Date
June 19, 2025, 12:07 p.m.
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 33.643167] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 33.667021] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 33.856163] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 33.961888] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 33.825100] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 33.554140] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[ 62.770983] ================================================================== [ 62.771103] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 62.771103] [ 62.771220] Use-after-free read at 0x000000004809c4a0 (in kfence-#175): [ 62.771282] test_krealloc+0x51c/0x830 [ 62.771337] kunit_try_run_case+0x170/0x3f0 [ 62.771387] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.771438] kthread+0x328/0x630 [ 62.771481] ret_from_fork+0x10/0x20 [ 62.771525] [ 62.771553] kfence-#175: 0x000000004809c4a0-0x00000000edeffef3, size=32, cache=kmalloc-32 [ 62.771553] [ 62.771616] allocated by task 348 on cpu 0 at 62.770095s (0.001516s ago): [ 62.771696] test_alloc+0x29c/0x628 [ 62.771742] test_krealloc+0xc0/0x830 [ 62.771788] kunit_try_run_case+0x170/0x3f0 [ 62.771832] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.771893] kthread+0x328/0x630 [ 62.771937] ret_from_fork+0x10/0x20 [ 62.771980] [ 62.772009] freed by task 348 on cpu 0 at 62.770451s (0.001554s ago): [ 62.772078] krealloc_noprof+0x148/0x360 [ 62.772122] test_krealloc+0x1dc/0x830 [ 62.772166] kunit_try_run_case+0x170/0x3f0 [ 62.772209] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.772256] kthread+0x328/0x630 [ 62.772294] ret_from_fork+0x10/0x20 [ 62.772338] [ 62.772390] CPU: 0 UID: 0 PID: 348 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 62.772480] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.772515] Hardware name: linux,dummy-virt (DT) [ 62.772557] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[ 62.682689] ================================================================== [ 62.682817] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 62.682817] [ 62.682984] Use-after-free read at 0x000000001abb479d (in kfence-#174): [ 62.683052] test_memcache_typesafe_by_rcu+0x280/0x560 [ 62.683113] kunit_try_run_case+0x170/0x3f0 [ 62.683166] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.683217] kthread+0x328/0x630 [ 62.683261] ret_from_fork+0x10/0x20 [ 62.683310] [ 62.683338] kfence-#174: 0x000000001abb479d-0x00000000ebc2782c, size=32, cache=test [ 62.683338] [ 62.683400] allocated by task 346 on cpu 0 at 62.672776s (0.010619s ago): [ 62.683485] test_alloc+0x230/0x628 [ 62.683532] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 62.683581] kunit_try_run_case+0x170/0x3f0 [ 62.683627] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.683676] kthread+0x328/0x630 [ 62.683715] ret_from_fork+0x10/0x20 [ 62.683759] [ 62.683787] freed by task 346 on cpu 0 at 62.673019s (0.010763s ago): [ 62.683851] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 62.683923] kunit_try_run_case+0x170/0x3f0 [ 62.683969] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.684015] kthread+0x328/0x630 [ 62.684053] ret_from_fork+0x10/0x20 [ 62.684097] [ 62.684148] CPU: 0 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 62.684240] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.684273] Hardware name: linux,dummy-virt (DT) [ 62.684310] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[ 41.472937] ================================================================== [ 41.473191] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 41.473191] [ 41.473423] Invalid read at 0x00000000c8d6a22c: [ 41.473740] test_invalid_access+0xdc/0x1f0 [ 41.474915] kunit_try_run_case+0x170/0x3f0 [ 41.475073] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.475341] kthread+0x328/0x630 [ 41.475604] ret_from_fork+0x10/0x20 [ 41.475861] [ 41.476458] CPU: 0 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 41.476695] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.477214] Hardware name: linux,dummy-virt (DT) [ 41.479717] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[ 36.105156] ================================================================== [ 36.105398] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 36.105398] [ 36.105625] Out-of-bounds write at 0x000000005d071ed7 (1B left of kfence-#121): [ 36.105845] test_out_of_bounds_write+0x100/0x240 [ 36.106185] kunit_try_run_case+0x170/0x3f0 [ 36.106306] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.106527] kthread+0x328/0x630 [ 36.106628] ret_from_fork+0x10/0x20 [ 36.106918] [ 36.107000] kfence-#121: 0x0000000059a1dc5c-0x00000000266452cf, size=32, cache=test [ 36.107000] [ 36.107183] allocated by task 304 on cpu 0 at 36.104776s (0.002396s ago): [ 36.107442] test_alloc+0x230/0x628 [ 36.107657] test_out_of_bounds_write+0xc8/0x240 [ 36.107763] kunit_try_run_case+0x170/0x3f0 [ 36.108144] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.108276] kthread+0x328/0x630 [ 36.108460] ret_from_fork+0x10/0x20 [ 36.108591] [ 36.108721] CPU: 0 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 36.108929] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.109037] Hardware name: linux,dummy-virt (DT) [ 36.109152] ================================================================== [ 35.998601] ================================================================== [ 35.998758] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 35.998758] [ 35.998970] Out-of-bounds write at 0x000000006559e837 (1B left of kfence-#120): [ 35.999097] test_out_of_bounds_write+0x100/0x240 [ 35.999196] kunit_try_run_case+0x170/0x3f0 [ 35.999302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.999404] kthread+0x328/0x630 [ 35.999483] ret_from_fork+0x10/0x20 [ 35.999576] [ 35.999627] kfence-#120: 0x00000000b2c772c6-0x000000001537b9c5, size=32, cache=kmalloc-32 [ 35.999627] [ 35.999749] allocated by task 302 on cpu 0 at 35.998327s (0.001413s ago): [ 36.000648] test_alloc+0x29c/0x628 [ 36.000772] test_out_of_bounds_write+0xc8/0x240 [ 36.000881] kunit_try_run_case+0x170/0x3f0 [ 36.001014] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.001138] kthread+0x328/0x630 [ 36.001260] ret_from_fork+0x10/0x20 [ 36.001359] [ 36.001508] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 36.001691] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.001771] Hardware name: linux,dummy-virt (DT) [ 36.001903] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[ 41.238731] ================================================================== [ 41.238909] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 41.238909] [ 41.239004] Corrupted memory at 0x000000006d31bfa8 [ ! . . . . . . . . . . . . . . . ] (in kfence-#170): [ 41.239358] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 41.239417] kunit_try_run_case+0x170/0x3f0 [ 41.239469] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.239519] kthread+0x328/0x630 [ 41.239562] ret_from_fork+0x10/0x20 [ 41.239606] [ 41.239637] kfence-#170: 0x00000000e81df24f-0x00000000dfa042b9, size=73, cache=kmalloc-96 [ 41.239637] [ 41.239702] allocated by task 336 on cpu 1 at 41.238285s (0.001411s ago): [ 41.239778] test_alloc+0x29c/0x628 [ 41.239828] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 41.239886] kunit_try_run_case+0x170/0x3f0 [ 41.239938] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.239987] kthread+0x328/0x630 [ 41.240028] ret_from_fork+0x10/0x20 [ 41.240073] [ 41.240101] freed by task 336 on cpu 1 at 41.238546s (0.001551s ago): [ 41.240174] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 41.240225] kunit_try_run_case+0x170/0x3f0 [ 41.240270] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.240318] kthread+0x328/0x630 [ 41.240357] ret_from_fork+0x10/0x20 [ 41.240402] [ 41.240460] CPU: 1 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 41.240556] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.240591] Hardware name: linux,dummy-virt (DT) [ 41.240632] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[ 41.134619] ================================================================== [ 41.134741] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 41.134741] [ 41.134864] Out-of-bounds read at 0x0000000097471e0b (105B right of kfence-#169): [ 41.134979] test_kmalloc_aligned_oob_read+0x238/0x468 [ 41.135043] kunit_try_run_case+0x170/0x3f0 [ 41.135095] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.135145] kthread+0x328/0x630 [ 41.135190] ret_from_fork+0x10/0x20 [ 41.135236] [ 41.135265] kfence-#169: 0x0000000061126404-0x00000000f549304d, size=73, cache=kmalloc-96 [ 41.135265] [ 41.135324] allocated by task 334 on cpu 0 at 41.134264s (0.001056s ago): [ 41.135409] test_alloc+0x29c/0x628 [ 41.135456] test_kmalloc_aligned_oob_read+0x100/0x468 [ 41.135506] kunit_try_run_case+0x170/0x3f0 [ 41.135549] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.135597] kthread+0x328/0x630 [ 41.135636] ret_from_fork+0x10/0x20 [ 41.135680] [ 41.135733] CPU: 0 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 41.135832] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.135867] Hardware name: linux,dummy-virt (DT) [ 41.135922] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[ 37.270832] ================================================================== [ 37.271012] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 37.271012] [ 37.271170] Corrupted memory at 0x00000000aa7106d1 [ ! ] (in kfence-#132): [ 37.271551] test_corruption+0x284/0x378 [ 37.271712] kunit_try_run_case+0x170/0x3f0 [ 37.271855] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.271964] kthread+0x328/0x630 [ 37.272056] ret_from_fork+0x10/0x20 [ 37.272141] [ 37.272190] kfence-#132: 0x00000000d169010f-0x00000000b3668f8f, size=32, cache=kmalloc-32 [ 37.272190] [ 37.272317] allocated by task 322 on cpu 0 at 37.270328s (0.001980s ago): [ 37.272495] test_alloc+0x29c/0x628 [ 37.272626] test_corruption+0x198/0x378 [ 37.272752] kunit_try_run_case+0x170/0x3f0 [ 37.272887] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.273001] kthread+0x328/0x630 [ 37.273085] ret_from_fork+0x10/0x20 [ 37.273174] [ 37.273227] freed by task 322 on cpu 0 at 37.270503s (0.002716s ago): [ 37.273368] test_corruption+0x284/0x378 [ 37.273510] kunit_try_run_case+0x170/0x3f0 [ 37.273619] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.273743] kthread+0x328/0x630 [ 37.273882] ret_from_fork+0x10/0x20 [ 37.273981] [ 37.274076] CPU: 0 UID: 0 PID: 322 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 37.274283] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.274386] Hardware name: linux,dummy-virt (DT) [ 37.274508] ================================================================== [ 37.480855] ================================================================== [ 37.481035] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 37.481035] [ 37.481170] Corrupted memory at 0x000000002b2033b3 [ ! . . . . . . . . . . . . . . . ] (in kfence-#134): [ 37.483458] test_corruption+0x120/0x378 [ 37.484222] kunit_try_run_case+0x170/0x3f0 [ 37.484484] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.484604] kthread+0x328/0x630 [ 37.485042] ret_from_fork+0x10/0x20 [ 37.485246] [ 37.485308] kfence-#134: 0x00000000352b5138-0x00000000de195ed9, size=32, cache=test [ 37.485308] [ 37.485984] allocated by task 324 on cpu 0 at 37.479723s (0.006241s ago): [ 37.486170] test_alloc+0x230/0x628 [ 37.486257] test_corruption+0xdc/0x378 [ 37.486352] kunit_try_run_case+0x170/0x3f0 [ 37.486781] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.487217] kthread+0x328/0x630 [ 37.487341] ret_from_fork+0x10/0x20 [ 37.487444] [ 37.487502] freed by task 324 on cpu 0 at 37.480513s (0.006980s ago): [ 37.487661] test_corruption+0x120/0x378 [ 37.487757] kunit_try_run_case+0x170/0x3f0 [ 37.487855] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.487970] kthread+0x328/0x630 [ 37.488064] ret_from_fork+0x10/0x20 [ 37.490085] [ 37.490340] CPU: 0 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 37.490780] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.490998] Hardware name: linux,dummy-virt (DT) [ 37.491385] ================================================================== [ 37.587295] ================================================================== [ 37.587485] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 37.587485] [ 37.587653] Corrupted memory at 0x000000000b9ed6b8 [ ! ] (in kfence-#135): [ 37.588028] test_corruption+0x1d8/0x378 [ 37.588162] kunit_try_run_case+0x170/0x3f0 [ 37.588287] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.588401] kthread+0x328/0x630 [ 37.588487] ret_from_fork+0x10/0x20 [ 37.588581] [ 37.588638] kfence-#135: 0x0000000018132f0e-0x00000000113ff915, size=32, cache=test [ 37.588638] [ 37.588771] allocated by task 324 on cpu 0 at 37.586891s (0.001871s ago): [ 37.588920] test_alloc+0x230/0x628 [ 37.589014] test_corruption+0x198/0x378 [ 37.589135] kunit_try_run_case+0x170/0x3f0 [ 37.589257] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.589557] kthread+0x328/0x630 [ 37.589800] ret_from_fork+0x10/0x20 [ 37.590064] [ 37.590288] freed by task 324 on cpu 0 at 37.587053s (0.003202s ago): [ 37.591099] test_corruption+0x1d8/0x378 [ 37.591312] kunit_try_run_case+0x170/0x3f0 [ 37.591436] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.591639] kthread+0x328/0x630 [ 37.591847] ret_from_fork+0x10/0x20 [ 37.592014] [ 37.592114] CPU: 0 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 37.592370] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.592438] Hardware name: linux,dummy-virt (DT) [ 37.592540] ================================================================== [ 37.060089] ================================================================== [ 37.060510] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 37.060510] [ 37.060822] Corrupted memory at 0x00000000dc47881c [ ! . . . . . . . . . . . . . . . ] (in kfence-#130): [ 37.064163] test_corruption+0x278/0x378 [ 37.064387] kunit_try_run_case+0x170/0x3f0 [ 37.064506] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.064642] kthread+0x328/0x630 [ 37.064744] ret_from_fork+0x10/0x20 [ 37.064848] [ 37.064917] kfence-#130: 0x00000000cfc820e6-0x00000000620de20f, size=32, cache=kmalloc-32 [ 37.064917] [ 37.065057] allocated by task 322 on cpu 0 at 37.058739s (0.006308s ago): [ 37.065301] test_alloc+0x29c/0x628 [ 37.065406] test_corruption+0xdc/0x378 [ 37.065541] kunit_try_run_case+0x170/0x3f0 [ 37.065657] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.065762] kthread+0x328/0x630 [ 37.066193] ret_from_fork+0x10/0x20 [ 37.066341] [ 37.066404] freed by task 322 on cpu 0 at 37.059051s (0.007344s ago): [ 37.066844] test_corruption+0x278/0x378 [ 37.066961] kunit_try_run_case+0x170/0x3f0 [ 37.067046] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.067507] kthread+0x328/0x630 [ 37.067632] ret_from_fork+0x10/0x20 [ 37.067733] [ 37.067841] CPU: 0 UID: 0 PID: 322 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 37.068062] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.068235] Hardware name: linux,dummy-virt (DT) [ 37.068481] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[ 36.849999] ================================================================== [ 36.850138] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 36.850138] [ 36.850222] Invalid free of 0x0000000025b40100 (in kfence-#128): [ 36.850285] test_invalid_addr_free+0x1ac/0x238 [ 36.850342] kunit_try_run_case+0x170/0x3f0 [ 36.850394] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.850444] kthread+0x328/0x630 [ 36.850485] ret_from_fork+0x10/0x20 [ 36.850531] [ 36.850561] kfence-#128: 0x00000000d9de2c88-0x00000000a382a022, size=32, cache=kmalloc-32 [ 36.850561] [ 36.850626] allocated by task 318 on cpu 0 at 36.849057s (0.001564s ago): [ 36.850704] test_alloc+0x29c/0x628 [ 36.850753] test_invalid_addr_free+0xd4/0x238 [ 36.850800] kunit_try_run_case+0x170/0x3f0 [ 36.850846] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.850929] kthread+0x328/0x630 [ 36.851128] ret_from_fork+0x10/0x20 [ 36.851355] [ 36.851559] CPU: 0 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 36.852220] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.852307] Hardware name: linux,dummy-virt (DT) [ 36.852529] ================================================================== [ 36.955084] ================================================================== [ 36.955262] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 36.955262] [ 36.955407] Invalid free of 0x00000000e447479e (in kfence-#129): [ 36.955519] test_invalid_addr_free+0xec/0x238 [ 36.955622] kunit_try_run_case+0x170/0x3f0 [ 36.955716] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.955838] kthread+0x328/0x630 [ 36.955969] ret_from_fork+0x10/0x20 [ 36.956065] [ 36.956147] kfence-#129: 0x00000000ae368274-0x0000000058e1a2a4, size=32, cache=test [ 36.956147] [ 36.956283] allocated by task 320 on cpu 0 at 36.954861s (0.001409s ago): [ 36.956511] test_alloc+0x230/0x628 [ 36.956649] test_invalid_addr_free+0xd4/0x238 [ 36.956760] kunit_try_run_case+0x170/0x3f0 [ 36.956861] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.956981] kthread+0x328/0x630 [ 36.957067] ret_from_fork+0x10/0x20 [ 36.957158] [ 36.957258] CPU: 0 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 36.957470] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.957543] Hardware name: linux,dummy-virt (DT) [ 36.957624] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[ 36.639286] ================================================================== [ 36.639728] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 36.639728] [ 36.640124] Invalid free of 0x00000000011d1998 (in kfence-#126): [ 36.640610] test_double_free+0x1bc/0x238 [ 36.641011] kunit_try_run_case+0x170/0x3f0 [ 36.641346] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.641632] kthread+0x328/0x630 [ 36.641849] ret_from_fork+0x10/0x20 [ 36.642189] [ 36.642372] kfence-#126: 0x00000000011d1998-0x00000000bab18df0, size=32, cache=kmalloc-32 [ 36.642372] [ 36.642522] allocated by task 314 on cpu 0 at 36.638567s (0.003946s ago): [ 36.642770] test_alloc+0x29c/0x628 [ 36.643228] test_double_free+0xd4/0x238 [ 36.643434] kunit_try_run_case+0x170/0x3f0 [ 36.643658] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.643805] kthread+0x328/0x630 [ 36.644122] ret_from_fork+0x10/0x20 [ 36.644703] [ 36.644788] freed by task 314 on cpu 0 at 36.638710s (0.006069s ago): [ 36.645202] test_double_free+0x1ac/0x238 [ 36.645499] kunit_try_run_case+0x170/0x3f0 [ 36.645929] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.646381] kthread+0x328/0x630 [ 36.646518] ret_from_fork+0x10/0x20 [ 36.646639] [ 36.646790] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 36.647018] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.647096] Hardware name: linux,dummy-virt (DT) [ 36.647380] ================================================================== [ 36.739821] ================================================================== [ 36.739990] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 36.739990] [ 36.740105] Invalid free of 0x000000004a2d8db0 (in kfence-#127): [ 36.740222] test_double_free+0x100/0x238 [ 36.740334] kunit_try_run_case+0x170/0x3f0 [ 36.740432] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.740530] kthread+0x328/0x630 [ 36.740618] ret_from_fork+0x10/0x20 [ 36.740709] [ 36.740764] kfence-#127: 0x000000004a2d8db0-0x000000001fc6f906, size=32, cache=test [ 36.740764] [ 36.740900] allocated by task 316 on cpu 0 at 36.739454s (0.001438s ago): [ 36.741029] test_alloc+0x230/0x628 [ 36.741150] test_double_free+0xd4/0x238 [ 36.741650] kunit_try_run_case+0x170/0x3f0 [ 36.741768] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.741859] kthread+0x328/0x630 [ 36.741954] ret_from_fork+0x10/0x20 [ 36.742137] [ 36.742226] freed by task 316 on cpu 0 at 36.739568s (0.002644s ago): [ 36.742414] test_double_free+0xf0/0x238 [ 36.742515] kunit_try_run_case+0x170/0x3f0 [ 36.742604] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.742750] kthread+0x328/0x630 [ 36.742842] ret_from_fork+0x10/0x20 [ 36.742969] [ 36.743082] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 36.743295] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.743364] Hardware name: linux,dummy-virt (DT) [ 36.743666] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[ 36.316587] ================================================================== [ 36.316758] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 36.316758] [ 36.316869] Use-after-free read at 0x0000000084d5b522 (in kfence-#123): [ 36.317003] test_use_after_free_read+0x114/0x248 [ 36.317138] kunit_try_run_case+0x170/0x3f0 [ 36.317275] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.317445] kthread+0x328/0x630 [ 36.317730] ret_from_fork+0x10/0x20 [ 36.317847] [ 36.318034] kfence-#123: 0x0000000084d5b522-0x0000000052d2ee76, size=32, cache=test [ 36.318034] [ 36.318218] allocated by task 308 on cpu 0 at 36.316022s (0.002187s ago): [ 36.318358] test_alloc+0x230/0x628 [ 36.318446] test_use_after_free_read+0xd0/0x248 [ 36.318519] kunit_try_run_case+0x170/0x3f0 [ 36.318592] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.318695] kthread+0x328/0x630 [ 36.319805] ret_from_fork+0x10/0x20 [ 36.320372] [ 36.320471] freed by task 308 on cpu 0 at 36.316140s (0.004309s ago): [ 36.321127] test_use_after_free_read+0xf0/0x248 [ 36.321443] kunit_try_run_case+0x170/0x3f0 [ 36.321644] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.321802] kthread+0x328/0x630 [ 36.322088] ret_from_fork+0x10/0x20 [ 36.322236] [ 36.322345] CPU: 0 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 36.322970] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.323089] Hardware name: linux,dummy-virt (DT) [ 36.323176] ================================================================== [ 36.209865] ================================================================== [ 36.210089] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 36.210089] [ 36.210290] Use-after-free read at 0x00000000b080261e (in kfence-#122): [ 36.210412] test_use_after_free_read+0x114/0x248 [ 36.210527] kunit_try_run_case+0x170/0x3f0 [ 36.210631] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.210737] kthread+0x328/0x630 [ 36.210832] ret_from_fork+0x10/0x20 [ 36.210936] [ 36.211013] kfence-#122: 0x00000000b080261e-0x0000000098823f00, size=32, cache=kmalloc-32 [ 36.211013] [ 36.211149] allocated by task 306 on cpu 0 at 36.208427s (0.002713s ago): [ 36.211313] test_alloc+0x29c/0x628 [ 36.211396] test_use_after_free_read+0xd0/0x248 [ 36.211482] kunit_try_run_case+0x170/0x3f0 [ 36.211570] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.212001] kthread+0x328/0x630 [ 36.212134] ret_from_fork+0x10/0x20 [ 36.212448] [ 36.213219] freed by task 306 on cpu 0 at 36.208724s (0.003999s ago): [ 36.213680] test_use_after_free_read+0x1c0/0x248 [ 36.214144] kunit_try_run_case+0x170/0x3f0 [ 36.214544] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.214773] kthread+0x328/0x630 [ 36.215145] ret_from_fork+0x10/0x20 [ 36.215349] [ 36.215531] CPU: 0 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 36.215809] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.215972] Hardware name: linux,dummy-virt (DT) [ 36.216059] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[ 35.892063] ================================================================== [ 35.892461] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 35.892461] [ 35.892760] Out-of-bounds read at 0x00000000cb9bedfd (32B right of kfence-#119): [ 35.892998] test_out_of_bounds_read+0x1c8/0x3e0 [ 35.893331] kunit_try_run_case+0x170/0x3f0 [ 35.893505] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.893641] kthread+0x328/0x630 [ 35.893739] ret_from_fork+0x10/0x20 [ 35.893930] [ 35.894040] kfence-#119: 0x000000000eee47b3-0x00000000acd631fc, size=32, cache=test [ 35.894040] [ 35.894506] allocated by task 300 on cpu 0 at 35.891812s (0.002684s ago): [ 35.894775] test_alloc+0x230/0x628 [ 35.895007] test_out_of_bounds_read+0x198/0x3e0 [ 35.895190] kunit_try_run_case+0x170/0x3f0 [ 35.895301] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.895621] kthread+0x328/0x630 [ 35.895938] ret_from_fork+0x10/0x20 [ 35.896037] [ 35.896119] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 35.896351] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.896461] Hardware name: linux,dummy-virt (DT) [ 35.896543] ================================================================== [ 35.463380] ================================================================== [ 35.463600] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 35.463600] [ 35.463837] Out-of-bounds read at 0x000000009f9ca9c8 (1B left of kfence-#115): [ 35.464016] test_out_of_bounds_read+0x114/0x3e0 [ 35.464140] kunit_try_run_case+0x170/0x3f0 [ 35.464227] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.464374] kthread+0x328/0x630 [ 35.464462] ret_from_fork+0x10/0x20 [ 35.464553] [ 35.464607] kfence-#115: 0x00000000347c406d-0x0000000000af7a2c, size=32, cache=test [ 35.464607] [ 35.464749] allocated by task 300 on cpu 0 at 35.462998s (0.001736s ago): [ 35.465075] test_alloc+0x230/0x628 [ 35.465206] test_out_of_bounds_read+0xdc/0x3e0 [ 35.465320] kunit_try_run_case+0x170/0x3f0 [ 35.465442] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.465564] kthread+0x328/0x630 [ 35.465645] ret_from_fork+0x10/0x20 [ 35.465732] [ 35.465885] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 35.466071] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.466276] Hardware name: linux,dummy-virt (DT) [ 35.466361] ================================================================== [ 35.042333] ================================================================== [ 35.042812] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 35.042812] [ 35.043150] Out-of-bounds read at 0x000000004d1db9fe (1B left of kfence-#111): [ 35.044231] test_out_of_bounds_read+0x114/0x3e0 [ 35.044407] kunit_try_run_case+0x170/0x3f0 [ 35.044511] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.044612] kthread+0x328/0x630 [ 35.044701] ret_from_fork+0x10/0x20 [ 35.045122] [ 35.045598] kfence-#111: 0x000000008188b941-0x00000000d950d2cd, size=32, cache=kmalloc-32 [ 35.045598] [ 35.045998] allocated by task 298 on cpu 0 at 35.039137s (0.006674s ago): [ 35.046810] test_alloc+0x29c/0x628 [ 35.046973] test_out_of_bounds_read+0xdc/0x3e0 [ 35.047082] kunit_try_run_case+0x170/0x3f0 [ 35.047187] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.047329] kthread+0x328/0x630 [ 35.047431] ret_from_fork+0x10/0x20 [ 35.047630] [ 35.047814] CPU: 0 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 35.048017] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.049123] Hardware name: linux,dummy-virt (DT) [ 35.049317] ================================================================== [ 35.254233] ================================================================== [ 35.254966] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 35.254966] [ 35.256225] Out-of-bounds read at 0x000000001eae5947 (32B right of kfence-#113): [ 35.257190] test_out_of_bounds_read+0x1c8/0x3e0 [ 35.257392] kunit_try_run_case+0x170/0x3f0 [ 35.257490] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.257601] kthread+0x328/0x630 [ 35.259057] ret_from_fork+0x10/0x20 [ 35.259384] [ 35.259751] kfence-#113: 0x00000000cfc064f4-0x0000000045832332, size=32, cache=kmalloc-32 [ 35.259751] [ 35.260058] allocated by task 298 on cpu 0 at 35.252546s (0.007502s ago): [ 35.260729] test_alloc+0x29c/0x628 [ 35.260894] test_out_of_bounds_read+0x198/0x3e0 [ 35.260994] kunit_try_run_case+0x170/0x3f0 [ 35.261988] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.262470] kthread+0x328/0x630 [ 35.262836] ret_from_fork+0x10/0x20 [ 35.263296] [ 35.263619] CPU: 0 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 35.263845] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.263937] Hardware name: linux,dummy-virt (DT) [ 35.264019] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[ 34.788186] ================================================================== [ 34.788321] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 34.789499] Write of size 121 at addr fff00000c7741400 by task kunit_try_catch/296 [ 34.789741] [ 34.790361] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.790791] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.790982] Hardware name: linux,dummy-virt (DT) [ 34.791097] Call trace: [ 34.791233] show_stack+0x20/0x38 (C) [ 34.791621] dump_stack_lvl+0x8c/0xd0 [ 34.792011] print_report+0x118/0x608 [ 34.792178] kasan_report+0xdc/0x128 [ 34.792492] kasan_check_range+0x100/0x1a8 [ 34.792626] __kasan_check_write+0x20/0x30 [ 34.793161] strncpy_from_user+0x3c/0x2a0 [ 34.793523] copy_user_test_oob+0x5c0/0xec8 [ 34.793714] kunit_try_run_case+0x170/0x3f0 [ 34.794150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.794290] kthread+0x328/0x630 [ 34.794382] ret_from_fork+0x10/0x20 [ 34.794499] [ 34.794547] Allocated by task 296: [ 34.794621] kasan_save_stack+0x3c/0x68 [ 34.794734] kasan_save_track+0x20/0x40 [ 34.795935] kasan_save_alloc_info+0x40/0x58 [ 34.796083] __kasan_kmalloc+0xd4/0xd8 [ 34.796186] __kmalloc_noprof+0x198/0x4c8 [ 34.796282] kunit_kmalloc_array+0x34/0x88 [ 34.796378] copy_user_test_oob+0xac/0xec8 [ 34.796481] kunit_try_run_case+0x170/0x3f0 [ 34.796583] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.797335] kthread+0x328/0x630 [ 34.797990] ret_from_fork+0x10/0x20 [ 34.798416] [ 34.798480] The buggy address belongs to the object at fff00000c7741400 [ 34.798480] which belongs to the cache kmalloc-128 of size 128 [ 34.798642] The buggy address is located 0 bytes inside of [ 34.798642] allocated 120-byte region [fff00000c7741400, fff00000c7741478) [ 34.798775] [ 34.798818] The buggy address belongs to the physical page: [ 34.799841] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107741 [ 34.800378] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.800599] page_type: f5(slab) [ 34.800734] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.800893] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.801011] page dumped because: kasan: bad access detected [ 34.801098] [ 34.801891] Memory state around the buggy address: [ 34.802369] fff00000c7741300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.802682] fff00000c7741380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.803039] >fff00000c7741400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 34.803176] ^ [ 34.803485] fff00000c7741480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.803671] fff00000c7741500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.803833] ================================================================== [ 34.807008] ================================================================== [ 34.807139] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 34.807551] Write of size 1 at addr fff00000c7741478 by task kunit_try_catch/296 [ 34.808005] [ 34.808166] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.808819] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.808918] Hardware name: linux,dummy-virt (DT) [ 34.809010] Call trace: [ 34.809072] show_stack+0x20/0x38 (C) [ 34.809213] dump_stack_lvl+0x8c/0xd0 [ 34.809728] print_report+0x118/0x608 [ 34.809911] kasan_report+0xdc/0x128 [ 34.810036] __asan_report_store1_noabort+0x20/0x30 [ 34.810915] strncpy_from_user+0x270/0x2a0 [ 34.811153] copy_user_test_oob+0x5c0/0xec8 [ 34.811350] kunit_try_run_case+0x170/0x3f0 [ 34.811800] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.812088] kthread+0x328/0x630 [ 34.812208] ret_from_fork+0x10/0x20 [ 34.812762] [ 34.812888] Allocated by task 296: [ 34.813054] kasan_save_stack+0x3c/0x68 [ 34.813369] kasan_save_track+0x20/0x40 [ 34.813532] kasan_save_alloc_info+0x40/0x58 [ 34.813808] __kasan_kmalloc+0xd4/0xd8 [ 34.814437] __kmalloc_noprof+0x198/0x4c8 [ 34.814743] kunit_kmalloc_array+0x34/0x88 [ 34.814849] copy_user_test_oob+0xac/0xec8 [ 34.814961] kunit_try_run_case+0x170/0x3f0 [ 34.815293] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.815829] kthread+0x328/0x630 [ 34.815942] ret_from_fork+0x10/0x20 [ 34.816057] [ 34.816114] The buggy address belongs to the object at fff00000c7741400 [ 34.816114] which belongs to the cache kmalloc-128 of size 128 [ 34.816723] The buggy address is located 0 bytes to the right of [ 34.816723] allocated 120-byte region [fff00000c7741400, fff00000c7741478) [ 34.817497] [ 34.817996] The buggy address belongs to the physical page: [ 34.818356] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107741 [ 34.818850] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.819051] page_type: f5(slab) [ 34.819156] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.819292] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.819404] page dumped because: kasan: bad access detected [ 34.819493] [ 34.819543] Memory state around the buggy address: [ 34.821425] fff00000c7741300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.821896] fff00000c7741380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.822428] >fff00000c7741400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 34.822908] ^ [ 34.823033] fff00000c7741480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.823145] fff00000c7741500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.823585] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[ 34.677989] ================================================================== [ 34.678208] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 34.678396] Write of size 121 at addr fff00000c7741400 by task kunit_try_catch/296 [ 34.678532] [ 34.678624] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.678822] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.678910] Hardware name: linux,dummy-virt (DT) [ 34.679012] Call trace: [ 34.679093] show_stack+0x20/0x38 (C) [ 34.679229] dump_stack_lvl+0x8c/0xd0 [ 34.679356] print_report+0x118/0x608 [ 34.679478] kasan_report+0xdc/0x128 [ 34.679596] kasan_check_range+0x100/0x1a8 [ 34.679723] __kasan_check_write+0x20/0x30 [ 34.679844] copy_user_test_oob+0x234/0xec8 [ 34.679976] kunit_try_run_case+0x170/0x3f0 [ 34.680197] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.680333] kthread+0x328/0x630 [ 34.680446] ret_from_fork+0x10/0x20 [ 34.680595] [ 34.680675] Allocated by task 296: [ 34.680760] kasan_save_stack+0x3c/0x68 [ 34.680913] kasan_save_track+0x20/0x40 [ 34.681006] kasan_save_alloc_info+0x40/0x58 [ 34.681180] __kasan_kmalloc+0xd4/0xd8 [ 34.681271] __kmalloc_noprof+0x198/0x4c8 [ 34.681370] kunit_kmalloc_array+0x34/0x88 [ 34.681513] copy_user_test_oob+0xac/0xec8 [ 34.681635] kunit_try_run_case+0x170/0x3f0 [ 34.681750] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.681902] kthread+0x328/0x630 [ 34.681982] ret_from_fork+0x10/0x20 [ 34.682071] [ 34.682128] The buggy address belongs to the object at fff00000c7741400 [ 34.682128] which belongs to the cache kmalloc-128 of size 128 [ 34.682298] The buggy address is located 0 bytes inside of [ 34.682298] allocated 120-byte region [fff00000c7741400, fff00000c7741478) [ 34.683190] [ 34.683513] The buggy address belongs to the physical page: [ 34.683673] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107741 [ 34.683832] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.684234] page_type: f5(slab) [ 34.684348] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.684482] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.684599] page dumped because: kasan: bad access detected [ 34.684687] [ 34.684738] Memory state around the buggy address: [ 34.684861] fff00000c7741300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.684992] fff00000c7741380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.685110] >fff00000c7741400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 34.685230] ^ [ 34.685386] fff00000c7741480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.685485] fff00000c7741500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.685578] ================================================================== [ 34.753175] ================================================================== [ 34.753695] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 34.753847] Write of size 121 at addr fff00000c7741400 by task kunit_try_catch/296 [ 34.753966] [ 34.754057] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.754281] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.754357] Hardware name: linux,dummy-virt (DT) [ 34.754438] Call trace: [ 34.755130] show_stack+0x20/0x38 (C) [ 34.755347] dump_stack_lvl+0x8c/0xd0 [ 34.755700] print_report+0x118/0x608 [ 34.756490] kasan_report+0xdc/0x128 [ 34.756750] kasan_check_range+0x100/0x1a8 [ 34.757108] __kasan_check_write+0x20/0x30 [ 34.757394] copy_user_test_oob+0x434/0xec8 [ 34.758251] kunit_try_run_case+0x170/0x3f0 [ 34.758454] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.758766] kthread+0x328/0x630 [ 34.758933] ret_from_fork+0x10/0x20 [ 34.759624] [ 34.759787] Allocated by task 296: [ 34.759937] kasan_save_stack+0x3c/0x68 [ 34.760057] kasan_save_track+0x20/0x40 [ 34.760630] kasan_save_alloc_info+0x40/0x58 [ 34.761133] __kasan_kmalloc+0xd4/0xd8 [ 34.761567] __kmalloc_noprof+0x198/0x4c8 [ 34.762044] kunit_kmalloc_array+0x34/0x88 [ 34.762345] copy_user_test_oob+0xac/0xec8 [ 34.762684] kunit_try_run_case+0x170/0x3f0 [ 34.763046] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.763165] kthread+0x328/0x630 [ 34.763252] ret_from_fork+0x10/0x20 [ 34.763350] [ 34.764573] The buggy address belongs to the object at fff00000c7741400 [ 34.764573] which belongs to the cache kmalloc-128 of size 128 [ 34.765002] The buggy address is located 0 bytes inside of [ 34.765002] allocated 120-byte region [fff00000c7741400, fff00000c7741478) [ 34.765355] [ 34.766381] The buggy address belongs to the physical page: [ 34.766487] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107741 [ 34.766632] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.767071] page_type: f5(slab) [ 34.767439] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.767617] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.767730] page dumped because: kasan: bad access detected [ 34.767825] [ 34.767896] Memory state around the buggy address: [ 34.768076] fff00000c7741300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.768404] fff00000c7741380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.768669] >fff00000c7741400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 34.768924] ^ [ 34.769153] fff00000c7741480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.769914] fff00000c7741500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.770054] ================================================================== [ 34.740620] ================================================================== [ 34.740760] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 34.740918] Read of size 121 at addr fff00000c7741400 by task kunit_try_catch/296 [ 34.741054] [ 34.741149] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.741381] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.742439] Hardware name: linux,dummy-virt (DT) [ 34.742615] Call trace: [ 34.742722] show_stack+0x20/0x38 (C) [ 34.743126] dump_stack_lvl+0x8c/0xd0 [ 34.743504] print_report+0x118/0x608 [ 34.744004] kasan_report+0xdc/0x128 [ 34.744257] kasan_check_range+0x100/0x1a8 [ 34.744507] __kasan_check_read+0x20/0x30 [ 34.744943] copy_user_test_oob+0x3c8/0xec8 [ 34.745081] kunit_try_run_case+0x170/0x3f0 [ 34.745289] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.745488] kthread+0x328/0x630 [ 34.745652] ret_from_fork+0x10/0x20 [ 34.745840] [ 34.745934] Allocated by task 296: [ 34.746023] kasan_save_stack+0x3c/0x68 [ 34.746134] kasan_save_track+0x20/0x40 [ 34.746237] kasan_save_alloc_info+0x40/0x58 [ 34.746344] __kasan_kmalloc+0xd4/0xd8 [ 34.746489] __kmalloc_noprof+0x198/0x4c8 [ 34.746632] kunit_kmalloc_array+0x34/0x88 [ 34.746718] copy_user_test_oob+0xac/0xec8 [ 34.746795] kunit_try_run_case+0x170/0x3f0 [ 34.746909] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.747035] kthread+0x328/0x630 [ 34.747155] ret_from_fork+0x10/0x20 [ 34.747289] [ 34.747354] The buggy address belongs to the object at fff00000c7741400 [ 34.747354] which belongs to the cache kmalloc-128 of size 128 [ 34.747521] The buggy address is located 0 bytes inside of [ 34.747521] allocated 120-byte region [fff00000c7741400, fff00000c7741478) [ 34.747674] [ 34.747733] The buggy address belongs to the physical page: [ 34.747815] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107741 [ 34.748024] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.748203] page_type: f5(slab) [ 34.748332] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.748478] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.748619] page dumped because: kasan: bad access detected [ 34.748723] [ 34.748775] Memory state around the buggy address: [ 34.748896] fff00000c7741300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.749124] fff00000c7741380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.749305] >fff00000c7741400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 34.749440] ^ [ 34.749640] fff00000c7741480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.749760] fff00000c7741500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.750392] ================================================================== [ 34.728497] ================================================================== [ 34.728674] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 34.728840] Write of size 121 at addr fff00000c7741400 by task kunit_try_catch/296 [ 34.728990] [ 34.729082] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.729535] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.729912] Hardware name: linux,dummy-virt (DT) [ 34.730006] Call trace: [ 34.730092] show_stack+0x20/0x38 (C) [ 34.730229] dump_stack_lvl+0x8c/0xd0 [ 34.730386] print_report+0x118/0x608 [ 34.730511] kasan_report+0xdc/0x128 [ 34.730648] kasan_check_range+0x100/0x1a8 [ 34.730816] __kasan_check_write+0x20/0x30 [ 34.731056] copy_user_test_oob+0x35c/0xec8 [ 34.731183] kunit_try_run_case+0x170/0x3f0 [ 34.731301] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.731424] kthread+0x328/0x630 [ 34.731537] ret_from_fork+0x10/0x20 [ 34.731674] [ 34.731729] Allocated by task 296: [ 34.731818] kasan_save_stack+0x3c/0x68 [ 34.731974] kasan_save_track+0x20/0x40 [ 34.732074] kasan_save_alloc_info+0x40/0x58 [ 34.732228] __kasan_kmalloc+0xd4/0xd8 [ 34.732364] __kmalloc_noprof+0x198/0x4c8 [ 34.732897] kunit_kmalloc_array+0x34/0x88 [ 34.733032] copy_user_test_oob+0xac/0xec8 [ 34.733138] kunit_try_run_case+0x170/0x3f0 [ 34.733331] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.733587] kthread+0x328/0x630 [ 34.733712] ret_from_fork+0x10/0x20 [ 34.733810] [ 34.734052] The buggy address belongs to the object at fff00000c7741400 [ 34.734052] which belongs to the cache kmalloc-128 of size 128 [ 34.734233] The buggy address is located 0 bytes inside of [ 34.734233] allocated 120-byte region [fff00000c7741400, fff00000c7741478) [ 34.734401] [ 34.734494] The buggy address belongs to the physical page: [ 34.734589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107741 [ 34.734795] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.735048] page_type: f5(slab) [ 34.735269] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.735598] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.735709] page dumped because: kasan: bad access detected [ 34.736549] [ 34.736620] Memory state around the buggy address: [ 34.736808] fff00000c7741300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.736941] fff00000c7741380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.737062] >fff00000c7741400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 34.737163] ^ [ 34.737274] fff00000c7741480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.737383] fff00000c7741500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.738500] ================================================================== [ 34.772185] ================================================================== [ 34.772408] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 34.772773] Read of size 121 at addr fff00000c7741400 by task kunit_try_catch/296 [ 34.773000] [ 34.773158] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.773645] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.773728] Hardware name: linux,dummy-virt (DT) [ 34.773813] Call trace: [ 34.773885] show_stack+0x20/0x38 (C) [ 34.774111] dump_stack_lvl+0x8c/0xd0 [ 34.774327] print_report+0x118/0x608 [ 34.774656] kasan_report+0xdc/0x128 [ 34.774797] kasan_check_range+0x100/0x1a8 [ 34.774929] __kasan_check_read+0x20/0x30 [ 34.775067] copy_user_test_oob+0x4a0/0xec8 [ 34.775670] kunit_try_run_case+0x170/0x3f0 [ 34.775897] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.776258] kthread+0x328/0x630 [ 34.776369] ret_from_fork+0x10/0x20 [ 34.776851] [ 34.776927] Allocated by task 296: [ 34.777509] kasan_save_stack+0x3c/0x68 [ 34.777650] kasan_save_track+0x20/0x40 [ 34.777754] kasan_save_alloc_info+0x40/0x58 [ 34.777854] __kasan_kmalloc+0xd4/0xd8 [ 34.777946] __kmalloc_noprof+0x198/0x4c8 [ 34.778021] kunit_kmalloc_array+0x34/0x88 [ 34.778518] copy_user_test_oob+0xac/0xec8 [ 34.778927] kunit_try_run_case+0x170/0x3f0 [ 34.779064] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.779775] kthread+0x328/0x630 [ 34.780304] ret_from_fork+0x10/0x20 [ 34.780627] [ 34.780700] The buggy address belongs to the object at fff00000c7741400 [ 34.780700] which belongs to the cache kmalloc-128 of size 128 [ 34.780930] The buggy address is located 0 bytes inside of [ 34.780930] allocated 120-byte region [fff00000c7741400, fff00000c7741478) [ 34.781095] [ 34.781798] The buggy address belongs to the physical page: [ 34.781947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107741 [ 34.782393] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.782779] page_type: f5(slab) [ 34.782993] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.783146] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.783462] page dumped because: kasan: bad access detected [ 34.783570] [ 34.783632] Memory state around the buggy address: [ 34.784283] fff00000c7741300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.784645] fff00000c7741380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.784757] >fff00000c7741400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 34.784863] ^ [ 34.784988] fff00000c7741480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.785735] fff00000c7741500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.785938] ================================================================== [ 34.697097] ================================================================== [ 34.697613] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 34.698696] Read of size 121 at addr fff00000c7741400 by task kunit_try_catch/296 [ 34.699584] [ 34.699735] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.700796] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.701159] Hardware name: linux,dummy-virt (DT) [ 34.701394] Call trace: [ 34.701662] show_stack+0x20/0x38 (C) [ 34.702078] dump_stack_lvl+0x8c/0xd0 [ 34.702642] print_report+0x118/0x608 [ 34.702746] kasan_report+0xdc/0x128 [ 34.703273] kasan_check_range+0x100/0x1a8 [ 34.703521] __kasan_check_read+0x20/0x30 [ 34.703708] copy_user_test_oob+0x728/0xec8 [ 34.703866] kunit_try_run_case+0x170/0x3f0 [ 34.704060] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.704191] kthread+0x328/0x630 [ 34.704302] ret_from_fork+0x10/0x20 [ 34.704447] [ 34.704517] Allocated by task 296: [ 34.704625] kasan_save_stack+0x3c/0x68 [ 34.704755] kasan_save_track+0x20/0x40 [ 34.704868] kasan_save_alloc_info+0x40/0x58 [ 34.705030] __kasan_kmalloc+0xd4/0xd8 [ 34.705163] __kmalloc_noprof+0x198/0x4c8 [ 34.705296] kunit_kmalloc_array+0x34/0x88 [ 34.705440] copy_user_test_oob+0xac/0xec8 [ 34.705533] kunit_try_run_case+0x170/0x3f0 [ 34.705624] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.705738] kthread+0x328/0x630 [ 34.706018] ret_from_fork+0x10/0x20 [ 34.706118] [ 34.706167] The buggy address belongs to the object at fff00000c7741400 [ 34.706167] which belongs to the cache kmalloc-128 of size 128 [ 34.706316] The buggy address is located 0 bytes inside of [ 34.706316] allocated 120-byte region [fff00000c7741400, fff00000c7741478) [ 34.706485] [ 34.706556] The buggy address belongs to the physical page: [ 34.706687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107741 [ 34.706845] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.707148] page_type: f5(slab) [ 34.707275] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.707615] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.707745] page dumped because: kasan: bad access detected [ 34.707885] [ 34.707953] Memory state around the buggy address: [ 34.708116] fff00000c7741300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.708401] fff00000c7741380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.708530] >fff00000c7741400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 34.708640] ^ [ 34.708748] fff00000c7741480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.708853] fff00000c7741500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.708968] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[ 34.569415] ================================================================== [ 34.569617] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 34.569799] Read of size 8 at addr fff00000c7741378 by task kunit_try_catch/292 [ 34.569995] [ 34.570110] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.570362] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.570429] Hardware name: linux,dummy-virt (DT) [ 34.570504] Call trace: [ 34.570567] show_stack+0x20/0x38 (C) [ 34.570674] dump_stack_lvl+0x8c/0xd0 [ 34.570841] print_report+0x118/0x608 [ 34.570978] kasan_report+0xdc/0x128 [ 34.571096] __asan_report_load8_noabort+0x20/0x30 [ 34.571214] copy_to_kernel_nofault+0x204/0x250 [ 34.571365] copy_to_kernel_nofault_oob+0x158/0x418 [ 34.571518] kunit_try_run_case+0x170/0x3f0 [ 34.571710] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.571915] kthread+0x328/0x630 [ 34.572079] ret_from_fork+0x10/0x20 [ 34.572202] [ 34.572262] Allocated by task 292: [ 34.572342] kasan_save_stack+0x3c/0x68 [ 34.572454] kasan_save_track+0x20/0x40 [ 34.572550] kasan_save_alloc_info+0x40/0x58 [ 34.572655] __kasan_kmalloc+0xd4/0xd8 [ 34.572762] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.572901] copy_to_kernel_nofault_oob+0xc8/0x418 [ 34.573020] kunit_try_run_case+0x170/0x3f0 [ 34.573160] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.573320] kthread+0x328/0x630 [ 34.573433] ret_from_fork+0x10/0x20 [ 34.573553] [ 34.573609] The buggy address belongs to the object at fff00000c7741300 [ 34.573609] which belongs to the cache kmalloc-128 of size 128 [ 34.573744] The buggy address is located 0 bytes to the right of [ 34.573744] allocated 120-byte region [fff00000c7741300, fff00000c7741378) [ 34.573987] [ 34.574046] The buggy address belongs to the physical page: [ 34.574124] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107741 [ 34.574269] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.574432] page_type: f5(slab) [ 34.574541] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.574701] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.574825] page dumped because: kasan: bad access detected [ 34.575038] [ 34.575097] Memory state around the buggy address: [ 34.575184] fff00000c7741200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.575295] fff00000c7741280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.575389] >fff00000c7741300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 34.575469] ^ [ 34.575561] fff00000c7741380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.575645] fff00000c7741400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.575739] ================================================================== [ 34.579489] ================================================================== [ 34.580024] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 34.580313] Write of size 8 at addr fff00000c7741378 by task kunit_try_catch/292 [ 34.580582] [ 34.580861] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.581349] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.581552] Hardware name: linux,dummy-virt (DT) [ 34.581758] Call trace: [ 34.582098] show_stack+0x20/0x38 (C) [ 34.582259] dump_stack_lvl+0x8c/0xd0 [ 34.582381] print_report+0x118/0x608 [ 34.582681] kasan_report+0xdc/0x128 [ 34.583071] kasan_check_range+0x100/0x1a8 [ 34.583278] __kasan_check_write+0x20/0x30 [ 34.583396] copy_to_kernel_nofault+0x8c/0x250 [ 34.583747] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 34.584108] kunit_try_run_case+0x170/0x3f0 [ 34.584283] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.584518] kthread+0x328/0x630 [ 34.584763] ret_from_fork+0x10/0x20 [ 34.585056] [ 34.585349] Allocated by task 292: [ 34.585457] kasan_save_stack+0x3c/0x68 [ 34.585629] kasan_save_track+0x20/0x40 [ 34.585859] kasan_save_alloc_info+0x40/0x58 [ 34.586043] __kasan_kmalloc+0xd4/0xd8 [ 34.586228] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.586462] copy_to_kernel_nofault_oob+0xc8/0x418 [ 34.586555] kunit_try_run_case+0x170/0x3f0 [ 34.586649] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.586747] kthread+0x328/0x630 [ 34.587230] ret_from_fork+0x10/0x20 [ 34.587334] [ 34.587451] The buggy address belongs to the object at fff00000c7741300 [ 34.587451] which belongs to the cache kmalloc-128 of size 128 [ 34.587599] The buggy address is located 0 bytes to the right of [ 34.587599] allocated 120-byte region [fff00000c7741300, fff00000c7741378) [ 34.587776] [ 34.587836] The buggy address belongs to the physical page: [ 34.588279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107741 [ 34.588651] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.589092] page_type: f5(slab) [ 34.589238] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.589538] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.589764] page dumped because: kasan: bad access detected [ 34.589944] [ 34.590073] Memory state around the buggy address: [ 34.590265] fff00000c7741200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.590459] fff00000c7741280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.590555] >fff00000c7741300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 34.590930] ^ [ 34.591162] fff00000c7741380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.591319] fff00000c7741400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.591431] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 34.453053] ================================================================== [ 34.453234] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 34.453444] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/280 [ 34.453561] [ 34.453679] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.453896] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.453984] Hardware name: linux,dummy-virt (DT) [ 34.454106] Call trace: [ 34.454175] show_stack+0x20/0x38 (C) [ 34.454410] dump_stack_lvl+0x8c/0xd0 [ 34.454577] print_report+0x310/0x608 [ 34.454729] kasan_report+0xdc/0x128 [ 34.454862] __asan_report_load1_noabort+0x20/0x30 [ 34.455017] vmalloc_oob+0x51c/0x5d0 [ 34.455116] kunit_try_run_case+0x170/0x3f0 [ 34.455217] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.455378] kthread+0x328/0x630 [ 34.455505] ret_from_fork+0x10/0x20 [ 34.455624] [ 34.455692] The buggy address belongs to the virtual mapping at [ 34.455692] [ffff8000800fe000, ffff800080100000) created by: [ 34.455692] vmalloc_oob+0x98/0x5d0 [ 34.455837] [ 34.455890] The buggy address belongs to the physical page: [ 34.455963] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a0 [ 34.456100] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.456301] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 34.456473] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 34.456590] page dumped because: kasan: bad access detected [ 34.456674] [ 34.456733] Memory state around the buggy address: [ 34.456818] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.456942] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.457058] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 34.457174] ^ [ 34.457279] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 34.457438] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 34.457542] ================================================================== [ 34.440605] ================================================================== [ 34.440824] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 34.442388] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/280 [ 34.442503] [ 34.442587] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.443980] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.444386] Hardware name: linux,dummy-virt (DT) [ 34.444567] Call trace: [ 34.444746] show_stack+0x20/0x38 (C) [ 34.445095] dump_stack_lvl+0x8c/0xd0 [ 34.445242] print_report+0x310/0x608 [ 34.445377] kasan_report+0xdc/0x128 [ 34.446397] __asan_report_load1_noabort+0x20/0x30 [ 34.446514] vmalloc_oob+0x578/0x5d0 [ 34.446828] kunit_try_run_case+0x170/0x3f0 [ 34.447557] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.448206] kthread+0x328/0x630 [ 34.448814] ret_from_fork+0x10/0x20 [ 34.449416] [ 34.449560] The buggy address belongs to the virtual mapping at [ 34.449560] [ffff8000800fe000, ffff800080100000) created by: [ 34.449560] vmalloc_oob+0x98/0x5d0 [ 34.449851] [ 34.449961] The buggy address belongs to the physical page: [ 34.450085] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a0 [ 34.450266] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.450441] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 34.450571] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 34.450663] page dumped because: kasan: bad access detected [ 34.450732] [ 34.450799] Memory state around the buggy address: [ 34.450888] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.451006] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.451124] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 34.451252] ^ [ 34.451353] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 34.451474] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 34.451578] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 33.865115] ================================================================== [ 33.865362] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 33.866005] Read of size 4 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 33.866141] [ 33.866233] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 33.866464] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.866881] Hardware name: linux,dummy-virt (DT) [ 33.867114] Call trace: [ 33.867217] show_stack+0x20/0x38 (C) [ 33.867433] dump_stack_lvl+0x8c/0xd0 [ 33.867910] print_report+0x118/0x608 [ 33.868346] kasan_report+0xdc/0x128 [ 33.868614] __asan_report_load4_noabort+0x20/0x30 [ 33.869216] kasan_atomics_helper+0x42d8/0x4858 [ 33.869454] kasan_atomics+0x198/0x2e0 [ 33.869587] kunit_try_run_case+0x170/0x3f0 [ 33.869712] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.869854] kthread+0x328/0x630 [ 33.869977] ret_from_fork+0x10/0x20 [ 33.870092] [ 33.870143] Allocated by task 276: [ 33.870223] kasan_save_stack+0x3c/0x68 [ 33.870330] kasan_save_track+0x20/0x40 [ 33.870429] kasan_save_alloc_info+0x40/0x58 [ 33.870529] __kasan_kmalloc+0xd4/0xd8 [ 33.870625] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.870724] kasan_atomics+0xb8/0x2e0 [ 33.870841] kunit_try_run_case+0x170/0x3f0 [ 33.870934] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.871049] kthread+0x328/0x630 [ 33.871118] ret_from_fork+0x10/0x20 [ 33.871205] [ 33.871259] The buggy address belongs to the object at fff00000c76a3180 [ 33.871259] which belongs to the cache kmalloc-64 of size 64 [ 33.871390] The buggy address is located 0 bytes to the right of [ 33.871390] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 33.871563] [ 33.871637] The buggy address belongs to the physical page: [ 33.871715] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 33.871867] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.871999] page_type: f5(slab) [ 33.872136] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.872312] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.872468] page dumped because: kasan: bad access detected [ 33.872565] [ 33.872612] Memory state around the buggy address: [ 33.872698] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.872861] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.873029] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.873164] ^ [ 33.873257] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.873368] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.873494] ================================================================== [ 33.880405] ================================================================== [ 33.880520] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 33.880647] Write of size 4 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 33.880790] [ 33.880893] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 33.881154] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.881334] Hardware name: linux,dummy-virt (DT) [ 33.881437] Call trace: [ 33.881518] show_stack+0x20/0x38 (C) [ 33.881698] dump_stack_lvl+0x8c/0xd0 [ 33.881812] print_report+0x118/0x608 [ 33.881942] kasan_report+0xdc/0x128 [ 33.882061] kasan_check_range+0x100/0x1a8 [ 33.882187] __kasan_check_write+0x20/0x30 [ 33.882289] kasan_atomics_helper+0x99c/0x4858 [ 33.882403] kasan_atomics+0x198/0x2e0 [ 33.882516] kunit_try_run_case+0x170/0x3f0 [ 33.882653] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.882806] kthread+0x328/0x630 [ 33.882918] ret_from_fork+0x10/0x20 [ 33.883098] [ 33.883153] Allocated by task 276: [ 33.883232] kasan_save_stack+0x3c/0x68 [ 33.883342] kasan_save_track+0x20/0x40 [ 33.883443] kasan_save_alloc_info+0x40/0x58 [ 33.883548] __kasan_kmalloc+0xd4/0xd8 [ 33.883646] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.883755] kasan_atomics+0xb8/0x2e0 [ 33.883854] kunit_try_run_case+0x170/0x3f0 [ 33.884023] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.884136] kthread+0x328/0x630 [ 33.884234] ret_from_fork+0x10/0x20 [ 33.884325] [ 33.884371] The buggy address belongs to the object at fff00000c76a3180 [ 33.884371] which belongs to the cache kmalloc-64 of size 64 [ 33.884526] The buggy address is located 0 bytes to the right of [ 33.884526] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 33.884799] [ 33.884860] The buggy address belongs to the physical page: [ 33.884949] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 33.885087] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.885225] page_type: f5(slab) [ 33.885351] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.885532] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.885746] page dumped because: kasan: bad access detected [ 33.885849] [ 33.885903] Memory state around the buggy address: [ 33.885981] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.886098] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.886218] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.886317] ^ [ 33.886392] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.886483] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.886566] ================================================================== [ 34.090155] ================================================================== [ 34.090547] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 34.090866] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.091072] [ 34.091201] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.091387] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.091453] Hardware name: linux,dummy-virt (DT) [ 34.091531] Call trace: [ 34.091589] show_stack+0x20/0x38 (C) [ 34.091763] dump_stack_lvl+0x8c/0xd0 [ 34.091983] print_report+0x118/0x608 [ 34.092097] kasan_report+0xdc/0x128 [ 34.092445] kasan_check_range+0x100/0x1a8 [ 34.092571] __kasan_check_write+0x20/0x30 [ 34.093027] kasan_atomics_helper+0xf88/0x4858 [ 34.093259] kasan_atomics+0x198/0x2e0 [ 34.093403] kunit_try_run_case+0x170/0x3f0 [ 34.093522] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.093759] kthread+0x328/0x630 [ 34.093856] ret_from_fork+0x10/0x20 [ 34.093977] [ 34.094017] Allocated by task 276: [ 34.094074] kasan_save_stack+0x3c/0x68 [ 34.094161] kasan_save_track+0x20/0x40 [ 34.094259] kasan_save_alloc_info+0x40/0x58 [ 34.094523] __kasan_kmalloc+0xd4/0xd8 [ 34.094643] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.094773] kasan_atomics+0xb8/0x2e0 [ 34.094914] kunit_try_run_case+0x170/0x3f0 [ 34.095025] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.095131] kthread+0x328/0x630 [ 34.095502] ret_from_fork+0x10/0x20 [ 34.095616] [ 34.095672] The buggy address belongs to the object at fff00000c76a3180 [ 34.095672] which belongs to the cache kmalloc-64 of size 64 [ 34.095839] The buggy address is located 0 bytes to the right of [ 34.095839] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.096022] [ 34.096083] The buggy address belongs to the physical page: [ 34.096165] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.096318] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.096504] page_type: f5(slab) [ 34.096603] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.096735] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.096847] page dumped because: kasan: bad access detected [ 34.097319] [ 34.097514] Memory state around the buggy address: [ 34.097666] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.097882] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.098267] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.098388] ^ [ 34.098529] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.098644] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.098730] ================================================================== [ 34.124567] ================================================================== [ 34.124696] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 34.125252] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.125423] [ 34.125515] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.125744] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.125807] Hardware name: linux,dummy-virt (DT) [ 34.125898] Call trace: [ 34.125957] show_stack+0x20/0x38 (C) [ 34.126085] dump_stack_lvl+0x8c/0xd0 [ 34.126213] print_report+0x118/0x608 [ 34.126331] kasan_report+0xdc/0x128 [ 34.126446] kasan_check_range+0x100/0x1a8 [ 34.126570] __kasan_check_write+0x20/0x30 [ 34.126694] kasan_atomics_helper+0x10c0/0x4858 [ 34.126823] kasan_atomics+0x198/0x2e0 [ 34.128949] kunit_try_run_case+0x170/0x3f0 [ 34.129528] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.129710] kthread+0x328/0x630 [ 34.129816] ret_from_fork+0x10/0x20 [ 34.129941] [ 34.130047] Allocated by task 276: [ 34.130146] kasan_save_stack+0x3c/0x68 [ 34.130275] kasan_save_track+0x20/0x40 [ 34.130381] kasan_save_alloc_info+0x40/0x58 [ 34.130491] __kasan_kmalloc+0xd4/0xd8 [ 34.131575] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.131776] kasan_atomics+0xb8/0x2e0 [ 34.131931] kunit_try_run_case+0x170/0x3f0 [ 34.132204] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.132416] kthread+0x328/0x630 [ 34.132503] ret_from_fork+0x10/0x20 [ 34.133496] [ 34.133692] The buggy address belongs to the object at fff00000c76a3180 [ 34.133692] which belongs to the cache kmalloc-64 of size 64 [ 34.134326] The buggy address is located 0 bytes to the right of [ 34.134326] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.135354] [ 34.135578] The buggy address belongs to the physical page: [ 34.136268] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.136922] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.137620] page_type: f5(slab) [ 34.138208] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.138752] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.139017] page dumped because: kasan: bad access detected [ 34.139589] [ 34.139658] Memory state around the buggy address: [ 34.139888] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.140181] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.140429] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.140533] ^ [ 34.140624] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.140736] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.140840] ================================================================== [ 34.099467] ================================================================== [ 34.099665] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 34.099788] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.099924] [ 34.100012] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.100230] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.100303] Hardware name: linux,dummy-virt (DT) [ 34.100385] Call trace: [ 34.100439] show_stack+0x20/0x38 (C) [ 34.100556] dump_stack_lvl+0x8c/0xd0 [ 34.100683] print_report+0x118/0x608 [ 34.101335] kasan_report+0xdc/0x128 [ 34.101582] kasan_check_range+0x100/0x1a8 [ 34.102026] __kasan_check_write+0x20/0x30 [ 34.102373] kasan_atomics_helper+0xff0/0x4858 [ 34.102584] kasan_atomics+0x198/0x2e0 [ 34.102844] kunit_try_run_case+0x170/0x3f0 [ 34.103168] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.103592] kthread+0x328/0x630 [ 34.103827] ret_from_fork+0x10/0x20 [ 34.104334] [ 34.104397] Allocated by task 276: [ 34.104483] kasan_save_stack+0x3c/0x68 [ 34.104599] kasan_save_track+0x20/0x40 [ 34.104760] kasan_save_alloc_info+0x40/0x58 [ 34.104870] __kasan_kmalloc+0xd4/0xd8 [ 34.104982] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.105084] kasan_atomics+0xb8/0x2e0 [ 34.105179] kunit_try_run_case+0x170/0x3f0 [ 34.105291] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.105421] kthread+0x328/0x630 [ 34.105724] ret_from_fork+0x10/0x20 [ 34.106024] [ 34.106074] The buggy address belongs to the object at fff00000c76a3180 [ 34.106074] which belongs to the cache kmalloc-64 of size 64 [ 34.106194] The buggy address is located 0 bytes to the right of [ 34.106194] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.106349] [ 34.106401] The buggy address belongs to the physical page: [ 34.106479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.106612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.106742] page_type: f5(slab) [ 34.106838] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.107000] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.107112] page dumped because: kasan: bad access detected [ 34.107200] [ 34.107916] Memory state around the buggy address: [ 34.108361] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.108762] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.109162] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.109475] ^ [ 34.109726] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.110059] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.110486] ================================================================== [ 33.917169] ================================================================== [ 33.917329] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 33.918017] Write of size 4 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 33.918397] [ 33.918654] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 33.918884] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.919709] Hardware name: linux,dummy-virt (DT) [ 33.919829] Call trace: [ 33.919903] show_stack+0x20/0x38 (C) [ 33.920038] dump_stack_lvl+0x8c/0xd0 [ 33.920678] print_report+0x118/0x608 [ 33.921113] kasan_report+0xdc/0x128 [ 33.921527] kasan_check_range+0x100/0x1a8 [ 33.921908] __kasan_check_write+0x20/0x30 [ 33.922117] kasan_atomics_helper+0xad4/0x4858 [ 33.922253] kasan_atomics+0x198/0x2e0 [ 33.922355] kunit_try_run_case+0x170/0x3f0 [ 33.923036] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.923563] kthread+0x328/0x630 [ 33.924023] ret_from_fork+0x10/0x20 [ 33.924231] [ 33.924297] Allocated by task 276: [ 33.924450] kasan_save_stack+0x3c/0x68 [ 33.924586] kasan_save_track+0x20/0x40 [ 33.924697] kasan_save_alloc_info+0x40/0x58 [ 33.924795] __kasan_kmalloc+0xd4/0xd8 [ 33.925490] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.925628] kasan_atomics+0xb8/0x2e0 [ 33.925708] kunit_try_run_case+0x170/0x3f0 [ 33.925802] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.925920] kthread+0x328/0x630 [ 33.926900] ret_from_fork+0x10/0x20 [ 33.927054] [ 33.927117] The buggy address belongs to the object at fff00000c76a3180 [ 33.927117] which belongs to the cache kmalloc-64 of size 64 [ 33.927357] The buggy address is located 0 bytes to the right of [ 33.927357] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 33.928005] [ 33.928076] The buggy address belongs to the physical page: [ 33.928236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 33.928381] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.928510] page_type: f5(slab) [ 33.928621] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.928758] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.928895] page dumped because: kasan: bad access detected [ 33.929300] [ 33.929360] Memory state around the buggy address: [ 33.929513] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.930266] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.930409] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.930523] ^ [ 33.930618] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.931345] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.931464] ================================================================== [ 34.011028] ================================================================== [ 34.011174] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 34.011305] Read of size 4 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.011436] [ 34.011524] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.011719] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.011778] Hardware name: linux,dummy-virt (DT) [ 34.011853] Call trace: [ 34.011925] show_stack+0x20/0x38 (C) [ 34.012388] dump_stack_lvl+0x8c/0xd0 [ 34.012528] print_report+0x118/0x608 [ 34.012651] kasan_report+0xdc/0x128 [ 34.012764] __asan_report_load4_noabort+0x20/0x30 [ 34.012956] kasan_atomics_helper+0x3e04/0x4858 [ 34.013146] kasan_atomics+0x198/0x2e0 [ 34.013318] kunit_try_run_case+0x170/0x3f0 [ 34.013502] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.013635] kthread+0x328/0x630 [ 34.013754] ret_from_fork+0x10/0x20 [ 34.013868] [ 34.013925] Allocated by task 276: [ 34.014006] kasan_save_stack+0x3c/0x68 [ 34.014103] kasan_save_track+0x20/0x40 [ 34.014194] kasan_save_alloc_info+0x40/0x58 [ 34.014284] __kasan_kmalloc+0xd4/0xd8 [ 34.014370] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.014471] kasan_atomics+0xb8/0x2e0 [ 34.015015] kunit_try_run_case+0x170/0x3f0 [ 34.015173] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.015347] kthread+0x328/0x630 [ 34.015439] ret_from_fork+0x10/0x20 [ 34.015535] [ 34.015593] The buggy address belongs to the object at fff00000c76a3180 [ 34.015593] which belongs to the cache kmalloc-64 of size 64 [ 34.015746] The buggy address is located 0 bytes to the right of [ 34.015746] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.015930] [ 34.015987] The buggy address belongs to the physical page: [ 34.016085] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.016267] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.016420] page_type: f5(slab) [ 34.016564] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.016752] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.016903] page dumped because: kasan: bad access detected [ 34.016978] [ 34.017022] Memory state around the buggy address: [ 34.017104] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.017227] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.017582] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.017846] ^ [ 34.017947] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.018058] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.018332] ================================================================== [ 34.312117] ================================================================== [ 34.312798] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 34.313089] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.313242] [ 34.313759] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.314159] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.314234] Hardware name: linux,dummy-virt (DT) [ 34.314342] Call trace: [ 34.314414] show_stack+0x20/0x38 (C) [ 34.314685] dump_stack_lvl+0x8c/0xd0 [ 34.314821] print_report+0x118/0x608 [ 34.314963] kasan_report+0xdc/0x128 [ 34.315549] kasan_check_range+0x100/0x1a8 [ 34.315701] __kasan_check_write+0x20/0x30 [ 34.315809] kasan_atomics_helper+0x16d0/0x4858 [ 34.316416] kasan_atomics+0x198/0x2e0 [ 34.316563] kunit_try_run_case+0x170/0x3f0 [ 34.317324] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.317643] kthread+0x328/0x630 [ 34.317774] ret_from_fork+0x10/0x20 [ 34.318259] [ 34.318365] Allocated by task 276: [ 34.318742] kasan_save_stack+0x3c/0x68 [ 34.318867] kasan_save_track+0x20/0x40 [ 34.318994] kasan_save_alloc_info+0x40/0x58 [ 34.319496] __kasan_kmalloc+0xd4/0xd8 [ 34.319622] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.320246] kasan_atomics+0xb8/0x2e0 [ 34.320422] kunit_try_run_case+0x170/0x3f0 [ 34.320523] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.320633] kthread+0x328/0x630 [ 34.320725] ret_from_fork+0x10/0x20 [ 34.321379] [ 34.321728] The buggy address belongs to the object at fff00000c76a3180 [ 34.321728] which belongs to the cache kmalloc-64 of size 64 [ 34.322192] The buggy address is located 0 bytes to the right of [ 34.322192] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.322642] [ 34.322710] The buggy address belongs to the physical page: [ 34.323071] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.323259] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.323395] page_type: f5(slab) [ 34.324049] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.324200] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.324661] page dumped because: kasan: bad access detected [ 34.324769] [ 34.325097] Memory state around the buggy address: [ 34.325192] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.325668] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.325797] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.325917] ^ [ 34.326560] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.326678] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.327099] ================================================================== [ 34.174303] ================================================================== [ 34.174484] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 34.174610] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.174738] [ 34.174826] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.175356] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.175475] Hardware name: linux,dummy-virt (DT) [ 34.175560] Call trace: [ 34.175626] show_stack+0x20/0x38 (C) [ 34.175794] dump_stack_lvl+0x8c/0xd0 [ 34.175966] print_report+0x118/0x608 [ 34.176109] kasan_report+0xdc/0x128 [ 34.176226] kasan_check_range+0x100/0x1a8 [ 34.176356] __kasan_check_write+0x20/0x30 [ 34.176503] kasan_atomics_helper+0x126c/0x4858 [ 34.176615] kasan_atomics+0x198/0x2e0 [ 34.176723] kunit_try_run_case+0x170/0x3f0 [ 34.176840] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.177018] kthread+0x328/0x630 [ 34.177136] ret_from_fork+0x10/0x20 [ 34.177265] [ 34.177333] Allocated by task 276: [ 34.177463] kasan_save_stack+0x3c/0x68 [ 34.177595] kasan_save_track+0x20/0x40 [ 34.177693] kasan_save_alloc_info+0x40/0x58 [ 34.177799] __kasan_kmalloc+0xd4/0xd8 [ 34.177905] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.178010] kasan_atomics+0xb8/0x2e0 [ 34.178100] kunit_try_run_case+0x170/0x3f0 [ 34.178192] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.178284] kthread+0x328/0x630 [ 34.178353] ret_from_fork+0x10/0x20 [ 34.178443] [ 34.178498] The buggy address belongs to the object at fff00000c76a3180 [ 34.178498] which belongs to the cache kmalloc-64 of size 64 [ 34.178675] The buggy address is located 0 bytes to the right of [ 34.178675] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.178847] [ 34.178913] The buggy address belongs to the physical page: [ 34.179010] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.179151] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.180016] page_type: f5(slab) [ 34.180138] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.180266] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.180507] page dumped because: kasan: bad access detected [ 34.180790] [ 34.180991] Memory state around the buggy address: [ 34.181245] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.181507] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.181733] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.182083] ^ [ 34.182308] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.182584] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.182772] ================================================================== [ 34.255805] ================================================================== [ 34.255933] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 34.256058] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.256181] [ 34.256268] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.256496] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.256564] Hardware name: linux,dummy-virt (DT) [ 34.257037] Call trace: [ 34.257227] show_stack+0x20/0x38 (C) [ 34.257479] dump_stack_lvl+0x8c/0xd0 [ 34.257706] print_report+0x118/0x608 [ 34.257888] kasan_report+0xdc/0x128 [ 34.258008] kasan_check_range+0x100/0x1a8 [ 34.258114] __kasan_check_write+0x20/0x30 [ 34.258215] kasan_atomics_helper+0x154c/0x4858 [ 34.258337] kasan_atomics+0x198/0x2e0 [ 34.258456] kunit_try_run_case+0x170/0x3f0 [ 34.259020] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.259319] kthread+0x328/0x630 [ 34.259942] ret_from_fork+0x10/0x20 [ 34.260106] [ 34.260171] Allocated by task 276: [ 34.260498] kasan_save_stack+0x3c/0x68 [ 34.260627] kasan_save_track+0x20/0x40 [ 34.260730] kasan_save_alloc_info+0x40/0x58 [ 34.260834] __kasan_kmalloc+0xd4/0xd8 [ 34.260933] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.261026] kasan_atomics+0xb8/0x2e0 [ 34.261120] kunit_try_run_case+0x170/0x3f0 [ 34.261264] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.261381] kthread+0x328/0x630 [ 34.262011] ret_from_fork+0x10/0x20 [ 34.262397] [ 34.262483] The buggy address belongs to the object at fff00000c76a3180 [ 34.262483] which belongs to the cache kmalloc-64 of size 64 [ 34.262786] The buggy address is located 0 bytes to the right of [ 34.262786] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.263097] [ 34.263414] The buggy address belongs to the physical page: [ 34.263513] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.263717] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.264123] page_type: f5(slab) [ 34.264247] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.264384] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.264572] page dumped because: kasan: bad access detected [ 34.264915] [ 34.265136] Memory state around the buggy address: [ 34.265269] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.265499] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.265641] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.266135] ^ [ 34.266379] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.266495] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.266901] ================================================================== [ 34.328678] ================================================================== [ 34.328816] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 34.328967] Read of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.329105] [ 34.329197] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.329414] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.329503] Hardware name: linux,dummy-virt (DT) [ 34.329586] Call trace: [ 34.330266] show_stack+0x20/0x38 (C) [ 34.330460] dump_stack_lvl+0x8c/0xd0 [ 34.331028] print_report+0x118/0x608 [ 34.331471] kasan_report+0xdc/0x128 [ 34.331620] __asan_report_load8_noabort+0x20/0x30 [ 34.331754] kasan_atomics_helper+0x3e10/0x4858 [ 34.331895] kasan_atomics+0x198/0x2e0 [ 34.332020] kunit_try_run_case+0x170/0x3f0 [ 34.333275] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.333962] kthread+0x328/0x630 [ 34.334094] ret_from_fork+0x10/0x20 [ 34.334193] [ 34.334232] Allocated by task 276: [ 34.334303] kasan_save_stack+0x3c/0x68 [ 34.335444] kasan_save_track+0x20/0x40 [ 34.335585] kasan_save_alloc_info+0x40/0x58 [ 34.335695] __kasan_kmalloc+0xd4/0xd8 [ 34.336067] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.336684] kasan_atomics+0xb8/0x2e0 [ 34.336798] kunit_try_run_case+0x170/0x3f0 [ 34.336909] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.337245] kthread+0x328/0x630 [ 34.337762] ret_from_fork+0x10/0x20 [ 34.337917] [ 34.337978] The buggy address belongs to the object at fff00000c76a3180 [ 34.337978] which belongs to the cache kmalloc-64 of size 64 [ 34.338243] The buggy address is located 0 bytes to the right of [ 34.338243] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.338386] [ 34.338430] The buggy address belongs to the physical page: [ 34.338722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.338893] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.339046] page_type: f5(slab) [ 34.339720] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.339866] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.340333] page dumped because: kasan: bad access detected [ 34.340448] [ 34.340676] Memory state around the buggy address: [ 34.341072] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.341352] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.341809] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.342040] ^ [ 34.342152] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.342274] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.342426] ================================================================== [ 34.183599] ================================================================== [ 34.183859] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 34.184216] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.184571] [ 34.184741] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.185171] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.185238] Hardware name: linux,dummy-virt (DT) [ 34.185316] Call trace: [ 34.185371] show_stack+0x20/0x38 (C) [ 34.185905] dump_stack_lvl+0x8c/0xd0 [ 34.186418] print_report+0x118/0x608 [ 34.186789] kasan_report+0xdc/0x128 [ 34.187092] kasan_check_range+0x100/0x1a8 [ 34.187413] __kasan_check_write+0x20/0x30 [ 34.187554] kasan_atomics_helper+0x12d8/0x4858 [ 34.187894] kasan_atomics+0x198/0x2e0 [ 34.188134] kunit_try_run_case+0x170/0x3f0 [ 34.188535] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.188956] kthread+0x328/0x630 [ 34.189218] ret_from_fork+0x10/0x20 [ 34.189535] [ 34.189593] Allocated by task 276: [ 34.189678] kasan_save_stack+0x3c/0x68 [ 34.189796] kasan_save_track+0x20/0x40 [ 34.190133] kasan_save_alloc_info+0x40/0x58 [ 34.190387] __kasan_kmalloc+0xd4/0xd8 [ 34.190721] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.190868] kasan_atomics+0xb8/0x2e0 [ 34.190980] kunit_try_run_case+0x170/0x3f0 [ 34.191248] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.191735] kthread+0x328/0x630 [ 34.191848] ret_from_fork+0x10/0x20 [ 34.191955] [ 34.192262] The buggy address belongs to the object at fff00000c76a3180 [ 34.192262] which belongs to the cache kmalloc-64 of size 64 [ 34.192615] The buggy address is located 0 bytes to the right of [ 34.192615] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.193176] [ 34.193367] The buggy address belongs to the physical page: [ 34.193586] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.193731] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.193851] page_type: f5(slab) [ 34.194268] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.194659] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.194908] page dumped because: kasan: bad access detected [ 34.195017] [ 34.195070] Memory state around the buggy address: [ 34.195159] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.195274] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.195387] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.195490] ^ [ 34.195579] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.195970] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.196253] ================================================================== [ 34.296984] ================================================================== [ 34.297098] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 34.297208] Read of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.297330] [ 34.297422] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.297668] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.297739] Hardware name: linux,dummy-virt (DT) [ 34.297815] Call trace: [ 34.297936] show_stack+0x20/0x38 (C) [ 34.298161] dump_stack_lvl+0x8c/0xd0 [ 34.298289] print_report+0x118/0x608 [ 34.298403] kasan_report+0xdc/0x128 [ 34.298531] __asan_report_load8_noabort+0x20/0x30 [ 34.298667] kasan_atomics_helper+0x3df4/0x4858 [ 34.298792] kasan_atomics+0x198/0x2e0 [ 34.298958] kunit_try_run_case+0x170/0x3f0 [ 34.299086] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.299240] kthread+0x328/0x630 [ 34.299483] ret_from_fork+0x10/0x20 [ 34.299631] [ 34.299684] Allocated by task 276: [ 34.299764] kasan_save_stack+0x3c/0x68 [ 34.299859] kasan_save_track+0x20/0x40 [ 34.299954] kasan_save_alloc_info+0x40/0x58 [ 34.300106] __kasan_kmalloc+0xd4/0xd8 [ 34.300206] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.300950] kasan_atomics+0xb8/0x2e0 [ 34.301323] kunit_try_run_case+0x170/0x3f0 [ 34.302103] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.302385] kthread+0x328/0x630 [ 34.302906] ret_from_fork+0x10/0x20 [ 34.303113] [ 34.303296] The buggy address belongs to the object at fff00000c76a3180 [ 34.303296] which belongs to the cache kmalloc-64 of size 64 [ 34.303988] The buggy address is located 0 bytes to the right of [ 34.303988] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.304765] [ 34.304963] The buggy address belongs to the physical page: [ 34.305227] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.305463] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.305580] page_type: f5(slab) [ 34.306497] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.306845] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.306983] page dumped because: kasan: bad access detected [ 34.307071] [ 34.307125] Memory state around the buggy address: [ 34.307612] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.307749] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.308001] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.308237] ^ [ 34.308321] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.308443] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.308861] ================================================================== [ 34.281039] ================================================================== [ 34.281164] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 34.281292] Read of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.281427] [ 34.281516] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.281745] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.281818] Hardware name: linux,dummy-virt (DT) [ 34.282425] Call trace: [ 34.282493] show_stack+0x20/0x38 (C) [ 34.282618] dump_stack_lvl+0x8c/0xd0 [ 34.282744] print_report+0x118/0x608 [ 34.283264] kasan_report+0xdc/0x128 [ 34.283545] __asan_report_load8_noabort+0x20/0x30 [ 34.283701] kasan_atomics_helper+0x3db0/0x4858 [ 34.283822] kasan_atomics+0x198/0x2e0 [ 34.284127] kunit_try_run_case+0x170/0x3f0 [ 34.284276] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.284413] kthread+0x328/0x630 [ 34.284513] ret_from_fork+0x10/0x20 [ 34.284658] [ 34.284751] Allocated by task 276: [ 34.284829] kasan_save_stack+0x3c/0x68 [ 34.284965] kasan_save_track+0x20/0x40 [ 34.285068] kasan_save_alloc_info+0x40/0x58 [ 34.285176] __kasan_kmalloc+0xd4/0xd8 [ 34.285274] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.285379] kasan_atomics+0xb8/0x2e0 [ 34.285501] kunit_try_run_case+0x170/0x3f0 [ 34.285595] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.285925] kthread+0x328/0x630 [ 34.286016] ret_from_fork+0x10/0x20 [ 34.286111] [ 34.286344] The buggy address belongs to the object at fff00000c76a3180 [ 34.286344] which belongs to the cache kmalloc-64 of size 64 [ 34.286504] The buggy address is located 0 bytes to the right of [ 34.286504] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.286657] [ 34.286711] The buggy address belongs to the physical page: [ 34.286838] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.287069] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.287221] page_type: f5(slab) [ 34.287368] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.287552] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.287682] page dumped because: kasan: bad access detected [ 34.287769] [ 34.287838] Memory state around the buggy address: [ 34.287969] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.288092] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.288209] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.288314] ^ [ 34.288441] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.288591] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.288694] ================================================================== [ 34.345109] ================================================================== [ 34.345315] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 34.345485] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.345613] [ 34.345698] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.345912] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.345987] Hardware name: linux,dummy-virt (DT) [ 34.346075] Call trace: [ 34.346898] show_stack+0x20/0x38 (C) [ 34.347260] dump_stack_lvl+0x8c/0xd0 [ 34.347409] print_report+0x118/0x608 [ 34.347525] kasan_report+0xdc/0x128 [ 34.348085] kasan_check_range+0x100/0x1a8 [ 34.348451] __kasan_check_write+0x20/0x30 [ 34.348751] kasan_atomics_helper+0x175c/0x4858 [ 34.348934] kasan_atomics+0x198/0x2e0 [ 34.349433] kunit_try_run_case+0x170/0x3f0 [ 34.349617] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.349778] kthread+0x328/0x630 [ 34.349909] ret_from_fork+0x10/0x20 [ 34.350757] [ 34.350841] Allocated by task 276: [ 34.350957] kasan_save_stack+0x3c/0x68 [ 34.351145] kasan_save_track+0x20/0x40 [ 34.351478] kasan_save_alloc_info+0x40/0x58 [ 34.351755] __kasan_kmalloc+0xd4/0xd8 [ 34.351858] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.351973] kasan_atomics+0xb8/0x2e0 [ 34.352071] kunit_try_run_case+0x170/0x3f0 [ 34.352175] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.352288] kthread+0x328/0x630 [ 34.352997] ret_from_fork+0x10/0x20 [ 34.353134] [ 34.353570] The buggy address belongs to the object at fff00000c76a3180 [ 34.353570] which belongs to the cache kmalloc-64 of size 64 [ 34.353983] The buggy address is located 0 bytes to the right of [ 34.353983] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.354174] [ 34.354739] The buggy address belongs to the physical page: [ 34.354846] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.355009] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.355498] page_type: f5(slab) [ 34.355957] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.356136] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.356401] page dumped because: kasan: bad access detected [ 34.356707] [ 34.356772] Memory state around the buggy address: [ 34.357097] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.357228] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.357345] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.357455] ^ [ 34.357551] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.357666] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.357772] ================================================================== [ 34.080313] ================================================================== [ 34.080445] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 34.080650] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.080776] [ 34.081203] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.081851] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.081946] Hardware name: linux,dummy-virt (DT) [ 34.082451] Call trace: [ 34.082545] show_stack+0x20/0x38 (C) [ 34.082685] dump_stack_lvl+0x8c/0xd0 [ 34.082810] print_report+0x118/0x608 [ 34.082953] kasan_report+0xdc/0x128 [ 34.083081] kasan_check_range+0x100/0x1a8 [ 34.083206] __kasan_check_write+0x20/0x30 [ 34.083322] kasan_atomics_helper+0xf20/0x4858 [ 34.083451] kasan_atomics+0x198/0x2e0 [ 34.083572] kunit_try_run_case+0x170/0x3f0 [ 34.083698] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.083846] kthread+0x328/0x630 [ 34.083965] ret_from_fork+0x10/0x20 [ 34.084375] [ 34.084537] Allocated by task 276: [ 34.084646] kasan_save_stack+0x3c/0x68 [ 34.084754] kasan_save_track+0x20/0x40 [ 34.084853] kasan_save_alloc_info+0x40/0x58 [ 34.084974] __kasan_kmalloc+0xd4/0xd8 [ 34.085073] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.085178] kasan_atomics+0xb8/0x2e0 [ 34.085278] kunit_try_run_case+0x170/0x3f0 [ 34.085412] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.085563] kthread+0x328/0x630 [ 34.085685] ret_from_fork+0x10/0x20 [ 34.085803] [ 34.085859] The buggy address belongs to the object at fff00000c76a3180 [ 34.085859] which belongs to the cache kmalloc-64 of size 64 [ 34.086009] The buggy address is located 0 bytes to the right of [ 34.086009] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.086174] [ 34.086236] The buggy address belongs to the physical page: [ 34.086327] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.086458] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.086571] page_type: f5(slab) [ 34.087077] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.087592] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.087842] page dumped because: kasan: bad access detected [ 34.088070] [ 34.088118] Memory state around the buggy address: [ 34.088308] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.088531] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.088678] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.088800] ^ [ 34.089181] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.089300] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.089578] ================================================================== [ 34.221415] ================================================================== [ 34.222052] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 34.222445] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.222682] [ 34.223006] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.223538] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.223702] Hardware name: linux,dummy-virt (DT) [ 34.223803] Call trace: [ 34.223867] show_stack+0x20/0x38 (C) [ 34.224013] dump_stack_lvl+0x8c/0xd0 [ 34.224139] print_report+0x118/0x608 [ 34.224259] kasan_report+0xdc/0x128 [ 34.225025] kasan_check_range+0x100/0x1a8 [ 34.225308] __kasan_check_write+0x20/0x30 [ 34.225617] kasan_atomics_helper+0x1414/0x4858 [ 34.225789] kasan_atomics+0x198/0x2e0 [ 34.226041] kunit_try_run_case+0x170/0x3f0 [ 34.226311] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.226769] kthread+0x328/0x630 [ 34.226897] ret_from_fork+0x10/0x20 [ 34.227139] [ 34.227309] Allocated by task 276: [ 34.227408] kasan_save_stack+0x3c/0x68 [ 34.227728] kasan_save_track+0x20/0x40 [ 34.228100] kasan_save_alloc_info+0x40/0x58 [ 34.228226] __kasan_kmalloc+0xd4/0xd8 [ 34.228331] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.228430] kasan_atomics+0xb8/0x2e0 [ 34.228524] kunit_try_run_case+0x170/0x3f0 [ 34.228628] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.228741] kthread+0x328/0x630 [ 34.228825] ret_from_fork+0x10/0x20 [ 34.228931] [ 34.228990] The buggy address belongs to the object at fff00000c76a3180 [ 34.228990] which belongs to the cache kmalloc-64 of size 64 [ 34.229511] The buggy address is located 0 bytes to the right of [ 34.229511] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.229856] [ 34.230112] The buggy address belongs to the physical page: [ 34.230512] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.230675] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.231043] page_type: f5(slab) [ 34.231145] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.231400] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.231711] page dumped because: kasan: bad access detected [ 34.232020] [ 34.232077] Memory state around the buggy address: [ 34.232163] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.232674] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.233091] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.233438] ^ [ 34.233628] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.233837] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.233938] ================================================================== [ 34.040018] ================================================================== [ 34.040139] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 34.040262] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.040395] [ 34.040488] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.040719] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.042297] Hardware name: linux,dummy-virt (DT) [ 34.042408] Call trace: [ 34.042474] show_stack+0x20/0x38 (C) [ 34.042953] dump_stack_lvl+0x8c/0xd0 [ 34.043570] print_report+0x118/0x608 [ 34.043842] kasan_report+0xdc/0x128 [ 34.043987] kasan_check_range+0x100/0x1a8 [ 34.044110] __kasan_check_write+0x20/0x30 [ 34.044814] kasan_atomics_helper+0xe44/0x4858 [ 34.045251] kasan_atomics+0x198/0x2e0 [ 34.045384] kunit_try_run_case+0x170/0x3f0 [ 34.045999] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.046581] kthread+0x328/0x630 [ 34.047053] ret_from_fork+0x10/0x20 [ 34.047221] [ 34.047444] Allocated by task 276: [ 34.047532] kasan_save_stack+0x3c/0x68 [ 34.048105] kasan_save_track+0x20/0x40 [ 34.048218] kasan_save_alloc_info+0x40/0x58 [ 34.048330] __kasan_kmalloc+0xd4/0xd8 [ 34.048428] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.048541] kasan_atomics+0xb8/0x2e0 [ 34.048640] kunit_try_run_case+0x170/0x3f0 [ 34.049814] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.050214] kthread+0x328/0x630 [ 34.050556] ret_from_fork+0x10/0x20 [ 34.050887] [ 34.050964] The buggy address belongs to the object at fff00000c76a3180 [ 34.050964] which belongs to the cache kmalloc-64 of size 64 [ 34.051374] The buggy address is located 0 bytes to the right of [ 34.051374] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.051564] [ 34.051614] The buggy address belongs to the physical page: [ 34.051686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.051809] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.051952] page_type: f5(slab) [ 34.052056] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.053158] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.053438] page dumped because: kasan: bad access detected [ 34.053530] [ 34.053574] Memory state around the buggy address: [ 34.054054] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.054366] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.054497] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.055086] ^ [ 34.055193] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.055306] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.055668] ================================================================== [ 34.210732] ================================================================== [ 34.210865] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 34.211002] Read of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.211107] [ 34.211190] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.211412] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.211484] Hardware name: linux,dummy-virt (DT) [ 34.211571] Call trace: [ 34.211630] show_stack+0x20/0x38 (C) [ 34.211758] dump_stack_lvl+0x8c/0xd0 [ 34.211889] print_report+0x118/0x608 [ 34.212021] kasan_report+0xdc/0x128 [ 34.212138] __asan_report_load8_noabort+0x20/0x30 [ 34.212261] kasan_atomics_helper+0x3f04/0x4858 [ 34.212387] kasan_atomics+0x198/0x2e0 [ 34.212510] kunit_try_run_case+0x170/0x3f0 [ 34.212640] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.212783] kthread+0x328/0x630 [ 34.213548] ret_from_fork+0x10/0x20 [ 34.213843] [ 34.213910] Allocated by task 276: [ 34.213998] kasan_save_stack+0x3c/0x68 [ 34.214387] kasan_save_track+0x20/0x40 [ 34.214489] kasan_save_alloc_info+0x40/0x58 [ 34.214572] __kasan_kmalloc+0xd4/0xd8 [ 34.214643] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.214738] kasan_atomics+0xb8/0x2e0 [ 34.214825] kunit_try_run_case+0x170/0x3f0 [ 34.215024] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.215293] kthread+0x328/0x630 [ 34.215747] ret_from_fork+0x10/0x20 [ 34.216081] [ 34.216213] The buggy address belongs to the object at fff00000c76a3180 [ 34.216213] which belongs to the cache kmalloc-64 of size 64 [ 34.216426] The buggy address is located 0 bytes to the right of [ 34.216426] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.216998] [ 34.217079] The buggy address belongs to the physical page: [ 34.217298] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.217534] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.217894] page_type: f5(slab) [ 34.217998] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.218120] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.218374] page dumped because: kasan: bad access detected [ 34.218568] [ 34.218643] Memory state around the buggy address: [ 34.218758] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.218881] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.219008] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.219738] ^ [ 34.220044] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.220184] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.220294] ================================================================== [ 34.166336] ================================================================== [ 34.166465] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 34.166643] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.166818] [ 34.166975] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.167273] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.167344] Hardware name: linux,dummy-virt (DT) [ 34.167430] Call trace: [ 34.167515] show_stack+0x20/0x38 (C) [ 34.167681] dump_stack_lvl+0x8c/0xd0 [ 34.167847] print_report+0x118/0x608 [ 34.167967] kasan_report+0xdc/0x128 [ 34.168081] kasan_check_range+0x100/0x1a8 [ 34.168250] __kasan_check_write+0x20/0x30 [ 34.168360] kasan_atomics_helper+0x11f8/0x4858 [ 34.168477] kasan_atomics+0x198/0x2e0 [ 34.168593] kunit_try_run_case+0x170/0x3f0 [ 34.168727] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.168928] kthread+0x328/0x630 [ 34.169062] ret_from_fork+0x10/0x20 [ 34.169214] [ 34.169283] Allocated by task 276: [ 34.169379] kasan_save_stack+0x3c/0x68 [ 34.169506] kasan_save_track+0x20/0x40 [ 34.169637] kasan_save_alloc_info+0x40/0x58 [ 34.169853] __kasan_kmalloc+0xd4/0xd8 [ 34.169993] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.170109] kasan_atomics+0xb8/0x2e0 [ 34.170198] kunit_try_run_case+0x170/0x3f0 [ 34.170284] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.170372] kthread+0x328/0x630 [ 34.170450] ret_from_fork+0x10/0x20 [ 34.170545] [ 34.170602] The buggy address belongs to the object at fff00000c76a3180 [ 34.170602] which belongs to the cache kmalloc-64 of size 64 [ 34.171239] The buggy address is located 0 bytes to the right of [ 34.171239] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.172433] [ 34.172508] The buggy address belongs to the physical page: [ 34.172591] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.172675] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.172736] page_type: f5(slab) [ 34.172788] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.172845] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.172947] page dumped because: kasan: bad access detected [ 34.173070] [ 34.173120] Memory state around the buggy address: [ 34.173206] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.173322] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.173429] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.173531] ^ [ 34.173613] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.173706] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.173793] ================================================================== [ 33.874083] ================================================================== [ 33.874211] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 33.874375] Write of size 4 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 33.874508] [ 33.874589] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 33.874785] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.875726] kasan_atomics_helper+0x934/0x4858 [ 33.877084] __kasan_kmalloc+0xd4/0xd8 [ 33.877179] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.877280] kasan_atomics+0xb8/0x2e0 [ 33.877371] kunit_try_run_case+0x170/0x3f0 [ 33.877603] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.877744] kthread+0x328/0x630 [ 33.877827] ret_from_fork+0x10/0x20 [ 33.877928] [ 33.878012] The buggy address belongs to the object at fff00000c76a3180 [ 33.878012] which belongs to the cache kmalloc-64 of size 64 [ 33.878162] The buggy address is located 0 bytes to the right of [ 33.878162] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 33.878346] [ 33.878410] The buggy address belongs to the physical page: [ 33.878481] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 33.878595] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.878711] page_type: f5(slab) [ 33.878814] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.878972] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.879092] page dumped because: kasan: bad access detected [ 33.879168] [ 33.879233] Memory state around the buggy address: [ 33.879321] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.879430] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.879548] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.879653] ^ [ 33.879744] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.879859] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.879974] ================================================================== [ 33.990765] ================================================================== [ 33.990987] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 33.991125] Read of size 4 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 33.991256] [ 33.991338] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 33.991557] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.991634] Hardware name: linux,dummy-virt (DT) [ 33.991724] Call trace: [ 33.991811] show_stack+0x20/0x38 (C) [ 33.992075] dump_stack_lvl+0x8c/0xd0 [ 33.992323] print_report+0x118/0x608 [ 33.993098] kasan_report+0xdc/0x128 [ 33.993482] __asan_report_load4_noabort+0x20/0x30 [ 33.993742] kasan_atomics_helper+0x3dd8/0x4858 [ 33.993912] kasan_atomics+0x198/0x2e0 [ 33.994036] kunit_try_run_case+0x170/0x3f0 [ 33.994166] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.994307] kthread+0x328/0x630 [ 33.994422] ret_from_fork+0x10/0x20 [ 33.994544] [ 33.994586] Allocated by task 276: [ 33.994647] kasan_save_stack+0x3c/0x68 [ 33.995124] kasan_save_track+0x20/0x40 [ 33.995366] kasan_save_alloc_info+0x40/0x58 [ 33.995480] __kasan_kmalloc+0xd4/0xd8 [ 33.995665] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.995948] kasan_atomics+0xb8/0x2e0 [ 33.996047] kunit_try_run_case+0x170/0x3f0 [ 33.996311] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.996623] kthread+0x328/0x630 [ 33.996821] ret_from_fork+0x10/0x20 [ 33.997032] [ 33.997105] The buggy address belongs to the object at fff00000c76a3180 [ 33.997105] which belongs to the cache kmalloc-64 of size 64 [ 33.997376] The buggy address is located 0 bytes to the right of [ 33.997376] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 33.997563] [ 33.997622] The buggy address belongs to the physical page: [ 33.997709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 33.997850] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.997990] page_type: f5(slab) [ 33.998089] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.998263] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.998625] page dumped because: kasan: bad access detected [ 33.998758] [ 33.998839] Memory state around the buggy address: [ 33.998986] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.999156] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.999321] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.999467] ^ [ 33.999967] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.000087] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.000193] ================================================================== [ 33.900918] ================================================================== [ 33.901055] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 33.901839] Write of size 4 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 33.902007] [ 33.902097] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 33.902326] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.902407] Hardware name: linux,dummy-virt (DT) [ 33.903390] Call trace: [ 33.903571] show_stack+0x20/0x38 (C) [ 33.904160] dump_stack_lvl+0x8c/0xd0 [ 33.904518] print_report+0x118/0x608 [ 33.904881] kasan_report+0xdc/0x128 [ 33.905379] kasan_check_range+0x100/0x1a8 [ 33.905624] __kasan_check_write+0x20/0x30 [ 33.905859] kasan_atomics_helper+0xa6c/0x4858 [ 33.906188] kasan_atomics+0x198/0x2e0 [ 33.906426] kunit_try_run_case+0x170/0x3f0 [ 33.906822] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.907209] kthread+0x328/0x630 [ 33.907648] ret_from_fork+0x10/0x20 [ 33.908036] [ 33.908100] Allocated by task 276: [ 33.908471] kasan_save_stack+0x3c/0x68 [ 33.908593] kasan_save_track+0x20/0x40 [ 33.908932] kasan_save_alloc_info+0x40/0x58 [ 33.909055] __kasan_kmalloc+0xd4/0xd8 [ 33.909660] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.909848] kasan_atomics+0xb8/0x2e0 [ 33.909960] kunit_try_run_case+0x170/0x3f0 [ 33.910293] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.910663] kthread+0x328/0x630 [ 33.910805] ret_from_fork+0x10/0x20 [ 33.911118] [ 33.911443] The buggy address belongs to the object at fff00000c76a3180 [ 33.911443] which belongs to the cache kmalloc-64 of size 64 [ 33.911811] The buggy address is located 0 bytes to the right of [ 33.911811] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 33.912384] [ 33.912463] The buggy address belongs to the physical page: [ 33.912554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 33.913102] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.913250] page_type: f5(slab) [ 33.913795] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.914324] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.914449] page dumped because: kasan: bad access detected [ 33.914606] [ 33.914686] Memory state around the buggy address: [ 33.914882] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.915021] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.915200] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.915367] ^ [ 33.915465] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.915617] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.915806] ================================================================== [ 34.031573] ================================================================== [ 34.031637] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 34.031745] Read of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.031858] [ 34.031962] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.032150] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.032221] Hardware name: linux,dummy-virt (DT) [ 34.032304] Call trace: [ 34.032360] show_stack+0x20/0x38 (C) [ 34.032493] dump_stack_lvl+0x8c/0xd0 [ 34.032617] print_report+0x118/0x608 [ 34.032738] kasan_report+0xdc/0x128 [ 34.032853] __asan_report_load8_noabort+0x20/0x30 [ 34.032999] kasan_atomics_helper+0x3f58/0x4858 [ 34.033129] kasan_atomics+0x198/0x2e0 [ 34.033248] kunit_try_run_case+0x170/0x3f0 [ 34.033379] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.033517] kthread+0x328/0x630 [ 34.033631] ret_from_fork+0x10/0x20 [ 34.033757] [ 34.033806] Allocated by task 276: [ 34.033889] kasan_save_stack+0x3c/0x68 [ 34.034295] kasan_save_track+0x20/0x40 [ 34.034395] kasan_save_alloc_info+0x40/0x58 [ 34.034490] __kasan_kmalloc+0xd4/0xd8 [ 34.034762] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.034866] kasan_atomics+0xb8/0x2e0 [ 34.034989] kunit_try_run_case+0x170/0x3f0 [ 34.035081] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.035184] kthread+0x328/0x630 [ 34.035258] ret_from_fork+0x10/0x20 [ 34.035332] [ 34.035382] The buggy address belongs to the object at fff00000c76a3180 [ 34.035382] which belongs to the cache kmalloc-64 of size 64 [ 34.035934] The buggy address is located 0 bytes to the right of [ 34.035934] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.036190] [ 34.036251] The buggy address belongs to the physical page: [ 34.036492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.036962] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.037800] page_type: f5(slab) [ 34.037924] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.038078] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.038508] page dumped because: kasan: bad access detected [ 34.038589] [ 34.038644] Memory state around the buggy address: [ 34.038743] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.038857] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.038989] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.039077] ^ [ 34.039157] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.039250] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.039361] ================================================================== [ 34.057646] ================================================================== [ 34.058461] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 34.058766] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.058982] [ 34.059082] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.059602] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.059824] Hardware name: linux,dummy-virt (DT) [ 34.060030] Call trace: [ 34.060244] show_stack+0x20/0x38 (C) [ 34.060504] dump_stack_lvl+0x8c/0xd0 [ 34.060933] print_report+0x118/0x608 [ 34.061214] kasan_report+0xdc/0x128 [ 34.061382] __asan_report_store8_noabort+0x20/0x30 [ 34.061767] kasan_atomics_helper+0x3e5c/0x4858 [ 34.062092] kasan_atomics+0x198/0x2e0 [ 34.062168] kunit_try_run_case+0x170/0x3f0 [ 34.062228] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.062293] kthread+0x328/0x630 [ 34.062346] ret_from_fork+0x10/0x20 [ 34.062407] [ 34.062431] Allocated by task 276: [ 34.062470] kasan_save_stack+0x3c/0x68 [ 34.062525] kasan_save_track+0x20/0x40 [ 34.062571] kasan_save_alloc_info+0x40/0x58 [ 34.062618] __kasan_kmalloc+0xd4/0xd8 [ 34.062662] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.062709] kasan_atomics+0xb8/0x2e0 [ 34.062751] kunit_try_run_case+0x170/0x3f0 [ 34.062794] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.062845] kthread+0x328/0x630 [ 34.062914] ret_from_fork+0x10/0x20 [ 34.063543] [ 34.063647] The buggy address belongs to the object at fff00000c76a3180 [ 34.063647] which belongs to the cache kmalloc-64 of size 64 [ 34.064106] The buggy address is located 0 bytes to the right of [ 34.064106] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.064578] [ 34.064686] The buggy address belongs to the physical page: [ 34.064904] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.065034] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.065553] page_type: f5(slab) [ 34.065841] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.065992] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.066105] page dumped because: kasan: bad access detected [ 34.066535] [ 34.066593] Memory state around the buggy address: [ 34.066853] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.067107] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.067450] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.067773] ^ [ 34.068099] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.068350] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.068462] ================================================================== [ 34.289220] ================================================================== [ 34.289566] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 34.289786] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.290081] [ 34.290390] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.290646] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.290718] Hardware name: linux,dummy-virt (DT) [ 34.290802] Call trace: [ 34.290892] show_stack+0x20/0x38 (C) [ 34.291330] dump_stack_lvl+0x8c/0xd0 [ 34.291539] print_report+0x118/0x608 [ 34.291703] kasan_report+0xdc/0x128 [ 34.291895] kasan_check_range+0x100/0x1a8 [ 34.292015] __kasan_check_write+0x20/0x30 [ 34.292111] kasan_atomics_helper+0x1644/0x4858 [ 34.292254] kasan_atomics+0x198/0x2e0 [ 34.292385] kunit_try_run_case+0x170/0x3f0 [ 34.292524] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.292644] kthread+0x328/0x630 [ 34.292751] ret_from_fork+0x10/0x20 [ 34.292894] [ 34.292951] Allocated by task 276: [ 34.293034] kasan_save_stack+0x3c/0x68 [ 34.293133] kasan_save_track+0x20/0x40 [ 34.293251] kasan_save_alloc_info+0x40/0x58 [ 34.293386] __kasan_kmalloc+0xd4/0xd8 [ 34.293544] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.293649] kasan_atomics+0xb8/0x2e0 [ 34.293732] kunit_try_run_case+0x170/0x3f0 [ 34.293832] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.293984] kthread+0x328/0x630 [ 34.294078] ret_from_fork+0x10/0x20 [ 34.294208] [ 34.294259] The buggy address belongs to the object at fff00000c76a3180 [ 34.294259] which belongs to the cache kmalloc-64 of size 64 [ 34.294449] The buggy address is located 0 bytes to the right of [ 34.294449] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.294624] [ 34.294708] The buggy address belongs to the physical page: [ 34.294784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.294937] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.295072] page_type: f5(slab) [ 34.295161] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.295305] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.295412] page dumped because: kasan: bad access detected [ 34.295496] [ 34.295547] Memory state around the buggy address: [ 34.295632] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.295750] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.295929] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.296084] ^ [ 34.296217] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.296381] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.296531] ================================================================== [ 33.886996] ================================================================== [ 33.887118] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 33.887243] Write of size 4 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 33.887380] [ 33.887506] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 33.888392] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.888568] Hardware name: linux,dummy-virt (DT) [ 33.888657] Call trace: [ 33.888712] show_stack+0x20/0x38 (C) [ 33.888846] dump_stack_lvl+0x8c/0xd0 [ 33.888985] print_report+0x118/0x608 [ 33.889107] kasan_report+0xdc/0x128 [ 33.889227] kasan_check_range+0x100/0x1a8 [ 33.889355] __kasan_check_write+0x20/0x30 [ 33.889927] kasan_atomics_helper+0xa04/0x4858 [ 33.890620] kasan_atomics+0x198/0x2e0 [ 33.890795] kunit_try_run_case+0x170/0x3f0 [ 33.891207] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.891593] kthread+0x328/0x630 [ 33.891724] ret_from_fork+0x10/0x20 [ 33.891976] [ 33.892038] Allocated by task 276: [ 33.892242] kasan_save_stack+0x3c/0x68 [ 33.892793] kasan_save_track+0x20/0x40 [ 33.892946] kasan_save_alloc_info+0x40/0x58 [ 33.893158] __kasan_kmalloc+0xd4/0xd8 [ 33.893266] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.893828] kasan_atomics+0xb8/0x2e0 [ 33.893954] kunit_try_run_case+0x170/0x3f0 [ 33.894367] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.894490] kthread+0x328/0x630 [ 33.894568] ret_from_fork+0x10/0x20 [ 33.894649] [ 33.894706] The buggy address belongs to the object at fff00000c76a3180 [ 33.894706] which belongs to the cache kmalloc-64 of size 64 [ 33.895725] The buggy address is located 0 bytes to the right of [ 33.895725] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 33.896013] [ 33.896163] The buggy address belongs to the physical page: [ 33.896283] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 33.896460] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.896648] page_type: f5(slab) [ 33.896821] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.897204] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.897533] page dumped because: kasan: bad access detected [ 33.897630] [ 33.897677] Memory state around the buggy address: [ 33.897751] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.897855] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.898434] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.899029] ^ [ 33.899155] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.899682] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.900164] ================================================================== [ 34.268958] ================================================================== [ 34.269092] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 34.269224] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.269358] [ 34.269462] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.269694] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.269765] Hardware name: linux,dummy-virt (DT) [ 34.269850] Call trace: [ 34.272628] show_stack+0x20/0x38 (C) [ 34.272792] dump_stack_lvl+0x8c/0xd0 [ 34.273028] print_report+0x118/0x608 [ 34.273157] kasan_report+0xdc/0x128 [ 34.273365] kasan_check_range+0x100/0x1a8 [ 34.273655] __kasan_check_write+0x20/0x30 [ 34.273866] kasan_atomics_helper+0x15b4/0x4858 [ 34.274198] kasan_atomics+0x198/0x2e0 [ 34.274364] kunit_try_run_case+0x170/0x3f0 [ 34.274472] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.274587] kthread+0x328/0x630 [ 34.274674] ret_from_fork+0x10/0x20 [ 34.274798] [ 34.275299] Allocated by task 276: [ 34.275382] kasan_save_stack+0x3c/0x68 [ 34.275486] kasan_save_track+0x20/0x40 [ 34.275570] kasan_save_alloc_info+0x40/0x58 [ 34.275668] __kasan_kmalloc+0xd4/0xd8 [ 34.275761] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.276316] kasan_atomics+0xb8/0x2e0 [ 34.276436] kunit_try_run_case+0x170/0x3f0 [ 34.276538] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.277129] kthread+0x328/0x630 [ 34.277754] ret_from_fork+0x10/0x20 [ 34.277868] [ 34.277967] The buggy address belongs to the object at fff00000c76a3180 [ 34.277967] which belongs to the cache kmalloc-64 of size 64 [ 34.278113] The buggy address is located 0 bytes to the right of [ 34.278113] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.278383] [ 34.278713] The buggy address belongs to the physical page: [ 34.278843] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.279084] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.279222] page_type: f5(slab) [ 34.279326] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.279453] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.279582] page dumped because: kasan: bad access detected [ 34.279702] [ 34.279783] Memory state around the buggy address: [ 34.279909] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.280014] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.280124] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.280228] ^ [ 34.280319] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.280426] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.280521] ================================================================== [ 34.021554] ================================================================== [ 34.021680] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 34.022138] Read of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.022327] [ 34.022419] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.022635] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.022709] Hardware name: linux,dummy-virt (DT) [ 34.022988] Call trace: [ 34.023059] show_stack+0x20/0x38 (C) [ 34.023237] dump_stack_lvl+0x8c/0xd0 [ 34.023404] print_report+0x118/0x608 [ 34.023581] kasan_report+0xdc/0x128 [ 34.023754] kasan_check_range+0x100/0x1a8 [ 34.023955] __kasan_check_read+0x20/0x30 [ 34.024141] kasan_atomics_helper+0xdd4/0x4858 [ 34.024318] kasan_atomics+0x198/0x2e0 [ 34.024488] kunit_try_run_case+0x170/0x3f0 [ 34.024628] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.024789] kthread+0x328/0x630 [ 34.024915] ret_from_fork+0x10/0x20 [ 34.025048] [ 34.025125] Allocated by task 276: [ 34.025232] kasan_save_stack+0x3c/0x68 [ 34.025384] kasan_save_track+0x20/0x40 [ 34.025525] kasan_save_alloc_info+0x40/0x58 [ 34.025627] __kasan_kmalloc+0xd4/0xd8 [ 34.025723] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.025831] kasan_atomics+0xb8/0x2e0 [ 34.026384] kunit_try_run_case+0x170/0x3f0 [ 34.027197] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.027359] kthread+0x328/0x630 [ 34.027451] ret_from_fork+0x10/0x20 [ 34.027548] [ 34.027630] The buggy address belongs to the object at fff00000c76a3180 [ 34.027630] which belongs to the cache kmalloc-64 of size 64 [ 34.027768] The buggy address is located 0 bytes to the right of [ 34.027768] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.028206] [ 34.028301] The buggy address belongs to the physical page: [ 34.028425] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.028582] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.028723] page_type: f5(slab) [ 34.028886] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.029027] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.029134] page dumped because: kasan: bad access detected [ 34.029219] [ 34.029268] Memory state around the buggy address: [ 34.029358] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.029509] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.029622] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.029732] ^ [ 34.030375] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.030509] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.030918] ================================================================== [ 34.142751] ================================================================== [ 34.143235] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 34.143692] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.143827] [ 34.143928] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.144151] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.144227] Hardware name: linux,dummy-virt (DT) [ 34.144312] Call trace: [ 34.144368] show_stack+0x20/0x38 (C) [ 34.144491] dump_stack_lvl+0x8c/0xd0 [ 34.144620] print_report+0x118/0x608 [ 34.144739] kasan_report+0xdc/0x128 [ 34.144859] kasan_check_range+0x100/0x1a8 [ 34.146185] __kasan_check_write+0x20/0x30 [ 34.146502] kasan_atomics_helper+0x1128/0x4858 [ 34.146721] kasan_atomics+0x198/0x2e0 [ 34.146868] kunit_try_run_case+0x170/0x3f0 [ 34.147013] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.147239] kthread+0x328/0x630 [ 34.147421] ret_from_fork+0x10/0x20 [ 34.147617] [ 34.147673] Allocated by task 276: [ 34.147767] kasan_save_stack+0x3c/0x68 [ 34.147889] kasan_save_track+0x20/0x40 [ 34.147992] kasan_save_alloc_info+0x40/0x58 [ 34.148092] __kasan_kmalloc+0xd4/0xd8 [ 34.148206] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.148320] kasan_atomics+0xb8/0x2e0 [ 34.148416] kunit_try_run_case+0x170/0x3f0 [ 34.148512] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.148628] kthread+0x328/0x630 [ 34.148715] ret_from_fork+0x10/0x20 [ 34.148842] [ 34.149187] The buggy address belongs to the object at fff00000c76a3180 [ 34.149187] which belongs to the cache kmalloc-64 of size 64 [ 34.149359] The buggy address is located 0 bytes to the right of [ 34.149359] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.149523] [ 34.150421] The buggy address belongs to the physical page: [ 34.150554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.150694] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.151052] page_type: f5(slab) [ 34.151160] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.151308] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.151433] page dumped because: kasan: bad access detected [ 34.151570] [ 34.151659] Memory state around the buggy address: [ 34.151932] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.152079] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.152296] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.152497] ^ [ 34.152651] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.152929] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.153040] ================================================================== [ 34.234833] ================================================================== [ 34.234986] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 34.235555] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.236190] [ 34.236356] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.236677] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.236778] Hardware name: linux,dummy-virt (DT) [ 34.236913] Call trace: [ 34.237003] show_stack+0x20/0x38 (C) [ 34.237190] dump_stack_lvl+0x8c/0xd0 [ 34.237342] print_report+0x118/0x608 [ 34.237512] kasan_report+0xdc/0x128 [ 34.237628] kasan_check_range+0x100/0x1a8 [ 34.237939] __kasan_check_write+0x20/0x30 [ 34.238294] kasan_atomics_helper+0x147c/0x4858 [ 34.238458] kasan_atomics+0x198/0x2e0 [ 34.238588] kunit_try_run_case+0x170/0x3f0 [ 34.238713] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.239104] kthread+0x328/0x630 [ 34.239226] ret_from_fork+0x10/0x20 [ 34.239370] [ 34.239449] Allocated by task 276: [ 34.239757] kasan_save_stack+0x3c/0x68 [ 34.239900] kasan_save_track+0x20/0x40 [ 34.240315] kasan_save_alloc_info+0x40/0x58 [ 34.240552] __kasan_kmalloc+0xd4/0xd8 [ 34.240699] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.240848] kasan_atomics+0xb8/0x2e0 [ 34.240967] kunit_try_run_case+0x170/0x3f0 [ 34.241065] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.241200] kthread+0x328/0x630 [ 34.241295] ret_from_fork+0x10/0x20 [ 34.241461] [ 34.241515] The buggy address belongs to the object at fff00000c76a3180 [ 34.241515] which belongs to the cache kmalloc-64 of size 64 [ 34.241670] The buggy address is located 0 bytes to the right of [ 34.241670] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.242186] [ 34.242335] The buggy address belongs to the physical page: [ 34.242480] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.242754] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.243329] page_type: f5(slab) [ 34.243461] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.243600] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.243715] page dumped because: kasan: bad access detected [ 34.243799] [ 34.243886] Memory state around the buggy address: [ 34.243967] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.244117] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.244231] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.244585] ^ [ 34.244727] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.244918] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.245029] ================================================================== [ 34.359109] ================================================================== [ 34.359243] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 34.359768] Read of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.359911] [ 34.360003] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.360213] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.360280] Hardware name: linux,dummy-virt (DT) [ 34.360359] Call trace: [ 34.360418] show_stack+0x20/0x38 (C) [ 34.360540] dump_stack_lvl+0x8c/0xd0 [ 34.361315] print_report+0x118/0x608 [ 34.361579] kasan_report+0xdc/0x128 [ 34.361789] __asan_report_load8_noabort+0x20/0x30 [ 34.362184] kasan_atomics_helper+0x3e20/0x4858 [ 34.362429] kasan_atomics+0x198/0x2e0 [ 34.362554] kunit_try_run_case+0x170/0x3f0 [ 34.363324] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.363639] kthread+0x328/0x630 [ 34.363779] ret_from_fork+0x10/0x20 [ 34.364004] [ 34.364059] Allocated by task 276: [ 34.364227] kasan_save_stack+0x3c/0x68 [ 34.364576] kasan_save_track+0x20/0x40 [ 34.364928] kasan_save_alloc_info+0x40/0x58 [ 34.365043] __kasan_kmalloc+0xd4/0xd8 [ 34.365559] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.365694] kasan_atomics+0xb8/0x2e0 [ 34.365778] kunit_try_run_case+0x170/0x3f0 [ 34.365861] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.365977] kthread+0x328/0x630 [ 34.366522] ret_from_fork+0x10/0x20 [ 34.366651] [ 34.367107] The buggy address belongs to the object at fff00000c76a3180 [ 34.367107] which belongs to the cache kmalloc-64 of size 64 [ 34.367296] The buggy address is located 0 bytes to the right of [ 34.367296] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.368033] [ 34.368103] The buggy address belongs to the physical page: [ 34.368204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.368348] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.368808] page_type: f5(slab) [ 34.368952] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.369694] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.369825] page dumped because: kasan: bad access detected [ 34.369916] [ 34.369969] Memory state around the buggy address: [ 34.370149] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.370269] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.370384] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.370509] ^ [ 34.370606] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.370735] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.370845] ================================================================== [ 34.070170] ================================================================== [ 34.070597] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 34.070794] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.070959] [ 34.071045] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.071253] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.071363] Hardware name: linux,dummy-virt (DT) [ 34.071498] Call trace: [ 34.071566] show_stack+0x20/0x38 (C) [ 34.071697] dump_stack_lvl+0x8c/0xd0 [ 34.071822] print_report+0x118/0x608 [ 34.071946] kasan_report+0xdc/0x128 [ 34.072063] kasan_check_range+0x100/0x1a8 [ 34.072188] __kasan_check_write+0x20/0x30 [ 34.072303] kasan_atomics_helper+0xeb8/0x4858 [ 34.072436] kasan_atomics+0x198/0x2e0 [ 34.072557] kunit_try_run_case+0x170/0x3f0 [ 34.072679] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.072817] kthread+0x328/0x630 [ 34.072948] ret_from_fork+0x10/0x20 [ 34.073077] [ 34.073134] Allocated by task 276: [ 34.073212] kasan_save_stack+0x3c/0x68 [ 34.073321] kasan_save_track+0x20/0x40 [ 34.073727] kasan_save_alloc_info+0x40/0x58 [ 34.074346] __kasan_kmalloc+0xd4/0xd8 [ 34.074732] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.074833] kasan_atomics+0xb8/0x2e0 [ 34.074952] kunit_try_run_case+0x170/0x3f0 [ 34.075077] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.075245] kthread+0x328/0x630 [ 34.075371] ret_from_fork+0x10/0x20 [ 34.075509] [ 34.075809] The buggy address belongs to the object at fff00000c76a3180 [ 34.075809] which belongs to the cache kmalloc-64 of size 64 [ 34.075970] The buggy address is located 0 bytes to the right of [ 34.075970] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.076312] [ 34.076425] The buggy address belongs to the physical page: [ 34.076527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.076924] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.077070] page_type: f5(slab) [ 34.077310] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.077648] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.077764] page dumped because: kasan: bad access detected [ 34.077945] [ 34.078105] Memory state around the buggy address: [ 34.078323] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.078464] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.078560] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.078654] ^ [ 34.078745] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.079139] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.079354] ================================================================== [ 33.934809] ================================================================== [ 33.934967] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 33.935110] Read of size 4 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 33.936268] [ 33.936367] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 33.937307] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.937520] Hardware name: linux,dummy-virt (DT) [ 33.937608] Call trace: [ 33.937674] show_stack+0x20/0x38 (C) [ 33.937809] dump_stack_lvl+0x8c/0xd0 [ 33.940009] kasan_atomics+0x198/0x2e0 [ 33.942336] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.942889] ret_from_fork+0x10/0x20 [ 33.943670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 33.943858] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.943986] page_type: f5(slab) [ 33.944208] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.944797] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.945011] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.948274] kunit_try_run_case+0x170/0x3f0 [ 33.950540] The buggy address belongs to the physical page: [ 33.950755] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.950917] page_type: f5(slab) [ 33.951297] page dumped because: kasan: bad access detected [ 33.952049] ^ [ 33.952140] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.952318] ================================================================== [ 34.246294] ================================================================== [ 34.246420] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 34.246547] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.246730] [ 34.246819] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.247121] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.247210] Hardware name: linux,dummy-virt (DT) [ 34.247287] Call trace: [ 34.247349] show_stack+0x20/0x38 (C) [ 34.247770] dump_stack_lvl+0x8c/0xd0 [ 34.247957] print_report+0x118/0x608 [ 34.248090] kasan_report+0xdc/0x128 [ 34.248211] kasan_check_range+0x100/0x1a8 [ 34.248335] __kasan_check_write+0x20/0x30 [ 34.248449] kasan_atomics_helper+0x14e4/0x4858 [ 34.248589] kasan_atomics+0x198/0x2e0 [ 34.248710] kunit_try_run_case+0x170/0x3f0 [ 34.249088] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.249247] kthread+0x328/0x630 [ 34.249453] ret_from_fork+0x10/0x20 [ 34.249578] [ 34.249629] Allocated by task 276: [ 34.249998] kasan_save_stack+0x3c/0x68 [ 34.250165] kasan_save_track+0x20/0x40 [ 34.250307] kasan_save_alloc_info+0x40/0x58 [ 34.250413] __kasan_kmalloc+0xd4/0xd8 [ 34.250493] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.250600] kasan_atomics+0xb8/0x2e0 [ 34.250691] kunit_try_run_case+0x170/0x3f0 [ 34.250993] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.251120] kthread+0x328/0x630 [ 34.251233] ret_from_fork+0x10/0x20 [ 34.251465] [ 34.251559] The buggy address belongs to the object at fff00000c76a3180 [ 34.251559] which belongs to the cache kmalloc-64 of size 64 [ 34.251788] The buggy address is located 0 bytes to the right of [ 34.251788] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.252021] [ 34.252086] The buggy address belongs to the physical page: [ 34.252172] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.252307] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.252443] page_type: f5(slab) [ 34.252551] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.252744] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.252902] page dumped because: kasan: bad access detected [ 34.252978] [ 34.253032] Memory state around the buggy address: [ 34.253112] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.253239] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.253723] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.253906] ^ [ 34.254136] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.254323] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.254665] ================================================================== [ 34.375374] ================================================================== [ 34.375511] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 34.375892] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.376132] [ 34.376748] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.377005] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.377257] Hardware name: linux,dummy-virt (DT) [ 34.377352] Call trace: [ 34.377587] show_stack+0x20/0x38 (C) [ 34.377833] dump_stack_lvl+0x8c/0xd0 [ 34.378458] print_report+0x118/0x608 [ 34.378601] kasan_report+0xdc/0x128 [ 34.378994] kasan_check_range+0x100/0x1a8 [ 34.379297] __kasan_check_write+0x20/0x30 [ 34.379819] kasan_atomics_helper+0x17ec/0x4858 [ 34.380215] kasan_atomics+0x198/0x2e0 [ 34.380570] kunit_try_run_case+0x170/0x3f0 [ 34.381067] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.381341] kthread+0x328/0x630 [ 34.381523] ret_from_fork+0x10/0x20 [ 34.381718] [ 34.381788] Allocated by task 276: [ 34.381937] kasan_save_stack+0x3c/0x68 [ 34.382098] kasan_save_track+0x20/0x40 [ 34.382371] kasan_save_alloc_info+0x40/0x58 [ 34.382489] __kasan_kmalloc+0xd4/0xd8 [ 34.382633] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.382741] kasan_atomics+0xb8/0x2e0 [ 34.382839] kunit_try_run_case+0x170/0x3f0 [ 34.383518] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.383987] kthread+0x328/0x630 [ 34.384115] ret_from_fork+0x10/0x20 [ 34.384268] [ 34.384341] The buggy address belongs to the object at fff00000c76a3180 [ 34.384341] which belongs to the cache kmalloc-64 of size 64 [ 34.384898] The buggy address is located 0 bytes to the right of [ 34.384898] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.385063] [ 34.385145] The buggy address belongs to the physical page: [ 34.385449] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.386002] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.386134] page_type: f5(slab) [ 34.386763] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.386930] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.387406] page dumped because: kasan: bad access detected [ 34.387500] [ 34.387557] Memory state around the buggy address: [ 34.387870] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.388354] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.388946] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.389068] ^ [ 34.389178] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.389359] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.389703] ================================================================== [ 34.111973] ================================================================== [ 34.112127] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 34.112364] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.112667] [ 34.112949] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.113390] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.113644] Hardware name: linux,dummy-virt (DT) [ 34.113747] Call trace: [ 34.113814] show_stack+0x20/0x38 (C) [ 34.114235] dump_stack_lvl+0x8c/0xd0 [ 34.114687] print_report+0x118/0x608 [ 34.114926] kasan_report+0xdc/0x128 [ 34.115048] kasan_check_range+0x100/0x1a8 [ 34.115147] __kasan_check_write+0x20/0x30 [ 34.115521] kasan_atomics_helper+0x1058/0x4858 [ 34.116038] kasan_atomics+0x198/0x2e0 [ 34.116545] kunit_try_run_case+0x170/0x3f0 [ 34.116761] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.117123] kthread+0x328/0x630 [ 34.117241] ret_from_fork+0x10/0x20 [ 34.117367] [ 34.117417] Allocated by task 276: [ 34.117491] kasan_save_stack+0x3c/0x68 [ 34.117906] kasan_save_track+0x20/0x40 [ 34.118163] kasan_save_alloc_info+0x40/0x58 [ 34.118492] __kasan_kmalloc+0xd4/0xd8 [ 34.118841] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.119093] kasan_atomics+0xb8/0x2e0 [ 34.119195] kunit_try_run_case+0x170/0x3f0 [ 34.119299] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.119778] kthread+0x328/0x630 [ 34.120084] ret_from_fork+0x10/0x20 [ 34.120325] [ 34.120494] The buggy address belongs to the object at fff00000c76a3180 [ 34.120494] which belongs to the cache kmalloc-64 of size 64 [ 34.120913] The buggy address is located 0 bytes to the right of [ 34.120913] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.121243] [ 34.121567] The buggy address belongs to the physical page: [ 34.121674] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.121826] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.121967] page_type: f5(slab) [ 34.122255] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.122830] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.123002] page dumped because: kasan: bad access detected [ 34.123099] [ 34.123159] Memory state around the buggy address: [ 34.123251] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.123370] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.123486] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.123590] ^ [ 34.123678] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.123788] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.123901] ================================================================== [ 34.001243] ================================================================== [ 34.001372] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 34.001544] Write of size 4 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.001677] [ 34.002121] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.002438] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.002731] Hardware name: linux,dummy-virt (DT) [ 34.002953] Call trace: [ 34.003030] show_stack+0x20/0x38 (C) [ 34.003163] dump_stack_lvl+0x8c/0xd0 [ 34.003515] print_report+0x118/0x608 [ 34.003937] kasan_report+0xdc/0x128 [ 34.004462] kasan_check_range+0x100/0x1a8 [ 34.004624] __kasan_check_write+0x20/0x30 [ 34.004744] kasan_atomics_helper+0xd3c/0x4858 [ 34.004889] kasan_atomics+0x198/0x2e0 [ 34.005081] kunit_try_run_case+0x170/0x3f0 [ 34.005270] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.005451] kthread+0x328/0x630 [ 34.005556] ret_from_fork+0x10/0x20 [ 34.005682] [ 34.005743] Allocated by task 276: [ 34.005927] kasan_save_stack+0x3c/0x68 [ 34.006305] kasan_save_track+0x20/0x40 [ 34.006507] kasan_save_alloc_info+0x40/0x58 [ 34.006608] __kasan_kmalloc+0xd4/0xd8 [ 34.006712] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.006802] kasan_atomics+0xb8/0x2e0 [ 34.006909] kunit_try_run_case+0x170/0x3f0 [ 34.007252] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.007381] kthread+0x328/0x630 [ 34.007469] ret_from_fork+0x10/0x20 [ 34.007559] [ 34.007617] The buggy address belongs to the object at fff00000c76a3180 [ 34.007617] which belongs to the cache kmalloc-64 of size 64 [ 34.007773] The buggy address is located 0 bytes to the right of [ 34.007773] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.007955] [ 34.008024] The buggy address belongs to the physical page: [ 34.008111] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.008573] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.008773] page_type: f5(slab) [ 34.008935] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.009132] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.009260] page dumped because: kasan: bad access detected [ 34.009347] [ 34.009395] Memory state around the buggy address: [ 34.009505] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.009615] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.009961] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.010067] ^ [ 34.010160] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.010278] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.010379] ================================================================== [ 34.197379] ================================================================== [ 34.197851] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 34.198185] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.198329] [ 34.198411] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.198964] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.199050] Hardware name: linux,dummy-virt (DT) [ 34.199304] Call trace: [ 34.199635] show_stack+0x20/0x38 (C) [ 34.200031] dump_stack_lvl+0x8c/0xd0 [ 34.200275] print_report+0x118/0x608 [ 34.200472] kasan_report+0xdc/0x128 [ 34.200587] kasan_check_range+0x100/0x1a8 [ 34.201012] __kasan_check_write+0x20/0x30 [ 34.201791] kasan_atomics_helper+0x1384/0x4858 [ 34.201930] kasan_atomics+0x198/0x2e0 [ 34.202067] kunit_try_run_case+0x170/0x3f0 [ 34.202178] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.202316] kthread+0x328/0x630 [ 34.202440] ret_from_fork+0x10/0x20 [ 34.202578] [ 34.202633] Allocated by task 276: [ 34.202708] kasan_save_stack+0x3c/0x68 [ 34.203199] kasan_save_track+0x20/0x40 [ 34.203718] kasan_save_alloc_info+0x40/0x58 [ 34.203983] __kasan_kmalloc+0xd4/0xd8 [ 34.204087] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.204184] kasan_atomics+0xb8/0x2e0 [ 34.204556] kunit_try_run_case+0x170/0x3f0 [ 34.204684] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.204817] kthread+0x328/0x630 [ 34.204915] ret_from_fork+0x10/0x20 [ 34.205015] [ 34.205285] The buggy address belongs to the object at fff00000c76a3180 [ 34.205285] which belongs to the cache kmalloc-64 of size 64 [ 34.205672] The buggy address is located 0 bytes to the right of [ 34.205672] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.205837] [ 34.205905] The buggy address belongs to the physical page: [ 34.205991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.206182] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.206382] page_type: f5(slab) [ 34.206507] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.207268] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.207524] page dumped because: kasan: bad access detected [ 34.207720] [ 34.207976] Memory state around the buggy address: [ 34.208165] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.208550] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.208838] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.208982] ^ [ 34.209159] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.209437] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.209531] ================================================================== [ 34.153900] ================================================================== [ 34.154021] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 34.154199] Write of size 8 at addr fff00000c76a31b0 by task kunit_try_catch/276 [ 34.154372] [ 34.154502] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 34.154808] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.155465] Hardware name: linux,dummy-virt (DT) [ 34.155671] Call trace: [ 34.155728] show_stack+0x20/0x38 (C) [ 34.155842] dump_stack_lvl+0x8c/0xd0 [ 34.156007] print_report+0x118/0x608 [ 34.156345] kasan_report+0xdc/0x128 [ 34.156465] kasan_check_range+0x100/0x1a8 [ 34.156631] __kasan_check_write+0x20/0x30 [ 34.156852] kasan_atomics_helper+0x1190/0x4858 [ 34.157375] kasan_atomics+0x198/0x2e0 [ 34.157536] kunit_try_run_case+0x170/0x3f0 [ 34.157671] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.157894] kthread+0x328/0x630 [ 34.158111] ret_from_fork+0x10/0x20 [ 34.158494] [ 34.158598] Allocated by task 276: [ 34.158668] kasan_save_stack+0x3c/0x68 [ 34.158757] kasan_save_track+0x20/0x40 [ 34.159028] kasan_save_alloc_info+0x40/0x58 [ 34.159149] __kasan_kmalloc+0xd4/0xd8 [ 34.159403] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.159623] kasan_atomics+0xb8/0x2e0 [ 34.159735] kunit_try_run_case+0x170/0x3f0 [ 34.160087] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.160373] kthread+0x328/0x630 [ 34.160462] ret_from_fork+0x10/0x20 [ 34.160552] [ 34.160610] The buggy address belongs to the object at fff00000c76a3180 [ 34.160610] which belongs to the cache kmalloc-64 of size 64 [ 34.161010] The buggy address is located 0 bytes to the right of [ 34.161010] allocated 48-byte region [fff00000c76a3180, fff00000c76a31b0) [ 34.161229] [ 34.161381] The buggy address belongs to the physical page: [ 34.161698] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076a3 [ 34.161943] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.162088] page_type: f5(slab) [ 34.162189] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.162293] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.162609] page dumped because: kasan: bad access detected [ 34.162818] [ 34.162905] Memory state around the buggy address: [ 34.163117] fff00000c76a3080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.163514] fff00000c76a3100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.163715] >fff00000c76a3180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.163822] ^ [ 34.163917] fff00000c76a3200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.164020] fff00000c76a3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.164125] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen
[ 33.371428] ================================================================== [ 33.371566] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88 [ 33.371693] Read of size 1 at addr fff00000c76d03d0 by task kunit_try_catch/270 [ 33.371823] [ 33.371961] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 33.372162] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.372230] Hardware name: linux,dummy-virt (DT) [ 33.372316] Call trace: [ 33.372414] show_stack+0x20/0x38 (C) [ 33.372596] dump_stack_lvl+0x8c/0xd0 [ 33.372768] print_report+0x118/0x608 [ 33.372923] kasan_report+0xdc/0x128 [ 33.373046] __asan_report_load1_noabort+0x20/0x30 [ 33.373172] strnlen+0x80/0x88 [ 33.373277] kasan_strings+0x478/0xb00 [ 33.373396] kunit_try_run_case+0x170/0x3f0 [ 33.373585] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.373906] kthread+0x328/0x630 [ 33.374025] ret_from_fork+0x10/0x20 [ 33.374151] [ 33.374194] Allocated by task 270: [ 33.374258] kasan_save_stack+0x3c/0x68 [ 33.374383] kasan_save_track+0x20/0x40 [ 33.374454] kasan_save_alloc_info+0x40/0x58 [ 33.374538] __kasan_kmalloc+0xd4/0xd8 [ 33.374629] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.374774] kasan_strings+0xc8/0xb00 [ 33.374932] kunit_try_run_case+0x170/0x3f0 [ 33.375095] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.375772] kthread+0x328/0x630 [ 33.376131] Freed by task 270: [ 33.376528] __kasan_slab_free+0x6c/0x98 [ 33.377163] ret_from_fork+0x10/0x20 [ 33.377560] The buggy address is located 16 bytes inside of [ 33.377560] freed 32-byte region [fff00000c76d03c0, fff00000c76d03e0) [ 33.378028] page_type: f5(slab) [ 33.378077] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 33.378223] [ 33.378385] >fff00000c76d0380: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 33.387372] not ok 62 kasan_strings [ 33.395957] Write of size 8 at addr fff00000c6135568 by task kunit_try_catch/272 [ 33.397932] print_report+0x118/0x608 [ 33.399071] kthread+0x328/0x630 [ 33.399742] [ 33.399796] Allocated by task 272: [ 33.399881] kasan_save_stack+0x3c/0x68 [ 33.399998] kasan_save_track+0x20/0x40 [ 33.400109] kasan_save_alloc_info+0x40/0x58 [ 33.400349] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.401499] The buggy address belongs to the object at fff00000c6135560 [ 33.401499] which belongs to the cache kmalloc-16 of size 16 [ 33.402456] The buggy address belongs to the physical page: [ 33.404255] raw: fff00000c6135540 000000008080007f 00000000f5000000 0000000000000000 [ 33.405273] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen
[ 33.358722] ================================================================== [ 33.358847] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0 [ 33.359001] Read of size 1 at addr fff00000c76d03d0 by task kunit_try_catch/270 [ 33.359151] [ 33.359308] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 33.359589] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.359680] Hardware name: linux,dummy-virt (DT) [ 33.359777] Call trace: [ 33.359841] show_stack+0x20/0x38 (C) [ 33.359994] dump_stack_lvl+0x8c/0xd0 [ 33.360121] print_report+0x118/0x608 [ 33.360249] kasan_report+0xdc/0x128 [ 33.360371] __asan_report_load1_noabort+0x20/0x30 [ 33.360509] strlen+0xa8/0xb0 [ 33.360620] kasan_strings+0x418/0xb00 [ 33.360744] kunit_try_run_case+0x170/0x3f0 [ 33.360881] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.361033] kthread+0x328/0x630 [ 33.361148] ret_from_fork+0x10/0x20 [ 33.361280] [ 33.362002] Allocated by task 270: [ 33.362097] kasan_save_stack+0x3c/0x68 [ 33.362204] kasan_save_track+0x20/0x40 [ 33.362581] kasan_save_alloc_info+0x40/0x58 [ 33.362680] __kasan_kmalloc+0xd4/0xd8 [ 33.362755] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.362847] kasan_strings+0xc8/0xb00 [ 33.363557] kunit_try_run_case+0x170/0x3f0 [ 33.363701] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.363879] kthread+0x328/0x630 [ 33.363988] ret_from_fork+0x10/0x20 [ 33.364101] [ 33.364177] Freed by task 270: [ 33.364301] kasan_save_stack+0x3c/0x68 [ 33.364469] kasan_save_track+0x20/0x40 [ 33.364577] kasan_save_free_info+0x4c/0x78 [ 33.364710] __kasan_slab_free+0x6c/0x98 [ 33.364897] kfree+0x214/0x3c8 [ 33.365036] kasan_strings+0x24c/0xb00 [ 33.365130] kunit_try_run_case+0x170/0x3f0 [ 33.365665] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.365810] kthread+0x328/0x630 [ 33.365912] ret_from_fork+0x10/0x20 [ 33.365998] [ 33.366042] The buggy address belongs to the object at fff00000c76d03c0 [ 33.366042] which belongs to the cache kmalloc-32 of size 32 [ 33.366177] The buggy address is located 16 bytes inside of [ 33.366177] freed 32-byte region [fff00000c76d03c0, fff00000c76d03e0) [ 33.366709] [ 33.366898] The buggy address belongs to the physical page: [ 33.367114] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076d0 [ 33.367528] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.367766] page_type: f5(slab) [ 33.368067] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 33.368358] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 33.368489] page dumped because: kasan: bad access detected [ 33.368581] [ 33.368838] Memory state around the buggy address: [ 33.369323] fff00000c76d0280: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 33.369574] fff00000c76d0300: 00 00 00 04 fc fc fc fc 00 00 07 fc fc fc fc fc [ 33.369688] >fff00000c76d0380: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 33.369802] ^ [ 33.369910] fff00000c76d0400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 33.370024] fff00000c76d0480: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 33.370169] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[ 33.350506] ================================================================== [ 33.350641] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00 [ 33.350769] Read of size 1 at addr fff00000c76d03d0 by task kunit_try_catch/270 [ 33.350914] [ 33.351025] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 33.351260] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.351330] Hardware name: linux,dummy-virt (DT) [ 33.351414] Call trace: [ 33.351475] show_stack+0x20/0x38 (C) [ 33.351601] dump_stack_lvl+0x8c/0xd0 [ 33.351724] print_report+0x118/0x608 [ 33.351842] kasan_report+0xdc/0x128 [ 33.352013] __asan_report_load1_noabort+0x20/0x30 [ 33.352193] kasan_strings+0x95c/0xb00 [ 33.352357] kunit_try_run_case+0x170/0x3f0 [ 33.352524] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.352707] kthread+0x328/0x630 [ 33.352856] ret_from_fork+0x10/0x20 [ 33.353035] [ 33.353103] Allocated by task 270: [ 33.353174] kasan_save_stack+0x3c/0x68 [ 33.353323] kasan_save_track+0x20/0x40 [ 33.353418] kasan_save_alloc_info+0x40/0x58 [ 33.353506] __kasan_kmalloc+0xd4/0xd8 [ 33.353593] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.353742] kasan_strings+0xc8/0xb00 [ 33.353856] kunit_try_run_case+0x170/0x3f0 [ 33.353975] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.354074] kthread+0x328/0x630 [ 33.354151] ret_from_fork+0x10/0x20 [ 33.354244] [ 33.354294] Freed by task 270: [ 33.354373] kasan_save_stack+0x3c/0x68 [ 33.354480] kasan_save_track+0x20/0x40 [ 33.354597] kasan_save_free_info+0x4c/0x78 [ 33.354736] __kasan_slab_free+0x6c/0x98 [ 33.354829] kfree+0x214/0x3c8 [ 33.354977] kasan_strings+0x24c/0xb00 [ 33.355075] kunit_try_run_case+0x170/0x3f0 [ 33.355202] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.355334] kthread+0x328/0x630 [ 33.355551] ret_from_fork+0x10/0x20 [ 33.355663] [ 33.355724] The buggy address belongs to the object at fff00000c76d03c0 [ 33.355724] which belongs to the cache kmalloc-32 of size 32 [ 33.355890] The buggy address is located 16 bytes inside of [ 33.355890] freed 32-byte region [fff00000c76d03c0, fff00000c76d03e0) [ 33.356035] [ 33.356084] The buggy address belongs to the physical page: [ 33.356162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076d0 [ 33.356304] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.356427] page_type: f5(slab) [ 33.356552] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 33.356679] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 33.356774] page dumped because: kasan: bad access detected [ 33.356905] [ 33.356964] Memory state around the buggy address: [ 33.357053] fff00000c76d0280: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 33.357168] fff00000c76d0300: 00 00 00 04 fc fc fc fc 00 00 07 fc fc fc fc fc [ 33.357283] >fff00000c76d0380: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 33.357387] ^ [ 33.357469] fff00000c76d0400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 33.357561] fff00000c76d0480: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 33.357642] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
[ 33.338866] ================================================================== [ 33.339131] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 [ 33.339337] Read of size 1 at addr fff00000c76d03d0 by task kunit_try_catch/270 [ 33.339519] [ 33.339661] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 33.339948] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.340018] Hardware name: linux,dummy-virt (DT) [ 33.340145] Call trace: [ 33.340225] show_stack+0x20/0x38 (C) [ 33.340588] dump_stack_lvl+0x8c/0xd0 [ 33.340728] print_report+0x118/0x608 [ 33.340858] kasan_report+0xdc/0x128 [ 33.340999] __asan_report_load1_noabort+0x20/0x30 [ 33.341133] strcmp+0xc0/0xc8 [ 33.341248] kasan_strings+0x340/0xb00 [ 33.341363] kunit_try_run_case+0x170/0x3f0 [ 33.341536] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.341927] kthread+0x328/0x630 [ 33.342108] ret_from_fork+0x10/0x20 [ 33.342282] [ 33.342366] Allocated by task 270: [ 33.342450] kasan_save_stack+0x3c/0x68 [ 33.342606] kasan_save_track+0x20/0x40 [ 33.342706] kasan_save_alloc_info+0x40/0x58 [ 33.342814] __kasan_kmalloc+0xd4/0xd8 [ 33.342924] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.343034] kasan_strings+0xc8/0xb00 [ 33.343108] kunit_try_run_case+0x170/0x3f0 [ 33.343236] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.343385] kthread+0x328/0x630 [ 33.343517] ret_from_fork+0x10/0x20 [ 33.343649] [ 33.343708] Freed by task 270: [ 33.343813] kasan_save_stack+0x3c/0x68 [ 33.343935] kasan_save_track+0x20/0x40 [ 33.344024] kasan_save_free_info+0x4c/0x78 [ 33.344345] __kasan_slab_free+0x6c/0x98 [ 33.344532] kfree+0x214/0x3c8 [ 33.344628] kasan_strings+0x24c/0xb00 [ 33.344936] kunit_try_run_case+0x170/0x3f0 [ 33.345110] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.345242] kthread+0x328/0x630 [ 33.345335] ret_from_fork+0x10/0x20 [ 33.345666] [ 33.345726] The buggy address belongs to the object at fff00000c76d03c0 [ 33.345726] which belongs to the cache kmalloc-32 of size 32 [ 33.345977] The buggy address is located 16 bytes inside of [ 33.345977] freed 32-byte region [fff00000c76d03c0, fff00000c76d03e0) [ 33.346153] [ 33.346207] The buggy address belongs to the physical page: [ 33.346279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076d0 [ 33.346407] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.346539] page_type: f5(slab) [ 33.346935] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 33.347340] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 33.347478] page dumped because: kasan: bad access detected [ 33.347570] [ 33.347689] Memory state around the buggy address: [ 33.347777] fff00000c76d0280: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 33.348169] fff00000c76d0300: 00 00 00 04 fc fc fc fc 00 00 07 fc fc fc fc fc [ 33.348287] >fff00000c76d0380: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 33.348394] ^ [ 33.348610] fff00000c76d0400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 33.348783] fff00000c76d0480: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 33.348917] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[ 33.260174] ================================================================== [ 33.260363] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340 [ 33.260514] Read of size 1 at addr ffff800080a17b4a by task kunit_try_catch/264 [ 33.260643] [ 33.260735] CPU: 0 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 33.262748] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.262853] Hardware name: linux,dummy-virt (DT) [ 33.262967] Call trace: [ 33.263034] show_stack+0x20/0x38 (C) [ 33.263242] dump_stack_lvl+0x8c/0xd0 [ 33.263557] print_report+0x310/0x608 [ 33.263693] kasan_report+0xdc/0x128 [ 33.263821] __asan_report_load1_noabort+0x20/0x30 [ 33.263950] kasan_alloca_oob_right+0x2dc/0x340 [ 33.264088] kunit_try_run_case+0x170/0x3f0 [ 33.264220] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.264500] kthread+0x328/0x630 [ 33.264618] ret_from_fork+0x10/0x20 [ 33.264746] [ 33.264808] The buggy address belongs to stack of task kunit_try_catch/264 [ 33.264954] [ 33.265109] The buggy address belongs to the virtual mapping at [ 33.265109] [ffff800080a10000, ffff800080a19000) created by: [ 33.265109] kernel_clone+0x150/0x7a8 [ 33.265475] [ 33.265514] The buggy address belongs to the physical page: [ 33.265556] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107679 [ 33.265649] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.265819] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 33.265965] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.266067] page dumped because: kasan: bad access detected [ 33.266139] [ 33.266661] Memory state around the buggy address: [ 33.266782] ffff800080a17a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.266919] ffff800080a17a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.267041] >ffff800080a17b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 33.267608] ^ [ 33.267764] ffff800080a17b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 33.268100] ffff800080a17c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 33.268382] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[ 33.240929] ================================================================== [ 33.241207] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 33.241409] Read of size 1 at addr ffff800080a17b5f by task kunit_try_catch/262 [ 33.241595] [ 33.241682] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 33.242148] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.242234] Hardware name: linux,dummy-virt (DT) [ 33.242318] Call trace: [ 33.242380] show_stack+0x20/0x38 (C) [ 33.242524] dump_stack_lvl+0x8c/0xd0 [ 33.242667] print_report+0x310/0x608 [ 33.242841] kasan_report+0xdc/0x128 [ 33.243040] __asan_report_load1_noabort+0x20/0x30 [ 33.243218] kasan_alloca_oob_left+0x2b8/0x310 [ 33.243357] kunit_try_run_case+0x170/0x3f0 [ 33.243500] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.243677] kthread+0x328/0x630 [ 33.243786] ret_from_fork+0x10/0x20 [ 33.243927] [ 33.243981] The buggy address belongs to stack of task kunit_try_catch/262 [ 33.244171] [ 33.244239] The buggy address belongs to the virtual mapping at [ 33.244239] [ffff800080a10000, ffff800080a19000) created by: [ 33.244239] kernel_clone+0x150/0x7a8 [ 33.244446] [ 33.244519] The buggy address belongs to the physical page: [ 33.244607] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107679 [ 33.244754] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.244941] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 33.245069] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.245184] page dumped because: kasan: bad access detected [ 33.245273] [ 33.245322] Memory state around the buggy address: [ 33.245411] ffff800080a17a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.245516] ffff800080a17a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.245620] >ffff800080a17b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 33.245720] ^ [ 33.245828] ffff800080a17b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 33.245958] ffff800080a17c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 33.246068] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 30.021077] ================================================================== [ 30.021361] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 30.021599] Read of size 1 at addr fff00000c7720000 by task kunit_try_catch/165 [ 30.022218] [ 30.022327] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 30.022548] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.022606] Hardware name: linux,dummy-virt (DT) [ 30.022668] Call trace: [ 30.022714] show_stack+0x20/0x38 (C) [ 30.022829] dump_stack_lvl+0x8c/0xd0 [ 30.022943] print_report+0x118/0x608 [ 30.023062] kasan_report+0xdc/0x128 [ 30.023174] __asan_report_load1_noabort+0x20/0x30 [ 30.023305] page_alloc_uaf+0x328/0x350 [ 30.023422] kunit_try_run_case+0x170/0x3f0 [ 30.023547] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.024149] kthread+0x328/0x630 [ 30.024459] ret_from_fork+0x10/0x20 [ 30.024846] [ 30.024937] The buggy address belongs to the physical page: [ 30.025171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107720 [ 30.025346] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.025500] page_type: f0(buddy) [ 30.025598] raw: 0bfffe0000000000 fff00000ff616108 fff00000ff616108 0000000000000000 [ 30.025741] raw: 0000000000000000 0000000000000005 00000000f0000000 0000000000000000 [ 30.025844] page dumped because: kasan: bad access detected [ 30.025926] [ 30.026004] Memory state around the buggy address: [ 30.026138] fff00000c771ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.026249] fff00000c771ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.026348] >fff00000c7720000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.026431] ^ [ 30.026489] fff00000c7720080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.026612] fff00000c7720100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.026728] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 33.222513] ================================================================== [ 33.222711] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 33.222867] Read of size 1 at addr ffff800080a17c2a by task kunit_try_catch/260 [ 33.223023] [ 33.223116] CPU: 0 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 33.223343] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.223418] Hardware name: linux,dummy-virt (DT) [ 33.223520] Call trace: [ 33.223576] show_stack+0x20/0x38 (C) [ 33.223728] dump_stack_lvl+0x8c/0xd0 [ 33.223859] print_report+0x310/0x608 [ 33.223987] kasan_report+0xdc/0x128 [ 33.224113] __asan_report_load1_noabort+0x20/0x30 [ 33.224315] kasan_stack_oob+0x238/0x270 [ 33.224446] kunit_try_run_case+0x170/0x3f0 [ 33.224568] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.224697] kthread+0x328/0x630 [ 33.224814] ret_from_fork+0x10/0x20 [ 33.224961] [ 33.225120] The buggy address belongs to stack of task kunit_try_catch/260 [ 33.225358] and is located at offset 138 in frame: [ 33.225454] kasan_stack_oob+0x0/0x270 [ 33.225758] [ 33.225842] This frame has 4 objects: [ 33.226049] [48, 49) '__assertion' [ 33.226149] [64, 72) 'array' [ 33.226243] [96, 112) '__assertion' [ 33.226346] [128, 138) 'stack_array' [ 33.226443] [ 33.226517] The buggy address belongs to the virtual mapping at [ 33.226517] [ffff800080a10000, ffff800080a19000) created by: [ 33.226517] kernel_clone+0x150/0x7a8 [ 33.226699] [ 33.226758] The buggy address belongs to the physical page: [ 33.226939] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107679 [ 33.227133] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.227298] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 33.227433] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.227543] page dumped because: kasan: bad access detected [ 33.227629] [ 33.227678] Memory state around the buggy address: [ 33.227764] ffff800080a17b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.227888] ffff800080a17b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 33.228005] >ffff800080a17c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 33.228115] ^ [ 33.228196] ffff800080a17c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 [ 33.228338] ffff800080a17d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 33.228444] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 33.190035] ================================================================== [ 33.190205] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 33.190349] Read of size 1 at addr ffffa8812967968d by task kunit_try_catch/256 [ 33.190989] [ 33.191601] CPU: 0 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 33.191861] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.191941] Hardware name: linux,dummy-virt (DT) [ 33.192022] Call trace: [ 33.192080] show_stack+0x20/0x38 (C) [ 33.192694] dump_stack_lvl+0x8c/0xd0 [ 33.193284] print_report+0x310/0x608 [ 33.193675] kasan_report+0xdc/0x128 [ 33.193815] __asan_report_load1_noabort+0x20/0x30 [ 33.193957] kasan_global_oob_right+0x230/0x270 [ 33.194021] kunit_try_run_case+0x170/0x3f0 [ 33.194082] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.194211] kthread+0x328/0x630 [ 33.194331] ret_from_fork+0x10/0x20 [ 33.194477] [ 33.194587] The buggy address belongs to the variable: [ 33.194656] global_array+0xd/0x40 [ 33.194748] [ 33.194907] The buggy address belongs to the virtual mapping at [ 33.194907] [ffffa88127830000, ffffa88129731000) created by: [ 33.194907] paging_init+0x66c/0x7d0 [ 33.195097] [ 33.195382] The buggy address belongs to the physical page: [ 33.195478] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47c79 [ 33.195651] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 33.195910] raw: 03fffe0000002000 ffffc1ffc01f1e48 ffffc1ffc01f1e48 0000000000000000 [ 33.196030] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.196137] page dumped because: kasan: bad access detected [ 33.196250] [ 33.196290] Memory state around the buggy address: [ 33.196367] ffffa88129679580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.196474] ffffa88129679600: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9 [ 33.196582] >ffffa88129679680: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 [ 33.196686] ^ [ 33.196793] ffffa88129679700: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 [ 33.196951] ffffa88129679780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.197053] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 33.165859] ================================================================== [ 33.166045] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 33.166194] Free of addr fff00000c63f4001 by task kunit_try_catch/254 [ 33.166295] [ 33.166384] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 33.166612] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.166679] Hardware name: linux,dummy-virt (DT) [ 33.166756] Call trace: [ 33.166809] show_stack+0x20/0x38 (C) [ 33.167681] dump_stack_lvl+0x8c/0xd0 [ 33.167857] print_report+0x118/0x608 [ 33.168042] kasan_report_invalid_free+0xc0/0xe8 [ 33.168211] __kasan_mempool_poison_object+0xfc/0x150 [ 33.168396] mempool_free+0x28c/0x328 [ 33.168550] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 33.168735] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 33.168934] kunit_try_run_case+0x170/0x3f0 [ 33.169079] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.169252] kthread+0x328/0x630 [ 33.169404] ret_from_fork+0x10/0x20 [ 33.169517] [ 33.169570] The buggy address belongs to the physical page: [ 33.169654] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f4 [ 33.170118] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.170468] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.170622] page_type: f8(unknown) [ 33.170736] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.170913] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 33.171045] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.171265] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 33.171374] head: 0bfffe0000000002 ffffc1ffc318fd01 00000000ffffffff 00000000ffffffff [ 33.171484] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 33.171584] page dumped because: kasan: bad access detected [ 33.171901] [ 33.171953] Memory state around the buggy address: [ 33.172042] fff00000c63f3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.172159] fff00000c63f3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.172266] >fff00000c63f4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.172365] ^ [ 33.172440] fff00000c63f4080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.172555] fff00000c63f4100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.172657] ================================================================== [ 33.138228] ================================================================== [ 33.138513] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 33.138727] Free of addr fff00000c649df01 by task kunit_try_catch/252 [ 33.138891] [ 33.139573] CPU: 0 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 33.139793] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.139868] Hardware name: linux,dummy-virt (DT) [ 33.139972] Call trace: [ 33.140030] show_stack+0x20/0x38 (C) [ 33.140497] dump_stack_lvl+0x8c/0xd0 [ 33.140622] print_report+0x118/0x608 [ 33.141021] kasan_report_invalid_free+0xc0/0xe8 [ 33.141171] check_slab_allocation+0xfc/0x108 [ 33.141359] __kasan_mempool_poison_object+0x78/0x150 [ 33.141524] mempool_free+0x28c/0x328 [ 33.141639] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 33.142025] mempool_kmalloc_invalid_free+0xc0/0x118 [ 33.142088] kunit_try_run_case+0x170/0x3f0 [ 33.142145] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.142203] kthread+0x328/0x630 [ 33.142252] ret_from_fork+0x10/0x20 [ 33.142309] [ 33.142330] Allocated by task 252: [ 33.142366] kasan_save_stack+0x3c/0x68 [ 33.142415] kasan_save_track+0x20/0x40 [ 33.142458] kasan_save_alloc_info+0x40/0x58 [ 33.142503] __kasan_mempool_unpoison_object+0x11c/0x180 [ 33.142551] remove_element+0x130/0x1f8 [ 33.142589] mempool_alloc_preallocated+0x58/0xc0 [ 33.142632] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 33.142681] mempool_kmalloc_invalid_free+0xc0/0x118 [ 33.142724] kunit_try_run_case+0x170/0x3f0 [ 33.142765] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.142810] kthread+0x328/0x630 [ 33.142846] ret_from_fork+0x10/0x20 [ 33.142924] [ 33.142990] The buggy address belongs to the object at fff00000c649df00 [ 33.142990] which belongs to the cache kmalloc-128 of size 128 [ 33.143172] The buggy address is located 1 bytes inside of [ 33.143172] 128-byte region [fff00000c649df00, fff00000c649df80) [ 33.143391] [ 33.143453] The buggy address belongs to the physical page: [ 33.143561] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10649d [ 33.143721] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.143920] page_type: f5(slab) [ 33.144043] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.144175] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000 [ 33.144282] page dumped because: kasan: bad access detected [ 33.144366] [ 33.144411] Memory state around the buggy address: [ 33.144522] fff00000c649de00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.144641] fff00000c649de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.144802] >fff00000c649df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.145146] ^ [ 33.145223] fff00000c649df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.145333] fff00000c649e000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.145435] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 33.020704] ================================================================== [ 33.020817] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 33.020927] Free of addr fff00000c649db00 by task kunit_try_catch/246 [ 33.020978] [ 33.021029] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 33.021131] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.021160] Hardware name: linux,dummy-virt (DT) [ 33.021199] Call trace: [ 33.021226] show_stack+0x20/0x38 (C) [ 33.021288] dump_stack_lvl+0x8c/0xd0 [ 33.021345] print_report+0x118/0x608 [ 33.021402] kasan_report_invalid_free+0xc0/0xe8 [ 33.021458] check_slab_allocation+0xd4/0x108 [ 33.021513] __kasan_mempool_poison_object+0x78/0x150 [ 33.021570] mempool_free+0x28c/0x328 [ 33.021627] mempool_double_free_helper+0x150/0x2e8 [ 33.021681] mempool_kmalloc_double_free+0xc0/0x118 [ 33.021737] kunit_try_run_case+0x170/0x3f0 [ 33.021792] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.021851] kthread+0x328/0x630 [ 33.024351] ret_from_fork+0x10/0x20 [ 33.024885] [ 33.025073] Allocated by task 246: [ 33.026794] kasan_save_stack+0x3c/0x68 [ 33.032207] kasan_save_track+0x20/0x40 [ 33.032324] kasan_save_alloc_info+0x40/0x58 [ 33.032438] __kasan_mempool_unpoison_object+0x11c/0x180 [ 33.032529] remove_element+0x130/0x1f8 [ 33.032610] mempool_alloc_preallocated+0x58/0xc0 [ 33.032693] mempool_double_free_helper+0x94/0x2e8 [ 33.032779] mempool_kmalloc_double_free+0xc0/0x118 [ 33.032864] kunit_try_run_case+0x170/0x3f0 [ 33.033260] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.033409] kthread+0x328/0x630 [ 33.033499] ret_from_fork+0x10/0x20 [ 33.033605] [ 33.033901] Freed by task 246: [ 33.033979] kasan_save_stack+0x3c/0x68 [ 33.034085] kasan_save_track+0x20/0x40 [ 33.034176] kasan_save_free_info+0x4c/0x78 [ 33.034336] __kasan_mempool_poison_object+0xc0/0x150 [ 33.034500] mempool_free+0x28c/0x328 [ 33.034688] mempool_double_free_helper+0x100/0x2e8 [ 33.034799] mempool_kmalloc_double_free+0xc0/0x118 [ 33.034936] kunit_try_run_case+0x170/0x3f0 [ 33.035150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.035326] kthread+0x328/0x630 [ 33.035416] ret_from_fork+0x10/0x20 [ 33.035587] [ 33.035638] The buggy address belongs to the object at fff00000c649db00 [ 33.035638] which belongs to the cache kmalloc-128 of size 128 [ 33.035787] The buggy address is located 0 bytes inside of [ 33.035787] 128-byte region [fff00000c649db00, fff00000c649db80) [ 33.035972] [ 33.036022] The buggy address belongs to the physical page: [ 33.036095] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10649d [ 33.036778] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.036978] page_type: f5(slab) [ 33.037107] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.037230] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.037333] page dumped because: kasan: bad access detected [ 33.037457] [ 33.037496] Memory state around the buggy address: [ 33.037572] fff00000c649da00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.038019] fff00000c649da80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.038255] >fff00000c649db00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.038383] ^ [ 33.038490] fff00000c649db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.038642] fff00000c649dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.038986] ================================================================== [ 33.089221] ================================================================== [ 33.089392] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 33.090478] Free of addr fff00000c63f4000 by task kunit_try_catch/250 [ 33.090584] [ 33.090741] CPU: 0 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 33.091439] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.091517] Hardware name: linux,dummy-virt (DT) [ 33.091595] Call trace: [ 33.091696] show_stack+0x20/0x38 (C) [ 33.091981] dump_stack_lvl+0x8c/0xd0 [ 33.092214] print_report+0x118/0x608 [ 33.092709] kasan_report_invalid_free+0xc0/0xe8 [ 33.092984] __kasan_mempool_poison_pages+0xe0/0xe8 [ 33.093537] mempool_free+0x24c/0x328 [ 33.093930] mempool_double_free_helper+0x150/0x2e8 [ 33.094109] mempool_page_alloc_double_free+0xbc/0x118 [ 33.094222] kunit_try_run_case+0x170/0x3f0 [ 33.094331] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.094450] kthread+0x328/0x630 [ 33.094541] ret_from_fork+0x10/0x20 [ 33.094657] [ 33.094857] The buggy address belongs to the physical page: [ 33.095068] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f4 [ 33.095674] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.095958] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 33.096518] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.096761] page dumped because: kasan: bad access detected [ 33.097303] [ 33.097361] Memory state around the buggy address: [ 33.097500] fff00000c63f3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.097638] fff00000c63f3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.097765] >fff00000c63f4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.097852] ^ [ 33.097923] fff00000c63f4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.098008] fff00000c63f4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.098119] ================================================================== [ 33.062930] ================================================================== [ 33.063181] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 33.063356] Free of addr fff00000c63f4000 by task kunit_try_catch/248 [ 33.063462] [ 33.063555] CPU: 0 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 33.063775] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.063843] Hardware name: linux,dummy-virt (DT) [ 33.063937] Call trace: [ 33.063995] show_stack+0x20/0x38 (C) [ 33.064120] dump_stack_lvl+0x8c/0xd0 [ 33.064239] print_report+0x118/0x608 [ 33.064359] kasan_report_invalid_free+0xc0/0xe8 [ 33.064483] __kasan_mempool_poison_object+0x14c/0x150 [ 33.064616] mempool_free+0x28c/0x328 [ 33.064730] mempool_double_free_helper+0x150/0x2e8 [ 33.064857] mempool_kmalloc_large_double_free+0xc0/0x118 [ 33.066122] kunit_try_run_case+0x170/0x3f0 [ 33.066487] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.066761] kthread+0x328/0x630 [ 33.067057] ret_from_fork+0x10/0x20 [ 33.067351] [ 33.067405] The buggy address belongs to the physical page: [ 33.067719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f4 [ 33.067948] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.068211] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.068459] page_type: f8(unknown) [ 33.068924] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.069455] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 33.069719] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.069961] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 33.070231] head: 0bfffe0000000002 ffffc1ffc318fd01 00000000ffffffff 00000000ffffffff [ 33.071282] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 33.071352] page dumped because: kasan: bad access detected [ 33.071397] [ 33.071421] Memory state around the buggy address: [ 33.071477] fff00000c63f3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.071620] fff00000c63f3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.071746] >fff00000c63f4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.071849] ^ [ 33.071937] fff00000c63f4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.072038] fff00000c63f4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.072139] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 32.996569] ================================================================== [ 32.996763] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 32.997090] Read of size 1 at addr fff00000c63f0000 by task kunit_try_catch/244 [ 32.997238] [ 32.997336] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 32.997566] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.997650] Hardware name: linux,dummy-virt (DT) [ 32.998066] Call trace: [ 32.998144] show_stack+0x20/0x38 (C) [ 32.998307] dump_stack_lvl+0x8c/0xd0 [ 32.998415] print_report+0x118/0x608 [ 32.998511] kasan_report+0xdc/0x128 [ 32.998615] __asan_report_load1_noabort+0x20/0x30 [ 32.998738] mempool_uaf_helper+0x314/0x340 [ 32.998863] mempool_page_alloc_uaf+0xc0/0x118 [ 32.999415] kunit_try_run_case+0x170/0x3f0 [ 32.999705] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.000296] kthread+0x328/0x630 [ 33.000439] ret_from_fork+0x10/0x20 [ 33.000828] [ 33.000915] The buggy address belongs to the physical page: [ 33.001114] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f0 [ 33.001260] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.001634] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 33.001988] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.002429] page dumped because: kasan: bad access detected [ 33.002531] [ 33.002582] Memory state around the buggy address: [ 33.002667] fff00000c63eff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.002985] fff00000c63eff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.003274] >fff00000c63f0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.003558] ^ [ 33.003669] fff00000c63f0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.003832] fff00000c63f0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.004250] ================================================================== [ 32.907008] ================================================================== [ 32.907117] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 32.907221] Read of size 1 at addr fff00000c63f0000 by task kunit_try_catch/240 [ 32.907281] [ 32.907346] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 32.907454] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.907488] Hardware name: linux,dummy-virt (DT) [ 32.907528] Call trace: [ 32.907556] show_stack+0x20/0x38 (C) [ 32.907617] dump_stack_lvl+0x8c/0xd0 [ 32.907675] print_report+0x118/0x608 [ 32.907732] kasan_report+0xdc/0x128 [ 32.907784] __asan_report_load1_noabort+0x20/0x30 [ 32.907843] mempool_uaf_helper+0x314/0x340 [ 32.909021] mempool_kmalloc_large_uaf+0xc4/0x120 [ 32.909478] kunit_try_run_case+0x170/0x3f0 [ 32.909919] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.909995] kthread+0x328/0x630 [ 32.910045] ret_from_fork+0x10/0x20 [ 32.910267] [ 32.910311] The buggy address belongs to the physical page: [ 32.910548] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f0 [ 32.911079] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.911168] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.911245] page_type: f8(unknown) [ 32.911400] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.911472] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.911646] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.911767] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.912013] head: 0bfffe0000000002 ffffc1ffc318fc01 00000000ffffffff 00000000ffffffff [ 32.912101] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.912343] page dumped because: kasan: bad access detected [ 32.912389] [ 32.912420] Memory state around the buggy address: [ 32.912487] fff00000c63eff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.912592] fff00000c63eff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.912680] >fff00000c63f0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.912727] ^ [ 32.912776] fff00000c63f0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.912964] fff00000c63f0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.913181] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 32.924118] ================================================================== [ 32.924398] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 32.924511] Read of size 1 at addr fff00000c7744240 by task kunit_try_catch/242 [ 32.924777] [ 32.924963] CPU: 0 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 32.925076] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.925107] Hardware name: linux,dummy-virt (DT) [ 32.925144] Call trace: [ 32.925173] show_stack+0x20/0x38 (C) [ 32.925238] dump_stack_lvl+0x8c/0xd0 [ 32.925296] print_report+0x118/0x608 [ 32.925349] kasan_report+0xdc/0x128 [ 32.925401] __asan_report_load1_noabort+0x20/0x30 [ 32.926059] mempool_uaf_helper+0x314/0x340 [ 32.926545] mempool_slab_uaf+0xc0/0x118 [ 32.926607] kunit_try_run_case+0x170/0x3f0 [ 32.926665] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.926726] kthread+0x328/0x630 [ 32.926844] ret_from_fork+0x10/0x20 [ 32.926923] [ 32.926955] Allocated by task 242: [ 32.927024] kasan_save_stack+0x3c/0x68 [ 32.927130] kasan_save_track+0x20/0x40 [ 32.927179] kasan_save_alloc_info+0x40/0x58 [ 32.927233] __kasan_mempool_unpoison_object+0xbc/0x180 [ 32.927642] remove_element+0x16c/0x1f8 [ 32.927700] mempool_alloc_preallocated+0x58/0xc0 [ 32.927909] mempool_uaf_helper+0xa4/0x340 [ 32.928215] mempool_slab_uaf+0xc0/0x118 [ 32.928550] kunit_try_run_case+0x170/0x3f0 [ 32.928628] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.928800] kthread+0x328/0x630 [ 32.929107] ret_from_fork+0x10/0x20 [ 32.929451] [ 32.929548] Freed by task 242: [ 32.929589] kasan_save_stack+0x3c/0x68 [ 32.929705] kasan_save_track+0x20/0x40 [ 32.929751] kasan_save_free_info+0x4c/0x78 [ 32.929796] __kasan_mempool_poison_object+0xc0/0x150 [ 32.929847] mempool_free+0x28c/0x328 [ 32.929922] mempool_uaf_helper+0x104/0x340 [ 32.929970] mempool_slab_uaf+0xc0/0x118 [ 32.930013] kunit_try_run_case+0x170/0x3f0 [ 32.930073] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.930134] kthread+0x328/0x630 [ 32.930172] ret_from_fork+0x10/0x20 [ 32.930215] [ 32.930277] The buggy address belongs to the object at fff00000c7744240 [ 32.930277] which belongs to the cache test_cache of size 123 [ 32.930350] The buggy address is located 0 bytes inside of [ 32.930350] freed 123-byte region [fff00000c7744240, fff00000c77442bb) [ 32.930429] [ 32.930460] The buggy address belongs to the physical page: [ 32.930495] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107744 [ 32.930564] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.930626] page_type: f5(slab) [ 32.930678] raw: 0bfffe0000000000 fff00000c76a5280 dead000000000122 0000000000000000 [ 32.930736] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 32.930784] page dumped because: kasan: bad access detected [ 32.930824] [ 32.930847] Memory state around the buggy address: [ 32.930902] fff00000c7744100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.930982] fff00000c7744180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.931035] >fff00000c7744200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 32.931079] ^ [ 32.931122] fff00000c7744280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.931202] fff00000c7744300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.931314] ================================================================== [ 32.887328] ================================================================== [ 32.887434] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 32.887538] Read of size 1 at addr fff00000c649d700 by task kunit_try_catch/238 [ 32.887598] [ 32.887651] CPU: 0 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 32.887758] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.887792] Hardware name: linux,dummy-virt (DT) [ 32.887835] Call trace: [ 32.887864] show_stack+0x20/0x38 (C) [ 32.887956] dump_stack_lvl+0x8c/0xd0 [ 32.888017] print_report+0x118/0x608 [ 32.888073] kasan_report+0xdc/0x128 [ 32.888125] __asan_report_load1_noabort+0x20/0x30 [ 32.888182] mempool_uaf_helper+0x314/0x340 [ 32.888330] mempool_kmalloc_uaf+0xc4/0x120 [ 32.888411] kunit_try_run_case+0x170/0x3f0 [ 32.888472] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.888531] kthread+0x328/0x630 [ 32.888581] ret_from_fork+0x10/0x20 [ 32.888700] [ 32.888751] Allocated by task 238: [ 32.888829] kasan_save_stack+0x3c/0x68 [ 32.888892] kasan_save_track+0x20/0x40 [ 32.888940] kasan_save_alloc_info+0x40/0x58 [ 32.888983] __kasan_mempool_unpoison_object+0x11c/0x180 [ 32.889030] remove_element+0x130/0x1f8 [ 32.889075] mempool_alloc_preallocated+0x58/0xc0 [ 32.889154] mempool_uaf_helper+0xa4/0x340 [ 32.889220] mempool_kmalloc_uaf+0xc4/0x120 [ 32.889294] kunit_try_run_case+0x170/0x3f0 [ 32.889363] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.889409] kthread+0x328/0x630 [ 32.889516] ret_from_fork+0x10/0x20 [ 32.889620] [ 32.889649] Freed by task 238: [ 32.889682] kasan_save_stack+0x3c/0x68 [ 32.889725] kasan_save_track+0x20/0x40 [ 32.889785] kasan_save_free_info+0x4c/0x78 [ 32.889868] __kasan_mempool_poison_object+0xc0/0x150 [ 32.889985] mempool_free+0x28c/0x328 [ 32.890039] mempool_uaf_helper+0x104/0x340 [ 32.890082] mempool_kmalloc_uaf+0xc4/0x120 [ 32.890122] kunit_try_run_case+0x170/0x3f0 [ 32.890174] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.890359] kthread+0x328/0x630 [ 32.890401] ret_from_fork+0x10/0x20 [ 32.890440] [ 32.890464] The buggy address belongs to the object at fff00000c649d700 [ 32.890464] which belongs to the cache kmalloc-128 of size 128 [ 32.890534] The buggy address is located 0 bytes inside of [ 32.890534] freed 128-byte region [fff00000c649d700, fff00000c649d780) [ 32.890601] [ 32.890627] The buggy address belongs to the physical page: [ 32.890665] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10649d [ 32.890726] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.890787] page_type: f5(slab) [ 32.890838] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.891115] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.891169] page dumped because: kasan: bad access detected [ 32.891455] [ 32.891490] Memory state around the buggy address: [ 32.891535] fff00000c649d600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.891869] fff00000c649d680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.891967] >fff00000c649d700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.892013] ^ [ 32.892237] fff00000c649d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.892312] fff00000c649d800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.892561] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 32.860922] ================================================================== [ 32.861025] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 32.861121] Read of size 1 at addr fff00000c76d22bb by task kunit_try_catch/236 [ 32.861182] [ 32.861233] CPU: 0 UID: 0 PID: 236 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 32.861341] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.861372] Hardware name: linux,dummy-virt (DT) [ 32.861412] Call trace: [ 32.861439] show_stack+0x20/0x38 (C) [ 32.861499] dump_stack_lvl+0x8c/0xd0 [ 32.861554] print_report+0x118/0x608 [ 32.861608] kasan_report+0xdc/0x128 [ 32.861660] __asan_report_load1_noabort+0x20/0x30 [ 32.861718] mempool_oob_right_helper+0x2ac/0x2f0 [ 32.861770] mempool_slab_oob_right+0xc0/0x118 [ 32.861823] kunit_try_run_case+0x170/0x3f0 [ 32.861883] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.862348] kthread+0x328/0x630 [ 32.862411] ret_from_fork+0x10/0x20 [ 32.862557] [ 32.862617] Allocated by task 236: [ 32.862699] kasan_save_stack+0x3c/0x68 [ 32.862775] kasan_save_track+0x20/0x40 [ 32.862971] kasan_save_alloc_info+0x40/0x58 [ 32.863028] __kasan_mempool_unpoison_object+0xbc/0x180 [ 32.863078] remove_element+0x16c/0x1f8 [ 32.863127] mempool_alloc_preallocated+0x58/0xc0 [ 32.863171] mempool_oob_right_helper+0x98/0x2f0 [ 32.863215] mempool_slab_oob_right+0xc0/0x118 [ 32.863256] kunit_try_run_case+0x170/0x3f0 [ 32.863318] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.863391] kthread+0x328/0x630 [ 32.863433] ret_from_fork+0x10/0x20 [ 32.863474] [ 32.863508] The buggy address belongs to the object at fff00000c76d2240 [ 32.863508] which belongs to the cache test_cache of size 123 [ 32.863711] The buggy address is located 0 bytes to the right of [ 32.863711] allocated 123-byte region [fff00000c76d2240, fff00000c76d22bb) [ 32.863958] [ 32.863998] The buggy address belongs to the physical page: [ 32.864037] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076d2 [ 32.864100] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.864161] page_type: f5(slab) [ 32.864211] raw: 0bfffe0000000000 fff00000c76a5140 dead000000000122 0000000000000000 [ 32.864269] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 32.864315] page dumped because: kasan: bad access detected [ 32.864353] [ 32.864375] Memory state around the buggy address: [ 32.864416] fff00000c76d2180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.864465] fff00000c76d2200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 32.864514] >fff00000c76d2280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 32.864557] ^ [ 32.864597] fff00000c76d2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.864644] fff00000c76d2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.865517] ================================================================== [ 32.830748] ================================================================== [ 32.830865] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 32.831027] Read of size 1 at addr fff00000c649d373 by task kunit_try_catch/232 [ 32.831089] [ 32.831146] CPU: 0 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 32.831252] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.831283] Hardware name: linux,dummy-virt (DT) [ 32.831324] Call trace: [ 32.831353] show_stack+0x20/0x38 (C) [ 32.831418] dump_stack_lvl+0x8c/0xd0 [ 32.831477] print_report+0x118/0x608 [ 32.831530] kasan_report+0xdc/0x128 [ 32.831583] __asan_report_load1_noabort+0x20/0x30 [ 32.831641] mempool_oob_right_helper+0x2ac/0x2f0 [ 32.831694] mempool_kmalloc_oob_right+0xc4/0x120 [ 32.831751] kunit_try_run_case+0x170/0x3f0 [ 32.831809] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.831868] kthread+0x328/0x630 [ 32.831934] ret_from_fork+0x10/0x20 [ 32.831993] [ 32.832015] Allocated by task 232: [ 32.832048] kasan_save_stack+0x3c/0x68 [ 32.832100] kasan_save_track+0x20/0x40 [ 32.832142] kasan_save_alloc_info+0x40/0x58 [ 32.832189] __kasan_mempool_unpoison_object+0x11c/0x180 [ 32.832238] remove_element+0x130/0x1f8 [ 32.832280] mempool_alloc_preallocated+0x58/0xc0 [ 32.832324] mempool_oob_right_helper+0x98/0x2f0 [ 32.832367] mempool_kmalloc_oob_right+0xc4/0x120 [ 32.832413] kunit_try_run_case+0x170/0x3f0 [ 32.832456] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.832504] kthread+0x328/0x630 [ 32.832539] ret_from_fork+0x10/0x20 [ 32.832578] [ 32.832604] The buggy address belongs to the object at fff00000c649d300 [ 32.832604] which belongs to the cache kmalloc-128 of size 128 [ 32.832670] The buggy address is located 0 bytes to the right of [ 32.832670] allocated 115-byte region [fff00000c649d300, fff00000c649d373) [ 32.832738] [ 32.832766] The buggy address belongs to the physical page: [ 32.832807] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10649d [ 32.832869] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.832946] page_type: f5(slab) [ 32.832997] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.833056] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.833103] page dumped because: kasan: bad access detected [ 32.833140] [ 32.833159] Memory state around the buggy address: [ 32.833199] fff00000c649d200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.833248] fff00000c649d280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.833296] >fff00000c649d300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.833339] ^ [ 32.833385] fff00000c649d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.833433] fff00000c649d400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.833506] ================================================================== [ 32.845160] ================================================================== [ 32.845910] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 32.846029] Read of size 1 at addr fff00000c63ea001 by task kunit_try_catch/234 [ 32.846093] [ 32.846144] CPU: 0 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 32.846263] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.846295] Hardware name: linux,dummy-virt (DT) [ 32.846332] Call trace: [ 32.846360] show_stack+0x20/0x38 (C) [ 32.846423] dump_stack_lvl+0x8c/0xd0 [ 32.846479] print_report+0x118/0x608 [ 32.846532] kasan_report+0xdc/0x128 [ 32.846585] __asan_report_load1_noabort+0x20/0x30 [ 32.846643] mempool_oob_right_helper+0x2ac/0x2f0 [ 32.846697] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 32.846754] kunit_try_run_case+0x170/0x3f0 [ 32.846836] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.846933] kthread+0x328/0x630 [ 32.847054] ret_from_fork+0x10/0x20 [ 32.847410] [ 32.847505] The buggy address belongs to the physical page: [ 32.847666] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063e8 [ 32.847938] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.847998] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.848067] page_type: f8(unknown) [ 32.848119] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.848246] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.848612] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.848675] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.848732] head: 0bfffe0000000002 ffffc1ffc318fa01 00000000ffffffff 00000000ffffffff [ 32.848865] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.848929] page dumped because: kasan: bad access detected [ 32.849389] [ 32.849419] Memory state around the buggy address: [ 32.849462] fff00000c63e9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.849647] fff00000c63e9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.849707] >fff00000c63ea000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.849752] ^ [ 32.849797] fff00000c63ea080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.849852] fff00000c63ea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.849907] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 32.219266] ================================================================== [ 32.219472] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300 [ 32.219645] Read of size 1 at addr fff00000c7751000 by task kunit_try_catch/226 [ 32.219778] [ 32.220773] CPU: 1 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 32.221103] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.221170] Hardware name: linux,dummy-virt (DT) [ 32.221245] Call trace: [ 32.221304] show_stack+0x20/0x38 (C) [ 32.221672] dump_stack_lvl+0x8c/0xd0 [ 32.221838] print_report+0x118/0x608 [ 32.221998] kasan_report+0xdc/0x128 [ 32.222321] __kasan_check_byte+0x54/0x70 [ 32.222494] kmem_cache_destroy+0x34/0x218 [ 32.222779] kmem_cache_double_destroy+0x174/0x300 [ 32.222907] kunit_try_run_case+0x170/0x3f0 [ 32.223020] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.223145] kthread+0x328/0x630 [ 32.223699] ret_from_fork+0x10/0x20 [ 32.224039] [ 32.224108] Allocated by task 226: [ 32.224322] kasan_save_stack+0x3c/0x68 [ 32.224474] kasan_save_track+0x20/0x40 [ 32.224929] kasan_save_alloc_info+0x40/0x58 [ 32.225116] __kasan_slab_alloc+0xa8/0xb0 [ 32.225329] kmem_cache_alloc_noprof+0x10c/0x398 [ 32.225474] __kmem_cache_create_args+0x178/0x280 [ 32.225578] kmem_cache_double_destroy+0xc0/0x300 [ 32.226027] kunit_try_run_case+0x170/0x3f0 [ 32.226239] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.226413] kthread+0x328/0x630 [ 32.226561] ret_from_fork+0x10/0x20 [ 32.226768] [ 32.226821] Freed by task 226: [ 32.226900] kasan_save_stack+0x3c/0x68 [ 32.227016] kasan_save_track+0x20/0x40 [ 32.227112] kasan_save_free_info+0x4c/0x78 [ 32.227214] __kasan_slab_free+0x6c/0x98 [ 32.227311] kmem_cache_free+0x260/0x468 [ 32.227754] slab_kmem_cache_release+0x38/0x50 [ 32.227992] kmem_cache_release+0x1c/0x30 [ 32.228567] kobject_put+0x17c/0x420 [ 32.228810] sysfs_slab_release+0x1c/0x30 [ 32.229013] kmem_cache_destroy+0x118/0x218 [ 32.229254] kmem_cache_double_destroy+0x128/0x300 [ 32.229357] kunit_try_run_case+0x170/0x3f0 [ 32.229764] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.230059] kthread+0x328/0x630 [ 32.230151] ret_from_fork+0x10/0x20 [ 32.230243] [ 32.230303] The buggy address belongs to the object at fff00000c7751000 [ 32.230303] which belongs to the cache kmem_cache of size 208 [ 32.231048] The buggy address is located 0 bytes inside of [ 32.231048] freed 208-byte region [fff00000c7751000, fff00000c77510d0) [ 32.231610] [ 32.231859] The buggy address belongs to the physical page: [ 32.232170] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751 [ 32.232654] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.233058] page_type: f5(slab) [ 32.233185] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000 [ 32.233692] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000 [ 32.234081] page dumped because: kasan: bad access detected [ 32.234170] [ 32.234213] Memory state around the buggy address: [ 32.234285] fff00000c7750f00: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc [ 32.234381] fff00000c7750f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.234477] >fff00000c7751000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.235034] ^ [ 32.235195] fff00000c7751080: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 32.235382] fff00000c7751100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.235567] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 32.070604] ================================================================== [ 32.070810] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468 [ 32.071011] Read of size 1 at addr fff00000c7751000 by task kunit_try_catch/224 [ 32.071137] [ 32.071235] CPU: 1 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 32.071456] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.071525] Hardware name: linux,dummy-virt (DT) [ 32.071611] Call trace: [ 32.071670] show_stack+0x20/0x38 (C) [ 32.072077] dump_stack_lvl+0x8c/0xd0 [ 32.072845] print_report+0x118/0x608 [ 32.073082] kasan_report+0xdc/0x128 [ 32.073245] __asan_report_load1_noabort+0x20/0x30 [ 32.073458] kmem_cache_rcu_uaf+0x388/0x468 [ 32.073571] kunit_try_run_case+0x170/0x3f0 [ 32.074125] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.074294] kthread+0x328/0x630 [ 32.074446] ret_from_fork+0x10/0x20 [ 32.074601] [ 32.074651] Allocated by task 224: [ 32.074732] kasan_save_stack+0x3c/0x68 [ 32.074838] kasan_save_track+0x20/0x40 [ 32.074954] kasan_save_alloc_info+0x40/0x58 [ 32.075088] __kasan_slab_alloc+0xa8/0xb0 [ 32.075192] kmem_cache_alloc_noprof+0x10c/0x398 [ 32.075300] kmem_cache_rcu_uaf+0x12c/0x468 [ 32.075392] kunit_try_run_case+0x170/0x3f0 [ 32.075488] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.075602] kthread+0x328/0x630 [ 32.075686] ret_from_fork+0x10/0x20 [ 32.075781] [ 32.076220] Freed by task 0: [ 32.076426] kasan_save_stack+0x3c/0x68 [ 32.076566] kasan_save_track+0x20/0x40 [ 32.076668] kasan_save_free_info+0x4c/0x78 [ 32.077036] __kasan_slab_free+0x6c/0x98 [ 32.077291] slab_free_after_rcu_debug+0xd4/0x2f8 [ 32.077400] rcu_core+0x9f4/0x1e20 [ 32.077725] rcu_core_si+0x18/0x30 [ 32.077824] handle_softirqs+0x374/0xb28 [ 32.077935] __do_softirq+0x1c/0x28 [ 32.078062] [ 32.078133] Last potentially related work creation: [ 32.078222] kasan_save_stack+0x3c/0x68 [ 32.078336] kasan_record_aux_stack+0xb4/0xc8 [ 32.078421] kmem_cache_free+0x120/0x468 [ 32.078491] kmem_cache_rcu_uaf+0x16c/0x468 [ 32.078586] kunit_try_run_case+0x170/0x3f0 [ 32.078668] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.078763] kthread+0x328/0x630 [ 32.079050] ret_from_fork+0x10/0x20 [ 32.079202] [ 32.079311] The buggy address belongs to the object at fff00000c7751000 [ 32.079311] which belongs to the cache test_cache of size 200 [ 32.079462] The buggy address is located 0 bytes inside of [ 32.079462] freed 200-byte region [fff00000c7751000, fff00000c77510c8) [ 32.079680] [ 32.079760] The buggy address belongs to the physical page: [ 32.079889] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107751 [ 32.080069] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.080230] page_type: f5(slab) [ 32.080332] raw: 0bfffe0000000000 fff00000c1112dc0 dead000000000122 0000000000000000 [ 32.080464] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 32.080577] page dumped because: kasan: bad access detected [ 32.080661] [ 32.080708] Memory state around the buggy address: [ 32.080793] fff00000c7750f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.080915] fff00000c7750f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.081016] >fff00000c7751000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.081110] ^ [ 32.081186] fff00000c7751080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 32.081754] fff00000c7751100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.081870] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 31.563616] ================================================================== [ 31.564108] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 31.564494] Free of addr fff00000c774f001 by task kunit_try_catch/222 [ 31.564721] [ 31.564946] CPU: 1 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 31.565425] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.565600] Hardware name: linux,dummy-virt (DT) [ 31.565707] Call trace: [ 31.565944] show_stack+0x20/0x38 (C) [ 31.566082] dump_stack_lvl+0x8c/0xd0 [ 31.566221] print_report+0x118/0x608 [ 31.566355] kasan_report_invalid_free+0xc0/0xe8 [ 31.566706] check_slab_allocation+0xfc/0x108 [ 31.567000] __kasan_slab_pre_free+0x2c/0x48 [ 31.567276] kmem_cache_free+0xf0/0x468 [ 31.567631] kmem_cache_invalid_free+0x184/0x3c8 [ 31.567862] kunit_try_run_case+0x170/0x3f0 [ 31.568051] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.568204] kthread+0x328/0x630 [ 31.568393] ret_from_fork+0x10/0x20 [ 31.568600] [ 31.568652] Allocated by task 222: [ 31.568727] kasan_save_stack+0x3c/0x68 [ 31.568824] kasan_save_track+0x20/0x40 [ 31.568924] kasan_save_alloc_info+0x40/0x58 [ 31.569026] __kasan_slab_alloc+0xa8/0xb0 [ 31.569564] kmem_cache_alloc_noprof+0x10c/0x398 [ 31.569919] kmem_cache_invalid_free+0x12c/0x3c8 [ 31.570032] kunit_try_run_case+0x170/0x3f0 [ 31.570148] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.570239] kthread+0x328/0x630 [ 31.570337] ret_from_fork+0x10/0x20 [ 31.570410] [ 31.570456] The buggy address belongs to the object at fff00000c774f000 [ 31.570456] which belongs to the cache test_cache of size 200 [ 31.570906] The buggy address is located 1 bytes inside of [ 31.570906] 200-byte region [fff00000c774f000, fff00000c774f0c8) [ 31.571087] [ 31.571150] The buggy address belongs to the physical page: [ 31.571263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10774f [ 31.571561] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.571689] page_type: f5(slab) [ 31.571897] raw: 0bfffe0000000000 fff00000c1112c80 dead000000000122 0000000000000000 [ 31.572217] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 31.572325] page dumped because: kasan: bad access detected [ 31.572393] [ 31.572435] Memory state around the buggy address: [ 31.572517] fff00000c774ef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.572668] fff00000c774ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.572821] >fff00000c774f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.572969] ^ [ 31.573069] fff00000c774f080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 31.573178] fff00000c774f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.573275] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 29.735325] ================================================================== [ 29.735544] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 29.735692] Read of size 1 at addr fff00000c4726c5f by task kunit_try_catch/149 [ 29.735818] [ 29.735921] CPU: 1 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 29.736141] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.736208] Hardware name: linux,dummy-virt (DT) [ 29.736284] Call trace: [ 29.736338] show_stack+0x20/0x38 (C) [ 29.736479] dump_stack_lvl+0x8c/0xd0 [ 29.736592] print_report+0x118/0x608 [ 29.736698] kasan_report+0xdc/0x128 [ 29.736829] __asan_report_load1_noabort+0x20/0x30 [ 29.736999] kmalloc_oob_left+0x2ec/0x320 [ 29.737191] kunit_try_run_case+0x170/0x3f0 [ 29.737371] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.737550] kthread+0x328/0x630 [ 29.737660] ret_from_fork+0x10/0x20 [ 29.737796] [ 29.737838] Allocated by task 21: [ 29.737937] kasan_save_stack+0x3c/0x68 [ 29.738077] kasan_save_track+0x20/0x40 [ 29.738167] kasan_save_alloc_info+0x40/0x58 [ 29.738284] __kasan_kmalloc+0xd4/0xd8 [ 29.738362] __kmalloc_cache_node_noprof+0x178/0x3d0 [ 29.738443] build_sched_domains+0x32c/0x3768 [ 29.738557] partition_sched_domains+0x79c/0x1098 [ 29.738649] rebuild_sched_domains_locked+0x494/0xde0 [ 29.738749] cpuset_handle_hotplug+0xab0/0x1480 [ 29.738824] cpuset_update_active_cpus+0x18/0x30 [ 29.738916] sched_cpu_activate+0x2d0/0x388 [ 29.739016] cpuhp_invoke_callback+0x5b8/0x1620 [ 29.739112] cpuhp_thread_fun+0x230/0x5d8 [ 29.739239] smpboot_thread_fn+0x2e8/0x760 [ 29.739377] kthread+0x328/0x630 [ 29.739485] ret_from_fork+0x10/0x20 [ 29.739605] [ 29.739720] Freed by task 21: [ 29.739843] kasan_save_stack+0x3c/0x68 [ 29.739989] kasan_save_track+0x20/0x40 [ 29.740080] kasan_save_free_info+0x4c/0x78 [ 29.740211] __kasan_slab_free+0x6c/0x98 [ 29.740337] kfree+0x214/0x3c8 [ 29.740452] build_sched_domains+0x1c64/0x3768 [ 29.740587] partition_sched_domains+0x79c/0x1098 [ 29.740723] rebuild_sched_domains_locked+0x494/0xde0 [ 29.740861] cpuset_handle_hotplug+0xab0/0x1480 [ 29.740958] cpuset_update_active_cpus+0x18/0x30 [ 29.741034] sched_cpu_activate+0x2d0/0x388 [ 29.741120] cpuhp_invoke_callback+0x5b8/0x1620 [ 29.741219] cpuhp_thread_fun+0x230/0x5d8 [ 29.741314] smpboot_thread_fn+0x2e8/0x760 [ 29.741447] kthread+0x328/0x630 [ 29.741532] ret_from_fork+0x10/0x20 [ 29.741653] [ 29.741723] The buggy address belongs to the object at fff00000c4726c40 [ 29.741723] which belongs to the cache kmalloc-16 of size 16 [ 29.741885] The buggy address is located 15 bytes to the right of [ 29.741885] allocated 16-byte region [fff00000c4726c40, fff00000c4726c50) [ 29.742056] [ 29.742113] The buggy address belongs to the physical page: [ 29.742198] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104726 [ 29.742327] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.742509] page_type: f5(slab) [ 29.742638] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 29.742800] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 29.742916] page dumped because: kasan: bad access detected [ 29.743000] [ 29.743043] Memory state around the buggy address: [ 29.743126] fff00000c4726b00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.743250] fff00000c4726b80: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.743339] >fff00000c4726c00: fa fb fc fc fa fb fc fc fa fb fc fc 00 07 fc fc [ 29.743412] ^ [ 29.743511] fff00000c4726c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.743610] fff00000c4726d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.743694] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 29.673672] ================================================================== [ 29.674739] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 29.677241] Write of size 1 at addr fff00000c6466573 by task kunit_try_catch/147 [ 29.677570] [ 29.679788] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 29.680227] Tainted: [N]=TEST [ 29.680308] Hardware name: linux,dummy-virt (DT) [ 29.680924] Call trace: [ 29.681358] show_stack+0x20/0x38 (C) [ 29.681816] dump_stack_lvl+0x8c/0xd0 [ 29.681987] print_report+0x118/0x608 [ 29.682100] kasan_report+0xdc/0x128 [ 29.682240] __asan_report_store1_noabort+0x20/0x30 [ 29.682366] kmalloc_oob_right+0x5a4/0x660 [ 29.682475] kunit_try_run_case+0x170/0x3f0 [ 29.682589] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.682721] kthread+0x328/0x630 [ 29.682840] ret_from_fork+0x10/0x20 [ 29.683406] [ 29.683517] Allocated by task 147: [ 29.683739] kasan_save_stack+0x3c/0x68 [ 29.683906] kasan_save_track+0x20/0x40 [ 29.684032] kasan_save_alloc_info+0x40/0x58 [ 29.684126] __kasan_kmalloc+0xd4/0xd8 [ 29.684355] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.684468] kmalloc_oob_right+0xb0/0x660 [ 29.684588] kunit_try_run_case+0x170/0x3f0 [ 29.684688] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.684852] kthread+0x328/0x630 [ 29.684967] ret_from_fork+0x10/0x20 [ 29.685152] [ 29.685378] The buggy address belongs to the object at fff00000c6466500 [ 29.685378] which belongs to the cache kmalloc-128 of size 128 [ 29.685669] The buggy address is located 0 bytes to the right of [ 29.685669] allocated 115-byte region [fff00000c6466500, fff00000c6466573) [ 29.685856] [ 29.686055] The buggy address belongs to the physical page: [ 29.686447] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106466 [ 29.688272] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.689466] page_type: f5(slab) [ 29.692063] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 29.692953] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.693338] page dumped because: kasan: bad access detected [ 29.693774] [ 29.694757] Memory state around the buggy address: [ 29.696254] fff00000c6466400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.696475] fff00000c6466480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.696665] >fff00000c6466500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.696798] ^ [ 29.697010] fff00000c6466580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.697117] fff00000c6466600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.697272] ================================================================== [ 29.712160] ================================================================== [ 29.712288] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 29.712407] Read of size 1 at addr fff00000c6466580 by task kunit_try_catch/147 [ 29.712529] [ 29.712614] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 29.712827] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.712906] Hardware name: linux,dummy-virt (DT) [ 29.712986] Call trace: [ 29.713778] show_stack+0x20/0x38 (C) [ 29.713927] dump_stack_lvl+0x8c/0xd0 [ 29.714072] print_report+0x118/0x608 [ 29.714214] kasan_report+0xdc/0x128 [ 29.714356] __asan_report_load1_noabort+0x20/0x30 [ 29.714487] kmalloc_oob_right+0x5d0/0x660 [ 29.714618] kunit_try_run_case+0x170/0x3f0 [ 29.714749] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.714980] kthread+0x328/0x630 [ 29.715224] ret_from_fork+0x10/0x20 [ 29.715531] [ 29.715689] Allocated by task 147: [ 29.716074] kasan_save_stack+0x3c/0x68 [ 29.716428] kasan_save_track+0x20/0x40 [ 29.716577] kasan_save_alloc_info+0x40/0x58 [ 29.716796] __kasan_kmalloc+0xd4/0xd8 [ 29.716950] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.717477] kmalloc_oob_right+0xb0/0x660 [ 29.717570] kunit_try_run_case+0x170/0x3f0 [ 29.717650] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.717743] kthread+0x328/0x630 [ 29.717822] ret_from_fork+0x10/0x20 [ 29.717943] [ 29.718009] The buggy address belongs to the object at fff00000c6466500 [ 29.718009] which belongs to the cache kmalloc-128 of size 128 [ 29.718165] The buggy address is located 13 bytes to the right of [ 29.718165] allocated 115-byte region [fff00000c6466500, fff00000c6466573) [ 29.718309] [ 29.718351] The buggy address belongs to the physical page: [ 29.718445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106466 [ 29.718617] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.718796] page_type: f5(slab) [ 29.718953] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 29.719137] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.719273] page dumped because: kasan: bad access detected [ 29.719360] [ 29.719425] Memory state around the buggy address: [ 29.719533] fff00000c6466480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.719689] fff00000c6466500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.719804] >fff00000c6466580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.719918] ^ [ 29.719980] fff00000c6466600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.720082] fff00000c6466680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.720744] ================================================================== [ 29.700568] ================================================================== [ 29.700884] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 29.701060] Write of size 1 at addr fff00000c6466578 by task kunit_try_catch/147 [ 29.701210] [ 29.701326] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 29.701889] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.701957] Hardware name: linux,dummy-virt (DT) [ 29.702032] Call trace: [ 29.702088] show_stack+0x20/0x38 (C) [ 29.702205] dump_stack_lvl+0x8c/0xd0 [ 29.702314] print_report+0x118/0x608 [ 29.702424] kasan_report+0xdc/0x128 [ 29.702540] __asan_report_store1_noabort+0x20/0x30 [ 29.702664] kmalloc_oob_right+0x538/0x660 [ 29.702851] kunit_try_run_case+0x170/0x3f0 [ 29.703037] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.703175] kthread+0x328/0x630 [ 29.703290] ret_from_fork+0x10/0x20 [ 29.703415] [ 29.703460] Allocated by task 147: [ 29.703530] kasan_save_stack+0x3c/0x68 [ 29.703631] kasan_save_track+0x20/0x40 [ 29.703728] kasan_save_alloc_info+0x40/0x58 [ 29.703827] __kasan_kmalloc+0xd4/0xd8 [ 29.705553] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.705761] kmalloc_oob_right+0xb0/0x660 [ 29.706013] kunit_try_run_case+0x170/0x3f0 [ 29.706452] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.706725] kthread+0x328/0x630 [ 29.706923] ret_from_fork+0x10/0x20 [ 29.707152] [ 29.707211] The buggy address belongs to the object at fff00000c6466500 [ 29.707211] which belongs to the cache kmalloc-128 of size 128 [ 29.707783] The buggy address is located 5 bytes to the right of [ 29.707783] allocated 115-byte region [fff00000c6466500, fff00000c6466573) [ 29.708373] [ 29.708460] The buggy address belongs to the physical page: [ 29.708689] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106466 [ 29.708883] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.709003] page_type: f5(slab) [ 29.709107] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 29.709244] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.709721] page dumped because: kasan: bad access detected [ 29.709798] [ 29.709840] Memory state around the buggy address: [ 29.709920] fff00000c6466400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.710020] fff00000c6466480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.710142] >fff00000c6466500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.710238] ^ [ 29.710330] fff00000c6466580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.710420] fff00000c6466600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.710503] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 31.482149] ================================================================== [ 31.482448] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 31.482653] Free of addr fff00000c774d000 by task kunit_try_catch/220 [ 31.482761] [ 31.482867] CPU: 1 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 31.483224] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.483329] Hardware name: linux,dummy-virt (DT) [ 31.483441] Call trace: [ 31.483530] show_stack+0x20/0x38 (C) [ 31.483659] dump_stack_lvl+0x8c/0xd0 [ 31.483831] print_report+0x118/0x608 [ 31.483958] kasan_report_invalid_free+0xc0/0xe8 [ 31.484107] check_slab_allocation+0xd4/0x108 [ 31.484232] __kasan_slab_pre_free+0x2c/0x48 [ 31.484336] kmem_cache_free+0xf0/0x468 [ 31.484446] kmem_cache_double_free+0x190/0x3c8 [ 31.484579] kunit_try_run_case+0x170/0x3f0 [ 31.484745] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.484918] kthread+0x328/0x630 [ 31.485051] ret_from_fork+0x10/0x20 [ 31.485190] [ 31.485230] Allocated by task 220: [ 31.485302] kasan_save_stack+0x3c/0x68 [ 31.485423] kasan_save_track+0x20/0x40 [ 31.485515] kasan_save_alloc_info+0x40/0x58 [ 31.485602] __kasan_slab_alloc+0xa8/0xb0 [ 31.485707] kmem_cache_alloc_noprof+0x10c/0x398 [ 31.485784] kmem_cache_double_free+0x12c/0x3c8 [ 31.485867] kunit_try_run_case+0x170/0x3f0 [ 31.485965] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.486101] kthread+0x328/0x630 [ 31.486267] ret_from_fork+0x10/0x20 [ 31.486370] [ 31.486411] Freed by task 220: [ 31.486475] kasan_save_stack+0x3c/0x68 [ 31.486594] kasan_save_track+0x20/0x40 [ 31.486700] kasan_save_free_info+0x4c/0x78 [ 31.486787] __kasan_slab_free+0x6c/0x98 [ 31.486885] kmem_cache_free+0x260/0x468 [ 31.486992] kmem_cache_double_free+0x140/0x3c8 [ 31.487092] kunit_try_run_case+0x170/0x3f0 [ 31.487182] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.487285] kthread+0x328/0x630 [ 31.487367] ret_from_fork+0x10/0x20 [ 31.487458] [ 31.487519] The buggy address belongs to the object at fff00000c774d000 [ 31.487519] which belongs to the cache test_cache of size 200 [ 31.487679] The buggy address is located 0 bytes inside of [ 31.487679] 200-byte region [fff00000c774d000, fff00000c774d0c8) [ 31.487816] [ 31.487867] The buggy address belongs to the physical page: [ 31.487960] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10774d [ 31.488126] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.488283] page_type: f5(slab) [ 31.488426] raw: 0bfffe0000000000 fff00000c1112b40 dead000000000122 0000000000000000 [ 31.488560] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 31.488656] page dumped because: kasan: bad access detected [ 31.488726] [ 31.488768] Memory state around the buggy address: [ 31.488881] fff00000c774cf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.488990] fff00000c774cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.489095] >fff00000c774d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.489204] ^ [ 31.489305] fff00000c774d080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 31.489445] fff00000c774d100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.489655] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 31.280530] ================================================================== [ 31.280721] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430 [ 31.282087] Read of size 1 at addr fff00000c774a0c8 by task kunit_try_catch/218 [ 31.282721] [ 31.282818] CPU: 1 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 31.283082] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.283156] Hardware name: linux,dummy-virt (DT) [ 31.283247] Call trace: [ 31.283308] show_stack+0x20/0x38 (C) [ 31.283912] dump_stack_lvl+0x8c/0xd0 [ 31.284084] print_report+0x118/0x608 [ 31.284208] kasan_report+0xdc/0x128 [ 31.284316] __asan_report_load1_noabort+0x20/0x30 [ 31.284912] kmem_cache_oob+0x344/0x430 [ 31.285136] kunit_try_run_case+0x170/0x3f0 [ 31.285338] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.285600] kthread+0x328/0x630 [ 31.285703] ret_from_fork+0x10/0x20 [ 31.285800] [ 31.286301] Allocated by task 218: [ 31.286528] kasan_save_stack+0x3c/0x68 [ 31.286658] kasan_save_track+0x20/0x40 [ 31.286821] kasan_save_alloc_info+0x40/0x58 [ 31.286972] __kasan_slab_alloc+0xa8/0xb0 [ 31.287473] kmem_cache_alloc_noprof+0x10c/0x398 [ 31.287662] kmem_cache_oob+0x12c/0x430 [ 31.287993] kunit_try_run_case+0x170/0x3f0 [ 31.288305] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.288424] kthread+0x328/0x630 [ 31.288622] ret_from_fork+0x10/0x20 [ 31.288823] [ 31.288972] The buggy address belongs to the object at fff00000c774a000 [ 31.288972] which belongs to the cache test_cache of size 200 [ 31.289344] The buggy address is located 0 bytes to the right of [ 31.289344] allocated 200-byte region [fff00000c774a000, fff00000c774a0c8) [ 31.289516] [ 31.289847] The buggy address belongs to the physical page: [ 31.289944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10774a [ 31.290166] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.290318] page_type: f5(slab) [ 31.290816] raw: 0bfffe0000000000 fff00000c1112a00 dead000000000122 0000000000000000 [ 31.290997] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 31.291216] page dumped because: kasan: bad access detected [ 31.291303] [ 31.291364] Memory state around the buggy address: [ 31.291520] fff00000c7749f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.291713] fff00000c774a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.291833] >fff00000c774a080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 31.291946] ^ [ 31.292286] fff00000c774a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.292405] fff00000c774a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.292506] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 31.191351] ================================================================== [ 31.191559] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 31.192890] Read of size 8 at addr fff00000c771ef40 by task kunit_try_catch/211 [ 31.193476] [ 31.193584] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 31.193863] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.193949] Hardware name: linux,dummy-virt (DT) [ 31.194022] Call trace: [ 31.194076] show_stack+0x20/0x38 (C) [ 31.194209] dump_stack_lvl+0x8c/0xd0 [ 31.194313] print_report+0x118/0x608 [ 31.194435] kasan_report+0xdc/0x128 [ 31.194532] __asan_report_load8_noabort+0x20/0x30 [ 31.194641] workqueue_uaf+0x480/0x4a8 [ 31.194746] kunit_try_run_case+0x170/0x3f0 [ 31.194836] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.194967] kthread+0x328/0x630 [ 31.195089] ret_from_fork+0x10/0x20 [ 31.195213] [ 31.195257] Allocated by task 211: [ 31.195330] kasan_save_stack+0x3c/0x68 [ 31.195481] kasan_save_track+0x20/0x40 [ 31.195605] kasan_save_alloc_info+0x40/0x58 [ 31.195708] __kasan_kmalloc+0xd4/0xd8 [ 31.195805] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.195917] workqueue_uaf+0x13c/0x4a8 [ 31.196012] kunit_try_run_case+0x170/0x3f0 [ 31.196123] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.196216] kthread+0x328/0x630 [ 31.196290] ret_from_fork+0x10/0x20 [ 31.196385] [ 31.196435] Freed by task 32: [ 31.196508] kasan_save_stack+0x3c/0x68 [ 31.196637] kasan_save_track+0x20/0x40 [ 31.196737] kasan_save_free_info+0x4c/0x78 [ 31.196868] __kasan_slab_free+0x6c/0x98 [ 31.196996] kfree+0x214/0x3c8 [ 31.197100] workqueue_uaf_work+0x18/0x30 [ 31.197181] process_one_work+0x530/0xf98 [ 31.197297] worker_thread+0x618/0xf38 [ 31.197373] kthread+0x328/0x630 [ 31.197574] ret_from_fork+0x10/0x20 [ 31.197654] [ 31.197756] Last potentially related work creation: [ 31.197817] kasan_save_stack+0x3c/0x68 [ 31.197927] kasan_record_aux_stack+0xb4/0xc8 [ 31.198070] __queue_work+0x65c/0xfe0 [ 31.198179] queue_work_on+0xbc/0xf8 [ 31.198378] workqueue_uaf+0x210/0x4a8 [ 31.198535] kunit_try_run_case+0x170/0x3f0 [ 31.198673] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.198799] kthread+0x328/0x630 [ 31.198900] ret_from_fork+0x10/0x20 [ 31.199003] [ 31.199852] The buggy address belongs to the object at fff00000c771ef40 [ 31.199852] which belongs to the cache kmalloc-32 of size 32 [ 31.200080] The buggy address is located 0 bytes inside of [ 31.200080] freed 32-byte region [fff00000c771ef40, fff00000c771ef60) [ 31.200451] [ 31.200519] The buggy address belongs to the physical page: [ 31.200611] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10771e [ 31.200753] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.200892] page_type: f5(slab) [ 31.201241] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 31.202009] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 31.202125] page dumped because: kasan: bad access detected [ 31.202200] [ 31.202244] Memory state around the buggy address: [ 31.202348] fff00000c771ee00: 00 00 00 fc fc fc fc fc 00 00 03 fc fc fc fc fc [ 31.202504] fff00000c771ee80: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 31.202640] >fff00000c771ef00: 00 00 00 07 fc fc fc fc fa fb fb fb fc fc fc fc [ 31.202740] ^ [ 31.202824] fff00000c771ef80: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.202926] fff00000c771f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.203013] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[ 31.139439] ================================================================== [ 31.139719] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 31.140442] Read of size 4 at addr fff00000c771ed80 by task swapper/1/0 [ 31.140659] [ 31.140760] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 31.140992] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.141062] Hardware name: linux,dummy-virt (DT) [ 31.141139] Call trace: [ 31.141203] show_stack+0x20/0x38 (C) [ 31.141336] dump_stack_lvl+0x8c/0xd0 [ 31.141972] print_report+0x118/0x608 [ 31.142190] kasan_report+0xdc/0x128 [ 31.142529] __asan_report_load4_noabort+0x20/0x30 [ 31.142732] rcu_uaf_reclaim+0x64/0x70 [ 31.142926] rcu_core+0x9f4/0x1e20 [ 31.143147] rcu_core_si+0x18/0x30 [ 31.143453] handle_softirqs+0x374/0xb28 [ 31.143705] __do_softirq+0x1c/0x28 [ 31.143818] ____do_softirq+0x18/0x30 [ 31.143927] call_on_irq_stack+0x24/0x30 [ 31.144031] do_softirq_own_stack+0x24/0x38 [ 31.144136] __irq_exit_rcu+0x1fc/0x318 [ 31.144268] irq_exit_rcu+0x1c/0x80 [ 31.144431] el1_interrupt+0x38/0x58 [ 31.144601] el1h_64_irq_handler+0x18/0x28 [ 31.144772] el1h_64_irq+0x6c/0x70 [ 31.145158] arch_local_irq_enable+0x4/0x8 (P) [ 31.145345] do_idle+0x384/0x4e8 [ 31.145509] cpu_startup_entry+0x68/0x80 [ 31.145623] secondary_start_kernel+0x288/0x340 [ 31.145927] __secondary_switched+0xc0/0xc8 [ 31.146266] [ 31.146405] Allocated by task 209: [ 31.146489] kasan_save_stack+0x3c/0x68 [ 31.146606] kasan_save_track+0x20/0x40 [ 31.146702] kasan_save_alloc_info+0x40/0x58 [ 31.146798] __kasan_kmalloc+0xd4/0xd8 [ 31.146889] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.146993] rcu_uaf+0xb0/0x2d8 [ 31.147395] kunit_try_run_case+0x170/0x3f0 [ 31.147527] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.147657] kthread+0x328/0x630 [ 31.147735] ret_from_fork+0x10/0x20 [ 31.147821] [ 31.148261] Freed by task 0: [ 31.148369] kasan_save_stack+0x3c/0x68 [ 31.148524] kasan_save_track+0x20/0x40 [ 31.148635] kasan_save_free_info+0x4c/0x78 [ 31.148737] __kasan_slab_free+0x6c/0x98 [ 31.148827] kfree+0x214/0x3c8 [ 31.148921] rcu_uaf_reclaim+0x28/0x70 [ 31.149017] rcu_core+0x9f4/0x1e20 [ 31.149103] rcu_core_si+0x18/0x30 [ 31.149190] handle_softirqs+0x374/0xb28 [ 31.149317] __do_softirq+0x1c/0x28 [ 31.149443] [ 31.149526] Last potentially related work creation: [ 31.149607] kasan_save_stack+0x3c/0x68 [ 31.150108] kasan_record_aux_stack+0xb4/0xc8 [ 31.150224] __call_rcu_common.constprop.0+0x74/0x8c8 [ 31.150526] call_rcu+0x18/0x30 [ 31.150916] rcu_uaf+0x14c/0x2d8 [ 31.151019] kunit_try_run_case+0x170/0x3f0 [ 31.151125] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.151286] kthread+0x328/0x630 [ 31.151370] ret_from_fork+0x10/0x20 [ 31.151489] [ 31.151558] The buggy address belongs to the object at fff00000c771ed80 [ 31.151558] which belongs to the cache kmalloc-32 of size 32 [ 31.151715] The buggy address is located 0 bytes inside of [ 31.151715] freed 32-byte region [fff00000c771ed80, fff00000c771eda0) [ 31.151883] [ 31.151943] The buggy address belongs to the physical page: [ 31.152025] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10771e [ 31.152165] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.152348] page_type: f5(slab) [ 31.152501] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 31.152643] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 31.152760] page dumped because: kasan: bad access detected [ 31.152885] [ 31.152929] Memory state around the buggy address: [ 31.153000] fff00000c771ec80: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 31.153101] fff00000c771ed00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 31.153238] >fff00000c771ed80: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 31.153344] ^ [ 31.153420] fff00000c771ee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.153535] fff00000c771ee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.153633] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 30.940490] ================================================================== [ 30.940637] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 30.940772] Read of size 1 at addr fff00000c6466e78 by task kunit_try_catch/207 [ 30.940912] [ 30.941005] CPU: 1 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 30.941226] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.941299] Hardware name: linux,dummy-virt (DT) [ 30.941383] Call trace: [ 30.943681] show_stack+0x20/0x38 (C) [ 30.943915] dump_stack_lvl+0x8c/0xd0 [ 30.944099] print_report+0x118/0x608 [ 30.945617] kasan_report+0xdc/0x128 [ 30.945744] __asan_report_load1_noabort+0x20/0x30 [ 30.945881] ksize_uaf+0x544/0x5f8 [ 30.946001] kunit_try_run_case+0x170/0x3f0 [ 30.946127] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.946265] kthread+0x328/0x630 [ 30.947651] ret_from_fork+0x10/0x20 [ 30.947863] [ 30.947925] Allocated by task 207: [ 30.948376] kasan_save_stack+0x3c/0x68 [ 30.948501] kasan_save_track+0x20/0x40 [ 30.948600] kasan_save_alloc_info+0x40/0x58 [ 30.949425] __kasan_kmalloc+0xd4/0xd8 [ 30.949647] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.949816] ksize_uaf+0xb8/0x5f8 [ 30.949912] kunit_try_run_case+0x170/0x3f0 [ 30.950604] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.950774] kthread+0x328/0x630 [ 30.950923] ret_from_fork+0x10/0x20 [ 30.951326] [ 30.951522] Freed by task 207: [ 30.951642] kasan_save_stack+0x3c/0x68 [ 30.951751] kasan_save_track+0x20/0x40 [ 30.951847] kasan_save_free_info+0x4c/0x78 [ 30.951955] __kasan_slab_free+0x6c/0x98 [ 30.952345] kfree+0x214/0x3c8 [ 30.952656] ksize_uaf+0x11c/0x5f8 [ 30.952967] kunit_try_run_case+0x170/0x3f0 [ 30.953265] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.953382] kthread+0x328/0x630 [ 30.953455] ret_from_fork+0x10/0x20 [ 30.953546] [ 30.953598] The buggy address belongs to the object at fff00000c6466e00 [ 30.953598] which belongs to the cache kmalloc-128 of size 128 [ 30.954061] The buggy address is located 120 bytes inside of [ 30.954061] freed 128-byte region [fff00000c6466e00, fff00000c6466e80) [ 30.954679] [ 30.954730] The buggy address belongs to the physical page: [ 30.954796] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106466 [ 30.955166] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.955420] page_type: f5(slab) [ 30.955530] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 30.955662] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.955776] page dumped because: kasan: bad access detected [ 30.955844] [ 30.955903] Memory state around the buggy address: [ 30.956005] fff00000c6466d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.956109] fff00000c6466d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.956213] >fff00000c6466e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.956341] ^ [ 30.956457] fff00000c6466e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.956573] fff00000c6466f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.956667] ================================================================== [ 30.907685] ================================================================== [ 30.907865] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 30.908021] Read of size 1 at addr fff00000c6466e00 by task kunit_try_catch/207 [ 30.908146] [ 30.908235] CPU: 1 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 30.908458] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.908523] Hardware name: linux,dummy-virt (DT) [ 30.908604] Call trace: [ 30.908660] show_stack+0x20/0x38 (C) [ 30.908786] dump_stack_lvl+0x8c/0xd0 [ 30.908921] print_report+0x118/0x608 [ 30.909043] kasan_report+0xdc/0x128 [ 30.909158] __kasan_check_byte+0x54/0x70 [ 30.909274] ksize+0x30/0x88 [ 30.909377] ksize_uaf+0x168/0x5f8 [ 30.909487] kunit_try_run_case+0x170/0x3f0 [ 30.909603] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.909784] kthread+0x328/0x630 [ 30.909928] ret_from_fork+0x10/0x20 [ 30.910038] [ 30.910083] Allocated by task 207: [ 30.910156] kasan_save_stack+0x3c/0x68 [ 30.910268] kasan_save_track+0x20/0x40 [ 30.910367] kasan_save_alloc_info+0x40/0x58 [ 30.910472] __kasan_kmalloc+0xd4/0xd8 [ 30.910552] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.910674] ksize_uaf+0xb8/0x5f8 [ 30.910790] kunit_try_run_case+0x170/0x3f0 [ 30.910927] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.911082] kthread+0x328/0x630 [ 30.911185] ret_from_fork+0x10/0x20 [ 30.911300] [ 30.911358] Freed by task 207: [ 30.911426] kasan_save_stack+0x3c/0x68 [ 30.911524] kasan_save_track+0x20/0x40 [ 30.911618] kasan_save_free_info+0x4c/0x78 [ 30.911716] __kasan_slab_free+0x6c/0x98 [ 30.911810] kfree+0x214/0x3c8 [ 30.911905] ksize_uaf+0x11c/0x5f8 [ 30.911976] kunit_try_run_case+0x170/0x3f0 [ 30.912049] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.912176] kthread+0x328/0x630 [ 30.912258] ret_from_fork+0x10/0x20 [ 30.912371] [ 30.912416] The buggy address belongs to the object at fff00000c6466e00 [ 30.912416] which belongs to the cache kmalloc-128 of size 128 [ 30.912560] The buggy address is located 0 bytes inside of [ 30.912560] freed 128-byte region [fff00000c6466e00, fff00000c6466e80) [ 30.912778] [ 30.912860] The buggy address belongs to the physical page: [ 30.913168] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106466 [ 30.913360] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.913506] page_type: f5(slab) [ 30.913633] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 30.913793] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.913939] page dumped because: kasan: bad access detected [ 30.914037] [ 30.914096] Memory state around the buggy address: [ 30.914204] fff00000c6466d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.914543] fff00000c6466d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.914655] >fff00000c6466e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.914778] ^ [ 30.914844] fff00000c6466e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.915148] fff00000c6466f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.915342] ================================================================== [ 30.923863] ================================================================== [ 30.924043] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 30.924187] Read of size 1 at addr fff00000c6466e00 by task kunit_try_catch/207 [ 30.924315] [ 30.924403] CPU: 1 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 30.924624] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.924690] Hardware name: linux,dummy-virt (DT) [ 30.924770] Call trace: [ 30.924831] show_stack+0x20/0x38 (C) [ 30.924953] dump_stack_lvl+0x8c/0xd0 [ 30.925776] print_report+0x118/0x608 [ 30.926065] kasan_report+0xdc/0x128 [ 30.926187] __asan_report_load1_noabort+0x20/0x30 [ 30.926307] ksize_uaf+0x598/0x5f8 [ 30.926485] kunit_try_run_case+0x170/0x3f0 [ 30.927116] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.927541] kthread+0x328/0x630 [ 30.927664] ret_from_fork+0x10/0x20 [ 30.927783] [ 30.927840] Allocated by task 207: [ 30.927929] kasan_save_stack+0x3c/0x68 [ 30.928038] kasan_save_track+0x20/0x40 [ 30.928132] kasan_save_alloc_info+0x40/0x58 [ 30.928231] __kasan_kmalloc+0xd4/0xd8 [ 30.928334] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.928440] ksize_uaf+0xb8/0x5f8 [ 30.928519] kunit_try_run_case+0x170/0x3f0 [ 30.928904] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.929025] kthread+0x328/0x630 [ 30.929225] ret_from_fork+0x10/0x20 [ 30.929361] [ 30.929431] Freed by task 207: [ 30.929531] kasan_save_stack+0x3c/0x68 [ 30.929667] kasan_save_track+0x20/0x40 [ 30.929800] kasan_save_free_info+0x4c/0x78 [ 30.929917] __kasan_slab_free+0x6c/0x98 [ 30.930018] kfree+0x214/0x3c8 [ 30.930103] ksize_uaf+0x11c/0x5f8 [ 30.930189] kunit_try_run_case+0x170/0x3f0 [ 30.930297] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.930455] kthread+0x328/0x630 [ 30.930571] ret_from_fork+0x10/0x20 [ 30.930660] [ 30.930715] The buggy address belongs to the object at fff00000c6466e00 [ 30.930715] which belongs to the cache kmalloc-128 of size 128 [ 30.930880] The buggy address is located 0 bytes inside of [ 30.930880] freed 128-byte region [fff00000c6466e00, fff00000c6466e80) [ 30.931032] [ 30.931089] The buggy address belongs to the physical page: [ 30.931174] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106466 [ 30.931311] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.931441] page_type: f5(slab) [ 30.931527] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 30.932119] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.932436] page dumped because: kasan: bad access detected [ 30.932566] [ 30.932632] Memory state around the buggy address: [ 30.932759] fff00000c6466d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.932932] fff00000c6466d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.933083] >fff00000c6466e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.933201] ^ [ 30.933272] fff00000c6466e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.933408] fff00000c6466f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.933493] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 30.853245] ================================================================== [ 30.853600] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 30.854941] Read of size 1 at addr fff00000c6466d73 by task kunit_try_catch/205 [ 30.855354] [ 30.855473] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 30.856199] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.856279] Hardware name: linux,dummy-virt (DT) [ 30.856818] Call trace: [ 30.856941] show_stack+0x20/0x38 (C) [ 30.857169] dump_stack_lvl+0x8c/0xd0 [ 30.857363] print_report+0x118/0x608 [ 30.857528] kasan_report+0xdc/0x128 [ 30.857652] __asan_report_load1_noabort+0x20/0x30 [ 30.857772] ksize_unpoisons_memory+0x628/0x740 [ 30.857883] kunit_try_run_case+0x170/0x3f0 [ 30.858001] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.858747] kthread+0x328/0x630 [ 30.859369] ret_from_fork+0x10/0x20 [ 30.859732] [ 30.859830] Allocated by task 205: [ 30.860001] kasan_save_stack+0x3c/0x68 [ 30.860192] kasan_save_track+0x20/0x40 [ 30.860294] kasan_save_alloc_info+0x40/0x58 [ 30.860404] __kasan_kmalloc+0xd4/0xd8 [ 30.860827] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.861096] ksize_unpoisons_memory+0xc0/0x740 [ 30.861205] kunit_try_run_case+0x170/0x3f0 [ 30.861760] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.861892] kthread+0x328/0x630 [ 30.861979] ret_from_fork+0x10/0x20 [ 30.862066] [ 30.862212] The buggy address belongs to the object at fff00000c6466d00 [ 30.862212] which belongs to the cache kmalloc-128 of size 128 [ 30.862801] The buggy address is located 0 bytes to the right of [ 30.862801] allocated 115-byte region [fff00000c6466d00, fff00000c6466d73) [ 30.863090] [ 30.863157] The buggy address belongs to the physical page: [ 30.863359] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106466 [ 30.863589] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.863775] page_type: f5(slab) [ 30.864099] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 30.864502] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.864716] page dumped because: kasan: bad access detected [ 30.864845] [ 30.864912] Memory state around the buggy address: [ 30.864999] fff00000c6466c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.865110] fff00000c6466c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.865225] >fff00000c6466d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.865659] ^ [ 30.866340] fff00000c6466d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.866469] fff00000c6466e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.867040] ================================================================== [ 30.870543] ================================================================== [ 30.870619] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 30.870695] Read of size 1 at addr fff00000c6466d78 by task kunit_try_catch/205 [ 30.870756] [ 30.870804] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 30.870959] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.871019] Hardware name: linux,dummy-virt (DT) [ 30.871090] Call trace: [ 30.871199] show_stack+0x20/0x38 (C) [ 30.871353] dump_stack_lvl+0x8c/0xd0 [ 30.871485] print_report+0x118/0x608 [ 30.871607] kasan_report+0xdc/0x128 [ 30.872410] __asan_report_load1_noabort+0x20/0x30 [ 30.872994] ksize_unpoisons_memory+0x618/0x740 [ 30.873382] kunit_try_run_case+0x170/0x3f0 [ 30.873693] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.874417] kthread+0x328/0x630 [ 30.874826] ret_from_fork+0x10/0x20 [ 30.875055] [ 30.875284] Allocated by task 205: [ 30.875358] kasan_save_stack+0x3c/0x68 [ 30.875470] kasan_save_track+0x20/0x40 [ 30.875567] kasan_save_alloc_info+0x40/0x58 [ 30.875713] __kasan_kmalloc+0xd4/0xd8 [ 30.875952] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.876134] ksize_unpoisons_memory+0xc0/0x740 [ 30.876583] kunit_try_run_case+0x170/0x3f0 [ 30.876744] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.876954] kthread+0x328/0x630 [ 30.877055] ret_from_fork+0x10/0x20 [ 30.877147] [ 30.877301] The buggy address belongs to the object at fff00000c6466d00 [ 30.877301] which belongs to the cache kmalloc-128 of size 128 [ 30.877537] The buggy address is located 5 bytes to the right of [ 30.877537] allocated 115-byte region [fff00000c6466d00, fff00000c6466d73) [ 30.877931] [ 30.877988] The buggy address belongs to the physical page: [ 30.878063] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106466 [ 30.878193] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.878427] page_type: f5(slab) [ 30.878689] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 30.879084] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.879334] page dumped because: kasan: bad access detected [ 30.879419] [ 30.879621] Memory state around the buggy address: [ 30.879823] fff00000c6466c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.880070] fff00000c6466c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.880350] >fff00000c6466d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.880574] ^ [ 30.880765] fff00000c6466d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.880893] fff00000c6466e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.881327] ================================================================== [ 30.883735] ================================================================== [ 30.883867] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 30.885030] Read of size 1 at addr fff00000c6466d7f by task kunit_try_catch/205 [ 30.885195] [ 30.885294] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 30.885782] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.886049] Hardware name: linux,dummy-virt (DT) [ 30.886485] Call trace: [ 30.886589] show_stack+0x20/0x38 (C) [ 30.886808] dump_stack_lvl+0x8c/0xd0 [ 30.887011] print_report+0x118/0x608 [ 30.887315] kasan_report+0xdc/0x128 [ 30.887438] __asan_report_load1_noabort+0x20/0x30 [ 30.887565] ksize_unpoisons_memory+0x690/0x740 [ 30.887686] kunit_try_run_case+0x170/0x3f0 [ 30.887809] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.887951] kthread+0x328/0x630 [ 30.888045] ret_from_fork+0x10/0x20 [ 30.888161] [ 30.888200] Allocated by task 205: [ 30.888272] kasan_save_stack+0x3c/0x68 [ 30.888370] kasan_save_track+0x20/0x40 [ 30.888440] kasan_save_alloc_info+0x40/0x58 [ 30.888513] __kasan_kmalloc+0xd4/0xd8 [ 30.888572] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.888649] ksize_unpoisons_memory+0xc0/0x740 [ 30.888727] kunit_try_run_case+0x170/0x3f0 [ 30.888996] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.889254] kthread+0x328/0x630 [ 30.890637] ret_from_fork+0x10/0x20 [ 30.890726] [ 30.890777] The buggy address belongs to the object at fff00000c6466d00 [ 30.890777] which belongs to the cache kmalloc-128 of size 128 [ 30.890939] The buggy address is located 12 bytes to the right of [ 30.890939] allocated 115-byte region [fff00000c6466d00, fff00000c6466d73) [ 30.891093] [ 30.891135] The buggy address belongs to the physical page: [ 30.891213] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106466 [ 30.891338] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.891446] page_type: f5(slab) [ 30.891528] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 30.891637] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.891734] page dumped because: kasan: bad access detected [ 30.891804] [ 30.891840] Memory state around the buggy address: [ 30.893578] fff00000c6466c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.893707] fff00000c6466c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.893812] >fff00000c6466d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.893926] ^ [ 30.894019] fff00000c6466d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.894113] fff00000c6466e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.894198] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
[ 30.820736] ================================================================== [ 30.821580] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 30.822255] Free of addr fff00000c4726d20 by task kunit_try_catch/203 [ 30.822694] [ 30.823483] CPU: 1 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 30.824959] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.825148] Hardware name: linux,dummy-virt (DT) [ 30.825313] Call trace: [ 30.825377] show_stack+0x20/0x38 (C) [ 30.826022] dump_stack_lvl+0x8c/0xd0 [ 30.826514] print_report+0x118/0x608 [ 30.826884] kasan_report_invalid_free+0xc0/0xe8 [ 30.827034] check_slab_allocation+0xd4/0x108 [ 30.827142] __kasan_slab_pre_free+0x2c/0x48 [ 30.827255] kfree+0xe8/0x3c8 [ 30.827453] kfree_sensitive+0x3c/0xb0 [ 30.827736] kmalloc_double_kzfree+0x168/0x308 [ 30.828010] kunit_try_run_case+0x170/0x3f0 [ 30.828287] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.828758] kthread+0x328/0x630 [ 30.828858] ret_from_fork+0x10/0x20 [ 30.829083] [ 30.829134] Allocated by task 203: [ 30.829329] kasan_save_stack+0x3c/0x68 [ 30.829564] kasan_save_track+0x20/0x40 [ 30.829919] kasan_save_alloc_info+0x40/0x58 [ 30.830161] __kasan_kmalloc+0xd4/0xd8 [ 30.830416] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.830566] kmalloc_double_kzfree+0xb8/0x308 [ 30.830796] kunit_try_run_case+0x170/0x3f0 [ 30.831077] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.831241] kthread+0x328/0x630 [ 30.831324] ret_from_fork+0x10/0x20 [ 30.831414] [ 30.831469] Freed by task 203: [ 30.831540] kasan_save_stack+0x3c/0x68 [ 30.831638] kasan_save_track+0x20/0x40 [ 30.831731] kasan_save_free_info+0x4c/0x78 [ 30.831830] __kasan_slab_free+0x6c/0x98 [ 30.831936] kfree+0x214/0x3c8 [ 30.832474] kfree_sensitive+0x80/0xb0 [ 30.832606] kmalloc_double_kzfree+0x11c/0x308 [ 30.832990] kunit_try_run_case+0x170/0x3f0 [ 30.833236] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.833536] kthread+0x328/0x630 [ 30.833623] ret_from_fork+0x10/0x20 [ 30.833833] [ 30.834128] The buggy address belongs to the object at fff00000c4726d20 [ 30.834128] which belongs to the cache kmalloc-16 of size 16 [ 30.834275] The buggy address is located 0 bytes inside of [ 30.834275] 16-byte region [fff00000c4726d20, fff00000c4726d30) [ 30.834430] [ 30.834477] The buggy address belongs to the physical page: [ 30.834541] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104726 [ 30.834642] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.834756] page_type: f5(slab) [ 30.835003] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 30.835433] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 30.835806] page dumped because: kasan: bad access detected [ 30.836070] [ 30.836202] Memory state around the buggy address: [ 30.836508] fff00000c4726c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.836868] fff00000c4726c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.837141] >fff00000c4726d00: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 30.837255] ^ [ 30.837346] fff00000c4726d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.837508] fff00000c4726e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.837654] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[ 30.807398] ================================================================== [ 30.807597] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 30.807747] Read of size 1 at addr fff00000c4726d20 by task kunit_try_catch/203 [ 30.808121] [ 30.808217] CPU: 1 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 30.808463] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.808582] Hardware name: linux,dummy-virt (DT) [ 30.808801] Call trace: [ 30.808917] show_stack+0x20/0x38 (C) [ 30.809212] dump_stack_lvl+0x8c/0xd0 [ 30.809666] print_report+0x118/0x608 [ 30.809823] kasan_report+0xdc/0x128 [ 30.809961] __kasan_check_byte+0x54/0x70 [ 30.810069] kfree_sensitive+0x30/0xb0 [ 30.810256] kmalloc_double_kzfree+0x168/0x308 [ 30.810407] kunit_try_run_case+0x170/0x3f0 [ 30.810555] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.810722] kthread+0x328/0x630 [ 30.810833] ret_from_fork+0x10/0x20 [ 30.810992] [ 30.811067] Allocated by task 203: [ 30.811162] kasan_save_stack+0x3c/0x68 [ 30.811299] kasan_save_track+0x20/0x40 [ 30.811385] kasan_save_alloc_info+0x40/0x58 [ 30.811477] __kasan_kmalloc+0xd4/0xd8 [ 30.811608] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.811861] kmalloc_double_kzfree+0xb8/0x308 [ 30.812207] kunit_try_run_case+0x170/0x3f0 [ 30.812352] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.812511] kthread+0x328/0x630 [ 30.812627] ret_from_fork+0x10/0x20 [ 30.812742] [ 30.812790] Freed by task 203: [ 30.812863] kasan_save_stack+0x3c/0x68 [ 30.812964] kasan_save_track+0x20/0x40 [ 30.813052] kasan_save_free_info+0x4c/0x78 [ 30.813488] __kasan_slab_free+0x6c/0x98 [ 30.813624] kfree+0x214/0x3c8 [ 30.813756] kfree_sensitive+0x80/0xb0 [ 30.813857] kmalloc_double_kzfree+0x11c/0x308 [ 30.813968] kunit_try_run_case+0x170/0x3f0 [ 30.814160] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.814263] kthread+0x328/0x630 [ 30.814474] ret_from_fork+0x10/0x20 [ 30.814630] [ 30.814708] The buggy address belongs to the object at fff00000c4726d20 [ 30.814708] which belongs to the cache kmalloc-16 of size 16 [ 30.814964] The buggy address is located 0 bytes inside of [ 30.814964] freed 16-byte region [fff00000c4726d20, fff00000c4726d30) [ 30.815146] [ 30.815226] The buggy address belongs to the physical page: [ 30.815350] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104726 [ 30.815542] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.815684] page_type: f5(slab) [ 30.815812] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 30.816361] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 30.816478] page dumped because: kasan: bad access detected [ 30.816568] [ 30.816619] Memory state around the buggy address: [ 30.816701] fff00000c4726c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.816938] fff00000c4726c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.817065] >fff00000c4726d00: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 30.817174] ^ [ 30.817253] fff00000c4726d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.817796] fff00000c4726e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.817963] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[ 30.771201] ================================================================== [ 30.771392] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 30.771542] Read of size 1 at addr fff00000c7738528 by task kunit_try_catch/199 [ 30.771668] [ 30.771760] CPU: 1 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 30.771992] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.772059] Hardware name: linux,dummy-virt (DT) [ 30.772143] Call trace: [ 30.772199] show_stack+0x20/0x38 (C) [ 30.772327] dump_stack_lvl+0x8c/0xd0 [ 30.772452] print_report+0x118/0x608 [ 30.772567] kasan_report+0xdc/0x128 [ 30.772680] __asan_report_load1_noabort+0x20/0x30 [ 30.772810] kmalloc_uaf2+0x3f4/0x468 [ 30.772940] kunit_try_run_case+0x170/0x3f0 [ 30.773056] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.773241] kthread+0x328/0x630 [ 30.773333] ret_from_fork+0x10/0x20 [ 30.773464] [ 30.773504] Allocated by task 199: [ 30.773569] kasan_save_stack+0x3c/0x68 [ 30.773667] kasan_save_track+0x20/0x40 [ 30.773763] kasan_save_alloc_info+0x40/0x58 [ 30.773865] __kasan_kmalloc+0xd4/0xd8 [ 30.773960] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.774106] kmalloc_uaf2+0xc4/0x468 [ 30.774196] kunit_try_run_case+0x170/0x3f0 [ 30.774292] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.774395] kthread+0x328/0x630 [ 30.774477] ret_from_fork+0x10/0x20 [ 30.774566] [ 30.774612] Freed by task 199: [ 30.774681] kasan_save_stack+0x3c/0x68 [ 30.774775] kasan_save_track+0x20/0x40 [ 30.774849] kasan_save_free_info+0x4c/0x78 [ 30.774958] __kasan_slab_free+0x6c/0x98 [ 30.775051] kfree+0x214/0x3c8 [ 30.775133] kmalloc_uaf2+0x134/0x468 [ 30.775207] kunit_try_run_case+0x170/0x3f0 [ 30.775326] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.775428] kthread+0x328/0x630 [ 30.775502] ret_from_fork+0x10/0x20 [ 30.775588] [ 30.775632] The buggy address belongs to the object at fff00000c7738500 [ 30.775632] which belongs to the cache kmalloc-64 of size 64 [ 30.775793] The buggy address is located 40 bytes inside of [ 30.775793] freed 64-byte region [fff00000c7738500, fff00000c7738540) [ 30.775942] [ 30.775990] The buggy address belongs to the physical page: [ 30.776075] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107738 [ 30.776233] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.776394] page_type: f5(slab) [ 30.776499] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.776621] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.776713] page dumped because: kasan: bad access detected [ 30.776791] [ 30.776835] Memory state around the buggy address: [ 30.776930] fff00000c7738400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.777040] fff00000c7738480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.777146] >fff00000c7738500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.777237] ^ [ 30.777315] fff00000c7738580: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 30.777423] fff00000c7738600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.777522] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 30.741391] ================================================================== [ 30.741891] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 30.742199] Write of size 33 at addr fff00000c7738380 by task kunit_try_catch/197 [ 30.742360] [ 30.742467] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 30.742913] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.743015] Hardware name: linux,dummy-virt (DT) [ 30.743092] Call trace: [ 30.743181] show_stack+0x20/0x38 (C) [ 30.743342] dump_stack_lvl+0x8c/0xd0 [ 30.743468] print_report+0x118/0x608 [ 30.743589] kasan_report+0xdc/0x128 [ 30.743708] kasan_check_range+0x100/0x1a8 [ 30.743829] __asan_memset+0x34/0x78 [ 30.743957] kmalloc_uaf_memset+0x170/0x310 [ 30.744080] kunit_try_run_case+0x170/0x3f0 [ 30.744202] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.744338] kthread+0x328/0x630 [ 30.744449] ret_from_fork+0x10/0x20 [ 30.744573] [ 30.744619] Allocated by task 197: [ 30.744707] kasan_save_stack+0x3c/0x68 [ 30.744847] kasan_save_track+0x20/0x40 [ 30.744941] kasan_save_alloc_info+0x40/0x58 [ 30.745035] __kasan_kmalloc+0xd4/0xd8 [ 30.745261] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.745360] kmalloc_uaf_memset+0xb8/0x310 [ 30.745451] kunit_try_run_case+0x170/0x3f0 [ 30.746118] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.746346] kthread+0x328/0x630 [ 30.746573] ret_from_fork+0x10/0x20 [ 30.746693] [ 30.747183] Freed by task 197: [ 30.747278] kasan_save_stack+0x3c/0x68 [ 30.747476] kasan_save_track+0x20/0x40 [ 30.747598] kasan_save_free_info+0x4c/0x78 [ 30.747705] __kasan_slab_free+0x6c/0x98 [ 30.747887] kfree+0x214/0x3c8 [ 30.747973] kmalloc_uaf_memset+0x11c/0x310 [ 30.748057] kunit_try_run_case+0x170/0x3f0 [ 30.748133] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.748212] kthread+0x328/0x630 [ 30.748280] ret_from_fork+0x10/0x20 [ 30.748363] [ 30.748426] The buggy address belongs to the object at fff00000c7738380 [ 30.748426] which belongs to the cache kmalloc-64 of size 64 [ 30.748568] The buggy address is located 0 bytes inside of [ 30.748568] freed 64-byte region [fff00000c7738380, fff00000c77383c0) [ 30.749096] [ 30.749175] The buggy address belongs to the physical page: [ 30.749289] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107738 [ 30.749460] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.749575] page_type: f5(slab) [ 30.749961] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.750102] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.750204] page dumped because: kasan: bad access detected [ 30.750269] [ 30.750305] Memory state around the buggy address: [ 30.750368] fff00000c7738280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.750462] fff00000c7738300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.750560] >fff00000c7738380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.750658] ^ [ 30.750737] fff00000c7738400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.750835] fff00000c7738480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.751264] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[ 30.703332] ================================================================== [ 30.703519] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 30.703673] Read of size 1 at addr fff00000c4726d08 by task kunit_try_catch/195 [ 30.703793] [ 30.704419] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 30.705173] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.705257] Hardware name: linux,dummy-virt (DT) [ 30.705405] Call trace: [ 30.705491] show_stack+0x20/0x38 (C) [ 30.705864] dump_stack_lvl+0x8c/0xd0 [ 30.706016] print_report+0x118/0x608 [ 30.706263] kasan_report+0xdc/0x128 [ 30.706382] __asan_report_load1_noabort+0x20/0x30 [ 30.707018] kmalloc_uaf+0x300/0x338 [ 30.707275] kunit_try_run_case+0x170/0x3f0 [ 30.707512] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.707649] kthread+0x328/0x630 [ 30.707760] ret_from_fork+0x10/0x20 [ 30.707886] [ 30.707932] Allocated by task 195: [ 30.708394] kasan_save_stack+0x3c/0x68 [ 30.708784] kasan_save_track+0x20/0x40 [ 30.709057] kasan_save_alloc_info+0x40/0x58 [ 30.709510] __kasan_kmalloc+0xd4/0xd8 [ 30.710447] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.710631] kmalloc_uaf+0xb8/0x338 [ 30.710823] kunit_try_run_case+0x170/0x3f0 [ 30.711020] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.711353] kthread+0x328/0x630 [ 30.711453] ret_from_fork+0x10/0x20 [ 30.711551] [ 30.711647] Freed by task 195: [ 30.711801] kasan_save_stack+0x3c/0x68 [ 30.711994] kasan_save_track+0x20/0x40 [ 30.712092] kasan_save_free_info+0x4c/0x78 [ 30.712186] __kasan_slab_free+0x6c/0x98 [ 30.712312] kfree+0x214/0x3c8 [ 30.712436] kmalloc_uaf+0x11c/0x338 [ 30.713080] kunit_try_run_case+0x170/0x3f0 [ 30.713189] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.713376] kthread+0x328/0x630 [ 30.713460] ret_from_fork+0x10/0x20 [ 30.713666] [ 30.713766] The buggy address belongs to the object at fff00000c4726d00 [ 30.713766] which belongs to the cache kmalloc-16 of size 16 [ 30.714036] The buggy address is located 8 bytes inside of [ 30.714036] freed 16-byte region [fff00000c4726d00, fff00000c4726d10) [ 30.714301] [ 30.714370] The buggy address belongs to the physical page: [ 30.714441] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104726 [ 30.714552] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.714655] page_type: f5(slab) [ 30.714732] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 30.714838] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 30.715689] page dumped because: kasan: bad access detected [ 30.715866] [ 30.715954] Memory state around the buggy address: [ 30.716099] fff00000c4726c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.716263] fff00000c4726c80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.716431] >fff00000c4726d00: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.716609] ^ [ 30.716691] fff00000c4726d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.716826] fff00000c4726e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.717015] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 30.659731] ================================================================== [ 30.660892] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0 [ 30.661079] Read of size 64 at addr fff00000c7738084 by task kunit_try_catch/193 [ 30.661776] [ 30.662020] CPU: 1 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 30.662247] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.662302] Hardware name: linux,dummy-virt (DT) [ 30.662771] Call trace: [ 30.663111] show_stack+0x20/0x38 (C) [ 30.663294] dump_stack_lvl+0x8c/0xd0 [ 30.663439] print_report+0x118/0x608 [ 30.663550] kasan_report+0xdc/0x128 [ 30.664064] kasan_check_range+0x100/0x1a8 [ 30.664389] __asan_memmove+0x3c/0x98 [ 30.664525] kmalloc_memmove_invalid_size+0x154/0x2e0 [ 30.665013] kunit_try_run_case+0x170/0x3f0 [ 30.665282] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.665506] kthread+0x328/0x630 [ 30.665610] ret_from_fork+0x10/0x20 [ 30.665727] [ 30.665772] Allocated by task 193: [ 30.665830] kasan_save_stack+0x3c/0x68 [ 30.665941] kasan_save_track+0x20/0x40 [ 30.666352] kasan_save_alloc_info+0x40/0x58 [ 30.666465] __kasan_kmalloc+0xd4/0xd8 [ 30.666694] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.667017] kmalloc_memmove_invalid_size+0xb0/0x2e0 [ 30.667215] kunit_try_run_case+0x170/0x3f0 [ 30.667395] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.667632] kthread+0x328/0x630 [ 30.667741] ret_from_fork+0x10/0x20 [ 30.668194] [ 30.668256] The buggy address belongs to the object at fff00000c7738080 [ 30.668256] which belongs to the cache kmalloc-64 of size 64 [ 30.668426] The buggy address is located 4 bytes inside of [ 30.668426] allocated 64-byte region [fff00000c7738080, fff00000c77380c0) [ 30.668722] [ 30.668870] The buggy address belongs to the physical page: [ 30.669033] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107738 [ 30.669405] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.669633] page_type: f5(slab) [ 30.669754] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.669897] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.670008] page dumped because: kasan: bad access detected [ 30.670079] [ 30.670116] Memory state around the buggy address: [ 30.670183] fff00000c7737f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.670591] fff00000c7738000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.670846] >fff00000c7738080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 30.671149] ^ [ 30.671244] fff00000c7738100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.671564] fff00000c7738180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.671678] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 30.637261] ================================================================== [ 30.637837] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 30.638071] Read of size 18446744073709551614 at addr fff00000c76e3e84 by task kunit_try_catch/191 [ 30.638365] [ 30.638507] CPU: 1 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 30.638716] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.639049] Hardware name: linux,dummy-virt (DT) [ 30.639209] Call trace: [ 30.639279] show_stack+0x20/0x38 (C) [ 30.639401] dump_stack_lvl+0x8c/0xd0 [ 30.639528] print_report+0x118/0x608 [ 30.639667] kasan_report+0xdc/0x128 [ 30.639856] kasan_check_range+0x100/0x1a8 [ 30.640025] __asan_memmove+0x3c/0x98 [ 30.640177] kmalloc_memmove_negative_size+0x154/0x2e0 [ 30.640362] kunit_try_run_case+0x170/0x3f0 [ 30.640533] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.640708] kthread+0x328/0x630 [ 30.640814] ret_from_fork+0x10/0x20 [ 30.640997] [ 30.641069] Allocated by task 191: [ 30.641167] kasan_save_stack+0x3c/0x68 [ 30.641308] kasan_save_track+0x20/0x40 [ 30.641435] kasan_save_alloc_info+0x40/0x58 [ 30.641568] __kasan_kmalloc+0xd4/0xd8 [ 30.641700] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.641833] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 30.641944] kunit_try_run_case+0x170/0x3f0 [ 30.642031] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.642162] kthread+0x328/0x630 [ 30.642238] ret_from_fork+0x10/0x20 [ 30.642323] [ 30.642369] The buggy address belongs to the object at fff00000c76e3e80 [ 30.642369] which belongs to the cache kmalloc-64 of size 64 [ 30.642524] The buggy address is located 4 bytes inside of [ 30.642524] 64-byte region [fff00000c76e3e80, fff00000c76e3ec0) [ 30.642689] [ 30.642741] The buggy address belongs to the physical page: [ 30.642813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076e3 [ 30.642989] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.643111] page_type: f5(slab) [ 30.643199] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.643325] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.643434] page dumped because: kasan: bad access detected [ 30.643520] [ 30.643564] Memory state around the buggy address: [ 30.643642] fff00000c76e3d80: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc [ 30.643745] fff00000c76e3e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.643827] >fff00000c76e3e80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 30.643957] ^ [ 30.644029] fff00000c76e3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.644142] fff00000c76e3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.644243] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[ 30.603157] ================================================================== [ 30.603334] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 30.603471] Write of size 16 at addr fff00000c6466c69 by task kunit_try_catch/189 [ 30.603852] [ 30.604003] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 30.604234] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.604304] Hardware name: linux,dummy-virt (DT) [ 30.604383] Call trace: [ 30.604438] show_stack+0x20/0x38 (C) [ 30.604570] dump_stack_lvl+0x8c/0xd0 [ 30.604695] print_report+0x118/0x608 [ 30.604811] kasan_report+0xdc/0x128 [ 30.604939] kasan_check_range+0x100/0x1a8 [ 30.605061] __asan_memset+0x34/0x78 [ 30.605170] kmalloc_oob_memset_16+0x150/0x2f8 [ 30.605292] kunit_try_run_case+0x170/0x3f0 [ 30.605694] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.606021] kthread+0x328/0x630 [ 30.606255] ret_from_fork+0x10/0x20 [ 30.606424] [ 30.606466] Allocated by task 189: [ 30.606526] kasan_save_stack+0x3c/0x68 [ 30.606845] kasan_save_track+0x20/0x40 [ 30.607046] kasan_save_alloc_info+0x40/0x58 [ 30.607152] __kasan_kmalloc+0xd4/0xd8 [ 30.607235] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.607346] kmalloc_oob_memset_16+0xb0/0x2f8 [ 30.607444] kunit_try_run_case+0x170/0x3f0 [ 30.607533] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.607634] kthread+0x328/0x630 [ 30.607966] ret_from_fork+0x10/0x20 [ 30.608054] [ 30.608184] The buggy address belongs to the object at fff00000c6466c00 [ 30.608184] which belongs to the cache kmalloc-128 of size 128 [ 30.608505] The buggy address is located 105 bytes inside of [ 30.608505] allocated 120-byte region [fff00000c6466c00, fff00000c6466c78) [ 30.608943] [ 30.609127] The buggy address belongs to the physical page: [ 30.609361] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106466 [ 30.609735] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.610069] page_type: f5(slab) [ 30.610169] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 30.610309] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.610413] page dumped because: kasan: bad access detected [ 30.610486] [ 30.610529] Memory state around the buggy address: [ 30.610610] fff00000c6466b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.610723] fff00000c6466b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.610938] >fff00000c6466c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.611117] ^ [ 30.611321] fff00000c6466c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.611437] fff00000c6466d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.611913] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[ 30.572276] ================================================================== [ 30.572860] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 30.573265] Write of size 8 at addr fff00000c6466b71 by task kunit_try_catch/187 [ 30.573444] [ 30.573548] CPU: 1 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 30.573813] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.573904] Hardware name: linux,dummy-virt (DT) [ 30.573985] Call trace: [ 30.574066] show_stack+0x20/0x38 (C) [ 30.574194] dump_stack_lvl+0x8c/0xd0 [ 30.574352] print_report+0x118/0x608 [ 30.574479] kasan_report+0xdc/0x128 [ 30.574590] kasan_check_range+0x100/0x1a8 [ 30.574695] __asan_memset+0x34/0x78 [ 30.574796] kmalloc_oob_memset_8+0x150/0x2f8 [ 30.574940] kunit_try_run_case+0x170/0x3f0 [ 30.575254] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.575373] kthread+0x328/0x630 [ 30.575471] ret_from_fork+0x10/0x20 [ 30.575630] [ 30.575692] Allocated by task 187: [ 30.575777] kasan_save_stack+0x3c/0x68 [ 30.575869] kasan_save_track+0x20/0x40 [ 30.575967] kasan_save_alloc_info+0x40/0x58 [ 30.576112] __kasan_kmalloc+0xd4/0xd8 [ 30.576208] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.576341] kmalloc_oob_memset_8+0xb0/0x2f8 [ 30.576433] kunit_try_run_case+0x170/0x3f0 [ 30.576524] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.576628] kthread+0x328/0x630 [ 30.576735] ret_from_fork+0x10/0x20 [ 30.576824] [ 30.576908] The buggy address belongs to the object at fff00000c6466b00 [ 30.576908] which belongs to the cache kmalloc-128 of size 128 [ 30.577047] The buggy address is located 113 bytes inside of [ 30.577047] allocated 120-byte region [fff00000c6466b00, fff00000c6466b78) [ 30.577261] [ 30.577334] The buggy address belongs to the physical page: [ 30.577468] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106466 [ 30.577588] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.578064] page_type: f5(slab) [ 30.578373] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 30.578516] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.578619] page dumped because: kasan: bad access detected [ 30.578696] [ 30.578740] Memory state around the buggy address: [ 30.578814] fff00000c6466a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.578913] fff00000c6466a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.579556] >fff00000c6466b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.579630] ^ [ 30.579716] fff00000c6466b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.579842] fff00000c6466c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.579962] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[ 30.536678] ================================================================== [ 30.537033] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 30.537308] Write of size 4 at addr fff00000c6466a75 by task kunit_try_catch/185 [ 30.538693] [ 30.538780] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 30.539029] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.539112] Hardware name: linux,dummy-virt (DT) [ 30.539287] Call trace: [ 30.539377] show_stack+0x20/0x38 (C) [ 30.539532] dump_stack_lvl+0x8c/0xd0 [ 30.540043] print_report+0x118/0x608 [ 30.540191] kasan_report+0xdc/0x128 [ 30.540433] kasan_check_range+0x100/0x1a8 [ 30.540861] __asan_memset+0x34/0x78 [ 30.541126] kmalloc_oob_memset_4+0x150/0x300 [ 30.541384] kunit_try_run_case+0x170/0x3f0 [ 30.541645] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.541937] kthread+0x328/0x630 [ 30.542034] ret_from_fork+0x10/0x20 [ 30.542158] [ 30.542211] Allocated by task 185: [ 30.542359] kasan_save_stack+0x3c/0x68 [ 30.542653] kasan_save_track+0x20/0x40 [ 30.542759] kasan_save_alloc_info+0x40/0x58 [ 30.542941] __kasan_kmalloc+0xd4/0xd8 [ 30.543119] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.543373] kmalloc_oob_memset_4+0xb0/0x300 [ 30.543568] kunit_try_run_case+0x170/0x3f0 [ 30.543756] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.543946] kthread+0x328/0x630 [ 30.544312] ret_from_fork+0x10/0x20 [ 30.544419] [ 30.544475] The buggy address belongs to the object at fff00000c6466a00 [ 30.544475] which belongs to the cache kmalloc-128 of size 128 [ 30.544779] The buggy address is located 117 bytes inside of [ 30.544779] allocated 120-byte region [fff00000c6466a00, fff00000c6466a78) [ 30.545143] [ 30.545267] The buggy address belongs to the physical page: [ 30.545448] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106466 [ 30.545897] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.546032] page_type: f5(slab) [ 30.546253] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 30.546484] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.546814] page dumped because: kasan: bad access detected [ 30.546921] [ 30.546980] Memory state around the buggy address: [ 30.547060] fff00000c6466900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.547273] fff00000c6466980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.547465] >fff00000c6466a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.547579] ^ [ 30.547752] fff00000c6466a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.547863] fff00000c6466b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.547974] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[ 30.484684] ================================================================== [ 30.484856] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 30.488283] Write of size 2 at addr fff00000c6466977 by task kunit_try_catch/183 [ 30.488658] [ 30.488758] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 30.490047] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.490317] Hardware name: linux,dummy-virt (DT) [ 30.490711] Call trace: [ 30.491038] show_stack+0x20/0x38 (C) [ 30.491356] dump_stack_lvl+0x8c/0xd0 [ 30.491598] print_report+0x118/0x608 [ 30.491903] kasan_report+0xdc/0x128 [ 30.492362] kasan_check_range+0x100/0x1a8 [ 30.492569] __asan_memset+0x34/0x78 [ 30.492795] kmalloc_oob_memset_2+0x150/0x2f8 [ 30.493027] kunit_try_run_case+0x170/0x3f0 [ 30.493298] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.493974] kthread+0x328/0x630 [ 30.494491] ret_from_fork+0x10/0x20 [ 30.494960] [ 30.495018] Allocated by task 183: [ 30.495248] kasan_save_stack+0x3c/0x68 [ 30.495576] kasan_save_track+0x20/0x40 [ 30.495678] kasan_save_alloc_info+0x40/0x58 [ 30.495779] __kasan_kmalloc+0xd4/0xd8 [ 30.495870] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.495987] kmalloc_oob_memset_2+0xb0/0x2f8 [ 30.496077] kunit_try_run_case+0x170/0x3f0 [ 30.496173] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.497566] kthread+0x328/0x630 [ 30.497998] ret_from_fork+0x10/0x20 [ 30.498286] [ 30.498456] The buggy address belongs to the object at fff00000c6466900 [ 30.498456] which belongs to the cache kmalloc-128 of size 128 [ 30.498955] The buggy address is located 119 bytes inside of [ 30.498955] allocated 120-byte region [fff00000c6466900, fff00000c6466978) [ 30.499376] [ 30.499546] The buggy address belongs to the physical page: [ 30.499756] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106466 [ 30.499919] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.500044] page_type: f5(slab) [ 30.500144] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 30.500263] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.500367] page dumped because: kasan: bad access detected [ 30.500445] [ 30.500489] Memory state around the buggy address: [ 30.500938] fff00000c6466800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.501675] fff00000c6466880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.502509] >fff00000c6466900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.503140] ^ [ 30.503569] fff00000c6466980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.503902] fff00000c6466a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.504172] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 30.455071] ================================================================== [ 30.455246] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 30.455389] Write of size 128 at addr fff00000c6466800 by task kunit_try_catch/181 [ 30.455499] [ 30.455578] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 30.455765] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.456995] Hardware name: linux,dummy-virt (DT) [ 30.457095] Call trace: [ 30.457155] show_stack+0x20/0x38 (C) [ 30.457280] dump_stack_lvl+0x8c/0xd0 [ 30.457393] print_report+0x118/0x608 [ 30.457558] kasan_report+0xdc/0x128 [ 30.457677] kasan_check_range+0x100/0x1a8 [ 30.457795] __asan_memset+0x34/0x78 [ 30.457916] kmalloc_oob_in_memset+0x144/0x2d0 [ 30.458035] kunit_try_run_case+0x170/0x3f0 [ 30.458154] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.458270] kthread+0x328/0x630 [ 30.458355] ret_from_fork+0x10/0x20 [ 30.458462] [ 30.458506] Allocated by task 181: [ 30.458577] kasan_save_stack+0x3c/0x68 [ 30.458677] kasan_save_track+0x20/0x40 [ 30.458766] kasan_save_alloc_info+0x40/0x58 [ 30.458861] __kasan_kmalloc+0xd4/0xd8 [ 30.458972] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.459074] kmalloc_oob_in_memset+0xb0/0x2d0 [ 30.459168] kunit_try_run_case+0x170/0x3f0 [ 30.459714] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.459820] kthread+0x328/0x630 [ 30.459908] ret_from_fork+0x10/0x20 [ 30.461551] [ 30.461612] The buggy address belongs to the object at fff00000c6466800 [ 30.461612] which belongs to the cache kmalloc-128 of size 128 [ 30.461755] The buggy address is located 0 bytes inside of [ 30.461755] allocated 120-byte region [fff00000c6466800, fff00000c6466878) [ 30.461863] [ 30.461916] The buggy address belongs to the physical page: [ 30.461981] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106466 [ 30.462094] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.462209] page_type: f5(slab) [ 30.462838] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 30.463031] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.463288] page dumped because: kasan: bad access detected [ 30.463420] [ 30.463471] Memory state around the buggy address: [ 30.463563] fff00000c6466700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.463668] fff00000c6466780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.463776] >fff00000c6466800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.463880] ^ [ 30.463985] fff00000c6466880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.464092] fff00000c6466900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.464191] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[ 30.420541] ================================================================== [ 30.420920] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 30.421314] Read of size 16 at addr fff00000c4726ce0 by task kunit_try_catch/179 [ 30.421517] [ 30.421690] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 30.421947] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.422060] Hardware name: linux,dummy-virt (DT) [ 30.422401] Call trace: [ 30.422464] show_stack+0x20/0x38 (C) [ 30.422848] dump_stack_lvl+0x8c/0xd0 [ 30.423105] print_report+0x118/0x608 [ 30.423414] kasan_report+0xdc/0x128 [ 30.423609] __asan_report_load16_noabort+0x20/0x30 [ 30.423721] kmalloc_uaf_16+0x3bc/0x438 [ 30.423829] kunit_try_run_case+0x170/0x3f0 [ 30.423945] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.424121] kthread+0x328/0x630 [ 30.424433] ret_from_fork+0x10/0x20 [ 30.424692] [ 30.424837] Allocated by task 179: [ 30.424962] kasan_save_stack+0x3c/0x68 [ 30.425339] kasan_save_track+0x20/0x40 [ 30.425626] kasan_save_alloc_info+0x40/0x58 [ 30.425803] __kasan_kmalloc+0xd4/0xd8 [ 30.425920] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.426019] kmalloc_uaf_16+0x140/0x438 [ 30.426094] kunit_try_run_case+0x170/0x3f0 [ 30.426168] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.426263] kthread+0x328/0x630 [ 30.426342] ret_from_fork+0x10/0x20 [ 30.426432] [ 30.426480] Freed by task 179: [ 30.426548] kasan_save_stack+0x3c/0x68 [ 30.426645] kasan_save_track+0x20/0x40 [ 30.427342] kasan_save_free_info+0x4c/0x78 [ 30.427451] __kasan_slab_free+0x6c/0x98 [ 30.428135] kfree+0x214/0x3c8 [ 30.428275] kmalloc_uaf_16+0x190/0x438 [ 30.428488] kunit_try_run_case+0x170/0x3f0 [ 30.428662] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.428853] kthread+0x328/0x630 [ 30.429077] ret_from_fork+0x10/0x20 [ 30.429177] [ 30.429303] The buggy address belongs to the object at fff00000c4726ce0 [ 30.429303] which belongs to the cache kmalloc-16 of size 16 [ 30.429751] The buggy address is located 0 bytes inside of [ 30.429751] freed 16-byte region [fff00000c4726ce0, fff00000c4726cf0) [ 30.429971] [ 30.430025] The buggy address belongs to the physical page: [ 30.430215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104726 [ 30.430458] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.430781] page_type: f5(slab) [ 30.431090] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 30.431350] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 30.431575] page dumped because: kasan: bad access detected [ 30.431667] [ 30.431713] Memory state around the buggy address: [ 30.432027] fff00000c4726b80: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.432187] fff00000c4726c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.432448] >fff00000c4726c80: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 30.432663] ^ [ 30.433000] fff00000c4726d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.433278] fff00000c4726d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.433490] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[ 30.397348] ================================================================== [ 30.397632] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 30.397821] Write of size 16 at addr fff00000c4726c80 by task kunit_try_catch/177 [ 30.397956] [ 30.398074] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 30.398268] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.398334] Hardware name: linux,dummy-virt (DT) [ 30.398401] Call trace: [ 30.398450] show_stack+0x20/0x38 (C) [ 30.398571] dump_stack_lvl+0x8c/0xd0 [ 30.398733] print_report+0x118/0x608 [ 30.398856] kasan_report+0xdc/0x128 [ 30.398996] __asan_report_store16_noabort+0x20/0x30 [ 30.399140] kmalloc_oob_16+0x3a0/0x3f8 [ 30.399278] kunit_try_run_case+0x170/0x3f0 [ 30.399396] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.399539] kthread+0x328/0x630 [ 30.399641] ret_from_fork+0x10/0x20 [ 30.399766] [ 30.399812] Allocated by task 177: [ 30.399897] kasan_save_stack+0x3c/0x68 [ 30.400040] kasan_save_track+0x20/0x40 [ 30.400133] kasan_save_alloc_info+0x40/0x58 [ 30.400242] __kasan_kmalloc+0xd4/0xd8 [ 30.400378] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.400476] kmalloc_oob_16+0xb4/0x3f8 [ 30.400560] kunit_try_run_case+0x170/0x3f0 [ 30.400653] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.400769] kthread+0x328/0x630 [ 30.400849] ret_from_fork+0x10/0x20 [ 30.400964] [ 30.401011] The buggy address belongs to the object at fff00000c4726c80 [ 30.401011] which belongs to the cache kmalloc-16 of size 16 [ 30.401150] The buggy address is located 0 bytes inside of [ 30.401150] allocated 13-byte region [fff00000c4726c80, fff00000c4726c8d) [ 30.401478] [ 30.401539] The buggy address belongs to the physical page: [ 30.401614] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104726 [ 30.401746] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.401856] page_type: f5(slab) [ 30.401959] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 30.402300] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 30.402472] page dumped because: kasan: bad access detected [ 30.402582] [ 30.402628] Memory state around the buggy address: [ 30.402760] fff00000c4726b80: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.402869] fff00000c4726c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.402989] >fff00000c4726c80: 00 05 fc fc 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.403087] ^ [ 30.403159] fff00000c4726d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.403264] fff00000c4726d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.403370] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 30.373279] ================================================================== [ 30.374255] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 30.374469] Read of size 1 at addr fff00000c46d1200 by task kunit_try_catch/175 [ 30.374584] [ 30.374668] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 30.374846] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.374914] Hardware name: linux,dummy-virt (DT) [ 30.374997] Call trace: [ 30.375063] show_stack+0x20/0x38 (C) [ 30.375171] dump_stack_lvl+0x8c/0xd0 [ 30.375273] print_report+0x118/0x608 [ 30.375379] kasan_report+0xdc/0x128 [ 30.375495] __asan_report_load1_noabort+0x20/0x30 [ 30.375621] krealloc_uaf+0x4c8/0x520 [ 30.375769] kunit_try_run_case+0x170/0x3f0 [ 30.375896] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.376008] kthread+0x328/0x630 [ 30.376102] ret_from_fork+0x10/0x20 [ 30.376209] [ 30.376256] Allocated by task 175: [ 30.376341] kasan_save_stack+0x3c/0x68 [ 30.376473] kasan_save_track+0x20/0x40 [ 30.376559] kasan_save_alloc_info+0x40/0x58 [ 30.377436] __kasan_kmalloc+0xd4/0xd8 [ 30.377530] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.377618] krealloc_uaf+0xc8/0x520 [ 30.377685] kunit_try_run_case+0x170/0x3f0 [ 30.377767] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.377865] kthread+0x328/0x630 [ 30.377953] ret_from_fork+0x10/0x20 [ 30.378028] [ 30.378074] Freed by task 175: [ 30.378139] kasan_save_stack+0x3c/0x68 [ 30.378228] kasan_save_track+0x20/0x40 [ 30.378328] kasan_save_free_info+0x4c/0x78 [ 30.378423] __kasan_slab_free+0x6c/0x98 [ 30.378516] kfree+0x214/0x3c8 [ 30.378595] krealloc_uaf+0x12c/0x520 [ 30.378684] kunit_try_run_case+0x170/0x3f0 [ 30.378808] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.378971] kthread+0x328/0x630 [ 30.379049] ret_from_fork+0x10/0x20 [ 30.379121] [ 30.379158] The buggy address belongs to the object at fff00000c46d1200 [ 30.379158] which belongs to the cache kmalloc-256 of size 256 [ 30.379268] The buggy address is located 0 bytes inside of [ 30.379268] freed 256-byte region [fff00000c46d1200, fff00000c46d1300) [ 30.379424] [ 30.379483] The buggy address belongs to the physical page: [ 30.379573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1046d0 [ 30.379748] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.379919] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.380038] page_type: f5(slab) [ 30.380126] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.380222] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.380331] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.380434] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.380578] head: 0bfffe0000000001 ffffc1ffc311b401 00000000ffffffff 00000000ffffffff [ 30.380717] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.380841] page dumped because: kasan: bad access detected [ 30.380976] [ 30.381026] Memory state around the buggy address: [ 30.381130] fff00000c46d1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.381275] fff00000c46d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.381392] >fff00000c46d1200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.381475] ^ [ 30.381533] fff00000c46d1280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.381629] fff00000c46d1300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.381705] ================================================================== [ 30.354459] ================================================================== [ 30.354640] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 30.354788] Read of size 1 at addr fff00000c46d1200 by task kunit_try_catch/175 [ 30.355123] [ 30.355223] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 30.356211] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.356406] Hardware name: linux,dummy-virt (DT) [ 30.356567] Call trace: [ 30.356708] show_stack+0x20/0x38 (C) [ 30.357028] dump_stack_lvl+0x8c/0xd0 [ 30.357190] print_report+0x118/0x608 [ 30.357309] kasan_report+0xdc/0x128 [ 30.357434] __kasan_check_byte+0x54/0x70 [ 30.357553] krealloc_noprof+0x44/0x360 [ 30.357661] krealloc_uaf+0x180/0x520 [ 30.357770] kunit_try_run_case+0x170/0x3f0 [ 30.357897] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.358374] kthread+0x328/0x630 [ 30.358662] ret_from_fork+0x10/0x20 [ 30.359092] [ 30.359309] Allocated by task 175: [ 30.359401] kasan_save_stack+0x3c/0x68 [ 30.359499] kasan_save_track+0x20/0x40 [ 30.359714] kasan_save_alloc_info+0x40/0x58 [ 30.359894] __kasan_kmalloc+0xd4/0xd8 [ 30.360080] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.360393] krealloc_uaf+0xc8/0x520 [ 30.360489] kunit_try_run_case+0x170/0x3f0 [ 30.360589] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.360706] kthread+0x328/0x630 [ 30.360791] ret_from_fork+0x10/0x20 [ 30.360910] [ 30.360981] Freed by task 175: [ 30.361060] kasan_save_stack+0x3c/0x68 [ 30.361152] kasan_save_track+0x20/0x40 [ 30.361244] kasan_save_free_info+0x4c/0x78 [ 30.361341] __kasan_slab_free+0x6c/0x98 [ 30.361902] kfree+0x214/0x3c8 [ 30.362015] krealloc_uaf+0x12c/0x520 [ 30.362245] kunit_try_run_case+0x170/0x3f0 [ 30.362390] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.363068] kthread+0x328/0x630 [ 30.363247] ret_from_fork+0x10/0x20 [ 30.363894] [ 30.364053] The buggy address belongs to the object at fff00000c46d1200 [ 30.364053] which belongs to the cache kmalloc-256 of size 256 [ 30.364322] The buggy address is located 0 bytes inside of [ 30.364322] freed 256-byte region [fff00000c46d1200, fff00000c46d1300) [ 30.364469] [ 30.364521] The buggy address belongs to the physical page: [ 30.364601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1046d0 [ 30.364726] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.364840] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.364986] page_type: f5(slab) [ 30.365084] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.365204] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.365328] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.366479] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.366910] head: 0bfffe0000000001 ffffc1ffc311b401 00000000ffffffff 00000000ffffffff [ 30.367198] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.367472] page dumped because: kasan: bad access detected [ 30.368221] [ 30.368277] Memory state around the buggy address: [ 30.368512] fff00000c46d1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.369245] fff00000c46d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.369450] >fff00000c46d1200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.369706] ^ [ 30.369814] fff00000c46d1280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.370401] fff00000c46d1300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.370502] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 30.139094] ================================================================== [ 30.139284] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 30.139425] Write of size 1 at addr fff00000c46d10ea by task kunit_try_catch/169 [ 30.139581] [ 30.139717] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 30.139946] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.140013] Hardware name: linux,dummy-virt (DT) [ 30.140093] Call trace: [ 30.140150] show_stack+0x20/0x38 (C) [ 30.140272] dump_stack_lvl+0x8c/0xd0 [ 30.140462] print_report+0x118/0x608 [ 30.140584] kasan_report+0xdc/0x128 [ 30.140682] __asan_report_store1_noabort+0x20/0x30 [ 30.140797] krealloc_less_oob_helper+0xae4/0xc50 [ 30.140982] krealloc_less_oob+0x20/0x38 [ 30.141102] kunit_try_run_case+0x170/0x3f0 [ 30.141230] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.141373] kthread+0x328/0x630 [ 30.141523] ret_from_fork+0x10/0x20 [ 30.141721] [ 30.141791] Allocated by task 169: [ 30.141898] kasan_save_stack+0x3c/0x68 [ 30.142049] kasan_save_track+0x20/0x40 [ 30.142183] kasan_save_alloc_info+0x40/0x58 [ 30.142283] __kasan_krealloc+0x118/0x178 [ 30.142388] krealloc_noprof+0x128/0x360 [ 30.142541] krealloc_less_oob_helper+0x168/0xc50 [ 30.142663] krealloc_less_oob+0x20/0x38 [ 30.142789] kunit_try_run_case+0x170/0x3f0 [ 30.142935] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.143115] kthread+0x328/0x630 [ 30.143229] ret_from_fork+0x10/0x20 [ 30.143330] [ 30.143371] The buggy address belongs to the object at fff00000c46d1000 [ 30.143371] which belongs to the cache kmalloc-256 of size 256 [ 30.143507] The buggy address is located 33 bytes to the right of [ 30.143507] allocated 201-byte region [fff00000c46d1000, fff00000c46d10c9) [ 30.143655] [ 30.143734] The buggy address belongs to the physical page: [ 30.143824] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1046d0 [ 30.143961] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.144072] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.144194] page_type: f5(slab) [ 30.144287] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.144398] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.144495] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.144625] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.144749] head: 0bfffe0000000001 ffffc1ffc311b401 00000000ffffffff 00000000ffffffff [ 30.144870] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.145004] page dumped because: kasan: bad access detected [ 30.145121] [ 30.145242] Memory state around the buggy address: [ 30.145351] fff00000c46d0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.145493] fff00000c46d1000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.145545] >fff00000c46d1080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.145611] ^ [ 30.145722] fff00000c46d1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.145916] fff00000c46d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.146017] ================================================================== [ 30.322969] ================================================================== [ 30.323255] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 30.323491] Write of size 1 at addr fff00000c77060eb by task kunit_try_catch/173 [ 30.323826] [ 30.324181] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 30.325167] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.325243] Hardware name: linux,dummy-virt (DT) [ 30.325328] Call trace: [ 30.325388] show_stack+0x20/0x38 (C) [ 30.326931] dump_stack_lvl+0x8c/0xd0 [ 30.327117] print_report+0x118/0x608 [ 30.327240] kasan_report+0xdc/0x128 [ 30.327357] __asan_report_store1_noabort+0x20/0x30 [ 30.327480] krealloc_less_oob_helper+0xa58/0xc50 [ 30.327599] krealloc_large_less_oob+0x20/0x38 [ 30.327711] kunit_try_run_case+0x170/0x3f0 [ 30.327835] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.330621] kthread+0x328/0x630 [ 30.331548] ret_from_fork+0x10/0x20 [ 30.331914] [ 30.331965] The buggy address belongs to the physical page: [ 30.332609] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107704 [ 30.333288] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.334043] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.334663] page_type: f8(unknown) [ 30.335009] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.335143] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.335270] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.335391] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.336644] head: 0bfffe0000000002 ffffc1ffc31dc101 00000000ffffffff 00000000ffffffff [ 30.337052] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.337157] page dumped because: kasan: bad access detected [ 30.337229] [ 30.337274] Memory state around the buggy address: [ 30.337469] fff00000c7705f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.337529] fff00000c7706000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.337652] >fff00000c7706080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.337784] ^ [ 30.337937] fff00000c7706100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.338087] fff00000c7706180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.338173] ================================================================== [ 30.241652] ================================================================== [ 30.241852] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 30.243057] Write of size 1 at addr fff00000c77060c9 by task kunit_try_catch/173 [ 30.243285] [ 30.243622] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 30.244379] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.244448] Hardware name: linux,dummy-virt (DT) [ 30.244923] Call trace: [ 30.244985] show_stack+0x20/0x38 (C) [ 30.245850] dump_stack_lvl+0x8c/0xd0 [ 30.246166] print_report+0x118/0x608 [ 30.246722] kasan_report+0xdc/0x128 [ 30.247228] __asan_report_store1_noabort+0x20/0x30 [ 30.247494] krealloc_less_oob_helper+0xa48/0xc50 [ 30.248013] krealloc_large_less_oob+0x20/0x38 [ 30.248527] kunit_try_run_case+0x170/0x3f0 [ 30.248986] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.249228] kthread+0x328/0x630 [ 30.250164] ret_from_fork+0x10/0x20 [ 30.250326] [ 30.250372] The buggy address belongs to the physical page: [ 30.250439] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107704 [ 30.250562] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.251624] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.251847] page_type: f8(unknown) [ 30.252553] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.252769] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.254241] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.254382] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.254479] head: 0bfffe0000000002 ffffc1ffc31dc101 00000000ffffffff 00000000ffffffff [ 30.254590] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.255640] page dumped because: kasan: bad access detected [ 30.256298] [ 30.256578] Memory state around the buggy address: [ 30.257258] fff00000c7705f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.257992] fff00000c7706000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.258117] >fff00000c7706080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.258353] ^ [ 30.259034] fff00000c7706100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.259420] fff00000c7706180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.259523] ================================================================== [ 30.147254] ================================================================== [ 30.147399] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 30.147519] Write of size 1 at addr fff00000c46d10eb by task kunit_try_catch/169 [ 30.147669] [ 30.147958] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 30.148193] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.148259] Hardware name: linux,dummy-virt (DT) [ 30.148342] Call trace: [ 30.148401] show_stack+0x20/0x38 (C) [ 30.148669] dump_stack_lvl+0x8c/0xd0 [ 30.148810] print_report+0x118/0x608 [ 30.148945] kasan_report+0xdc/0x128 [ 30.149058] __asan_report_store1_noabort+0x20/0x30 [ 30.149185] krealloc_less_oob_helper+0xa58/0xc50 [ 30.149321] krealloc_less_oob+0x20/0x38 [ 30.149707] kunit_try_run_case+0x170/0x3f0 [ 30.150077] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.150239] kthread+0x328/0x630 [ 30.150350] ret_from_fork+0x10/0x20 [ 30.150733] [ 30.150801] Allocated by task 169: [ 30.151012] kasan_save_stack+0x3c/0x68 [ 30.151121] kasan_save_track+0x20/0x40 [ 30.151208] kasan_save_alloc_info+0x40/0x58 [ 30.151306] __kasan_krealloc+0x118/0x178 [ 30.151398] krealloc_noprof+0x128/0x360 [ 30.151486] krealloc_less_oob_helper+0x168/0xc50 [ 30.152099] krealloc_less_oob+0x20/0x38 [ 30.152397] kunit_try_run_case+0x170/0x3f0 [ 30.152555] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.152765] kthread+0x328/0x630 [ 30.152931] ret_from_fork+0x10/0x20 [ 30.153164] [ 30.153214] The buggy address belongs to the object at fff00000c46d1000 [ 30.153214] which belongs to the cache kmalloc-256 of size 256 [ 30.153368] The buggy address is located 34 bytes to the right of [ 30.153368] allocated 201-byte region [fff00000c46d1000, fff00000c46d10c9) [ 30.153506] [ 30.153557] The buggy address belongs to the physical page: [ 30.154151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1046d0 [ 30.154475] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.154595] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.154712] page_type: f5(slab) [ 30.154981] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.155450] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.155744] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.155981] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.156262] head: 0bfffe0000000001 ffffc1ffc311b401 00000000ffffffff 00000000ffffffff [ 30.156410] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.156756] page dumped because: kasan: bad access detected [ 30.156932] [ 30.156976] Memory state around the buggy address: [ 30.157113] fff00000c46d0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.157404] fff00000c46d1000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.157622] >fff00000c46d1080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.157766] ^ [ 30.158137] fff00000c46d1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.158260] fff00000c46d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.158354] ================================================================== [ 30.264938] ================================================================== [ 30.265448] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 30.266007] Write of size 1 at addr fff00000c77060d0 by task kunit_try_catch/173 [ 30.266645] [ 30.266758] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 30.267009] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.267079] Hardware name: linux,dummy-virt (DT) [ 30.267176] Call trace: [ 30.267855] show_stack+0x20/0x38 (C) [ 30.269041] dump_stack_lvl+0x8c/0xd0 [ 30.269224] print_report+0x118/0x608 [ 30.270080] kasan_report+0xdc/0x128 [ 30.270220] __asan_report_store1_noabort+0x20/0x30 [ 30.270331] krealloc_less_oob_helper+0xb9c/0xc50 [ 30.270450] krealloc_large_less_oob+0x20/0x38 [ 30.270587] kunit_try_run_case+0x170/0x3f0 [ 30.270745] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.271990] kthread+0x328/0x630 [ 30.272836] ret_from_fork+0x10/0x20 [ 30.273392] [ 30.273482] The buggy address belongs to the physical page: [ 30.273807] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107704 [ 30.273962] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.274567] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.274862] page_type: f8(unknown) [ 30.275118] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.275256] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.275803] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.276297] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.276630] head: 0bfffe0000000002 ffffc1ffc31dc101 00000000ffffffff 00000000ffffffff [ 30.277013] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.277123] page dumped because: kasan: bad access detected [ 30.277816] [ 30.278028] Memory state around the buggy address: [ 30.278235] fff00000c7705f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.278364] fff00000c7706000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.278472] >fff00000c7706080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.278572] ^ [ 30.278666] fff00000c7706100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.278770] fff00000c7706180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.278862] ================================================================== [ 30.285159] ================================================================== [ 30.285760] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 30.286462] Write of size 1 at addr fff00000c77060da by task kunit_try_catch/173 [ 30.286989] [ 30.287101] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 30.287901] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.288250] Hardware name: linux,dummy-virt (DT) [ 30.288456] Call trace: [ 30.288517] show_stack+0x20/0x38 (C) [ 30.288935] dump_stack_lvl+0x8c/0xd0 [ 30.289718] print_report+0x118/0x608 [ 30.289999] kasan_report+0xdc/0x128 [ 30.290120] __asan_report_store1_noabort+0x20/0x30 [ 30.290242] krealloc_less_oob_helper+0xa80/0xc50 [ 30.290364] krealloc_large_less_oob+0x20/0x38 [ 30.290464] kunit_try_run_case+0x170/0x3f0 [ 30.292533] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.293487] kthread+0x328/0x630 [ 30.294075] ret_from_fork+0x10/0x20 [ 30.294651] [ 30.294705] The buggy address belongs to the physical page: [ 30.294786] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107704 [ 30.295900] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.296824] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.296992] page_type: f8(unknown) [ 30.297451] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.297670] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.298288] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.298589] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.298847] head: 0bfffe0000000002 ffffc1ffc31dc101 00000000ffffffff 00000000ffffffff [ 30.299547] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.299924] page dumped because: kasan: bad access detected [ 30.300024] [ 30.300071] Memory state around the buggy address: [ 30.300159] fff00000c7705f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.300269] fff00000c7706000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.300374] >fff00000c7706080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.300473] ^ [ 30.300570] fff00000c7706100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.300676] fff00000c7706180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.300771] ================================================================== [ 30.307958] ================================================================== [ 30.308091] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 30.308232] Write of size 1 at addr fff00000c77060ea by task kunit_try_catch/173 [ 30.308357] [ 30.308445] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 30.308657] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.308722] Hardware name: linux,dummy-virt (DT) [ 30.308798] Call trace: [ 30.308855] show_stack+0x20/0x38 (C) [ 30.308986] dump_stack_lvl+0x8c/0xd0 [ 30.309678] print_report+0x118/0x608 [ 30.309816] kasan_report+0xdc/0x128 [ 30.309955] __asan_report_store1_noabort+0x20/0x30 [ 30.310180] krealloc_less_oob_helper+0xae4/0xc50 [ 30.310365] krealloc_large_less_oob+0x20/0x38 [ 30.310529] kunit_try_run_case+0x170/0x3f0 [ 30.310688] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.310803] kthread+0x328/0x630 [ 30.311168] ret_from_fork+0x10/0x20 [ 30.311323] [ 30.311375] The buggy address belongs to the physical page: [ 30.311728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107704 [ 30.311914] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.312078] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.312215] page_type: f8(unknown) [ 30.312307] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.312585] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.312922] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.313098] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.313267] head: 0bfffe0000000002 ffffc1ffc31dc101 00000000ffffffff 00000000ffffffff [ 30.313492] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.313633] page dumped because: kasan: bad access detected [ 30.313713] [ 30.313752] Memory state around the buggy address: [ 30.314095] fff00000c7705f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.314867] fff00000c7706000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.315351] >fff00000c7706080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.315732] ^ [ 30.316081] fff00000c7706100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.316311] fff00000c7706180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.317088] ================================================================== [ 30.114199] ================================================================== [ 30.114313] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 30.114429] Write of size 1 at addr fff00000c46d10d0 by task kunit_try_catch/169 [ 30.114535] [ 30.114615] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 30.114803] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.114867] Hardware name: linux,dummy-virt (DT) [ 30.114987] Call trace: [ 30.115049] show_stack+0x20/0x38 (C) [ 30.115175] dump_stack_lvl+0x8c/0xd0 [ 30.115297] print_report+0x118/0x608 [ 30.115428] kasan_report+0xdc/0x128 [ 30.115589] __asan_report_store1_noabort+0x20/0x30 [ 30.115756] krealloc_less_oob_helper+0xb9c/0xc50 [ 30.115888] krealloc_less_oob+0x20/0x38 [ 30.116004] kunit_try_run_case+0x170/0x3f0 [ 30.116133] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.116311] kthread+0x328/0x630 [ 30.116450] ret_from_fork+0x10/0x20 [ 30.116585] [ 30.116630] Allocated by task 169: [ 30.116692] kasan_save_stack+0x3c/0x68 [ 30.116786] kasan_save_track+0x20/0x40 [ 30.116946] kasan_save_alloc_info+0x40/0x58 [ 30.117095] __kasan_krealloc+0x118/0x178 [ 30.117193] krealloc_noprof+0x128/0x360 [ 30.117279] krealloc_less_oob_helper+0x168/0xc50 [ 30.117383] krealloc_less_oob+0x20/0x38 [ 30.117490] kunit_try_run_case+0x170/0x3f0 [ 30.117582] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.117723] kthread+0x328/0x630 [ 30.117851] ret_from_fork+0x10/0x20 [ 30.118184] [ 30.118232] The buggy address belongs to the object at fff00000c46d1000 [ 30.118232] which belongs to the cache kmalloc-256 of size 256 [ 30.118353] The buggy address is located 7 bytes to the right of [ 30.118353] allocated 201-byte region [fff00000c46d1000, fff00000c46d10c9) [ 30.118509] [ 30.118561] The buggy address belongs to the physical page: [ 30.118628] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1046d0 [ 30.118730] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.118833] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.118992] page_type: f5(slab) [ 30.119094] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.119248] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.119375] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.119502] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.119631] head: 0bfffe0000000001 ffffc1ffc311b401 00000000ffffffff 00000000ffffffff [ 30.119746] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.119844] page dumped because: kasan: bad access detected [ 30.119980] [ 30.120022] Memory state around the buggy address: [ 30.120135] fff00000c46d0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.120341] fff00000c46d1000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.120538] >fff00000c46d1080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.120687] ^ [ 30.120859] fff00000c46d1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.121030] fff00000c46d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.121277] ================================================================== [ 30.123350] ================================================================== [ 30.123473] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 30.123593] Write of size 1 at addr fff00000c46d10da by task kunit_try_catch/169 [ 30.123714] [ 30.123802] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 30.124003] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.124066] Hardware name: linux,dummy-virt (DT) [ 30.124143] Call trace: [ 30.124203] show_stack+0x20/0x38 (C) [ 30.124763] dump_stack_lvl+0x8c/0xd0 [ 30.124902] print_report+0x118/0x608 [ 30.125009] kasan_report+0xdc/0x128 [ 30.125114] __asan_report_store1_noabort+0x20/0x30 [ 30.125285] krealloc_less_oob_helper+0xa80/0xc50 [ 30.125561] krealloc_less_oob+0x20/0x38 [ 30.125850] kunit_try_run_case+0x170/0x3f0 [ 30.126295] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.126453] kthread+0x328/0x630 [ 30.126552] ret_from_fork+0x10/0x20 [ 30.126660] [ 30.126703] Allocated by task 169: [ 30.126913] kasan_save_stack+0x3c/0x68 [ 30.127024] kasan_save_track+0x20/0x40 [ 30.127116] kasan_save_alloc_info+0x40/0x58 [ 30.127208] __kasan_krealloc+0x118/0x178 [ 30.127298] krealloc_noprof+0x128/0x360 [ 30.127460] krealloc_less_oob_helper+0x168/0xc50 [ 30.127583] krealloc_less_oob+0x20/0x38 [ 30.127675] kunit_try_run_case+0x170/0x3f0 [ 30.127763] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.127880] kthread+0x328/0x630 [ 30.128393] ret_from_fork+0x10/0x20 [ 30.128467] [ 30.128492] The buggy address belongs to the object at fff00000c46d1000 [ 30.128492] which belongs to the cache kmalloc-256 of size 256 [ 30.128692] The buggy address is located 17 bytes to the right of [ 30.128692] allocated 201-byte region [fff00000c46d1000, fff00000c46d10c9) [ 30.128863] [ 30.128924] The buggy address belongs to the physical page: [ 30.129007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1046d0 [ 30.129140] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.129258] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.129388] page_type: f5(slab) [ 30.129484] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.129610] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.129734] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.129853] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.131557] head: 0bfffe0000000001 ffffc1ffc311b401 00000000ffffffff 00000000ffffffff [ 30.131866] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.132426] page dumped because: kasan: bad access detected [ 30.132793] [ 30.132863] Memory state around the buggy address: [ 30.132952] fff00000c46d0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.133714] fff00000c46d1000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.133832] >fff00000c46d1080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.134488] ^ [ 30.134893] fff00000c46d1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.135249] fff00000c46d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.135730] ================================================================== [ 30.101334] ================================================================== [ 30.101564] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 30.102111] Write of size 1 at addr fff00000c46d10c9 by task kunit_try_catch/169 [ 30.102272] [ 30.102356] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 30.102548] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.102897] Hardware name: linux,dummy-virt (DT) [ 30.103081] Call trace: [ 30.103186] show_stack+0x20/0x38 (C) [ 30.103531] dump_stack_lvl+0x8c/0xd0 [ 30.103767] print_report+0x118/0x608 [ 30.104112] kasan_report+0xdc/0x128 [ 30.104237] __asan_report_store1_noabort+0x20/0x30 [ 30.104455] krealloc_less_oob_helper+0xa48/0xc50 [ 30.104728] krealloc_less_oob+0x20/0x38 [ 30.104989] kunit_try_run_case+0x170/0x3f0 [ 30.105115] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.105245] kthread+0x328/0x630 [ 30.105346] ret_from_fork+0x10/0x20 [ 30.105741] [ 30.105790] Allocated by task 169: [ 30.106585] kasan_save_stack+0x3c/0x68 [ 30.106710] kasan_save_track+0x20/0x40 [ 30.106835] kasan_save_alloc_info+0x40/0x58 [ 30.107024] __kasan_krealloc+0x118/0x178 [ 30.107111] krealloc_noprof+0x128/0x360 [ 30.107185] krealloc_less_oob_helper+0x168/0xc50 [ 30.107521] krealloc_less_oob+0x20/0x38 [ 30.107645] kunit_try_run_case+0x170/0x3f0 [ 30.107844] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.108065] kthread+0x328/0x630 [ 30.108239] ret_from_fork+0x10/0x20 [ 30.108384] [ 30.108457] The buggy address belongs to the object at fff00000c46d1000 [ 30.108457] which belongs to the cache kmalloc-256 of size 256 [ 30.108613] The buggy address is located 0 bytes to the right of [ 30.108613] allocated 201-byte region [fff00000c46d1000, fff00000c46d10c9) [ 30.108765] [ 30.108818] The buggy address belongs to the physical page: [ 30.108910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1046d0 [ 30.109064] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.109235] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.109458] page_type: f5(slab) [ 30.109556] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.109743] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.110241] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.110659] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.110770] head: 0bfffe0000000001 ffffc1ffc311b401 00000000ffffffff 00000000ffffffff [ 30.110934] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.111040] page dumped because: kasan: bad access detected [ 30.111100] [ 30.111132] Memory state around the buggy address: [ 30.111190] fff00000c46d0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.111283] fff00000c46d1000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.111379] >fff00000c46d1080: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.111489] ^ [ 30.111637] fff00000c46d1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.111782] fff00000c46d1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.111925] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 30.048908] ================================================================== [ 30.049150] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 30.049305] Write of size 1 at addr fff00000c46d0eeb by task kunit_try_catch/167 [ 30.049474] [ 30.049566] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 30.049794] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.049864] Hardware name: linux,dummy-virt (DT) [ 30.049974] Call trace: [ 30.050039] show_stack+0x20/0x38 (C) [ 30.050183] dump_stack_lvl+0x8c/0xd0 [ 30.050305] print_report+0x118/0x608 [ 30.050418] kasan_report+0xdc/0x128 [ 30.050548] __asan_report_store1_noabort+0x20/0x30 [ 30.050677] krealloc_more_oob_helper+0x60c/0x678 [ 30.050796] krealloc_more_oob+0x20/0x38 [ 30.050933] kunit_try_run_case+0x170/0x3f0 [ 30.051078] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.051218] kthread+0x328/0x630 [ 30.051359] ret_from_fork+0x10/0x20 [ 30.051493] [ 30.051541] Allocated by task 167: [ 30.051638] kasan_save_stack+0x3c/0x68 [ 30.051733] kasan_save_track+0x20/0x40 [ 30.051805] kasan_save_alloc_info+0x40/0x58 [ 30.051888] __kasan_krealloc+0x118/0x178 [ 30.051993] krealloc_noprof+0x128/0x360 [ 30.052076] krealloc_more_oob_helper+0x168/0x678 [ 30.052165] krealloc_more_oob+0x20/0x38 [ 30.052248] kunit_try_run_case+0x170/0x3f0 [ 30.052358] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.052507] kthread+0x328/0x630 [ 30.052619] ret_from_fork+0x10/0x20 [ 30.052739] [ 30.052807] The buggy address belongs to the object at fff00000c46d0e00 [ 30.052807] which belongs to the cache kmalloc-256 of size 256 [ 30.053033] The buggy address is located 0 bytes to the right of [ 30.053033] allocated 235-byte region [fff00000c46d0e00, fff00000c46d0eeb) [ 30.053263] [ 30.053314] The buggy address belongs to the physical page: [ 30.053395] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1046d0 [ 30.053546] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.053680] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.053807] page_type: f5(slab) [ 30.053913] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.054026] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.054162] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.054230] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.054290] head: 0bfffe0000000001 ffffc1ffc311b401 00000000ffffffff 00000000ffffffff [ 30.054349] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.054397] page dumped because: kasan: bad access detected [ 30.054436] [ 30.054460] Memory state around the buggy address: [ 30.054507] fff00000c46d0d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.054557] fff00000c46d0e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.054604] >fff00000c46d0e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 30.054645] ^ [ 30.054687] fff00000c46d0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.054734] fff00000c46d0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.054775] ================================================================== [ 30.055736] ================================================================== [ 30.055856] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 30.056252] Write of size 1 at addr fff00000c46d0ef0 by task kunit_try_catch/167 [ 30.056374] [ 30.056542] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 30.056760] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.056832] Hardware name: linux,dummy-virt (DT) [ 30.056942] Call trace: [ 30.056998] show_stack+0x20/0x38 (C) [ 30.057120] dump_stack_lvl+0x8c/0xd0 [ 30.057238] print_report+0x118/0x608 [ 30.057351] kasan_report+0xdc/0x128 [ 30.057472] __asan_report_store1_noabort+0x20/0x30 [ 30.057618] krealloc_more_oob_helper+0x5c0/0x678 [ 30.057742] krealloc_more_oob+0x20/0x38 [ 30.057865] kunit_try_run_case+0x170/0x3f0 [ 30.058010] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.058141] kthread+0x328/0x630 [ 30.058234] ret_from_fork+0x10/0x20 [ 30.058346] [ 30.058429] Allocated by task 167: [ 30.058685] kasan_save_stack+0x3c/0x68 [ 30.058839] kasan_save_track+0x20/0x40 [ 30.059078] kasan_save_alloc_info+0x40/0x58 [ 30.059257] __kasan_krealloc+0x118/0x178 [ 30.059419] krealloc_noprof+0x128/0x360 [ 30.059568] krealloc_more_oob_helper+0x168/0x678 [ 30.059897] krealloc_more_oob+0x20/0x38 [ 30.060134] kunit_try_run_case+0x170/0x3f0 [ 30.060224] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.060386] kthread+0x328/0x630 [ 30.060468] ret_from_fork+0x10/0x20 [ 30.060845] [ 30.061001] The buggy address belongs to the object at fff00000c46d0e00 [ 30.061001] which belongs to the cache kmalloc-256 of size 256 [ 30.061223] The buggy address is located 5 bytes to the right of [ 30.061223] allocated 235-byte region [fff00000c46d0e00, fff00000c46d0eeb) [ 30.061664] [ 30.061727] The buggy address belongs to the physical page: [ 30.061818] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1046d0 [ 30.062248] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.062394] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.062537] page_type: f5(slab) [ 30.062638] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.062765] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.062898] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.063024] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.063151] head: 0bfffe0000000001 ffffc1ffc311b401 00000000ffffffff 00000000ffffffff [ 30.063276] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.063366] page dumped because: kasan: bad access detected [ 30.063424] [ 30.063458] Memory state around the buggy address: [ 30.063524] fff00000c46d0d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.063622] fff00000c46d0e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.063726] >fff00000c46d0e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 30.063822] ^ [ 30.065317] fff00000c46d0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.065474] fff00000c46d0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.065567] ================================================================== [ 30.195237] ================================================================== [ 30.195691] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 30.195831] Write of size 1 at addr fff00000c77020f0 by task kunit_try_catch/171 [ 30.195983] [ 30.196336] CPU: 1 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 30.196898] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.196981] Hardware name: linux,dummy-virt (DT) [ 30.197074] Call trace: [ 30.197135] show_stack+0x20/0x38 (C) [ 30.197257] dump_stack_lvl+0x8c/0xd0 [ 30.197383] print_report+0x118/0x608 [ 30.197493] kasan_report+0xdc/0x128 [ 30.198126] __asan_report_store1_noabort+0x20/0x30 [ 30.198347] krealloc_more_oob_helper+0x5c0/0x678 [ 30.199044] krealloc_large_more_oob+0x20/0x38 [ 30.199278] kunit_try_run_case+0x170/0x3f0 [ 30.199430] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.199567] kthread+0x328/0x630 [ 30.199679] ret_from_fork+0x10/0x20 [ 30.200086] [ 30.200413] The buggy address belongs to the physical page: [ 30.200494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107700 [ 30.201093] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.201229] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.201369] page_type: f8(unknown) [ 30.201627] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.201762] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.201902] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.202383] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.202804] head: 0bfffe0000000002 ffffc1ffc31dc001 00000000ffffffff 00000000ffffffff [ 30.202957] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.203402] page dumped because: kasan: bad access detected [ 30.203509] [ 30.203559] Memory state around the buggy address: [ 30.203697] fff00000c7701f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.203910] fff00000c7702000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.204138] >fff00000c7702080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 30.204234] ^ [ 30.204672] fff00000c7702100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.204793] fff00000c7702180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.204905] ================================================================== [ 30.182713] ================================================================== [ 30.182907] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 30.183077] Write of size 1 at addr fff00000c77020eb by task kunit_try_catch/171 [ 30.183193] [ 30.183286] CPU: 1 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 30.183504] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.183569] Hardware name: linux,dummy-virt (DT) [ 30.183647] Call trace: [ 30.183702] show_stack+0x20/0x38 (C) [ 30.183827] dump_stack_lvl+0x8c/0xd0 [ 30.184393] print_report+0x118/0x608 [ 30.184585] kasan_report+0xdc/0x128 [ 30.184842] __asan_report_store1_noabort+0x20/0x30 [ 30.185372] krealloc_more_oob_helper+0x60c/0x678 [ 30.185724] krealloc_large_more_oob+0x20/0x38 [ 30.186146] kunit_try_run_case+0x170/0x3f0 [ 30.186225] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.186286] kthread+0x328/0x630 [ 30.186335] ret_from_fork+0x10/0x20 [ 30.186391] [ 30.186418] The buggy address belongs to the physical page: [ 30.186457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107700 [ 30.186519] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.186571] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.186634] page_type: f8(unknown) [ 30.186684] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.186739] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.186792] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.186843] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.186935] head: 0bfffe0000000002 ffffc1ffc31dc001 00000000ffffffff 00000000ffffffff [ 30.187130] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.187344] page dumped because: kasan: bad access detected [ 30.187456] [ 30.187584] Memory state around the buggy address: [ 30.187957] fff00000c7701f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.189920] fff00000c7702000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.190054] >fff00000c7702080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 30.190152] ^ [ 30.190254] fff00000c7702100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.191045] fff00000c7702180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.191736] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[ 29.966470] ================================================================== [ 29.967049] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 29.967310] Free of addr fff00000c7700001 by task kunit_try_catch/161 [ 29.967599] [ 29.967831] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 29.968489] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.968591] Hardware name: linux,dummy-virt (DT) [ 29.968740] Call trace: [ 29.968808] show_stack+0x20/0x38 (C) [ 29.969111] dump_stack_lvl+0x8c/0xd0 [ 29.969339] print_report+0x118/0x608 [ 29.969555] kasan_report_invalid_free+0xc0/0xe8 [ 29.969990] __kasan_kfree_large+0x5c/0xa8 [ 29.970178] free_large_kmalloc+0x68/0x150 [ 29.970439] kfree+0x270/0x3c8 [ 29.970644] kmalloc_large_invalid_free+0x108/0x270 [ 29.970941] kunit_try_run_case+0x170/0x3f0 [ 29.971097] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.971227] kthread+0x328/0x630 [ 29.971471] ret_from_fork+0x10/0x20 [ 29.971821] [ 29.971894] The buggy address belongs to the physical page: [ 29.971969] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107700 [ 29.972089] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.972365] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.972678] page_type: f8(unknown) [ 29.972869] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.973068] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.973747] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.973984] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.974222] head: 0bfffe0000000002 ffffc1ffc31dc001 00000000ffffffff 00000000ffffffff [ 29.974495] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 29.974688] page dumped because: kasan: bad access detected [ 29.974764] [ 29.974802] Memory state around the buggy address: [ 29.974880] fff00000c76fff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.975164] fff00000c76fff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.975274] >fff00000c7700000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.975450] ^ [ 29.975513] fff00000c7700080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.975603] fff00000c7700100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.975722] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 29.939500] ================================================================== [ 29.939946] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 29.940192] Read of size 1 at addr fff00000c7540000 by task kunit_try_catch/159 [ 29.940372] [ 29.940468] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 29.940992] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.941097] Hardware name: linux,dummy-virt (DT) [ 29.941174] Call trace: [ 29.941244] show_stack+0x20/0x38 (C) [ 29.941426] dump_stack_lvl+0x8c/0xd0 [ 29.941597] print_report+0x118/0x608 [ 29.941757] kasan_report+0xdc/0x128 [ 29.941884] __asan_report_load1_noabort+0x20/0x30 [ 29.942064] kmalloc_large_uaf+0x2cc/0x2f8 [ 29.942225] kunit_try_run_case+0x170/0x3f0 [ 29.942386] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.942550] kthread+0x328/0x630 [ 29.942670] ret_from_fork+0x10/0x20 [ 29.942837] [ 29.942941] The buggy address belongs to the physical page: [ 29.943030] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c7546600 pfn:0x107540 [ 29.943418] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.943914] raw: 0bfffe0000000000 fff00000da492c80 fff00000da492c80 0000000000000000 [ 29.944022] raw: fff00000c7546600 0000000000000000 00000000ffffffff 0000000000000000 [ 29.944107] page dumped because: kasan: bad access detected [ 29.944180] [ 29.944217] Memory state around the buggy address: [ 29.944283] fff00000c753ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.944368] fff00000c753ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.944464] >fff00000c7540000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.944575] ^ [ 29.944684] fff00000c7540080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.944834] fff00000c7540100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.944975] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 29.915346] ================================================================== [ 29.915547] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 29.915703] Write of size 1 at addr fff00000c754200a by task kunit_try_catch/157 [ 29.915827] [ 29.916628] CPU: 1 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 29.916884] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.916949] Hardware name: linux,dummy-virt (DT) [ 29.917029] Call trace: [ 29.917095] show_stack+0x20/0x38 (C) [ 29.917239] dump_stack_lvl+0x8c/0xd0 [ 29.917310] print_report+0x118/0x608 [ 29.917364] kasan_report+0xdc/0x128 [ 29.917425] __asan_report_store1_noabort+0x20/0x30 [ 29.917646] kmalloc_large_oob_right+0x278/0x2b8 [ 29.917760] kunit_try_run_case+0x170/0x3f0 [ 29.917910] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.918167] kthread+0x328/0x630 [ 29.918302] ret_from_fork+0x10/0x20 [ 29.918438] [ 29.918537] The buggy address belongs to the physical page: [ 29.918623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c7546600 pfn:0x107540 [ 29.918804] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.918919] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.919077] page_type: f8(unknown) [ 29.919166] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.919259] raw: fff00000c7546600 0000000000000000 00000000f8000000 0000000000000000 [ 29.919360] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.919452] head: fff00000c7546600 0000000000000000 00000000f8000000 0000000000000000 [ 29.919545] head: 0bfffe0000000002 ffffc1ffc31d5001 00000000ffffffff 00000000ffffffff [ 29.919654] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 29.919787] page dumped because: kasan: bad access detected [ 29.919900] [ 29.920052] Memory state around the buggy address: [ 29.920134] fff00000c7541f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.920239] fff00000c7541f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.920345] >fff00000c7542000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.920442] ^ [ 29.920512] fff00000c7542080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.921340] fff00000c7542100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.921461] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 29.879454] ================================================================== [ 29.879778] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 29.879939] Write of size 1 at addr fff00000c646df00 by task kunit_try_catch/155 [ 29.880048] [ 29.880127] CPU: 1 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 29.880684] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.880760] Hardware name: linux,dummy-virt (DT) [ 29.880863] Call trace: [ 29.880950] show_stack+0x20/0x38 (C) [ 29.881120] dump_stack_lvl+0x8c/0xd0 [ 29.881268] print_report+0x118/0x608 [ 29.881376] kasan_report+0xdc/0x128 [ 29.881478] __asan_report_store1_noabort+0x20/0x30 [ 29.881599] kmalloc_big_oob_right+0x2a4/0x2f0 [ 29.881722] kunit_try_run_case+0x170/0x3f0 [ 29.881893] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.882077] kthread+0x328/0x630 [ 29.882201] ret_from_fork+0x10/0x20 [ 29.882300] [ 29.882338] Allocated by task 155: [ 29.882423] kasan_save_stack+0x3c/0x68 [ 29.882521] kasan_save_track+0x20/0x40 [ 29.883233] kasan_save_alloc_info+0x40/0x58 [ 29.883338] __kasan_kmalloc+0xd4/0xd8 [ 29.883436] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.883558] kmalloc_big_oob_right+0xb8/0x2f0 [ 29.883679] kunit_try_run_case+0x170/0x3f0 [ 29.884361] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.884498] kthread+0x328/0x630 [ 29.884626] ret_from_fork+0x10/0x20 [ 29.884708] [ 29.884758] The buggy address belongs to the object at fff00000c646c000 [ 29.884758] which belongs to the cache kmalloc-8k of size 8192 [ 29.884973] The buggy address is located 0 bytes to the right of [ 29.884973] allocated 7936-byte region [fff00000c646c000, fff00000c646df00) [ 29.885189] [ 29.885259] The buggy address belongs to the physical page: [ 29.885373] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106468 [ 29.885490] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.885587] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.885858] page_type: f5(slab) [ 29.885967] raw: 0bfffe0000000040 fff00000c0002280 dead000000000100 dead000000000122 [ 29.886074] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 29.886175] head: 0bfffe0000000040 fff00000c0002280 dead000000000100 dead000000000122 [ 29.886271] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 29.886373] head: 0bfffe0000000003 ffffc1ffc3191a01 00000000ffffffff 00000000ffffffff [ 29.886470] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 29.887025] page dumped because: kasan: bad access detected [ 29.887165] [ 29.887208] Memory state around the buggy address: [ 29.887294] fff00000c646de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.887397] fff00000c646de80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.887496] >fff00000c646df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.887582] ^ [ 29.887650] fff00000c646df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.887754] fff00000c646e000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.887856] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[ 29.843663] ================================================================== [ 29.843810] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488 [ 29.843953] Write of size 1 at addr fff00000c6466778 by task kunit_try_catch/153 [ 29.844076] [ 29.844164] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 29.844369] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.844431] Hardware name: linux,dummy-virt (DT) [ 29.845691] Call trace: [ 29.845784] show_stack+0x20/0x38 (C) [ 29.846204] dump_stack_lvl+0x8c/0xd0 [ 29.846866] print_report+0x118/0x608 [ 29.847369] kasan_report+0xdc/0x128 [ 29.847501] __asan_report_store1_noabort+0x20/0x30 [ 29.847925] kmalloc_track_caller_oob_right+0x418/0x488 [ 29.848291] kunit_try_run_case+0x170/0x3f0 [ 29.848452] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.848592] kthread+0x328/0x630 [ 29.848758] ret_from_fork+0x10/0x20 [ 29.848997] [ 29.849046] Allocated by task 153: [ 29.849192] kasan_save_stack+0x3c/0x68 [ 29.849286] kasan_save_track+0x20/0x40 [ 29.849383] kasan_save_alloc_info+0x40/0x58 [ 29.849472] __kasan_kmalloc+0xd4/0xd8 [ 29.850159] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 29.850340] kmalloc_track_caller_oob_right+0x184/0x488 [ 29.850675] kunit_try_run_case+0x170/0x3f0 [ 29.850842] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.850977] kthread+0x328/0x630 [ 29.851116] ret_from_fork+0x10/0x20 [ 29.851210] [ 29.851259] The buggy address belongs to the object at fff00000c6466700 [ 29.851259] which belongs to the cache kmalloc-128 of size 128 [ 29.851694] The buggy address is located 0 bytes to the right of [ 29.851694] allocated 120-byte region [fff00000c6466700, fff00000c6466778) [ 29.852542] [ 29.852604] The buggy address belongs to the physical page: [ 29.852802] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106466 [ 29.852954] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.853342] page_type: f5(slab) [ 29.853686] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 29.853801] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.853896] page dumped because: kasan: bad access detected [ 29.853964] [ 29.854003] Memory state around the buggy address: [ 29.854075] fff00000c6466600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.854520] fff00000c6466680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.854632] >fff00000c6466700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.855304] ^ [ 29.855837] fff00000c6466780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.856030] fff00000c6466800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.856327] ================================================================== [ 29.829548] ================================================================== [ 29.830046] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 29.830443] Write of size 1 at addr fff00000c6466678 by task kunit_try_catch/153 [ 29.830634] [ 29.830765] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 29.831469] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.831671] Hardware name: linux,dummy-virt (DT) [ 29.832007] Call trace: [ 29.832078] show_stack+0x20/0x38 (C) [ 29.832318] dump_stack_lvl+0x8c/0xd0 [ 29.832513] print_report+0x118/0x608 [ 29.832816] kasan_report+0xdc/0x128 [ 29.833104] __asan_report_store1_noabort+0x20/0x30 [ 29.833245] kmalloc_track_caller_oob_right+0x40c/0x488 [ 29.833593] kunit_try_run_case+0x170/0x3f0 [ 29.833761] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.833971] kthread+0x328/0x630 [ 29.834125] ret_from_fork+0x10/0x20 [ 29.834366] [ 29.834416] Allocated by task 153: [ 29.834510] kasan_save_stack+0x3c/0x68 [ 29.834638] kasan_save_track+0x20/0x40 [ 29.834820] kasan_save_alloc_info+0x40/0x58 [ 29.835018] __kasan_kmalloc+0xd4/0xd8 [ 29.835766] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 29.836005] kmalloc_track_caller_oob_right+0xa8/0x488 [ 29.836113] kunit_try_run_case+0x170/0x3f0 [ 29.836263] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.836372] kthread+0x328/0x630 [ 29.836452] ret_from_fork+0x10/0x20 [ 29.836539] [ 29.836584] The buggy address belongs to the object at fff00000c6466600 [ 29.836584] which belongs to the cache kmalloc-128 of size 128 [ 29.836727] The buggy address is located 0 bytes to the right of [ 29.836727] allocated 120-byte region [fff00000c6466600, fff00000c6466678) [ 29.836899] [ 29.836952] The buggy address belongs to the physical page: [ 29.837040] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106466 [ 29.837173] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.837302] page_type: f5(slab) [ 29.837402] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 29.837549] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.837642] page dumped because: kasan: bad access detected [ 29.837719] [ 29.838216] Memory state around the buggy address: [ 29.838311] fff00000c6466500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.838422] fff00000c6466580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.838632] >fff00000c6466600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.839202] ^ [ 29.839328] fff00000c6466680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.839468] fff00000c6466700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.839567] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 29.776433] ================================================================== [ 29.776627] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 29.776786] Read of size 1 at addr fff00000c76c1000 by task kunit_try_catch/151 [ 29.778394] [ 29.778596] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 29.779039] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.779189] Hardware name: linux,dummy-virt (DT) [ 29.779266] Call trace: [ 29.779809] show_stack+0x20/0x38 (C) [ 29.780061] dump_stack_lvl+0x8c/0xd0 [ 29.780634] print_report+0x118/0x608 [ 29.780760] kasan_report+0xdc/0x128 [ 29.780889] __asan_report_load1_noabort+0x20/0x30 [ 29.781023] kmalloc_node_oob_right+0x2f4/0x330 [ 29.782079] kunit_try_run_case+0x170/0x3f0 [ 29.782360] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.782577] kthread+0x328/0x630 [ 29.782691] ret_from_fork+0x10/0x20 [ 29.782920] [ 29.782995] Allocated by task 151: [ 29.783325] kasan_save_stack+0x3c/0x68 [ 29.783616] kasan_save_track+0x20/0x40 [ 29.783837] kasan_save_alloc_info+0x40/0x58 [ 29.784033] __kasan_kmalloc+0xd4/0xd8 [ 29.784205] __kmalloc_cache_node_noprof+0x178/0x3d0 [ 29.784311] kmalloc_node_oob_right+0xbc/0x330 [ 29.784397] kunit_try_run_case+0x170/0x3f0 [ 29.784954] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.785093] kthread+0x328/0x630 [ 29.785247] ret_from_fork+0x10/0x20 [ 29.785355] [ 29.785412] The buggy address belongs to the object at fff00000c76c0000 [ 29.785412] which belongs to the cache kmalloc-4k of size 4096 [ 29.785980] The buggy address is located 0 bytes to the right of [ 29.785980] allocated 4096-byte region [fff00000c76c0000, fff00000c76c1000) [ 29.786274] [ 29.786332] The buggy address belongs to the physical page: [ 29.786645] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076c0 [ 29.787633] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.788080] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.788481] page_type: f5(slab) [ 29.788585] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 29.788712] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 29.788849] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 29.788987] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 29.790141] head: 0bfffe0000000003 ffffc1ffc31db001 00000000ffffffff 00000000ffffffff [ 29.790456] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 29.790571] page dumped because: kasan: bad access detected [ 29.790662] [ 29.790711] Memory state around the buggy address: [ 29.791788] fff00000c76c0f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.792404] fff00000c76c0f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.793286] >fff00000c76c1000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.793424] ^ [ 29.793830] fff00000c76c1080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.794134] fff00000c76c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.794693] ==================================================================
Failure - log-parser-boot - exception-warning-libmathint_log-at-intlog10
------------[ cut here ]------------ [ 113.436537] WARNING: lib/math/int_log.c:120 at intlog10+0x38/0x48, CPU#0: kunit_try_catch/669 [ 113.437703] Modules linked in: [ 113.438171] CPU: 0 UID: 0 PID: 669 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 113.439447] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 113.440072] Hardware name: linux,dummy-virt (DT) [ 113.440472] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 113.441492] pc : intlog10+0x38/0x48 [ 113.441920] lr : intlog10_test+0xe4/0x200 [ 113.442669] sp : ffff800082077c10 [ 113.443151] x29: ffff800082077c90 x28: 0000000000000000 x27: 0000000000000000 [ 113.443985] x26: 1ffe000018cfa461 x25: 0000000000000000 x24: ffff800082077ce0 [ 113.444615] x23: ffff800082077d00 x22: 0000000000000000 x21: 1ffff0001040ef82 [ 113.445286] x20: ffffa881257dce20 x19: ffff800080087990 x18: 00000000ebcb8871 [ 113.446104] x17: 00000000f36b2681 x16: 00000000cb7aa8eb x15: 00000000fd8c1a4c [ 113.447132] x14: 00000000fa783820 x13: 1ffe00001b48d989 x12: ffff7510252c8789 [ 113.447943] x11: 1ffff510252c8788 x10: ffff7510252c8788 x9 : ffffa88122e3de04 [ 113.448555] x8 : ffffa88129643c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 113.449202] x5 : ffff70001040ef82 x4 : 1ffff00010010f3a x3 : 1ffff51024afb9c4 [ 113.450233] x2 : 1ffff51024afb9c4 x1 : 0000000000000003 x0 : 0000000000000000 [ 113.450993] Call trace: [ 113.451271] intlog10+0x38/0x48 (P) [ 113.451701] kunit_try_run_case+0x170/0x3f0 [ 113.452123] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 113.452729] kthread+0x328/0x630 [ 113.453107] ret_from_fork+0x10/0x20 [ 113.453572] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-libmathint_log-at-intlog2
------------[ cut here ]------------ [ 113.348084] WARNING: lib/math/int_log.c:63 at intlog2+0xd8/0xf8, CPU#1: kunit_try_catch/651 [ 113.349276] Modules linked in: [ 113.349784] CPU: 1 UID: 0 PID: 651 Comm: kunit_try_catch Tainted: G B D N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 113.350687] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 113.351437] Hardware name: linux,dummy-virt (DT) [ 113.351975] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 113.352387] pc : intlog2+0xd8/0xf8 [ 113.352654] lr : intlog2_test+0xe4/0x200 [ 113.353203] sp : ffff8000821b7c10 [ 113.354666] x29: ffff8000821b7c90 x28: 0000000000000000 x27: 0000000000000000 [ 113.355437] x26: 1ffe000018da2ca1 x25: 0000000000000000 x24: ffff8000821b7ce0 [ 113.356191] x23: ffff8000821b7d00 x22: 0000000000000000 x21: 1ffff00010436f82 [ 113.356920] x20: ffffa881257dcd20 x19: ffff800080087990 x18: 00000000933fbfa0 [ 113.357652] x17: 00000000f6204915 x16: fff00000c5cda03c x15: fff00000ff616b08 [ 113.358122] x14: 0000000000018fff x13: 1ffe00001b48d989 x12: ffff7510252c8789 [ 113.358520] x11: 1ffff510252c8788 x10: ffff7510252c8788 x9 : ffffa88122e3e004 [ 113.359283] x8 : ffffa88129643c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 113.360166] x5 : ffff700010436f82 x4 : 1ffff00010010f3a x3 : 1ffff51024afb9a4 [ 113.360830] x2 : 1ffff51024afb9a4 x1 : 0000000000000003 x0 : 0000000000000000 [ 113.361607] Call trace: [ 113.362132] intlog2+0xd8/0xf8 (P) [ 113.362516] kunit_try_run_case+0x170/0x3f0 [ 113.363076] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 113.363533] kthread+0x328/0x630 [ 113.363984] ret_from_fork+0x10/0x20 [ 113.364411] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - internal-error-oops-oops-smp
KNOWN ISSUE - LKFT: Dragonboard 845c: Internal error: Oops: ufs_qcom_setup_clocks
[ 112.065744] Internal error: Oops: 0000000096000005 [#1] SMP [ 112.071426] Modules linked in: [ 112.072552] CPU: 0 UID: 0 PID: 543 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250619 #1 PREEMPT [ 112.073709] Tainted: [B]=BAD_PAGE, [N]=TEST [ 112.074220] Hardware name: linux,dummy-virt (DT) [ 112.075077] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 112.075734] pc : kunit_test_null_dereference+0x70/0x170 [ 112.076386] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 112.076815] sp : ffff800080f57d30 [ 112.077193] x29: ffff800080f57d90 x28: 0000000000000000 x27: 0000000000000000 [ 112.078539] x26: 1ffe000018c900c1 x25: 0000000000000000 x24: 0000000000000004 [ 112.079439] x23: fff00000c648060c x22: ffffa88122e2a8a8 x21: fff00000c13a3808 [ 112.080351] x20: 1ffff000101eafa6 x19: ffff800080087990 x18: 00000000fbd81b21 [ 112.081040] x17: 0000000000000001 x16: fff00000da46cd28 x15: fff00000ff616b08 [ 112.081932] x14: 0000000000018fff x13: 1ffe00001b48d989 x12: fffd8000191d83a4 [ 112.082817] x11: 1ffe0000191d83a3 x10: fffd8000191d83a3 x9 : ffffa88122e22050 [ 112.083484] x8 : ffff800080f57c18 x7 : 0000000000000001 x6 : 0000000041b58ab3 [ 112.084310] x5 : ffff7000101eafa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 112.084852] x2 : dfff800000000000 x1 : fff00000c8ec1440 x0 : ffff800080087990 [ 112.085971] Call trace: [ 112.086385] kunit_test_null_dereference+0x70/0x170 (P) [ 112.087057] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 112.087713] kthread+0x328/0x630 [ 112.088189] ret_from_fork+0x10/0x20 [ 112.089311] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 112.091036] ---[ end trace 0000000000000000 ]---