_kmalloc+0xd4/0xd8 [ 24.203422] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.204111] kasan_atomics+0xb8/0x2e0 [ 24.204218] kunit_try_run_case+0x170/0x3f0 [ 24.204855] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.205383] kthread+0x328/0x630 [ 24.205467] ret_from_fork+0x10/0x20 [ 24.205738] [ 24.205907] The buggy address belongs to the object at fff00000c63eb100 [ 24.205907] which belongs to the cache kmalloc-64 of size 64 [ 24.206336] The buggy address is located 0 bytes to the right of [ 24.206336] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.206491] [ 24.206545] The buggy address belongs to the physical page: [ 24.206652] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.206829] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.206964] page_type: f5(slab) [ 24.207064] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.207187] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.207288] page dumped because: kasan: bad access detected [ 24.207369] [ 24.207436] Memory state around the buggy address: [ 24.207518] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.207630] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.207741] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.207819] ^ [ 24.208471] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.208641] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.208766] ================================================================== [ 24.171968] ================================================================== [ 24.172138] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 24.172289] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.172414] [ 24.172503] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.172734] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.172801] Hardware name: linux,dummy-virt (DT) [ 24.172869] Call trace: [ 24.172927] show_stack+0x20/0x38 (C) [ 24.173058] dump_stack_lvl+0x8c/0xd0 [ 24.173182] print_report+0x118/0x608 [ 24.173309] kasan_report+0xdc/0x128 [ 24.173429] kasan_check_range+0x100/0x1a8 [ 24.173555] __kasan_check_write+0x20/0x30 [ 24.173675] kasan_atomics_helper+0x1384/0x4858 [ 24.173800] kasan_atomics+0x198/0x2e0 [ 24.173919] kunit_try_run_case+0x170/0x3f0 [ 24.174061] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.174210] kthread+0x328/0x630 [ 24.174367] ret_from_fork+0x10/0x20 [ 24.174494] [ 24.174576] Allocated by task 275: [ 24.174671] kasan_save_stack+0x3c/0x68 [ 24.174811] kasan_save_track+0x20/0x40 [ 24.174943] kasan_save_alloc_info+0x40/0x58 [ 24.175099] __kasan_kmalloc+0xd4/0xd8 [ 24.175236] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.175370] kasan_atomics+0xb8/0x2e0 [ 24.175496] kunit_try_run_case+0x170/0x3f0 [ 24.175621] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.175733] kthread+0x328/0x630 [ 24.175812] ret_from_fork+0x10/0x20 [ 24.175897] [ 24.175942] The buggy address belongs to the object at fff00000c63eb100 [ 24.175942] which belongs to the cache kmalloc-64 of size 64 [ 24.176079] The buggy address is located 0 bytes to the right of [ 24.176079] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.176243] [ 24.176296] The buggy address belongs to the physical page: [ 24.176381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.176539] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.176725] page_type: f5(slab) [ 24.176823] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.177005] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.177115] page dumped because: kasan: bad access detected [ 24.177217] [ 24.177267] Memory state around the buggy address: [ 24.177373] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.177491] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.177589] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.177683] ^ [ 24.177776] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.177896] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.177992] ================================================================== [ 24.317777] ================================================================== [ 24.317851] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 24.317921] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.317979] [ 24.318033] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.320181] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.320238] Hardware name: linux,dummy-virt (DT) [ 24.320280] Call trace: [ 24.320314] show_stack+0x20/0x38 (C) [ 24.320382] dump_stack_lvl+0x8c/0xd0 [ 24.320445] print_report+0x118/0x608 [ 24.320503] kasan_report+0xdc/0x128 [ 24.320572] kasan_check_range+0x100/0x1a8 [ 24.320634] __kasan_check_write+0x20/0x30 [ 24.321522] kasan_atomics_helper+0x17ec/0x4858 [ 24.321989] kasan_atomics+0x198/0x2e0 [ 24.322860] kunit_try_run_case+0x170/0x3f0 [ 24.322972] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.323052] kthread+0x328/0x630 [ 24.323109] ret_from_fork+0x10/0x20 [ 24.323169] [ 24.324074] Allocated by task 275: [ 24.324140] kasan_save_stack+0x3c/0x68 [ 24.324202] kasan_save_track+0x20/0x40 [ 24.324248] kasan_save_alloc_info+0x40/0x58 [ 24.324297] __kasan_kmalloc+0xd4/0xd8 [ 24.324340] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.324385] kasan_atomics+0xb8/0x2e0 [ 24.325693] kunit_try_run_case+0x170/0x3f0 [ 24.326075] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.326502] kthread+0x328/0x630 [ 24.326633] ret_from_fork+0x10/0x20 [ 24.326694] [ 24.327153] The buggy address belongs to the object at fff00000c63eb100 [ 24.327153] which belongs to the cache kmalloc-64 of size 64 [ 24.327512] The buggy address is located 0 bytes to the right of [ 24.327512] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.327656] [ 24.327685] The buggy address belongs to the physical page: [ 24.327721] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.327779] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.327834] page_type: f5(slab) [ 24.327881] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.329181] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.329256] page dumped because: kasan: bad access detected [ 24.329299] [ 24.329323] Memory state around the buggy address: [ 24.329365] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.330388] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.330513] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.330563] ^ [ 24.330605] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.330953] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.331216] ================================================================== [ 24.267062] ================================================================== [ 24.267139] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 24.267211] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.268554] [ 24.268761] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.269057] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.269098] Hardware name: linux,dummy-virt (DT) [ 24.269137] Call trace: [ 24.269168] show_stack+0x20/0x38 (C) [ 24.269236] dump_stack_lvl+0x8c/0xd0 [ 24.269295] print_report+0x118/0x608 [ 24.269350] kasan_report+0xdc/0x128 [ 24.269404] kasan_check_range+0x100/0x1a8 [ 24.269461] __kasan_check_write+0x20/0x30 [ 24.269514] kasan_atomics_helper+0x16d0/0x4858 [ 24.269570] kasan_atomics+0x198/0x2e0 [ 24.269620] kunit_try_run_case+0x170/0x3f0 [ 24.269677] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.269735] kthread+0x328/0x630 [ 24.269783] ret_from_fork+0x10/0x20 [ 24.269840] [ 24.269865] Allocated by task 275: [ 24.269900] kasan_save_stack+0x3c/0x68 [ 24.269950] kasan_save_track+0x20/0x40 [ 24.270008] kasan_save_alloc_info+0x40/0x58 [ 24.273391] __kasan_kmalloc+0xd4/0xd8 [ 24.273496] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.273556] kasan_atomics+0xb8/0x2e0 [ 24.274063] kunit_try_run_case+0x170/0x3f0 [ 24.274366] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.274455] kthread+0x328/0x630 [ 24.274495] ret_from_fork+0x10/0x20 [ 24.274539] [ 24.274569] The buggy address belongs to the object at fff00000c63eb100 [ 24.274569] which belongs to the cache kmalloc-64 of size 64 [ 24.275237] The buggy address is located 0 bytes to the right of [ 24.275237] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.275359] [ 24.275387] The buggy address belongs to the physical page: [ 24.275425] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.275483] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.275540] page_type: f5(slab) [ 24.275587] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.275645] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.275692] page dumped because: kasan: bad access detected [ 24.275730] [ 24.275752] Memory state around the buggy address: [ 24.277153] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.277374] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.277670] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.277918] ^ [ 24.277966] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.278026] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.278538] ================================================================== [ 24.307182] ================================================================== [ 24.307259] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 24.307328] Read of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.307383] [ 24.307428] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.307525] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.307557] Hardware name: linux,dummy-virt (DT) [ 24.307595] Call trace: [ 24.307622] show_stack+0x20/0x38 (C) [ 24.307680] dump_stack_lvl+0x8c/0xd0 [ 24.307734] print_report+0x118/0x608 [ 24.307786] kasan_report+0xdc/0x128 [ 24.307837] __asan_report_load8_noabort+0x20/0x30 [ 24.307893] kasan_atomics_helper+0x3e20/0x4858 [ 24.307946] kasan_atomics+0x198/0x2e0 [ 24.307999] kunit_try_run_case+0x170/0x3f0 [ 24.308074] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.308137] kthread+0x328/0x630 [ 24.308187] ret_from_fork+0x10/0x20 [ 24.308244] [ 24.308267] Allocated by task 275: [ 24.308302] kasan_save_stack+0x3c/0x68 [ 24.308353] kasan_save_track+0x20/0x40 [ 24.308398] kasan_save_alloc_info+0x40/0x58 [ 24.308446] __kasan_kmalloc+0xd4/0xd8 [ 24.308489] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.308544] kasan_atomics+0xb8/0x2e0 [ 24.308593] kunit_try_run_case+0x170/0x3f0 [ 24.308637] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.308688] kthread+0x328/0x630 [ 24.308726] ret_from_fork+0x10/0x20 [ 24.308768] [ 24.308793] The buggy address belongs to the object at fff00000c63eb100 [ 24.308793] which belongs to the cache kmalloc-64 of size 64 [ 24.308862] The buggy address is located 0 bytes to the right of [ 24.308862] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.308933] [ 24.308958] The buggy address belongs to the physical page: [ 24.308992] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.314004] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.314432] page_type: f5(slab) [ 24.314746] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.314807] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.314855] page dumped because: kasan: bad access detected [ 24.314893] [ 24.314914] Memory state around the buggy address: [ 24.314952] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.315001] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.315068] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.315967] ^ [ 24.316094] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.316254] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.316300] ================================================================== [ 23.750966] ================================================================== [ 23.751104] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 23.751479] Write of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 23.752313] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.753591] dump_stack_lvl+0x8c/0xd0 [ 23.754703] kasan_atomics+0x198/0x2e0 [ 23.756292] [ 23.756495] kasan_save_track+0x20/0x40 [ 23.756911] kasan_atomics+0xb8/0x2e0 [ 23.757114] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.757313] ret_from_fork+0x10/0x20 [ 23.759077] The buggy address is located 0 bytes to the right of [ 23.759077] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 23.762695] ^ [ 23.762869] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.763176] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.765377] ================================================================== [ 24.134955] ================================================================== [ 24.135074] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 24.135187] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.135308] [ 24.135436] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.135691] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.135802] Hardware name: linux,dummy-virt (DT) [ 24.136005] Call trace: [ 24.136262] show_stack+0x20/0x38 (C) [ 24.136626] dump_stack_lvl+0x8c/0xd0 [ 24.136793] print_report+0x118/0x608 [ 24.136946] kasan_report+0xdc/0x128 [ 24.137112] kasan_check_range+0x100/0x1a8 [ 24.137278] __kasan_check_write+0x20/0x30 [ 24.137394] kasan_atomics_helper+0x1190/0x4858 [ 24.137513] kasan_atomics+0x198/0x2e0 [ 24.137728] kunit_try_run_case+0x170/0x3f0 [ 24.138007] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.138314] kthread+0x328/0x630 [ 24.138430] ret_from_fork+0x10/0x20 [ 24.138545] [ 24.138595] Allocated by task 275: [ 24.138670] kasan_save_stack+0x3c/0x68 [ 24.138779] kasan_save_track+0x20/0x40 [ 24.138874] kasan_save_alloc_info+0x40/0x58 [ 24.138962] __kasan_kmalloc+0xd4/0xd8 [ 24.139051] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.139142] kasan_atomics+0xb8/0x2e0 [ 24.139226] kunit_try_run_case+0x170/0x3f0 [ 24.139318] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.139431] kthread+0x328/0x630 [ 24.139512] ret_from_fork+0x10/0x20 [ 24.139599] [ 24.139654] The buggy address belongs to the object at fff00000c63eb100 [ 24.139654] which belongs to the cache kmalloc-64 of size 64 [ 24.139793] The buggy address is located 0 bytes to the right of [ 24.139793] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.139952] [ 24.140011] The buggy address belongs to the physical page: [ 24.140360] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.140959] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.141146] page_type: f5(slab) [ 24.141256] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.141675] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.141818] page dumped because: kasan: bad access detected [ 24.141904] [ 24.141952] Memory state around the buggy address: [ 24.142046] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.142156] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.142267] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.142369] ^ [ 24.142452] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.142546] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.142646] ================================================================== [ 23.992947] ================================================================== [ 23.993064] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 23.993185] Read of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 23.993300] [ 23.993382] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 23.993590] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.993665] Hardware name: linux,dummy-virt (DT) [ 23.993743] Call trace: [ 23.993797] show_stack+0x20/0x38 (C) [ 23.993912] dump_stack_lvl+0x8c/0xd0 [ 23.994027] print_report+0x118/0x608 [ 23.994172] kasan_report+0xdc/0x128 [ 23.994276] __asan_report_load4_noabort+0x20/0x30 [ 23.994722] kasan_atomics_helper+0x3e04/0x4858 [ 23.994878] kasan_atomics+0x198/0x2e0 [ 23.994980] kunit_try_run_case+0x170/0x3f0 [ 23.995104] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.995238] kthread+0x328/0x630 [ 23.995373] ret_from_fork+0x10/0x20 [ 23.995515] [ 23.995577] Allocated by task 275: [ 23.995681] kasan_save_stack+0x3c/0x68 [ 23.995787] kasan_save_track+0x20/0x40 [ 23.995910] kasan_save_alloc_info+0x40/0x58 [ 23.996047] __kasan_kmalloc+0xd4/0xd8 [ 23.996135] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.996239] kasan_atomics+0xb8/0x2e0 [ 23.996327] kunit_try_run_case+0x170/0x3f0 [ 23.996417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.996576] kthread+0x328/0x630 [ 23.996708] ret_from_fork+0x10/0x20 [ 23.996826] [ 23.996897] The buggy address belongs to the object at fff00000c63eb100 [ 23.996897] which belongs to the cache kmalloc-64 of size 64 [ 23.997106] The buggy address is located 0 bytes to the right of [ 23.997106] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 23.997531] [ 23.997632] The buggy address belongs to the physical page: [ 23.997958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 23.998148] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.998300] page_type: f5(slab) [ 23.998399] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.998537] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.998680] page dumped because: kasan: bad access detected [ 23.998782] [ 23.998826] Memory state around the buggy address: [ 23.998919] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.999037] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.999148] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.999254] ^ [ 23.999349] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.999435] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.999534] ================================================================== [ 24.028947] ================================================================== [ 24.029136] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 24.029260] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.029609] [ 24.029838] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.030600] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.030977] Hardware name: linux,dummy-virt (DT) [ 24.031342] Call trace: [ 24.031537] show_stack+0x20/0x38 (C) [ 24.031892] dump_stack_lvl+0x8c/0xd0 [ 24.032418] print_report+0x118/0x608 [ 24.032827] kasan_report+0xdc/0x128 [ 24.033290] __asan_report_store8_noabort+0x20/0x30 [ 24.033684] kasan_atomics_helper+0x3e5c/0x4858 [ 24.034268] kasan_atomics+0x198/0x2e0 [ 24.034567] kunit_try_run_case+0x170/0x3f0 [ 24.034784] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.035416] kthread+0x328/0x630 [ 24.035603] ret_from_fork+0x10/0x20 [ 24.036250] [ 24.036409] Allocated by task 275: [ 24.036706] kasan_save_stack+0x3c/0x68 [ 24.037216] kasan_save_track+0x20/0x40 [ 24.037511] kasan_save_alloc_info+0x40/0x58 [ 24.038084] __kasan_kmalloc+0xd4/0xd8 [ 24.038415] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.038850] kasan_atomics+0xb8/0x2e0 [ 24.039056] kunit_try_run_case+0x170/0x3f0 [ 24.039169] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.039279] kthread+0x328/0x630 [ 24.039364] ret_from_fork+0x10/0x20 [ 24.039461] [ 24.040231] The buggy address belongs to the object at fff00000c63eb100 [ 24.040231] which belongs to the cache kmalloc-64 of size 64 [ 24.041318] The buggy address is located 0 bytes to the right of [ 24.041318] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.041710] [ 24.041783] The buggy address belongs to the physical page: [ 24.041955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.042296] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.042437] page_type: f5(slab) [ 24.042842] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.043298] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.043813] page dumped because: kasan: bad access detected [ 24.043921] [ 24.044095] Memory state around the buggy address: [ 24.044194] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.044789] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.044922] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.045110] ^ [ 24.045237] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.045349] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.045677] ================================================================== [ 24.056578] ================================================================== [ 24.056701] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 24.056819] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.056945] [ 24.057040] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.057269] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.057348] Hardware name: linux,dummy-virt (DT) [ 24.057436] Call trace: [ 24.057496] show_stack+0x20/0x38 (C) [ 24.057620] dump_stack_lvl+0x8c/0xd0 [ 24.057742] print_report+0x118/0x608 [ 24.057864] kasan_report+0xdc/0x128 [ 24.057977] kasan_check_range+0x100/0x1a8 [ 24.059587] __kasan_check_write+0x20/0x30 [ 24.059800] kasan_atomics_helper+0xf20/0x4858 [ 24.060137] kasan_atomics+0x198/0x2e0 [ 24.060341] kunit_try_run_case+0x170/0x3f0 [ 24.060474] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.060626] kthread+0x328/0x630 [ 24.060736] ret_from_fork+0x10/0x20 [ 24.060915] [ 24.061007] Allocated by task 275: [ 24.061166] kasan_save_stack+0x3c/0x68 [ 24.061550] kasan_save_track+0x20/0x40 [ 24.061678] kasan_save_alloc_info+0x40/0x58 [ 24.061879] __kasan_kmalloc+0xd4/0xd8 [ 24.062172] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.062296] kasan_atomics+0xb8/0x2e0 [ 24.062433] kunit_try_run_case+0x170/0x3f0 [ 24.062774] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.062927] kthread+0x328/0x630 [ 24.063075] ret_from_fork+0x10/0x20 [ 24.063201] [ 24.063288] The buggy address belongs to the object at fff00000c63eb100 [ 24.063288] which belongs to the cache kmalloc-64 of size 64 [ 24.063638] The buggy address is located 0 bytes to the right of [ 24.063638] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.063828] [ 24.063882] The buggy address belongs to the physical page: [ 24.063924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.063990] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.064099] page_type: f5(slab) [ 24.064200] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.064368] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.064622] page dumped because: kasan: bad access detected [ 24.064713] [ 24.064775] Memory state around the buggy address: [ 24.064864] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.065278] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.065420] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.065567] ^ [ 24.065651] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.065751] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.066146] ================================================================== [ 23.858731] ================================================================== [ 23.859107] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 23.859488] Write of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 23.859624] [ 23.859706] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 23.859915] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.859997] Hardware name: linux,dummy-virt (DT) [ 23.860089] Call trace: [ 23.860150] show_stack+0x20/0x38 (C) [ 23.860272] dump_stack_lvl+0x8c/0xd0 [ 23.860398] print_report+0x118/0x608 [ 23.860520] kasan_report+0xdc/0x128 [ 23.860660] kasan_check_range+0x100/0x1a8 [ 23.860788] __kasan_check_write+0x20/0x30 [ 23.860908] kasan_atomics_helper+0xad4/0x4858 [ 23.862793] kasan_atomics+0x198/0x2e0 [ 23.863764] kunit_try_run_case+0x170/0x3f0 [ 23.863996] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.864164] kthread+0x328/0x630 [ 23.864269] ret_from_fork+0x10/0x20 [ 23.864407] [ 23.864456] Allocated by task 275: [ 23.864524] kasan_save_stack+0x3c/0x68 [ 23.864644] kasan_save_track+0x20/0x40 [ 23.864747] kasan_save_alloc_info+0x40/0x58 [ 23.864874] __kasan_kmalloc+0xd4/0xd8 [ 23.864988] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.865111] kasan_atomics+0xb8/0x2e0 [ 23.865223] kunit_try_run_case+0x170/0x3f0 [ 23.865328] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.865441] kthread+0x328/0x630 [ 23.865525] ret_from_fork+0x10/0x20 [ 23.865618] [ 23.865682] The buggy address belongs to the object at fff00000c63eb100 [ 23.865682] which belongs to the cache kmalloc-64 of size 64 [ 23.865824] The buggy address is located 0 bytes to the right of [ 23.865824] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 23.865974] [ 23.866222] The buggy address belongs to the physical page: [ 23.866478] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 23.867099] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.867532] page_type: f5(slab) [ 23.867636] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.868071] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.868364] page dumped because: kasan: bad access detected [ 23.868606] [ 23.868668] Memory state around the buggy address: [ 23.868761] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.869196] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.869380] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.869475] ^ [ 23.869933] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.870102] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.870376] ================================================================== [ 24.165101] ================================================================== [ 24.165218] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 24.165339] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.165464] [ 24.165556] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.165783] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.165861] Hardware name: linux,dummy-virt (DT) [ 24.165943] Call trace: [ 24.166006] show_stack+0x20/0x38 (C) [ 24.166139] dump_stack_lvl+0x8c/0xd0 [ 24.166251] print_report+0x118/0x608 [ 24.166414] kasan_report+0xdc/0x128 [ 24.166545] kasan_check_range+0x100/0x1a8 [ 24.166676] __kasan_check_write+0x20/0x30 [ 24.166805] kasan_atomics_helper+0x12d8/0x4858 [ 24.166961] kasan_atomics+0x198/0x2e0 [ 24.167175] kunit_try_run_case+0x170/0x3f0 [ 24.167307] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.167459] kthread+0x328/0x630 [ 24.167560] ret_from_fork+0x10/0x20 [ 24.167709] [ 24.167776] Allocated by task 275: [ 24.167848] kasan_save_stack+0x3c/0x68 [ 24.167933] kasan_save_track+0x20/0x40 [ 24.168036] kasan_save_alloc_info+0x40/0x58 [ 24.168127] __kasan_kmalloc+0xd4/0xd8 [ 24.168212] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.168365] kasan_atomics+0xb8/0x2e0 [ 24.168491] kunit_try_run_case+0x170/0x3f0 [ 24.168603] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.168723] kthread+0x328/0x630 [ 24.168844] ret_from_fork+0x10/0x20 [ 24.168929] [ 24.168984] The buggy address belongs to the object at fff00000c63eb100 [ 24.168984] which belongs to the cache kmalloc-64 of size 64 [ 24.169168] The buggy address is located 0 bytes to the right of [ 24.169168] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.169377] [ 24.169452] The buggy address belongs to the physical page: [ 24.169554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.169728] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.169894] page_type: f5(slab) [ 24.169988] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.170112] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.170259] page dumped because: kasan: bad access detected [ 24.170342] [ 24.170406] Memory state around the buggy address: [ 24.170497] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.170618] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.170729] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.170862] ^ [ 24.171010] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.171151] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.171277] ================================================================== [ 24.143422] ================================================================== [ 24.143551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 24.143668] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.143791] [ 24.143877] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.144094] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.144177] Hardware name: linux,dummy-virt (DT) [ 24.144262] Call trace: [ 24.144325] show_stack+0x20/0x38 (C) [ 24.144449] dump_stack_lvl+0x8c/0xd0 [ 24.144585] print_report+0x118/0x608 [ 24.144715] kasan_report+0xdc/0x128 [ 24.144835] kasan_check_range+0x100/0x1a8 [ 24.144961] __kasan_check_write+0x20/0x30 [ 24.145089] kasan_atomics_helper+0x11f8/0x4858 [ 24.145206] kasan_atomics+0x198/0x2e0 [ 24.145333] kunit_try_run_case+0x170/0x3f0 [ 24.145460] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.145993] kthread+0x328/0x630 [ 24.146490] ret_from_fork+0x10/0x20 [ 24.146804] [ 24.146879] Allocated by task 275: [ 24.146955] kasan_save_stack+0x3c/0x68 [ 24.147071] kasan_save_track+0x20/0x40 [ 24.147169] kasan_save_alloc_info+0x40/0x58 [ 24.147501] __kasan_kmalloc+0xd4/0xd8 [ 24.147603] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.147725] kasan_atomics+0xb8/0x2e0 [ 24.147923] kunit_try_run_case+0x170/0x3f0 [ 24.148103] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.148273] kthread+0x328/0x630 [ 24.148400] ret_from_fork+0x10/0x20 [ 24.148537] [ 24.148631] The buggy address belongs to the object at fff00000c63eb100 [ 24.148631] which belongs to the cache kmalloc-64 of size 64 [ 24.148841] The buggy address is located 0 bytes to the right of [ 24.148841] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.149014] [ 24.149093] The buggy address belongs to the physical page: [ 24.149212] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.149344] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.149476] page_type: f5(slab) [ 24.149592] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.149725] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.149875] page dumped because: kasan: bad access detected [ 24.149960] [ 24.150069] Memory state around the buggy address: [ 24.150146] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.151248] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.151405] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.151587] ^ [ 24.151661] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.151748] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.151838] ================================================================== [ 24.184783] ================================================================== [ 24.184894] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 24.185011] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.185150] [ 24.185236] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.185461] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.185540] Hardware name: linux,dummy-virt (DT) [ 24.185620] Call trace: [ 24.185680] show_stack+0x20/0x38 (C) [ 24.185804] dump_stack_lvl+0x8c/0xd0 [ 24.185926] print_report+0x118/0x608 [ 24.186063] kasan_report+0xdc/0x128 [ 24.186169] kasan_check_range+0x100/0x1a8 [ 24.186369] __kasan_check_write+0x20/0x30 [ 24.186500] kasan_atomics_helper+0x1414/0x4858 [ 24.186631] kasan_atomics+0x198/0x2e0 [ 24.186737] kunit_try_run_case+0x170/0x3f0 [ 24.186870] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.186989] kthread+0x328/0x630 [ 24.187193] ret_from_fork+0x10/0x20 [ 24.187335] [ 24.187381] Allocated by task 275: [ 24.187440] kasan_save_stack+0x3c/0x68 [ 24.187558] kasan_save_track+0x20/0x40 [ 24.187655] kasan_save_alloc_info+0x40/0x58 [ 24.187752] __kasan_kmalloc+0xd4/0xd8 [ 24.187866] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.187967] kasan_atomics+0xb8/0x2e0 [ 24.188062] kunit_try_run_case+0x170/0x3f0 [ 24.188163] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.188279] kthread+0x328/0x630 [ 24.188384] ret_from_fork+0x10/0x20 [ 24.188489] [ 24.188553] The buggy address belongs to the object at fff00000c63eb100 [ 24.188553] which belongs to the cache kmalloc-64 of size 64 [ 24.188723] The buggy address is located 0 bytes to the right of [ 24.188723] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.188922] [ 24.188978] The buggy address belongs to the physical page: [ 24.189067] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.189201] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.189325] page_type: f5(slab) [ 24.189416] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.189541] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.189652] page dumped because: kasan: bad access detected [ 24.189741] [ 24.189789] Memory state around the buggy address: [ 24.189873] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.189987] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.190126] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.190224] ^ [ 24.190347] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.190472] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.190575] ================================================================== [ 23.978982] ================================================================== [ 23.979185] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 23.979336] Write of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 23.979470] [ 23.979854] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 23.980559] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.981012] Hardware name: linux,dummy-virt (DT) [ 23.981136] Call trace: [ 23.981222] show_stack+0x20/0x38 (C) [ 23.981362] dump_stack_lvl+0x8c/0xd0 [ 23.981493] print_report+0x118/0x608 [ 23.982405] kasan_report+0xdc/0x128 [ 23.982686] kasan_check_range+0x100/0x1a8 [ 23.983232] __kasan_check_write+0x20/0x30 [ 23.983399] kasan_atomics_helper+0xd3c/0x4858 [ 23.983856] kasan_atomics+0x198/0x2e0 [ 23.984229] kunit_try_run_case+0x170/0x3f0 [ 23.984380] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.985075] kthread+0x328/0x630 [ 23.985446] ret_from_fork+0x10/0x20 [ 23.985589] [ 23.985637] Allocated by task 275: [ 23.986141] kasan_save_stack+0x3c/0x68 [ 23.986298] kasan_save_track+0x20/0x40 [ 23.986398] kasan_save_alloc_info+0x40/0x58 [ 23.986491] __kasan_kmalloc+0xd4/0xd8 [ 23.986569] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.986647] kasan_atomics+0xb8/0x2e0 [ 23.986724] kunit_try_run_case+0x170/0x3f0 [ 23.987579] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.987729] kthread+0x328/0x630 [ 23.987813] ret_from_fork+0x10/0x20 [ 23.988159] [ 23.988216] The buggy address belongs to the object at fff00000c63eb100 [ 23.988216] which belongs to the cache kmalloc-64 of size 64 [ 23.988805] The buggy address is located 0 bytes to the right of [ 23.988805] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 23.989306] [ 23.989438] The buggy address belongs to the physical page: [ 23.989524] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 23.989745] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.989865] page_type: f5(slab) [ 23.990665] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.990833] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.991026] page dumped because: kasan: bad access detected [ 23.991154] [ 23.991215] Memory state around the buggy address: [ 23.991293] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.991388] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.991481] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.991569] ^ [ 23.992268] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.992383] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.992436] ================================================================== [ 24.020936] ================================================================== [ 24.021292] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 24.021431] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.021564] [ 24.021652] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.021870] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.021955] Hardware name: linux,dummy-virt (DT) [ 24.022054] Call trace: [ 24.022393] show_stack+0x20/0x38 (C) [ 24.022567] dump_stack_lvl+0x8c/0xd0 [ 24.022698] print_report+0x118/0x608 [ 24.022824] kasan_report+0xdc/0x128 [ 24.022952] kasan_check_range+0x100/0x1a8 [ 24.023075] __kasan_check_write+0x20/0x30 [ 24.023178] kasan_atomics_helper+0xe44/0x4858 [ 24.023297] kasan_atomics+0x198/0x2e0 [ 24.023406] kunit_try_run_case+0x170/0x3f0 [ 24.023524] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.023654] kthread+0x328/0x630 [ 24.023756] ret_from_fork+0x10/0x20 [ 24.023873] [ 24.023928] Allocated by task 275: [ 24.023999] kasan_save_stack+0x3c/0x68 [ 24.024115] kasan_save_track+0x20/0x40 [ 24.024216] kasan_save_alloc_info+0x40/0x58 [ 24.024322] __kasan_kmalloc+0xd4/0xd8 [ 24.024419] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.024524] kasan_atomics+0xb8/0x2e0 [ 24.024632] kunit_try_run_case+0x170/0x3f0 [ 24.024730] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.024840] kthread+0x328/0x630 [ 24.024922] ret_from_fork+0x10/0x20 [ 24.025010] [ 24.025070] The buggy address belongs to the object at fff00000c63eb100 [ 24.025070] which belongs to the cache kmalloc-64 of size 64 [ 24.025208] The buggy address is located 0 bytes to the right of [ 24.025208] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.026143] [ 24.026233] The buggy address belongs to the physical page: [ 24.026312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.026432] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.026776] page_type: f5(slab) [ 24.026878] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.026994] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.027103] page dumped because: kasan: bad access detected [ 24.027376] [ 24.027424] Memory state around the buggy address: [ 24.027503] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.027606] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.027714] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.027811] ^ [ 24.027895] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.028004] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.028107] ================================================================== [ 23.818953] ================================================================== [ 23.819120] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 23.819252] Read of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 23.819393] [ 23.819495] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 23.819673] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.819738] Hardware name: linux,dummy-virt (DT) [ 23.819799] Call trace: [ 23.819845] show_stack+0x20/0x38 (C) [ 23.819953] dump_stack_lvl+0x8c/0xd0 [ 23.820072] print_report+0x118/0x608 [ 23.820215] kasan_report+0xdc/0x128 [ 23.820344] __asan_report_load4_noabort+0x20/0x30 [ 23.820485] kasan_atomics_helper+0x42d8/0x4858 [ 23.820644] kasan_atomics+0x198/0x2e0 [ 23.820777] kunit_try_run_case+0x170/0x3f0 [ 23.820886] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.820998] kthread+0x328/0x630 [ 23.821108] ret_from_fork+0x10/0x20 [ 23.821220] [ 23.821283] Allocated by task 275: [ 23.821362] kasan_save_stack+0x3c/0x68 [ 23.821485] kasan_save_track+0x20/0x40 [ 23.821579] kasan_save_alloc_info+0x40/0x58 [ 23.821668] __kasan_kmalloc+0xd4/0xd8 [ 23.821760] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.821850] kasan_atomics+0xb8/0x2e0 [ 23.821926] kunit_try_run_case+0x170/0x3f0 [ 23.822025] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.822141] kthread+0x328/0x630 [ 23.822219] ret_from_fork+0x10/0x20 [ 23.822303] [ 23.822350] The buggy address belongs to the object at fff00000c63eb100 [ 23.822350] which belongs to the cache kmalloc-64 of size 64 [ 23.822490] The buggy address is located 0 bytes to the right of [ 23.822490] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 23.822672] [ 23.822728] The buggy address belongs to the physical page: [ 23.822796] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 23.822914] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.823015] page_type: f5(slab) [ 23.823114] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.823244] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.823388] page dumped because: kasan: bad access detected [ 23.823544] [ 23.823593] Memory state around the buggy address: [ 23.823690] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.823833] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.823922] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.824000] ^ [ 23.824106] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.824202] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.824280] ================================================================== [ 23.796407] ================================================================== [ 23.796537] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 23.797208] Call trace: [ 23.798582] kasan_atomics_helper+0x7cc/0x4858 [ 23.799304] Allocated by task 275: [ 23.800593] kthread+0x328/0x630 [ 23.801384] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 23.801505] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.801834] page_type: f5(slab) [ 23.801924] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.802135] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.802235] page dumped because: kasan: bad access detected [ 23.802324] [ 23.802370] Memory state around the buggy address: [ 23.802501] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.802944] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.803594] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.803998] ================================================================== [ 23.846438] ================================================================== [ 23.846560] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 23.846773] Write of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 23.846955] [ 23.847050] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 23.847277] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.847351] Hardware name: linux,dummy-virt (DT) [ 23.847425] Call trace: [ 23.847476] show_stack+0x20/0x38 (C) [ 23.847567] dump_stack_lvl+0x8c/0xd0 [ 23.847662] print_report+0x118/0x608 [ 23.847764] kasan_report+0xdc/0x128 [ 23.847875] kasan_check_range+0x100/0x1a8 [ 23.848455] __kasan_check_write+0x20/0x30 [ 23.848982] kasan_atomics_helper+0xa6c/0x4858 [ 23.849475] kasan_atomics+0x198/0x2e0 [ 23.849618] kunit_try_run_case+0x170/0x3f0 [ 23.849739] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.849992] kthread+0x328/0x630 [ 23.851002] ret_from_fork+0x10/0x20 [ 23.851183] [ 23.851238] Allocated by task 275: [ 23.851381] kasan_save_stack+0x3c/0x68 [ 23.851482] kasan_save_track+0x20/0x40 [ 23.851576] kasan_save_alloc_info+0x40/0x58 [ 23.851664] __kasan_kmalloc+0xd4/0xd8 [ 23.851750] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.852295] kasan_atomics+0xb8/0x2e0 [ 23.852397] kunit_try_run_case+0x170/0x3f0 [ 23.852897] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.853014] kthread+0x328/0x630 [ 23.853104] ret_from_fork+0x10/0x20 [ 23.853500] [ 23.853553] The buggy address belongs to the object at fff00000c63eb100 [ 23.853553] which belongs to the cache kmalloc-64 of size 64 [ 23.854108] The buggy address is located 0 bytes to the right of [ 23.854108] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 23.854275] [ 23.854326] The buggy address belongs to the physical page: [ 23.854399] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 23.854505] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.854603] page_type: f5(slab) [ 23.854685] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.855251] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.855499] page dumped because: kasan: bad access detected [ 23.855928] [ 23.855985] Memory state around the buggy address: [ 23.856184] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.856385] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.856631] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.856740] ^ [ 23.856829] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.856939] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.857443] ================================================================== [ 24.191205] ================================================================== [ 24.191319] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 24.191432] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.191548] [ 24.191624] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.191835] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.191907] Hardware name: linux,dummy-virt (DT) [ 24.191984] Call trace: [ 24.192053] show_stack+0x20/0x38 (C) [ 24.192175] dump_stack_lvl+0x8c/0xd0 [ 24.192306] print_report+0x118/0x608 [ 24.192472] kasan_report+0xdc/0x128 [ 24.192654] kasan_check_range+0x100/0x1a8 [ 24.192820] __kasan_check_write+0x20/0x30 [ 24.192960] kasan_atomics_helper+0x147c/0x4858 [ 24.193082] kasan_atomics+0x198/0x2e0 [ 24.193192] kunit_try_run_case+0x170/0x3f0 [ 24.193356] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.193520] kthread+0x328/0x630 [ 24.193661] ret_from_fork+0x10/0x20 [ 24.193781] [ 24.193831] Allocated by task 275: [ 24.193906] kasan_save_stack+0x3c/0x68 [ 24.194063] kasan_save_track+0x20/0x40 [ 24.194166] kasan_save_alloc_info+0x40/0x58 [ 24.194279] __kasan_kmalloc+0xd4/0xd8 [ 24.194386] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.194498] kasan_atomics+0xb8/0x2e0 [ 24.194594] kunit_try_run_case+0x170/0x3f0 [ 24.194798] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.195094] kthread+0x328/0x630 [ 24.195409] ret_from_fork+0x10/0x20 [ 24.195588] [ 24.195687] The buggy address belongs to the object at fff00000c63eb100 [ 24.195687] which belongs to the cache kmalloc-64 of size 64 [ 24.195836] The buggy address is located 0 bytes to the right of [ 24.195836] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.195997] [ 24.196058] The buggy address belongs to the physical page: [ 24.196133] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.196557] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.196709] page_type: f5(slab) [ 24.197104] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.197519] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.197672] page dumped because: kasan: bad access detected [ 24.197771] [ 24.197922] Memory state around the buggy address: [ 24.198093] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.198197] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.198276] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.198320] ^ [ 24.198360] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.198433] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.198518] ================================================================== [ 24.220781] ================================================================== [ 24.220937] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 24.221044] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.221126] [ 24.221388] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.221500] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.221537] Hardware name: linux,dummy-virt (DT) [ 24.221578] Call trace: [ 24.221609] show_stack+0x20/0x38 (C) [ 24.222120] dump_stack_lvl+0x8c/0xd0 [ 24.222207] print_report+0x118/0x608 [ 24.222288] kasan_report+0xdc/0x128 [ 24.222418] kasan_check_range+0x100/0x1a8 [ 24.222480] __kasan_check_write+0x20/0x30 [ 24.222536] kasan_atomics_helper+0x15b4/0x4858 [ 24.223253] kasan_atomics+0x198/0x2e0 [ 24.224034] kunit_try_run_case+0x170/0x3f0 [ 24.224149] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.224218] kthread+0x328/0x630 [ 24.224269] ret_from_fork+0x10/0x20 [ 24.224333] [ 24.224358] Allocated by task 275: [ 24.224396] kasan_save_stack+0x3c/0x68 [ 24.224451] kasan_save_track+0x20/0x40 [ 24.224498] kasan_save_alloc_info+0x40/0x58 [ 24.224571] __kasan_kmalloc+0xd4/0xd8 [ 24.224621] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.224669] kasan_atomics+0xb8/0x2e0 [ 24.225689] kunit_try_run_case+0x170/0x3f0 [ 24.226052] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.226171] kthread+0x328/0x630 [ 24.226345] ret_from_fork+0x10/0x20 [ 24.226434] [ 24.226465] The buggy address belongs to the object at fff00000c63eb100 [ 24.226465] which belongs to the cache kmalloc-64 of size 64 [ 24.226692] The buggy address is located 0 bytes to the right of [ 24.226692] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.226777] [ 24.226930] The buggy address belongs to the physical page: [ 24.227001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.227800] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.227964] page_type: f5(slab) [ 24.228016] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.228389] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.228721] page dumped because: kasan: bad access detected [ 24.228776] [ 24.228801] Memory state around the buggy address: [ 24.228995] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.229177] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.229230] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.229453] ^ [ 24.229504] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.229655] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.229705] ================================================================== [ 24.125068] ================================================================== [ 24.125229] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 24.125373] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.125482] [ 24.125570] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.125743] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.125807] Hardware name: linux,dummy-virt (DT) [ 24.125882] Call trace: [ 24.125940] show_stack+0x20/0x38 (C) [ 24.126468] dump_stack_lvl+0x8c/0xd0 [ 24.126834] print_report+0x118/0x608 [ 24.127225] kasan_report+0xdc/0x128 [ 24.127530] kasan_check_range+0x100/0x1a8 [ 24.127677] __kasan_check_write+0x20/0x30 [ 24.127782] kasan_atomics_helper+0x1128/0x4858 [ 24.127913] kasan_atomics+0x198/0x2e0 [ 24.128043] kunit_try_run_case+0x170/0x3f0 [ 24.128172] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.128306] kthread+0x328/0x630 [ 24.128409] ret_from_fork+0x10/0x20 [ 24.128542] [ 24.128599] Allocated by task 275: [ 24.128675] kasan_save_stack+0x3c/0x68 [ 24.128774] kasan_save_track+0x20/0x40 [ 24.128867] kasan_save_alloc_info+0x40/0x58 [ 24.129783] __kasan_kmalloc+0xd4/0xd8 [ 24.129910] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.130012] kasan_atomics+0xb8/0x2e0 [ 24.130108] kunit_try_run_case+0x170/0x3f0 [ 24.130207] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.130322] kthread+0x328/0x630 [ 24.130405] ret_from_fork+0x10/0x20 [ 24.130498] [ 24.130557] The buggy address belongs to the object at fff00000c63eb100 [ 24.130557] which belongs to the cache kmalloc-64 of size 64 [ 24.131196] The buggy address is located 0 bytes to the right of [ 24.131196] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.131368] [ 24.131424] The buggy address belongs to the physical page: [ 24.131626] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.131750] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.132042] page_type: f5(slab) [ 24.132154] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.132290] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.132399] page dumped because: kasan: bad access detected [ 24.132487] [ 24.132572] Memory state around the buggy address: [ 24.132708] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.132825] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.132928] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.133034] ^ [ 24.133124] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.133252] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.133390] ================================================================== [ 24.230936] ================================================================== [ 24.231084] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 24.231223] Read of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.231290] [ 24.231372] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.231513] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.231566] Hardware name: linux,dummy-virt (DT) [ 24.231639] Call trace: [ 24.231676] show_stack+0x20/0x38 (C) [ 24.231737] dump_stack_lvl+0x8c/0xd0 [ 24.231795] print_report+0x118/0x608 [ 24.231849] kasan_report+0xdc/0x128 [ 24.231903] __asan_report_load8_noabort+0x20/0x30 [ 24.231962] kasan_atomics_helper+0x3db0/0x4858 [ 24.232030] kasan_atomics+0x198/0x2e0 [ 24.232089] kunit_try_run_case+0x170/0x3f0 [ 24.232145] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.232205] kthread+0x328/0x630 [ 24.232255] ret_from_fork+0x10/0x20 [ 24.232727] [ 24.232913] Allocated by task 275: [ 24.233080] kasan_save_stack+0x3c/0x68 [ 24.233155] kasan_save_track+0x20/0x40 [ 24.233235] kasan_save_alloc_info+0x40/0x58 [ 24.233446] __kasan_kmalloc+0xd4/0xd8 [ 24.233635] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.233845] kasan_atomics+0xb8/0x2e0 [ 24.234064] kunit_try_run_case+0x170/0x3f0 [ 24.234568] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.234628] kthread+0x328/0x630 [ 24.234668] ret_from_fork+0x10/0x20 [ 24.234709] [ 24.234736] The buggy address belongs to the object at fff00000c63eb100 [ 24.234736] which belongs to the cache kmalloc-64 of size 64 [ 24.234801] The buggy address is located 0 bytes to the right of [ 24.234801] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.235476] [ 24.235550] The buggy address belongs to the physical page: [ 24.235599] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.235664] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.235721] page_type: f5(slab) [ 24.235768] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.235825] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.235872] page dumped because: kasan: bad access detected [ 24.236228] [ 24.236471] Memory state around the buggy address: [ 24.236523] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.236591] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.236721] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.236820] ^ [ 24.236935] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.237042] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.237091] ================================================================== [ 24.011859] ================================================================== [ 24.012004] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 24.012172] Read of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.012282] [ 24.012363] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.012627] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.012733] Hardware name: linux,dummy-virt (DT) [ 24.012821] Call trace: [ 24.012892] show_stack+0x20/0x38 (C) [ 24.013078] dump_stack_lvl+0x8c/0xd0 [ 24.013233] print_report+0x118/0x608 [ 24.013391] kasan_report+0xdc/0x128 [ 24.013542] __asan_report_load8_noabort+0x20/0x30 [ 24.013708] kasan_atomics_helper+0x3f58/0x4858 [ 24.013870] kasan_atomics+0x198/0x2e0 [ 24.013979] kunit_try_run_case+0x170/0x3f0 [ 24.014164] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.014314] kthread+0x328/0x630 [ 24.014414] ret_from_fork+0x10/0x20 [ 24.014528] [ 24.014581] Allocated by task 275: [ 24.014657] kasan_save_stack+0x3c/0x68 [ 24.014785] kasan_save_track+0x20/0x40 [ 24.014898] kasan_save_alloc_info+0x40/0x58 [ 24.015004] __kasan_kmalloc+0xd4/0xd8 [ 24.015110] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.015211] kasan_atomics+0xb8/0x2e0 [ 24.015281] kunit_try_run_case+0x170/0x3f0 [ 24.015370] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.015470] kthread+0x328/0x630 [ 24.015527] ret_from_fork+0x10/0x20 [ 24.015602] [ 24.015658] The buggy address belongs to the object at fff00000c63eb100 [ 24.015658] which belongs to the cache kmalloc-64 of size 64 [ 24.015805] The buggy address is located 0 bytes to the right of [ 24.015805] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.015972] [ 24.016059] The buggy address belongs to the physical page: [ 24.016149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.016288] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.016882] page_type: f5(slab) [ 24.017052] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.017232] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.017339] page dumped because: kasan: bad access detected [ 24.017432] [ 24.017848] Memory state around the buggy address: [ 24.017951] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.018420] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.018595] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.018749] ^ [ 24.019256] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.019403] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.019576] ================================================================== [ 24.209305] ================================================================== [ 24.209667] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 24.209814] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.209999] [ 24.210130] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.210372] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.210450] Hardware name: linux,dummy-virt (DT) [ 24.210525] Call trace: [ 24.210573] show_stack+0x20/0x38 (C) [ 24.210669] dump_stack_lvl+0x8c/0xd0 [ 24.210777] print_report+0x118/0x608 [ 24.210880] kasan_report+0xdc/0x128 [ 24.210994] kasan_check_range+0x100/0x1a8 [ 24.211126] __kasan_check_write+0x20/0x30 [ 24.211239] kasan_atomics_helper+0x154c/0x4858 [ 24.211357] kasan_atomics+0x198/0x2e0 [ 24.211542] kunit_try_run_case+0x170/0x3f0 [ 24.211659] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.211792] kthread+0x328/0x630 [ 24.211893] ret_from_fork+0x10/0x20 [ 24.212011] [ 24.212486] Allocated by task 275: [ 24.212701] kasan_save_stack+0x3c/0x68 [ 24.212961] kasan_save_track+0x20/0x40 [ 24.213306] kasan_save_alloc_info+0x40/0x58 [ 24.213440] __kasan_kmalloc+0xd4/0xd8 [ 24.213582] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.213689] kasan_atomics+0xb8/0x2e0 [ 24.214010] kunit_try_run_case+0x170/0x3f0 [ 24.214177] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.214333] kthread+0x328/0x630 [ 24.214450] ret_from_fork+0x10/0x20 [ 24.214779] [ 24.214841] The buggy address belongs to the object at fff00000c63eb100 [ 24.214841] which belongs to the cache kmalloc-64 of size 64 [ 24.214992] The buggy address is located 0 bytes to the right of [ 24.214992] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.215171] [ 24.215225] The buggy address belongs to the physical page: [ 24.215401] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.215537] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.216071] page_type: f5(slab) [ 24.216182] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.216634] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.216751] page dumped because: kasan: bad access detected [ 24.217258] [ 24.217328] Memory state around the buggy address: [ 24.217422] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.217531] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.217644] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.217744] ^ [ 24.218444] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.218580] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.218683] ================================================================== [ 24.000101] ================================================================== [ 24.000211] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 24.000332] Read of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.000453] [ 24.000539] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.000834] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.000931] Hardware name: linux,dummy-virt (DT) [ 24.001040] Call trace: [ 24.001379] show_stack+0x20/0x38 (C) [ 24.001686] dump_stack_lvl+0x8c/0xd0 [ 24.001815] print_report+0x118/0x608 [ 24.001935] kasan_report+0xdc/0x128 [ 24.002807] kasan_check_range+0x100/0x1a8 [ 24.002973] __kasan_check_read+0x20/0x30 [ 24.003088] kasan_atomics_helper+0xdd4/0x4858 [ 24.003204] kasan_atomics+0x198/0x2e0 [ 24.003537] kunit_try_run_case+0x170/0x3f0 [ 24.004152] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.004293] kthread+0x328/0x630 [ 24.004701] ret_from_fork+0x10/0x20 [ 24.004998] [ 24.005360] Allocated by task 275: [ 24.005725] kasan_save_stack+0x3c/0x68 [ 24.005847] kasan_save_track+0x20/0x40 [ 24.005949] kasan_save_alloc_info+0x40/0x58 [ 24.006053] __kasan_kmalloc+0xd4/0xd8 [ 24.006131] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.006219] kasan_atomics+0xb8/0x2e0 [ 24.006307] kunit_try_run_case+0x170/0x3f0 [ 24.006944] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.007432] kthread+0x328/0x630 [ 24.007532] ret_from_fork+0x10/0x20 [ 24.007805] [ 24.007878] The buggy address belongs to the object at fff00000c63eb100 [ 24.007878] which belongs to the cache kmalloc-64 of size 64 [ 24.008170] The buggy address is located 0 bytes to the right of [ 24.008170] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.008316] [ 24.008398] The buggy address belongs to the physical page: [ 24.008475] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.008643] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.008832] page_type: f5(slab) [ 24.008954] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.009096] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.009204] page dumped because: kasan: bad access detected [ 24.009286] [ 24.009338] Memory state around the buggy address: [ 24.009420] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.009573] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.009683] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.009782] ^ [ 24.009907] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.010049] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.010156] ================================================================== [ 24.153442] ================================================================== [ 24.153869] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 24.154205] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.154521] [ 24.154625] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.154855] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.154931] Hardware name: linux,dummy-virt (DT) [ 24.155009] Call trace: [ 24.155592] show_stack+0x20/0x38 (C) [ 24.155750] dump_stack_lvl+0x8c/0xd0 [ 24.155965] print_report+0x118/0x608 [ 24.156196] kasan_report+0xdc/0x128 [ 24.156602] kasan_check_range+0x100/0x1a8 [ 24.156810] __kasan_check_write+0x20/0x30 [ 24.157129] kasan_atomics_helper+0x126c/0x4858 [ 24.157322] kasan_atomics+0x198/0x2e0 [ 24.157439] kunit_try_run_case+0x170/0x3f0 [ 24.157631] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.157781] kthread+0x328/0x630 [ 24.158154] ret_from_fork+0x10/0x20 [ 24.158302] [ 24.158434] Allocated by task 275: [ 24.158616] kasan_save_stack+0x3c/0x68 [ 24.158726] kasan_save_track+0x20/0x40 [ 24.158817] kasan_save_alloc_info+0x40/0x58 [ 24.158908] __kasan_kmalloc+0xd4/0xd8 [ 24.158998] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.159109] kasan_atomics+0xb8/0x2e0 [ 24.159202] kunit_try_run_case+0x170/0x3f0 [ 24.159693] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.159872] kthread+0x328/0x630 [ 24.159994] ret_from_fork+0x10/0x20 [ 24.160213] [ 24.160362] The buggy address belongs to the object at fff00000c63eb100 [ 24.160362] which belongs to the cache kmalloc-64 of size 64 [ 24.160716] The buggy address is located 0 bytes to the right of [ 24.160716] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.161096] [ 24.161193] The buggy address belongs to the physical page: [ 24.161426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.161789] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.161936] page_type: f5(slab) [ 24.162053] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.162185] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.162291] page dumped because: kasan: bad access detected [ 24.162623] [ 24.162711] Memory state around the buggy address: [ 24.162871] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.163344] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.163588] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.163786] ^ [ 24.163965] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.164251] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.164359] ================================================================== [ 23.626665] ================================================================== [ 23.627928] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 23.628861] Call trace: [ 23.629883] kunit_try_run_case+0x170/0x3f0 [ 23.631092] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.631822] The buggy address is located 0 bytes to the right of [ 23.631822] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 23.633149] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.634572] Read of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 23.637084] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.641488] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.645318] dump_stack_lvl+0x8c/0xd0 [ 23.646687] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.650676] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 23.657106] kasan_check_range+0x100/0x1a8 [ 23.659364] kasan_save_stack+0x3c/0x68 [ 23.661668] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.667037] Write of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 23.673179] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.676375] page dumped because: kasan: bad access detected [ 23.680830] [ 23.681663] dump_stack_lvl+0x8c/0xd0 [ 23.684392] kasan_save_stack+0x3c/0x68 [ 23.687127] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.691013] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 23.692715] kasan_atomics_helper+0x414/0x4858 [ 23.694106] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.694374] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.694624] [ 23.695651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 23.698604] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.702283] kasan_report+0xdc/0x128 [ 23.703501] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.704463] __kasan_kmalloc+0xd4/0xd8 [ 23.705685] [ 23.706408] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.707028] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.711308] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 23.712789] dump_stack_lvl+0x8c/0xd0 [ 23.713667] kunit_try_run_case+0x170/0x3f0 [ 23.713781] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.713910] kthread+0x328/0x630 [ 23.714767] kasan_save_track+0x20/0x40 [ 23.716473] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.716843] kthread+0x328/0x630 [ 23.717486] ret_from_fork+0x10/0x20 [ 23.718777] [ 23.721371] page_type: f5(slab) [ 23.722569] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.724608] ^ [ 23.729094] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 23.729760] Hardware name: linux,dummy-virt (DT) [ 23.733683] kasan_atomics+0x198/0x2e0 [ 23.735065] kasan_save_track+0x20/0x40 [ 23.735414] kasan_atomics+0xb8/0x2e0 [ 23.736240] [ 23.736292] The buggy address belongs to the physical page: [ 23.736783] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.737530] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.739450] ================================================================== [ 24.074641] ================================================================== [ 24.074736] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 24.074831] Write of size 8 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 24.074925] [ 24.074989] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 24.075220] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 24.075334] Hardware name: linux,dummy-virt (DT) [ 24.075426] Call trace: [ 24.075560] show_stack+0x20/0x38 (C) [ 24.076886] dump_stack_lvl+0x8c/0xd0 [ 24.077129] print_report+0x118/0x608 [ 24.077698] kasan_report+0xdc/0x128 [ 24.078257] kasan_check_range+0x100/0x1a8 [ 24.078873] __kasan_check_write+0x20/0x30 [ 24.079007] kasan_atomics_helper+0xff0/0x4858 [ 24.079123] kasan_atomics+0x198/0x2e0 [ 24.079220] kunit_try_run_case+0x170/0x3f0 [ 24.079331] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.079585] kthread+0x328/0x630 [ 24.079783] ret_from_fork+0x10/0x20 [ 24.080994] [ 24.081087] Allocated by task 275: [ 24.081174] kasan_save_stack+0x3c/0x68 [ 24.081286] kasan_save_track+0x20/0x40 [ 24.081380] kasan_save_alloc_info+0x40/0x58 [ 24.081488] __kasan_kmalloc+0xd4/0xd8 [ 24.082315] __kmalloc_cache_noprof+0x16c/0x3c0 [ 24.082444] kasan_atomics+0xb8/0x2e0 [ 24.082523] kunit_try_run_case+0x170/0x3f0 [ 24.082601] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.082694] kthread+0x328/0x630 [ 24.082771] ret_from_fork+0x10/0x20 [ 24.083397] [ 24.083499] The buggy address belongs to the object at fff00000c63eb100 [ 24.083499] which belongs to the cache kmalloc-64 of size 64 [ 24.083882] The buggy address is located 0 bytes to the right of [ 24.083882] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 24.084069] [ 24.084148] The buggy address belongs to the physical page: [ 24.084272] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 24.084416] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.084550] page_type: f5(slab) [ 24.084648] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.084781] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 24.084892] page dumped because: kasan: bad access detected [ 24.084981] [ 24.085043] Memory state around the buggy address: [ 24.085436] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.085567] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.086116] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.086491] ^ [ 24.086608] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.087502] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.087716] ================================================================== [ 23.831681] ================================================================== [ 23.831803] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 23.831917] Write of size 4 at addr fff00000c63eb130 by task kunit_try_catch/275 [ 23.832050] [ 23.832138] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 23.832417] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.832490] Hardware name: linux,dummy-virt (DT) [ 23.832617] Call trace: [ 23.832706] show_stack+0x20/0x38 (C) [ 23.832820] dump_stack_lvl+0x8c/0xd0 [ 23.832933] print_report+0x118/0x608 [ 23.833041] kasan_report+0xdc/0x128 [ 23.833142] kasan_check_range+0x100/0x1a8 [ 23.833253] __kasan_check_write+0x20/0x30 [ 23.833359] kasan_atomics_helper+0x99c/0x4858 [ 23.833472] kasan_atomics+0x198/0x2e0 [ 23.833578] kunit_try_run_case+0x170/0x3f0 [ 23.833685] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.833803] kthread+0x328/0x630 [ 23.833904] ret_from_fork+0x10/0x20 [ 23.834012] [ 23.834078] Allocated by task 275: [ 23.834146] kasan_save_stack+0x3c/0x68 [ 23.834235] kasan_save_track+0x20/0x40 [ 23.834319] kasan_save_alloc_info+0x40/0x58 [ 23.834407] __kasan_kmalloc+0xd4/0xd8 [ 23.834494] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.834584] kasan_atomics+0xb8/0x2e0 [ 23.834662] kunit_try_run_case+0x170/0x3f0 [ 23.834746] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.834842] kthread+0x328/0x630 [ 23.834925] ret_from_fork+0x10/0x20 [ 23.835006] [ 23.835129] The buggy address belongs to the object at fff00000c63eb100 [ 23.835129] which belongs to the cache kmalloc-64 of size 64 [ 23.835300] The buggy address is located 0 bytes to the right of [ 23.835300] allocated 48-byte region [fff00000c63eb100, fff00000c63eb130) [ 23.835467] [ 23.835520] The buggy address belongs to the physical page: [ 23.835596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063eb [ 23.835726] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.835850] page_type: f5(slab) [ 23.835947] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.836092] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 23.836216] page dumped because: kasan: bad access detected [ 23.836314] [ 23.836381] Memory state around the buggy address: [ 23.836504] fff00000c63eb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.836627] fff00000c63eb080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.836722] >fff00000c63eb100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.836834] ^ [ 23.836915] fff00000c63eb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.837071] fff00000c63eb200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.837164] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 23.538072] ================================================================== [ 23.539966] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 23.540563] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.540722] Call trace: [ 23.541145] kasan_report+0xdc/0x128 [ 23.541389] kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 23.541752] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.542386] kasan_save_track+0x20/0x40 [ 23.542727] kasan_bitops_generic+0xa0/0x1c8 [ 23.543056] kthread+0x328/0x630 [ 23.543438] The buggy address is located 8 bytes inside of [ 23.543438] allocated 9-byte region [fff00000c60581a0, fff00000c60581a9) [ 23.544198] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.544550] fff00000c6058080: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 23.545054] fff00000c6058280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.547906] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 23.550447] Read of size 8 at addr fff00000c60581a8 by task kunit_try_catch/271 [ 23.551177] [ 23.551427] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 23.551644] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.552224] Hardware name: linux,dummy-virt (DT) [ 23.552614] Call trace: [ 23.553174] show_stack+0x20/0x38 (C) [ 23.553868] dump_stack_lvl+0x8c/0xd0 [ 23.554264] print_report+0x118/0x608 [ 23.554548] __asan_report_load8_noabort+0x20/0x30 [ 23.554772] kasan_bitops_generic+0x11c/0x1c8 [ 23.554881] kunit_try_run_case+0x170/0x3f0 [ 23.554999] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.560288] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.565127] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.603839] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[ 23.361257] ================================================================== [ 23.361688] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 23.362430] Write of size 8 at addr fff00000c60581a8 by task kunit_try_catch/271 [ 23.362603] [ 23.362698] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 23.362899] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.362965] Hardware name: linux,dummy-virt (DT) [ 23.363055] Call trace: [ 23.363112] show_stack+0x20/0x38 (C) [ 23.363513] dump_stack_lvl+0x8c/0xd0 [ 23.364329] print_report+0x118/0x608 [ 23.364881] kasan_report+0xdc/0x128 [ 23.365109] kasan_check_range+0x100/0x1a8 [ 23.365447] __kasan_check_write+0x20/0x30 [ 23.365950] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 23.366637] kasan_bitops_generic+0x110/0x1c8 [ 23.366995] kunit_try_run_case+0x170/0x3f0 [ 23.367174] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.367714] kthread+0x328/0x630 [ 23.368215] ret_from_fork+0x10/0x20 [ 23.368371] [ 23.368739] Allocated by task 271: [ 23.368889] kasan_save_stack+0x3c/0x68 [ 23.369714] kasan_save_track+0x20/0x40 [ 23.369985] kasan_save_alloc_info+0x40/0x58 [ 23.370486] __kasan_kmalloc+0xd4/0xd8 [ 23.370884] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.371237] kasan_bitops_generic+0xa0/0x1c8 [ 23.371361] kunit_try_run_case+0x170/0x3f0 [ 23.371905] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.372467] kthread+0x328/0x630 [ 23.372659] ret_from_fork+0x10/0x20 [ 23.372976] [ 23.373199] The buggy address belongs to the object at fff00000c60581a0 [ 23.373199] which belongs to the cache kmalloc-16 of size 16 [ 23.373750] The buggy address is located 8 bytes inside of [ 23.373750] allocated 9-byte region [fff00000c60581a0, fff00000c60581a9) [ 23.374000] [ 23.375110] The buggy address belongs to the physical page: [ 23.375217] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106058 [ 23.375333] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.375397] page_type: f5(slab) [ 23.375452] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 23.375512] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.375560] page dumped because: kasan: bad access detected [ 23.375598] [ 23.375621] Memory state around the buggy address: [ 23.375664] fff00000c6058080: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 23.375716] fff00000c6058100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.375764] >fff00000c6058180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 23.375808] ^ [ 23.375848] fff00000c6058200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.375896] fff00000c6058280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.375940] ================================================================== [ 23.377153] ================================================================== [ 23.377279] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 23.377414] Read of size 8 at addr fff00000c60581a8 by task kunit_try_catch/271 [ 23.377544] [ 23.377631] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 23.377856] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.377935] Hardware name: linux,dummy-virt (DT) [ 23.378028] Call trace: [ 23.378082] show_stack+0x20/0x38 (C) [ 23.378191] dump_stack_lvl+0x8c/0xd0 [ 23.378316] print_report+0x118/0x608 [ 23.378474] kasan_report+0xdc/0x128 [ 23.378623] __asan_report_load8_noabort+0x20/0x30 [ 23.378875] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 23.379249] kasan_bitops_generic+0x110/0x1c8 [ 23.379545] kunit_try_run_case+0x170/0x3f0 [ 23.379701] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.379861] kthread+0x328/0x630 [ 23.379990] ret_from_fork+0x10/0x20 [ 23.380157] [ 23.380217] Allocated by task 271: [ 23.380294] kasan_save_stack+0x3c/0x68 [ 23.380382] kasan_save_track+0x20/0x40 [ 23.380473] kasan_save_alloc_info+0x40/0x58 [ 23.380786] __kasan_kmalloc+0xd4/0xd8 [ 23.380883] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.380992] kasan_bitops_generic+0xa0/0x1c8 [ 23.381110] kunit_try_run_case+0x170/0x3f0 [ 23.381205] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.381324] kthread+0x328/0x630 [ 23.381427] ret_from_fork+0x10/0x20 [ 23.381559] [ 23.381638] The buggy address belongs to the object at fff00000c60581a0 [ 23.381638] which belongs to the cache kmalloc-16 of size 16 [ 23.381826] The buggy address is located 8 bytes inside of [ 23.381826] allocated 9-byte region [fff00000c60581a0, fff00000c60581a9) [ 23.382039] [ 23.382095] The buggy address belongs to the physical page: [ 23.382180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106058 [ 23.382320] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.382454] page_type: f5(slab) [ 23.382551] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 23.382682] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.382788] page dumped because: kasan: bad access detected [ 23.382873] [ 23.382932] Memory state around the buggy address: [ 23.383075] fff00000c6058080: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 23.383184] fff00000c6058100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.383299] >fff00000c6058180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 23.383958] ^ [ 23.384121] fff00000c6058200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.384246] fff00000c6058280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.384366] ================================================================== [ 23.386913] ================================================================== [ 23.387058] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 23.387179] Write of size 8 at addr fff00000c60581a8 by task kunit_try_catch/271 [ 23.387308] [ 23.387397] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 23.387633] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.387716] Hardware name: linux,dummy-virt (DT) [ 23.387802] Call trace: [ 23.387863] show_stack+0x20/0x38 (C) [ 23.387987] dump_stack_lvl+0x8c/0xd0 [ 23.388159] print_report+0x118/0x608 [ 23.388271] kasan_report+0xdc/0x128 [ 23.388396] kasan_check_range+0x100/0x1a8 [ 23.388751] __kasan_check_write+0x20/0x30 [ 23.389194] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 23.389554] kasan_bitops_generic+0x110/0x1c8 [ 23.389676] kunit_try_run_case+0x170/0x3f0 [ 23.389943] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.390136] kthread+0x328/0x630 [ 23.390246] ret_from_fork+0x10/0x20 [ 23.390702] [ 23.390758] Allocated by task 271: [ 23.390836] kasan_save_stack+0x3c/0x68 [ 23.390945] kasan_save_track+0x20/0x40 [ 23.391058] kasan_save_alloc_info+0x40/0x58 [ 23.391165] __kasan_kmalloc+0xd4/0xd8 [ 23.391244] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.391360] kasan_bitops_generic+0xa0/0x1c8 [ 23.391460] kunit_try_run_case+0x170/0x3f0 [ 23.391858] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.392067] kthread+0x328/0x630 [ 23.392164] ret_from_fork+0x10/0x20 [ 23.392302] [ 23.392355] The buggy address belongs to the object at fff00000c60581a0 [ 23.392355] which belongs to the cache kmalloc-16 of size 16 [ 23.392555] The buggy address is located 8 bytes inside of [ 23.392555] allocated 9-byte region [fff00000c60581a0, fff00000c60581a9) [ 23.392760] [ 23.392838] The buggy address belongs to the physical page: [ 23.392956] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106058 [ 23.393151] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.393276] page_type: f5(slab) [ 23.393431] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 23.393584] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.393736] page dumped because: kasan: bad access detected [ 23.393837] [ 23.393884] Memory state around the buggy address: [ 23.393966] fff00000c6058080: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 23.394131] fff00000c6058100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 23.394234] >fff00000c6058180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 23.394331] ^ [ 23.394517] fff00000c6058200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.394623] fff00000c6058280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.394721] ================================================================== [ 23.397371] ================================================================== [ 23.397505] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 23.397633] Read of size 8 at addr fff00000c60581a8 by task kunit_try_catch/271 [ 23.397762] [ 23.397849] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 23.398120] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.398199] Hardware name: linux,dummy-virt (DT) [ 23.398339] show_stack+0x20/0x38 (C) [ 23.399678] kasan_bitops_generic+0x110/0x1c8 [ 23.400594] Allocated by task 271: [ 23.400985] __kasan_kmalloc+0xd4/0xd8 [ 23.401415] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.401966] The buggy address is located 8 bytes inside of [ 23.401966] allocated 9-byte region [fff00000c60581a0, fff00000c60581a9) [ 23.402743] page_type: f5(slab) [ 23.403313] page dumped because: kasan: bad access detected [ 23.404303] >fff00000c6058180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 23.407214] Write of size 8 at addr fff00000c60581a8 by task kunit_try_catch/271 [ 23.408227] dump_stack_lvl+0x8c/0xd0 [ 23.408466] kasan_report+0xdc/0x128 [ 23.409003] kasan_bitops_generic+0x110/0x1c8 [ 23.409542] ret_from_fork+0x10/0x20 [ 23.410401] __kasan_kmalloc+0xd4/0xd8 [ 23.410838] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.411200] [ 23.411434] The buggy address is located 8 bytes inside of [ 23.411434] allocated 9-byte region [fff00000c60581a0, fff00000c60581a9) [ 23.412314] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 23.413057] >fff00000c6058180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 23.414207] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 23.414857] Call trace: [ 23.414916] show_stack+0x20/0x38 (C) [ 23.415990] kunit_try_run_case+0x170/0x3f0 [ 23.416309] kthread+0x328/0x630 [ 23.417272] kasan_save_stack+0x3c/0x68 [ 23.417943] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.418362] kthread+0x328/0x630 [ 23.418705] ret_from_fork+0x10/0x20 [ 23.419015] The buggy address is located 8 bytes inside of [ 23.419015] allocated 9-byte region [fff00000c60581a0, fff00000c60581a9) [ 23.420717] [ 23.420763] Memory state around the buggy address: [ 23.421183] >fff00000c6058180: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 23.424272] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen
[ 23.324721] ================================================================== [ 23.324843] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88 [ 23.324977] Read of size 1 at addr fff00000c605c810 by task kunit_try_catch/269 [ 23.325109] [ 23.325195] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 23.325487] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.325566] Hardware name: linux,dummy-virt (DT) [ 23.325641] Call trace: [ 23.325703] show_stack+0x20/0x38 (C) [ 23.325841] dump_stack_lvl+0x8c/0xd0 [ 23.325963] print_report+0x118/0x608 [ 23.326138] kasan_report+0xdc/0x128 [ 23.326278] __asan_report_load1_noabort+0x20/0x30 [ 23.326421] strnlen+0x80/0x88 [ 23.326573] kasan_strings+0x478/0xb00 [ 23.326729] kunit_try_run_case+0x170/0x3f0 [ 23.326889] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.327083] kthread+0x328/0x630 [ 23.327187] ret_from_fork+0x10/0x20 [ 23.327308] [ 23.327352] Allocated by task 269: [ 23.327420] kasan_save_stack+0x3c/0x68 [ 23.327525] kasan_save_track+0x20/0x40 [ 23.327623] kasan_save_alloc_info+0x40/0x58 [ 23.327720] __kasan_kmalloc+0xd4/0xd8 [ 23.327798] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.327890] kasan_strings+0xc8/0xb00 [ 23.328032] kunit_try_run_case+0x170/0x3f0 [ 23.328208] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.328361] kthread+0x328/0x630 [ 23.328452] ret_from_fork+0x10/0x20 [ 23.328553] [ 23.328607] Freed by task 269: [ 23.328678] kasan_save_stack+0x3c/0x68 [ 23.328784] kasan_save_track+0x20/0x40 [ 23.328914] kasan_save_free_info+0x4c/0x78 [ 23.329029] __kasan_slab_free+0x6c/0x98 [ 23.329134] kfree+0x214/0x3c8 [ 23.329223] kasan_strings+0x24c/0xb00 [ 23.329314] kunit_try_run_case+0x170/0x3f0 [ 23.329422] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.329537] kthread+0x328/0x630 [ 23.329626] ret_from_fork+0x10/0x20 [ 23.329722] [ 23.329782] The buggy address belongs to the object at fff00000c605c800 [ 23.329782] which belongs to the cache kmalloc-32 of size 32 [ 23.329921] The buggy address is located 16 bytes inside of [ 23.329921] freed 32-byte region [fff00000c605c800, fff00000c605c820) [ 23.330100] [ 23.330151] The buggy address belongs to the physical page: [ 23.330222] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10605c [ 23.330353] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.330472] page_type: f5(slab) [ 23.330574] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 23.330707] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 23.330814] page dumped because: kasan: bad access detected [ 23.330894] [ 23.330935] Memory state around the buggy address: [ 23.331002] fff00000c605c700: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 23.331098] fff00000c605c780: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 23.331221] >fff00000c605c800: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 23.331343] ^ [ 23.331427] fff00000c605c880: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 23.331610] fff00000c605c900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 23.331770] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen
[ 23.319362] ================================================================== [ 23.319439] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0 [ 23.319508] Read of size 1 at addr fff00000c605c810 by task kunit_try_catch/269 [ 23.319566] [ 23.319611] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 23.319711] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.319748] Hardware name: linux,dummy-virt (DT) [ 23.319787] Call trace: [ 23.319818] show_stack+0x20/0x38 (C) [ 23.319879] dump_stack_lvl+0x8c/0xd0 [ 23.319934] print_report+0x118/0x608 [ 23.319989] kasan_report+0xdc/0x128 [ 23.320074] __asan_report_load1_noabort+0x20/0x30 [ 23.320137] strlen+0xa8/0xb0 [ 23.320187] kasan_strings+0x418/0xb00 [ 23.320239] kunit_try_run_case+0x170/0x3f0 [ 23.320294] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.320354] kthread+0x328/0x630 [ 23.320404] ret_from_fork+0x10/0x20 [ 23.320462] [ 23.320485] Allocated by task 269: [ 23.320520] kasan_save_stack+0x3c/0x68 [ 23.320592] kasan_save_track+0x20/0x40 [ 23.320637] kasan_save_alloc_info+0x40/0x58 [ 23.320686] __kasan_kmalloc+0xd4/0xd8 [ 23.320727] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.320772] kasan_strings+0xc8/0xb00 [ 23.320812] kunit_try_run_case+0x170/0x3f0 [ 23.320855] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.320905] kthread+0x328/0x630 [ 23.320942] ret_from_fork+0x10/0x20 [ 23.320986] [ 23.321009] Freed by task 269: [ 23.321100] kasan_save_stack+0x3c/0x68 [ 23.321173] kasan_save_track+0x20/0x40 [ 23.321250] kasan_save_free_info+0x4c/0x78 [ 23.321341] __kasan_slab_free+0x6c/0x98 [ 23.321457] kfree+0x214/0x3c8 [ 23.321567] kasan_strings+0x24c/0xb00 [ 23.321663] kunit_try_run_case+0x170/0x3f0 [ 23.321779] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.321917] kthread+0x328/0x630 [ 23.322002] ret_from_fork+0x10/0x20 [ 23.322172] [ 23.322229] The buggy address belongs to the object at fff00000c605c800 [ 23.322229] which belongs to the cache kmalloc-32 of size 32 [ 23.322374] The buggy address is located 16 bytes inside of [ 23.322374] freed 32-byte region [fff00000c605c800, fff00000c605c820) [ 23.322506] [ 23.322551] The buggy address belongs to the physical page: [ 23.322624] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10605c [ 23.322757] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.322884] page_type: f5(slab) [ 23.322979] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 23.323121] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 23.323261] page dumped because: kasan: bad access detected [ 23.323340] [ 23.323384] Memory state around the buggy address: [ 23.323471] fff00000c605c700: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 23.323605] fff00000c605c780: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 23.323723] >fff00000c605c800: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 23.323808] ^ [ 23.323891] fff00000c605c880: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 23.323996] fff00000c605c900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 23.324145] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[ 23.309308] ================================================================== [ 23.309439] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00 [ 23.309867] Read of size 1 at addr fff00000c605c810 by task kunit_try_catch/269 [ 23.310047] [ 23.310253] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 23.310458] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.310533] Hardware name: linux,dummy-virt (DT) [ 23.310616] Call trace: [ 23.310705] show_stack+0x20/0x38 (C) [ 23.310829] dump_stack_lvl+0x8c/0xd0 [ 23.311251] print_report+0x118/0x608 [ 23.311408] kasan_report+0xdc/0x128 [ 23.311563] __asan_report_load1_noabort+0x20/0x30 [ 23.311683] kasan_strings+0x95c/0xb00 [ 23.311945] kunit_try_run_case+0x170/0x3f0 [ 23.312123] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.312287] kthread+0x328/0x630 [ 23.312408] ret_from_fork+0x10/0x20 [ 23.312547] [ 23.312605] Allocated by task 269: [ 23.312680] kasan_save_stack+0x3c/0x68 [ 23.312803] kasan_save_track+0x20/0x40 [ 23.312933] kasan_save_alloc_info+0x40/0x58 [ 23.313079] __kasan_kmalloc+0xd4/0xd8 [ 23.313177] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.313317] kasan_strings+0xc8/0xb00 [ 23.313442] kunit_try_run_case+0x170/0x3f0 [ 23.313562] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.313668] kthread+0x328/0x630 [ 23.313747] ret_from_fork+0x10/0x20 [ 23.313843] [ 23.313893] Freed by task 269: [ 23.313960] kasan_save_stack+0x3c/0x68 [ 23.314096] kasan_save_track+0x20/0x40 [ 23.314195] kasan_save_free_info+0x4c/0x78 [ 23.314303] __kasan_slab_free+0x6c/0x98 [ 23.314554] kfree+0x214/0x3c8 [ 23.314786] kasan_strings+0x24c/0xb00 [ 23.314871] kunit_try_run_case+0x170/0x3f0 [ 23.314958] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.315077] kthread+0x328/0x630 [ 23.315163] ret_from_fork+0x10/0x20 [ 23.315263] [ 23.315321] The buggy address belongs to the object at fff00000c605c800 [ 23.315321] which belongs to the cache kmalloc-32 of size 32 [ 23.316121] The buggy address is located 16 bytes inside of [ 23.316121] freed 32-byte region [fff00000c605c800, fff00000c605c820) [ 23.316299] [ 23.316359] The buggy address belongs to the physical page: [ 23.316449] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10605c [ 23.316649] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.316827] page_type: f5(slab) [ 23.316922] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 23.317102] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 23.317207] page dumped because: kasan: bad access detected [ 23.317293] [ 23.317349] Memory state around the buggy address: [ 23.317450] fff00000c605c700: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 23.317578] fff00000c605c780: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 23.317757] >fff00000c605c800: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 23.317860] ^ [ 23.317940] fff00000c605c880: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 23.318052] fff00000c605c900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 23.318176] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
[ 23.292904] ================================================================== [ 23.293066] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 [ 23.293215] Read of size 1 at addr fff00000c605c810 by task kunit_try_catch/269 [ 23.293345] [ 23.293441] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 23.293686] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.293769] Hardware name: linux,dummy-virt (DT) [ 23.293858] Call trace: [ 23.293921] show_stack+0x20/0x38 (C) [ 23.294544] dump_stack_lvl+0x8c/0xd0 [ 23.295205] print_report+0x118/0x608 [ 23.295612] kasan_report+0xdc/0x128 [ 23.295745] __asan_report_load1_noabort+0x20/0x30 [ 23.295868] strcmp+0xc0/0xc8 [ 23.296113] kasan_strings+0x340/0xb00 [ 23.296401] kunit_try_run_case+0x170/0x3f0 [ 23.296697] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.297099] kthread+0x328/0x630 [ 23.297437] ret_from_fork+0x10/0x20 [ 23.297564] [ 23.297705] Allocated by task 269: [ 23.297946] kasan_save_stack+0x3c/0x68 [ 23.298197] kasan_save_track+0x20/0x40 [ 23.298347] kasan_save_alloc_info+0x40/0x58 [ 23.298451] __kasan_kmalloc+0xd4/0xd8 [ 23.298551] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.298673] kasan_strings+0xc8/0xb00 [ 23.299112] kunit_try_run_case+0x170/0x3f0 [ 23.299373] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.299658] kthread+0x328/0x630 [ 23.299855] ret_from_fork+0x10/0x20 [ 23.299985] [ 23.300298] Freed by task 269: [ 23.300425] kasan_save_stack+0x3c/0x68 [ 23.300695] kasan_save_track+0x20/0x40 [ 23.301060] kasan_save_free_info+0x4c/0x78 [ 23.301229] __kasan_slab_free+0x6c/0x98 [ 23.301333] kfree+0x214/0x3c8 [ 23.301895] kasan_strings+0x24c/0xb00 [ 23.302106] kunit_try_run_case+0x170/0x3f0 [ 23.302210] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.302319] kthread+0x328/0x630 [ 23.302417] ret_from_fork+0x10/0x20 [ 23.302522] [ 23.302588] The buggy address belongs to the object at fff00000c605c800 [ 23.302588] which belongs to the cache kmalloc-32 of size 32 [ 23.302755] The buggy address is located 16 bytes inside of [ 23.302755] freed 32-byte region [fff00000c605c800, fff00000c605c820) [ 23.303300] [ 23.303464] The buggy address belongs to the physical page: [ 23.303658] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10605c [ 23.303913] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.304251] page_type: f5(slab) [ 23.304451] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 23.304761] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 23.304892] page dumped because: kasan: bad access detected [ 23.304989] [ 23.305052] Memory state around the buggy address: [ 23.305147] fff00000c605c700: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 23.305267] fff00000c605c780: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 23.305392] >fff00000c605c800: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 23.305504] ^ [ 23.305585] fff00000c605c880: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 23.305709] fff00000c605c900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 23.305822] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[ 23.251836] ================================================================== [ 23.252878] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 23.253565] Read of size 1 at addr fff00000c605c658 by task kunit_try_catch/267 [ 23.253719] [ 23.253967] CPU: 0 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 23.254478] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.254557] Hardware name: linux,dummy-virt (DT) [ 23.254631] Call trace: [ 23.254687] show_stack+0x20/0x38 (C) [ 23.254814] dump_stack_lvl+0x8c/0xd0 [ 23.254912] print_report+0x118/0x608 [ 23.255029] kasan_report+0xdc/0x128 [ 23.255141] __asan_report_load1_noabort+0x20/0x30 [ 23.255697] memcmp+0x198/0x1d8 [ 23.256117] kasan_memcmp+0x16c/0x300 [ 23.256390] kunit_try_run_case+0x170/0x3f0 [ 23.257865] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.258076] kthread+0x328/0x630 [ 23.258194] ret_from_fork+0x10/0x20 [ 23.258326] [ 23.258385] Allocated by task 267: [ 23.258469] kasan_save_stack+0x3c/0x68 [ 23.258584] kasan_save_track+0x20/0x40 [ 23.258774] kasan_save_alloc_info+0x40/0x58 [ 23.258976] __kasan_kmalloc+0xd4/0xd8 [ 23.259328] __kmalloc_cache_noprof+0x16c/0x3c0 [ 23.259556] kasan_memcmp+0xbc/0x300 [ 23.259768] kunit_try_run_case+0x170/0x3f0 [ 23.259967] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.260566] kthread+0x328/0x630 [ 23.260989] ret_from_fork+0x10/0x20 [ 23.261097] [ 23.261149] The buggy address belongs to the object at fff00000c605c640 [ 23.261149] which belongs to the cache kmalloc-32 of size 32 [ 23.261313] The buggy address is located 0 bytes to the right of [ 23.261313] allocated 24-byte region [fff00000c605c640, fff00000c605c658) [ 23.261552] [ 23.261614] The buggy address belongs to the physical page: [ 23.261772] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10605c [ 23.262014] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.262427] page_type: f5(slab) [ 23.262587] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 23.262789] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 23.262925] page dumped because: kasan: bad access detected [ 23.263187] [ 23.263379] Memory state around the buggy address: [ 23.263517] fff00000c605c500: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 23.263737] fff00000c605c580: 00 00 00 fc fc fc fc fc 00 00 00 04 fc fc fc fc [ 23.263970] >fff00000c605c600: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 23.264095] ^ [ 23.264199] fff00000c605c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.264370] fff00000c605c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.264630] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[ 23.181084] ================================================================== [ 23.181436] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340 [ 23.181959] Read of size 1 at addr ffff8000809c7b4a by task kunit_try_catch/263 [ 23.182231] [ 23.182345] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 23.182554] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.182640] Hardware name: linux,dummy-virt (DT) [ 23.182731] Call trace: [ 23.182794] show_stack+0x20/0x38 (C) [ 23.183412] dump_stack_lvl+0x8c/0xd0 [ 23.183644] print_report+0x310/0x608 [ 23.184028] kasan_report+0xdc/0x128 [ 23.184314] __asan_report_load1_noabort+0x20/0x30 [ 23.184760] kasan_alloca_oob_right+0x2dc/0x340 [ 23.185033] kunit_try_run_case+0x170/0x3f0 [ 23.185303] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.185496] kthread+0x328/0x630 [ 23.185893] ret_from_fork+0x10/0x20 [ 23.186564] [ 23.186640] The buggy address belongs to stack of task kunit_try_catch/263 [ 23.186821] [ 23.187047] The buggy address belongs to the virtual mapping at [ 23.187047] [ffff8000809c0000, ffff8000809c9000) created by: [ 23.187047] kernel_clone+0x150/0x7a8 [ 23.187273] [ 23.187337] The buggy address belongs to the physical page: [ 23.187895] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107781 [ 23.188143] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.188511] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 23.188680] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.188794] page dumped because: kasan: bad access detected [ 23.188882] [ 23.189295] Memory state around the buggy address: [ 23.189498] ffff8000809c7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.189739] ffff8000809c7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.190141] >ffff8000809c7b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 23.190366] ^ [ 23.190550] ffff8000809c7b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 23.190743] ffff8000809c7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 23.190853] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[ 23.148219] ================================================================== [ 23.148423] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 23.148583] Read of size 1 at addr ffff8000809c7b5f by task kunit_try_catch/261 [ 23.148804] [ 23.148907] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 23.150095] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.150223] Hardware name: linux,dummy-virt (DT) [ 23.151153] Call trace: [ 23.151212] show_stack+0x20/0x38 (C) [ 23.151341] dump_stack_lvl+0x8c/0xd0 [ 23.151441] print_report+0x310/0x608 [ 23.151552] kasan_report+0xdc/0x128 [ 23.151692] __asan_report_load1_noabort+0x20/0x30 [ 23.151966] kasan_alloca_oob_left+0x2b8/0x310 [ 23.152108] kunit_try_run_case+0x170/0x3f0 [ 23.152238] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.152376] kthread+0x328/0x630 [ 23.152486] ret_from_fork+0x10/0x20 [ 23.152632] [ 23.152690] The buggy address belongs to stack of task kunit_try_catch/261 [ 23.152864] [ 23.152934] The buggy address belongs to the virtual mapping at [ 23.152934] [ffff8000809c0000, ffff8000809c9000) created by: [ 23.152934] kernel_clone+0x150/0x7a8 [ 23.153995] [ 23.154124] The buggy address belongs to the physical page: [ 23.154216] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107781 [ 23.154289] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.154439] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 23.155115] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.155256] page dumped because: kasan: bad access detected [ 23.155787] [ 23.156140] Memory state around the buggy address: [ 23.156587] ffff8000809c7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.156965] ffff8000809c7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.157197] >ffff8000809c7b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 23.157346] ^ [ 23.157978] ffff8000809c7b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 23.158261] ffff8000809c7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 23.158362] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 23.121008] ================================================================== [ 23.121228] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 23.121375] Read of size 1 at addr ffff8000809c7c2a by task kunit_try_catch/259 [ 23.121491] [ 23.121579] CPU: 0 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 23.121797] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.122300] Hardware name: linux,dummy-virt (DT) [ 23.122481] Call trace: [ 23.122533] show_stack+0x20/0x38 (C) [ 23.122666] dump_stack_lvl+0x8c/0xd0 [ 23.122807] print_report+0x310/0x608 [ 23.122924] kasan_report+0xdc/0x128 [ 23.123099] __asan_report_load1_noabort+0x20/0x30 [ 23.123227] kasan_stack_oob+0x238/0x270 [ 23.123344] kunit_try_run_case+0x170/0x3f0 [ 23.123459] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.123599] kthread+0x328/0x630 [ 23.123702] ret_from_fork+0x10/0x20 [ 23.123817] [ 23.124046] The buggy address belongs to stack of task kunit_try_catch/259 [ 23.124411] and is located at offset 138 in frame: [ 23.124721] kasan_stack_oob+0x0/0x270 [ 23.125004] [ 23.125328] This frame has 4 objects: [ 23.125657] [48, 49) '__assertion' [ 23.125764] [64, 72) 'array' [ 23.125839] [96, 112) '__assertion' [ 23.125979] [128, 138) 'stack_array' [ 23.126147] [ 23.126229] The buggy address belongs to the virtual mapping at [ 23.126229] [ffff8000809c0000, ffff8000809c9000) created by: [ 23.126229] kernel_clone+0x150/0x7a8 [ 23.126642] [ 23.126713] The buggy address belongs to the physical page: [ 23.126799] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107781 [ 23.126924] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.127122] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 23.127242] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.127343] page dumped because: kasan: bad access detected [ 23.127422] [ 23.127729] Memory state around the buggy address: [ 23.127895] ffff8000809c7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.128066] ffff8000809c7b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 23.128195] >ffff8000809c7c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 23.128321] ^ [ 23.128414] ffff8000809c7c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 [ 23.128593] ffff8000809c7d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 23.128712] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 23.077172] ================================================================== [ 23.077361] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 23.078165] Read of size 1 at addr ffffacab7ce6f64d by task kunit_try_catch/255 [ 23.078478] [ 23.078958] CPU: 0 UID: 0 PID: 255 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 23.079354] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.079557] Hardware name: linux,dummy-virt (DT) [ 23.079744] Call trace: [ 23.079843] show_stack+0x20/0x38 (C) [ 23.080096] dump_stack_lvl+0x8c/0xd0 [ 23.080412] print_report+0x310/0x608 [ 23.080793] kasan_report+0xdc/0x128 [ 23.081031] __asan_report_load1_noabort+0x20/0x30 [ 23.081429] kasan_global_oob_right+0x230/0x270 [ 23.081684] kunit_try_run_case+0x170/0x3f0 [ 23.081858] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.082177] kthread+0x328/0x630 [ 23.082491] ret_from_fork+0x10/0x20 [ 23.082639] [ 23.082758] The buggy address belongs to the variable: [ 23.082834] global_array+0xd/0x40 [ 23.083187] [ 23.083535] The buggy address belongs to the virtual mapping at [ 23.083535] [ffffacab7b030000, ffffacab7cf21000) created by: [ 23.083535] paging_init+0x66c/0x7d0 [ 23.083753] [ 23.084045] The buggy address belongs to the physical page: [ 23.084144] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47c6f [ 23.084675] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 23.085346] raw: 03fffe0000002000 ffffc1ffc01f1bc8 ffffc1ffc01f1bc8 0000000000000000 [ 23.085605] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 23.085823] page dumped because: kasan: bad access detected [ 23.086016] [ 23.086159] Memory state around the buggy address: [ 23.086230] ffffacab7ce6f500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.086604] ffffacab7ce6f580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.086859] >ffffacab7ce6f600: 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 [ 23.087078] ^ [ 23.087258] ffffacab7ce6f680: 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 [ 23.087389] ffffacab7ce6f700: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00 [ 23.087493] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 23.045856] ================================================================== [ 23.046044] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 23.046213] Free of addr fff00000c77c4001 by task kunit_try_catch/253 [ 23.046305] [ 23.046535] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 23.046910] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.046994] Hardware name: linux,dummy-virt (DT) [ 23.047080] Call trace: [ 23.047128] show_stack+0x20/0x38 (C) [ 23.047247] dump_stack_lvl+0x8c/0xd0 [ 23.047361] print_report+0x118/0x608 [ 23.047529] kasan_report_invalid_free+0xc0/0xe8 [ 23.047696] __kasan_mempool_poison_object+0xfc/0x150 [ 23.047823] mempool_free+0x28c/0x328 [ 23.047971] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 23.048109] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 23.048231] kunit_try_run_case+0x170/0x3f0 [ 23.048362] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.048913] kthread+0x328/0x630 [ 23.049031] ret_from_fork+0x10/0x20 [ 23.049152] [ 23.049207] The buggy address belongs to the physical page: [ 23.049286] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077c4 [ 23.049689] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 23.049807] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 23.049943] page_type: f8(unknown) [ 23.050055] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.050172] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 23.050275] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 23.050377] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 23.050486] head: 0bfffe0000000002 ffffc1ffc31df101 00000000ffffffff 00000000ffffffff [ 23.050608] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 23.050709] page dumped because: kasan: bad access detected [ 23.050791] [ 23.050837] Memory state around the buggy address: [ 23.050918] fff00000c77c3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.051035] fff00000c77c3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 23.051147] >fff00000c77c4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.051241] ^ [ 23.051311] fff00000c77c4080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.051418] fff00000c77c4100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.051518] ================================================================== [ 23.018295] ================================================================== [ 23.018571] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 23.018778] Free of addr fff00000c7791b01 by task kunit_try_catch/251 [ 23.018883] [ 23.018975] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 23.019210] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 23.019291] Hardware name: linux,dummy-virt (DT) [ 23.019372] Call trace: [ 23.019426] show_stack+0x20/0x38 (C) [ 23.019587] dump_stack_lvl+0x8c/0xd0 [ 23.019795] print_report+0x118/0x608 [ 23.019928] kasan_report_invalid_free+0xc0/0xe8 [ 23.020083] check_slab_allocation+0xfc/0x108 [ 23.020274] __kasan_mempool_poison_object+0x78/0x150 [ 23.020445] mempool_free+0x28c/0x328 [ 23.020569] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 23.020702] mempool_kmalloc_invalid_free+0xc0/0x118 [ 23.020827] kunit_try_run_case+0x170/0x3f0 [ 23.020954] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.021095] kthread+0x328/0x630 [ 23.021261] ret_from_fork+0x10/0x20 [ 23.021433] [ 23.021495] Allocated by task 251: [ 23.021591] kasan_save_stack+0x3c/0x68 [ 23.021741] kasan_save_track+0x20/0x40 [ 23.021885] kasan_save_alloc_info+0x40/0x58 [ 23.022025] __kasan_mempool_unpoison_object+0x11c/0x180 [ 23.022145] remove_element+0x130/0x1f8 [ 23.022232] mempool_alloc_preallocated+0x58/0xc0 [ 23.022319] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 23.022428] mempool_kmalloc_invalid_free+0xc0/0x118 [ 23.022528] kunit_try_run_case+0x170/0x3f0 [ 23.022683] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.022798] kthread+0x328/0x630 [ 23.022890] ret_from_fork+0x10/0x20 [ 23.023039] [ 23.023125] The buggy address belongs to the object at fff00000c7791b00 [ 23.023125] which belongs to the cache kmalloc-128 of size 128 [ 23.023304] The buggy address is located 1 bytes inside of [ 23.023304] 128-byte region [fff00000c7791b00, fff00000c7791b80) [ 23.023456] [ 23.023506] The buggy address belongs to the physical page: [ 23.023590] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107791 [ 23.023714] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.023840] page_type: f5(slab) [ 23.023936] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 23.024071] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 23.024253] page dumped because: kasan: bad access detected [ 23.024366] [ 23.024417] Memory state around the buggy address: [ 23.024554] fff00000c7791a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 23.024676] fff00000c7791a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.024804] >fff00000c7791b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.025352] ^ [ 23.025452] fff00000c7791b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.025583] fff00000c7791c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 23.025691] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 22.884947] ================================================================== [ 22.885108] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 22.885258] Free of addr fff00000c7791700 by task kunit_try_catch/245 [ 22.885365] [ 22.885452] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 22.885665] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 22.885741] Hardware name: linux,dummy-virt (DT) [ 22.885815] Call trace: [ 22.885866] show_stack+0x20/0x38 (C) [ 22.885983] dump_stack_lvl+0x8c/0xd0 [ 22.886116] print_report+0x118/0x608 [ 22.886233] kasan_report_invalid_free+0xc0/0xe8 [ 22.887185] check_slab_allocation+0xd4/0x108 [ 22.887963] __kasan_mempool_poison_object+0x78/0x150 [ 22.888283] mempool_free+0x28c/0x328 [ 22.888572] mempool_double_free_helper+0x150/0x2e8 [ 22.888991] mempool_kmalloc_double_free+0xc0/0x118 [ 22.889582] kunit_try_run_case+0x170/0x3f0 [ 22.889731] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.890156] kthread+0x328/0x630 [ 22.890396] ret_from_fork+0x10/0x20 [ 22.890625] [ 22.890767] Allocated by task 245: [ 22.890912] kasan_save_stack+0x3c/0x68 [ 22.891405] kasan_save_track+0x20/0x40 [ 22.891827] kasan_save_alloc_info+0x40/0x58 [ 22.892246] __kasan_mempool_unpoison_object+0x11c/0x180 [ 22.892425] remove_element+0x130/0x1f8 [ 22.892819] mempool_alloc_preallocated+0x58/0xc0 [ 22.893103] mempool_double_free_helper+0x94/0x2e8 [ 22.893746] mempool_kmalloc_double_free+0xc0/0x118 [ 22.893874] kunit_try_run_case+0x170/0x3f0 [ 22.893970] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.894959] kthread+0x328/0x630 [ 22.895326] ret_from_fork+0x10/0x20 [ 22.895512] [ 22.895657] Freed by task 245: [ 22.895807] kasan_save_stack+0x3c/0x68 [ 22.895905] kasan_save_track+0x20/0x40 [ 22.896321] kasan_save_free_info+0x4c/0x78 [ 22.896949] __kasan_mempool_poison_object+0xc0/0x150 [ 22.897231] mempool_free+0x28c/0x328 [ 22.897418] mempool_double_free_helper+0x100/0x2e8 [ 22.897715] mempool_kmalloc_double_free+0xc0/0x118 [ 22.898111] kunit_try_run_case+0x170/0x3f0 [ 22.898210] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.898751] kthread+0x328/0x630 [ 22.899262] ret_from_fork+0x10/0x20 [ 22.899581] [ 22.899633] The buggy address belongs to the object at fff00000c7791700 [ 22.899633] which belongs to the cache kmalloc-128 of size 128 [ 22.899783] The buggy address is located 0 bytes inside of [ 22.899783] 128-byte region [fff00000c7791700, fff00000c7791780) [ 22.899931] [ 22.899979] The buggy address belongs to the physical page: [ 22.900914] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107791 [ 22.901513] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.902054] page_type: f5(slab) [ 22.902568] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 22.903108] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.903204] page dumped because: kasan: bad access detected [ 22.903908] [ 22.904219] Memory state around the buggy address: [ 22.904314] fff00000c7791600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.905110] fff00000c7791680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.905235] >fff00000c7791700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.905330] ^ [ 22.905399] fff00000c7791780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.906197] fff00000c7791800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.906866] ================================================================== [ 22.951273] ================================================================== [ 22.951454] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 22.951596] Free of addr fff00000c77c4000 by task kunit_try_catch/247 [ 22.951688] [ 22.951762] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 22.951939] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 22.951999] Hardware name: linux,dummy-virt (DT) [ 22.952136] Call trace: [ 22.952196] show_stack+0x20/0x38 (C) [ 22.952334] dump_stack_lvl+0x8c/0xd0 [ 22.952452] print_report+0x118/0x608 [ 22.952580] kasan_report_invalid_free+0xc0/0xe8 [ 22.952828] __kasan_mempool_poison_object+0x14c/0x150 [ 22.953480] mempool_free+0x28c/0x328 [ 22.953652] mempool_double_free_helper+0x150/0x2e8 [ 22.953862] mempool_kmalloc_large_double_free+0xc0/0x118 [ 22.954083] kunit_try_run_case+0x170/0x3f0 [ 22.954243] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.954356] kthread+0x328/0x630 [ 22.954482] ret_from_fork+0x10/0x20 [ 22.954600] [ 22.954648] The buggy address belongs to the physical page: [ 22.955167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077c4 [ 22.955544] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.955678] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 22.956769] page_type: f8(unknown) [ 22.956925] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.957082] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 22.957225] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.958363] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 22.958656] head: 0bfffe0000000002 ffffc1ffc31df101 00000000ffffffff 00000000ffffffff [ 22.959373] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.959492] page dumped because: kasan: bad access detected [ 22.959624] [ 22.959669] Memory state around the buggy address: [ 22.960578] fff00000c77c3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.960724] fff00000c77c3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.960837] >fff00000c77c4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.960937] ^ [ 22.961011] fff00000c77c4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.961789] fff00000c77c4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.962040] ================================================================== [ 22.988250] ================================================================== [ 22.988435] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 22.988603] Free of addr fff00000c77c4000 by task kunit_try_catch/249 [ 22.988717] [ 22.988814] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 22.989552] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 22.989884] Hardware name: linux,dummy-virt (DT) [ 22.990088] Call trace: [ 22.990181] show_stack+0x20/0x38 (C) [ 22.990531] dump_stack_lvl+0x8c/0xd0 [ 22.990905] print_report+0x118/0x608 [ 22.991285] kasan_report_invalid_free+0xc0/0xe8 [ 22.991658] __kasan_mempool_poison_pages+0xe0/0xe8 [ 22.991843] mempool_free+0x24c/0x328 [ 22.991962] mempool_double_free_helper+0x150/0x2e8 [ 22.992196] mempool_page_alloc_double_free+0xbc/0x118 [ 22.992347] kunit_try_run_case+0x170/0x3f0 [ 22.992459] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.992593] kthread+0x328/0x630 [ 22.992696] ret_from_fork+0x10/0x20 [ 22.992815] [ 22.992869] The buggy address belongs to the physical page: [ 22.992953] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077c4 [ 22.993114] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.993289] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 22.994553] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 22.994820] page dumped because: kasan: bad access detected [ 22.995009] [ 22.995102] Memory state around the buggy address: [ 22.995204] fff00000c77c3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.995320] fff00000c77c3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.995417] >fff00000c77c4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.995509] ^ [ 22.995586] fff00000c77c4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.996171] fff00000c77c4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.996580] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 22.765085] ================================================================== [ 22.765285] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 22.765453] Read of size 1 at addr fff00000c77c0000 by task kunit_try_catch/239 [ 22.765564] [ 22.765655] CPU: 0 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 22.765862] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 22.765921] Hardware name: linux,dummy-virt (DT) [ 22.766032] Call trace: [ 22.766244] show_stack+0x20/0x38 (C) [ 22.766439] dump_stack_lvl+0x8c/0xd0 [ 22.766614] print_report+0x118/0x608 [ 22.767211] kasan_report+0xdc/0x128 [ 22.767464] __asan_report_load1_noabort+0x20/0x30 [ 22.768066] mempool_uaf_helper+0x314/0x340 [ 22.768246] mempool_kmalloc_large_uaf+0xc4/0x120 [ 22.768801] kunit_try_run_case+0x170/0x3f0 [ 22.769377] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.769646] kthread+0x328/0x630 [ 22.770235] ret_from_fork+0x10/0x20 [ 22.770391] [ 22.770442] The buggy address belongs to the physical page: [ 22.770505] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077c0 [ 22.770624] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.771204] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 22.772146] page_type: f8(unknown) [ 22.772293] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.772682] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 22.772819] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.772944] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 22.773073] head: 0bfffe0000000002 ffffc1ffc31df001 00000000ffffffff 00000000ffffffff [ 22.773196] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.773299] page dumped because: kasan: bad access detected [ 22.773378] [ 22.773422] Memory state around the buggy address: [ 22.773711] fff00000c77bff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.773907] fff00000c77bff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.774121] >fff00000c77c0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.774302] ^ [ 22.774391] fff00000c77c0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.774839] fff00000c77c0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.774968] ================================================================== [ 22.852584] ================================================================== [ 22.852788] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 22.852945] Read of size 1 at addr fff00000c77c4000 by task kunit_try_catch/243 [ 22.853062] [ 22.853145] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 22.853755] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 22.853853] Hardware name: linux,dummy-virt (DT) [ 22.854135] Call trace: [ 22.854192] show_stack+0x20/0x38 (C) [ 22.854317] dump_stack_lvl+0x8c/0xd0 [ 22.855222] print_report+0x118/0x608 [ 22.855324] kasan_report+0xdc/0x128 [ 22.855713] __asan_report_load1_noabort+0x20/0x30 [ 22.856013] mempool_uaf_helper+0x314/0x340 [ 22.856271] mempool_page_alloc_uaf+0xc0/0x118 [ 22.856372] kunit_try_run_case+0x170/0x3f0 [ 22.856489] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.856995] kthread+0x328/0x630 [ 22.857435] ret_from_fork+0x10/0x20 [ 22.857952] [ 22.858053] The buggy address belongs to the physical page: [ 22.858537] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077c4 [ 22.858647] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.858795] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 22.858984] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 22.859121] page dumped because: kasan: bad access detected [ 22.859492] [ 22.859543] Memory state around the buggy address: [ 22.859631] fff00000c77c3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.859748] fff00000c77c3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.859878] >fff00000c77c4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.860039] ^ [ 22.860137] fff00000c77c4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.860239] fff00000c77c4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 22.860330] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 22.807180] ================================================================== [ 22.807434] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 22.807605] Read of size 1 at addr fff00000c6063240 by task kunit_try_catch/241 [ 22.807719] [ 22.807846] CPU: 0 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 22.808233] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 22.808304] Hardware name: linux,dummy-virt (DT) [ 22.808375] Call trace: [ 22.808424] show_stack+0x20/0x38 (C) [ 22.808548] dump_stack_lvl+0x8c/0xd0 [ 22.808667] print_report+0x118/0x608 [ 22.808779] kasan_report+0xdc/0x128 [ 22.808887] __asan_report_load1_noabort+0x20/0x30 [ 22.809001] mempool_uaf_helper+0x314/0x340 [ 22.809128] mempool_slab_uaf+0xc0/0x118 [ 22.809230] kunit_try_run_case+0x170/0x3f0 [ 22.809342] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.809463] kthread+0x328/0x630 [ 22.809559] ret_from_fork+0x10/0x20 [ 22.809670] [ 22.809716] Allocated by task 241: [ 22.809777] kasan_save_stack+0x3c/0x68 [ 22.809872] kasan_save_track+0x20/0x40 [ 22.809955] kasan_save_alloc_info+0x40/0x58 [ 22.811268] __kasan_mempool_unpoison_object+0xbc/0x180 [ 22.811501] remove_element+0x16c/0x1f8 [ 22.811988] mempool_alloc_preallocated+0x58/0xc0 [ 22.812186] mempool_uaf_helper+0xa4/0x340 [ 22.812718] mempool_slab_uaf+0xc0/0x118 [ 22.812835] kunit_try_run_case+0x170/0x3f0 [ 22.812971] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.813123] kthread+0x328/0x630 [ 22.813212] ret_from_fork+0x10/0x20 [ 22.813610] [ 22.813656] Freed by task 241: [ 22.813722] kasan_save_stack+0x3c/0x68 [ 22.813806] kasan_save_track+0x20/0x40 [ 22.813885] kasan_save_free_info+0x4c/0x78 [ 22.813963] __kasan_mempool_poison_object+0xc0/0x150 [ 22.814068] mempool_free+0x28c/0x328 [ 22.814144] mempool_uaf_helper+0x104/0x340 [ 22.814224] mempool_slab_uaf+0xc0/0x118 [ 22.814813] kunit_try_run_case+0x170/0x3f0 [ 22.814918] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.815305] kthread+0x328/0x630 [ 22.815440] ret_from_fork+0x10/0x20 [ 22.815734] [ 22.815797] The buggy address belongs to the object at fff00000c6063240 [ 22.815797] which belongs to the cache test_cache of size 123 [ 22.816153] The buggy address is located 0 bytes inside of [ 22.816153] freed 123-byte region [fff00000c6063240, fff00000c60632bb) [ 22.816501] [ 22.816560] The buggy address belongs to the physical page: [ 22.816899] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106063 [ 22.817034] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.817369] page_type: f5(slab) [ 22.817473] raw: 0bfffe0000000000 fff00000c7790280 dead000000000122 0000000000000000 [ 22.817602] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 22.818012] page dumped because: kasan: bad access detected [ 22.818309] [ 22.818350] Memory state around the buggy address: [ 22.818651] fff00000c6063100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.819032] fff00000c6063180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.819158] >fff00000c6063200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 22.819242] ^ [ 22.819607] fff00000c6063280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.819758] fff00000c6063300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.819856] ================================================================== [ 22.733432] ================================================================== [ 22.733630] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 22.733782] Read of size 1 at addr fff00000c7791300 by task kunit_try_catch/237 [ 22.733894] [ 22.733974] CPU: 0 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 22.734272] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 22.734379] Hardware name: linux,dummy-virt (DT) [ 22.734471] Call trace: [ 22.734554] show_stack+0x20/0x38 (C) [ 22.734688] dump_stack_lvl+0x8c/0xd0 [ 22.734778] print_report+0x118/0x608 [ 22.735072] kasan_report+0xdc/0x128 [ 22.735183] __asan_report_load1_noabort+0x20/0x30 [ 22.735352] mempool_uaf_helper+0x314/0x340 [ 22.735500] mempool_kmalloc_uaf+0xc4/0x120 [ 22.735645] kunit_try_run_case+0x170/0x3f0 [ 22.735767] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.735892] kthread+0x328/0x630 [ 22.736032] ret_from_fork+0x10/0x20 [ 22.736137] [ 22.736179] Allocated by task 237: [ 22.736240] kasan_save_stack+0x3c/0x68 [ 22.736361] kasan_save_track+0x20/0x40 [ 22.736443] kasan_save_alloc_info+0x40/0x58 [ 22.736546] __kasan_mempool_unpoison_object+0x11c/0x180 [ 22.736697] remove_element+0x130/0x1f8 [ 22.736789] mempool_alloc_preallocated+0x58/0xc0 [ 22.736876] mempool_uaf_helper+0xa4/0x340 [ 22.736954] mempool_kmalloc_uaf+0xc4/0x120 [ 22.737087] kunit_try_run_case+0x170/0x3f0 [ 22.737227] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.737347] kthread+0x328/0x630 [ 22.737425] ret_from_fork+0x10/0x20 [ 22.737504] [ 22.737547] Freed by task 237: [ 22.737610] kasan_save_stack+0x3c/0x68 [ 22.737705] kasan_save_track+0x20/0x40 [ 22.737819] kasan_save_free_info+0x4c/0x78 [ 22.737904] __kasan_mempool_poison_object+0xc0/0x150 [ 22.738027] mempool_free+0x28c/0x328 [ 22.738112] mempool_uaf_helper+0x104/0x340 [ 22.738187] mempool_kmalloc_uaf+0xc4/0x120 [ 22.738321] kunit_try_run_case+0x170/0x3f0 [ 22.738413] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.738504] kthread+0x328/0x630 [ 22.738573] ret_from_fork+0x10/0x20 [ 22.738654] [ 22.738723] The buggy address belongs to the object at fff00000c7791300 [ 22.738723] which belongs to the cache kmalloc-128 of size 128 [ 22.738891] The buggy address is located 0 bytes inside of [ 22.738891] freed 128-byte region [fff00000c7791300, fff00000c7791380) [ 22.739106] [ 22.739170] The buggy address belongs to the physical page: [ 22.739242] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107791 [ 22.739360] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.739457] page_type: f5(slab) [ 22.739562] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 22.739671] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 22.739753] page dumped because: kasan: bad access detected [ 22.739819] [ 22.739853] Memory state around the buggy address: [ 22.740266] fff00000c7791200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.740410] fff00000c7791280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.740834] >fff00000c7791300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.741011] ^ [ 22.741135] fff00000c7791380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.741375] fff00000c7791400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.741476] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 22.637190] ================================================================== [ 22.637308] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 22.637401] Read of size 1 at addr fff00000c6423f73 by task kunit_try_catch/231 [ 22.637456] [ 22.637505] CPU: 0 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 22.637606] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 22.637638] Hardware name: linux,dummy-virt (DT) [ 22.637674] Call trace: [ 22.637702] show_stack+0x20/0x38 (C) [ 22.637759] dump_stack_lvl+0x8c/0xd0 [ 22.637813] print_report+0x118/0x608 [ 22.637863] kasan_report+0xdc/0x128 [ 22.637912] __asan_report_load1_noabort+0x20/0x30 [ 22.637966] mempool_oob_right_helper+0x2ac/0x2f0 [ 22.638027] mempool_kmalloc_oob_right+0xc4/0x120 [ 22.638157] kunit_try_run_case+0x170/0x3f0 [ 22.638262] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.638365] kthread+0x328/0x630 [ 22.638456] ret_from_fork+0x10/0x20 [ 22.638525] [ 22.638547] Allocated by task 231: [ 22.638579] kasan_save_stack+0x3c/0x68 [ 22.638626] kasan_save_track+0x20/0x40 [ 22.638667] kasan_save_alloc_info+0x40/0x58 [ 22.638707] __kasan_mempool_unpoison_object+0x11c/0x180 [ 22.638752] remove_element+0x130/0x1f8 [ 22.638791] mempool_alloc_preallocated+0x58/0xc0 [ 22.638828] mempool_oob_right_helper+0x98/0x2f0 [ 22.638866] mempool_kmalloc_oob_right+0xc4/0x120 [ 22.638904] kunit_try_run_case+0x170/0x3f0 [ 22.638941] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.638983] kthread+0x328/0x630 [ 22.639014] ret_from_fork+0x10/0x20 [ 22.639076] [ 22.639098] The buggy address belongs to the object at fff00000c6423f00 [ 22.639098] which belongs to the cache kmalloc-128 of size 128 [ 22.639158] The buggy address is located 0 bytes to the right of [ 22.639158] allocated 115-byte region [fff00000c6423f00, fff00000c6423f73) [ 22.639218] [ 22.639241] The buggy address belongs to the physical page: [ 22.639275] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106423 [ 22.639328] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.639383] page_type: f5(slab) [ 22.639430] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 22.639481] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000 [ 22.639522] page dumped because: kasan: bad access detected [ 22.639554] [ 22.639573] Memory state around the buggy address: [ 22.639607] fff00000c6423e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.639651] fff00000c6423e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.639693] >fff00000c6423f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 22.639731] ^ [ 22.639770] fff00000c6423f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.639810] fff00000c6424000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.639848] ================================================================== [ 22.694754] ================================================================== [ 22.695001] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 22.695211] Read of size 1 at addr fff00000c63f02bb by task kunit_try_catch/235 [ 22.695366] [ 22.695481] CPU: 0 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 22.695734] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 22.695816] Hardware name: linux,dummy-virt (DT) [ 22.695914] Call trace: [ 22.695990] show_stack+0x20/0x38 (C) [ 22.696101] dump_stack_lvl+0x8c/0xd0 [ 22.696200] print_report+0x118/0x608 [ 22.696367] kasan_report+0xdc/0x128 [ 22.696512] __asan_report_load1_noabort+0x20/0x30 [ 22.696691] mempool_oob_right_helper+0x2ac/0x2f0 [ 22.696851] mempool_slab_oob_right+0xc0/0x118 [ 22.697003] kunit_try_run_case+0x170/0x3f0 [ 22.697124] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.697296] kthread+0x328/0x630 [ 22.697432] ret_from_fork+0x10/0x20 [ 22.697583] [ 22.697647] Allocated by task 235: [ 22.697737] kasan_save_stack+0x3c/0x68 [ 22.697833] kasan_save_track+0x20/0x40 [ 22.697952] kasan_save_alloc_info+0x40/0x58 [ 22.698471] __kasan_mempool_unpoison_object+0xbc/0x180 [ 22.698679] remove_element+0x16c/0x1f8 [ 22.698767] mempool_alloc_preallocated+0x58/0xc0 [ 22.698885] mempool_oob_right_helper+0x98/0x2f0 [ 22.699005] mempool_slab_oob_right+0xc0/0x118 [ 22.699145] kunit_try_run_case+0x170/0x3f0 [ 22.699225] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.699303] kthread+0x328/0x630 [ 22.699358] ret_from_fork+0x10/0x20 [ 22.699430] [ 22.699472] The buggy address belongs to the object at fff00000c63f0240 [ 22.699472] which belongs to the cache test_cache of size 123 [ 22.699602] The buggy address is located 0 bytes to the right of [ 22.699602] allocated 123-byte region [fff00000c63f0240, fff00000c63f02bb) [ 22.699743] [ 22.699794] The buggy address belongs to the physical page: [ 22.699893] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f0 [ 22.700048] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.700146] page_type: f5(slab) [ 22.700231] raw: 0bfffe0000000000 fff00000c7790140 dead000000000122 0000000000000000 [ 22.700341] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 22.700441] page dumped because: kasan: bad access detected [ 22.700511] [ 22.700567] Memory state around the buggy address: [ 22.700655] fff00000c63f0180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.701472] fff00000c63f0200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 22.701618] >fff00000c63f0280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 22.701745] ^ [ 22.701857] fff00000c63f0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.701988] fff00000c63f0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.702099] ================================================================== [ 22.664004] ================================================================== [ 22.664197] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 22.664345] Read of size 1 at addr fff00000c77be001 by task kunit_try_catch/233 [ 22.664794] [ 22.664911] CPU: 0 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 22.665141] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 22.665213] Hardware name: linux,dummy-virt (DT) [ 22.665283] Call trace: [ 22.665335] show_stack+0x20/0x38 (C) [ 22.665607] dump_stack_lvl+0x8c/0xd0 [ 22.665941] print_report+0x118/0x608 [ 22.666063] kasan_report+0xdc/0x128 [ 22.666172] __asan_report_load1_noabort+0x20/0x30 [ 22.666284] mempool_oob_right_helper+0x2ac/0x2f0 [ 22.666373] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 22.666468] kunit_try_run_case+0x170/0x3f0 [ 22.666804] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.666938] kthread+0x328/0x630 [ 22.667050] ret_from_fork+0x10/0x20 [ 22.667717] [ 22.667790] The buggy address belongs to the physical page: [ 22.667946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077bc [ 22.668090] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 22.668534] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 22.668776] page_type: f8(unknown) [ 22.669108] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.669239] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 22.669368] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 22.669542] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 22.669728] head: 0bfffe0000000002 ffffc1ffc31def01 00000000ffffffff 00000000ffffffff [ 22.669892] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 22.669988] page dumped because: kasan: bad access detected [ 22.670262] [ 22.670375] Memory state around the buggy address: [ 22.670473] fff00000c77bdf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.670573] fff00000c77bdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 22.670664] >fff00000c77be000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 22.671103] ^ [ 22.671190] fff00000c77be080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 22.671297] fff00000c77be100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 22.671420] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 22.071988] ================================================================== [ 22.072128] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300 [ 22.072239] Read of size 1 at addr fff00000c0cc5dc0 by task kunit_try_catch/225 [ 22.072300] [ 22.072353] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 22.072461] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 22.072497] Hardware name: linux,dummy-virt (DT) [ 22.072544] Call trace: [ 22.072578] show_stack+0x20/0x38 (C) [ 22.072643] dump_stack_lvl+0x8c/0xd0 [ 22.072704] print_report+0x118/0x608 [ 22.072760] kasan_report+0xdc/0x128 [ 22.072813] __kasan_check_byte+0x54/0x70 [ 22.072869] kmem_cache_destroy+0x34/0x218 [ 22.072925] kmem_cache_double_destroy+0x174/0x300 [ 22.072981] kunit_try_run_case+0x170/0x3f0 [ 22.073054] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.073118] kthread+0x328/0x630 [ 22.073168] ret_from_fork+0x10/0x20 [ 22.073226] [ 22.073249] Allocated by task 225: [ 22.073284] kasan_save_stack+0x3c/0x68 [ 22.073336] kasan_save_track+0x20/0x40 [ 22.073378] kasan_save_alloc_info+0x40/0x58 [ 22.073425] __kasan_slab_alloc+0xa8/0xb0 [ 22.073467] kmem_cache_alloc_noprof+0x10c/0x398 [ 22.073513] __kmem_cache_create_args+0x178/0x280 [ 22.073556] kmem_cache_double_destroy+0xc0/0x300 [ 22.073600] kunit_try_run_case+0x170/0x3f0 [ 22.073639] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.073684] kthread+0x328/0x630 [ 22.073720] ret_from_fork+0x10/0x20 [ 22.073760] [ 22.073780] Freed by task 225: [ 22.073811] kasan_save_stack+0x3c/0x68 [ 22.073851] kasan_save_track+0x20/0x40 [ 22.073891] kasan_save_free_info+0x4c/0x78 [ 22.073932] __kasan_slab_free+0x6c/0x98 [ 22.073973] kmem_cache_free+0x260/0x468 [ 22.074012] slab_kmem_cache_release+0x38/0x50 [ 22.074069] kmem_cache_release+0x1c/0x30 [ 22.074134] kobject_put+0x17c/0x420 [ 22.074178] sysfs_slab_release+0x1c/0x30 [ 22.074222] kmem_cache_destroy+0x118/0x218 [ 22.074263] kmem_cache_double_destroy+0x128/0x300 [ 22.074308] kunit_try_run_case+0x170/0x3f0 [ 22.074349] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.074397] kthread+0x328/0x630 [ 22.074434] ret_from_fork+0x10/0x20 [ 22.074473] [ 22.074496] The buggy address belongs to the object at fff00000c0cc5dc0 [ 22.074496] which belongs to the cache kmem_cache of size 208 [ 22.074559] The buggy address is located 0 bytes inside of [ 22.074559] freed 208-byte region [fff00000c0cc5dc0, fff00000c0cc5e90) [ 22.074628] [ 22.074654] The buggy address belongs to the physical page: [ 22.074693] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100cc5 [ 22.074756] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.074818] page_type: f5(slab) [ 22.074873] raw: 0bfffe0000000000 fff00000c0001000 dead000000000100 dead000000000122 [ 22.074929] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000 [ 22.074974] page dumped because: kasan: bad access detected [ 22.075010] [ 22.075048] Memory state around the buggy address: [ 22.075092] fff00000c0cc5c80: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.075141] fff00000c0cc5d00: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 22.075189] >fff00000c0cc5d80: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 22.075229] ^ [ 22.075268] fff00000c0cc5e00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 22.075311] fff00000c0cc5e80: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.075353] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 21.970942] ================================================================== [ 21.971127] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468 [ 21.971234] Read of size 1 at addr fff00000c7700000 by task kunit_try_catch/223 [ 21.971291] [ 21.971342] CPU: 1 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 21.971439] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.971471] Hardware name: linux,dummy-virt (DT) [ 21.971510] Call trace: [ 21.971538] show_stack+0x20/0x38 (C) [ 21.971601] dump_stack_lvl+0x8c/0xd0 [ 21.971660] print_report+0x118/0x608 [ 21.971713] kasan_report+0xdc/0x128 [ 21.971763] __asan_report_load1_noabort+0x20/0x30 [ 21.971817] kmem_cache_rcu_uaf+0x388/0x468 [ 21.971867] kunit_try_run_case+0x170/0x3f0 [ 21.971923] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.971982] kthread+0x328/0x630 [ 21.972046] ret_from_fork+0x10/0x20 [ 21.972108] [ 21.972130] Allocated by task 223: [ 21.972165] kasan_save_stack+0x3c/0x68 [ 21.972215] kasan_save_track+0x20/0x40 [ 21.972256] kasan_save_alloc_info+0x40/0x58 [ 21.972300] __kasan_slab_alloc+0xa8/0xb0 [ 21.972341] kmem_cache_alloc_noprof+0x10c/0x398 [ 21.972387] kmem_cache_rcu_uaf+0x12c/0x468 [ 21.972430] kunit_try_run_case+0x170/0x3f0 [ 21.972470] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.972517] kthread+0x328/0x630 [ 21.972574] ret_from_fork+0x10/0x20 [ 21.972615] [ 21.972640] Freed by task 0: [ 21.972672] kasan_save_stack+0x3c/0x68 [ 21.972715] kasan_save_track+0x20/0x40 [ 21.972756] kasan_save_free_info+0x4c/0x78 [ 21.972799] __kasan_slab_free+0x6c/0x98 [ 21.972839] slab_free_after_rcu_debug+0xd4/0x2f8 [ 21.972883] rcu_core+0x9f4/0x1e20 [ 21.972925] rcu_core_si+0x18/0x30 [ 21.972962] handle_softirqs+0x374/0xb28 [ 21.973006] __do_softirq+0x1c/0x28 [ 21.973060] [ 21.973083] Last potentially related work creation: [ 21.973113] kasan_save_stack+0x3c/0x68 [ 21.973156] kasan_record_aux_stack+0xb4/0xc8 [ 21.973202] kmem_cache_free+0x120/0x468 [ 21.973242] kmem_cache_rcu_uaf+0x16c/0x468 [ 21.973284] kunit_try_run_case+0x170/0x3f0 [ 21.973325] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.973372] kthread+0x328/0x630 [ 21.973406] ret_from_fork+0x10/0x20 [ 21.973446] [ 21.973466] The buggy address belongs to the object at fff00000c7700000 [ 21.973466] which belongs to the cache test_cache of size 200 [ 21.973531] The buggy address is located 0 bytes inside of [ 21.973531] freed 200-byte region [fff00000c7700000, fff00000c77000c8) [ 21.973597] [ 21.973621] The buggy address belongs to the physical page: [ 21.973660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107700 [ 21.973720] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.973776] page_type: f5(slab) [ 21.973822] raw: 0bfffe0000000000 fff00000c0cc5c80 dead000000000122 0000000000000000 [ 21.973875] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 21.973915] page dumped because: kasan: bad access detected [ 21.973947] [ 21.973964] Memory state around the buggy address: [ 21.973999] fff00000c76fff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.974055] fff00000c76fff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.974100] >fff00000c7700000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.974173] ^ [ 21.974206] fff00000c7700080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 21.974249] fff00000c7700100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.974287] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 21.890959] ================================================================== [ 21.891117] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 21.891208] Free of addr fff00000c7784001 by task kunit_try_catch/221 [ 21.891255] [ 21.891421] CPU: 0 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 21.891556] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.891658] Hardware name: linux,dummy-virt (DT) [ 21.891734] Call trace: [ 21.891766] show_stack+0x20/0x38 (C) [ 21.891830] dump_stack_lvl+0x8c/0xd0 [ 21.891888] print_report+0x118/0x608 [ 21.891945] kasan_report_invalid_free+0xc0/0xe8 [ 21.892011] check_slab_allocation+0xfc/0x108 [ 21.892086] __kasan_slab_pre_free+0x2c/0x48 [ 21.892142] kmem_cache_free+0xf0/0x468 [ 21.892196] kmem_cache_invalid_free+0x184/0x3c8 [ 21.892251] kunit_try_run_case+0x170/0x3f0 [ 21.892345] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.892460] kthread+0x328/0x630 [ 21.892576] ret_from_fork+0x10/0x20 [ 21.892643] [ 21.892666] Allocated by task 221: [ 21.892747] kasan_save_stack+0x3c/0x68 [ 21.892837] kasan_save_track+0x20/0x40 [ 21.892878] kasan_save_alloc_info+0x40/0x58 [ 21.892921] __kasan_slab_alloc+0xa8/0xb0 [ 21.892961] kmem_cache_alloc_noprof+0x10c/0x398 [ 21.893002] kmem_cache_invalid_free+0x12c/0x3c8 [ 21.893077] kunit_try_run_case+0x170/0x3f0 [ 21.893163] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.893312] kthread+0x328/0x630 [ 21.893502] ret_from_fork+0x10/0x20 [ 21.893705] [ 21.893787] The buggy address belongs to the object at fff00000c7784000 [ 21.893787] which belongs to the cache test_cache of size 200 [ 21.894211] The buggy address is located 1 bytes inside of [ 21.894211] 200-byte region [fff00000c7784000, fff00000c77840c8) [ 21.894361] [ 21.894388] The buggy address belongs to the physical page: [ 21.894422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107784 [ 21.894478] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.894532] page_type: f5(slab) [ 21.894577] raw: 0bfffe0000000000 fff00000c5beddc0 dead000000000122 0000000000000000 [ 21.894628] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 21.895524] page dumped because: kasan: bad access detected [ 21.895592] [ 21.895698] Memory state around the buggy address: [ 21.895900] fff00000c7783f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.895951] fff00000c7783f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.895995] >fff00000c7784000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.896046] ^ [ 21.896080] fff00000c7784080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 21.896124] fff00000c7784100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.896164] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 21.860426] ================================================================== [ 21.860540] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 21.860631] Free of addr fff00000c770e000 by task kunit_try_catch/219 [ 21.860684] [ 21.860729] CPU: 0 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 21.860833] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.860868] Hardware name: linux,dummy-virt (DT) [ 21.860905] Call trace: [ 21.860933] show_stack+0x20/0x38 (C) [ 21.860994] dump_stack_lvl+0x8c/0xd0 [ 21.861068] print_report+0x118/0x608 [ 21.861124] kasan_report_invalid_free+0xc0/0xe8 [ 21.861181] check_slab_allocation+0xd4/0x108 [ 21.861236] __kasan_slab_pre_free+0x2c/0x48 [ 21.861291] kmem_cache_free+0xf0/0x468 [ 21.861345] kmem_cache_double_free+0x190/0x3c8 [ 21.861399] kunit_try_run_case+0x170/0x3f0 [ 21.861453] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.861510] kthread+0x328/0x630 [ 21.861558] ret_from_fork+0x10/0x20 [ 21.861615] [ 21.861636] Allocated by task 219: [ 21.861670] kasan_save_stack+0x3c/0x68 [ 21.861717] kasan_save_track+0x20/0x40 [ 21.861757] kasan_save_alloc_info+0x40/0x58 [ 21.861801] __kasan_slab_alloc+0xa8/0xb0 [ 21.861841] kmem_cache_alloc_noprof+0x10c/0x398 [ 21.861881] kmem_cache_double_free+0x12c/0x3c8 [ 21.861924] kunit_try_run_case+0x170/0x3f0 [ 21.861962] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.862007] kthread+0x328/0x630 [ 21.862055] ret_from_fork+0x10/0x20 [ 21.862097] [ 21.862118] Freed by task 219: [ 21.862148] kasan_save_stack+0x3c/0x68 [ 21.862189] kasan_save_track+0x20/0x40 [ 21.862228] kasan_save_free_info+0x4c/0x78 [ 21.862271] __kasan_slab_free+0x6c/0x98 [ 21.862310] kmem_cache_free+0x260/0x468 [ 21.862348] kmem_cache_double_free+0x140/0x3c8 [ 21.862389] kunit_try_run_case+0x170/0x3f0 [ 21.862429] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.862503] kthread+0x328/0x630 [ 21.862541] ret_from_fork+0x10/0x20 [ 21.862580] [ 21.862603] The buggy address belongs to the object at fff00000c770e000 [ 21.862603] which belongs to the cache test_cache of size 200 [ 21.862667] The buggy address is located 0 bytes inside of [ 21.862667] 200-byte region [fff00000c770e000, fff00000c770e0c8) [ 21.862730] [ 21.862753] The buggy address belongs to the physical page: [ 21.862789] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770e [ 21.862849] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.862908] page_type: f5(slab) [ 21.862958] raw: 0bfffe0000000000 fff00000c5bedc80 dead000000000122 0000000000000000 [ 21.863012] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 21.863077] page dumped because: kasan: bad access detected [ 21.863113] [ 21.863132] Memory state around the buggy address: [ 21.863170] fff00000c770df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.863218] fff00000c770df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.863265] >fff00000c770e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.863306] ^ [ 21.863335] fff00000c770e080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 21.863381] fff00000c770e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.863424] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 21.724750] ================================================================== [ 21.724897] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430 [ 21.724984] Read of size 1 at addr fff00000c770c0c8 by task kunit_try_catch/217 [ 21.725064] [ 21.725114] CPU: 0 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 21.725214] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.725246] Hardware name: linux,dummy-virt (DT) [ 21.725281] Call trace: [ 21.725306] show_stack+0x20/0x38 (C) [ 21.725365] dump_stack_lvl+0x8c/0xd0 [ 21.725419] print_report+0x118/0x608 [ 21.725469] kasan_report+0xdc/0x128 [ 21.725516] __asan_report_load1_noabort+0x20/0x30 [ 21.725570] kmem_cache_oob+0x344/0x430 [ 21.725617] kunit_try_run_case+0x170/0x3f0 [ 21.725666] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.725721] kthread+0x328/0x630 [ 21.725767] ret_from_fork+0x10/0x20 [ 21.725818] [ 21.725837] Allocated by task 217: [ 21.725868] kasan_save_stack+0x3c/0x68 [ 21.725913] kasan_save_track+0x20/0x40 [ 21.725954] kasan_save_alloc_info+0x40/0x58 [ 21.725993] __kasan_slab_alloc+0xa8/0xb0 [ 21.726044] kmem_cache_alloc_noprof+0x10c/0x398 [ 21.726090] kmem_cache_oob+0x12c/0x430 [ 21.726126] kunit_try_run_case+0x170/0x3f0 [ 21.726164] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.726205] kthread+0x328/0x630 [ 21.726238] ret_from_fork+0x10/0x20 [ 21.726273] [ 21.726294] The buggy address belongs to the object at fff00000c770c000 [ 21.726294] which belongs to the cache test_cache of size 200 [ 21.726353] The buggy address is located 0 bytes to the right of [ 21.726353] allocated 200-byte region [fff00000c770c000, fff00000c770c0c8) [ 21.726416] [ 21.726439] The buggy address belongs to the physical page: [ 21.726470] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770c [ 21.726528] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.726582] page_type: f5(slab) [ 21.726628] raw: 0bfffe0000000000 fff00000c5bedb40 dead000000000122 0000000000000000 [ 21.726680] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 21.726722] page dumped because: kasan: bad access detected [ 21.726755] [ 21.726772] Memory state around the buggy address: [ 21.726807] fff00000c770bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.726853] fff00000c770c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.726897] >fff00000c770c080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 21.726936] ^ [ 21.726972] fff00000c770c100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.727016] fff00000c770c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.727476] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 21.685965] ================================================================== [ 21.686102] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 21.686259] Read of size 8 at addr fff00000c7707100 by task kunit_try_catch/210 [ 21.686316] [ 21.686567] CPU: 0 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 21.686713] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.686844] Hardware name: linux,dummy-virt (DT) [ 21.687000] Call trace: [ 21.687084] show_stack+0x20/0x38 (C) [ 21.687359] dump_stack_lvl+0x8c/0xd0 [ 21.687602] print_report+0x118/0x608 [ 21.687670] kasan_report+0xdc/0x128 [ 21.687771] __asan_report_load8_noabort+0x20/0x30 [ 21.688086] workqueue_uaf+0x480/0x4a8 [ 21.688341] kunit_try_run_case+0x170/0x3f0 [ 21.688560] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.688755] kthread+0x328/0x630 [ 21.689145] ret_from_fork+0x10/0x20 [ 21.689280] [ 21.689463] Allocated by task 210: [ 21.689597] kasan_save_stack+0x3c/0x68 [ 21.689740] kasan_save_track+0x20/0x40 [ 21.689792] kasan_save_alloc_info+0x40/0x58 [ 21.690114] __kasan_kmalloc+0xd4/0xd8 [ 21.690216] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.690314] workqueue_uaf+0x13c/0x4a8 [ 21.690552] kunit_try_run_case+0x170/0x3f0 [ 21.690610] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.690660] kthread+0x328/0x630 [ 21.690753] ret_from_fork+0x10/0x20 [ 21.690807] [ 21.690833] Freed by task 11: [ 21.690901] kasan_save_stack+0x3c/0x68 [ 21.690954] kasan_save_track+0x20/0x40 [ 21.691037] kasan_save_free_info+0x4c/0x78 [ 21.691258] __kasan_slab_free+0x6c/0x98 [ 21.691324] kfree+0x214/0x3c8 [ 21.691360] workqueue_uaf_work+0x18/0x30 [ 21.691404] process_one_work+0x530/0xf98 [ 21.691443] worker_thread+0x618/0xf38 [ 21.691483] kthread+0x328/0x630 [ 21.691514] ret_from_fork+0x10/0x20 [ 21.691552] [ 21.692108] Last potentially related work creation: [ 21.692151] kasan_save_stack+0x3c/0x68 [ 21.692206] kasan_record_aux_stack+0xb4/0xc8 [ 21.692261] __queue_work+0x65c/0xfe0 [ 21.692304] queue_work_on+0xbc/0xf8 [ 21.692340] workqueue_uaf+0x210/0x4a8 [ 21.692381] kunit_try_run_case+0x170/0x3f0 [ 21.692422] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.692470] kthread+0x328/0x630 [ 21.692507] ret_from_fork+0x10/0x20 [ 21.692557] [ 21.692582] The buggy address belongs to the object at fff00000c7707100 [ 21.692582] which belongs to the cache kmalloc-32 of size 32 [ 21.694252] The buggy address is located 0 bytes inside of [ 21.694252] freed 32-byte region [fff00000c7707100, fff00000c7707120) [ 21.694362] [ 21.694542] The buggy address belongs to the physical page: [ 21.694582] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107707 [ 21.694794] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.694860] page_type: f5(slab) [ 21.694914] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 21.695149] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 21.695342] page dumped because: kasan: bad access detected [ 21.695561] [ 21.695597] Memory state around the buggy address: [ 21.695640] fff00000c7707000: 00 00 03 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 21.695693] fff00000c7707080: 00 00 00 fc fc fc fc fc 00 00 00 07 fc fc fc fc [ 21.695761] >fff00000c7707100: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 21.695806] ^ [ 21.695839] fff00000c7707180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.695888] fff00000c7707200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.695933] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[ 21.658876] ================================================================== [ 21.659533] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 21.659630] Read of size 4 at addr fff00000c63e1f00 by task swapper/0/0 [ 21.659680] [ 21.659725] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 21.659822] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.659852] Hardware name: linux,dummy-virt (DT) [ 21.659885] Call trace: [ 21.659921] show_stack+0x20/0x38 (C) [ 21.660264] dump_stack_lvl+0x8c/0xd0 [ 21.660347] print_report+0x118/0x608 [ 21.660994] kasan_report+0xdc/0x128 [ 21.661092] __asan_report_load4_noabort+0x20/0x30 [ 21.661149] rcu_uaf_reclaim+0x64/0x70 [ 21.661202] rcu_core+0x9f4/0x1e20 [ 21.661255] rcu_core_si+0x18/0x30 [ 21.661302] handle_softirqs+0x374/0xb28 [ 21.661353] __do_softirq+0x1c/0x28 [ 21.661403] ____do_softirq+0x18/0x30 [ 21.661463] call_on_irq_stack+0x24/0x30 [ 21.661513] do_softirq_own_stack+0x24/0x38 [ 21.661568] __irq_exit_rcu+0x1fc/0x318 [ 21.661620] irq_exit_rcu+0x1c/0x80 [ 21.661664] el1_interrupt+0x38/0x58 [ 21.661717] el1h_64_irq_handler+0x18/0x28 [ 21.661766] el1h_64_irq+0x6c/0x70 [ 21.661897] arch_local_irq_enable+0x4/0x8 (P) [ 21.661952] do_idle+0x384/0x4e8 [ 21.661996] cpu_startup_entry+0x68/0x80 [ 21.662680] rest_init+0x160/0x188 [ 21.662772] start_kernel+0x30c/0x3d0 [ 21.662836] __primary_switched+0x8c/0xa0 [ 21.662894] [ 21.662915] Allocated by task 208: [ 21.662948] kasan_save_stack+0x3c/0x68 [ 21.662996] kasan_save_track+0x20/0x40 [ 21.663058] kasan_save_alloc_info+0x40/0x58 [ 21.663103] __kasan_kmalloc+0xd4/0xd8 [ 21.663141] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.663184] rcu_uaf+0xb0/0x2d8 [ 21.663218] kunit_try_run_case+0x170/0x3f0 [ 21.663258] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.663300] kthread+0x328/0x630 [ 21.663336] ret_from_fork+0x10/0x20 [ 21.663372] [ 21.663394] Freed by task 0: [ 21.663435] kasan_save_stack+0x3c/0x68 [ 21.663497] kasan_save_track+0x20/0x40 [ 21.663538] kasan_save_free_info+0x4c/0x78 [ 21.663619] __kasan_slab_free+0x6c/0x98 [ 21.663693] kfree+0x214/0x3c8 [ 21.663737] rcu_uaf_reclaim+0x28/0x70 [ 21.663810] rcu_core+0x9f4/0x1e20 [ 21.663897] rcu_core_si+0x18/0x30 [ 21.663938] handle_softirqs+0x374/0xb28 [ 21.663976] __do_softirq+0x1c/0x28 [ 21.664012] [ 21.664054] Last potentially related work creation: [ 21.664084] kasan_save_stack+0x3c/0x68 [ 21.664126] kasan_record_aux_stack+0xb4/0xc8 [ 21.664168] __call_rcu_common.constprop.0+0x74/0x8c8 [ 21.664212] call_rcu+0x18/0x30 [ 21.664261] rcu_uaf+0x14c/0x2d8 [ 21.664304] kunit_try_run_case+0x170/0x3f0 [ 21.664346] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.664394] kthread+0x328/0x630 [ 21.664429] ret_from_fork+0x10/0x20 [ 21.664468] [ 21.664490] The buggy address belongs to the object at fff00000c63e1f00 [ 21.664490] which belongs to the cache kmalloc-32 of size 32 [ 21.664586] The buggy address is located 0 bytes inside of [ 21.664586] freed 32-byte region [fff00000c63e1f00, fff00000c63e1f20) [ 21.664669] [ 21.664695] The buggy address belongs to the physical page: [ 21.664815] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063e1 [ 21.665125] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.665411] page_type: f5(slab) [ 21.665579] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 21.665674] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 21.665839] page dumped because: kasan: bad access detected [ 21.665882] [ 21.665904] Memory state around the buggy address: [ 21.666125] fff00000c63e1e00: 00 00 00 fc fc fc fc fc 00 00 05 fc fc fc fc fc [ 21.666273] fff00000c63e1e80: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 21.666345] >fff00000c63e1f00: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 21.666384] ^ [ 21.666416] fff00000c63e1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.666461] fff00000c63e2000: 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc [ 21.666722] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 21.400177] ================================================================== [ 21.400310] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 21.400425] Read of size 1 at addr fff00000c6423c00 by task kunit_try_catch/206 [ 21.400562] [ 21.400652] CPU: 0 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 21.400875] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.400953] Hardware name: linux,dummy-virt (DT) [ 21.401043] Call trace: [ 21.401098] show_stack+0x20/0x38 (C) [ 21.401218] dump_stack_lvl+0x8c/0xd0 [ 21.401335] print_report+0x118/0x608 [ 21.401456] kasan_report+0xdc/0x128 [ 21.401576] __asan_report_load1_noabort+0x20/0x30 [ 21.401704] ksize_uaf+0x598/0x5f8 [ 21.401811] kunit_try_run_case+0x170/0x3f0 [ 21.401934] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.403206] kthread+0x328/0x630 [ 21.403348] ret_from_fork+0x10/0x20 [ 21.403450] [ 21.403485] Allocated by task 206: [ 21.403535] kasan_save_stack+0x3c/0x68 [ 21.403604] kasan_save_track+0x20/0x40 [ 21.403677] kasan_save_alloc_info+0x40/0x58 [ 21.404267] __kasan_kmalloc+0xd4/0xd8 [ 21.404491] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.404920] ksize_uaf+0xb8/0x5f8 [ 21.405089] kunit_try_run_case+0x170/0x3f0 [ 21.405362] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.405541] kthread+0x328/0x630 [ 21.405624] ret_from_fork+0x10/0x20 [ 21.405875] [ 21.405940] Freed by task 206: [ 21.406164] kasan_save_stack+0x3c/0x68 [ 21.406254] kasan_save_track+0x20/0x40 [ 21.406351] kasan_save_free_info+0x4c/0x78 [ 21.407312] __kasan_slab_free+0x6c/0x98 [ 21.407407] kfree+0x214/0x3c8 [ 21.407871] ksize_uaf+0x11c/0x5f8 [ 21.408014] kunit_try_run_case+0x170/0x3f0 [ 21.408154] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.408560] kthread+0x328/0x630 [ 21.408682] ret_from_fork+0x10/0x20 [ 21.408809] [ 21.408966] The buggy address belongs to the object at fff00000c6423c00 [ 21.408966] which belongs to the cache kmalloc-128 of size 128 [ 21.409442] The buggy address is located 0 bytes inside of [ 21.409442] freed 128-byte region [fff00000c6423c00, fff00000c6423c80) [ 21.409721] [ 21.409963] The buggy address belongs to the physical page: [ 21.410164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106423 [ 21.410454] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.410682] page_type: f5(slab) [ 21.410771] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.411202] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.411312] page dumped because: kasan: bad access detected [ 21.411386] [ 21.411440] Memory state around the buggy address: [ 21.411546] fff00000c6423b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.411674] fff00000c6423b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.411766] >fff00000c6423c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.411881] ^ [ 21.411968] fff00000c6423c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.412115] fff00000c6423d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.412238] ================================================================== [ 21.413491] ================================================================== [ 21.413648] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 21.413756] Read of size 1 at addr fff00000c6423c78 by task kunit_try_catch/206 [ 21.413868] [ 21.413943] CPU: 0 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 21.414161] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.414231] Hardware name: linux,dummy-virt (DT) [ 21.414303] Call trace: [ 21.414352] show_stack+0x20/0x38 (C) [ 21.414457] dump_stack_lvl+0x8c/0xd0 [ 21.414564] print_report+0x118/0x608 [ 21.414672] kasan_report+0xdc/0x128 [ 21.414770] __asan_report_load1_noabort+0x20/0x30 [ 21.414887] ksize_uaf+0x544/0x5f8 [ 21.414986] kunit_try_run_case+0x170/0x3f0 [ 21.415104] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.415222] kthread+0x328/0x630 [ 21.415318] ret_from_fork+0x10/0x20 [ 21.415427] [ 21.415472] Allocated by task 206: [ 21.415536] kasan_save_stack+0x3c/0x68 [ 21.415624] kasan_save_track+0x20/0x40 [ 21.415739] kasan_save_alloc_info+0x40/0x58 [ 21.415825] __kasan_kmalloc+0xd4/0xd8 [ 21.415934] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.416055] ksize_uaf+0xb8/0x5f8 [ 21.416151] kunit_try_run_case+0x170/0x3f0 [ 21.416245] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.416332] kthread+0x328/0x630 [ 21.416404] ret_from_fork+0x10/0x20 [ 21.416497] [ 21.416564] Freed by task 206: [ 21.416634] kasan_save_stack+0x3c/0x68 [ 21.416738] kasan_save_track+0x20/0x40 [ 21.416849] kasan_save_free_info+0x4c/0x78 [ 21.417111] __kasan_slab_free+0x6c/0x98 [ 21.417234] kfree+0x214/0x3c8 [ 21.417302] ksize_uaf+0x11c/0x5f8 [ 21.417361] kunit_try_run_case+0x170/0x3f0 [ 21.417457] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.417542] kthread+0x328/0x630 [ 21.417636] ret_from_fork+0x10/0x20 [ 21.417709] [ 21.417765] The buggy address belongs to the object at fff00000c6423c00 [ 21.417765] which belongs to the cache kmalloc-128 of size 128 [ 21.417908] The buggy address is located 120 bytes inside of [ 21.417908] freed 128-byte region [fff00000c6423c00, fff00000c6423c80) [ 21.418092] [ 21.418135] The buggy address belongs to the physical page: [ 21.418217] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106423 [ 21.418340] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.418448] page_type: f5(slab) [ 21.418550] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.418641] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.418723] page dumped because: kasan: bad access detected [ 21.418798] [ 21.418839] Memory state around the buggy address: [ 21.418900] fff00000c6423b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.419010] fff00000c6423b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.419109] >fff00000c6423c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.419227] ^ [ 21.419358] fff00000c6423c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.419487] fff00000c6423d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.419611] ================================================================== [ 21.387913] ================================================================== [ 21.388079] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 21.388208] Read of size 1 at addr fff00000c6423c00 by task kunit_try_catch/206 [ 21.388321] [ 21.388404] CPU: 0 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 21.388627] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.388703] Hardware name: linux,dummy-virt (DT) [ 21.388782] Call trace: [ 21.388834] show_stack+0x20/0x38 (C) [ 21.388948] dump_stack_lvl+0x8c/0xd0 [ 21.390851] print_report+0x118/0x608 [ 21.391151] kasan_report+0xdc/0x128 [ 21.391496] __kasan_check_byte+0x54/0x70 [ 21.391617] ksize+0x30/0x88 [ 21.391716] ksize_uaf+0x168/0x5f8 [ 21.391811] kunit_try_run_case+0x170/0x3f0 [ 21.391925] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.392055] kthread+0x328/0x630 [ 21.392157] ret_from_fork+0x10/0x20 [ 21.392265] [ 21.392311] Allocated by task 206: [ 21.392373] kasan_save_stack+0x3c/0x68 [ 21.392468] kasan_save_track+0x20/0x40 [ 21.392561] kasan_save_alloc_info+0x40/0x58 [ 21.392666] __kasan_kmalloc+0xd4/0xd8 [ 21.392781] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.392886] ksize_uaf+0xb8/0x5f8 [ 21.392994] kunit_try_run_case+0x170/0x3f0 [ 21.393090] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.393181] kthread+0x328/0x630 [ 21.394082] ret_from_fork+0x10/0x20 [ 21.394203] [ 21.394283] Freed by task 206: [ 21.394392] kasan_save_stack+0x3c/0x68 [ 21.394480] kasan_save_track+0x20/0x40 [ 21.394559] kasan_save_free_info+0x4c/0x78 [ 21.394671] __kasan_slab_free+0x6c/0x98 [ 21.394760] kfree+0x214/0x3c8 [ 21.394843] ksize_uaf+0x11c/0x5f8 [ 21.394909] kunit_try_run_case+0x170/0x3f0 [ 21.394982] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.395078] kthread+0x328/0x630 [ 21.395152] ret_from_fork+0x10/0x20 [ 21.395230] [ 21.395272] The buggy address belongs to the object at fff00000c6423c00 [ 21.395272] which belongs to the cache kmalloc-128 of size 128 [ 21.395788] The buggy address is located 0 bytes inside of [ 21.395788] freed 128-byte region [fff00000c6423c00, fff00000c6423c80) [ 21.396282] [ 21.396393] The buggy address belongs to the physical page: [ 21.396484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106423 [ 21.396642] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.396782] page_type: f5(slab) [ 21.396870] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.397244] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.397389] page dumped because: kasan: bad access detected [ 21.397517] [ 21.397556] Memory state around the buggy address: [ 21.397645] fff00000c6423b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.397920] fff00000c6423b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.398016] >fff00000c6423c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.398188] ^ [ 21.398286] fff00000c6423c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.398380] fff00000c6423d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.398468] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 21.352553] ================================================================== [ 21.352810] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 21.353210] Read of size 1 at addr fff00000c6423b78 by task kunit_try_catch/204 [ 21.353457] [ 21.353678] CPU: 0 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 21.354178] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.354226] Hardware name: linux,dummy-virt (DT) [ 21.354302] Call trace: [ 21.354384] show_stack+0x20/0x38 (C) [ 21.354552] dump_stack_lvl+0x8c/0xd0 [ 21.354684] print_report+0x118/0x608 [ 21.354810] kasan_report+0xdc/0x128 [ 21.354925] __asan_report_load1_noabort+0x20/0x30 [ 21.355209] ksize_unpoisons_memory+0x618/0x740 [ 21.355336] kunit_try_run_case+0x170/0x3f0 [ 21.355438] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.355550] kthread+0x328/0x630 [ 21.355670] ret_from_fork+0x10/0x20 [ 21.355792] [ 21.355832] Allocated by task 204: [ 21.355896] kasan_save_stack+0x3c/0x68 [ 21.356000] kasan_save_track+0x20/0x40 [ 21.356106] kasan_save_alloc_info+0x40/0x58 [ 21.356200] __kasan_kmalloc+0xd4/0xd8 [ 21.356295] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.356396] ksize_unpoisons_memory+0xc0/0x740 [ 21.356493] kunit_try_run_case+0x170/0x3f0 [ 21.356597] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.356730] kthread+0x328/0x630 [ 21.356813] ret_from_fork+0x10/0x20 [ 21.356914] [ 21.356986] The buggy address belongs to the object at fff00000c6423b00 [ 21.356986] which belongs to the cache kmalloc-128 of size 128 [ 21.357138] The buggy address is located 5 bytes to the right of [ 21.357138] allocated 115-byte region [fff00000c6423b00, fff00000c6423b73) [ 21.357301] [ 21.357356] The buggy address belongs to the physical page: [ 21.357867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106423 [ 21.358141] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.358259] page_type: f5(slab) [ 21.358342] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.358458] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.358562] page dumped because: kasan: bad access detected [ 21.358637] [ 21.358679] Memory state around the buggy address: [ 21.358753] fff00000c6423a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.358854] fff00000c6423a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.358957] >fff00000c6423b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 21.359528] ^ [ 21.359834] fff00000c6423b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.360109] fff00000c6423c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.360337] ================================================================== [ 21.339912] ================================================================== [ 21.340100] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 21.340246] Read of size 1 at addr fff00000c6423b73 by task kunit_try_catch/204 [ 21.340364] [ 21.340450] CPU: 0 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 21.340692] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.340777] Hardware name: linux,dummy-virt (DT) [ 21.340853] Call trace: [ 21.340908] show_stack+0x20/0x38 (C) [ 21.341671] dump_stack_lvl+0x8c/0xd0 [ 21.342116] print_report+0x118/0x608 [ 21.342381] kasan_report+0xdc/0x128 [ 21.342612] __asan_report_load1_noabort+0x20/0x30 [ 21.342820] ksize_unpoisons_memory+0x628/0x740 [ 21.343161] kunit_try_run_case+0x170/0x3f0 [ 21.343349] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.343476] kthread+0x328/0x630 [ 21.343609] ret_from_fork+0x10/0x20 [ 21.343742] [ 21.343833] Allocated by task 204: [ 21.343940] kasan_save_stack+0x3c/0x68 [ 21.344295] kasan_save_track+0x20/0x40 [ 21.344433] kasan_save_alloc_info+0x40/0x58 [ 21.344549] __kasan_kmalloc+0xd4/0xd8 [ 21.344638] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.344804] ksize_unpoisons_memory+0xc0/0x740 [ 21.345016] kunit_try_run_case+0x170/0x3f0 [ 21.345412] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.345610] kthread+0x328/0x630 [ 21.345733] ret_from_fork+0x10/0x20 [ 21.346042] [ 21.346124] The buggy address belongs to the object at fff00000c6423b00 [ 21.346124] which belongs to the cache kmalloc-128 of size 128 [ 21.346305] The buggy address is located 0 bytes to the right of [ 21.346305] allocated 115-byte region [fff00000c6423b00, fff00000c6423b73) [ 21.346725] [ 21.346777] The buggy address belongs to the physical page: [ 21.346852] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106423 [ 21.347004] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.347124] page_type: f5(slab) [ 21.347340] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.347711] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.347892] page dumped because: kasan: bad access detected [ 21.347962] [ 21.348003] Memory state around the buggy address: [ 21.348085] fff00000c6423a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.348281] fff00000c6423a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.348469] >fff00000c6423b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 21.348758] ^ [ 21.348861] fff00000c6423b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.349035] fff00000c6423c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.349260] ================================================================== [ 21.362704] ================================================================== [ 21.362810] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 21.363136] Read of size 1 at addr fff00000c6423b7f by task kunit_try_catch/204 [ 21.363361] [ 21.363439] CPU: 0 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 21.363651] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.363718] Hardware name: linux,dummy-virt (DT) [ 21.363843] Call trace: [ 21.363906] show_stack+0x20/0x38 (C) [ 21.364102] dump_stack_lvl+0x8c/0xd0 [ 21.364245] print_report+0x118/0x608 [ 21.364378] kasan_report+0xdc/0x128 [ 21.364515] __asan_report_load1_noabort+0x20/0x30 [ 21.364659] ksize_unpoisons_memory+0x690/0x740 [ 21.364784] kunit_try_run_case+0x170/0x3f0 [ 21.364893] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.365353] kthread+0x328/0x630 [ 21.365523] ret_from_fork+0x10/0x20 [ 21.365659] [ 21.365696] Allocated by task 204: [ 21.365771] kasan_save_stack+0x3c/0x68 [ 21.365857] kasan_save_track+0x20/0x40 [ 21.365957] kasan_save_alloc_info+0x40/0x58 [ 21.366120] __kasan_kmalloc+0xd4/0xd8 [ 21.366201] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.366348] ksize_unpoisons_memory+0xc0/0x740 [ 21.366482] kunit_try_run_case+0x170/0x3f0 [ 21.366565] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.366661] kthread+0x328/0x630 [ 21.366734] ret_from_fork+0x10/0x20 [ 21.366828] [ 21.366889] The buggy address belongs to the object at fff00000c6423b00 [ 21.366889] which belongs to the cache kmalloc-128 of size 128 [ 21.367057] The buggy address is located 12 bytes to the right of [ 21.367057] allocated 115-byte region [fff00000c6423b00, fff00000c6423b73) [ 21.367230] [ 21.367295] The buggy address belongs to the physical page: [ 21.367404] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106423 [ 21.367582] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.367715] page_type: f5(slab) [ 21.367829] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 21.368000] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 21.368155] page dumped because: kasan: bad access detected [ 21.368237] [ 21.368272] Memory state around the buggy address: [ 21.368335] fff00000c6423a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.368452] fff00000c6423a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.368560] >fff00000c6423b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 21.368659] ^ [ 21.368751] fff00000c6423b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.368850] fff00000c6423c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.368996] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
[ 21.303968] ================================================================== [ 21.304178] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 21.304314] Free of addr fff00000c6058180 by task kunit_try_catch/202 [ 21.304408] [ 21.304487] CPU: 0 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 21.304726] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.304802] Hardware name: linux,dummy-virt (DT) [ 21.304886] Call trace: [ 21.305149] show_stack+0x20/0x38 (C) [ 21.305279] dump_stack_lvl+0x8c/0xd0 [ 21.305734] print_report+0x118/0x608 [ 21.305867] kasan_report_invalid_free+0xc0/0xe8 [ 21.306013] check_slab_allocation+0xd4/0x108 [ 21.306250] __kasan_slab_pre_free+0x2c/0x48 [ 21.306399] kfree+0xe8/0x3c8 [ 21.306602] kfree_sensitive+0x3c/0xb0 [ 21.306918] kmalloc_double_kzfree+0x168/0x308 [ 21.307060] kunit_try_run_case+0x170/0x3f0 [ 21.307176] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.307420] kthread+0x328/0x630 [ 21.307632] ret_from_fork+0x10/0x20 [ 21.307972] [ 21.308031] Allocated by task 202: [ 21.308171] kasan_save_stack+0x3c/0x68 [ 21.308381] kasan_save_track+0x20/0x40 [ 21.308748] kasan_save_alloc_info+0x40/0x58 [ 21.308915] __kasan_kmalloc+0xd4/0xd8 [ 21.309003] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.309172] kmalloc_double_kzfree+0xb8/0x308 [ 21.309271] kunit_try_run_case+0x170/0x3f0 [ 21.309370] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.309476] kthread+0x328/0x630 [ 21.309561] ret_from_fork+0x10/0x20 [ 21.309647] [ 21.309700] Freed by task 202: [ 21.309767] kasan_save_stack+0x3c/0x68 [ 21.309862] kasan_save_track+0x20/0x40 [ 21.310150] kasan_save_free_info+0x4c/0x78 [ 21.310323] __kasan_slab_free+0x6c/0x98 [ 21.310579] kfree+0x214/0x3c8 [ 21.310726] kfree_sensitive+0x80/0xb0 [ 21.310986] kmalloc_double_kzfree+0x11c/0x308 [ 21.311348] kunit_try_run_case+0x170/0x3f0 [ 21.311454] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.311583] kthread+0x328/0x630 [ 21.311660] ret_from_fork+0x10/0x20 [ 21.311895] [ 21.311979] The buggy address belongs to the object at fff00000c6058180 [ 21.311979] which belongs to the cache kmalloc-16 of size 16 [ 21.312160] The buggy address is located 0 bytes inside of [ 21.312160] 16-byte region [fff00000c6058180, fff00000c6058190) [ 21.312316] [ 21.312375] The buggy address belongs to the physical page: [ 21.312454] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106058 [ 21.312604] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.313065] page_type: f5(slab) [ 21.313172] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.313697] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.313813] page dumped because: kasan: bad access detected [ 21.314136] [ 21.314212] Memory state around the buggy address: [ 21.314460] fff00000c6058080: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 21.314738] fff00000c6058100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.314912] >fff00000c6058180: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.314996] ^ [ 21.315298] fff00000c6058200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.315468] fff00000c6058280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.315623] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[ 21.282169] ================================================================== [ 21.282342] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 21.282485] Read of size 1 at addr fff00000c6058180 by task kunit_try_catch/202 [ 21.282977] [ 21.283205] CPU: 0 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 21.283466] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.283536] Hardware name: linux,dummy-virt (DT) [ 21.283606] Call trace: [ 21.283703] show_stack+0x20/0x38 (C) [ 21.283977] dump_stack_lvl+0x8c/0xd0 [ 21.284296] print_report+0x118/0x608 [ 21.284577] kasan_report+0xdc/0x128 [ 21.284716] __kasan_check_byte+0x54/0x70 [ 21.285181] kfree_sensitive+0x30/0xb0 [ 21.285311] kmalloc_double_kzfree+0x168/0x308 [ 21.285555] kunit_try_run_case+0x170/0x3f0 [ 21.285917] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.286053] kthread+0x328/0x630 [ 21.286248] ret_from_fork+0x10/0x20 [ 21.286517] [ 21.286562] Allocated by task 202: [ 21.286631] kasan_save_stack+0x3c/0x68 [ 21.286924] kasan_save_track+0x20/0x40 [ 21.287195] kasan_save_alloc_info+0x40/0x58 [ 21.287432] __kasan_kmalloc+0xd4/0xd8 [ 21.287555] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.287646] kmalloc_double_kzfree+0xb8/0x308 [ 21.287741] kunit_try_run_case+0x170/0x3f0 [ 21.287838] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.287948] kthread+0x328/0x630 [ 21.288042] ret_from_fork+0x10/0x20 [ 21.288139] [ 21.288187] Freed by task 202: [ 21.288259] kasan_save_stack+0x3c/0x68 [ 21.288357] kasan_save_track+0x20/0x40 [ 21.288875] kasan_save_free_info+0x4c/0x78 [ 21.289146] __kasan_slab_free+0x6c/0x98 [ 21.289244] kfree+0x214/0x3c8 [ 21.289372] kfree_sensitive+0x80/0xb0 [ 21.289840] kmalloc_double_kzfree+0x11c/0x308 [ 21.289962] kunit_try_run_case+0x170/0x3f0 [ 21.290115] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.290248] kthread+0x328/0x630 [ 21.290409] ret_from_fork+0x10/0x20 [ 21.290500] [ 21.290544] The buggy address belongs to the object at fff00000c6058180 [ 21.290544] which belongs to the cache kmalloc-16 of size 16 [ 21.290660] The buggy address is located 0 bytes inside of [ 21.290660] freed 16-byte region [fff00000c6058180, fff00000c6058190) [ 21.290805] [ 21.290853] The buggy address belongs to the physical page: [ 21.290956] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106058 [ 21.291403] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.291605] page_type: f5(slab) [ 21.291742] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.292146] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.292272] page dumped because: kasan: bad access detected [ 21.292439] [ 21.292507] Memory state around the buggy address: [ 21.292718] fff00000c6058080: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 21.293044] fff00000c6058100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.293167] >fff00000c6058180: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.293926] ^ [ 21.294202] fff00000c6058200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.294322] fff00000c6058280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.294758] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[ 21.225430] ================================================================== [ 21.225614] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 21.225766] Read of size 1 at addr fff00000c0b94228 by task kunit_try_catch/198 [ 21.225893] [ 21.226879] CPU: 0 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 21.227698] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.227793] Hardware name: linux,dummy-virt (DT) [ 21.227939] Call trace: [ 21.227996] show_stack+0x20/0x38 (C) [ 21.228379] dump_stack_lvl+0x8c/0xd0 [ 21.229468] print_report+0x118/0x608 [ 21.230053] kasan_report+0xdc/0x128 [ 21.230472] __asan_report_load1_noabort+0x20/0x30 [ 21.230911] kmalloc_uaf2+0x3f4/0x468 [ 21.231107] kunit_try_run_case+0x170/0x3f0 [ 21.231438] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.231712] kthread+0x328/0x630 [ 21.231872] ret_from_fork+0x10/0x20 [ 21.232003] [ 21.232058] Allocated by task 198: [ 21.232134] kasan_save_stack+0x3c/0x68 [ 21.232505] kasan_save_track+0x20/0x40 [ 21.232854] kasan_save_alloc_info+0x40/0x58 [ 21.233505] __kasan_kmalloc+0xd4/0xd8 [ 21.234001] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.234250] kmalloc_uaf2+0xc4/0x468 [ 21.234388] kunit_try_run_case+0x170/0x3f0 [ 21.235094] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.235267] kthread+0x328/0x630 [ 21.235516] ret_from_fork+0x10/0x20 [ 21.235613] [ 21.235656] Freed by task 198: [ 21.235721] kasan_save_stack+0x3c/0x68 [ 21.235807] kasan_save_track+0x20/0x40 [ 21.236748] kasan_save_free_info+0x4c/0x78 [ 21.237123] __kasan_slab_free+0x6c/0x98 [ 21.237740] kfree+0x214/0x3c8 [ 21.237959] kmalloc_uaf2+0x134/0x468 [ 21.238310] kunit_try_run_case+0x170/0x3f0 [ 21.238420] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.238726] kthread+0x328/0x630 [ 21.238961] ret_from_fork+0x10/0x20 [ 21.239459] [ 21.239572] The buggy address belongs to the object at fff00000c0b94200 [ 21.239572] which belongs to the cache kmalloc-64 of size 64 [ 21.239919] The buggy address is located 40 bytes inside of [ 21.239919] freed 64-byte region [fff00000c0b94200, fff00000c0b94240) [ 21.240366] [ 21.240571] The buggy address belongs to the physical page: [ 21.240657] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b94 [ 21.241537] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.242053] page_type: f5(slab) [ 21.242163] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.242269] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.242330] page dumped because: kasan: bad access detected [ 21.242363] [ 21.242381] Memory state around the buggy address: [ 21.242420] fff00000c0b94100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.242465] fff00000c0b94180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.242509] >fff00000c0b94200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.242547] ^ [ 21.242581] fff00000c0b94280: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 21.242624] fff00000c0b94300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.242663] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 21.180379] ================================================================== [ 21.180737] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 21.180901] Write of size 33 at addr fff00000c0b94080 by task kunit_try_catch/196 [ 21.181047] [ 21.181762] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 21.182067] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.182786] Hardware name: linux,dummy-virt (DT) [ 21.182948] Call trace: [ 21.183081] show_stack+0x20/0x38 (C) [ 21.183236] dump_stack_lvl+0x8c/0xd0 [ 21.183778] print_report+0x118/0x608 [ 21.184262] kasan_report+0xdc/0x128 [ 21.184573] kasan_check_range+0x100/0x1a8 [ 21.184751] __asan_memset+0x34/0x78 [ 21.185273] kmalloc_uaf_memset+0x170/0x310 [ 21.185488] kunit_try_run_case+0x170/0x3f0 [ 21.185616] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.185952] kthread+0x328/0x630 [ 21.186407] ret_from_fork+0x10/0x20 [ 21.186546] [ 21.186593] Allocated by task 196: [ 21.186667] kasan_save_stack+0x3c/0x68 [ 21.186777] kasan_save_track+0x20/0x40 [ 21.186871] kasan_save_alloc_info+0x40/0x58 [ 21.187250] __kasan_kmalloc+0xd4/0xd8 [ 21.187959] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.188522] kmalloc_uaf_memset+0xb8/0x310 [ 21.188726] kunit_try_run_case+0x170/0x3f0 [ 21.188843] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.188970] kthread+0x328/0x630 [ 21.189537] ret_from_fork+0x10/0x20 [ 21.189704] [ 21.189762] Freed by task 196: [ 21.189898] kasan_save_stack+0x3c/0x68 [ 21.190000] kasan_save_track+0x20/0x40 [ 21.190158] kasan_save_free_info+0x4c/0x78 [ 21.190341] __kasan_slab_free+0x6c/0x98 [ 21.190442] kfree+0x214/0x3c8 [ 21.190512] kmalloc_uaf_memset+0x11c/0x310 [ 21.190590] kunit_try_run_case+0x170/0x3f0 [ 21.190672] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.191235] kthread+0x328/0x630 [ 21.191340] ret_from_fork+0x10/0x20 [ 21.191598] [ 21.191652] The buggy address belongs to the object at fff00000c0b94080 [ 21.191652] which belongs to the cache kmalloc-64 of size 64 [ 21.192215] The buggy address is located 0 bytes inside of [ 21.192215] freed 64-byte region [fff00000c0b94080, fff00000c0b940c0) [ 21.192625] [ 21.192712] The buggy address belongs to the physical page: [ 21.192952] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b94 [ 21.193204] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.193428] page_type: f5(slab) [ 21.193542] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.194085] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.194264] page dumped because: kasan: bad access detected [ 21.194359] [ 21.194477] Memory state around the buggy address: [ 21.194562] fff00000c0b93f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.194966] fff00000c0b94000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.195109] >fff00000c0b94080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.195424] ^ [ 21.195502] fff00000c0b94100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.195711] fff00000c0b94180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.195819] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[ 21.159769] ================================================================== [ 21.160036] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 21.160217] Read of size 1 at addr fff00000c6058168 by task kunit_try_catch/194 [ 21.160367] [ 21.160496] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 21.160827] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.160908] Hardware name: linux,dummy-virt (DT) [ 21.160997] Call trace: [ 21.161064] show_stack+0x20/0x38 (C) [ 21.161181] dump_stack_lvl+0x8c/0xd0 [ 21.161294] print_report+0x118/0x608 [ 21.161419] kasan_report+0xdc/0x128 [ 21.161541] __asan_report_load1_noabort+0x20/0x30 [ 21.161650] kmalloc_uaf+0x300/0x338 [ 21.161752] kunit_try_run_case+0x170/0x3f0 [ 21.161866] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.162006] kthread+0x328/0x630 [ 21.162180] ret_from_fork+0x10/0x20 [ 21.162319] [ 21.162389] Allocated by task 194: [ 21.162526] kasan_save_stack+0x3c/0x68 [ 21.162667] kasan_save_track+0x20/0x40 [ 21.162794] kasan_save_alloc_info+0x40/0x58 [ 21.162893] __kasan_kmalloc+0xd4/0xd8 [ 21.162966] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.163055] kmalloc_uaf+0xb8/0x338 [ 21.163153] kunit_try_run_case+0x170/0x3f0 [ 21.163240] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.163328] kthread+0x328/0x630 [ 21.163397] ret_from_fork+0x10/0x20 [ 21.163484] [ 21.163528] Freed by task 194: [ 21.163590] kasan_save_stack+0x3c/0x68 [ 21.163677] kasan_save_track+0x20/0x40 [ 21.163782] kasan_save_free_info+0x4c/0x78 [ 21.163886] __kasan_slab_free+0x6c/0x98 [ 21.163989] kfree+0x214/0x3c8 [ 21.164129] kmalloc_uaf+0x11c/0x338 [ 21.164220] kunit_try_run_case+0x170/0x3f0 [ 21.164315] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.164415] kthread+0x328/0x630 [ 21.164497] ret_from_fork+0x10/0x20 [ 21.164595] [ 21.164651] The buggy address belongs to the object at fff00000c6058160 [ 21.164651] which belongs to the cache kmalloc-16 of size 16 [ 21.164785] The buggy address is located 8 bytes inside of [ 21.164785] freed 16-byte region [fff00000c6058160, fff00000c6058170) [ 21.164919] [ 21.164972] The buggy address belongs to the physical page: [ 21.165089] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106058 [ 21.165290] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.165457] page_type: f5(slab) [ 21.165549] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 21.165714] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 21.165861] page dumped because: kasan: bad access detected [ 21.165973] [ 21.166029] Memory state around the buggy address: [ 21.166142] fff00000c6058000: 00 00 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 21.166240] fff00000c6058080: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 21.166330] >fff00000c6058100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 21.166413] ^ [ 21.166502] fff00000c6058180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.166644] fff00000c6058200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.166895] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 21.140978] ================================================================== [ 21.141174] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0 [ 21.141311] Read of size 64 at addr fff00000c7705d84 by task kunit_try_catch/192 [ 21.141415] [ 21.141534] CPU: 0 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 21.141746] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.141822] Hardware name: linux,dummy-virt (DT) [ 21.141901] Call trace: [ 21.141965] show_stack+0x20/0x38 (C) [ 21.142138] dump_stack_lvl+0x8c/0xd0 [ 21.142240] print_report+0x118/0x608 [ 21.142334] kasan_report+0xdc/0x128 [ 21.142426] kasan_check_range+0x100/0x1a8 [ 21.142551] __asan_memmove+0x3c/0x98 [ 21.142657] kmalloc_memmove_invalid_size+0x154/0x2e0 [ 21.142839] kunit_try_run_case+0x170/0x3f0 [ 21.142967] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.143096] kthread+0x328/0x630 [ 21.143180] ret_from_fork+0x10/0x20 [ 21.143282] [ 21.143328] Allocated by task 192: [ 21.143390] kasan_save_stack+0x3c/0x68 [ 21.143495] kasan_save_track+0x20/0x40 [ 21.143611] kasan_save_alloc_info+0x40/0x58 [ 21.143746] __kasan_kmalloc+0xd4/0xd8 [ 21.143824] __kmalloc_cache_noprof+0x16c/0x3c0 [ 21.143898] kmalloc_memmove_invalid_size+0xb0/0x2e0 [ 21.144011] kunit_try_run_case+0x170/0x3f0 [ 21.144154] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.144252] kthread+0x328/0x630 [ 21.144331] ret_from_fork+0x10/0x20 [ 21.144426] [ 21.144490] The buggy address belongs to the object at fff00000c7705d80 [ 21.144490] which belongs to the cache kmalloc-64 of size 64 [ 21.144700] The buggy address is located 4 bytes inside of [ 21.144700] allocated 64-byte region [fff00000c7705d80, fff00000c7705dc0) [ 21.144993] [ 21.145053] The buggy address belongs to the physical page: [ 21.145143] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107705 [ 21.145298] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 21.145443] page_type: f5(slab) [ 21.145540] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 21.145672] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 21.145819] page dumped because: kasan: bad access detected [ 21.145900] [ 21.145942] Memory state around the buggy address: [ 21.146722] fff00000c7705c80: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc [ 21.146865] fff00000c7705d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 21.146966] >fff00000c7705d80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 21.147069] ^ [ 21.147161] fff00000c7705e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.147256] fff00000c7705e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.147347] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 20.474363] ================================================================== [ 20.474603] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 20.474796] Read of size 18446744073709551614 at addr fff00000ffe9c004 by task kunit_try_catch/190 [ 20.475421] [ 20.475542] CPU: 0 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 20.475750] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.475819] Hardware name: linux,dummy-virt (DT) [ 20.475894] Call trace: [ 20.475947] show_stack+0x20/0x38 (C) [ 20.476069] dump_stack_lvl+0x8c/0xd0 [ 20.476173] print_report+0x118/0x608 [ 20.476267] kasan_report+0xdc/0x128 [ 20.476400] kasan_check_range+0x100/0x1a8 [ 20.476543] __asan_memmove+0x3c/0x98 [ 20.476694] kmalloc_memmove_negative_size+0x154/0x2e0 [ 20.476815] kunit_try_run_case+0x170/0x3f0 [ 20.476919] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.477054] kthread+0x328/0x630 [ 20.477160] ret_from_fork+0x10/0x20 [ 20.477308] [ 20.477399] Allocated by task 2846403498: [ 20.477907] ------------[ cut here ]------------ [ 20.478034] pool index 44973 out of bounds (214) for stack id adacafae [ 20.480984] WARNING: lib/stackdepot.c:451 at depot_fetch_stack+0x6c/0x90, CPU#0: kunit_try_catch/190 [ 21.007519] Modules linked in: [ 21.009094] CPU: 0 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 21.009981] Tainted: [B]=BAD_PAGE, [N]=TEST [ 21.010343] Hardware name: linux,dummy-virt (DT) [ 21.010954] pstate: 624020c9 (nZCv daIF +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 21.011609] pc : depot_fetch_stack+0x6c/0x90 [ 21.011974] lr : depot_fetch_stack+0x6c/0x90 [ 21.012457] sp : ffff8000809a7a20 [ 21.012855] x29: ffff8000809a7a20 x28: ffffacab7ce6f000 x27: 1ffff00010010f60 [ 21.013811] x26: 1ffff00010010f5f x25: 0000000000000000 x24: ffffacab75d665dc [ 21.014478] x23: ffffc1ffc3ffa700 x22: ffffacab7a7e1750 x21: ffffacab7a7e4ab8 [ 21.015130] x20: fff00000ffe9c004 x19: ffff8000809a7b30 x18: 0000000069a4f0ae [ 21.015757] x17: 00000000d797b4ed x16: 00000000f1f1f1f1 x15: 0000000000000007 [ 21.016456] x14: 0000000000000000 x13: 0000000000000007 x12: ffff700010134ea1 [ 21.017249] x11: 1ffff00010134ea0 x10: ffff700010134ea0 x9 : ffffacab756eba6c [ 21.017973] x8 : ffff8000809a7507 x7 : 0000000000000001 x6 : ffff700010134ea0 [ 21.018609] x5 : ffff8000809a7500 x4 : 1ffe000018ee7799 x3 : dfff800000000000 [ 21.019251] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c773bcc0 [ 21.019946] Call trace: [ 21.020283] depot_fetch_stack+0x6c/0x90 (P) [ 21.020687] stack_depot_print+0x24/0x60 [ 21.021120] print_report+0x5e4/0x608 [ 21.021503] kasan_report+0xdc/0x128 [ 21.021847] kasan_check_range+0x100/0x1a8 [ 21.022306] __asan_memmove+0x3c/0x98 [ 21.022683] kmalloc_memmove_negative_size+0x154/0x2e0 [ 21.023187] kunit_try_run_case+0x170/0x3f0 [ 21.023537] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.024045] kthread+0x328/0x630 [ 21.024401] ret_from_fork+0x10/0x20 [ 21.024974] ---[ end trace 0000000000000000 ]--- [ 21.025902] ------------[ cut here ]------------ [ 21.025975] corrupt handle or use after stack_depot_put() [ 21.026097] WARNING: lib/stackdepot.c:723 at stack_depot_print+0x54/0x60, CPU#0: kunit_try_catch/190 [ 21.027202] Modules linked in: [ 21.027672] CPU: 0 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 21.028479] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.028924] Hardware name: linux,dummy-virt (DT) [ 21.029295] pstate: 624020c9 (nZCv daIF +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 21.029822] pc : stack_depot_print+0x54/0x60 [ 21.030307] lr : stack_depot_print+0x54/0x60 [ 21.030654] sp : ffff8000809a7a30 [ 21.030960] x29: ffff8000809a7a30 x28: ffffacab7ce6f000 x27: 1ffff00010010f60 [ 21.031606] x26: 1ffff00010010f5f x25: 0000000000000000 x24: ffffacab75d665dc [ 21.032279] x23: ffffc1ffc3ffa700 x22: ffffacab7a7e1750 x21: ffffacab7a7e4ab8 [ 21.033057] x20: fff00000ffe9c004 x19: ffff8000809a7b30 x18: 0000000069a4f0ae [ 21.033723] x17: 00000000d797b4ed x16: 00000000f1f1f1f1 x15: 00000000f3f3f3f3 [ 21.034463] x14: ffff700010134f26 x13: 1ffe000018ee7799 x12: ffff75956f8b17c5 [ 21.035149] x11: 1ffff5956f8b17c4 x10: ffff75956f8b17c4 x9 : ffffacab756eba6c [ 21.035756] x8 : ffffacab7c58be23 x7 : 0000000000000001 x6 : ffff75956f8b17c4 [ 21.036511] x5 : ffffacab7c58be20 x4 : 1ffe000018ee7799 x3 : dfff800000000000 [ 21.037288] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c773bcc0 [ 21.038070] Call trace: [ 21.038301] stack_depot_print+0x54/0x60 (P) [ 21.038725] print_report+0x5e4/0x608 [ 21.039164] kasan_report+0xdc/0x128 [ 21.039550] kasan_check_range+0x100/0x1a8 [ 21.039929] __asan_memmove+0x3c/0x98 [ 21.040355] kmalloc_memmove_negative_size+0x154/0x2e0 [ 21.040827] kunit_try_run_case+0x170/0x3f0 [ 21.041272] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.041733] kthread+0x328/0x630 [ 21.042141] ret_from_fork+0x10/0x20 [ 21.042502] ---[ end trace 0000000000000000 ]--- [ 21.042971] [ 21.043053] Last potentially related work creation: [ 21.043142] ------------[ cut here ]------------ [ 21.043198] pool index 43945 out of bounds (214) for stack id a9a8abaa [ 21.043410] WARNING: lib/stackdepot.c:451 at depot_fetch_stack+0x6c/0x90, CPU#0: kunit_try_catch/190 [ 21.044947] Modules linked in: [ 21.045425] CPU: 0 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 21.046040] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.046431] Hardware name: linux,dummy-virt (DT) [ 21.046871] pstate: 624020c9 (nZCv daIF +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 21.047439] pc : depot_fetch_stack+0x6c/0x90 [ 21.047885] lr : depot_fetch_stack+0x6c/0x90 [ 21.048354] sp : ffff8000809a7a00 [ 21.048639] x29: ffff8000809a7a00 x28: ffffacab7ce6f000 x27: 1ffff00010010f60 [ 21.049424] x26: 1ffff00010010f5f x25: 0000000000000000 x24: ffffacab75d665dc [ 21.050160] x23: ffffc1ffc3ffa700 x22: ffffacab7a7e1750 x21: ffffacab7a7e4ab8 [ 21.050759] x20: fff00000ffe9c004 x19: fff00000ffe9c040 x18: 0000000069a4f0ae [ 21.051504] x17: 00000000d797b4ed x16: 00000000f1f1f1f1 x15: 0000000000000007 [ 21.052231] x14: 0000000000000000 x13: 0000000000000007 x12: ffff75956f8b17c5 [ 21.052935] x11: 1ffff5956f8b17c4 x10: ffff75956f8b17c4 x9 : ffffacab756eba6c [ 21.053608] x8 : ffffacab7c58be23 x7 : 0000000000000001 x6 : ffff75956f8b17c4 [ 21.054185] x5 : ffffacab7c58be20 x4 : 1ffe000018ee7799 x3 : dfff800000000000 [ 21.054779] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c773bcc0 [ 21.055394] Call trace: [ 21.055715] depot_fetch_stack+0x6c/0x90 (P) [ 21.056248] stack_depot_print+0x24/0x60 [ 21.056748] kasan_print_aux_stacks+0x50/0x98 [ 21.057188] print_report+0x348/0x608 [ 21.057585] kasan_report+0xdc/0x128 [ 21.058055] kasan_check_range+0x100/0x1a8 [ 21.058427] __asan_memmove+0x3c/0x98 [ 21.058886] kmalloc_memmove_negative_size+0x154/0x2e0 [ 21.059390] kunit_try_run_case+0x170/0x3f0 [ 21.059802] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.060336] kthread+0x328/0x630 [ 21.060690] ret_from_fork+0x10/0x20 [ 21.061158] ---[ end trace 0000000000000000 ]--- [ 21.061556] ------------[ cut here ]------------ [ 21.061629] corrupt handle or use after stack_depot_put() [ 21.061785] WARNING: lib/stackdepot.c:723 at stack_depot_print+0x54/0x60, CPU#0: kunit_try_catch/190 [ 21.063173] Modules linked in: [ 21.063657] CPU: 0 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 21.064510] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.065053] Hardware name: linux,dummy-virt (DT) [ 21.065485] pstate: 624020c9 (nZCv daIF +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 21.066149] pc : stack_depot_print+0x54/0x60 [ 21.066517] lr : stack_depot_print+0x54/0x60 [ 21.066988] sp : ffff8000809a7a10 [ 21.067321] x29: ffff8000809a7a10 x28: ffffacab7ce6f000 x27: 1ffff00010010f60 [ 21.068157] x26: 1ffff00010010f5f x25: 0000000000000000 x24: ffffacab75d665dc [ 21.068815] x23: ffffc1ffc3ffa700 x22: ffffacab7a7e1750 x21: ffffacab7a7e4ab8 [ 21.069386] x20: fff00000ffe9c004 x19: fff00000ffe9c040 x18: 0000000069a4f0ae [ 21.070205] x17: 00000000d797b4ed x16: 00000000f1f1f1f1 x15: 00000000f3f3f3f3 [ 21.070947] x14: ffff700010134f22 x13: 1ffe000018ee7799 x12: ffff75956f8b17c5 [ 21.071670] x11: 1ffff5956f8b17c4 x10: ffff75956f8b17c4 x9 : ffffacab756eba6c [ 21.072331] x8 : ffffacab7c58be23 x7 : 0000000000000001 x6 : ffff75956f8b17c4 [ 21.072987] x5 : ffffacab7c58be20 x4 : 1ffe000018ee7799 x3 : dfff800000000000 [ 21.073633] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c773bcc0 [ 21.074436] Call trace: [ 21.074645] stack_depot_print+0x54/0x60 (P) [ 21.075195] kasan_print_aux_stacks+0x50/0x98 [ 21.075689] print_report+0x348/0x608 [ 21.076194] kasan_report+0xdc/0x128 [ 21.076671] kasan_check_range+0x100/0x1a8 [ 21.077214] __asan_memmove+0x3c/0x98 [ 21.077722] kmalloc_memmove_negative_size+0x154/0x2e0 [ 21.078207] kunit_try_run_case+0x170/0x3f0 [ 21.078702] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.079246] kthread+0x328/0x630 [ 21.079540] ret_from_fork+0x10/0x20 [ 21.080062] ---[ end trace 0000000000000000 ]--- [ 21.080675] [ 21.080760] Second to last potentially related work creation: [ 21.080842] ------------[ cut here ]------------ [ 21.080926] pool index 44973 out of bounds (214) for stack id adacafae [ 21.081156] WARNING: lib/stackdepot.c:451 at depot_fetch_stack+0x6c/0x90, CPU#0: kunit_try_catch/190 [ 21.083031] Modules linked in: [ 21.083550] CPU: 0 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 21.084319] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.084843] Hardware name: linux,dummy-virt (DT) [ 21.085158] pstate: 624020c9 (nZCv daIF +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 21.085852] pc : depot_fetch_stack+0x6c/0x90 [ 21.086279] lr : depot_fetch_stack+0x6c/0x90 [ 21.086683] sp : ffff8000809a7a00 [ 21.087027] x29: ffff8000809a7a00 x28: ffffacab7ce6f000 x27: 1ffff00010010f60 [ 21.087717] x26: 1ffff00010010f5f x25: 0000000000000000 x24: ffffacab75d665dc [ 21.088389] x23: ffffc1ffc3ffa700 x22: ffffacab7a7e1750 x21: ffffacab7a7e4ab8 [ 21.089232] x20: fff00000ffe9c004 x19: fff00000ffe9c040 x18: 0000000069a4f0ae [ 21.089912] x17: 00000000d797b4ed x16: 00000000f1f1f1f1 x15: 0000000000000007 [ 21.090622] x14: 0000000000000000 x13: 0000000000000007 x12: ffff75956f8b17c5 [ 21.091322] x11: 1ffff5956f8b17c4 x10: ffff75956f8b17c4 x9 : ffffacab756eba6c [ 21.092068] x8 : ffffacab7c58be23 x7 : 0000000000000001 x6 : ffff75956f8b17c4 [ 21.092920] x5 : ffffacab7c58be20 x4 : 1ffe000018ee7799 x3 : dfff800000000000 [ 21.093617] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c773bcc0 [ 21.094309] Call trace: [ 21.094576] depot_fetch_stack+0x6c/0x90 (P) [ 21.095081] stack_depot_print+0x24/0x60 [ 21.095524] kasan_print_aux_stacks+0x78/0x98 [ 21.095887] print_report+0x348/0x608 [ 21.096188] kasan_report+0xdc/0x128 [ 21.096713] kasan_check_range+0x100/0x1a8 [ 21.097193] __asan_memmove+0x3c/0x98 [ 21.097628] kmalloc_memmove_negative_size+0x154/0x2e0 [ 21.098139] kunit_try_run_case+0x170/0x3f0 [ 21.098489] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.099084] kthread+0x328/0x630 [ 21.099455] ret_from_fork+0x10/0x20 [ 21.099833] ---[ end trace 0000000000000000 ]--- [ 21.100271] ------------[ cut here ]------------ [ 21.100345] corrupt handle or use after stack_depot_put() [ 21.100507] WARNING: lib/stackdepot.c:723 at stack_depot_print+0x54/0x60, CPU#0: kunit_try_catch/190 [ 21.102007] Modules linked in: [ 21.102523] CPU: 0 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 21.103214] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 21.103515] Hardware name: linux,dummy-virt (DT) [ 21.103975] pstate: 624020c9 (nZCv daIF +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 21.104523] pc : stack_depot_print+0x54/0x60 [ 21.105033] lr : stack_depot_print+0x54/0x60 [ 21.105461] sp : ffff8000809a7a10 [ 21.105812] x29: ffff8000809a7a10 x28: ffffacab7ce6f000 x27: 1ffff00010010f60 [ 21.106409] x26: 1ffff00010010f5f x25: 0000000000000000 x24: ffffacab75d665dc [ 21.107217] x23: ffffc1ffc3ffa700 x22: ffffacab7a7e1750 x21: ffffacab7a7e4ab8 [ 21.107980] x20: fff00000ffe9c004 x19: fff00000ffe9c040 x18: 0000000069a4f0ae [ 21.108606] x17: 00000000d797b4ed x16: 00000000f1f1f1f1 x15: 00000000f3f3f3f3 [ 21.109219] x14: ffff700010134f22 x13: 1ffe000018ee7799 x12: ffff75956f8b17c5 [ 21.109968] x11: 1ffff5956f8b17c4 x10: ffff75956f8b17c4 x9 : ffffacab756eba6c [ 21.110578] x8 : ffffacab7c58be23 x7 : 0000000000000001 x6 : ffff75956f8b17c4 [ 21.111304] x5 : ffffacab7c58be20 x4 : 1ffe000018ee7799 x3 : dfff800000000000 [ 21.111681] x2 : 0000000000000000 x1 : 0000000000000000 x0 : fff00000c773bcc0 [ 21.112449] Call trace: [ 21.112732] stack_depot_print+0x54/0x60 (P) [ 21.113242] kasan_print_aux_stacks+0x78/0x98 [ 21.113701] print_report+0x348/0x608 [ 21.114155] kasan_report+0xdc/0x128 [ 21.114491] kasan_check_range+0x100/0x1a8 [ 21.114906] __asan_memmove+0x3c/0x98 [ 21.115376] kmalloc_memmove_negative_size+0x154/0x2e0 [ 21.115823] kunit_try_run_case+0x170/0x3f0 [ 21.116255] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 21.116735] kthread+0x328/0x630 [ 21.117101] ret_from_fork+0x10/0x20 [ 21.117497] ---[ end trace 0000000000000000 ]--- [ 21.117945] [ 21.118045] The buggy address belongs to the object at fff00000ffe9c000 [ 21.118045] which belongs to the cache kmalloc-64 of size 64 [ 21.118169] The buggy address is located 4 bytes inside of [ 21.118169] 64-byte region [fff00000ffe9c000, fff00000ffe9c040) [ 21.118294] [ 21.118355] The buggy address belongs to the physical page: [ 21.118423] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x13fe9c [ 21.118543] memcg:fff00000d9d64169 [ 21.118598] flags: 0xbfffe0000002000(reserved|node=0|zone=2|lastcpupid=0x1ffff) [ 21.118713] page_type: f5(slab) [ 21.118786] raw: 0bfffe0000002000 fff00000c00018c0 ffffc1ffc3ffa708 0000000000000000 [ 21.118838] raw: 0000000000000000 0000000000010000 00000001f5000000 fff00000d9d64169 [ 21.118880] page dumped because: kasan: bad access detected [ 21.118913] [ 21.118931] Memory state around the buggy address: [ 21.118968] fff00000ffe9bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.119011] fff00000ffe9bf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.119083] >fff00000ffe9c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.119122] ^ [ 21.119153] fff00000ffe9c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.119196] fff00000ffe9c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.119235] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[ 20.440824] ================================================================== [ 20.440960] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 20.441154] Write of size 16 at addr fff00000c6423a69 by task kunit_try_catch/188 [ 20.441288] [ 20.441547] CPU: 0 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 20.442336] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.442395] Hardware name: linux,dummy-virt (DT) [ 20.442467] Call trace: [ 20.443068] show_stack+0x20/0x38 (C) [ 20.443246] dump_stack_lvl+0x8c/0xd0 [ 20.443590] print_report+0x118/0x608 [ 20.443746] kasan_report+0xdc/0x128 [ 20.443887] kasan_check_range+0x100/0x1a8 [ 20.444050] __asan_memset+0x34/0x78 [ 20.444192] kmalloc_oob_memset_16+0x150/0x2f8 [ 20.444343] kunit_try_run_case+0x170/0x3f0 [ 20.444468] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.444636] kthread+0x328/0x630 [ 20.444776] ret_from_fork+0x10/0x20 [ 20.444934] [ 20.444996] Allocated by task 188: [ 20.445067] kasan_save_stack+0x3c/0x68 [ 20.445153] kasan_save_track+0x20/0x40 [ 20.445789] kasan_save_alloc_info+0x40/0x58 [ 20.446025] __kasan_kmalloc+0xd4/0xd8 [ 20.446297] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.446384] kmalloc_oob_memset_16+0xb0/0x2f8 [ 20.446501] kunit_try_run_case+0x170/0x3f0 [ 20.446698] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.446805] kthread+0x328/0x630 [ 20.446872] ret_from_fork+0x10/0x20 [ 20.446947] [ 20.446993] The buggy address belongs to the object at fff00000c6423a00 [ 20.446993] which belongs to the cache kmalloc-128 of size 128 [ 20.447133] The buggy address is located 105 bytes inside of [ 20.447133] allocated 120-byte region [fff00000c6423a00, fff00000c6423a78) [ 20.447269] [ 20.447313] The buggy address belongs to the physical page: [ 20.447379] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106423 [ 20.447494] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.447600] page_type: f5(slab) [ 20.447685] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.447794] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.447890] page dumped because: kasan: bad access detected [ 20.447955] [ 20.447993] Memory state around the buggy address: [ 20.448151] fff00000c6423900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.448248] fff00000c6423980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.448707] >fff00000c6423a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.448872] ^ [ 20.448993] fff00000c6423a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.449137] fff00000c6423b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.449218] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[ 20.417506] ================================================================== [ 20.417739] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 20.418026] Write of size 8 at addr fff00000c6423971 by task kunit_try_catch/186 [ 20.418317] [ 20.418411] CPU: 0 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 20.418648] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.418724] Hardware name: linux,dummy-virt (DT) [ 20.418778] Call trace: [ 20.418818] show_stack+0x20/0x38 (C) [ 20.418924] dump_stack_lvl+0x8c/0xd0 [ 20.419113] print_report+0x118/0x608 [ 20.419321] kasan_report+0xdc/0x128 [ 20.419520] kasan_check_range+0x100/0x1a8 [ 20.419778] __asan_memset+0x34/0x78 [ 20.420063] kmalloc_oob_memset_8+0x150/0x2f8 [ 20.420237] kunit_try_run_case+0x170/0x3f0 [ 20.420595] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.420851] kthread+0x328/0x630 [ 20.421114] ret_from_fork+0x10/0x20 [ 20.421226] [ 20.421276] Allocated by task 186: [ 20.421621] kasan_save_stack+0x3c/0x68 [ 20.421720] kasan_save_track+0x20/0x40 [ 20.421951] kasan_save_alloc_info+0x40/0x58 [ 20.422118] __kasan_kmalloc+0xd4/0xd8 [ 20.422194] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.422275] kmalloc_oob_memset_8+0xb0/0x2f8 [ 20.422358] kunit_try_run_case+0x170/0x3f0 [ 20.422552] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.422771] kthread+0x328/0x630 [ 20.422947] ret_from_fork+0x10/0x20 [ 20.423055] [ 20.423277] The buggy address belongs to the object at fff00000c6423900 [ 20.423277] which belongs to the cache kmalloc-128 of size 128 [ 20.423412] The buggy address is located 113 bytes inside of [ 20.423412] allocated 120-byte region [fff00000c6423900, fff00000c6423978) [ 20.423536] [ 20.423579] The buggy address belongs to the physical page: [ 20.423764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106423 [ 20.424002] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.424254] page_type: f5(slab) [ 20.424402] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.424767] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.424861] page dumped because: kasan: bad access detected [ 20.424931] [ 20.424972] Memory state around the buggy address: [ 20.425054] fff00000c6423800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.425152] fff00000c6423880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.425288] >fff00000c6423900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.425362] ^ [ 20.425569] fff00000c6423980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.425891] fff00000c6423a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.425974] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[ 20.386992] ================================================================== [ 20.387257] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 20.387620] Write of size 4 at addr fff00000c6423875 by task kunit_try_catch/184 [ 20.387694] [ 20.387768] CPU: 0 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 20.388045] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.388128] Hardware name: linux,dummy-virt (DT) [ 20.388227] Call trace: [ 20.388279] show_stack+0x20/0x38 (C) [ 20.388379] dump_stack_lvl+0x8c/0xd0 [ 20.388467] print_report+0x118/0x608 [ 20.388566] kasan_report+0xdc/0x128 [ 20.388664] kasan_check_range+0x100/0x1a8 [ 20.388771] __asan_memset+0x34/0x78 [ 20.388893] kmalloc_oob_memset_4+0x150/0x300 [ 20.389002] kunit_try_run_case+0x170/0x3f0 [ 20.389123] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.389239] kthread+0x328/0x630 [ 20.389752] ret_from_fork+0x10/0x20 [ 20.390155] [ 20.390203] Allocated by task 184: [ 20.390433] kasan_save_stack+0x3c/0x68 [ 20.390537] kasan_save_track+0x20/0x40 [ 20.390624] kasan_save_alloc_info+0x40/0x58 [ 20.390703] __kasan_kmalloc+0xd4/0xd8 [ 20.390853] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.391045] kmalloc_oob_memset_4+0xb0/0x300 [ 20.391145] kunit_try_run_case+0x170/0x3f0 [ 20.391505] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.391598] kthread+0x328/0x630 [ 20.391672] ret_from_fork+0x10/0x20 [ 20.391830] [ 20.391900] The buggy address belongs to the object at fff00000c6423800 [ 20.391900] which belongs to the cache kmalloc-128 of size 128 [ 20.392095] The buggy address is located 117 bytes inside of [ 20.392095] allocated 120-byte region [fff00000c6423800, fff00000c6423878) [ 20.392591] [ 20.392692] The buggy address belongs to the physical page: [ 20.392761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106423 [ 20.393119] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.393346] page_type: f5(slab) [ 20.393445] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.393765] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.393957] page dumped because: kasan: bad access detected [ 20.394032] [ 20.394068] Memory state around the buggy address: [ 20.394276] fff00000c6423700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.394388] fff00000c6423780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.394489] >fff00000c6423800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.394578] ^ [ 20.394761] fff00000c6423880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.394931] fff00000c6423900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.395101] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[ 20.356906] ================================================================== [ 20.357064] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 20.357192] Write of size 2 at addr fff00000c6423777 by task kunit_try_catch/182 [ 20.357303] [ 20.357383] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 20.357568] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.357624] Hardware name: linux,dummy-virt (DT) [ 20.357694] Call trace: [ 20.357746] show_stack+0x20/0x38 (C) [ 20.357855] dump_stack_lvl+0x8c/0xd0 [ 20.357966] print_report+0x118/0x608 [ 20.358751] kasan_report+0xdc/0x128 [ 20.358971] kasan_check_range+0x100/0x1a8 [ 20.359083] __asan_memset+0x34/0x78 [ 20.359498] kmalloc_oob_memset_2+0x150/0x2f8 [ 20.359584] kunit_try_run_case+0x170/0x3f0 [ 20.359680] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.359878] kthread+0x328/0x630 [ 20.360112] ret_from_fork+0x10/0x20 [ 20.360458] [ 20.360507] Allocated by task 182: [ 20.360682] kasan_save_stack+0x3c/0x68 [ 20.360801] kasan_save_track+0x20/0x40 [ 20.361428] kasan_save_alloc_info+0x40/0x58 [ 20.361615] __kasan_kmalloc+0xd4/0xd8 [ 20.361791] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.361901] kmalloc_oob_memset_2+0xb0/0x2f8 [ 20.362246] kunit_try_run_case+0x170/0x3f0 [ 20.362431] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.362522] kthread+0x328/0x630 [ 20.362592] ret_from_fork+0x10/0x20 [ 20.362723] [ 20.362800] The buggy address belongs to the object at fff00000c6423700 [ 20.362800] which belongs to the cache kmalloc-128 of size 128 [ 20.363063] The buggy address is located 119 bytes inside of [ 20.363063] allocated 120-byte region [fff00000c6423700, fff00000c6423778) [ 20.363453] [ 20.363503] The buggy address belongs to the physical page: [ 20.363765] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106423 [ 20.364229] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.364541] page_type: f5(slab) [ 20.364900] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.365054] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.365151] page dumped because: kasan: bad access detected [ 20.365220] [ 20.365261] Memory state around the buggy address: [ 20.365332] fff00000c6423600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.365425] fff00000c6423680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.365523] >fff00000c6423700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.365607] ^ [ 20.365695] fff00000c6423780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.365787] fff00000c6423800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.365870] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 20.330169] ================================================================== [ 20.330406] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 20.330674] Write of size 128 at addr fff00000c6423600 by task kunit_try_catch/180 [ 20.330910] [ 20.331063] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 20.331238] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.331294] Hardware name: linux,dummy-virt (DT) [ 20.331361] Call trace: [ 20.331870] show_stack+0x20/0x38 (C) [ 20.332056] dump_stack_lvl+0x8c/0xd0 [ 20.332305] print_report+0x118/0x608 [ 20.332484] kasan_report+0xdc/0x128 [ 20.332698] kasan_check_range+0x100/0x1a8 [ 20.332922] __asan_memset+0x34/0x78 [ 20.333093] kmalloc_oob_in_memset+0x144/0x2d0 [ 20.333282] kunit_try_run_case+0x170/0x3f0 [ 20.333471] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.333907] kthread+0x328/0x630 [ 20.334000] ret_from_fork+0x10/0x20 [ 20.334124] [ 20.334162] Allocated by task 180: [ 20.334218] kasan_save_stack+0x3c/0x68 [ 20.334547] kasan_save_track+0x20/0x40 [ 20.334675] kasan_save_alloc_info+0x40/0x58 [ 20.334749] __kasan_kmalloc+0xd4/0xd8 [ 20.334884] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.335075] kmalloc_oob_in_memset+0xb0/0x2d0 [ 20.335253] kunit_try_run_case+0x170/0x3f0 [ 20.335687] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.335926] kthread+0x328/0x630 [ 20.336007] ret_from_fork+0x10/0x20 [ 20.336314] [ 20.336457] The buggy address belongs to the object at fff00000c6423600 [ 20.336457] which belongs to the cache kmalloc-128 of size 128 [ 20.336627] The buggy address is located 0 bytes inside of [ 20.336627] allocated 120-byte region [fff00000c6423600, fff00000c6423678) [ 20.337009] [ 20.337085] The buggy address belongs to the physical page: [ 20.337157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106423 [ 20.337307] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.337413] page_type: f5(slab) [ 20.337498] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 20.337606] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.337693] page dumped because: kasan: bad access detected [ 20.337763] [ 20.337800] Memory state around the buggy address: [ 20.337867] fff00000c6423500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.337962] fff00000c6423580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.338168] >fff00000c6423600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 20.338395] ^ [ 20.338472] fff00000c6423680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.338544] fff00000c6423700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.338612] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[ 20.308888] ================================================================== [ 20.309050] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 20.309194] Read of size 16 at addr fff00000c6058140 by task kunit_try_catch/178 [ 20.309320] [ 20.309404] CPU: 0 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 20.309602] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.309661] Hardware name: linux,dummy-virt (DT) [ 20.309731] Call trace: [ 20.309781] show_stack+0x20/0x38 (C) [ 20.309893] dump_stack_lvl+0x8c/0xd0 [ 20.310002] print_report+0x118/0x608 [ 20.310110] kasan_report+0xdc/0x128 [ 20.310201] __asan_report_load16_noabort+0x20/0x30 [ 20.310314] kmalloc_uaf_16+0x3bc/0x438 [ 20.310419] kunit_try_run_case+0x170/0x3f0 [ 20.310543] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.310645] kthread+0x328/0x630 [ 20.310735] ret_from_fork+0x10/0x20 [ 20.310844] [ 20.310877] Allocated by task 178: [ 20.310939] kasan_save_stack+0x3c/0x68 [ 20.311043] kasan_save_track+0x20/0x40 [ 20.311138] kasan_save_alloc_info+0x40/0x58 [ 20.311261] __kasan_kmalloc+0xd4/0xd8 [ 20.311328] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.311448] kmalloc_uaf_16+0x140/0x438 [ 20.311555] kunit_try_run_case+0x170/0x3f0 [ 20.311667] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.311789] kthread+0x328/0x630 [ 20.311887] ret_from_fork+0x10/0x20 [ 20.311990] [ 20.312046] Freed by task 178: [ 20.312098] kasan_save_stack+0x3c/0x68 [ 20.312165] kasan_save_track+0x20/0x40 [ 20.312226] kasan_save_free_info+0x4c/0x78 [ 20.312303] __kasan_slab_free+0x6c/0x98 [ 20.312399] kfree+0x214/0x3c8 [ 20.312503] kmalloc_uaf_16+0x190/0x438 [ 20.312631] kunit_try_run_case+0x170/0x3f0 [ 20.312757] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.312889] kthread+0x328/0x630 [ 20.312970] ret_from_fork+0x10/0x20 [ 20.313096] [ 20.313159] The buggy address belongs to the object at fff00000c6058140 [ 20.313159] which belongs to the cache kmalloc-16 of size 16 [ 20.313340] The buggy address is located 0 bytes inside of [ 20.313340] freed 16-byte region [fff00000c6058140, fff00000c6058150) [ 20.313501] [ 20.313559] The buggy address belongs to the physical page: [ 20.313658] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106058 [ 20.313828] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.313943] page_type: f5(slab) [ 20.314322] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.314448] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.314530] page dumped because: kasan: bad access detected [ 20.314594] [ 20.314635] Memory state around the buggy address: [ 20.314708] fff00000c6058000: 00 00 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 20.314815] fff00000c6058080: fa fb fc fc 00 04 fc fc fa fb fc fc fa fb fc fc [ 20.314950] >fff00000c6058100: fa fb fc fc 00 00 fc fc fa fb fc fc fc fc fc fc [ 20.315076] ^ [ 20.315188] fff00000c6058180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.315269] fff00000c6058200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.315337] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[ 20.283460] ================================================================== [ 20.283621] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 20.283752] Write of size 16 at addr fff00000c60580e0 by task kunit_try_catch/176 [ 20.283869] [ 20.283948] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 20.284162] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.284227] Hardware name: linux,dummy-virt (DT) [ 20.284299] Call trace: [ 20.284352] show_stack+0x20/0x38 (C) [ 20.284473] dump_stack_lvl+0x8c/0xd0 [ 20.284605] print_report+0x118/0x608 [ 20.284721] kasan_report+0xdc/0x128 [ 20.284830] __asan_report_store16_noabort+0x20/0x30 [ 20.284944] kmalloc_oob_16+0x3a0/0x3f8 [ 20.285091] kunit_try_run_case+0x170/0x3f0 [ 20.285201] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.285347] kthread+0x328/0x630 [ 20.285446] ret_from_fork+0x10/0x20 [ 20.285609] [ 20.285668] Allocated by task 176: [ 20.285754] kasan_save_stack+0x3c/0x68 [ 20.285877] kasan_save_track+0x20/0x40 [ 20.285986] kasan_save_alloc_info+0x40/0x58 [ 20.286128] __kasan_kmalloc+0xd4/0xd8 [ 20.286203] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.286292] kmalloc_oob_16+0xb4/0x3f8 [ 20.286369] kunit_try_run_case+0x170/0x3f0 [ 20.286450] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.287127] kthread+0x328/0x630 [ 20.287242] ret_from_fork+0x10/0x20 [ 20.287316] [ 20.287365] The buggy address belongs to the object at fff00000c60580e0 [ 20.287365] which belongs to the cache kmalloc-16 of size 16 [ 20.287487] The buggy address is located 0 bytes inside of [ 20.287487] allocated 13-byte region [fff00000c60580e0, fff00000c60580ed) [ 20.287665] [ 20.287706] The buggy address belongs to the physical page: [ 20.288089] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106058 [ 20.288221] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 20.288626] page_type: f5(slab) [ 20.288782] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 20.288896] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 20.288982] page dumped because: kasan: bad access detected [ 20.289051] [ 20.289086] Memory state around the buggy address: [ 20.289152] fff00000c6057f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.289252] fff00000c6058000: 00 00 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 20.289348] >fff00000c6058080: fa fb fc fc 00 04 fc fc fa fb fc fc 00 05 fc fc [ 20.289434] ^ [ 20.289518] fff00000c6058100: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.290171] fff00000c6058180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.290337] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 20.249291] ================================================================== [ 20.249683] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 20.250178] Read of size 1 at addr fff00000c59a9000 by task kunit_try_catch/174 [ 20.250599] [ 20.250830] CPU: 0 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 20.251174] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.251239] Hardware name: linux,dummy-virt (DT) [ 20.251857] Call trace: [ 20.252039] show_stack+0x20/0x38 (C) [ 20.252263] dump_stack_lvl+0x8c/0xd0 [ 20.252385] print_report+0x118/0x608 [ 20.252639] kasan_report+0xdc/0x128 [ 20.253164] __asan_report_load1_noabort+0x20/0x30 [ 20.253371] krealloc_uaf+0x4c8/0x520 [ 20.253494] kunit_try_run_case+0x170/0x3f0 [ 20.253606] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.253719] kthread+0x328/0x630 [ 20.253814] ret_from_fork+0x10/0x20 [ 20.253928] [ 20.253968] Allocated by task 174: [ 20.254381] kasan_save_stack+0x3c/0x68 [ 20.254604] kasan_save_track+0x20/0x40 [ 20.254713] kasan_save_alloc_info+0x40/0x58 [ 20.254990] __kasan_kmalloc+0xd4/0xd8 [ 20.255306] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.255406] krealloc_uaf+0xc8/0x520 [ 20.255485] kunit_try_run_case+0x170/0x3f0 [ 20.255566] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.255660] kthread+0x328/0x630 [ 20.255732] ret_from_fork+0x10/0x20 [ 20.255809] [ 20.255851] Freed by task 174: [ 20.255910] kasan_save_stack+0x3c/0x68 [ 20.255995] kasan_save_track+0x20/0x40 [ 20.256096] kasan_save_free_info+0x4c/0x78 [ 20.256972] __kasan_slab_free+0x6c/0x98 [ 20.257871] kfree+0x214/0x3c8 [ 20.258614] krealloc_uaf+0x12c/0x520 [ 20.258731] kunit_try_run_case+0x170/0x3f0 [ 20.258922] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.259034] kthread+0x328/0x630 [ 20.259137] ret_from_fork+0x10/0x20 [ 20.259221] [ 20.259266] The buggy address belongs to the object at fff00000c59a9000 [ 20.259266] which belongs to the cache kmalloc-256 of size 256 [ 20.259478] The buggy address is located 0 bytes inside of [ 20.259478] freed 256-byte region [fff00000c59a9000, fff00000c59a9100) [ 20.260217] [ 20.260288] The buggy address belongs to the physical page: [ 20.260368] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059a8 [ 20.260744] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.260886] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.261276] page_type: f5(slab) [ 20.261384] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 20.261535] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.262008] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 20.262139] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.262478] head: 0bfffe0000000001 ffffc1ffc3166a01 00000000ffffffff 00000000ffffffff [ 20.262778] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 20.263092] page dumped because: kasan: bad access detected [ 20.263163] [ 20.263211] Memory state around the buggy address: [ 20.263288] fff00000c59a8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.263392] fff00000c59a8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.263490] >fff00000c59a9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.263574] ^ [ 20.263799] fff00000c59a9080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.264063] fff00000c59a9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.264251] ================================================================== [ 20.232221] ================================================================== [ 20.232407] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 20.232546] Read of size 1 at addr fff00000c59a9000 by task kunit_try_catch/174 [ 20.232667] [ 20.232751] CPU: 0 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 20.233007] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.233077] Hardware name: linux,dummy-virt (DT) [ 20.233191] Call trace: [ 20.233274] show_stack+0x20/0x38 (C) [ 20.233467] dump_stack_lvl+0x8c/0xd0 [ 20.233573] print_report+0x118/0x608 [ 20.233910] kasan_report+0xdc/0x128 [ 20.234448] __kasan_check_byte+0x54/0x70 [ 20.234943] krealloc_noprof+0x44/0x360 [ 20.235510] krealloc_uaf+0x180/0x520 [ 20.235624] kunit_try_run_case+0x170/0x3f0 [ 20.235883] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.236662] kthread+0x328/0x630 [ 20.236961] ret_from_fork+0x10/0x20 [ 20.237093] [ 20.237601] Allocated by task 174: [ 20.237899] kasan_save_stack+0x3c/0x68 [ 20.238035] kasan_save_track+0x20/0x40 [ 20.238201] kasan_save_alloc_info+0x40/0x58 [ 20.238314] __kasan_kmalloc+0xd4/0xd8 [ 20.238508] __kmalloc_cache_noprof+0x16c/0x3c0 [ 20.238596] krealloc_uaf+0xc8/0x520 [ 20.238677] kunit_try_run_case+0x170/0x3f0 [ 20.239068] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.239180] kthread+0x328/0x630 [ 20.239380] ret_from_fork+0x10/0x20 [ 20.239914] [ 20.240025] Freed by task 174: [ 20.240119] kasan_save_stack+0x3c/0x68 [ 20.240217] kasan_save_track+0x20/0x40 [ 20.240302] kasan_save_free_info+0x4c/0x78 [ 20.240388] __kasan_slab_free+0x6c/0x98 [ 20.241002] kfree+0x214/0x3c8 [ 20.241121] krealloc_uaf+0x12c/0x520 [ 20.241206] kunit_try_run_case+0x170/0x3f0 [ 20.241291] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.241387] kthread+0x328/0x630 [ 20.241458] ret_from_fork+0x10/0x20 [ 20.242283] [ 20.242381] The buggy address belongs to the object at fff00000c59a9000 [ 20.242381] which belongs to the cache kmalloc-256 of size 256 [ 20.242854] The buggy address is located 0 bytes inside of [ 20.242854] freed 256-byte region [fff00000c59a9000, fff00000c59a9100) [ 20.243032] [ 20.243097] The buggy address belongs to the physical page: [ 20.243232] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059a8 [ 20.243618] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.243978] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.244149] page_type: f5(slab) [ 20.244241] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 20.244342] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.244455] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 20.245210] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.245749] head: 0bfffe0000000001 ffffc1ffc3166a01 00000000ffffffff 00000000ffffffff [ 20.245970] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 20.246289] page dumped because: kasan: bad access detected [ 20.246470] [ 20.246537] Memory state around the buggy address: [ 20.246636] fff00000c59a8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.246730] fff00000c59a8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.247016] >fff00000c59a9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.247118] ^ [ 20.247216] fff00000c59a9080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 20.247755] fff00000c59a9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.248000] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 19.995477] ================================================================== [ 19.995613] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 19.995722] Write of size 1 at addr fff00000c59a8ec9 by task kunit_try_catch/168 [ 19.995961] [ 19.996080] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 19.996316] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.996377] Hardware name: linux,dummy-virt (DT) [ 19.996468] Call trace: [ 19.996524] show_stack+0x20/0x38 (C) [ 19.996650] dump_stack_lvl+0x8c/0xd0 [ 19.996751] print_report+0x118/0x608 [ 19.996851] kasan_report+0xdc/0x128 [ 19.997075] __asan_report_store1_noabort+0x20/0x30 [ 19.997193] krealloc_less_oob_helper+0xa48/0xc50 [ 19.997301] krealloc_less_oob+0x20/0x38 [ 19.997394] kunit_try_run_case+0x170/0x3f0 [ 19.997496] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.997610] kthread+0x328/0x630 [ 19.997701] ret_from_fork+0x10/0x20 [ 19.997809] [ 19.997847] Allocated by task 168: [ 19.997907] kasan_save_stack+0x3c/0x68 [ 19.998028] kasan_save_track+0x20/0x40 [ 19.998096] kasan_save_alloc_info+0x40/0x58 [ 19.998164] __kasan_krealloc+0x118/0x178 [ 19.998236] krealloc_noprof+0x128/0x360 [ 19.998330] krealloc_less_oob_helper+0x168/0xc50 [ 19.998407] krealloc_less_oob+0x20/0x38 [ 19.998482] kunit_try_run_case+0x170/0x3f0 [ 19.998653] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.998783] kthread+0x328/0x630 [ 19.998877] ret_from_fork+0x10/0x20 [ 19.998944] [ 19.998986] The buggy address belongs to the object at fff00000c59a8e00 [ 19.998986] which belongs to the cache kmalloc-256 of size 256 [ 19.999137] The buggy address is located 0 bytes to the right of [ 19.999137] allocated 201-byte region [fff00000c59a8e00, fff00000c59a8ec9) [ 19.999303] [ 19.999349] The buggy address belongs to the physical page: [ 19.999419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059a8 [ 19.999556] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.999645] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.999764] page_type: f5(slab) [ 19.999911] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 20.000209] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.000301] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 20.000386] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.000479] head: 0bfffe0000000001 ffffc1ffc3166a01 00000000ffffffff 00000000ffffffff [ 20.000591] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 20.000692] page dumped because: kasan: bad access detected [ 20.000802] [ 20.000843] Memory state around the buggy address: [ 20.000935] fff00000c59a8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.001041] fff00000c59a8e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.001137] >fff00000c59a8e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 20.001219] ^ [ 20.001289] fff00000c59a8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.001381] fff00000c59a8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.001464] ================================================================== [ 20.003742] ================================================================== [ 20.003856] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 20.004478] Write of size 1 at addr fff00000c59a8ed0 by task kunit_try_catch/168 [ 20.004609] [ 20.004699] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 20.004892] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.004955] Hardware name: linux,dummy-virt (DT) [ 20.005030] Call trace: [ 20.005076] show_stack+0x20/0x38 (C) [ 20.005186] dump_stack_lvl+0x8c/0xd0 [ 20.005291] print_report+0x118/0x608 [ 20.005394] kasan_report+0xdc/0x128 [ 20.005495] __asan_report_store1_noabort+0x20/0x30 [ 20.005612] krealloc_less_oob_helper+0xb9c/0xc50 [ 20.005724] krealloc_less_oob+0x20/0x38 [ 20.005829] kunit_try_run_case+0x170/0x3f0 [ 20.005936] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.006950] kthread+0x328/0x630 [ 20.007334] ret_from_fork+0x10/0x20 [ 20.008124] [ 20.008209] Allocated by task 168: [ 20.008382] kasan_save_stack+0x3c/0x68 [ 20.008570] kasan_save_track+0x20/0x40 [ 20.008959] kasan_save_alloc_info+0x40/0x58 [ 20.009284] __kasan_krealloc+0x118/0x178 [ 20.009414] krealloc_noprof+0x128/0x360 [ 20.009506] krealloc_less_oob_helper+0x168/0xc50 [ 20.009585] krealloc_less_oob+0x20/0x38 [ 20.009656] kunit_try_run_case+0x170/0x3f0 [ 20.010417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.010582] kthread+0x328/0x630 [ 20.010658] ret_from_fork+0x10/0x20 [ 20.010897] [ 20.011036] The buggy address belongs to the object at fff00000c59a8e00 [ 20.011036] which belongs to the cache kmalloc-256 of size 256 [ 20.011163] The buggy address is located 7 bytes to the right of [ 20.011163] allocated 201-byte region [fff00000c59a8e00, fff00000c59a8ec9) [ 20.011295] [ 20.011338] The buggy address belongs to the physical page: [ 20.011706] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059a8 [ 20.011904] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.012131] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.012738] page_type: f5(slab) [ 20.012845] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 20.013044] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.013404] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 20.013566] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.014029] head: 0bfffe0000000001 ffffc1ffc3166a01 00000000ffffffff 00000000ffffffff [ 20.014152] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 20.014382] page dumped because: kasan: bad access detected [ 20.014669] [ 20.014709] Memory state around the buggy address: [ 20.014782] fff00000c59a8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.014875] fff00000c59a8e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.014956] >fff00000c59a8e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 20.015026] ^ [ 20.015459] fff00000c59a8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.015787] fff00000c59a8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.016005] ================================================================== [ 20.050232] ================================================================== [ 20.050777] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 20.051205] Write of size 1 at addr fff00000c59a8eea by task kunit_try_catch/168 [ 20.051325] [ 20.051404] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 20.052114] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.052239] Hardware name: linux,dummy-virt (DT) [ 20.052377] Call trace: [ 20.052442] show_stack+0x20/0x38 (C) [ 20.052636] dump_stack_lvl+0x8c/0xd0 [ 20.052754] print_report+0x118/0x608 [ 20.053177] kasan_report+0xdc/0x128 [ 20.053940] __asan_report_store1_noabort+0x20/0x30 [ 20.054346] krealloc_less_oob_helper+0xae4/0xc50 [ 20.054475] krealloc_less_oob+0x20/0x38 [ 20.054591] kunit_try_run_case+0x170/0x3f0 [ 20.054697] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.054874] kthread+0x328/0x630 [ 20.054962] ret_from_fork+0x10/0x20 [ 20.055665] [ 20.055709] Allocated by task 168: [ 20.055782] kasan_save_stack+0x3c/0x68 [ 20.055874] kasan_save_track+0x20/0x40 [ 20.055954] kasan_save_alloc_info+0x40/0x58 [ 20.056110] __kasan_krealloc+0x118/0x178 [ 20.056211] krealloc_noprof+0x128/0x360 [ 20.056823] krealloc_less_oob_helper+0x168/0xc50 [ 20.056927] krealloc_less_oob+0x20/0x38 [ 20.057184] kunit_try_run_case+0x170/0x3f0 [ 20.057276] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.057582] kthread+0x328/0x630 [ 20.057731] ret_from_fork+0x10/0x20 [ 20.058397] [ 20.058463] The buggy address belongs to the object at fff00000c59a8e00 [ 20.058463] which belongs to the cache kmalloc-256 of size 256 [ 20.058716] The buggy address is located 33 bytes to the right of [ 20.058716] allocated 201-byte region [fff00000c59a8e00, fff00000c59a8ec9) [ 20.058950] [ 20.059258] The buggy address belongs to the physical page: [ 20.059352] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059a8 [ 20.059454] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.059555] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.059956] page_type: f5(slab) [ 20.060144] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 20.060389] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.060515] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 20.060635] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.060761] head: 0bfffe0000000001 ffffc1ffc3166a01 00000000ffffffff 00000000ffffffff [ 20.060897] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 20.060999] page dumped because: kasan: bad access detected [ 20.061086] [ 20.061146] Memory state around the buggy address: [ 20.061224] fff00000c59a8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.061327] fff00000c59a8e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.061429] >fff00000c59a8e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 20.061517] ^ [ 20.061610] fff00000c59a8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.061714] fff00000c59a8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.061804] ================================================================== [ 20.186371] ================================================================== [ 20.186427] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 20.186485] Write of size 1 at addr fff00000c76d20d0 by task kunit_try_catch/172 [ 20.186532] [ 20.186567] CPU: 0 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 20.186646] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.186671] Hardware name: linux,dummy-virt (DT) [ 20.186700] Call trace: [ 20.186721] show_stack+0x20/0x38 (C) [ 20.186770] dump_stack_lvl+0x8c/0xd0 [ 20.186815] print_report+0x118/0x608 [ 20.186860] kasan_report+0xdc/0x128 [ 20.186902] __asan_report_store1_noabort+0x20/0x30 [ 20.186951] krealloc_less_oob_helper+0xb9c/0xc50 [ 20.186996] krealloc_large_less_oob+0x20/0x38 [ 20.187106] kunit_try_run_case+0x170/0x3f0 [ 20.187324] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.187520] kthread+0x328/0x630 [ 20.187678] ret_from_fork+0x10/0x20 [ 20.187874] [ 20.187959] The buggy address belongs to the physical page: [ 20.188080] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076d0 [ 20.188202] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.188301] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.188402] page_type: f8(unknown) [ 20.188474] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.188570] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 20.188677] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.188789] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 20.188897] head: 0bfffe0000000002 ffffc1ffc31db401 00000000ffffffff 00000000ffffffff [ 20.189005] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 20.189428] page dumped because: kasan: bad access detected [ 20.189535] [ 20.189578] Memory state around the buggy address: [ 20.189691] fff00000c76d1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.189877] fff00000c76d2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.190076] >fff00000c76d2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 20.190186] ^ [ 20.190278] fff00000c76d2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.190363] fff00000c76d2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.190440] ================================================================== [ 20.180440] ================================================================== [ 20.180608] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 20.180807] Write of size 1 at addr fff00000c76d20c9 by task kunit_try_catch/172 [ 20.180961] [ 20.181090] CPU: 0 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 20.181356] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.181409] Hardware name: linux,dummy-virt (DT) [ 20.181474] Call trace: [ 20.181544] show_stack+0x20/0x38 (C) [ 20.181688] dump_stack_lvl+0x8c/0xd0 [ 20.181825] print_report+0x118/0x608 [ 20.181957] kasan_report+0xdc/0x128 [ 20.182132] __asan_report_store1_noabort+0x20/0x30 [ 20.182242] krealloc_less_oob_helper+0xa48/0xc50 [ 20.182617] krealloc_large_less_oob+0x20/0x38 [ 20.182979] kunit_try_run_case+0x170/0x3f0 [ 20.183119] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.183223] kthread+0x328/0x630 [ 20.183311] ret_from_fork+0x10/0x20 [ 20.183407] [ 20.183445] The buggy address belongs to the physical page: [ 20.183535] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076d0 [ 20.183644] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.183745] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.183852] page_type: f8(unknown) [ 20.183937] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.184072] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 20.184232] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.184339] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 20.184449] head: 0bfffe0000000002 ffffc1ffc31db401 00000000ffffffff 00000000ffffffff [ 20.184574] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 20.184686] page dumped because: kasan: bad access detected [ 20.184785] [ 20.184833] Memory state around the buggy address: [ 20.184900] fff00000c76d1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.184998] fff00000c76d2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.185091] >fff00000c76d2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 20.185163] ^ [ 20.185225] fff00000c76d2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.185307] fff00000c76d2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.185383] ================================================================== [ 20.021042] ================================================================== [ 20.021160] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 20.021696] Write of size 1 at addr fff00000c59a8eda by task kunit_try_catch/168 [ 20.021830] [ 20.022100] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 20.022795] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.022926] Hardware name: linux,dummy-virt (DT) [ 20.023047] Call trace: [ 20.023177] show_stack+0x20/0x38 (C) [ 20.023379] dump_stack_lvl+0x8c/0xd0 [ 20.023492] print_report+0x118/0x608 [ 20.023660] kasan_report+0xdc/0x128 [ 20.024059] __asan_report_store1_noabort+0x20/0x30 [ 20.024510] krealloc_less_oob_helper+0xa80/0xc50 [ 20.024713] krealloc_less_oob+0x20/0x38 [ 20.025091] kunit_try_run_case+0x170/0x3f0 [ 20.025445] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.025576] kthread+0x328/0x630 [ 20.025673] ret_from_fork+0x10/0x20 [ 20.025778] [ 20.025815] Allocated by task 168: [ 20.025874] kasan_save_stack+0x3c/0x68 [ 20.027436] kasan_save_track+0x20/0x40 [ 20.028426] kasan_save_alloc_info+0x40/0x58 [ 20.028808] __kasan_krealloc+0x118/0x178 [ 20.029546] krealloc_noprof+0x128/0x360 [ 20.030104] krealloc_less_oob_helper+0x168/0xc50 [ 20.030453] krealloc_less_oob+0x20/0x38 [ 20.030529] kunit_try_run_case+0x170/0x3f0 [ 20.031324] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.031700] kthread+0x328/0x630 [ 20.031776] ret_from_fork+0x10/0x20 [ 20.031853] [ 20.031896] The buggy address belongs to the object at fff00000c59a8e00 [ 20.031896] which belongs to the cache kmalloc-256 of size 256 [ 20.032815] The buggy address is located 17 bytes to the right of [ 20.032815] allocated 201-byte region [fff00000c59a8e00, fff00000c59a8ec9) [ 20.033485] [ 20.033880] The buggy address belongs to the physical page: [ 20.034206] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059a8 [ 20.034314] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.034809] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.034954] page_type: f5(slab) [ 20.035048] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 20.035166] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.036517] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 20.036850] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.037670] head: 0bfffe0000000001 ffffc1ffc3166a01 00000000ffffffff 00000000ffffffff [ 20.038168] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 20.038434] page dumped because: kasan: bad access detected [ 20.038505] [ 20.038773] Memory state around the buggy address: [ 20.038864] fff00000c59a8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.039043] fff00000c59a8e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.039188] >fff00000c59a8e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 20.039273] ^ [ 20.039608] fff00000c59a8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.039942] fff00000c59a8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.040197] ================================================================== [ 20.199909] ================================================================== [ 20.200008] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 20.200128] Write of size 1 at addr fff00000c76d20ea by task kunit_try_catch/172 [ 20.200240] [ 20.200665] CPU: 0 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 20.200930] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.201083] Hardware name: linux,dummy-virt (DT) [ 20.201195] Call trace: [ 20.201456] show_stack+0x20/0x38 (C) [ 20.201628] dump_stack_lvl+0x8c/0xd0 [ 20.201844] print_report+0x118/0x608 [ 20.202058] kasan_report+0xdc/0x128 [ 20.202222] __asan_report_store1_noabort+0x20/0x30 [ 20.202432] krealloc_less_oob_helper+0xae4/0xc50 [ 20.202613] krealloc_large_less_oob+0x20/0x38 [ 20.202710] kunit_try_run_case+0x170/0x3f0 [ 20.202793] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.202887] kthread+0x328/0x630 [ 20.203255] ret_from_fork+0x10/0x20 [ 20.203367] [ 20.203504] The buggy address belongs to the physical page: [ 20.203578] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076d0 [ 20.203822] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.203997] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.204115] page_type: f8(unknown) [ 20.204198] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.204306] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 20.204413] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.204518] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 20.204649] head: 0bfffe0000000002 ffffc1ffc31db401 00000000ffffffff 00000000ffffffff [ 20.204761] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 20.204846] page dumped because: kasan: bad access detected [ 20.205255] [ 20.205304] Memory state around the buggy address: [ 20.205821] fff00000c76d1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.206119] fff00000c76d2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.206216] >fff00000c76d2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 20.206303] ^ [ 20.206439] fff00000c76d2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.206583] fff00000c76d2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.206747] ================================================================== [ 20.207406] ================================================================== [ 20.207506] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 20.207603] Write of size 1 at addr fff00000c76d20eb by task kunit_try_catch/172 [ 20.207706] [ 20.207762] CPU: 0 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 20.207935] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.207992] Hardware name: linux,dummy-virt (DT) [ 20.208067] Call trace: [ 20.208113] show_stack+0x20/0x38 (C) [ 20.208220] dump_stack_lvl+0x8c/0xd0 [ 20.208322] print_report+0x118/0x608 [ 20.208425] kasan_report+0xdc/0x128 [ 20.208536] __asan_report_store1_noabort+0x20/0x30 [ 20.208660] krealloc_less_oob_helper+0xa58/0xc50 [ 20.208776] krealloc_large_less_oob+0x20/0x38 [ 20.208879] kunit_try_run_case+0x170/0x3f0 [ 20.208980] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.210810] kthread+0x328/0x630 [ 20.210908] ret_from_fork+0x10/0x20 [ 20.211008] [ 20.211059] The buggy address belongs to the physical page: [ 20.211120] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076d0 [ 20.211235] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.211334] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.211865] page_type: f8(unknown) [ 20.212087] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.212744] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 20.213135] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.213264] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 20.213445] head: 0bfffe0000000002 ffffc1ffc31db401 00000000ffffffff 00000000ffffffff [ 20.213551] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 20.213634] page dumped because: kasan: bad access detected [ 20.213696] [ 20.213732] Memory state around the buggy address: [ 20.213983] fff00000c76d1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.214150] fff00000c76d2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.214264] >fff00000c76d2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 20.214350] ^ [ 20.214434] fff00000c76d2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.214525] fff00000c76d2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.214605] ================================================================== [ 20.064277] ================================================================== [ 20.064396] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 20.064515] Write of size 1 at addr fff00000c59a8eeb by task kunit_try_catch/168 [ 20.065629] [ 20.065817] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 20.066695] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.066943] Hardware name: linux,dummy-virt (DT) [ 20.067136] Call trace: [ 20.067245] show_stack+0x20/0x38 (C) [ 20.067612] dump_stack_lvl+0x8c/0xd0 [ 20.067809] print_report+0x118/0x608 [ 20.067945] kasan_report+0xdc/0x128 [ 20.068338] __asan_report_store1_noabort+0x20/0x30 [ 20.069031] krealloc_less_oob_helper+0xa58/0xc50 [ 20.069227] krealloc_less_oob+0x20/0x38 [ 20.069445] kunit_try_run_case+0x170/0x3f0 [ 20.069566] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.069938] kthread+0x328/0x630 [ 20.070116] ret_from_fork+0x10/0x20 [ 20.070505] [ 20.070563] Allocated by task 168: [ 20.070871] kasan_save_stack+0x3c/0x68 [ 20.070976] kasan_save_track+0x20/0x40 [ 20.071344] kasan_save_alloc_info+0x40/0x58 [ 20.071744] __kasan_krealloc+0x118/0x178 [ 20.071867] krealloc_noprof+0x128/0x360 [ 20.071961] krealloc_less_oob_helper+0x168/0xc50 [ 20.072263] krealloc_less_oob+0x20/0x38 [ 20.072368] kunit_try_run_case+0x170/0x3f0 [ 20.072580] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.073226] kthread+0x328/0x630 [ 20.073327] ret_from_fork+0x10/0x20 [ 20.073505] [ 20.073563] The buggy address belongs to the object at fff00000c59a8e00 [ 20.073563] which belongs to the cache kmalloc-256 of size 256 [ 20.073717] The buggy address is located 34 bytes to the right of [ 20.073717] allocated 201-byte region [fff00000c59a8e00, fff00000c59a8ec9) [ 20.073866] [ 20.073913] The buggy address belongs to the physical page: [ 20.073989] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059a8 [ 20.074409] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.074891] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.075411] page_type: f5(slab) [ 20.075500] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 20.075672] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.075809] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 20.076694] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 20.077447] head: 0bfffe0000000001 ffffc1ffc3166a01 00000000ffffffff 00000000ffffffff [ 20.077578] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 20.077678] page dumped because: kasan: bad access detected [ 20.077766] [ 20.077807] Memory state around the buggy address: [ 20.077885] fff00000c59a8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.078261] fff00000c59a8e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.078760] >fff00000c59a8e80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 20.078864] ^ [ 20.078946] fff00000c59a8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.079038] fff00000c59a8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.079109] ================================================================== [ 20.191917] ================================================================== [ 20.192056] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 20.192426] Write of size 1 at addr fff00000c76d20da by task kunit_try_catch/172 [ 20.192634] [ 20.192738] CPU: 0 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 20.193182] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.193249] Hardware name: linux,dummy-virt (DT) [ 20.193369] Call trace: [ 20.193470] show_stack+0x20/0x38 (C) [ 20.193772] dump_stack_lvl+0x8c/0xd0 [ 20.193914] print_report+0x118/0x608 [ 20.194141] kasan_report+0xdc/0x128 [ 20.194275] __asan_report_store1_noabort+0x20/0x30 [ 20.194454] krealloc_less_oob_helper+0xa80/0xc50 [ 20.194540] krealloc_large_less_oob+0x20/0x38 [ 20.194625] kunit_try_run_case+0x170/0x3f0 [ 20.194718] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.195055] kthread+0x328/0x630 [ 20.195258] ret_from_fork+0x10/0x20 [ 20.195483] [ 20.195727] The buggy address belongs to the physical page: [ 20.195841] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076d0 [ 20.196084] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.196176] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.196360] page_type: f8(unknown) [ 20.196441] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.196880] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 20.197070] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.197260] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 20.197360] head: 0bfffe0000000002 ffffc1ffc31db401 00000000ffffffff 00000000ffffffff [ 20.197621] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 20.197710] page dumped because: kasan: bad access detected [ 20.197840] [ 20.197899] Memory state around the buggy address: [ 20.198101] fff00000c76d1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.198232] fff00000c76d2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.198365] >fff00000c76d2080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 20.198434] ^ [ 20.198498] fff00000c76d2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.198576] fff00000c76d2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.198652] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 19.976273] ================================================================== [ 19.976563] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 19.976696] Write of size 1 at addr fff00000c59a8cf0 by task kunit_try_catch/166 [ 19.976809] [ 19.976892] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 19.977101] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.977165] Hardware name: linux,dummy-virt (DT) [ 19.977240] Call trace: [ 19.977292] show_stack+0x20/0x38 (C) [ 19.977924] dump_stack_lvl+0x8c/0xd0 [ 19.978120] print_report+0x118/0x608 [ 19.978276] kasan_report+0xdc/0x128 [ 19.978384] __asan_report_store1_noabort+0x20/0x30 [ 19.978474] krealloc_more_oob_helper+0x5c0/0x678 [ 19.978557] krealloc_more_oob+0x20/0x38 [ 19.978643] kunit_try_run_case+0x170/0x3f0 [ 19.978720] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.978820] kthread+0x328/0x630 [ 19.978903] ret_from_fork+0x10/0x20 [ 19.979073] [ 19.979131] Allocated by task 166: [ 19.979214] kasan_save_stack+0x3c/0x68 [ 19.979336] kasan_save_track+0x20/0x40 [ 19.979417] kasan_save_alloc_info+0x40/0x58 [ 19.979532] __kasan_krealloc+0x118/0x178 [ 19.979638] krealloc_noprof+0x128/0x360 [ 19.979747] krealloc_more_oob_helper+0x168/0x678 [ 19.979855] krealloc_more_oob+0x20/0x38 [ 19.979945] kunit_try_run_case+0x170/0x3f0 [ 19.980030] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.980111] kthread+0x328/0x630 [ 19.980178] ret_from_fork+0x10/0x20 [ 19.980253] [ 19.980667] The buggy address belongs to the object at fff00000c59a8c00 [ 19.980667] which belongs to the cache kmalloc-256 of size 256 [ 19.980812] The buggy address is located 5 bytes to the right of [ 19.980812] allocated 235-byte region [fff00000c59a8c00, fff00000c59a8ceb) [ 19.981167] [ 19.981286] The buggy address belongs to the physical page: [ 19.981466] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059a8 [ 19.981634] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.981776] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.981932] page_type: f5(slab) [ 19.982046] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 19.982164] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.982276] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 19.982385] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.982487] head: 0bfffe0000000001 ffffc1ffc3166a01 00000000ffffffff 00000000ffffffff [ 19.982573] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 19.982643] page dumped because: kasan: bad access detected [ 19.982700] [ 19.982733] Memory state around the buggy address: [ 19.982794] fff00000c59a8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.982892] fff00000c59a8c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.982979] >fff00000c59a8c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 19.983424] ^ [ 19.983549] fff00000c59a8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.983647] fff00000c59a8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.983723] ================================================================== [ 20.125761] ================================================================== [ 20.125927] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 20.128285] Write of size 1 at addr fff00000c76d20eb by task kunit_try_catch/170 [ 20.128597] [ 20.128698] CPU: 0 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 20.129584] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.130124] Hardware name: linux,dummy-virt (DT) [ 20.130303] Call trace: [ 20.130355] show_stack+0x20/0x38 (C) [ 20.130490] dump_stack_lvl+0x8c/0xd0 [ 20.130583] print_report+0x118/0x608 [ 20.130665] kasan_report+0xdc/0x128 [ 20.130748] __asan_report_store1_noabort+0x20/0x30 [ 20.130854] krealloc_more_oob_helper+0x60c/0x678 [ 20.132317] krealloc_large_more_oob+0x20/0x38 [ 20.132590] kunit_try_run_case+0x170/0x3f0 [ 20.132902] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.133552] kthread+0x328/0x630 [ 20.134279] ret_from_fork+0x10/0x20 [ 20.134555] [ 20.134815] The buggy address belongs to the physical page: [ 20.135100] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076d0 [ 20.135506] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.135617] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.135742] page_type: f8(unknown) [ 20.135828] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.136656] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 20.136817] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.137638] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 20.138306] head: 0bfffe0000000002 ffffc1ffc31db401 00000000ffffffff 00000000ffffffff [ 20.138598] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 20.138814] page dumped because: kasan: bad access detected [ 20.138990] [ 20.139120] Memory state around the buggy address: [ 20.139196] fff00000c76d1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.139292] fff00000c76d2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.139384] >fff00000c76d2080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 20.139458] ^ [ 20.139544] fff00000c76d2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.140371] fff00000c76d2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.141707] ================================================================== [ 19.960643] ================================================================== [ 19.960983] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 19.961154] Write of size 1 at addr fff00000c59a8ceb by task kunit_try_catch/166 [ 19.961455] [ 19.961616] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 19.961856] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.961924] Hardware name: linux,dummy-virt (DT) [ 19.962001] Call trace: [ 19.962099] show_stack+0x20/0x38 (C) [ 19.962218] dump_stack_lvl+0x8c/0xd0 [ 19.962328] print_report+0x118/0x608 [ 19.962422] kasan_report+0xdc/0x128 [ 19.962510] __asan_report_store1_noabort+0x20/0x30 [ 19.962648] krealloc_more_oob_helper+0x60c/0x678 [ 19.962788] krealloc_more_oob+0x20/0x38 [ 19.962931] kunit_try_run_case+0x170/0x3f0 [ 19.963433] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.963584] kthread+0x328/0x630 [ 19.963694] ret_from_fork+0x10/0x20 [ 19.963888] [ 19.963934] Allocated by task 166: [ 19.964126] kasan_save_stack+0x3c/0x68 [ 19.964502] kasan_save_track+0x20/0x40 [ 19.964633] kasan_save_alloc_info+0x40/0x58 [ 19.965216] __kasan_krealloc+0x118/0x178 [ 19.965746] krealloc_noprof+0x128/0x360 [ 19.965992] krealloc_more_oob_helper+0x168/0x678 [ 19.966110] krealloc_more_oob+0x20/0x38 [ 19.966195] kunit_try_run_case+0x170/0x3f0 [ 19.966265] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.966820] kthread+0x328/0x630 [ 19.966998] ret_from_fork+0x10/0x20 [ 19.967113] [ 19.967279] The buggy address belongs to the object at fff00000c59a8c00 [ 19.967279] which belongs to the cache kmalloc-256 of size 256 [ 19.967490] The buggy address is located 0 bytes to the right of [ 19.967490] allocated 235-byte region [fff00000c59a8c00, fff00000c59a8ceb) [ 19.967638] [ 19.967680] The buggy address belongs to the physical page: [ 19.968010] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059a8 [ 19.968325] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.968446] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.968593] page_type: f5(slab) [ 19.968695] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 19.968892] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.969218] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 19.969539] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.969841] head: 0bfffe0000000001 ffffc1ffc3166a01 00000000ffffffff 00000000ffffffff [ 19.970139] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 19.970239] page dumped because: kasan: bad access detected [ 19.970560] [ 19.970608] Memory state around the buggy address: [ 19.970696] fff00000c59a8b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.970787] fff00000c59a8c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.970875] >fff00000c59a8c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 19.971136] ^ [ 19.971231] fff00000c59a8d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.971356] fff00000c59a8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.971489] ================================================================== [ 20.143791] ================================================================== [ 20.143890] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 20.143997] Write of size 1 at addr fff00000c76d20f0 by task kunit_try_catch/170 [ 20.145888] [ 20.146299] CPU: 0 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 20.146462] Tainted: [B]=BAD_PAGE, [N]=TEST [ 20.146514] Hardware name: linux,dummy-virt (DT) [ 20.146576] Call trace: [ 20.146620] show_stack+0x20/0x38 (C) [ 20.146734] dump_stack_lvl+0x8c/0xd0 [ 20.146836] print_report+0x118/0x608 [ 20.146937] kasan_report+0xdc/0x128 [ 20.148935] __asan_report_store1_noabort+0x20/0x30 [ 20.149405] krealloc_more_oob_helper+0x5c0/0x678 [ 20.150113] krealloc_large_more_oob+0x20/0x38 [ 20.150321] kunit_try_run_case+0x170/0x3f0 [ 20.150984] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 20.151367] kthread+0x328/0x630 [ 20.151891] ret_from_fork+0x10/0x20 [ 20.152617] [ 20.152859] The buggy address belongs to the physical page: [ 20.152931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076d0 [ 20.153106] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 20.153824] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 20.154284] page_type: f8(unknown) [ 20.154365] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.155099] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 20.155399] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 20.155504] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 20.155611] head: 0bfffe0000000002 ffffc1ffc31db401 00000000ffffffff 00000000ffffffff [ 20.155717] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 20.155803] page dumped because: kasan: bad access detected [ 20.155870] [ 20.155906] Memory state around the buggy address: [ 20.155975] fff00000c76d1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.157658] fff00000c76d2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 20.158482] >fff00000c76d2080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 20.158675] ^ [ 20.158805] fff00000c76d2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.158896] fff00000c76d2180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 20.158967] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 19.937780] ================================================================== [ 19.938083] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 19.938226] Read of size 1 at addr fff00000c7720000 by task kunit_try_catch/164 [ 19.938325] [ 19.938401] CPU: 0 UID: 0 PID: 164 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 19.938589] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.938647] Hardware name: linux,dummy-virt (DT) [ 19.938708] Call trace: [ 19.938749] show_stack+0x20/0x38 (C) [ 19.938840] dump_stack_lvl+0x8c/0xd0 [ 19.938928] print_report+0x118/0x608 [ 19.939000] kasan_report+0xdc/0x128 [ 19.939088] __asan_report_load1_noabort+0x20/0x30 [ 19.939185] page_alloc_uaf+0x328/0x350 [ 19.939286] kunit_try_run_case+0x170/0x3f0 [ 19.939415] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.939548] kthread+0x328/0x630 [ 19.939640] ret_from_fork+0x10/0x20 [ 19.939746] [ 19.939791] The buggy address belongs to the physical page: [ 19.939856] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107720 [ 19.939969] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.940077] page_type: f0(buddy) [ 19.940161] raw: 0bfffe0000000000 fff00000ff616108 fff00000ff616108 0000000000000000 [ 19.940267] raw: 0000000000000000 0000000000000005 00000000f0000000 0000000000000000 [ 19.940426] page dumped because: kasan: bad access detected [ 19.940811] [ 19.940868] Memory state around the buggy address: [ 19.940971] fff00000c771ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.941302] fff00000c771ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.941422] >fff00000c7720000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.941509] ^ [ 19.941747] fff00000c7720080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.941847] fff00000c7720100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.941935] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[ 19.906824] ================================================================== [ 19.907117] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 19.907337] Free of addr fff00000c76cc001 by task kunit_try_catch/160 [ 19.907463] [ 19.907557] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 19.907772] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.907824] Hardware name: linux,dummy-virt (DT) [ 19.907881] Call trace: [ 19.907928] show_stack+0x20/0x38 (C) [ 19.908037] dump_stack_lvl+0x8c/0xd0 [ 19.908169] print_report+0x118/0x608 [ 19.908264] kasan_report_invalid_free+0xc0/0xe8 [ 19.908356] __kasan_kfree_large+0x5c/0xa8 [ 19.908447] free_large_kmalloc+0x68/0x150 [ 19.908551] kfree+0x270/0x3c8 [ 19.908649] kmalloc_large_invalid_free+0x108/0x270 [ 19.909052] kunit_try_run_case+0x170/0x3f0 [ 19.909176] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.909474] kthread+0x328/0x630 [ 19.909585] ret_from_fork+0x10/0x20 [ 19.909712] [ 19.909821] The buggy address belongs to the physical page: [ 19.909891] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc [ 19.910478] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.910594] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.910716] page_type: f8(unknown) [ 19.910807] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.910909] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 19.910995] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.911088] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 19.911181] head: 0bfffe0000000002 ffffc1ffc31db301 00000000ffffffff 00000000ffffffff [ 19.911277] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.911367] page dumped because: kasan: bad access detected [ 19.911431] [ 19.911466] Memory state around the buggy address: [ 19.911542] fff00000c76cbf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.911632] fff00000c76cbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.911726] >fff00000c76cc000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.911808] ^ [ 19.911874] fff00000c76cc080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.911984] fff00000c76cc100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.912107] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 19.884903] ================================================================== [ 19.885084] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 19.885225] Read of size 1 at addr fff00000c76cc000 by task kunit_try_catch/158 [ 19.885345] [ 19.885430] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 19.885624] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.885681] Hardware name: linux,dummy-virt (DT) [ 19.885750] Call trace: [ 19.885800] show_stack+0x20/0x38 (C) [ 19.885906] dump_stack_lvl+0x8c/0xd0 [ 19.886011] print_report+0x118/0x608 [ 19.886334] kasan_report+0xdc/0x128 [ 19.886428] __asan_report_load1_noabort+0x20/0x30 [ 19.886531] kmalloc_large_uaf+0x2cc/0x2f8 [ 19.887414] kunit_try_run_case+0x170/0x3f0 [ 19.887810] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.887938] kthread+0x328/0x630 [ 19.888049] ret_from_fork+0x10/0x20 [ 19.888985] [ 19.889071] The buggy address belongs to the physical page: [ 19.889219] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc [ 19.889623] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.889781] raw: 0bfffe0000000000 ffffc1ffc31db408 fff00000da473c80 0000000000000000 [ 19.889893] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 19.889982] page dumped because: kasan: bad access detected [ 19.890265] [ 19.890466] Memory state around the buggy address: [ 19.890548] fff00000c76cbf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.890654] fff00000c76cbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.890748] >fff00000c76cc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.891335] ^ [ 19.891472] fff00000c76cc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.891575] fff00000c76cc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 19.891661] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 19.861614] ================================================================== [ 19.862080] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 19.862520] Write of size 1 at addr fff00000c76ce00a by task kunit_try_catch/156 [ 19.862692] [ 19.862776] CPU: 0 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 19.863144] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.863208] Hardware name: linux,dummy-virt (DT) [ 19.863290] Call trace: [ 19.863351] show_stack+0x20/0x38 (C) [ 19.863469] dump_stack_lvl+0x8c/0xd0 [ 19.863580] print_report+0x118/0x608 [ 19.863740] kasan_report+0xdc/0x128 [ 19.863958] __asan_report_store1_noabort+0x20/0x30 [ 19.864353] kmalloc_large_oob_right+0x278/0x2b8 [ 19.864515] kunit_try_run_case+0x170/0x3f0 [ 19.864714] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.864992] kthread+0x328/0x630 [ 19.865115] ret_from_fork+0x10/0x20 [ 19.865500] [ 19.865598] The buggy address belongs to the physical page: [ 19.865783] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cc [ 19.865939] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.866049] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.866196] page_type: f8(unknown) [ 19.866296] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.866412] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 19.866511] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 19.866985] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 19.867168] head: 0bfffe0000000002 ffffc1ffc31db301 00000000ffffffff 00000000ffffffff [ 19.867380] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 19.867565] page dumped because: kasan: bad access detected [ 19.867790] [ 19.867860] Memory state around the buggy address: [ 19.867953] fff00000c76cdf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.868172] fff00000c76cdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.868562] >fff00000c76ce000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.868718] ^ [ 19.868798] fff00000c76ce080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.868892] fff00000c76ce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 19.868978] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 19.820998] ================================================================== [ 19.821438] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 19.821809] Write of size 1 at addr fff00000c64a5f00 by task kunit_try_catch/154 [ 19.821961] [ 19.822055] CPU: 0 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 19.822468] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.822532] Hardware name: linux,dummy-virt (DT) [ 19.822606] Call trace: [ 19.822658] show_stack+0x20/0x38 (C) [ 19.822857] dump_stack_lvl+0x8c/0xd0 [ 19.823054] print_report+0x118/0x608 [ 19.823386] kasan_report+0xdc/0x128 [ 19.823567] __asan_report_store1_noabort+0x20/0x30 [ 19.823670] kmalloc_big_oob_right+0x2a4/0x2f0 [ 19.823806] kunit_try_run_case+0x170/0x3f0 [ 19.824034] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.824216] kthread+0x328/0x630 [ 19.824315] ret_from_fork+0x10/0x20 [ 19.824955] [ 19.825061] Allocated by task 154: [ 19.825241] kasan_save_stack+0x3c/0x68 [ 19.825343] kasan_save_track+0x20/0x40 [ 19.825426] kasan_save_alloc_info+0x40/0x58 [ 19.825511] __kasan_kmalloc+0xd4/0xd8 [ 19.825587] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.825675] kmalloc_big_oob_right+0xb8/0x2f0 [ 19.826121] kunit_try_run_case+0x170/0x3f0 [ 19.826440] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.826562] kthread+0x328/0x630 [ 19.826800] ret_from_fork+0x10/0x20 [ 19.826935] [ 19.826984] The buggy address belongs to the object at fff00000c64a4000 [ 19.826984] which belongs to the cache kmalloc-8k of size 8192 [ 19.827117] The buggy address is located 0 bytes to the right of [ 19.827117] allocated 7936-byte region [fff00000c64a4000, fff00000c64a5f00) [ 19.827288] [ 19.827337] The buggy address belongs to the physical page: [ 19.827414] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064a0 [ 19.827600] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.827790] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.827910] page_type: f5(slab) [ 19.828333] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 19.828451] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 19.828849] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 19.829048] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 19.829191] head: 0bfffe0000000003 ffffc1ffc3192801 00000000ffffffff 00000000ffffffff [ 19.830049] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 19.830243] page dumped because: kasan: bad access detected [ 19.830320] [ 19.830361] Memory state around the buggy address: [ 19.830437] fff00000c64a5e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.830531] fff00000c64a5e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.830618] >fff00000c64a5f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.830686] ^ [ 19.830737] fff00000c64a5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.830820] fff00000c64a6000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.831675] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[ 19.781730] ================================================================== [ 19.781871] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488 [ 19.782047] Write of size 1 at addr fff00000c6423578 by task kunit_try_catch/152 [ 19.782180] [ 19.782257] CPU: 0 UID: 0 PID: 152 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 19.782979] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.783044] Hardware name: linux,dummy-virt (DT) [ 19.783104] Call trace: [ 19.783171] show_stack+0x20/0x38 (C) [ 19.783285] dump_stack_lvl+0x8c/0xd0 [ 19.783381] print_report+0x118/0x608 [ 19.783878] kasan_report+0xdc/0x128 [ 19.784149] __asan_report_store1_noabort+0x20/0x30 [ 19.784514] kmalloc_track_caller_oob_right+0x418/0x488 [ 19.784664] kunit_try_run_case+0x170/0x3f0 [ 19.784781] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.784908] kthread+0x328/0x630 [ 19.785011] ret_from_fork+0x10/0x20 [ 19.785136] [ 19.785178] Allocated by task 152: [ 19.785241] kasan_save_stack+0x3c/0x68 [ 19.785334] kasan_save_track+0x20/0x40 [ 19.786110] kasan_save_alloc_info+0x40/0x58 [ 19.786220] __kasan_kmalloc+0xd4/0xd8 [ 19.786301] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 19.786387] kmalloc_track_caller_oob_right+0x184/0x488 [ 19.786457] kunit_try_run_case+0x170/0x3f0 [ 19.786538] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.786658] kthread+0x328/0x630 [ 19.786728] ret_from_fork+0x10/0x20 [ 19.786799] [ 19.786834] The buggy address belongs to the object at fff00000c6423500 [ 19.786834] which belongs to the cache kmalloc-128 of size 128 [ 19.786956] The buggy address is located 0 bytes to the right of [ 19.786956] allocated 120-byte region [fff00000c6423500, fff00000c6423578) [ 19.787412] [ 19.787472] The buggy address belongs to the physical page: [ 19.787646] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106423 [ 19.787955] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.788386] page_type: f5(slab) [ 19.788481] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.789407] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.789939] page dumped because: kasan: bad access detected [ 19.790102] [ 19.790166] Memory state around the buggy address: [ 19.790369] fff00000c6423400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.790459] fff00000c6423480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.790543] >fff00000c6423500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.790618] ^ [ 19.791220] fff00000c6423580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.791694] fff00000c6423600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.791946] ================================================================== [ 19.769151] ================================================================== [ 19.769326] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 19.769464] Write of size 1 at addr fff00000c6423478 by task kunit_try_catch/152 [ 19.769577] [ 19.769656] CPU: 0 UID: 0 PID: 152 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 19.769849] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.769911] Hardware name: linux,dummy-virt (DT) [ 19.769982] Call trace: [ 19.771070] show_stack+0x20/0x38 (C) [ 19.771714] dump_stack_lvl+0x8c/0xd0 [ 19.771876] print_report+0x118/0x608 [ 19.772012] kasan_report+0xdc/0x128 [ 19.772125] __asan_report_store1_noabort+0x20/0x30 [ 19.772536] kmalloc_track_caller_oob_right+0x40c/0x488 [ 19.772805] kunit_try_run_case+0x170/0x3f0 [ 19.773163] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.773449] kthread+0x328/0x630 [ 19.773750] ret_from_fork+0x10/0x20 [ 19.774011] [ 19.774138] Allocated by task 152: [ 19.774214] kasan_save_stack+0x3c/0x68 [ 19.774600] kasan_save_track+0x20/0x40 [ 19.774679] kasan_save_alloc_info+0x40/0x58 [ 19.774762] __kasan_kmalloc+0xd4/0xd8 [ 19.774891] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 19.775135] kmalloc_track_caller_oob_right+0xa8/0x488 [ 19.775326] kunit_try_run_case+0x170/0x3f0 [ 19.775737] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.775949] kthread+0x328/0x630 [ 19.776138] ret_from_fork+0x10/0x20 [ 19.776253] [ 19.776301] The buggy address belongs to the object at fff00000c6423400 [ 19.776301] which belongs to the cache kmalloc-128 of size 128 [ 19.776433] The buggy address is located 0 bytes to the right of [ 19.776433] allocated 120-byte region [fff00000c6423400, fff00000c6423478) [ 19.776599] [ 19.777053] The buggy address belongs to the physical page: [ 19.777136] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106423 [ 19.777389] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.777678] page_type: f5(slab) [ 19.777794] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.778110] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.778327] page dumped because: kasan: bad access detected [ 19.778459] [ 19.778520] Memory state around the buggy address: [ 19.778774] fff00000c6423300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.778879] fff00000c6423380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.779065] >fff00000c6423400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 19.779204] ^ [ 19.779325] fff00000c6423480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.779433] fff00000c6423500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.779515] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 19.741621] ================================================================== [ 19.741808] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 19.741954] Read of size 1 at addr fff00000c7503000 by task kunit_try_catch/150 [ 19.742089] [ 19.742377] CPU: 0 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 19.742972] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.743065] Hardware name: linux,dummy-virt (DT) [ 19.743130] Call trace: [ 19.743174] show_stack+0x20/0x38 (C) [ 19.743675] dump_stack_lvl+0x8c/0xd0 [ 19.743919] print_report+0x118/0x608 [ 19.744048] kasan_report+0xdc/0x128 [ 19.744149] __asan_report_load1_noabort+0x20/0x30 [ 19.744268] kmalloc_node_oob_right+0x2f4/0x330 [ 19.744381] kunit_try_run_case+0x170/0x3f0 [ 19.744493] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.744634] kthread+0x328/0x630 [ 19.744748] ret_from_fork+0x10/0x20 [ 19.744863] [ 19.744906] Allocated by task 150: [ 19.744971] kasan_save_stack+0x3c/0x68 [ 19.745073] kasan_save_track+0x20/0x40 [ 19.745157] kasan_save_alloc_info+0x40/0x58 [ 19.745250] __kasan_kmalloc+0xd4/0xd8 [ 19.745328] __kmalloc_cache_node_noprof+0x178/0x3d0 [ 19.745423] kmalloc_node_oob_right+0xbc/0x330 [ 19.745510] kunit_try_run_case+0x170/0x3f0 [ 19.745599] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.745691] kthread+0x328/0x630 [ 19.745772] ret_from_fork+0x10/0x20 [ 19.746089] [ 19.746135] The buggy address belongs to the object at fff00000c7502000 [ 19.746135] which belongs to the cache kmalloc-4k of size 4096 [ 19.746267] The buggy address is located 0 bytes to the right of [ 19.746267] allocated 4096-byte region [fff00000c7502000, fff00000c7503000) [ 19.746888] [ 19.746978] The buggy address belongs to the physical page: [ 19.747156] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107500 [ 19.747569] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 19.747684] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 19.747832] page_type: f5(slab) [ 19.747926] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 19.748105] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 19.748287] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 19.748442] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 19.748612] head: 0bfffe0000000003 ffffc1ffc31d4001 00000000ffffffff 00000000ffffffff [ 19.748714] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 19.748812] page dumped because: kasan: bad access detected [ 19.748914] [ 19.748954] Memory state around the buggy address: [ 19.749033] fff00000c7502f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.749130] fff00000c7502f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 19.749240] >fff00000c7503000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.749325] ^ [ 19.749383] fff00000c7503080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.749472] fff00000c7503100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.749561] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 19.705248] ================================================================== [ 19.705385] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 19.705572] Read of size 1 at addr fff00000c60580bf by task kunit_try_catch/148 [ 19.705673] [ 19.705742] CPU: 0 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 19.705951] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.706035] Hardware name: linux,dummy-virt (DT) [ 19.706131] Call trace: [ 19.706203] show_stack+0x20/0x38 (C) [ 19.706337] dump_stack_lvl+0x8c/0xd0 [ 19.706479] print_report+0x118/0x608 [ 19.706613] kasan_report+0xdc/0x128 [ 19.706755] __asan_report_load1_noabort+0x20/0x30 [ 19.707079] kmalloc_oob_left+0x2ec/0x320 [ 19.707202] kunit_try_run_case+0x170/0x3f0 [ 19.707304] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.707419] kthread+0x328/0x630 [ 19.707856] ret_from_fork+0x10/0x20 [ 19.707978] [ 19.708026] Allocated by task 9: [ 19.708090] kasan_save_stack+0x3c/0x68 [ 19.708171] kasan_save_track+0x20/0x40 [ 19.708253] kasan_save_alloc_info+0x40/0x58 [ 19.708337] __kasan_kmalloc+0xd4/0xd8 [ 19.708412] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 19.708505] kvasprintf+0xe0/0x180 [ 19.708596] __kthread_create_on_node+0x16c/0x350 [ 19.708682] kthread_create_on_node+0xe4/0x130 [ 19.708760] create_worker+0x380/0x6b8 [ 19.709485] worker_thread+0x808/0xf38 [ 19.709593] kthread+0x328/0x630 [ 19.709664] ret_from_fork+0x10/0x20 [ 19.709736] [ 19.709776] The buggy address belongs to the object at fff00000c60580a0 [ 19.709776] which belongs to the cache kmalloc-16 of size 16 [ 19.710110] The buggy address is located 19 bytes to the right of [ 19.710110] allocated 12-byte region [fff00000c60580a0, fff00000c60580ac) [ 19.710514] [ 19.710559] The buggy address belongs to the physical page: [ 19.710620] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106058 [ 19.710715] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.710816] page_type: f5(slab) [ 19.710894] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 19.711863] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 19.712044] page dumped because: kasan: bad access detected [ 19.712317] [ 19.712652] Memory state around the buggy address: [ 19.712752] fff00000c6057f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.712850] fff00000c6058000: 00 00 fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 19.712985] >fff00000c6058080: fa fb fc fc 00 04 fc fc 00 07 fc fc fc fc fc fc [ 19.713105] ^ [ 19.713179] fff00000c6058100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.713299] fff00000c6058180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.713397] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 19.682120] ================================================================== [ 19.682220] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 19.682324] Read of size 1 at addr fff00000c6423380 by task kunit_try_catch/146 [ 19.682437] [ 19.682632] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 19.682873] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.682943] Hardware name: linux,dummy-virt (DT) [ 19.683072] Call trace: [ 19.683116] show_stack+0x20/0x38 (C) [ 19.683432] dump_stack_lvl+0x8c/0xd0 [ 19.683584] print_report+0x118/0x608 [ 19.683659] kasan_report+0xdc/0x128 [ 19.683747] __asan_report_load1_noabort+0x20/0x30 [ 19.683841] kmalloc_oob_right+0x5d0/0x660 [ 19.683927] kunit_try_run_case+0x170/0x3f0 [ 19.684032] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.684182] kthread+0x328/0x630 [ 19.684330] ret_from_fork+0x10/0x20 [ 19.684486] [ 19.684571] Allocated by task 146: [ 19.684647] kasan_save_stack+0x3c/0x68 [ 19.684741] kasan_save_track+0x20/0x40 [ 19.684821] kasan_save_alloc_info+0x40/0x58 [ 19.684913] __kasan_kmalloc+0xd4/0xd8 [ 19.685000] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.685103] kmalloc_oob_right+0xb0/0x660 [ 19.685185] kunit_try_run_case+0x170/0x3f0 [ 19.685280] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.685413] kthread+0x328/0x630 [ 19.685494] ret_from_fork+0x10/0x20 [ 19.685576] [ 19.685642] The buggy address belongs to the object at fff00000c6423300 [ 19.685642] which belongs to the cache kmalloc-128 of size 128 [ 19.685801] The buggy address is located 13 bytes to the right of [ 19.685801] allocated 115-byte region [fff00000c6423300, fff00000c6423373) [ 19.686006] [ 19.686341] The buggy address belongs to the physical page: [ 19.686594] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106423 [ 19.686870] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.686988] page_type: f5(slab) [ 19.687095] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.687259] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.687377] page dumped because: kasan: bad access detected [ 19.687446] [ 19.687482] Memory state around the buggy address: [ 19.688038] fff00000c6423280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.688157] fff00000c6423300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.688252] >fff00000c6423380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.688348] ^ [ 19.688417] fff00000c6423400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.688597] fff00000c6423480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.688695] ================================================================== [ 19.662873] ================================================================== [ 19.663439] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 19.664547] Write of size 1 at addr fff00000c6423373 by task kunit_try_catch/146 [ 19.664686] [ 19.665756] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 19.665932] Tainted: [N]=TEST [ 19.665972] Hardware name: linux,dummy-virt (DT) [ 19.666405] Call trace: [ 19.666687] show_stack+0x20/0x38 (C) [ 19.666869] dump_stack_lvl+0x8c/0xd0 [ 19.666942] print_report+0x118/0x608 [ 19.666997] kasan_report+0xdc/0x128 [ 19.667079] __asan_report_store1_noabort+0x20/0x30 [ 19.667138] kmalloc_oob_right+0x5a4/0x660 [ 19.667189] kunit_try_run_case+0x170/0x3f0 [ 19.667246] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.667303] kthread+0x328/0x630 [ 19.667351] ret_from_fork+0x10/0x20 [ 19.667546] [ 19.667595] Allocated by task 146: [ 19.667737] kasan_save_stack+0x3c/0x68 [ 19.667818] kasan_save_track+0x20/0x40 [ 19.667863] kasan_save_alloc_info+0x40/0x58 [ 19.667905] __kasan_kmalloc+0xd4/0xd8 [ 19.667944] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.667986] kmalloc_oob_right+0xb0/0x660 [ 19.668037] kunit_try_run_case+0x170/0x3f0 [ 19.668081] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.668125] kthread+0x328/0x630 [ 19.668159] ret_from_fork+0x10/0x20 [ 19.668224] [ 19.668296] The buggy address belongs to the object at fff00000c6423300 [ 19.668296] which belongs to the cache kmalloc-128 of size 128 [ 19.668406] The buggy address is located 0 bytes to the right of [ 19.668406] allocated 115-byte region [fff00000c6423300, fff00000c6423373) [ 19.668477] [ 19.668591] The buggy address belongs to the physical page: [ 19.668896] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106423 [ 19.669261] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.669601] page_type: f5(slab) [ 19.669977] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.670056] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.670279] page dumped because: kasan: bad access detected [ 19.670364] [ 19.670411] Memory state around the buggy address: [ 19.670839] fff00000c6423200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.670984] fff00000c6423280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.671107] >fff00000c6423300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.671242] ^ [ 19.671412] fff00000c6423380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.671464] fff00000c6423400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.671547] ================================================================== [ 19.673133] ================================================================== [ 19.673229] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 19.673351] Write of size 1 at addr fff00000c6423378 by task kunit_try_catch/146 [ 19.673464] [ 19.673541] CPU: 0 UID: 0 PID: 146 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 19.673746] Tainted: [B]=BAD_PAGE, [N]=TEST [ 19.673796] Hardware name: linux,dummy-virt (DT) [ 19.673854] Call trace: [ 19.673898] show_stack+0x20/0x38 (C) [ 19.673994] dump_stack_lvl+0x8c/0xd0 [ 19.674620] print_report+0x118/0x608 [ 19.674716] kasan_report+0xdc/0x128 [ 19.674813] __asan_report_store1_noabort+0x20/0x30 [ 19.675035] kmalloc_oob_right+0x538/0x660 [ 19.675136] kunit_try_run_case+0x170/0x3f0 [ 19.675245] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.675352] kthread+0x328/0x630 [ 19.675936] ret_from_fork+0x10/0x20 [ 19.676165] [ 19.676220] Allocated by task 146: [ 19.676304] kasan_save_stack+0x3c/0x68 [ 19.676401] kasan_save_track+0x20/0x40 [ 19.676484] kasan_save_alloc_info+0x40/0x58 [ 19.676590] __kasan_kmalloc+0xd4/0xd8 [ 19.676680] __kmalloc_cache_noprof+0x16c/0x3c0 [ 19.676770] kmalloc_oob_right+0xb0/0x660 [ 19.676852] kunit_try_run_case+0x170/0x3f0 [ 19.677296] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 19.677640] kthread+0x328/0x630 [ 19.677938] ret_from_fork+0x10/0x20 [ 19.678104] [ 19.678152] The buggy address belongs to the object at fff00000c6423300 [ 19.678152] which belongs to the cache kmalloc-128 of size 128 [ 19.678482] The buggy address is located 5 bytes to the right of [ 19.678482] allocated 115-byte region [fff00000c6423300, fff00000c6423373) [ 19.678616] [ 19.678656] The buggy address belongs to the physical page: [ 19.678718] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106423 [ 19.678806] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 19.678962] page_type: f5(slab) [ 19.679102] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 19.679331] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 19.679450] page dumped because: kasan: bad access detected [ 19.679522] [ 19.679709] Memory state around the buggy address: [ 19.679934] fff00000c6423200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 19.680088] fff00000c6423280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.680334] >fff00000c6423300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 19.680538] ^ [ 19.680662] fff00000c6423380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.680962] fff00000c6423400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 19.681178] ==================================================================
Failure - log-parser-boot - exception-warning-libteststest_ratelimit-at-test_ratelimit_stress_child
------------[ cut here ]------------ [ 170.946991] WARNING: lib/tests/test_ratelimit.c:87 at test_ratelimit_stress_child+0x160/0x1b8, CPU#0: test_ratelimit_/1562 [ 170.948070] Modules linked in: [ 170.948300] CPU: 0 UID: 0 PID: 1562 Comm: test_ratelimit_ Tainted: G B D W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 170.948652] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 170.948833] Hardware name: linux,dummy-virt (DT) [ 170.948995] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 170.949229] pc : test_ratelimit_stress_child+0x160/0x1b8 [ 170.949426] lr : test_ratelimit_stress_child+0x30/0x1b8 [ 170.949607] sp : ffff800089847d90 [ 170.949740] x29: ffff800089847d90 x28: 0000000000000000 x27: 0000000000000000 [ 170.951570] x26: 1ffe000019524fa1 x25: 0000000000000000 x24: 0000000000000004 [ 170.952562] x23: fff00000ca927d0c x22: fff00000cab58e28 x21: ffffacab76739eb0 [ 170.952918] x20: fff00000ca927d00 x19: fff00000cab58e28 x18: 00000000d8753c66 [ 170.953234] x17: 0000000000000001 x16: fff00000c5c5b03c x15: fff00000ff616b08 [ 170.953526] x14: 0000000000018fff x13: 1ffe00001b4923cd x12: fffd80001b48de49 [ 170.953814] x11: 1ffe00001b48de48 x10: fffd80001b48de48 x9 : ffffacab78d1774c [ 170.954114] x8 : ffff800089847ae8 x7 : 0000000000000001 x6 : ffff800089847c00 [ 170.955541] x5 : 0000000000000001 x4 : ffffacab7b0443e0 x3 : 0000000000000000 [ 170.956154] x2 : 1ffe00001956b1c9 x1 : 0000000000000000 x0 : 0000000000000000 [ 170.956503] Call trace: [ 170.956646] test_ratelimit_stress_child+0x160/0x1b8 (P) [ 170.956868] kthread+0x328/0x630 [ 170.957050] ret_from_fork+0x10/0x20 [ 170.957232] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-libmathint_log-at-intlog10
------------[ cut here ]------------ [ 102.405903] WARNING: lib/math/int_log.c:120 at intlog10+0x38/0x48, CPU#1: kunit_try_catch/666 [ 102.407903] Modules linked in: [ 102.408179] CPU: 1 UID: 0 PID: 666 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 102.408646] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 102.409072] Hardware name: linux,dummy-virt (DT) [ 102.409391] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 102.409609] pc : intlog10+0x38/0x48 [ 102.409840] lr : intlog10_test+0xe4/0x200 [ 102.410000] sp : ffff800082567c10 [ 102.410538] x29: ffff800082567c90 x28: 0000000000000000 x27: 0000000000000000 [ 102.410915] x26: 1ffe0000183c8821 x25: 0000000000000000 x24: ffff800082567ce0 [ 102.411320] x23: ffff800082567d00 x22: 0000000000000000 x21: 1ffff000104acf82 [ 102.411815] x20: ffffacab78fdba40 x19: ffff800080087990 x18: 00000000d1514d90 [ 102.412240] x17: 00000000dbb46be5 x16: fff00000c5c5ac3c x15: fff00000ff616b08 [ 102.412614] x14: 0000000000018fff x13: 1ffe00001b48dfcd x12: ffff75956f9c7381 [ 102.413078] x11: 1ffff5956f9c7380 x10: ffff75956f9c7380 x9 : ffffacab7663cadc [ 102.413506] x8 : ffffacab7ce39c03 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 102.413932] x5 : ffff7000104acf82 x4 : 1ffff00010010f3a x3 : 1ffff5956f1fb748 [ 102.414792] x2 : 1ffff5956f1fb748 x1 : 0000000000000003 x0 : 0000000000000000 [ 102.415242] Call trace: [ 102.415395] intlog10+0x38/0x48 (P) [ 102.415608] kunit_try_run_case+0x170/0x3f0 [ 102.415849] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 102.416130] kthread+0x328/0x630 [ 102.416457] ret_from_fork+0x10/0x20 [ 102.416663] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-libmathint_log-at-intlog2
------------[ cut here ]------------ [ 102.349046] WARNING: lib/math/int_log.c:63 at intlog2+0xd8/0xf8, CPU#1: kunit_try_catch/648 [ 102.351759] Modules linked in: [ 102.352075] CPU: 1 UID: 0 PID: 648 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 102.352775] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 102.353054] Hardware name: linux,dummy-virt (DT) [ 102.353437] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 102.354054] pc : intlog2+0xd8/0xf8 [ 102.354426] lr : intlog2_test+0xe4/0x200 [ 102.354782] sp : ffff800082487c10 [ 102.355063] x29: ffff800082487c90 x28: 0000000000000000 x27: 0000000000000000 [ 102.356010] x26: 1ffe0000182455e1 x25: 0000000000000000 x24: ffff800082487ce0 [ 102.356483] x23: ffff800082487d00 x22: 0000000000000000 x21: 1ffff00010490f82 [ 102.356885] x20: ffffacab78fdb940 x19: ffff800080087990 x18: 00000000fedbdc9d [ 102.357307] x17: 00000000b01ff327 x16: fff00000c5c5ac3c x15: fff00000ff616b08 [ 102.357701] x14: 0000000000018fff x13: 1ffe00001b48dfcd x12: ffff75956f9c7381 [ 102.358133] x11: 1ffff5956f9c7380 x10: ffff75956f9c7380 x9 : ffffacab7663ccdc [ 102.358553] x8 : ffffacab7ce39c03 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 102.358937] x5 : ffff700010490f82 x4 : 1ffff00010010f3a x3 : 1ffff5956f1fb728 [ 102.359458] x2 : 1ffff5956f1fb728 x1 : 0000000000000003 x0 : 0000000000000000 [ 102.360066] Call trace: [ 102.360197] intlog2+0xd8/0xf8 (P) [ 102.360378] kunit_try_run_case+0x170/0x3f0 [ 102.360560] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 102.360759] kthread+0x328/0x630 [ 102.360917] ret_from_fork+0x10/0x20 [ 102.361111] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - internal-error-oops-oops-smp
KNOWN ISSUE - LKFT: Dragonboard 845c: Internal error: Oops: ufs_qcom_setup_clocks
[ 101.277977] Internal error: Oops: 0000000096000005 [#1] SMP [ 101.283775] Modules linked in: [ 101.284319] CPU: 1 UID: 0 PID: 542 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc2-next-20250618 #1 PREEMPT [ 101.285391] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 101.285886] Hardware name: linux,dummy-virt (DT) [ 101.286341] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 101.286956] pc : kunit_test_null_dereference+0x70/0x170 [ 101.287616] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 101.288501] sp : ffff800082187d30 [ 101.288888] x29: ffff800082187d90 x28: 0000000000000000 x27: 0000000000000000 [ 101.289472] x26: 1ffe000018c09be1 x25: 0000000000000000 x24: 0000000000000004 [ 101.290542] x23: fff00000c604df0c x22: ffffacab7662a028 x21: fff00000c144ac08 [ 101.291270] x20: 1ffff00010430fa6 x19: ffff800080087990 x18: 000000007de2dbec [ 101.291963] x17: 000000001854f68b x16: 0000000015f66f64 x15: 000000002a7cb8cf [ 101.292595] x14: 00000000f1f1f1f1 x13: 1ffe00001b492389 x12: fffd800018ebcdc4 [ 101.293223] x11: 1ffe000018ebcdc3 x10: fffd800018ebcdc3 x9 : ffffacab76621490 [ 101.293845] x8 : ffff800082187c18 x7 : 0000000000000001 x6 : 0000000041b58ab3 [ 101.294458] x5 : ffff700010430fa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 101.295104] x2 : dfff800000000000 x1 : fff00000c75e6540 x0 : ffff800080087990 [ 101.295756] Call trace: [ 101.295997] kunit_test_null_dereference+0x70/0x170 (P) [ 101.296481] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 101.296908] kthread+0x328/0x630 [ 101.297251] ret_from_fork+0x10/0x20 [ 101.298076] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 101.298945] ---[ end trace 0000000000000000 ]---