Date
June 20, 2025, 12:38 p.m.
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[ 32.657951] ================================================================== [ 32.658263] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 32.658726] Read of size 4 at addr fff00000c59d4a80 by task swapper/1/0 [ 32.658901] [ 32.659012] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 32.659240] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.659325] Hardware name: linux,dummy-virt (DT) [ 32.659404] Call trace: [ 32.659476] show_stack+0x20/0x38 (C) [ 32.659817] dump_stack_lvl+0x8c/0xd0 [ 32.660061] print_report+0x118/0x608 [ 32.660179] kasan_report+0xdc/0x128 [ 32.660290] __asan_report_load4_noabort+0x20/0x30 [ 32.660409] rcu_uaf_reclaim+0x64/0x70 [ 32.660638] rcu_core+0x9f4/0x1e20 [ 32.660740] rcu_core_si+0x18/0x30 [ 32.660833] handle_softirqs+0x374/0xb28 [ 32.661117] __do_softirq+0x1c/0x28 [ 32.661258] ____do_softirq+0x18/0x30 [ 32.661395] call_on_irq_stack+0x24/0x30 [ 32.661580] do_softirq_own_stack+0x24/0x38 [ 32.661709] __irq_exit_rcu+0x1fc/0x318 [ 32.661828] irq_exit_rcu+0x1c/0x80 [ 32.661935] el1_interrupt+0x38/0x58 [ 32.662338] el1h_64_irq_handler+0x18/0x28 [ 32.662452] el1h_64_irq+0x6c/0x70 [ 32.662813] arch_local_irq_enable+0x4/0x8 (P) [ 32.663002] do_idle+0x384/0x4e8 [ 32.663107] cpu_startup_entry+0x64/0x80 [ 32.663268] secondary_start_kernel+0x288/0x340 [ 32.663440] __secondary_switched+0xc0/0xc8 [ 32.663593] [ 32.663656] Allocated by task 209: [ 32.663725] kasan_save_stack+0x3c/0x68 [ 32.663857] kasan_save_track+0x20/0x40 [ 32.664059] kasan_save_alloc_info+0x40/0x58 [ 32.664156] __kasan_kmalloc+0xd4/0xd8 [ 32.664688] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.665003] rcu_uaf+0xb0/0x2d8 [ 32.665075] kunit_try_run_case+0x170/0x3f0 [ 32.665150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.665230] kthread+0x328/0x630 [ 32.665299] ret_from_fork+0x10/0x20 [ 32.665437] [ 32.665514] Freed by task 0: [ 32.665634] kasan_save_stack+0x3c/0x68 [ 32.665734] kasan_save_track+0x20/0x40 [ 32.665831] kasan_save_free_info+0x4c/0x78 [ 32.665928] __kasan_slab_free+0x6c/0x98 [ 32.666021] kfree+0x214/0x3c8 [ 32.666105] rcu_uaf_reclaim+0x28/0x70 [ 32.666196] rcu_core+0x9f4/0x1e20 [ 32.666288] rcu_core_si+0x18/0x30 [ 32.666371] handle_softirqs+0x374/0xb28 [ 32.666464] __do_softirq+0x1c/0x28 [ 32.666552] [ 32.666654] Last potentially related work creation: [ 32.666736] kasan_save_stack+0x3c/0x68 [ 32.666866] kasan_record_aux_stack+0xb4/0xc8 [ 32.666987] __call_rcu_common.constprop.0+0x74/0x8c8 [ 32.667692] call_rcu+0x18/0x30 [ 32.667893] rcu_uaf+0x14c/0x2d8 [ 32.667981] kunit_try_run_case+0x170/0x3f0 [ 32.668071] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.668184] kthread+0x328/0x630 [ 32.668281] ret_from_fork+0x10/0x20 [ 32.668389] [ 32.668726] The buggy address belongs to the object at fff00000c59d4a80 [ 32.668726] which belongs to the cache kmalloc-32 of size 32 [ 32.669013] The buggy address is located 0 bytes inside of [ 32.669013] freed 32-byte region [fff00000c59d4a80, fff00000c59d4aa0) [ 32.669165] [ 32.669213] The buggy address belongs to the physical page: [ 32.669277] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059d4 [ 32.669642] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.669993] page_type: f5(slab) [ 32.670107] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 32.670239] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 32.670342] page dumped because: kasan: bad access detected [ 32.670429] [ 32.670485] Memory state around the buggy address: [ 32.670604] fff00000c59d4980: 00 00 00 fc fc fc fc fc 00 00 05 fc fc fc fc fc [ 32.670778] fff00000c59d4a00: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 32.670931] >fff00000c59d4a80: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 32.671034] ^ [ 32.671108] fff00000c59d4b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.671219] fff00000c59d4b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.671325] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 32.476269] ================================================================== [ 32.476876] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 32.477068] Read of size 1 at addr fff00000c44dfc00 by task kunit_try_catch/207 [ 32.477317] [ 32.477557] CPU: 1 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 32.478422] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.478557] Hardware name: linux,dummy-virt (DT) [ 32.478769] Call trace: [ 32.478859] show_stack+0x20/0x38 (C) [ 32.479002] dump_stack_lvl+0x8c/0xd0 [ 32.479580] print_report+0x118/0x608 [ 32.479732] kasan_report+0xdc/0x128 [ 32.480172] __asan_report_load1_noabort+0x20/0x30 [ 32.480506] ksize_uaf+0x598/0x5f8 [ 32.480638] kunit_try_run_case+0x170/0x3f0 [ 32.480739] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.481359] kthread+0x328/0x630 [ 32.481525] ret_from_fork+0x10/0x20 [ 32.481940] [ 32.482047] Allocated by task 207: [ 32.482265] kasan_save_stack+0x3c/0x68 [ 32.482512] kasan_save_track+0x20/0x40 [ 32.482635] kasan_save_alloc_info+0x40/0x58 [ 32.482950] __kasan_kmalloc+0xd4/0xd8 [ 32.483357] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.483660] ksize_uaf+0xb8/0x5f8 [ 32.483789] kunit_try_run_case+0x170/0x3f0 [ 32.483894] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.484370] kthread+0x328/0x630 [ 32.484570] ret_from_fork+0x10/0x20 [ 32.484816] [ 32.484975] Freed by task 207: [ 32.485122] kasan_save_stack+0x3c/0x68 [ 32.485286] kasan_save_track+0x20/0x40 [ 32.485395] kasan_save_free_info+0x4c/0x78 [ 32.485662] __kasan_slab_free+0x6c/0x98 [ 32.485907] kfree+0x214/0x3c8 [ 32.486171] ksize_uaf+0x11c/0x5f8 [ 32.486252] kunit_try_run_case+0x170/0x3f0 [ 32.486399] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.486527] kthread+0x328/0x630 [ 32.486601] ret_from_fork+0x10/0x20 [ 32.486697] [ 32.486775] The buggy address belongs to the object at fff00000c44dfc00 [ 32.486775] which belongs to the cache kmalloc-128 of size 128 [ 32.486952] The buggy address is located 0 bytes inside of [ 32.486952] freed 128-byte region [fff00000c44dfc00, fff00000c44dfc80) [ 32.487134] [ 32.487212] The buggy address belongs to the physical page: [ 32.487339] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044df [ 32.487545] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.487745] page_type: f5(slab) [ 32.487885] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.488022] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.488175] page dumped because: kasan: bad access detected [ 32.488283] [ 32.488374] Memory state around the buggy address: [ 32.488441] fff00000c44dfb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.488550] fff00000c44dfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.488671] >fff00000c44dfc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.488828] ^ [ 32.488891] fff00000c44dfc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.488999] fff00000c44dfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.489096] ================================================================== [ 32.459046] ================================================================== [ 32.459811] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 32.460193] Read of size 1 at addr fff00000c44dfc00 by task kunit_try_catch/207 [ 32.460417] [ 32.460617] CPU: 1 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 32.461153] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.461263] Hardware name: linux,dummy-virt (DT) [ 32.461387] Call trace: [ 32.461743] show_stack+0x20/0x38 (C) [ 32.462031] dump_stack_lvl+0x8c/0xd0 [ 32.462167] print_report+0x118/0x608 [ 32.462278] kasan_report+0xdc/0x128 [ 32.462392] __kasan_check_byte+0x54/0x70 [ 32.462508] ksize+0x30/0x88 [ 32.462622] ksize_uaf+0x168/0x5f8 [ 32.463231] kunit_try_run_case+0x170/0x3f0 [ 32.463519] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.463877] kthread+0x328/0x630 [ 32.464063] ret_from_fork+0x10/0x20 [ 32.464216] [ 32.464346] Allocated by task 207: [ 32.464547] kasan_save_stack+0x3c/0x68 [ 32.464774] kasan_save_track+0x20/0x40 [ 32.464866] kasan_save_alloc_info+0x40/0x58 [ 32.464942] __kasan_kmalloc+0xd4/0xd8 [ 32.465005] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.465084] ksize_uaf+0xb8/0x5f8 [ 32.465163] kunit_try_run_case+0x170/0x3f0 [ 32.465254] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.465363] kthread+0x328/0x630 [ 32.466136] ret_from_fork+0x10/0x20 [ 32.466444] [ 32.466557] Freed by task 207: [ 32.466731] kasan_save_stack+0x3c/0x68 [ 32.466837] kasan_save_track+0x20/0x40 [ 32.466926] kasan_save_free_info+0x4c/0x78 [ 32.467033] __kasan_slab_free+0x6c/0x98 [ 32.467129] kfree+0x214/0x3c8 [ 32.467212] ksize_uaf+0x11c/0x5f8 [ 32.467294] kunit_try_run_case+0x170/0x3f0 [ 32.467395] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.467523] kthread+0x328/0x630 [ 32.467617] ret_from_fork+0x10/0x20 [ 32.467715] [ 32.467764] The buggy address belongs to the object at fff00000c44dfc00 [ 32.467764] which belongs to the cache kmalloc-128 of size 128 [ 32.467923] The buggy address is located 0 bytes inside of [ 32.467923] freed 128-byte region [fff00000c44dfc00, fff00000c44dfc80) [ 32.468088] [ 32.468152] The buggy address belongs to the physical page: [ 32.468836] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044df [ 32.469240] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.469388] page_type: f5(slab) [ 32.469490] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.469640] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.469799] page dumped because: kasan: bad access detected [ 32.470012] [ 32.470102] Memory state around the buggy address: [ 32.470223] fff00000c44dfb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.470337] fff00000c44dfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.470454] >fff00000c44dfc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.470555] ^ [ 32.470640] fff00000c44dfc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.470757] fff00000c44dfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.470864] ================================================================== [ 32.490889] ================================================================== [ 32.491094] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 32.491267] Read of size 1 at addr fff00000c44dfc78 by task kunit_try_catch/207 [ 32.491452] [ 32.491580] CPU: 1 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 32.491842] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.491909] Hardware name: linux,dummy-virt (DT) [ 32.491991] Call trace: [ 32.492048] show_stack+0x20/0x38 (C) [ 32.492175] dump_stack_lvl+0x8c/0xd0 [ 32.492289] print_report+0x118/0x608 [ 32.492428] kasan_report+0xdc/0x128 [ 32.492534] __asan_report_load1_noabort+0x20/0x30 [ 32.492693] ksize_uaf+0x544/0x5f8 [ 32.492800] kunit_try_run_case+0x170/0x3f0 [ 32.492924] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.493055] kthread+0x328/0x630 [ 32.493198] ret_from_fork+0x10/0x20 [ 32.493319] [ 32.493388] Allocated by task 207: [ 32.493535] kasan_save_stack+0x3c/0x68 [ 32.493729] kasan_save_track+0x20/0x40 [ 32.493847] kasan_save_alloc_info+0x40/0x58 [ 32.493958] __kasan_kmalloc+0xd4/0xd8 [ 32.494070] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.494170] ksize_uaf+0xb8/0x5f8 [ 32.494240] kunit_try_run_case+0x170/0x3f0 [ 32.494325] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.494417] kthread+0x328/0x630 [ 32.494492] ret_from_fork+0x10/0x20 [ 32.494560] [ 32.494595] Freed by task 207: [ 32.494672] kasan_save_stack+0x3c/0x68 [ 32.494813] kasan_save_track+0x20/0x40 [ 32.494924] kasan_save_free_info+0x4c/0x78 [ 32.495018] __kasan_slab_free+0x6c/0x98 [ 32.495104] kfree+0x214/0x3c8 [ 32.495200] ksize_uaf+0x11c/0x5f8 [ 32.495285] kunit_try_run_case+0x170/0x3f0 [ 32.495381] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.495507] kthread+0x328/0x630 [ 32.495585] ret_from_fork+0x10/0x20 [ 32.495725] [ 32.495796] The buggy address belongs to the object at fff00000c44dfc00 [ 32.495796] which belongs to the cache kmalloc-128 of size 128 [ 32.496017] The buggy address is located 120 bytes inside of [ 32.496017] freed 128-byte region [fff00000c44dfc00, fff00000c44dfc80) [ 32.496177] [ 32.496244] The buggy address belongs to the physical page: [ 32.496372] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044df [ 32.496502] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.496826] page_type: f5(slab) [ 32.496946] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.497116] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.497235] page dumped because: kasan: bad access detected [ 32.497316] [ 32.497363] Memory state around the buggy address: [ 32.497437] fff00000c44dfb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.497522] fff00000c44dfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.497647] >fff00000c44dfc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.497747] ^ [ 32.497895] fff00000c44dfc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.498004] fff00000c44dfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.498099] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 32.422110] ================================================================== [ 32.422260] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 32.422402] Read of size 1 at addr fff00000c44dfb7f by task kunit_try_catch/205 [ 32.422537] [ 32.422646] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 32.422983] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.423170] Hardware name: linux,dummy-virt (DT) [ 32.423391] Call trace: [ 32.423466] show_stack+0x20/0x38 (C) [ 32.423598] dump_stack_lvl+0x8c/0xd0 [ 32.423829] print_report+0x118/0x608 [ 32.424157] kasan_report+0xdc/0x128 [ 32.424406] __asan_report_load1_noabort+0x20/0x30 [ 32.424651] ksize_unpoisons_memory+0x690/0x740 [ 32.424857] kunit_try_run_case+0x170/0x3f0 [ 32.425050] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.425195] kthread+0x328/0x630 [ 32.425287] ret_from_fork+0x10/0x20 [ 32.425389] [ 32.425431] Allocated by task 205: [ 32.425960] kasan_save_stack+0x3c/0x68 [ 32.426092] kasan_save_track+0x20/0x40 [ 32.426190] kasan_save_alloc_info+0x40/0x58 [ 32.426292] __kasan_kmalloc+0xd4/0xd8 [ 32.426418] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.426641] ksize_unpoisons_memory+0xc0/0x740 [ 32.426823] kunit_try_run_case+0x170/0x3f0 [ 32.426921] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.427510] kthread+0x328/0x630 [ 32.427634] ret_from_fork+0x10/0x20 [ 32.427732] [ 32.427780] The buggy address belongs to the object at fff00000c44dfb00 [ 32.427780] which belongs to the cache kmalloc-128 of size 128 [ 32.427939] The buggy address is located 12 bytes to the right of [ 32.427939] allocated 115-byte region [fff00000c44dfb00, fff00000c44dfb73) [ 32.428329] [ 32.428393] The buggy address belongs to the physical page: [ 32.428741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044df [ 32.429085] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.429385] page_type: f5(slab) [ 32.429589] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.429820] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.429950] page dumped because: kasan: bad access detected [ 32.430036] [ 32.430075] Memory state around the buggy address: [ 32.430154] fff00000c44dfa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.430758] fff00000c44dfa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.430911] >fff00000c44dfb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.431106] ^ [ 32.431289] fff00000c44dfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.431437] fff00000c44dfc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.431539] ================================================================== [ 32.399845] ================================================================== [ 32.400073] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 32.400685] Read of size 1 at addr fff00000c44dfb73 by task kunit_try_catch/205 [ 32.400879] [ 32.401007] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 32.401210] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.401282] Hardware name: linux,dummy-virt (DT) [ 32.401407] Call trace: [ 32.401458] show_stack+0x20/0x38 (C) [ 32.401789] dump_stack_lvl+0x8c/0xd0 [ 32.401907] print_report+0x118/0x608 [ 32.402040] kasan_report+0xdc/0x128 [ 32.402192] __asan_report_load1_noabort+0x20/0x30 [ 32.402415] ksize_unpoisons_memory+0x628/0x740 [ 32.402547] kunit_try_run_case+0x170/0x3f0 [ 32.402689] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.402822] kthread+0x328/0x630 [ 32.402938] ret_from_fork+0x10/0x20 [ 32.403063] [ 32.403118] Allocated by task 205: [ 32.403192] kasan_save_stack+0x3c/0x68 [ 32.403377] kasan_save_track+0x20/0x40 [ 32.403647] kasan_save_alloc_info+0x40/0x58 [ 32.403879] __kasan_kmalloc+0xd4/0xd8 [ 32.403967] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.404066] ksize_unpoisons_memory+0xc0/0x740 [ 32.404476] kunit_try_run_case+0x170/0x3f0 [ 32.404662] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.404827] kthread+0x328/0x630 [ 32.404912] ret_from_fork+0x10/0x20 [ 32.404994] [ 32.405035] The buggy address belongs to the object at fff00000c44dfb00 [ 32.405035] which belongs to the cache kmalloc-128 of size 128 [ 32.405152] The buggy address is located 0 bytes to the right of [ 32.405152] allocated 115-byte region [fff00000c44dfb00, fff00000c44dfb73) [ 32.405327] [ 32.405585] The buggy address belongs to the physical page: [ 32.405728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044df [ 32.405879] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.406019] page_type: f5(slab) [ 32.406127] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.406259] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.406375] page dumped because: kasan: bad access detected [ 32.406459] [ 32.406504] Memory state around the buggy address: [ 32.406599] fff00000c44dfa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.406919] fff00000c44dfa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.407161] >fff00000c44dfb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.407279] ^ [ 32.407387] fff00000c44dfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.407778] fff00000c44dfc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.407924] ================================================================== [ 32.410776] ================================================================== [ 32.410918] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 32.411056] Read of size 1 at addr fff00000c44dfb78 by task kunit_try_catch/205 [ 32.411191] [ 32.411276] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 32.411516] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.411584] Hardware name: linux,dummy-virt (DT) [ 32.411673] Call trace: [ 32.411725] show_stack+0x20/0x38 (C) [ 32.412113] dump_stack_lvl+0x8c/0xd0 [ 32.412511] print_report+0x118/0x608 [ 32.412815] kasan_report+0xdc/0x128 [ 32.412981] __asan_report_load1_noabort+0x20/0x30 [ 32.413153] ksize_unpoisons_memory+0x618/0x740 [ 32.413307] kunit_try_run_case+0x170/0x3f0 [ 32.413462] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.413654] kthread+0x328/0x630 [ 32.413837] ret_from_fork+0x10/0x20 [ 32.413953] [ 32.413996] Allocated by task 205: [ 32.414069] kasan_save_stack+0x3c/0x68 [ 32.414420] kasan_save_track+0x20/0x40 [ 32.414510] kasan_save_alloc_info+0x40/0x58 [ 32.414601] __kasan_kmalloc+0xd4/0xd8 [ 32.414711] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.414821] ksize_unpoisons_memory+0xc0/0x740 [ 32.414920] kunit_try_run_case+0x170/0x3f0 [ 32.415041] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.415191] kthread+0x328/0x630 [ 32.415320] ret_from_fork+0x10/0x20 [ 32.415463] [ 32.415516] The buggy address belongs to the object at fff00000c44dfb00 [ 32.415516] which belongs to the cache kmalloc-128 of size 128 [ 32.415705] The buggy address is located 5 bytes to the right of [ 32.415705] allocated 115-byte region [fff00000c44dfb00, fff00000c44dfb73) [ 32.415891] [ 32.415943] The buggy address belongs to the physical page: [ 32.416073] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044df [ 32.416475] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.416816] page_type: f5(slab) [ 32.416903] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.417043] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.417367] page dumped because: kasan: bad access detected [ 32.417499] [ 32.417560] Memory state around the buggy address: [ 32.417683] fff00000c44dfa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.417827] fff00000c44dfa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.417977] >fff00000c44dfb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.418123] ^ [ 32.418272] fff00000c44dfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.418388] fff00000c44dfc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.418498] ==================================================================
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 35.629592] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 35.683803] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 35.526484] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 35.599826] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 35.642024] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 35.511546] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 35.567350] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 35.790079] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 35.316050] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 35.365486] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[ 66.004868] ================================================================== [ 66.005334] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 66.005334] [ 66.005483] Use-after-free read at 0x000000000499f380 (in kfence-#210): [ 66.005554] test_krealloc+0x51c/0x830 [ 66.005635] kunit_try_run_case+0x170/0x3f0 [ 66.005700] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.005754] kthread+0x328/0x630 [ 66.005799] ret_from_fork+0x10/0x20 [ 66.005846] [ 66.005878] kfence-#210: 0x000000000499f380-0x000000005342d898, size=32, cache=kmalloc-32 [ 66.005878] [ 66.005944] allocated by task 348 on cpu 1 at 66.001688s (0.004251s ago): [ 66.006030] test_alloc+0x29c/0x628 [ 66.006079] test_krealloc+0xc0/0x830 [ 66.006123] kunit_try_run_case+0x170/0x3f0 [ 66.006169] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.006219] kthread+0x328/0x630 [ 66.006261] ret_from_fork+0x10/0x20 [ 66.006306] [ 66.006334] freed by task 348 on cpu 1 at 66.002507s (0.003823s ago): [ 66.006403] krealloc_noprof+0x148/0x360 [ 66.006448] test_krealloc+0x1dc/0x830 [ 66.006493] kunit_try_run_case+0x170/0x3f0 [ 66.006536] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.006585] kthread+0x328/0x630 [ 66.006640] ret_from_fork+0x10/0x20 [ 66.006687] [ 66.006743] CPU: 1 UID: 0 PID: 348 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 66.006838] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.006873] Hardware name: linux,dummy-virt (DT) [ 66.007106] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[ 65.917574] ================================================================== [ 65.917739] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 65.917739] [ 65.917876] Use-after-free read at 0x00000000417c22da (in kfence-#209): [ 65.917949] test_memcache_typesafe_by_rcu+0x280/0x560 [ 65.918014] kunit_try_run_case+0x170/0x3f0 [ 65.918068] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.918119] kthread+0x328/0x630 [ 65.918164] ret_from_fork+0x10/0x20 [ 65.918213] [ 65.918243] kfence-#209: 0x00000000417c22da-0x000000003752297a, size=32, cache=test [ 65.918243] [ 65.918303] allocated by task 346 on cpu 0 at 65.901284s (0.017014s ago): [ 65.918393] test_alloc+0x230/0x628 [ 65.918442] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 65.918493] kunit_try_run_case+0x170/0x3f0 [ 65.918540] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.918590] kthread+0x328/0x630 [ 65.918648] ret_from_fork+0x10/0x20 [ 65.918697] [ 65.918726] freed by task 346 on cpu 0 at 65.901515s (0.017206s ago): [ 65.918795] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 65.918847] kunit_try_run_case+0x170/0x3f0 [ 65.918893] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.918943] kthread+0x328/0x630 [ 65.918985] ret_from_fork+0x10/0x20 [ 65.919031] [ 65.919090] CPU: 0 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 65.919185] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.919222] Hardware name: linux,dummy-virt (DT) [ 65.919265] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[ 45.437752] ================================================================== [ 45.438055] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 45.438055] [ 45.438287] Invalid read at 0x00000000f783294c: [ 45.438478] test_invalid_access+0xdc/0x1f0 [ 45.438824] kunit_try_run_case+0x170/0x3f0 [ 45.439069] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.439547] kthread+0x328/0x630 [ 45.439927] ret_from_fork+0x10/0x20 [ 45.440703] [ 45.442530] CPU: 0 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 45.442812] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.442896] Hardware name: linux,dummy-virt (DT) [ 45.442989] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[ 45.201807] ================================================================== [ 45.202002] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 45.202002] [ 45.202090] Corrupted memory at 0x00000000ba9ebc96 [ ! . . . . . . . . . . . . . . . ] (in kfence-#205): [ 45.202451] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 45.202511] kunit_try_run_case+0x170/0x3f0 [ 45.202561] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.202636] kthread+0x328/0x630 [ 45.202694] ret_from_fork+0x10/0x20 [ 45.202743] [ 45.202776] kfence-#205: 0x00000000c330d6d6-0x000000007767fccc, size=73, cache=kmalloc-96 [ 45.202776] [ 45.202840] allocated by task 336 on cpu 1 at 45.201322s (0.001513s ago): [ 45.202917] test_alloc+0x29c/0x628 [ 45.202966] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 45.203018] kunit_try_run_case+0x170/0x3f0 [ 45.203065] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.203116] kthread+0x328/0x630 [ 45.203156] ret_from_fork+0x10/0x20 [ 45.203201] [ 45.203231] freed by task 336 on cpu 1 at 45.201633s (0.001594s ago): [ 45.203343] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 45.203412] kunit_try_run_case+0x170/0x3f0 [ 45.203475] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.203526] kthread+0x328/0x630 [ 45.203569] ret_from_fork+0x10/0x20 [ 45.203626] [ 45.203684] CPU: 1 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 45.203780] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.203815] Hardware name: linux,dummy-virt (DT) [ 45.203858] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[ 44.993729] ================================================================== [ 44.993914] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 44.993914] [ 44.994047] Out-of-bounds read at 0x00000000ae43ab13 (105B right of kfence-#203): [ 44.994128] test_kmalloc_aligned_oob_read+0x238/0x468 [ 44.994192] kunit_try_run_case+0x170/0x3f0 [ 44.994243] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.994293] kthread+0x328/0x630 [ 44.994339] ret_from_fork+0x10/0x20 [ 44.994383] [ 44.994414] kfence-#203: 0x00000000980e09ca-0x00000000f67e6062, size=73, cache=kmalloc-96 [ 44.994414] [ 44.994479] allocated by task 334 on cpu 1 at 44.993258s (0.001216s ago): [ 44.994570] test_alloc+0x29c/0x628 [ 44.994642] test_kmalloc_aligned_oob_read+0x100/0x468 [ 44.994706] kunit_try_run_case+0x170/0x3f0 [ 44.994753] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.994802] kthread+0x328/0x630 [ 44.994842] ret_from_fork+0x10/0x20 [ 44.994889] [ 44.994948] CPU: 1 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 44.995046] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.995082] Hardware name: linux,dummy-virt (DT) [ 44.995125] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[ 39.898226] ================================================================== [ 39.898353] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 39.898353] [ 39.898435] Corrupted memory at 0x00000000c5fb41ce [ ! ] (in kfence-#154): [ 39.898594] test_corruption+0x284/0x378 [ 39.898686] kunit_try_run_case+0x170/0x3f0 [ 39.898739] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.898789] kthread+0x328/0x630 [ 39.898834] ret_from_fork+0x10/0x20 [ 39.898879] [ 39.898908] kfence-#154: 0x0000000005a0c077-0x00000000694aef21, size=32, cache=kmalloc-32 [ 39.898908] [ 39.898976] allocated by task 322 on cpu 0 at 39.897757s (0.001214s ago): [ 39.899051] test_alloc+0x29c/0x628 [ 39.899099] test_corruption+0x198/0x378 [ 39.899144] kunit_try_run_case+0x170/0x3f0 [ 39.899190] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.899239] kthread+0x328/0x630 [ 39.899281] ret_from_fork+0x10/0x20 [ 39.899324] [ 39.899351] freed by task 322 on cpu 0 at 39.897933s (0.001414s ago): [ 39.899431] test_corruption+0x284/0x378 [ 39.899484] kunit_try_run_case+0x170/0x3f0 [ 39.899531] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.899582] kthread+0x328/0x630 [ 39.899638] ret_from_fork+0x10/0x20 [ 39.899687] [ 39.899738] CPU: 0 UID: 0 PID: 322 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 39.899832] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.899868] Hardware name: linux,dummy-virt (DT) [ 39.899908] ================================================================== [ 40.313543] ================================================================== [ 40.313792] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 40.313792] [ 40.313935] Corrupted memory at 0x000000008df178e9 [ ! ] (in kfence-#158): [ 40.314118] test_corruption+0x1d8/0x378 [ 40.314179] kunit_try_run_case+0x170/0x3f0 [ 40.314231] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.314285] kthread+0x328/0x630 [ 40.314327] ret_from_fork+0x10/0x20 [ 40.314372] [ 40.314401] kfence-#158: 0x000000009d326810-0x0000000012aac743, size=32, cache=test [ 40.314401] [ 40.314469] allocated by task 324 on cpu 0 at 40.313275s (0.001189s ago): [ 40.314548] test_alloc+0x230/0x628 [ 40.314597] test_corruption+0x198/0x378 [ 40.314678] kunit_try_run_case+0x170/0x3f0 [ 40.314726] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.314776] kthread+0x328/0x630 [ 40.314818] ret_from_fork+0x10/0x20 [ 40.314864] [ 40.314891] freed by task 324 on cpu 0 at 40.313376s (0.001511s ago): [ 40.314965] test_corruption+0x1d8/0x378 [ 40.315015] kunit_try_run_case+0x170/0x3f0 [ 40.315059] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.315110] kthread+0x328/0x630 [ 40.315151] ret_from_fork+0x10/0x20 [ 40.315197] [ 40.315253] CPU: 0 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 40.315347] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.315383] Hardware name: linux,dummy-virt (DT) [ 40.315464] ================================================================== [ 40.105434] ================================================================== [ 40.105564] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 40.105564] [ 40.105672] Corrupted memory at 0x000000001a4ed9f2 [ ! . . . . . . . . . . . . . . . ] (in kfence-#156): [ 40.106043] test_corruption+0x120/0x378 [ 40.106107] kunit_try_run_case+0x170/0x3f0 [ 40.106163] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.106218] kthread+0x328/0x630 [ 40.106262] ret_from_fork+0x10/0x20 [ 40.106309] [ 40.106341] kfence-#156: 0x000000007fc521a9-0x0000000050adceef, size=32, cache=test [ 40.106341] [ 40.106411] allocated by task 324 on cpu 0 at 40.105245s (0.001161s ago): [ 40.106515] test_alloc+0x230/0x628 [ 40.106567] test_corruption+0xdc/0x378 [ 40.106628] kunit_try_run_case+0x170/0x3f0 [ 40.106678] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.106731] kthread+0x328/0x630 [ 40.106774] ret_from_fork+0x10/0x20 [ 40.106821] [ 40.106849] freed by task 324 on cpu 0 at 40.105319s (0.001526s ago): [ 40.106922] test_corruption+0x120/0x378 [ 40.106969] kunit_try_run_case+0x170/0x3f0 [ 40.107016] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.107067] kthread+0x328/0x630 [ 40.107109] ret_from_fork+0x10/0x20 [ 40.107155] [ 40.107208] CPU: 0 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 40.107302] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.107339] Hardware name: linux,dummy-virt (DT) [ 40.107381] ================================================================== [ 39.587636] ================================================================== [ 39.587799] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 39.587799] [ 39.587939] Corrupted memory at 0x000000009f349d14 [ ! . . . . . . . . . . . . . . . ] (in kfence-#151): [ 39.590535] test_corruption+0x278/0x378 [ 39.590718] kunit_try_run_case+0x170/0x3f0 [ 39.591212] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.591670] kthread+0x328/0x630 [ 39.591789] ret_from_fork+0x10/0x20 [ 39.591897] [ 39.591963] kfence-#151: 0x00000000d1853e9d-0x00000000929361b7, size=32, cache=kmalloc-32 [ 39.591963] [ 39.592111] allocated by task 322 on cpu 0 at 39.586844s (0.005258s ago): [ 39.592707] test_alloc+0x29c/0x628 [ 39.592896] test_corruption+0xdc/0x378 [ 39.593104] kunit_try_run_case+0x170/0x3f0 [ 39.593309] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.593505] kthread+0x328/0x630 [ 39.593706] ret_from_fork+0x10/0x20 [ 39.593808] [ 39.594055] freed by task 322 on cpu 0 at 39.587413s (0.006632s ago): [ 39.594359] test_corruption+0x278/0x378 [ 39.594478] kunit_try_run_case+0x170/0x3f0 [ 39.594586] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.595168] kthread+0x328/0x630 [ 39.595438] ret_from_fork+0x10/0x20 [ 39.595672] [ 39.595799] CPU: 0 UID: 0 PID: 322 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 39.596432] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.596514] Hardware name: linux,dummy-virt (DT) [ 39.596717] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[ 39.377985] ================================================================== [ 39.378179] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 39.378179] [ 39.378315] Invalid free of 0x000000006ad1da6c (in kfence-#149): [ 39.378441] test_invalid_addr_free+0x1ac/0x238 [ 39.378605] kunit_try_run_case+0x170/0x3f0 [ 39.378756] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.378871] kthread+0x328/0x630 [ 39.378967] ret_from_fork+0x10/0x20 [ 39.379070] [ 39.379133] kfence-#149: 0x000000002e90ffc6-0x0000000074af234e, size=32, cache=kmalloc-32 [ 39.379133] [ 39.379272] allocated by task 318 on cpu 0 at 39.377701s (0.001562s ago): [ 39.379440] test_alloc+0x29c/0x628 [ 39.379543] test_invalid_addr_free+0xd4/0x238 [ 39.379665] kunit_try_run_case+0x170/0x3f0 [ 39.379776] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.379883] kthread+0x328/0x630 [ 39.379970] ret_from_fork+0x10/0x20 [ 39.380069] [ 39.380182] CPU: 0 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 39.380416] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.380498] Hardware name: linux,dummy-virt (DT) [ 39.380591] ================================================================== [ 39.482999] ================================================================== [ 39.483602] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 39.483602] [ 39.483900] Invalid free of 0x00000000a3c033e4 (in kfence-#150): [ 39.484537] test_invalid_addr_free+0xec/0x238 [ 39.484813] kunit_try_run_case+0x170/0x3f0 [ 39.485116] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.485223] kthread+0x328/0x630 [ 39.485422] ret_from_fork+0x10/0x20 [ 39.485536] [ 39.485683] kfence-#150: 0x00000000767935c9-0x0000000051f41279, size=32, cache=test [ 39.485683] [ 39.485966] allocated by task 320 on cpu 0 at 39.482270s (0.003683s ago): [ 39.486273] test_alloc+0x230/0x628 [ 39.486493] test_invalid_addr_free+0xd4/0x238 [ 39.486720] kunit_try_run_case+0x170/0x3f0 [ 39.486932] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.487129] kthread+0x328/0x630 [ 39.487319] ret_from_fork+0x10/0x20 [ 39.487493] [ 39.487602] CPU: 0 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 39.488263] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.488460] Hardware name: linux,dummy-virt (DT) [ 39.488669] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[ 39.171870] ================================================================== [ 39.172098] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 39.172098] [ 39.172686] Invalid free of 0x00000000d8d266d7 (in kfence-#147): [ 39.172982] test_double_free+0x1bc/0x238 [ 39.173293] kunit_try_run_case+0x170/0x3f0 [ 39.173422] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.173770] kthread+0x328/0x630 [ 39.173953] ret_from_fork+0x10/0x20 [ 39.174146] [ 39.174238] kfence-#147: 0x00000000d8d266d7-0x00000000e5db6a70, size=32, cache=kmalloc-32 [ 39.174238] [ 39.174808] allocated by task 314 on cpu 0 at 39.171006s (0.003790s ago): [ 39.175079] test_alloc+0x29c/0x628 [ 39.175315] test_double_free+0xd4/0x238 [ 39.175433] kunit_try_run_case+0x170/0x3f0 [ 39.175941] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.176376] kthread+0x328/0x630 [ 39.176548] ret_from_fork+0x10/0x20 [ 39.176737] [ 39.177033] freed by task 314 on cpu 0 at 39.171362s (0.005661s ago): [ 39.177526] test_double_free+0x1ac/0x238 [ 39.177649] kunit_try_run_case+0x170/0x3f0 [ 39.177746] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.177862] kthread+0x328/0x630 [ 39.177962] ret_from_fork+0x10/0x20 [ 39.178075] [ 39.178320] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 39.179155] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.179367] Hardware name: linux,dummy-virt (DT) [ 39.179583] ================================================================== [ 39.274592] ================================================================== [ 39.274766] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 39.274766] [ 39.275093] Invalid free of 0x000000009221f61d (in kfence-#148): [ 39.275393] test_double_free+0x100/0x238 [ 39.275560] kunit_try_run_case+0x170/0x3f0 [ 39.275686] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.275791] kthread+0x328/0x630 [ 39.275882] ret_from_fork+0x10/0x20 [ 39.276303] [ 39.276434] kfence-#148: 0x000000009221f61d-0x00000000a15598a2, size=32, cache=test [ 39.276434] [ 39.276666] allocated by task 316 on cpu 0 at 39.273841s (0.002814s ago): [ 39.276819] test_alloc+0x230/0x628 [ 39.276895] test_double_free+0xd4/0x238 [ 39.276971] kunit_try_run_case+0x170/0x3f0 [ 39.277067] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.277180] kthread+0x328/0x630 [ 39.277270] ret_from_fork+0x10/0x20 [ 39.277369] [ 39.277439] freed by task 316 on cpu 0 at 39.274161s (0.003263s ago): [ 39.277654] test_double_free+0xf0/0x238 [ 39.277744] kunit_try_run_case+0x170/0x3f0 [ 39.277872] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.277981] kthread+0x328/0x630 [ 39.278064] ret_from_fork+0x10/0x20 [ 39.278150] [ 39.278552] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 39.279084] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.279163] Hardware name: linux,dummy-virt (DT) [ 39.279245] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[ 38.858939] ================================================================== [ 38.859190] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 38.859190] [ 38.859475] Use-after-free read at 0x00000000a2ac1171 (in kfence-#144): [ 38.859627] test_use_after_free_read+0x114/0x248 [ 38.859782] kunit_try_run_case+0x170/0x3f0 [ 38.859932] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.860088] kthread+0x328/0x630 [ 38.860215] ret_from_fork+0x10/0x20 [ 38.860359] [ 38.860415] kfence-#144: 0x00000000a2ac1171-0x00000000d4de7f48, size=32, cache=test [ 38.860415] [ 38.860535] allocated by task 308 on cpu 0 at 38.858456s (0.002072s ago): [ 38.861025] test_alloc+0x230/0x628 [ 38.861147] test_use_after_free_read+0xd0/0x248 [ 38.861242] kunit_try_run_case+0x170/0x3f0 [ 38.861526] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.861653] kthread+0x328/0x630 [ 38.861759] ret_from_fork+0x10/0x20 [ 38.861855] [ 38.861932] freed by task 308 on cpu 0 at 38.858606s (0.003318s ago): [ 38.862372] test_use_after_free_read+0xf0/0x248 [ 38.862490] kunit_try_run_case+0x170/0x3f0 [ 38.862584] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.862714] kthread+0x328/0x630 [ 38.862811] ret_from_fork+0x10/0x20 [ 38.862914] [ 38.863021] CPU: 0 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 38.863228] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.863303] Hardware name: linux,dummy-virt (DT) [ 38.863387] ================================================================== [ 38.755020] ================================================================== [ 38.755193] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 38.755193] [ 38.755575] Use-after-free read at 0x00000000694fd192 (in kfence-#143): [ 38.755787] test_use_after_free_read+0x114/0x248 [ 38.756193] kunit_try_run_case+0x170/0x3f0 [ 38.756399] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.756515] kthread+0x328/0x630 [ 38.756793] ret_from_fork+0x10/0x20 [ 38.756908] [ 38.756966] kfence-#143: 0x00000000694fd192-0x000000004a50397f, size=32, cache=kmalloc-32 [ 38.756966] [ 38.757095] allocated by task 306 on cpu 0 at 38.754425s (0.002661s ago): [ 38.757252] test_alloc+0x29c/0x628 [ 38.757353] test_use_after_free_read+0xd0/0x248 [ 38.757496] kunit_try_run_case+0x170/0x3f0 [ 38.757605] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.757869] kthread+0x328/0x630 [ 38.757971] ret_from_fork+0x10/0x20 [ 38.758168] [ 38.758281] freed by task 306 on cpu 0 at 38.754556s (0.003714s ago): [ 38.758713] test_use_after_free_read+0x1c0/0x248 [ 38.758829] kunit_try_run_case+0x170/0x3f0 [ 38.758931] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.759102] kthread+0x328/0x630 [ 38.759365] ret_from_fork+0x10/0x20 [ 38.759619] [ 38.759872] CPU: 0 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 38.760230] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.760687] Hardware name: linux,dummy-virt (DT) [ 38.760857] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[ 38.652395] ================================================================== [ 38.652686] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 38.652686] [ 38.653163] Out-of-bounds write at 0x00000000e8cfb8dd (1B left of kfence-#142): [ 38.653400] test_out_of_bounds_write+0x100/0x240 [ 38.653731] kunit_try_run_case+0x170/0x3f0 [ 38.653865] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.654190] kthread+0x328/0x630 [ 38.654529] ret_from_fork+0x10/0x20 [ 38.654663] [ 38.654722] kfence-#142: 0x00000000e308695d-0x0000000016591b12, size=32, cache=test [ 38.654722] [ 38.654855] allocated by task 304 on cpu 0 at 38.651779s (0.003068s ago): [ 38.655501] test_alloc+0x230/0x628 [ 38.655682] test_out_of_bounds_write+0xc8/0x240 [ 38.655917] kunit_try_run_case+0x170/0x3f0 [ 38.656107] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.656626] kthread+0x328/0x630 [ 38.656832] ret_from_fork+0x10/0x20 [ 38.657105] [ 38.657261] CPU: 0 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 38.657547] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.657632] Hardware name: linux,dummy-virt (DT) [ 38.657764] ================================================================== [ 38.444134] ================================================================== [ 38.444365] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 38.444365] [ 38.444951] Out-of-bounds write at 0x0000000065e1de00 (1B left of kfence-#140): [ 38.445111] test_out_of_bounds_write+0x100/0x240 [ 38.445223] kunit_try_run_case+0x170/0x3f0 [ 38.445312] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.445409] kthread+0x328/0x630 [ 38.445497] ret_from_fork+0x10/0x20 [ 38.445603] [ 38.445710] kfence-#140: 0x0000000072b50c07-0x000000006c2aba6c, size=32, cache=kmalloc-32 [ 38.445710] [ 38.445849] allocated by task 302 on cpu 0 at 38.443719s (0.002121s ago): [ 38.446020] test_alloc+0x29c/0x628 [ 38.446118] test_out_of_bounds_write+0xc8/0x240 [ 38.446225] kunit_try_run_case+0x170/0x3f0 [ 38.446323] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.446433] kthread+0x328/0x630 [ 38.446526] ret_from_fork+0x10/0x20 [ 38.446939] [ 38.447364] CPU: 0 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 38.447657] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.447775] Hardware name: linux,dummy-virt (DT) [ 38.447894] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[ 37.610454] ================================================================== [ 37.610647] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 37.610647] [ 37.610841] Out-of-bounds read at 0x000000004cf86d4b (1B left of kfence-#132): [ 37.610993] test_out_of_bounds_read+0x114/0x3e0 [ 37.611116] kunit_try_run_case+0x170/0x3f0 [ 37.611221] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.611333] kthread+0x328/0x630 [ 37.611449] ret_from_fork+0x10/0x20 [ 37.611540] [ 37.611600] kfence-#132: 0x000000005b088a23-0x0000000018c2c7bb, size=32, cache=test [ 37.611600] [ 37.611717] allocated by task 300 on cpu 0 at 37.610272s (0.001438s ago): [ 37.612300] test_alloc+0x230/0x628 [ 37.612515] test_out_of_bounds_read+0xdc/0x3e0 [ 37.612805] kunit_try_run_case+0x170/0x3f0 [ 37.613060] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.613176] kthread+0x328/0x630 [ 37.613280] ret_from_fork+0x10/0x20 [ 37.613382] [ 37.613490] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 37.613865] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.613959] Hardware name: linux,dummy-virt (DT) [ 37.614044] ================================================================== [ 37.195286] ================================================================== [ 37.195872] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 37.195872] [ 37.196236] Out-of-bounds read at 0x000000002306f07d (32B right of kfence-#128): [ 37.196623] test_out_of_bounds_read+0x1c8/0x3e0 [ 37.196925] kunit_try_run_case+0x170/0x3f0 [ 37.197303] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.197686] kthread+0x328/0x630 [ 37.197894] ret_from_fork+0x10/0x20 [ 37.197994] [ 37.198142] kfence-#128: 0x00000000588ebc03-0x00000000fb7e9da9, size=32, cache=kmalloc-32 [ 37.198142] [ 37.198443] allocated by task 298 on cpu 0 at 37.194118s (0.004310s ago): [ 37.198918] test_alloc+0x29c/0x628 [ 37.199037] test_out_of_bounds_read+0x198/0x3e0 [ 37.199142] kunit_try_run_case+0x170/0x3f0 [ 37.199247] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.199363] kthread+0x328/0x630 [ 37.199470] ret_from_fork+0x10/0x20 [ 37.199571] [ 37.200744] CPU: 0 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 37.200873] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.200910] Hardware name: linux,dummy-virt (DT) [ 37.200951] ================================================================== [ 37.091186] ================================================================== [ 37.091550] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 37.091550] [ 37.091864] Out-of-bounds read at 0x00000000bb72c062 (1B left of kfence-#127): [ 37.092181] test_out_of_bounds_read+0x114/0x3e0 [ 37.092945] kunit_try_run_case+0x170/0x3f0 [ 37.093122] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.093358] kthread+0x328/0x630 [ 37.093477] ret_from_fork+0x10/0x20 [ 37.093857] [ 37.093944] kfence-#127: 0x00000000fb2057e8-0x00000000d7603e4d, size=32, cache=kmalloc-32 [ 37.093944] [ 37.094246] allocated by task 298 on cpu 0 at 37.090253s (0.003979s ago): [ 37.094572] test_alloc+0x29c/0x628 [ 37.094677] test_out_of_bounds_read+0xdc/0x3e0 [ 37.094774] kunit_try_run_case+0x170/0x3f0 [ 37.094883] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.094998] kthread+0x328/0x630 [ 37.095164] ret_from_fork+0x10/0x20 [ 37.095752] [ 37.096031] CPU: 0 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 37.096453] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.096526] Hardware name: linux,dummy-virt (DT) [ 37.096596] ================================================================== [ 38.028414] ================================================================== [ 38.028595] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 38.028595] [ 38.028813] Out-of-bounds read at 0x000000008effb0dd (32B right of kfence-#136): [ 38.029153] test_out_of_bounds_read+0x1c8/0x3e0 [ 38.029366] kunit_try_run_case+0x170/0x3f0 [ 38.029929] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.030106] kthread+0x328/0x630 [ 38.030218] ret_from_fork+0x10/0x20 [ 38.030432] [ 38.030557] kfence-#136: 0x000000008f747a6f-0x00000000bbcad874, size=32, cache=test [ 38.030557] [ 38.030719] allocated by task 300 on cpu 0 at 38.027728s (0.002982s ago): [ 38.030896] test_alloc+0x230/0x628 [ 38.030997] test_out_of_bounds_read+0x198/0x3e0 [ 38.031943] kunit_try_run_case+0x170/0x3f0 [ 38.032138] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.032623] kthread+0x328/0x630 [ 38.032773] ret_from_fork+0x10/0x20 [ 38.033258] [ 38.033453] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 38.033729] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.034021] Hardware name: linux,dummy-virt (DT) [ 38.034154] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-kfree_sensitive
[ 32.371356] ================================================================== [ 32.371600] BUG: KFENCE: invalid free in kfree_sensitive+0x80/0xb0 [ 32.371600] [ 32.371773] Invalid free of 0x000000004423a747 (in kfence-#94): [ 32.371885] kfree_sensitive+0x80/0xb0 [ 32.372069] kmalloc_double_kzfree+0x168/0x308 [ 32.372171] kunit_try_run_case+0x170/0x3f0 [ 32.372708] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.373036] kthread+0x328/0x630 [ 32.373131] ret_from_fork+0x10/0x20 [ 32.373222] [ 32.373576] kfence-#94: 0x000000004423a747-0x0000000035fd8b96, size=16, cache=kmalloc-16 [ 32.373576] [ 32.373826] allocated by task 203 on cpu 1 at 32.362221s (0.011534s ago): [ 32.374070] kmalloc_double_kzfree+0xb8/0x308 [ 32.374194] kunit_try_run_case+0x170/0x3f0 [ 32.374294] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.374406] kthread+0x328/0x630 [ 32.374961] ret_from_fork+0x10/0x20 [ 32.375103] [ 32.375209] freed by task 203 on cpu 1 at 32.362433s (0.012765s ago): [ 32.375468] kfree_sensitive+0x80/0xb0 [ 32.375568] kmalloc_double_kzfree+0x11c/0x308 [ 32.375673] kunit_try_run_case+0x170/0x3f0 [ 32.376176] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.376305] kthread+0x328/0x630 [ 32.376471] ret_from_fork+0x10/0x20 [ 32.376661] [ 32.376868] CPU: 1 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 32.377091] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.377140] Hardware name: linux,dummy-virt (DT) [ 32.377201] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-write-in-__memset
[ 32.363187] ================================================================== [ 32.363449] BUG: KFENCE: use-after-free write in __memset+0xc/0x20 [ 32.363449] [ 32.363700] Use-after-free write at 0x000000004423a747 (in kfence-#94): [ 32.363934] __memset+0xc/0x20 [ 32.364041] kmalloc_double_kzfree+0x168/0x308 [ 32.364219] kunit_try_run_case+0x170/0x3f0 [ 32.364532] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.364681] kthread+0x328/0x630 [ 32.364813] ret_from_fork+0x10/0x20 [ 32.364909] [ 32.364955] kfence-#94: 0x000000004423a747-0x0000000035fd8b96, size=16, cache=kmalloc-16 [ 32.364955] [ 32.365077] allocated by task 203 on cpu 1 at 32.362221s (0.002847s ago): [ 32.365259] kmalloc_double_kzfree+0xb8/0x308 [ 32.365363] kunit_try_run_case+0x170/0x3f0 [ 32.365552] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.365681] kthread+0x328/0x630 [ 32.365841] ret_from_fork+0x10/0x20 [ 32.365949] [ 32.366063] freed by task 203 on cpu 1 at 32.362433s (0.003617s ago): [ 32.366235] kfree_sensitive+0x80/0xb0 [ 32.366606] kmalloc_double_kzfree+0x11c/0x308 [ 32.366741] kunit_try_run_case+0x170/0x3f0 [ 32.366837] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.367027] kthread+0x328/0x630 [ 32.367111] ret_from_fork+0x10/0x20 [ 32.367290] [ 32.367483] CPU: 1 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 32.368206] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.368349] Hardware name: linux,dummy-virt (DT) [ 32.368442] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-kmalloc_oob_memset_2
[ 31.948418] ================================================================== [ 31.948920] BUG: KFENCE: memory corruption in kmalloc_oob_memset_2+0x170/0x2f8 [ 31.948920] [ 31.949076] Corrupted memory at 0x00000000eac2f912 [ ! . . . . . . . ] (in kfence-#90): [ 31.949515] kmalloc_oob_memset_2+0x170/0x2f8 [ 31.949672] kunit_try_run_case+0x170/0x3f0 [ 31.949776] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.949855] kthread+0x328/0x630 [ 31.949912] ret_from_fork+0x10/0x20 [ 31.950009] [ 31.950052] kfence-#90: 0x0000000052d7674d-0x0000000061d7358f, size=120, cache=kmalloc-128 [ 31.950052] [ 31.950183] allocated by task 183 on cpu 1 at 31.943890s (0.006285s ago): [ 31.950316] kmalloc_oob_memset_2+0xb0/0x2f8 [ 31.950397] kunit_try_run_case+0x170/0x3f0 [ 31.950476] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.950576] kthread+0x328/0x630 [ 31.950974] ret_from_fork+0x10/0x20 [ 31.951062] [ 31.951128] freed by task 183 on cpu 1 at 31.947978s (0.003137s ago): [ 31.951307] kmalloc_oob_memset_2+0x170/0x2f8 [ 31.951444] kunit_try_run_case+0x170/0x3f0 [ 31.951531] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.951652] kthread+0x328/0x630 [ 31.951733] ret_from_fork+0x10/0x20 [ 31.951829] [ 31.951952] CPU: 1 UID: 0 PID: 183 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 31.952156] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.952213] Hardware name: linux,dummy-virt (DT) [ 31.952282] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-kmalloc_track_caller_oob_right
[ 31.203139] ================================================================== [ 31.203307] BUG: KFENCE: memory corruption in kmalloc_track_caller_oob_right+0x224/0x488 [ 31.203307] [ 31.203470] Corrupted memory at 0x000000006c1886f8 [ ! . . . . . . . ] (in kfence-#83): [ 31.211277] kmalloc_track_caller_oob_right+0x224/0x488 [ 31.211548] kunit_try_run_case+0x170/0x3f0 [ 31.211655] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.211763] kthread+0x328/0x630 [ 31.211891] ret_from_fork+0x10/0x20 [ 31.211983] [ 31.212054] kfence-#83: 0x00000000bdca6165-0x00000000d78515b9, size=120, cache=kmalloc-128 [ 31.212054] [ 31.212213] allocated by task 153 on cpu 1 at 31.196353s (0.015852s ago): [ 31.212920] kmalloc_track_caller_oob_right+0x184/0x488 [ 31.213039] kunit_try_run_case+0x170/0x3f0 [ 31.213134] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.213629] kthread+0x328/0x630 [ 31.213851] ret_from_fork+0x10/0x20 [ 31.214021] [ 31.215197] freed by task 153 on cpu 1 at 31.202678s (0.011803s ago): [ 31.215492] kmalloc_track_caller_oob_right+0x224/0x488 [ 31.215819] kunit_try_run_case+0x170/0x3f0 [ 31.216473] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.216684] kthread+0x328/0x630 [ 31.216771] ret_from_fork+0x10/0x20 [ 31.217209] [ 31.217304] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 31.217480] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.217527] Hardware name: linux,dummy-virt (DT) [ 31.217581] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-kmalloc_oob_left
[ 31.090111] ================================================================== [ 31.091709] BUG: KFENCE: out-of-bounds read in kmalloc_oob_left+0x160/0x320 [ 31.091709] [ 31.092504] Out-of-bounds read at 0x0000000041943519 (1B left of kfence-#82): [ 31.093015] kmalloc_oob_left+0x160/0x320 [ 31.093135] kunit_try_run_case+0x170/0x3f0 [ 31.093236] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.093452] kthread+0x328/0x630 [ 31.093531] ret_from_fork+0x10/0x20 [ 31.094111] [ 31.097200] kfence-#82: 0x0000000028cb2158-0x000000000f4ac183, size=15, cache=kmalloc-16 [ 31.097200] [ 31.097729] allocated by task 149 on cpu 1 at 31.088605s (0.008992s ago): [ 31.106506] kmalloc_oob_left+0xb8/0x320 [ 31.106789] kunit_try_run_case+0x170/0x3f0 [ 31.106876] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.107016] kthread+0x328/0x630 [ 31.107101] ret_from_fork+0x10/0x20 [ 31.107801] [ 31.108192] CPU: 1 UID: 0 PID: 149 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 31.108523] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.108689] Hardware name: linux,dummy-virt (DT) [ 31.108791] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[ 36.656125] ================================================================== [ 36.656285] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 36.656445] Write of size 1 at addr fff00000c6515878 by task kunit_try_catch/296 [ 36.656585] [ 36.657387] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 36.658135] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.658443] Hardware name: linux,dummy-virt (DT) [ 36.658522] Call trace: [ 36.658929] show_stack+0x20/0x38 (C) [ 36.659809] dump_stack_lvl+0x8c/0xd0 [ 36.660030] print_report+0x118/0x608 [ 36.660242] kasan_report+0xdc/0x128 [ 36.660467] __asan_report_store1_noabort+0x20/0x30 [ 36.660662] strncpy_from_user+0x270/0x2a0 [ 36.661028] copy_user_test_oob+0x5c0/0xec8 [ 36.661231] kunit_try_run_case+0x170/0x3f0 [ 36.661360] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.661562] kthread+0x328/0x630 [ 36.661839] ret_from_fork+0x10/0x20 [ 36.662207] [ 36.662266] Allocated by task 296: [ 36.662350] kasan_save_stack+0x3c/0x68 [ 36.662583] kasan_save_track+0x20/0x40 [ 36.662812] kasan_save_alloc_info+0x40/0x58 [ 36.663009] __kasan_kmalloc+0xd4/0xd8 [ 36.663284] __kmalloc_noprof+0x198/0x4c8 [ 36.663403] kunit_kmalloc_array+0x34/0x88 [ 36.663502] copy_user_test_oob+0xac/0xec8 [ 36.664132] kunit_try_run_case+0x170/0x3f0 [ 36.664258] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.664385] kthread+0x328/0x630 [ 36.664492] ret_from_fork+0x10/0x20 [ 36.664598] [ 36.664676] The buggy address belongs to the object at fff00000c6515800 [ 36.664676] which belongs to the cache kmalloc-128 of size 128 [ 36.664838] The buggy address is located 0 bytes to the right of [ 36.664838] allocated 120-byte region [fff00000c6515800, fff00000c6515878) [ 36.665089] [ 36.665182] The buggy address belongs to the physical page: [ 36.665318] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106515 [ 36.665562] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.665975] page_type: f5(slab) [ 36.666075] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 36.666369] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 36.666500] page dumped because: kasan: bad access detected [ 36.666656] [ 36.666711] Memory state around the buggy address: [ 36.666800] fff00000c6515700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.666995] fff00000c6515780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.667241] >fff00000c6515800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 36.667469] ^ [ 36.668016] fff00000c6515880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.668166] fff00000c6515900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.670888] ================================================================== [ 36.635360] ================================================================== [ 36.635521] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 36.637148] Write of size 121 at addr fff00000c6515800 by task kunit_try_catch/296 [ 36.637891] [ 36.638082] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 36.639017] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.639559] Hardware name: linux,dummy-virt (DT) [ 36.639680] Call trace: [ 36.640159] show_stack+0x20/0x38 (C) [ 36.640422] dump_stack_lvl+0x8c/0xd0 [ 36.640605] print_report+0x118/0x608 [ 36.640756] kasan_report+0xdc/0x128 [ 36.640914] kasan_check_range+0x100/0x1a8 [ 36.641073] __kasan_check_write+0x20/0x30 [ 36.641171] strncpy_from_user+0x3c/0x2a0 [ 36.641263] copy_user_test_oob+0x5c0/0xec8 [ 36.641355] kunit_try_run_case+0x170/0x3f0 [ 36.641472] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.641660] kthread+0x328/0x630 [ 36.641774] ret_from_fork+0x10/0x20 [ 36.641906] [ 36.641958] Allocated by task 296: [ 36.642033] kasan_save_stack+0x3c/0x68 [ 36.642145] kasan_save_track+0x20/0x40 [ 36.642240] kasan_save_alloc_info+0x40/0x58 [ 36.642350] __kasan_kmalloc+0xd4/0xd8 [ 36.642480] __kmalloc_noprof+0x198/0x4c8 [ 36.643243] kunit_kmalloc_array+0x34/0x88 [ 36.643638] copy_user_test_oob+0xac/0xec8 [ 36.643753] kunit_try_run_case+0x170/0x3f0 [ 36.644537] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.645105] kthread+0x328/0x630 [ 36.645566] ret_from_fork+0x10/0x20 [ 36.645722] [ 36.645784] The buggy address belongs to the object at fff00000c6515800 [ 36.645784] which belongs to the cache kmalloc-128 of size 128 [ 36.646223] The buggy address is located 0 bytes inside of [ 36.646223] allocated 120-byte region [fff00000c6515800, fff00000c6515878) [ 36.646701] [ 36.647214] The buggy address belongs to the physical page: [ 36.647364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106515 [ 36.648071] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.648231] page_type: f5(slab) [ 36.648774] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 36.648896] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 36.648983] page dumped because: kasan: bad access detected [ 36.649504] [ 36.649814] Memory state around the buggy address: [ 36.650329] fff00000c6515700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.650858] fff00000c6515780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.651156] >fff00000c6515800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 36.651471] ^ [ 36.651836] fff00000c6515880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.652052] fff00000c6515900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.652284] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[ 36.518870] ================================================================== [ 36.519744] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 36.520030] Write of size 121 at addr fff00000c6515800 by task kunit_try_catch/296 [ 36.520188] [ 36.520356] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 36.520578] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.520650] Hardware name: linux,dummy-virt (DT) [ 36.520733] Call trace: [ 36.520802] show_stack+0x20/0x38 (C) [ 36.521306] dump_stack_lvl+0x8c/0xd0 [ 36.521515] print_report+0x118/0x608 [ 36.521653] kasan_report+0xdc/0x128 [ 36.521802] kasan_check_range+0x100/0x1a8 [ 36.521940] __kasan_check_write+0x20/0x30 [ 36.522368] copy_user_test_oob+0x234/0xec8 [ 36.522683] kunit_try_run_case+0x170/0x3f0 [ 36.522900] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.523041] kthread+0x328/0x630 [ 36.523193] ret_from_fork+0x10/0x20 [ 36.523325] [ 36.523385] Allocated by task 296: [ 36.523478] kasan_save_stack+0x3c/0x68 [ 36.523585] kasan_save_track+0x20/0x40 [ 36.523695] kasan_save_alloc_info+0x40/0x58 [ 36.523817] __kasan_kmalloc+0xd4/0xd8 [ 36.523926] __kmalloc_noprof+0x198/0x4c8 [ 36.524045] kunit_kmalloc_array+0x34/0x88 [ 36.524145] copy_user_test_oob+0xac/0xec8 [ 36.524247] kunit_try_run_case+0x170/0x3f0 [ 36.524382] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.524484] kthread+0x328/0x630 [ 36.524661] ret_from_fork+0x10/0x20 [ 36.524938] [ 36.524996] The buggy address belongs to the object at fff00000c6515800 [ 36.524996] which belongs to the cache kmalloc-128 of size 128 [ 36.525208] The buggy address is located 0 bytes inside of [ 36.525208] allocated 120-byte region [fff00000c6515800, fff00000c6515878) [ 36.525368] [ 36.525422] The buggy address belongs to the physical page: [ 36.525739] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106515 [ 36.526006] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.526144] page_type: f5(slab) [ 36.526261] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 36.526407] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 36.526603] page dumped because: kasan: bad access detected [ 36.526805] [ 36.526861] Memory state around the buggy address: [ 36.526961] fff00000c6515700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.527087] fff00000c6515780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.527549] >fff00000c6515800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 36.527831] ^ [ 36.528443] fff00000c6515880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.528928] fff00000c6515900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.529096] ================================================================== [ 36.594303] ================================================================== [ 36.594468] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 36.594634] Read of size 121 at addr fff00000c6515800 by task kunit_try_catch/296 [ 36.594774] [ 36.594863] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 36.595098] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.595169] Hardware name: linux,dummy-virt (DT) [ 36.595259] Call trace: [ 36.595619] show_stack+0x20/0x38 (C) [ 36.595908] dump_stack_lvl+0x8c/0xd0 [ 36.596197] print_report+0x118/0x608 [ 36.596765] kasan_report+0xdc/0x128 [ 36.597022] kasan_check_range+0x100/0x1a8 [ 36.597314] __kasan_check_read+0x20/0x30 [ 36.597679] copy_user_test_oob+0x3c8/0xec8 [ 36.597796] kunit_try_run_case+0x170/0x3f0 [ 36.597912] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.598403] kthread+0x328/0x630 [ 36.598523] ret_from_fork+0x10/0x20 [ 36.599195] [ 36.599306] Allocated by task 296: [ 36.599513] kasan_save_stack+0x3c/0x68 [ 36.599650] kasan_save_track+0x20/0x40 [ 36.599740] kasan_save_alloc_info+0x40/0x58 [ 36.600097] __kasan_kmalloc+0xd4/0xd8 [ 36.600214] __kmalloc_noprof+0x198/0x4c8 [ 36.600388] kunit_kmalloc_array+0x34/0x88 [ 36.600524] copy_user_test_oob+0xac/0xec8 [ 36.600757] kunit_try_run_case+0x170/0x3f0 [ 36.601124] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.601244] kthread+0x328/0x630 [ 36.601437] ret_from_fork+0x10/0x20 [ 36.601659] [ 36.601724] The buggy address belongs to the object at fff00000c6515800 [ 36.601724] which belongs to the cache kmalloc-128 of size 128 [ 36.601970] The buggy address is located 0 bytes inside of [ 36.601970] allocated 120-byte region [fff00000c6515800, fff00000c6515878) [ 36.602303] [ 36.602366] The buggy address belongs to the physical page: [ 36.602478] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106515 [ 36.602632] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.602830] page_type: f5(slab) [ 36.603053] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 36.603497] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 36.603718] page dumped because: kasan: bad access detected [ 36.603879] [ 36.604159] Memory state around the buggy address: [ 36.604273] fff00000c6515700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.604387] fff00000c6515780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.604622] >fff00000c6515800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 36.604787] ^ [ 36.604918] fff00000c6515880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.605302] fff00000c6515900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.605589] ================================================================== [ 36.621437] ================================================================== [ 36.621589] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 36.622004] Read of size 121 at addr fff00000c6515800 by task kunit_try_catch/296 [ 36.622136] [ 36.622235] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 36.622470] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.622550] Hardware name: linux,dummy-virt (DT) [ 36.622645] Call trace: [ 36.622714] show_stack+0x20/0x38 (C) [ 36.622913] dump_stack_lvl+0x8c/0xd0 [ 36.623042] print_report+0x118/0x608 [ 36.623164] kasan_report+0xdc/0x128 [ 36.623304] kasan_check_range+0x100/0x1a8 [ 36.623439] __kasan_check_read+0x20/0x30 [ 36.623725] copy_user_test_oob+0x4a0/0xec8 [ 36.624087] kunit_try_run_case+0x170/0x3f0 [ 36.624208] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.624420] kthread+0x328/0x630 [ 36.624541] ret_from_fork+0x10/0x20 [ 36.624690] [ 36.624746] Allocated by task 296: [ 36.624830] kasan_save_stack+0x3c/0x68 [ 36.624940] kasan_save_track+0x20/0x40 [ 36.625036] kasan_save_alloc_info+0x40/0x58 [ 36.625120] __kasan_kmalloc+0xd4/0xd8 [ 36.625190] __kmalloc_noprof+0x198/0x4c8 [ 36.625292] kunit_kmalloc_array+0x34/0x88 [ 36.625386] copy_user_test_oob+0xac/0xec8 [ 36.625487] kunit_try_run_case+0x170/0x3f0 [ 36.625587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.625719] kthread+0x328/0x630 [ 36.625801] ret_from_fork+0x10/0x20 [ 36.626285] [ 36.626386] The buggy address belongs to the object at fff00000c6515800 [ 36.626386] which belongs to the cache kmalloc-128 of size 128 [ 36.628376] The buggy address is located 0 bytes inside of [ 36.628376] allocated 120-byte region [fff00000c6515800, fff00000c6515878) [ 36.628476] [ 36.628511] The buggy address belongs to the physical page: [ 36.628588] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106515 [ 36.628763] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.629419] page_type: f5(slab) [ 36.629522] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 36.629862] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 36.629999] page dumped because: kasan: bad access detected [ 36.630272] [ 36.630326] Memory state around the buggy address: [ 36.630478] fff00000c6515700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.630697] fff00000c6515780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.631179] >fff00000c6515800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 36.631404] ^ [ 36.631617] fff00000c6515880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.632009] fff00000c6515900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.632177] ================================================================== [ 36.543586] ================================================================== [ 36.543828] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 36.544045] Read of size 121 at addr fff00000c6515800 by task kunit_try_catch/296 [ 36.544188] [ 36.544285] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 36.544658] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.544742] Hardware name: linux,dummy-virt (DT) [ 36.544837] Call trace: [ 36.544904] show_stack+0x20/0x38 (C) [ 36.545039] dump_stack_lvl+0x8c/0xd0 [ 36.545159] print_report+0x118/0x608 [ 36.545281] kasan_report+0xdc/0x128 [ 36.545381] kasan_check_range+0x100/0x1a8 [ 36.545479] __kasan_check_read+0x20/0x30 [ 36.545630] copy_user_test_oob+0x728/0xec8 [ 36.545782] kunit_try_run_case+0x170/0x3f0 [ 36.545893] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.546001] kthread+0x328/0x630 [ 36.546081] ret_from_fork+0x10/0x20 [ 36.546178] [ 36.546226] Allocated by task 296: [ 36.546297] kasan_save_stack+0x3c/0x68 [ 36.546416] kasan_save_track+0x20/0x40 [ 36.546511] kasan_save_alloc_info+0x40/0x58 [ 36.546663] __kasan_kmalloc+0xd4/0xd8 [ 36.546785] __kmalloc_noprof+0x198/0x4c8 [ 36.546915] kunit_kmalloc_array+0x34/0x88 [ 36.547050] copy_user_test_oob+0xac/0xec8 [ 36.547188] kunit_try_run_case+0x170/0x3f0 [ 36.547312] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.547450] kthread+0x328/0x630 [ 36.547541] ret_from_fork+0x10/0x20 [ 36.547674] [ 36.547729] The buggy address belongs to the object at fff00000c6515800 [ 36.547729] which belongs to the cache kmalloc-128 of size 128 [ 36.547893] The buggy address is located 0 bytes inside of [ 36.547893] allocated 120-byte region [fff00000c6515800, fff00000c6515878) [ 36.548086] [ 36.548230] The buggy address belongs to the physical page: [ 36.548398] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106515 [ 36.548641] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.548796] page_type: f5(slab) [ 36.548912] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 36.549032] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 36.549174] page dumped because: kasan: bad access detected [ 36.549243] [ 36.549283] Memory state around the buggy address: [ 36.549388] fff00000c6515700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.549495] fff00000c6515780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.549623] >fff00000c6515800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 36.549731] ^ [ 36.549883] fff00000c6515880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.550054] fff00000c6515900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.550190] ================================================================== [ 36.579521] ================================================================== [ 36.580028] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 36.580198] Write of size 121 at addr fff00000c6515800 by task kunit_try_catch/296 [ 36.580411] [ 36.580724] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 36.581283] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.581375] Hardware name: linux,dummy-virt (DT) [ 36.581571] Call trace: [ 36.581727] show_stack+0x20/0x38 (C) [ 36.582304] dump_stack_lvl+0x8c/0xd0 [ 36.582460] print_report+0x118/0x608 [ 36.582577] kasan_report+0xdc/0x128 [ 36.583120] kasan_check_range+0x100/0x1a8 [ 36.583365] __kasan_check_write+0x20/0x30 [ 36.583597] copy_user_test_oob+0x35c/0xec8 [ 36.583741] kunit_try_run_case+0x170/0x3f0 [ 36.583869] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.584010] kthread+0x328/0x630 [ 36.584621] ret_from_fork+0x10/0x20 [ 36.584894] [ 36.584991] Allocated by task 296: [ 36.585274] kasan_save_stack+0x3c/0x68 [ 36.585632] kasan_save_track+0x20/0x40 [ 36.585750] kasan_save_alloc_info+0x40/0x58 [ 36.585854] __kasan_kmalloc+0xd4/0xd8 [ 36.586023] __kmalloc_noprof+0x198/0x4c8 [ 36.586134] kunit_kmalloc_array+0x34/0x88 [ 36.586326] copy_user_test_oob+0xac/0xec8 [ 36.586718] kunit_try_run_case+0x170/0x3f0 [ 36.587239] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.587592] kthread+0x328/0x630 [ 36.587709] ret_from_fork+0x10/0x20 [ 36.587798] [ 36.587856] The buggy address belongs to the object at fff00000c6515800 [ 36.587856] which belongs to the cache kmalloc-128 of size 128 [ 36.588025] The buggy address is located 0 bytes inside of [ 36.588025] allocated 120-byte region [fff00000c6515800, fff00000c6515878) [ 36.588198] [ 36.588258] The buggy address belongs to the physical page: [ 36.588695] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106515 [ 36.588860] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.588986] page_type: f5(slab) [ 36.589075] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 36.589173] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 36.589491] page dumped because: kasan: bad access detected [ 36.589690] [ 36.589742] Memory state around the buggy address: [ 36.589870] fff00000c6515700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.590069] fff00000c6515780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.590190] >fff00000c6515800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 36.590302] ^ [ 36.590448] fff00000c6515880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.590685] fff00000c6515900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.591053] ================================================================== [ 36.608066] ================================================================== [ 36.608338] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 36.608591] Write of size 121 at addr fff00000c6515800 by task kunit_try_catch/296 [ 36.608952] [ 36.609050] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 36.609381] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.609521] Hardware name: linux,dummy-virt (DT) [ 36.609654] Call trace: [ 36.609912] show_stack+0x20/0x38 (C) [ 36.610053] dump_stack_lvl+0x8c/0xd0 [ 36.610172] print_report+0x118/0x608 [ 36.610290] kasan_report+0xdc/0x128 [ 36.610406] kasan_check_range+0x100/0x1a8 [ 36.610525] __kasan_check_write+0x20/0x30 [ 36.610976] copy_user_test_oob+0x434/0xec8 [ 36.611173] kunit_try_run_case+0x170/0x3f0 [ 36.611423] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.612026] kthread+0x328/0x630 [ 36.612243] ret_from_fork+0x10/0x20 [ 36.612436] [ 36.612493] Allocated by task 296: [ 36.612685] kasan_save_stack+0x3c/0x68 [ 36.612787] kasan_save_track+0x20/0x40 [ 36.612862] kasan_save_alloc_info+0x40/0x58 [ 36.613154] __kasan_kmalloc+0xd4/0xd8 [ 36.613278] __kmalloc_noprof+0x198/0x4c8 [ 36.613391] kunit_kmalloc_array+0x34/0x88 [ 36.613634] copy_user_test_oob+0xac/0xec8 [ 36.613843] kunit_try_run_case+0x170/0x3f0 [ 36.614054] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.614167] kthread+0x328/0x630 [ 36.614571] ret_from_fork+0x10/0x20 [ 36.614826] [ 36.614886] The buggy address belongs to the object at fff00000c6515800 [ 36.614886] which belongs to the cache kmalloc-128 of size 128 [ 36.615067] The buggy address is located 0 bytes inside of [ 36.615067] allocated 120-byte region [fff00000c6515800, fff00000c6515878) [ 36.615236] [ 36.615293] The buggy address belongs to the physical page: [ 36.615379] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106515 [ 36.615546] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.615688] page_type: f5(slab) [ 36.615805] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 36.616495] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 36.616693] page dumped because: kasan: bad access detected [ 36.616899] [ 36.616953] Memory state around the buggy address: [ 36.617248] fff00000c6515700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.617379] fff00000c6515780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.617478] >fff00000c6515800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 36.617591] ^ [ 36.617840] fff00000c6515880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.618088] fff00000c6515900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.618621] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[ 36.405894] ================================================================== [ 36.406034] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 36.406172] Write of size 8 at addr fff00000c6515778 by task kunit_try_catch/292 [ 36.406297] [ 36.406699] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 36.407025] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.407150] Hardware name: linux,dummy-virt (DT) [ 36.407242] Call trace: [ 36.407335] show_stack+0x20/0x38 (C) [ 36.407534] dump_stack_lvl+0x8c/0xd0 [ 36.407678] print_report+0x118/0x608 [ 36.407802] kasan_report+0xdc/0x128 [ 36.407918] kasan_check_range+0x100/0x1a8 [ 36.408037] __kasan_check_write+0x20/0x30 [ 36.408162] copy_to_kernel_nofault+0x8c/0x250 [ 36.408290] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 36.408545] kunit_try_run_case+0x170/0x3f0 [ 36.408947] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.409018] kthread+0x328/0x630 [ 36.409125] ret_from_fork+0x10/0x20 [ 36.409195] [ 36.409221] Allocated by task 292: [ 36.409261] kasan_save_stack+0x3c/0x68 [ 36.409315] kasan_save_track+0x20/0x40 [ 36.409361] kasan_save_alloc_info+0x40/0x58 [ 36.409408] __kasan_kmalloc+0xd4/0xd8 [ 36.409452] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.409498] copy_to_kernel_nofault_oob+0xc8/0x418 [ 36.409546] kunit_try_run_case+0x170/0x3f0 [ 36.409591] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.409697] kthread+0x328/0x630 [ 36.409792] ret_from_fork+0x10/0x20 [ 36.409884] [ 36.409928] The buggy address belongs to the object at fff00000c6515700 [ 36.409928] which belongs to the cache kmalloc-128 of size 128 [ 36.410047] The buggy address is located 0 bytes to the right of [ 36.410047] allocated 120-byte region [fff00000c6515700, fff00000c6515778) [ 36.410183] [ 36.410235] The buggy address belongs to the physical page: [ 36.410316] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106515 [ 36.410469] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.410623] page_type: f5(slab) [ 36.410745] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 36.410890] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 36.411009] page dumped because: kasan: bad access detected [ 36.411120] [ 36.411177] Memory state around the buggy address: [ 36.411288] fff00000c6515600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.411431] fff00000c6515680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.411562] >fff00000c6515700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 36.411671] ^ [ 36.411775] fff00000c6515780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.411892] fff00000c6515800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.412005] ================================================================== [ 36.395750] ================================================================== [ 36.396004] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 36.396238] Read of size 8 at addr fff00000c6515778 by task kunit_try_catch/292 [ 36.396622] [ 36.396769] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 36.397255] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.397350] Hardware name: linux,dummy-virt (DT) [ 36.397429] Call trace: [ 36.397487] show_stack+0x20/0x38 (C) [ 36.397619] dump_stack_lvl+0x8c/0xd0 [ 36.397732] print_report+0x118/0x608 [ 36.397893] kasan_report+0xdc/0x128 [ 36.398026] __asan_report_load8_noabort+0x20/0x30 [ 36.398181] copy_to_kernel_nofault+0x204/0x250 [ 36.398346] copy_to_kernel_nofault_oob+0x158/0x418 [ 36.398493] kunit_try_run_case+0x170/0x3f0 [ 36.398655] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.398796] kthread+0x328/0x630 [ 36.398908] ret_from_fork+0x10/0x20 [ 36.399029] [ 36.399090] Allocated by task 292: [ 36.399166] kasan_save_stack+0x3c/0x68 [ 36.399287] kasan_save_track+0x20/0x40 [ 36.399378] kasan_save_alloc_info+0x40/0x58 [ 36.399577] __kasan_kmalloc+0xd4/0xd8 [ 36.399775] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.400117] copy_to_kernel_nofault_oob+0xc8/0x418 [ 36.400260] kunit_try_run_case+0x170/0x3f0 [ 36.400368] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.400504] kthread+0x328/0x630 [ 36.400627] ret_from_fork+0x10/0x20 [ 36.400750] [ 36.400908] The buggy address belongs to the object at fff00000c6515700 [ 36.400908] which belongs to the cache kmalloc-128 of size 128 [ 36.401053] The buggy address is located 0 bytes to the right of [ 36.401053] allocated 120-byte region [fff00000c6515700, fff00000c6515778) [ 36.401418] [ 36.401521] The buggy address belongs to the physical page: [ 36.401630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106515 [ 36.401783] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.401923] page_type: f5(slab) [ 36.402032] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 36.402171] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 36.402288] page dumped because: kasan: bad access detected [ 36.402373] [ 36.402427] Memory state around the buggy address: [ 36.402533] fff00000c6515600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.402657] fff00000c6515680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.402996] >fff00000c6515700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 36.403221] ^ [ 36.403366] fff00000c6515780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.403497] fff00000c6515800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.403791] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 36.247320] ================================================================== [ 36.247556] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 36.247728] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/280 [ 36.248096] [ 36.248335] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 36.248617] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.248686] Hardware name: linux,dummy-virt (DT) [ 36.248770] Call trace: [ 36.249022] show_stack+0x20/0x38 (C) [ 36.249166] dump_stack_lvl+0x8c/0xd0 [ 36.249275] print_report+0x310/0x608 [ 36.249461] kasan_report+0xdc/0x128 [ 36.249596] __asan_report_load1_noabort+0x20/0x30 [ 36.249831] vmalloc_oob+0x578/0x5d0 [ 36.250025] kunit_try_run_case+0x170/0x3f0 [ 36.250152] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.250280] kthread+0x328/0x630 [ 36.250697] ret_from_fork+0x10/0x20 [ 36.250853] [ 36.251031] The buggy address belongs to the virtual mapping at [ 36.251031] [ffff8000800fe000, ffff800080100000) created by: [ 36.251031] vmalloc_oob+0x98/0x5d0 [ 36.251278] [ 36.251367] The buggy address belongs to the physical page: [ 36.251514] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ab5 [ 36.251673] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.251849] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 36.251988] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 36.252108] page dumped because: kasan: bad access detected [ 36.252206] [ 36.252280] Memory state around the buggy address: [ 36.252364] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.252469] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.252876] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 36.253003] ^ [ 36.253231] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 36.253383] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 36.253513] ================================================================== [ 36.255605] ================================================================== [ 36.256028] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 36.256240] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/280 [ 36.256358] [ 36.256690] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 36.256988] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.257061] Hardware name: linux,dummy-virt (DT) [ 36.257160] Call trace: [ 36.257259] show_stack+0x20/0x38 (C) [ 36.257381] dump_stack_lvl+0x8c/0xd0 [ 36.257510] print_report+0x310/0x608 [ 36.257622] kasan_report+0xdc/0x128 [ 36.257716] __asan_report_load1_noabort+0x20/0x30 [ 36.258136] vmalloc_oob+0x51c/0x5d0 [ 36.258312] kunit_try_run_case+0x170/0x3f0 [ 36.258536] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.258686] kthread+0x328/0x630 [ 36.258806] ret_from_fork+0x10/0x20 [ 36.258934] [ 36.259093] The buggy address belongs to the virtual mapping at [ 36.259093] [ffff8000800fe000, ffff800080100000) created by: [ 36.259093] vmalloc_oob+0x98/0x5d0 [ 36.259529] [ 36.259595] The buggy address belongs to the physical page: [ 36.259713] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105ab5 [ 36.259937] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.260161] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 36.260287] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 36.260385] page dumped because: kasan: bad access detected [ 36.260471] [ 36.260789] Memory state around the buggy address: [ 36.260928] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.261069] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.261231] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 36.261380] ^ [ 36.261534] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 36.261675] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 36.261776] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 35.938135] ================================================================== [ 35.938920] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 35.939213] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 35.939446] [ 35.939929] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 35.940784] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.941437] Hardware name: linux,dummy-virt (DT) [ 35.941659] Call trace: [ 35.941759] show_stack+0x20/0x38 (C) [ 35.941911] dump_stack_lvl+0x8c/0xd0 [ 35.942002] print_report+0x118/0x608 [ 35.942087] kasan_report+0xdc/0x128 [ 35.942170] kasan_check_range+0x100/0x1a8 [ 35.942272] __kasan_check_write+0x20/0x30 [ 35.942383] kasan_atomics_helper+0xff0/0x4858 [ 35.943623] kasan_atomics+0x198/0x2e0 [ 35.943976] kunit_try_run_case+0x170/0x3f0 [ 35.944623] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.944799] kthread+0x328/0x630 [ 35.944922] ret_from_fork+0x10/0x20 [ 35.945161] [ 35.945242] Allocated by task 276: [ 35.945418] kasan_save_stack+0x3c/0x68 [ 35.945856] kasan_save_track+0x20/0x40 [ 35.945943] kasan_save_alloc_info+0x40/0x58 [ 35.946087] __kasan_kmalloc+0xd4/0xd8 [ 35.946181] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.946279] kasan_atomics+0xb8/0x2e0 [ 35.946462] kunit_try_run_case+0x170/0x3f0 [ 35.946924] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.947277] kthread+0x328/0x630 [ 35.947447] ret_from_fork+0x10/0x20 [ 35.947554] [ 35.947795] The buggy address belongs to the object at fff00000c768c580 [ 35.947795] which belongs to the cache kmalloc-64 of size 64 [ 35.948651] The buggy address is located 0 bytes to the right of [ 35.948651] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 35.948892] [ 35.948945] The buggy address belongs to the physical page: [ 35.949013] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 35.949113] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.949220] page_type: f5(slab) [ 35.949320] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.949454] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.949571] page dumped because: kasan: bad access detected [ 35.950197] [ 35.950392] Memory state around the buggy address: [ 35.950883] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.951233] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.951535] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.952157] ^ [ 35.952696] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.952849] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.952967] ================================================================== [ 35.860988] ================================================================== [ 35.861346] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 35.861575] Read of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 35.861739] [ 35.861838] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 35.862071] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.862509] Hardware name: linux,dummy-virt (DT) [ 35.862944] Call trace: [ 35.863016] show_stack+0x20/0x38 (C) [ 35.863935] dump_stack_lvl+0x8c/0xd0 [ 35.864182] print_report+0x118/0x608 [ 35.864716] kasan_report+0xdc/0x128 [ 35.864869] __asan_report_load8_noabort+0x20/0x30 [ 35.864970] kasan_atomics_helper+0x3f58/0x4858 [ 35.865075] kasan_atomics+0x198/0x2e0 [ 35.865193] kunit_try_run_case+0x170/0x3f0 [ 35.865302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.865432] kthread+0x328/0x630 [ 35.865705] ret_from_fork+0x10/0x20 [ 35.866128] [ 35.866331] Allocated by task 276: [ 35.866598] kasan_save_stack+0x3c/0x68 [ 35.867169] kasan_save_track+0x20/0x40 [ 35.867308] kasan_save_alloc_info+0x40/0x58 [ 35.867432] __kasan_kmalloc+0xd4/0xd8 [ 35.867941] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.868074] kasan_atomics+0xb8/0x2e0 [ 35.868181] kunit_try_run_case+0x170/0x3f0 [ 35.868289] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.868402] kthread+0x328/0x630 [ 35.869042] ret_from_fork+0x10/0x20 [ 35.869154] [ 35.869201] The buggy address belongs to the object at fff00000c768c580 [ 35.869201] which belongs to the cache kmalloc-64 of size 64 [ 35.869847] The buggy address is located 0 bytes to the right of [ 35.869847] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 35.870047] [ 35.870444] The buggy address belongs to the physical page: [ 35.870858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 35.871030] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.871174] page_type: f5(slab) [ 35.871286] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.872014] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.872545] page dumped because: kasan: bad access detected [ 35.873007] [ 35.873067] Memory state around the buggy address: [ 35.873153] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.873258] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.873375] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.873482] ^ [ 35.874415] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.874568] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.874695] ================================================================== [ 36.007389] ================================================================== [ 36.007716] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 36.008191] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 36.008798] [ 36.008977] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 36.009170] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.009224] Hardware name: linux,dummy-virt (DT) [ 36.009735] Call trace: [ 36.009844] show_stack+0x20/0x38 (C) [ 36.010324] dump_stack_lvl+0x8c/0xd0 [ 36.010920] print_report+0x118/0x608 [ 36.011279] kasan_report+0xdc/0x128 [ 36.011403] kasan_check_range+0x100/0x1a8 [ 36.011879] __kasan_check_write+0x20/0x30 [ 36.012035] kasan_atomics_helper+0x1190/0x4858 [ 36.012528] kasan_atomics+0x198/0x2e0 [ 36.012900] kunit_try_run_case+0x170/0x3f0 [ 36.013283] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.013788] kthread+0x328/0x630 [ 36.013904] ret_from_fork+0x10/0x20 [ 36.014001] [ 36.014043] Allocated by task 276: [ 36.014560] kasan_save_stack+0x3c/0x68 [ 36.014780] kasan_save_track+0x20/0x40 [ 36.015195] kasan_save_alloc_info+0x40/0x58 [ 36.015412] __kasan_kmalloc+0xd4/0xd8 [ 36.015593] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.015793] kasan_atomics+0xb8/0x2e0 [ 36.015885] kunit_try_run_case+0x170/0x3f0 [ 36.016443] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.016576] kthread+0x328/0x630 [ 36.016939] ret_from_fork+0x10/0x20 [ 36.017222] [ 36.017272] The buggy address belongs to the object at fff00000c768c580 [ 36.017272] which belongs to the cache kmalloc-64 of size 64 [ 36.017428] The buggy address is located 0 bytes to the right of [ 36.017428] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 36.017592] [ 36.017688] The buggy address belongs to the physical page: [ 36.017868] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 36.018036] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.018175] page_type: f5(slab) [ 36.018811] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.018959] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.019281] page dumped because: kasan: bad access detected [ 36.019953] [ 36.020010] Memory state around the buggy address: [ 36.020106] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.020884] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.021082] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.021486] ^ [ 36.021570] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.021872] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.022117] ================================================================== [ 35.878699] ================================================================== [ 35.878856] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 35.879003] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 35.879142] [ 35.879237] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 35.880654] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.880966] Hardware name: linux,dummy-virt (DT) [ 35.881333] Call trace: [ 35.881438] show_stack+0x20/0x38 (C) [ 35.881997] dump_stack_lvl+0x8c/0xd0 [ 35.882714] print_report+0x118/0x608 [ 35.883174] kasan_report+0xdc/0x128 [ 35.883313] kasan_check_range+0x100/0x1a8 [ 35.883723] __kasan_check_write+0x20/0x30 [ 35.884057] kasan_atomics_helper+0xe44/0x4858 [ 35.884307] kasan_atomics+0x198/0x2e0 [ 35.885874] kunit_try_run_case+0x170/0x3f0 [ 35.886033] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.886109] kthread+0x328/0x630 [ 35.886163] ret_from_fork+0x10/0x20 [ 35.886226] [ 35.886255] Allocated by task 276: [ 35.886296] kasan_save_stack+0x3c/0x68 [ 35.886355] kasan_save_track+0x20/0x40 [ 35.886401] kasan_save_alloc_info+0x40/0x58 [ 35.886450] __kasan_kmalloc+0xd4/0xd8 [ 35.886495] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.886543] kasan_atomics+0xb8/0x2e0 [ 35.886586] kunit_try_run_case+0x170/0x3f0 [ 35.886707] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.886831] kthread+0x328/0x630 [ 35.886924] ret_from_fork+0x10/0x20 [ 35.887252] [ 35.887330] The buggy address belongs to the object at fff00000c768c580 [ 35.887330] which belongs to the cache kmalloc-64 of size 64 [ 35.887664] The buggy address is located 0 bytes to the right of [ 35.887664] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 35.887857] [ 35.888527] The buggy address belongs to the physical page: [ 35.888740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 35.889063] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.889213] page_type: f5(slab) [ 35.889326] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.889814] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.890004] page dumped because: kasan: bad access detected [ 35.890100] [ 35.890240] Memory state around the buggy address: [ 35.890390] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.890515] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.890643] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.890747] ^ [ 35.890854] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.891028] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.891139] ================================================================== [ 35.893368] ================================================================== [ 35.893848] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 35.893992] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 35.894096] [ 35.894186] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 35.894354] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.894419] Hardware name: linux,dummy-virt (DT) [ 35.894486] Call trace: [ 35.894535] show_stack+0x20/0x38 (C) [ 35.894667] dump_stack_lvl+0x8c/0xd0 [ 35.894772] print_report+0x118/0x608 [ 35.894880] kasan_report+0xdc/0x128 [ 35.894995] __asan_report_store8_noabort+0x20/0x30 [ 35.896980] kasan_atomics_helper+0x3e5c/0x4858 [ 35.897216] kasan_atomics+0x198/0x2e0 [ 35.897331] kunit_try_run_case+0x170/0x3f0 [ 35.897438] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.898573] kthread+0x328/0x630 [ 35.899172] ret_from_fork+0x10/0x20 [ 35.899435] [ 35.899699] Allocated by task 276: [ 35.899790] kasan_save_stack+0x3c/0x68 [ 35.900347] kasan_save_track+0x20/0x40 [ 35.900507] kasan_save_alloc_info+0x40/0x58 [ 35.901069] __kasan_kmalloc+0xd4/0xd8 [ 35.901548] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.901880] kasan_atomics+0xb8/0x2e0 [ 35.901981] kunit_try_run_case+0x170/0x3f0 [ 35.902359] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.902861] kthread+0x328/0x630 [ 35.903317] ret_from_fork+0x10/0x20 [ 35.903689] [ 35.903754] The buggy address belongs to the object at fff00000c768c580 [ 35.903754] which belongs to the cache kmalloc-64 of size 64 [ 35.904274] The buggy address is located 0 bytes to the right of [ 35.904274] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 35.904455] [ 35.904539] The buggy address belongs to the physical page: [ 35.904639] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 35.904797] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.904910] page_type: f5(slab) [ 35.904993] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.905336] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.905455] page dumped because: kasan: bad access detected [ 35.905735] [ 35.905799] Memory state around the buggy address: [ 35.905928] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.906086] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.906199] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.906361] ^ [ 35.906745] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.906941] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.907083] ================================================================== [ 36.153527] ================================================================== [ 36.153694] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 36.153849] Read of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 36.153987] [ 36.154079] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 36.154309] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.154381] Hardware name: linux,dummy-virt (DT) [ 36.154918] Call trace: [ 36.155060] show_stack+0x20/0x38 (C) [ 36.155323] dump_stack_lvl+0x8c/0xd0 [ 36.155521] print_report+0x118/0x608 [ 36.155971] kasan_report+0xdc/0x128 [ 36.156163] __asan_report_load8_noabort+0x20/0x30 [ 36.156364] kasan_atomics_helper+0x3e10/0x4858 [ 36.156573] kasan_atomics+0x198/0x2e0 [ 36.156767] kunit_try_run_case+0x170/0x3f0 [ 36.157198] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.157309] kthread+0x328/0x630 [ 36.157406] ret_from_fork+0x10/0x20 [ 36.157529] [ 36.157645] Allocated by task 276: [ 36.157754] kasan_save_stack+0x3c/0x68 [ 36.158005] kasan_save_track+0x20/0x40 [ 36.158479] kasan_save_alloc_info+0x40/0x58 [ 36.158594] __kasan_kmalloc+0xd4/0xd8 [ 36.159177] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.159598] kasan_atomics+0xb8/0x2e0 [ 36.159975] kunit_try_run_case+0x170/0x3f0 [ 36.160129] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.160650] kthread+0x328/0x630 [ 36.160895] ret_from_fork+0x10/0x20 [ 36.161011] [ 36.161071] The buggy address belongs to the object at fff00000c768c580 [ 36.161071] which belongs to the cache kmalloc-64 of size 64 [ 36.161232] The buggy address is located 0 bytes to the right of [ 36.161232] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 36.161363] [ 36.161404] The buggy address belongs to the physical page: [ 36.161825] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 36.162238] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.162638] page_type: f5(slab) [ 36.162762] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.163026] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.163288] page dumped because: kasan: bad access detected [ 36.163381] [ 36.163438] Memory state around the buggy address: [ 36.163529] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.163669] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.163796] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.163905] ^ [ 36.164540] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.164737] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.165073] ================================================================== [ 36.122503] ================================================================== [ 36.122656] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 36.122778] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 36.122897] [ 36.122990] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 36.123257] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.123365] Hardware name: linux,dummy-virt (DT) [ 36.123475] Call trace: [ 36.123586] show_stack+0x20/0x38 (C) [ 36.123771] dump_stack_lvl+0x8c/0xd0 [ 36.123939] print_report+0x118/0x608 [ 36.124101] kasan_report+0xdc/0x128 [ 36.124227] kasan_check_range+0x100/0x1a8 [ 36.124391] __kasan_check_write+0x20/0x30 [ 36.124499] kasan_atomics_helper+0x1644/0x4858 [ 36.124711] kasan_atomics+0x198/0x2e0 [ 36.124849] kunit_try_run_case+0x170/0x3f0 [ 36.124965] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.125117] kthread+0x328/0x630 [ 36.125261] ret_from_fork+0x10/0x20 [ 36.125371] [ 36.125419] Allocated by task 276: [ 36.125492] kasan_save_stack+0x3c/0x68 [ 36.125629] kasan_save_track+0x20/0x40 [ 36.125710] kasan_save_alloc_info+0x40/0x58 [ 36.125825] __kasan_kmalloc+0xd4/0xd8 [ 36.125922] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.126014] kasan_atomics+0xb8/0x2e0 [ 36.126082] kunit_try_run_case+0x170/0x3f0 [ 36.126164] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.126261] kthread+0x328/0x630 [ 36.126335] ret_from_fork+0x10/0x20 [ 36.126415] [ 36.126469] The buggy address belongs to the object at fff00000c768c580 [ 36.126469] which belongs to the cache kmalloc-64 of size 64 [ 36.126638] The buggy address is located 0 bytes to the right of [ 36.126638] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 36.126848] [ 36.126913] The buggy address belongs to the physical page: [ 36.127003] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 36.127150] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.127283] page_type: f5(slab) [ 36.127427] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.127561] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.127674] page dumped because: kasan: bad access detected [ 36.127756] [ 36.127803] Memory state around the buggy address: [ 36.127893] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.128013] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.128127] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.128233] ^ [ 36.128410] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.128520] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.128635] ================================================================== [ 35.919841] ================================================================== [ 35.919933] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 35.920014] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 35.920076] [ 35.920127] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 35.920231] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.920267] Hardware name: linux,dummy-virt (DT) [ 35.921182] Call trace: [ 35.921270] show_stack+0x20/0x38 (C) [ 35.921403] dump_stack_lvl+0x8c/0xd0 [ 35.921528] print_report+0x118/0x608 [ 35.921668] kasan_report+0xdc/0x128 [ 35.921781] kasan_check_range+0x100/0x1a8 [ 35.921902] __kasan_check_write+0x20/0x30 [ 35.923710] kasan_atomics_helper+0xf20/0x4858 [ 35.923793] kasan_atomics+0x198/0x2e0 [ 35.923851] kunit_try_run_case+0x170/0x3f0 [ 35.923940] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.924006] kthread+0x328/0x630 [ 35.924056] ret_from_fork+0x10/0x20 [ 35.924117] [ 35.924144] Allocated by task 276: [ 35.924184] kasan_save_stack+0x3c/0x68 [ 35.924239] kasan_save_track+0x20/0x40 [ 35.924286] kasan_save_alloc_info+0x40/0x58 [ 35.924356] __kasan_kmalloc+0xd4/0xd8 [ 35.924404] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.924452] kasan_atomics+0xb8/0x2e0 [ 35.924496] kunit_try_run_case+0x170/0x3f0 [ 35.924541] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.924593] kthread+0x328/0x630 [ 35.924707] ret_from_fork+0x10/0x20 [ 35.924795] [ 35.924852] The buggy address belongs to the object at fff00000c768c580 [ 35.924852] which belongs to the cache kmalloc-64 of size 64 [ 35.924986] The buggy address is located 0 bytes to the right of [ 35.924986] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 35.925067] [ 35.925096] The buggy address belongs to the physical page: [ 35.925137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 35.925201] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.925272] page_type: f5(slab) [ 35.925325] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.925386] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.925437] page dumped because: kasan: bad access detected [ 35.925477] [ 35.925500] Memory state around the buggy address: [ 35.925544] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.925596] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.925724] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.925842] ^ [ 35.925916] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.926001] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.926077] ================================================================== [ 36.086038] ================================================================== [ 36.086106] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 36.086182] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 36.086243] [ 36.086292] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 36.086397] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.086429] Hardware name: linux,dummy-virt (DT) [ 36.086473] Call trace: [ 36.086504] show_stack+0x20/0x38 (C) [ 36.086566] dump_stack_lvl+0x8c/0xd0 [ 36.088393] print_report+0x118/0x608 [ 36.088548] kasan_report+0xdc/0x128 [ 36.088684] kasan_check_range+0x100/0x1a8 [ 36.088818] __kasan_check_write+0x20/0x30 [ 36.088936] kasan_atomics_helper+0x147c/0x4858 [ 36.089009] kasan_atomics+0x198/0x2e0 [ 36.089065] kunit_try_run_case+0x170/0x3f0 [ 36.089128] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.089193] kthread+0x328/0x630 [ 36.089244] ret_from_fork+0x10/0x20 [ 36.089305] [ 36.089331] Allocated by task 276: [ 36.089372] kasan_save_stack+0x3c/0x68 [ 36.089428] kasan_save_track+0x20/0x40 [ 36.089473] kasan_save_alloc_info+0x40/0x58 [ 36.089524] __kasan_kmalloc+0xd4/0xd8 [ 36.089567] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.089639] kasan_atomics+0xb8/0x2e0 [ 36.089688] kunit_try_run_case+0x170/0x3f0 [ 36.089734] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.089787] kthread+0x328/0x630 [ 36.089827] ret_from_fork+0x10/0x20 [ 36.089870] [ 36.089898] The buggy address belongs to the object at fff00000c768c580 [ 36.089898] which belongs to the cache kmalloc-64 of size 64 [ 36.089969] The buggy address is located 0 bytes to the right of [ 36.089969] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 36.090045] [ 36.090073] The buggy address belongs to the physical page: [ 36.090116] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 36.090183] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.090248] page_type: f5(slab) [ 36.090300] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.090360] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.090412] page dumped because: kasan: bad access detected [ 36.090450] [ 36.090473] Memory state around the buggy address: [ 36.090516] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.090569] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.090733] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.090942] ^ [ 36.091111] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.091351] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.091489] ================================================================== [ 36.115000] ================================================================== [ 36.115180] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 36.115370] Read of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 36.115576] [ 36.115685] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 36.115911] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.115977] Hardware name: linux,dummy-virt (DT) [ 36.116062] Call trace: [ 36.116126] show_stack+0x20/0x38 (C) [ 36.116259] dump_stack_lvl+0x8c/0xd0 [ 36.116415] print_report+0x118/0x608 [ 36.116534] kasan_report+0xdc/0x128 [ 36.116692] __asan_report_load8_noabort+0x20/0x30 [ 36.116801] kasan_atomics_helper+0x3db0/0x4858 [ 36.116920] kasan_atomics+0x198/0x2e0 [ 36.117047] kunit_try_run_case+0x170/0x3f0 [ 36.117232] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.117368] kthread+0x328/0x630 [ 36.117505] ret_from_fork+0x10/0x20 [ 36.117640] [ 36.117709] Allocated by task 276: [ 36.117810] kasan_save_stack+0x3c/0x68 [ 36.117918] kasan_save_track+0x20/0x40 [ 36.118020] kasan_save_alloc_info+0x40/0x58 [ 36.118125] __kasan_kmalloc+0xd4/0xd8 [ 36.118221] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.118325] kasan_atomics+0xb8/0x2e0 [ 36.118415] kunit_try_run_case+0x170/0x3f0 [ 36.118516] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.118640] kthread+0x328/0x630 [ 36.118752] ret_from_fork+0x10/0x20 [ 36.118836] [ 36.118885] The buggy address belongs to the object at fff00000c768c580 [ 36.118885] which belongs to the cache kmalloc-64 of size 64 [ 36.119022] The buggy address is located 0 bytes to the right of [ 36.119022] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 36.119159] [ 36.119213] The buggy address belongs to the physical page: [ 36.119321] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 36.119476] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.119636] page_type: f5(slab) [ 36.119736] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.119845] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.119967] page dumped because: kasan: bad access detected [ 36.120051] [ 36.120094] Memory state around the buggy address: [ 36.120184] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.120327] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.120448] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.120559] ^ [ 36.120666] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.120789] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.120897] ================================================================== [ 35.718712] ================================================================== [ 35.718905] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 35.719044] Write of size 4 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 35.719174] [ 35.719282] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 35.719747] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.719823] Hardware name: linux,dummy-virt (DT) [ 35.719908] Call trace: [ 35.719969] show_stack+0x20/0x38 (C) [ 35.720096] dump_stack_lvl+0x8c/0xd0 [ 35.720155] print_report+0x118/0x608 [ 35.720214] kasan_report+0xdc/0x128 [ 35.720268] kasan_check_range+0x100/0x1a8 [ 35.721075] __kasan_check_write+0x20/0x30 [ 35.721221] kasan_atomics_helper+0xa04/0x4858 [ 35.721331] kasan_atomics+0x198/0x2e0 [ 35.721389] kunit_try_run_case+0x170/0x3f0 [ 35.721453] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.721516] kthread+0x328/0x630 [ 35.721570] ret_from_fork+0x10/0x20 [ 35.721658] [ 35.721686] Allocated by task 276: [ 35.721726] kasan_save_stack+0x3c/0x68 [ 35.721782] kasan_save_track+0x20/0x40 [ 35.721827] kasan_save_alloc_info+0x40/0x58 [ 35.721875] __kasan_kmalloc+0xd4/0xd8 [ 35.721918] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.721967] kasan_atomics+0xb8/0x2e0 [ 35.722010] kunit_try_run_case+0x170/0x3f0 [ 35.722053] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.722105] kthread+0x328/0x630 [ 35.722143] ret_from_fork+0x10/0x20 [ 35.722186] [ 35.722213] The buggy address belongs to the object at fff00000c768c580 [ 35.722213] which belongs to the cache kmalloc-64 of size 64 [ 35.722286] The buggy address is located 0 bytes to the right of [ 35.722286] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 35.722360] [ 35.722389] The buggy address belongs to the physical page: [ 35.722431] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 35.722496] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.722562] page_type: f5(slab) [ 35.722654] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.722805] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.722995] page dumped because: kasan: bad access detected [ 35.723217] [ 35.723343] Memory state around the buggy address: [ 35.723504] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.723636] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.723767] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.724728] ^ [ 35.725085] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.725585] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.725976] ================================================================== [ 36.100133] ================================================================== [ 36.100277] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 36.100420] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 36.100541] [ 36.100676] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 36.100898] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.100971] Hardware name: linux,dummy-virt (DT) [ 36.101061] Call trace: [ 36.101133] show_stack+0x20/0x38 (C) [ 36.101251] dump_stack_lvl+0x8c/0xd0 [ 36.101407] print_report+0x118/0x608 [ 36.101551] kasan_report+0xdc/0x128 [ 36.101934] kasan_check_range+0x100/0x1a8 [ 36.102215] __kasan_check_write+0x20/0x30 [ 36.102478] kasan_atomics_helper+0x154c/0x4858 [ 36.102591] kasan_atomics+0x198/0x2e0 [ 36.102693] kunit_try_run_case+0x170/0x3f0 [ 36.102817] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.102945] kthread+0x328/0x630 [ 36.103076] ret_from_fork+0x10/0x20 [ 36.103196] [ 36.103244] Allocated by task 276: [ 36.103324] kasan_save_stack+0x3c/0x68 [ 36.103449] kasan_save_track+0x20/0x40 [ 36.103549] kasan_save_alloc_info+0x40/0x58 [ 36.103674] __kasan_kmalloc+0xd4/0xd8 [ 36.103773] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.103883] kasan_atomics+0xb8/0x2e0 [ 36.104019] kunit_try_run_case+0x170/0x3f0 [ 36.104166] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.104286] kthread+0x328/0x630 [ 36.104399] ret_from_fork+0x10/0x20 [ 36.104492] [ 36.104554] The buggy address belongs to the object at fff00000c768c580 [ 36.104554] which belongs to the cache kmalloc-64 of size 64 [ 36.104702] The buggy address is located 0 bytes to the right of [ 36.104702] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 36.104889] [ 36.104943] The buggy address belongs to the physical page: [ 36.105042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 36.105186] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.105329] page_type: f5(slab) [ 36.105429] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.105577] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.105713] page dumped because: kasan: bad access detected [ 36.105800] [ 36.105855] Memory state around the buggy address: [ 36.105946] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.106083] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.106195] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.106288] ^ [ 36.106382] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.106523] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.106692] ================================================================== [ 36.061475] ================================================================== [ 36.061646] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 36.061793] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 36.062150] [ 36.062262] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 36.062474] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.062543] Hardware name: linux,dummy-virt (DT) [ 36.062641] Call trace: [ 36.062741] show_stack+0x20/0x38 (C) [ 36.062984] dump_stack_lvl+0x8c/0xd0 [ 36.063160] print_report+0x118/0x608 [ 36.063330] kasan_report+0xdc/0x128 [ 36.063522] kasan_check_range+0x100/0x1a8 [ 36.063835] __kasan_check_write+0x20/0x30 [ 36.064007] kasan_atomics_helper+0x1384/0x4858 [ 36.064134] kasan_atomics+0x198/0x2e0 [ 36.064258] kunit_try_run_case+0x170/0x3f0 [ 36.064449] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.064605] kthread+0x328/0x630 [ 36.064740] ret_from_fork+0x10/0x20 [ 36.064921] [ 36.065001] Allocated by task 276: [ 36.065116] kasan_save_stack+0x3c/0x68 [ 36.065269] kasan_save_track+0x20/0x40 [ 36.065353] kasan_save_alloc_info+0x40/0x58 [ 36.065434] __kasan_kmalloc+0xd4/0xd8 [ 36.065725] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.065861] kasan_atomics+0xb8/0x2e0 [ 36.065967] kunit_try_run_case+0x170/0x3f0 [ 36.066077] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.066199] kthread+0x328/0x630 [ 36.066335] ret_from_fork+0x10/0x20 [ 36.066476] [ 36.066567] The buggy address belongs to the object at fff00000c768c580 [ 36.066567] which belongs to the cache kmalloc-64 of size 64 [ 36.066797] The buggy address is located 0 bytes to the right of [ 36.066797] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 36.066989] [ 36.067081] The buggy address belongs to the physical page: [ 36.067181] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 36.067330] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.067481] page_type: f5(slab) [ 36.067589] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.067720] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.067939] page dumped because: kasan: bad access detected [ 36.068100] [ 36.068150] Memory state around the buggy address: [ 36.068239] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.068369] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.068499] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.068625] ^ [ 36.068716] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.068814] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.068892] ================================================================== [ 36.107477] ================================================================== [ 36.107574] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 36.107683] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 36.107747] [ 36.107799] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 36.107905] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.107937] Hardware name: linux,dummy-virt (DT) [ 36.107980] Call trace: [ 36.108011] show_stack+0x20/0x38 (C) [ 36.108073] dump_stack_lvl+0x8c/0xd0 [ 36.108126] print_report+0x118/0x608 [ 36.108183] kasan_report+0xdc/0x128 [ 36.108236] kasan_check_range+0x100/0x1a8 [ 36.108291] __kasan_check_write+0x20/0x30 [ 36.108344] kasan_atomics_helper+0x15b4/0x4858 [ 36.108401] kasan_atomics+0x198/0x2e0 [ 36.108455] kunit_try_run_case+0x170/0x3f0 [ 36.108512] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.108575] kthread+0x328/0x630 [ 36.108717] ret_from_fork+0x10/0x20 [ 36.108895] [ 36.108957] Allocated by task 276: [ 36.109051] kasan_save_stack+0x3c/0x68 [ 36.109146] kasan_save_track+0x20/0x40 [ 36.109217] kasan_save_alloc_info+0x40/0x58 [ 36.109293] __kasan_kmalloc+0xd4/0xd8 [ 36.109368] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.109463] kasan_atomics+0xb8/0x2e0 [ 36.109558] kunit_try_run_case+0x170/0x3f0 [ 36.109673] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.109778] kthread+0x328/0x630 [ 36.109871] ret_from_fork+0x10/0x20 [ 36.109969] [ 36.110028] The buggy address belongs to the object at fff00000c768c580 [ 36.110028] which belongs to the cache kmalloc-64 of size 64 [ 36.110188] The buggy address is located 0 bytes to the right of [ 36.110188] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 36.110362] [ 36.110420] The buggy address belongs to the physical page: [ 36.111570] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 36.111737] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.111882] page_type: f5(slab) [ 36.111995] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.112127] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.112236] page dumped because: kasan: bad access detected [ 36.112361] [ 36.112412] Memory state around the buggy address: [ 36.112544] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.112863] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.113000] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.113438] ^ [ 36.113590] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.113800] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.114016] ================================================================== [ 35.911630] ================================================================== [ 35.911783] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 35.911925] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 35.912055] [ 35.912152] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 35.912380] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.912457] Hardware name: linux,dummy-virt (DT) [ 35.912540] Call trace: [ 35.912603] show_stack+0x20/0x38 (C) [ 35.912783] dump_stack_lvl+0x8c/0xd0 [ 35.912913] print_report+0x118/0x608 [ 35.913032] kasan_report+0xdc/0x128 [ 35.913158] kasan_check_range+0x100/0x1a8 [ 35.913287] __kasan_check_write+0x20/0x30 [ 35.913407] kasan_atomics_helper+0xeb8/0x4858 [ 35.913533] kasan_atomics+0x198/0x2e0 [ 35.913673] kunit_try_run_case+0x170/0x3f0 [ 35.913787] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.914053] kthread+0x328/0x630 [ 35.914177] ret_from_fork+0x10/0x20 [ 35.914288] [ 35.914346] Allocated by task 276: [ 35.914517] kasan_save_stack+0x3c/0x68 [ 35.914928] kasan_save_track+0x20/0x40 [ 35.916532] kasan_save_alloc_info+0x40/0x58 [ 35.916594] __kasan_kmalloc+0xd4/0xd8 [ 35.916672] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.916745] kasan_atomics+0xb8/0x2e0 [ 35.916790] kunit_try_run_case+0x170/0x3f0 [ 35.916839] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.916893] kthread+0x328/0x630 [ 35.916933] ret_from_fork+0x10/0x20 [ 35.916986] [ 35.917015] The buggy address belongs to the object at fff00000c768c580 [ 35.917015] which belongs to the cache kmalloc-64 of size 64 [ 35.917090] The buggy address is located 0 bytes to the right of [ 35.917090] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 35.917165] [ 35.917193] The buggy address belongs to the physical page: [ 35.917236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 35.917303] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.917369] page_type: f5(slab) [ 35.917423] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.917484] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.917536] page dumped because: kasan: bad access detected [ 35.917576] [ 35.917599] Memory state around the buggy address: [ 35.917717] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.917822] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.917940] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.918053] ^ [ 35.918121] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.918177] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.918226] ================================================================== [ 36.137606] ================================================================== [ 36.137749] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 36.137878] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 36.138011] [ 36.138105] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 36.138335] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.138405] Hardware name: linux,dummy-virt (DT) [ 36.138494] Call trace: [ 36.139125] show_stack+0x20/0x38 (C) [ 36.139471] dump_stack_lvl+0x8c/0xd0 [ 36.139798] print_report+0x118/0x608 [ 36.140117] kasan_report+0xdc/0x128 [ 36.140495] kasan_check_range+0x100/0x1a8 [ 36.140637] __kasan_check_write+0x20/0x30 [ 36.141168] kasan_atomics_helper+0x16d0/0x4858 [ 36.141307] kasan_atomics+0x198/0x2e0 [ 36.141780] kunit_try_run_case+0x170/0x3f0 [ 36.141911] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.142119] kthread+0x328/0x630 [ 36.142244] ret_from_fork+0x10/0x20 [ 36.142508] [ 36.142605] Allocated by task 276: [ 36.142812] kasan_save_stack+0x3c/0x68 [ 36.143195] kasan_save_track+0x20/0x40 [ 36.143354] kasan_save_alloc_info+0x40/0x58 [ 36.143681] __kasan_kmalloc+0xd4/0xd8 [ 36.143798] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.143983] kasan_atomics+0xb8/0x2e0 [ 36.144187] kunit_try_run_case+0x170/0x3f0 [ 36.144513] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.144843] kthread+0x328/0x630 [ 36.144953] ret_from_fork+0x10/0x20 [ 36.145158] [ 36.145229] The buggy address belongs to the object at fff00000c768c580 [ 36.145229] which belongs to the cache kmalloc-64 of size 64 [ 36.145355] The buggy address is located 0 bytes to the right of [ 36.145355] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 36.145740] [ 36.145806] The buggy address belongs to the physical page: [ 36.145951] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 36.146175] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.146452] page_type: f5(slab) [ 36.146564] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.146714] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.146830] page dumped because: kasan: bad access detected [ 36.146918] [ 36.147282] Memory state around the buggy address: [ 36.147381] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.147606] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.147867] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.148439] ^ [ 36.148556] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.148696] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.148809] ================================================================== [ 36.052006] ================================================================== [ 36.052091] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 36.052174] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 36.052236] [ 36.052290] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 36.052540] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.052633] Hardware name: linux,dummy-virt (DT) [ 36.052729] Call trace: [ 36.052790] show_stack+0x20/0x38 (C) [ 36.052859] dump_stack_lvl+0x8c/0xd0 [ 36.052919] print_report+0x118/0x608 [ 36.052975] kasan_report+0xdc/0x128 [ 36.053031] kasan_check_range+0x100/0x1a8 [ 36.053088] __kasan_check_write+0x20/0x30 [ 36.053140] kasan_atomics_helper+0x12d8/0x4858 [ 36.053197] kasan_atomics+0x198/0x2e0 [ 36.053251] kunit_try_run_case+0x170/0x3f0 [ 36.053309] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.053371] kthread+0x328/0x630 [ 36.053422] ret_from_fork+0x10/0x20 [ 36.053482] [ 36.053508] Allocated by task 276: [ 36.053547] kasan_save_stack+0x3c/0x68 [ 36.053601] kasan_save_track+0x20/0x40 [ 36.053865] kasan_save_alloc_info+0x40/0x58 [ 36.054171] __kasan_kmalloc+0xd4/0xd8 [ 36.054507] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.054733] kasan_atomics+0xb8/0x2e0 [ 36.054817] kunit_try_run_case+0x170/0x3f0 [ 36.054895] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.054995] kthread+0x328/0x630 [ 36.055081] ret_from_fork+0x10/0x20 [ 36.055180] [ 36.055236] The buggy address belongs to the object at fff00000c768c580 [ 36.055236] which belongs to the cache kmalloc-64 of size 64 [ 36.055699] The buggy address is located 0 bytes to the right of [ 36.055699] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 36.055908] [ 36.056600] The buggy address belongs to the physical page: [ 36.056731] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 36.056971] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.057672] page_type: f5(slab) [ 36.057802] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.058025] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.058267] page dumped because: kasan: bad access detected [ 36.058392] [ 36.058450] Memory state around the buggy address: [ 36.058877] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.059017] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.059140] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.059249] ^ [ 36.059346] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.059483] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.059594] ================================================================== [ 36.077360] ================================================================== [ 36.077451] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 36.077545] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 36.077627] [ 36.077720] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 36.077944] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.078071] Hardware name: linux,dummy-virt (DT) [ 36.078162] Call trace: [ 36.078231] show_stack+0x20/0x38 (C) [ 36.078355] dump_stack_lvl+0x8c/0xd0 [ 36.078474] print_report+0x118/0x608 [ 36.078591] kasan_report+0xdc/0x128 [ 36.078730] kasan_check_range+0x100/0x1a8 [ 36.078831] __kasan_check_write+0x20/0x30 [ 36.078916] kasan_atomics_helper+0x1414/0x4858 [ 36.079018] kasan_atomics+0x198/0x2e0 [ 36.079132] kunit_try_run_case+0x170/0x3f0 [ 36.079537] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.079763] kthread+0x328/0x630 [ 36.080154] ret_from_fork+0x10/0x20 [ 36.080289] [ 36.080341] Allocated by task 276: [ 36.080421] kasan_save_stack+0x3c/0x68 [ 36.080531] kasan_save_track+0x20/0x40 [ 36.080640] kasan_save_alloc_info+0x40/0x58 [ 36.080752] __kasan_kmalloc+0xd4/0xd8 [ 36.080845] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.080948] kasan_atomics+0xb8/0x2e0 [ 36.081047] kunit_try_run_case+0x170/0x3f0 [ 36.081150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.081268] kthread+0x328/0x630 [ 36.081356] ret_from_fork+0x10/0x20 [ 36.081450] [ 36.081508] The buggy address belongs to the object at fff00000c768c580 [ 36.081508] which belongs to the cache kmalloc-64 of size 64 [ 36.082634] The buggy address is located 0 bytes to the right of [ 36.082634] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 36.082850] [ 36.083743] The buggy address belongs to the physical page: [ 36.083862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 36.084511] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.084924] page_type: f5(slab) [ 36.085030] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.085109] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.085165] page dumped because: kasan: bad access detected [ 36.085212] [ 36.085253] Memory state around the buggy address: [ 36.085308] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.085363] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.085415] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.085462] ^ [ 36.085506] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.085558] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.085605] ================================================================== [ 36.130226] ================================================================== [ 36.130406] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 36.130531] Read of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 36.130663] [ 36.130792] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 36.131038] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.131113] Hardware name: linux,dummy-virt (DT) [ 36.131188] Call trace: [ 36.131243] show_stack+0x20/0x38 (C) [ 36.131374] dump_stack_lvl+0x8c/0xd0 [ 36.131510] print_report+0x118/0x608 [ 36.131679] kasan_report+0xdc/0x128 [ 36.131838] __asan_report_load8_noabort+0x20/0x30 [ 36.131996] kasan_atomics_helper+0x3df4/0x4858 [ 36.132153] kasan_atomics+0x198/0x2e0 [ 36.132285] kunit_try_run_case+0x170/0x3f0 [ 36.132467] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.132596] kthread+0x328/0x630 [ 36.132716] ret_from_fork+0x10/0x20 [ 36.132901] [ 36.132972] Allocated by task 276: [ 36.133056] kasan_save_stack+0x3c/0x68 [ 36.133196] kasan_save_track+0x20/0x40 [ 36.133302] kasan_save_alloc_info+0x40/0x58 [ 36.133415] __kasan_kmalloc+0xd4/0xd8 [ 36.133549] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.133676] kasan_atomics+0xb8/0x2e0 [ 36.133769] kunit_try_run_case+0x170/0x3f0 [ 36.133879] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.133990] kthread+0x328/0x630 [ 36.134072] ret_from_fork+0x10/0x20 [ 36.134152] [ 36.134198] The buggy address belongs to the object at fff00000c768c580 [ 36.134198] which belongs to the cache kmalloc-64 of size 64 [ 36.134355] The buggy address is located 0 bytes to the right of [ 36.134355] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 36.134529] [ 36.134581] The buggy address belongs to the physical page: [ 36.134687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 36.134873] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.135028] page_type: f5(slab) [ 36.135183] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.135323] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.135450] page dumped because: kasan: bad access detected [ 36.135540] [ 36.135598] Memory state around the buggy address: [ 36.135736] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.135867] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.135995] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.136144] ^ [ 36.136274] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.136423] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.136529] ================================================================== [ 35.689979] ================================================================== [ 35.690060] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 35.690136] Read of size 4 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 35.690199] [ 35.690247] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 35.690353] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.690389] Hardware name: linux,dummy-virt (DT) [ 35.690430] Call trace: [ 35.690462] show_stack+0x20/0x38 (C) [ 35.690525] dump_stack_lvl+0x8c/0xd0 [ 35.690581] print_report+0x118/0x608 [ 35.690890] kasan_report+0xdc/0x128 [ 35.691252] __asan_report_load4_noabort+0x20/0x30 [ 35.691365] kasan_atomics_helper+0x42d8/0x4858 [ 35.691528] kasan_atomics+0x198/0x2e0 [ 35.692267] kunit_try_run_case+0x170/0x3f0 [ 35.692693] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.693021] kthread+0x328/0x630 [ 35.693234] ret_from_fork+0x10/0x20 [ 35.693539] [ 35.693633] Allocated by task 276: [ 35.693714] kasan_save_stack+0x3c/0x68 [ 35.693808] kasan_save_track+0x20/0x40 [ 35.693907] kasan_save_alloc_info+0x40/0x58 [ 35.694010] __kasan_kmalloc+0xd4/0xd8 [ 35.694308] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.694425] kasan_atomics+0xb8/0x2e0 [ 35.694549] kunit_try_run_case+0x170/0x3f0 [ 35.694834] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.694966] kthread+0x328/0x630 [ 35.695060] ret_from_fork+0x10/0x20 [ 35.695158] [ 35.695213] The buggy address belongs to the object at fff00000c768c580 [ 35.695213] which belongs to the cache kmalloc-64 of size 64 [ 35.695402] The buggy address is located 0 bytes to the right of [ 35.695402] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 35.695600] [ 35.695671] The buggy address belongs to the physical page: [ 35.695760] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 35.695961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.696105] page_type: f5(slab) [ 35.696208] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.696336] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.696664] page dumped because: kasan: bad access detected [ 35.696846] [ 35.696906] Memory state around the buggy address: [ 35.697380] ^ [ 35.700717] print_report+0x118/0x608 [ 35.703559] __kasan_kmalloc+0xd4/0xd8 [ 35.703657] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.703743] kasan_atomics+0xb8/0x2e0 [ 35.703823] kunit_try_run_case+0x170/0x3f0 [ 35.703917] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.704033] kthread+0x328/0x630 [ 35.704124] ret_from_fork+0x10/0x20 [ 35.704222] [ 35.704276] The buggy address belongs to the object at fff00000c768c580 [ 35.704276] which belongs to the cache kmalloc-64 of size 64 [ 35.705037] The buggy address is located 0 bytes to the right of [ 35.705037] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 35.705448] [ 35.705737] The buggy address belongs to the physical page: [ 35.705862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 35.706110] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.706312] page_type: f5(slab) [ 35.706460] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.706604] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.707107] page dumped because: kasan: bad access detected [ 35.708004] [ 35.708150] Memory state around the buggy address: [ 35.708256] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.708376] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.708503] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.709216] ^ [ 35.709640] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.709852] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.709968] ================================================================== [ 36.041591] ================================================================== [ 36.041752] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 36.041888] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 36.041995] [ 36.042089] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 36.042467] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.042803] Hardware name: linux,dummy-virt (DT) [ 36.042899] Call trace: [ 36.042971] show_stack+0x20/0x38 (C) [ 36.043109] dump_stack_lvl+0x8c/0xd0 [ 36.043230] print_report+0x118/0x608 [ 36.043348] kasan_report+0xdc/0x128 [ 36.043483] kasan_check_range+0x100/0x1a8 [ 36.043618] __kasan_check_write+0x20/0x30 [ 36.043722] kasan_atomics_helper+0x126c/0x4858 [ 36.043837] kasan_atomics+0x198/0x2e0 [ 36.043956] kunit_try_run_case+0x170/0x3f0 [ 36.044069] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.044202] kthread+0x328/0x630 [ 36.044380] ret_from_fork+0x10/0x20 [ 36.044497] [ 36.044556] Allocated by task 276: [ 36.044670] kasan_save_stack+0x3c/0x68 [ 36.044786] kasan_save_track+0x20/0x40 [ 36.044871] kasan_save_alloc_info+0x40/0x58 [ 36.045253] __kasan_kmalloc+0xd4/0xd8 [ 36.045377] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.045928] kasan_atomics+0xb8/0x2e0 [ 36.046071] kunit_try_run_case+0x170/0x3f0 [ 36.046168] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.046255] kthread+0x328/0x630 [ 36.046317] ret_from_fork+0x10/0x20 [ 36.046422] [ 36.046475] The buggy address belongs to the object at fff00000c768c580 [ 36.046475] which belongs to the cache kmalloc-64 of size 64 [ 36.046633] The buggy address is located 0 bytes to the right of [ 36.046633] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 36.046788] [ 36.046847] The buggy address belongs to the physical page: [ 36.046925] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 36.047064] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.047219] page_type: f5(slab) [ 36.047676] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.048017] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.048356] page dumped because: kasan: bad access detected [ 36.048452] [ 36.048507] Memory state around the buggy address: [ 36.048595] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.048712] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.048783] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.048831] ^ [ 36.048876] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.048929] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.048976] ================================================================== [ 35.829134] ================================================================== [ 35.829269] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 35.829959] Read of size 4 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 35.830126] [ 35.830227] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 35.830462] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.830537] Hardware name: linux,dummy-virt (DT) [ 35.830637] Call trace: [ 35.831637] show_stack+0x20/0x38 (C) [ 35.831824] dump_stack_lvl+0x8c/0xd0 [ 35.832332] print_report+0x118/0x608 [ 35.832507] kasan_report+0xdc/0x128 [ 35.832634] __asan_report_load4_noabort+0x20/0x30 [ 35.832739] kasan_atomics_helper+0x3e04/0x4858 [ 35.832860] kasan_atomics+0x198/0x2e0 [ 35.832976] kunit_try_run_case+0x170/0x3f0 [ 35.833117] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.834308] kthread+0x328/0x630 [ 35.834820] ret_from_fork+0x10/0x20 [ 35.834977] [ 35.835202] Allocated by task 276: [ 35.835601] kasan_save_stack+0x3c/0x68 [ 35.836108] kasan_save_track+0x20/0x40 [ 35.836276] kasan_save_alloc_info+0x40/0x58 [ 35.836386] __kasan_kmalloc+0xd4/0xd8 [ 35.836465] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.836545] kasan_atomics+0xb8/0x2e0 [ 35.836641] kunit_try_run_case+0x170/0x3f0 [ 35.836749] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.836872] kthread+0x328/0x630 [ 35.836962] ret_from_fork+0x10/0x20 [ 35.838004] [ 35.838288] The buggy address belongs to the object at fff00000c768c580 [ 35.838288] which belongs to the cache kmalloc-64 of size 64 [ 35.838654] The buggy address is located 0 bytes to the right of [ 35.838654] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 35.838846] [ 35.838907] The buggy address belongs to the physical page: [ 35.839370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 35.839627] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.839826] page_type: f5(slab) [ 35.839937] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.840086] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.840208] page dumped because: kasan: bad access detected [ 35.840297] [ 35.840719] Memory state around the buggy address: [ 35.840838] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.841104] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.841890] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.842111] ^ [ 35.842563] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.842718] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.842833] ================================================================== [ 36.069504] ================================================================== [ 36.069643] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 36.069780] Read of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 36.069918] [ 36.070009] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 36.070232] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.070310] Hardware name: linux,dummy-virt (DT) [ 36.070403] Call trace: [ 36.070466] show_stack+0x20/0x38 (C) [ 36.070598] dump_stack_lvl+0x8c/0xd0 [ 36.070734] print_report+0x118/0x608 [ 36.070893] kasan_report+0xdc/0x128 [ 36.071009] __asan_report_load8_noabort+0x20/0x30 [ 36.071136] kasan_atomics_helper+0x3f04/0x4858 [ 36.071406] kasan_atomics+0x198/0x2e0 [ 36.071914] kunit_try_run_case+0x170/0x3f0 [ 36.072078] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.072214] kthread+0x328/0x630 [ 36.072375] ret_from_fork+0x10/0x20 [ 36.072603] [ 36.072725] Allocated by task 276: [ 36.072840] kasan_save_stack+0x3c/0x68 [ 36.072956] kasan_save_track+0x20/0x40 [ 36.073059] kasan_save_alloc_info+0x40/0x58 [ 36.073167] __kasan_kmalloc+0xd4/0xd8 [ 36.073264] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.073350] kasan_atomics+0xb8/0x2e0 [ 36.073417] kunit_try_run_case+0x170/0x3f0 [ 36.073524] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.073654] kthread+0x328/0x630 [ 36.073737] ret_from_fork+0x10/0x20 [ 36.073830] [ 36.073973] The buggy address belongs to the object at fff00000c768c580 [ 36.073973] which belongs to the cache kmalloc-64 of size 64 [ 36.074170] The buggy address is located 0 bytes to the right of [ 36.074170] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 36.074333] [ 36.074399] The buggy address belongs to the physical page: [ 36.074482] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 36.074749] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.074933] page_type: f5(slab) [ 36.075069] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.075213] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.075344] page dumped because: kasan: bad access detected [ 36.075442] [ 36.075606] Memory state around the buggy address: [ 36.075733] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.075855] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.076027] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.076183] ^ [ 36.076349] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.076472] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.076575] ================================================================== [ 35.750655] ================================================================== [ 35.750786] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 35.750946] Read of size 4 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 35.751279] [ 35.751384] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 35.751647] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.751727] Hardware name: linux,dummy-virt (DT) [ 35.751816] Call trace: [ 35.751873] show_stack+0x20/0x38 (C) [ 35.751974] dump_stack_lvl+0x8c/0xd0 [ 35.752066] print_report+0x118/0x608 [ 35.752169] kasan_report+0xdc/0x128 [ 35.752275] __asan_report_load4_noabort+0x20/0x30 [ 35.752399] kasan_atomics_helper+0x3dcc/0x4858 [ 35.752520] kasan_atomics+0x198/0x2e0 [ 35.752661] kunit_try_run_case+0x170/0x3f0 [ 35.752788] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.752922] kthread+0x328/0x630 [ 35.753037] ret_from_fork+0x10/0x20 [ 35.753167] [ 35.753221] Allocated by task 276: [ 35.753315] kasan_save_stack+0x3c/0x68 [ 35.753447] kasan_save_track+0x20/0x40 [ 35.753550] kasan_save_alloc_info+0x40/0x58 [ 35.753653] __kasan_kmalloc+0xd4/0xd8 [ 35.753734] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.753816] kasan_atomics+0xb8/0x2e0 [ 35.753894] kunit_try_run_case+0x170/0x3f0 [ 35.753986] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.754110] kthread+0x328/0x630 [ 35.754344] ret_from_fork+0x10/0x20 [ 35.754430] [ 35.754478] The buggy address belongs to the object at fff00000c768c580 [ 35.754478] which belongs to the cache kmalloc-64 of size 64 [ 35.754638] The buggy address is located 0 bytes to the right of [ 35.754638] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 35.754793] [ 35.754846] The buggy address belongs to the physical page: [ 35.754913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 35.755346] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.755525] page_type: f5(slab) [ 35.755633] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.755774] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.756221] page dumped because: kasan: bad access detected [ 35.756545] [ 35.756599] Memory state around the buggy address: [ 35.756700] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.756927] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.757073] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.757185] ^ [ 35.757377] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.757511] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.757605] ================================================================== [ 35.967035] ================================================================== [ 35.967445] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 35.967593] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 35.968178] [ 35.968688] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 35.969163] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.969357] Hardware name: linux,dummy-virt (DT) [ 35.969559] Call trace: [ 35.969627] show_stack+0x20/0x38 (C) [ 35.969975] dump_stack_lvl+0x8c/0xd0 [ 35.970105] print_report+0x118/0x608 [ 35.970471] kasan_report+0xdc/0x128 [ 35.970664] kasan_check_range+0x100/0x1a8 [ 35.971246] __kasan_check_write+0x20/0x30 [ 35.971762] kasan_atomics_helper+0x10c0/0x4858 [ 35.972208] kasan_atomics+0x198/0x2e0 [ 35.972346] kunit_try_run_case+0x170/0x3f0 [ 35.972762] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.973645] kthread+0x328/0x630 [ 35.973813] ret_from_fork+0x10/0x20 [ 35.974260] [ 35.974365] Allocated by task 276: [ 35.974786] kasan_save_stack+0x3c/0x68 [ 35.975014] kasan_save_track+0x20/0x40 [ 35.975117] kasan_save_alloc_info+0x40/0x58 [ 35.975867] __kasan_kmalloc+0xd4/0xd8 [ 35.976185] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.976295] kasan_atomics+0xb8/0x2e0 [ 35.976390] kunit_try_run_case+0x170/0x3f0 [ 35.976797] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.977470] kthread+0x328/0x630 [ 35.977587] ret_from_fork+0x10/0x20 [ 35.977700] [ 35.977885] The buggy address belongs to the object at fff00000c768c580 [ 35.977885] which belongs to the cache kmalloc-64 of size 64 [ 35.978551] The buggy address is located 0 bytes to the right of [ 35.978551] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 35.979220] [ 35.979312] The buggy address belongs to the physical page: [ 35.979669] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 35.979843] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.979978] page_type: f5(slab) [ 35.980102] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.980247] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.981336] page dumped because: kasan: bad access detected [ 35.981795] [ 35.982008] Memory state around the buggy address: [ 35.982132] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.982269] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.982588] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.983295] ^ [ 35.983452] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.983675] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.984359] ================================================================== [ 35.926582] ================================================================== [ 35.926719] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 35.926841] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 35.926973] [ 35.927064] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 35.927289] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.927362] Hardware name: linux,dummy-virt (DT) [ 35.927464] Call trace: [ 35.927529] show_stack+0x20/0x38 (C) [ 35.927654] dump_stack_lvl+0x8c/0xd0 [ 35.927748] print_report+0x118/0x608 [ 35.927859] kasan_report+0xdc/0x128 [ 35.927975] kasan_check_range+0x100/0x1a8 [ 35.928131] __kasan_check_write+0x20/0x30 [ 35.928244] kasan_atomics_helper+0xf88/0x4858 [ 35.928371] kasan_atomics+0x198/0x2e0 [ 35.928482] kunit_try_run_case+0x170/0x3f0 [ 35.928624] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.928795] kthread+0x328/0x630 [ 35.928907] ret_from_fork+0x10/0x20 [ 35.929069] [ 35.929124] Allocated by task 276: [ 35.929253] kasan_save_stack+0x3c/0x68 [ 35.929365] kasan_save_track+0x20/0x40 [ 35.929710] kasan_save_alloc_info+0x40/0x58 [ 35.929838] __kasan_kmalloc+0xd4/0xd8 [ 35.929960] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.930120] kasan_atomics+0xb8/0x2e0 [ 35.930369] kunit_try_run_case+0x170/0x3f0 [ 35.930667] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.930789] kthread+0x328/0x630 [ 35.930886] ret_from_fork+0x10/0x20 [ 35.930978] [ 35.931167] The buggy address belongs to the object at fff00000c768c580 [ 35.931167] which belongs to the cache kmalloc-64 of size 64 [ 35.931557] The buggy address is located 0 bytes to the right of [ 35.931557] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 35.932007] [ 35.932269] The buggy address belongs to the physical page: [ 35.932385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 35.932753] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.933157] page_type: f5(slab) [ 35.933356] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.933795] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.933992] page dumped because: kasan: bad access detected [ 35.934325] [ 35.934387] Memory state around the buggy address: [ 35.934507] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.934642] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.934764] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.935155] ^ [ 35.935656] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.935960] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.936141] ================================================================== [ 35.743879] ================================================================== [ 35.744433] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 35.744575] Write of size 4 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 35.744691] [ 35.744782] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 35.745022] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.745099] Hardware name: linux,dummy-virt (DT) [ 35.745189] Call trace: [ 35.745256] show_stack+0x20/0x38 (C) [ 35.747664] dump_stack_lvl+0x8c/0xd0 [ 35.747789] print_report+0x118/0x608 [ 35.747853] kasan_report+0xdc/0x128 [ 35.747947] kasan_check_range+0x100/0x1a8 [ 35.748021] __kasan_check_write+0x20/0x30 [ 35.748077] kasan_atomics_helper+0xad4/0x4858 [ 35.748136] kasan_atomics+0x198/0x2e0 [ 35.748190] kunit_try_run_case+0x170/0x3f0 [ 35.748250] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.748366] kthread+0x328/0x630 [ 35.748478] ret_from_fork+0x10/0x20 [ 35.748601] [ 35.748668] Allocated by task 276: [ 35.748716] kasan_save_stack+0x3c/0x68 [ 35.748776] kasan_save_track+0x20/0x40 [ 35.748821] kasan_save_alloc_info+0x40/0x58 [ 35.748868] __kasan_kmalloc+0xd4/0xd8 [ 35.748914] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.748961] kasan_atomics+0xb8/0x2e0 [ 35.749005] kunit_try_run_case+0x170/0x3f0 [ 35.749050] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.749102] kthread+0x328/0x630 [ 35.749143] ret_from_fork+0x10/0x20 [ 35.749187] [ 35.749213] The buggy address belongs to the object at fff00000c768c580 [ 35.749213] which belongs to the cache kmalloc-64 of size 64 [ 35.749284] The buggy address is located 0 bytes to the right of [ 35.749284] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 35.749360] [ 35.749389] The buggy address belongs to the physical page: [ 35.749431] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 35.749497] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.749564] page_type: f5(slab) [ 35.749638] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.749704] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.749754] page dumped because: kasan: bad access detected [ 35.749796] [ 35.749819] Memory state around the buggy address: [ 35.749863] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.749916] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.749968] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.750015] ^ [ 35.750058] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.750107] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.750154] ================================================================== [ 36.166143] ================================================================== [ 36.166464] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 36.166992] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 36.167230] [ 36.167430] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 36.167751] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.168087] Hardware name: linux,dummy-virt (DT) [ 36.168409] Call trace: [ 36.168537] show_stack+0x20/0x38 (C) [ 36.168850] dump_stack_lvl+0x8c/0xd0 [ 36.168980] print_report+0x118/0x608 [ 36.169149] kasan_report+0xdc/0x128 [ 36.169517] kasan_check_range+0x100/0x1a8 [ 36.170238] __kasan_check_write+0x20/0x30 [ 36.170406] kasan_atomics_helper+0x175c/0x4858 [ 36.170542] kasan_atomics+0x198/0x2e0 [ 36.170682] kunit_try_run_case+0x170/0x3f0 [ 36.170997] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.171322] kthread+0x328/0x630 [ 36.171446] ret_from_fork+0x10/0x20 [ 36.172095] [ 36.172357] Allocated by task 276: [ 36.172440] kasan_save_stack+0x3c/0x68 [ 36.172786] kasan_save_track+0x20/0x40 [ 36.173103] kasan_save_alloc_info+0x40/0x58 [ 36.173294] __kasan_kmalloc+0xd4/0xd8 [ 36.173371] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.173494] kasan_atomics+0xb8/0x2e0 [ 36.173587] kunit_try_run_case+0x170/0x3f0 [ 36.173699] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.173979] kthread+0x328/0x630 [ 36.174517] ret_from_fork+0x10/0x20 [ 36.174822] [ 36.174973] The buggy address belongs to the object at fff00000c768c580 [ 36.174973] which belongs to the cache kmalloc-64 of size 64 [ 36.175163] The buggy address is located 0 bytes to the right of [ 36.175163] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 36.176288] [ 36.176367] The buggy address belongs to the physical page: [ 36.176454] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 36.176565] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.176661] page_type: f5(slab) [ 36.176720] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.176782] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.176831] page dumped because: kasan: bad access detected [ 36.176873] [ 36.176897] Memory state around the buggy address: [ 36.176940] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.176994] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.177047] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.177094] ^ [ 36.177137] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.177188] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.177236] ================================================================== [ 35.710861] ================================================================== [ 35.710941] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 35.711026] Write of size 4 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 35.711085] [ 35.711137] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 35.711244] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.711277] Hardware name: linux,dummy-virt (DT) [ 35.711319] Call trace: [ 35.711351] show_stack+0x20/0x38 (C) [ 35.711413] dump_stack_lvl+0x8c/0xd0 [ 35.711494] print_report+0x118/0x608 [ 35.711553] kasan_report+0xdc/0x128 [ 35.711624] kasan_check_range+0x100/0x1a8 [ 35.711725] __kasan_check_write+0x20/0x30 [ 35.711836] kasan_atomics_helper+0x99c/0x4858 [ 35.711923] kasan_atomics+0x198/0x2e0 [ 35.711981] kunit_try_run_case+0x170/0x3f0 [ 35.712054] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.712145] kthread+0x328/0x630 [ 35.712198] ret_from_fork+0x10/0x20 [ 35.712258] [ 35.712286] Allocated by task 276: [ 35.714719] kasan_save_stack+0x3c/0x68 [ 35.714856] kasan_save_track+0x20/0x40 [ 35.714958] kasan_save_alloc_info+0x40/0x58 [ 35.715076] __kasan_kmalloc+0xd4/0xd8 [ 35.715171] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.715262] kasan_atomics+0xb8/0x2e0 [ 35.715308] kunit_try_run_case+0x170/0x3f0 [ 35.715358] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.715445] kthread+0x328/0x630 [ 35.715518] ret_from_fork+0x10/0x20 [ 35.715562] [ 35.715591] The buggy address belongs to the object at fff00000c768c580 [ 35.715591] which belongs to the cache kmalloc-64 of size 64 [ 35.715746] The buggy address is located 0 bytes to the right of [ 35.715746] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 35.715925] [ 35.715982] The buggy address belongs to the physical page: [ 35.716074] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 35.716204] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.716345] page_type: f5(slab) [ 35.716436] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.716606] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.716811] page dumped because: kasan: bad access detected [ 35.716958] [ 35.717098] Memory state around the buggy address: [ 35.717190] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.717309] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.717437] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.717530] ^ [ 35.717633] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.717737] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.717834] ================================================================== [ 35.987305] ================================================================== [ 35.987486] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 35.987997] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 35.988265] [ 35.988839] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 35.989352] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.989618] Hardware name: linux,dummy-virt (DT) [ 35.989783] Call trace: [ 35.990046] show_stack+0x20/0x38 (C) [ 35.990436] dump_stack_lvl+0x8c/0xd0 [ 35.990657] print_report+0x118/0x608 [ 35.991555] kasan_report+0xdc/0x128 [ 35.992258] kasan_check_range+0x100/0x1a8 [ 35.992627] __kasan_check_write+0x20/0x30 [ 35.992739] kasan_atomics_helper+0x1128/0x4858 [ 35.992831] kasan_atomics+0x198/0x2e0 [ 35.993349] kunit_try_run_case+0x170/0x3f0 [ 35.994191] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.994452] kthread+0x328/0x630 [ 35.995107] ret_from_fork+0x10/0x20 [ 35.995574] [ 35.996108] Allocated by task 276: [ 35.996261] kasan_save_stack+0x3c/0x68 [ 35.997065] kasan_save_track+0x20/0x40 [ 35.997466] kasan_save_alloc_info+0x40/0x58 [ 35.997683] __kasan_kmalloc+0xd4/0xd8 [ 35.997994] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.998202] kasan_atomics+0xb8/0x2e0 [ 35.998302] kunit_try_run_case+0x170/0x3f0 [ 35.998409] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.998534] kthread+0x328/0x630 [ 35.999748] ret_from_fork+0x10/0x20 [ 36.000166] [ 36.000758] The buggy address belongs to the object at fff00000c768c580 [ 36.000758] which belongs to the cache kmalloc-64 of size 64 [ 36.000914] The buggy address is located 0 bytes to the right of [ 36.000914] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 36.001083] [ 36.001700] The buggy address belongs to the physical page: [ 36.002151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 36.002807] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.003233] page_type: f5(slab) [ 36.003579] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.004351] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.004689] page dumped because: kasan: bad access detected [ 36.004981] [ 36.005045] Memory state around the buggy address: [ 36.005151] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.005278] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.005805] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.006046] ^ [ 36.006125] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.006216] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.006294] ================================================================== [ 35.807990] ================================================================== [ 35.808120] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 35.808250] Read of size 4 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 35.808386] [ 35.808480] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 35.808725] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.808806] Hardware name: linux,dummy-virt (DT) [ 35.808896] Call trace: [ 35.808959] show_stack+0x20/0x38 (C) [ 35.809090] dump_stack_lvl+0x8c/0xd0 [ 35.809218] print_report+0x118/0x608 [ 35.809338] kasan_report+0xdc/0x128 [ 35.809480] __asan_report_load4_noabort+0x20/0x30 [ 35.809624] kasan_atomics_helper+0x3dd8/0x4858 [ 35.809745] kasan_atomics+0x198/0x2e0 [ 35.809899] kunit_try_run_case+0x170/0x3f0 [ 35.810233] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.810398] kthread+0x328/0x630 [ 35.810518] ret_from_fork+0x10/0x20 [ 35.810661] [ 35.811269] Allocated by task 276: [ 35.811406] kasan_save_stack+0x3c/0x68 [ 35.811528] kasan_save_track+0x20/0x40 [ 35.811816] kasan_save_alloc_info+0x40/0x58 [ 35.811921] __kasan_kmalloc+0xd4/0xd8 [ 35.812027] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.812135] kasan_atomics+0xb8/0x2e0 [ 35.812232] kunit_try_run_case+0x170/0x3f0 [ 35.812367] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.812504] kthread+0x328/0x630 [ 35.812643] ret_from_fork+0x10/0x20 [ 35.812777] [ 35.812855] The buggy address belongs to the object at fff00000c768c580 [ 35.812855] which belongs to the cache kmalloc-64 of size 64 [ 35.813076] The buggy address is located 0 bytes to the right of [ 35.813076] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 35.813324] [ 35.813391] The buggy address belongs to the physical page: [ 35.813482] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 35.813640] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.813783] page_type: f5(slab) [ 35.813909] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.814100] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.814262] page dumped because: kasan: bad access detected [ 35.814369] [ 35.814416] Memory state around the buggy address: [ 35.814665] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.814946] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.815072] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.815676] ^ [ 35.816051] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.816276] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.816380] ================================================================== [ 36.179957] ================================================================== [ 36.180156] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 36.180307] Read of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 36.180445] [ 36.180543] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 36.180767] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.180845] Hardware name: linux,dummy-virt (DT) [ 36.180935] Call trace: [ 36.181003] show_stack+0x20/0x38 (C) [ 36.181145] dump_stack_lvl+0x8c/0xd0 [ 36.181290] print_report+0x118/0x608 [ 36.181417] kasan_report+0xdc/0x128 [ 36.181539] __asan_report_load8_noabort+0x20/0x30 [ 36.182195] kasan_atomics_helper+0x3e20/0x4858 [ 36.182498] kasan_atomics+0x198/0x2e0 [ 36.182623] kunit_try_run_case+0x170/0x3f0 [ 36.182722] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.182825] kthread+0x328/0x630 [ 36.183413] ret_from_fork+0x10/0x20 [ 36.183642] [ 36.183769] Allocated by task 276: [ 36.183859] kasan_save_stack+0x3c/0x68 [ 36.183987] kasan_save_track+0x20/0x40 [ 36.184087] kasan_save_alloc_info+0x40/0x58 [ 36.184379] __kasan_kmalloc+0xd4/0xd8 [ 36.184514] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.184635] kasan_atomics+0xb8/0x2e0 [ 36.184758] kunit_try_run_case+0x170/0x3f0 [ 36.184912] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.185042] kthread+0x328/0x630 [ 36.185156] ret_from_fork+0x10/0x20 [ 36.185259] [ 36.185313] The buggy address belongs to the object at fff00000c768c580 [ 36.185313] which belongs to the cache kmalloc-64 of size 64 [ 36.185481] The buggy address is located 0 bytes to the right of [ 36.185481] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 36.185664] [ 36.185719] The buggy address belongs to the physical page: [ 36.185814] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 36.185958] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.186564] page_type: f5(slab) [ 36.186738] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.186884] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.187001] page dumped because: kasan: bad access detected [ 36.187080] [ 36.187311] Memory state around the buggy address: [ 36.187486] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.187654] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.187781] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.187891] ^ [ 36.188103] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.188194] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.188270] ================================================================== [ 35.844971] ================================================================== [ 35.845103] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 35.845250] Read of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 35.845388] [ 35.845483] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 35.845739] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.845822] Hardware name: linux,dummy-virt (DT) [ 35.845913] Call trace: [ 35.845982] show_stack+0x20/0x38 (C) [ 35.847361] dump_stack_lvl+0x8c/0xd0 [ 35.847778] print_report+0x118/0x608 [ 35.848353] kasan_report+0xdc/0x128 [ 35.848492] kasan_check_range+0x100/0x1a8 [ 35.849125] __kasan_check_read+0x20/0x30 [ 35.849400] kasan_atomics_helper+0xdd4/0x4858 [ 35.850064] kasan_atomics+0x198/0x2e0 [ 35.850217] kunit_try_run_case+0x170/0x3f0 [ 35.850355] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.850946] kthread+0x328/0x630 [ 35.851084] ret_from_fork+0x10/0x20 [ 35.851624] [ 35.851695] Allocated by task 276: [ 35.852110] kasan_save_stack+0x3c/0x68 [ 35.852239] kasan_save_track+0x20/0x40 [ 35.852884] kasan_save_alloc_info+0x40/0x58 [ 35.853270] __kasan_kmalloc+0xd4/0xd8 [ 35.853541] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.853652] kasan_atomics+0xb8/0x2e0 [ 35.853726] kunit_try_run_case+0x170/0x3f0 [ 35.853805] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.853903] kthread+0x328/0x630 [ 35.853988] ret_from_fork+0x10/0x20 [ 35.854955] [ 35.855043] The buggy address belongs to the object at fff00000c768c580 [ 35.855043] which belongs to the cache kmalloc-64 of size 64 [ 35.855228] The buggy address is located 0 bytes to the right of [ 35.855228] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 35.855409] [ 35.855481] The buggy address belongs to the physical page: [ 35.855573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 35.855732] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.855867] page_type: f5(slab) [ 35.855977] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.856190] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.857146] page dumped because: kasan: bad access detected [ 35.857486] [ 35.857539] Memory state around the buggy address: [ 35.857787] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.858032] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.858511] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.858653] ^ [ 35.859159] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.859291] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.859862] ================================================================== [ 35.728447] ================================================================== [ 35.728886] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 35.729036] Write of size 4 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 35.729783] [ 35.730180] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 35.730587] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.731135] Hardware name: linux,dummy-virt (DT) [ 35.731680] Call trace: [ 35.731763] show_stack+0x20/0x38 (C) [ 35.731913] dump_stack_lvl+0x8c/0xd0 [ 35.732040] print_report+0x118/0x608 [ 35.734860] kasan_report+0xdc/0x128 [ 35.734985] kasan_check_range+0x100/0x1a8 [ 35.735120] __kasan_check_write+0x20/0x30 [ 35.735242] kasan_atomics_helper+0xa6c/0x4858 [ 35.735345] kasan_atomics+0x198/0x2e0 [ 35.735403] kunit_try_run_case+0x170/0x3f0 [ 35.735520] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.735584] kthread+0x328/0x630 [ 35.735664] ret_from_fork+0x10/0x20 [ 35.735729] [ 35.735756] Allocated by task 276: [ 35.735796] kasan_save_stack+0x3c/0x68 [ 35.735853] kasan_save_track+0x20/0x40 [ 35.735898] kasan_save_alloc_info+0x40/0x58 [ 35.735947] __kasan_kmalloc+0xd4/0xd8 [ 35.735990] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.736039] kasan_atomics+0xb8/0x2e0 [ 35.736080] kunit_try_run_case+0x170/0x3f0 [ 35.736128] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.736180] kthread+0x328/0x630 [ 35.736218] ret_from_fork+0x10/0x20 [ 35.736261] [ 35.736287] The buggy address belongs to the object at fff00000c768c580 [ 35.736287] which belongs to the cache kmalloc-64 of size 64 [ 35.736385] The buggy address is located 0 bytes to the right of [ 35.736385] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 35.736459] [ 35.736491] The buggy address belongs to the physical page: [ 35.736530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 35.736595] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.736819] page_type: f5(slab) [ 35.737193] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.737458] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.737584] page dumped because: kasan: bad access detected [ 35.737707] [ 35.738024] Memory state around the buggy address: [ 35.738343] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.738890] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.739681] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.739922] ^ [ 35.740270] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.740829] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.741065] ================================================================== [ 35.954092] ================================================================== [ 35.954232] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 35.954796] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 35.955027] [ 35.955405] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 35.955905] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.956060] Hardware name: linux,dummy-virt (DT) [ 35.956302] Call trace: [ 35.956574] show_stack+0x20/0x38 (C) [ 35.956878] dump_stack_lvl+0x8c/0xd0 [ 35.957130] print_report+0x118/0x608 [ 35.957284] kasan_report+0xdc/0x128 [ 35.957377] kasan_check_range+0x100/0x1a8 [ 35.957735] __kasan_check_write+0x20/0x30 [ 35.957948] kasan_atomics_helper+0x1058/0x4858 [ 35.958072] kasan_atomics+0x198/0x2e0 [ 35.958267] kunit_try_run_case+0x170/0x3f0 [ 35.958552] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.959005] kthread+0x328/0x630 [ 35.959189] ret_from_fork+0x10/0x20 [ 35.959641] [ 35.959803] Allocated by task 276: [ 35.960089] kasan_save_stack+0x3c/0x68 [ 35.960310] kasan_save_track+0x20/0x40 [ 35.960414] kasan_save_alloc_info+0x40/0x58 [ 35.960527] __kasan_kmalloc+0xd4/0xd8 [ 35.960634] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.960844] kasan_atomics+0xb8/0x2e0 [ 35.961213] kunit_try_run_case+0x170/0x3f0 [ 35.961423] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.961528] kthread+0x328/0x630 [ 35.961629] ret_from_fork+0x10/0x20 [ 35.961769] [ 35.961871] The buggy address belongs to the object at fff00000c768c580 [ 35.961871] which belongs to the cache kmalloc-64 of size 64 [ 35.962160] The buggy address is located 0 bytes to the right of [ 35.962160] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 35.962814] [ 35.962939] The buggy address belongs to the physical page: [ 35.963170] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 35.963499] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.963921] page_type: f5(slab) [ 35.964266] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.964481] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.964686] page dumped because: kasan: bad access detected [ 35.964794] [ 35.964850] Memory state around the buggy address: [ 35.964951] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.965068] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.965160] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.965236] ^ [ 35.965307] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.965408] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.965511] ================================================================== [ 36.026284] ================================================================== [ 36.026447] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 36.026602] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 36.027100] [ 36.027425] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 36.027942] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.028240] Hardware name: linux,dummy-virt (DT) [ 36.028717] Call trace: [ 36.028872] show_stack+0x20/0x38 (C) [ 36.029314] dump_stack_lvl+0x8c/0xd0 [ 36.029850] print_report+0x118/0x608 [ 36.030047] kasan_report+0xdc/0x128 [ 36.030431] kasan_check_range+0x100/0x1a8 [ 36.030569] __kasan_check_write+0x20/0x30 [ 36.030836] kasan_atomics_helper+0x11f8/0x4858 [ 36.030978] kasan_atomics+0x198/0x2e0 [ 36.031094] kunit_try_run_case+0x170/0x3f0 [ 36.031232] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.031381] kthread+0x328/0x630 [ 36.031513] ret_from_fork+0x10/0x20 [ 36.031658] [ 36.031715] Allocated by task 276: [ 36.031799] kasan_save_stack+0x3c/0x68 [ 36.031930] kasan_save_track+0x20/0x40 [ 36.032039] kasan_save_alloc_info+0x40/0x58 [ 36.032149] __kasan_kmalloc+0xd4/0xd8 [ 36.032249] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.032953] kasan_atomics+0xb8/0x2e0 [ 36.033067] kunit_try_run_case+0x170/0x3f0 [ 36.033220] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.033931] kthread+0x328/0x630 [ 36.034102] ret_from_fork+0x10/0x20 [ 36.034591] [ 36.034687] The buggy address belongs to the object at fff00000c768c580 [ 36.034687] which belongs to the cache kmalloc-64 of size 64 [ 36.034854] The buggy address is located 0 bytes to the right of [ 36.034854] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 36.035038] [ 36.035106] The buggy address belongs to the physical page: [ 36.035521] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 36.035902] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.036195] page_type: f5(slab) [ 36.036329] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.036715] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.036850] page dumped because: kasan: bad access detected [ 36.037065] [ 36.037318] Memory state around the buggy address: [ 36.037603] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.037829] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.038234] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.038399] ^ [ 36.039380] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.039502] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.039584] ================================================================== [ 36.189033] ================================================================== [ 36.189209] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 36.189338] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 36.189497] [ 36.189643] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 36.189965] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.190063] Hardware name: linux,dummy-virt (DT) [ 36.190190] Call trace: [ 36.190276] show_stack+0x20/0x38 (C) [ 36.190455] dump_stack_lvl+0x8c/0xd0 [ 36.190568] print_report+0x118/0x608 [ 36.190725] kasan_report+0xdc/0x128 [ 36.190849] kasan_check_range+0x100/0x1a8 [ 36.190980] __kasan_check_write+0x20/0x30 [ 36.191098] kasan_atomics_helper+0x17ec/0x4858 [ 36.191231] kasan_atomics+0x198/0x2e0 [ 36.191349] kunit_try_run_case+0x170/0x3f0 [ 36.191491] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.191643] kthread+0x328/0x630 [ 36.191745] ret_from_fork+0x10/0x20 [ 36.191870] [ 36.191920] Allocated by task 276: [ 36.192199] kasan_save_stack+0x3c/0x68 [ 36.192331] kasan_save_track+0x20/0x40 [ 36.192433] kasan_save_alloc_info+0x40/0x58 [ 36.193114] __kasan_kmalloc+0xd4/0xd8 [ 36.193250] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.193362] kasan_atomics+0xb8/0x2e0 [ 36.193458] kunit_try_run_case+0x170/0x3f0 [ 36.193577] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.193744] kthread+0x328/0x630 [ 36.193872] ret_from_fork+0x10/0x20 [ 36.193996] [ 36.194055] The buggy address belongs to the object at fff00000c768c580 [ 36.194055] which belongs to the cache kmalloc-64 of size 64 [ 36.194224] The buggy address is located 0 bytes to the right of [ 36.194224] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 36.194401] [ 36.194457] The buggy address belongs to the physical page: [ 36.194547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 36.194710] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.194866] page_type: f5(slab) [ 36.194975] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.195108] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.195215] page dumped because: kasan: bad access detected [ 36.195326] [ 36.195411] Memory state around the buggy address: [ 36.195564] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.195843] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.196243] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.196503] ^ [ 36.196597] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.196714] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.196798] ================================================================== [ 36.092624] ================================================================== [ 36.092762] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 36.093945] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 36.094101] [ 36.094189] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 36.094370] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.094438] Hardware name: linux,dummy-virt (DT) [ 36.094524] Call trace: [ 36.094591] show_stack+0x20/0x38 (C) [ 36.096551] dump_stack_lvl+0x8c/0xd0 [ 36.096639] print_report+0x118/0x608 [ 36.096732] kasan_report+0xdc/0x128 [ 36.096787] kasan_check_range+0x100/0x1a8 [ 36.096843] __kasan_check_write+0x20/0x30 [ 36.096898] kasan_atomics_helper+0x14e4/0x4858 [ 36.096956] kasan_atomics+0x198/0x2e0 [ 36.097010] kunit_try_run_case+0x170/0x3f0 [ 36.097071] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.097135] kthread+0x328/0x630 [ 36.097186] ret_from_fork+0x10/0x20 [ 36.097246] [ 36.097273] Allocated by task 276: [ 36.097312] kasan_save_stack+0x3c/0x68 [ 36.097368] kasan_save_track+0x20/0x40 [ 36.097414] kasan_save_alloc_info+0x40/0x58 [ 36.097464] __kasan_kmalloc+0xd4/0xd8 [ 36.097507] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.097556] kasan_atomics+0xb8/0x2e0 [ 36.097600] kunit_try_run_case+0x170/0x3f0 [ 36.097671] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.097724] kthread+0x328/0x630 [ 36.097764] ret_from_fork+0x10/0x20 [ 36.097807] [ 36.097836] The buggy address belongs to the object at fff00000c768c580 [ 36.097836] which belongs to the cache kmalloc-64 of size 64 [ 36.097908] The buggy address is located 0 bytes to the right of [ 36.097908] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 36.097985] [ 36.098013] The buggy address belongs to the physical page: [ 36.098056] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 36.098121] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.098187] page_type: f5(slab) [ 36.098240] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.098299] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.098352] page dumped because: kasan: bad access detected [ 36.098390] [ 36.098413] Memory state around the buggy address: [ 36.098456] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.098510] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.098562] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.098644] ^ [ 36.098785] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.098979] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.099124] ================================================================== [ 35.817458] ================================================================== [ 35.817596] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 35.817739] Write of size 4 at addr fff00000c768c5b0 by task kunit_try_catch/276 [ 35.817880] [ 35.817975] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 35.818212] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.818286] Hardware name: linux,dummy-virt (DT) [ 35.818375] Call trace: [ 35.818437] show_stack+0x20/0x38 (C) [ 35.818565] dump_stack_lvl+0x8c/0xd0 [ 35.818707] print_report+0x118/0x608 [ 35.818834] kasan_report+0xdc/0x128 [ 35.818955] kasan_check_range+0x100/0x1a8 [ 35.819082] __kasan_check_write+0x20/0x30 [ 35.819200] kasan_atomics_helper+0xd3c/0x4858 [ 35.819331] kasan_atomics+0x198/0x2e0 [ 35.819477] kunit_try_run_case+0x170/0x3f0 [ 35.819879] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.820410] kthread+0x328/0x630 [ 35.820593] ret_from_fork+0x10/0x20 [ 35.820789] [ 35.820868] Allocated by task 276: [ 35.820948] kasan_save_stack+0x3c/0x68 [ 35.821061] kasan_save_track+0x20/0x40 [ 35.821203] kasan_save_alloc_info+0x40/0x58 [ 35.821349] __kasan_kmalloc+0xd4/0xd8 [ 35.821482] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.822197] kasan_atomics+0xb8/0x2e0 [ 35.823128] kunit_try_run_case+0x170/0x3f0 [ 35.823283] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.823455] kthread+0x328/0x630 [ 35.823531] ret_from_fork+0x10/0x20 [ 35.823606] [ 35.823662] The buggy address belongs to the object at fff00000c768c580 [ 35.823662] which belongs to the cache kmalloc-64 of size 64 [ 35.824436] The buggy address is located 0 bytes to the right of [ 35.824436] allocated 48-byte region [fff00000c768c580, fff00000c768c5b0) [ 35.824752] [ 35.824839] The buggy address belongs to the physical page: [ 35.824946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c [ 35.825143] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.825327] page_type: f5(slab) [ 35.825476] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.825668] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.825780] page dumped because: kasan: bad access detected [ 35.826092] [ 35.826232] Memory state around the buggy address: [ 35.826335] fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.826453] fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.826572] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.826849] ^ [ 35.826949] fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.827067] fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.827168] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 35.334830] ================================================================== [ 35.334966] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 35.335761] Call trace: [ 35.337683] ret_from_fork+0x10/0x20 [ 35.341698] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen
[ 35.179829] ================================================================== [ 35.180131] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88 [ 35.180629] Read of size 1 at addr fff00000c7699cd0 by task kunit_try_catch/270 [ 35.180907] [ 35.181020] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 35.181218] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.181274] Hardware name: linux,dummy-virt (DT) [ 35.181342] Call trace: [ 35.181852] show_stack+0x20/0x38 (C) [ 35.182024] dump_stack_lvl+0x8c/0xd0 [ 35.182196] print_report+0x118/0x608 [ 35.182322] kasan_report+0xdc/0x128 [ 35.182442] __asan_report_load1_noabort+0x20/0x30 [ 35.182564] strnlen+0x80/0x88 [ 35.182683] kasan_strings+0x478/0xb00 [ 35.182825] kunit_try_run_case+0x170/0x3f0 [ 35.183160] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.183349] kthread+0x328/0x630 [ 35.183484] ret_from_fork+0x10/0x20 [ 35.183803] [ 35.183844] Allocated by task 270: [ 35.183899] kasan_save_stack+0x3c/0x68 [ 35.183970] kasan_save_track+0x20/0x40 [ 35.184041] kasan_save_alloc_info+0x40/0x58 [ 35.184092] __kasan_kmalloc+0xd4/0xd8 [ 35.184137] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.184185] kasan_strings+0xc8/0xb00 [ 35.184229] kunit_try_run_case+0x170/0x3f0 [ 35.184274] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.184362] kthread+0x328/0x630 [ 35.184405] ret_from_fork+0x10/0x20 [ 35.184450] [ 35.184476] Freed by task 270: [ 35.184511] kasan_save_stack+0x3c/0x68 [ 35.184556] kasan_save_track+0x20/0x40 [ 35.184602] kasan_save_free_info+0x4c/0x78 [ 35.184673] __kasan_slab_free+0x6c/0x98 [ 35.184718] kfree+0x214/0x3c8 [ 35.184757] kasan_strings+0x24c/0xb00 [ 35.184801] kunit_try_run_case+0x170/0x3f0 [ 35.184846] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.184896] kthread+0x328/0x630 [ 35.184935] ret_from_fork+0x10/0x20 [ 35.184978] [ 35.185004] The buggy address belongs to the object at fff00000c7699cc0 [ 35.185004] which belongs to the cache kmalloc-32 of size 32 [ 35.185076] The buggy address is located 16 bytes inside of [ 35.185076] freed 32-byte region [fff00000c7699cc0, fff00000c7699ce0) [ 35.185150] [ 35.185179] The buggy address belongs to the physical page: [ 35.185222] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107699 [ 35.185290] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.185356] page_type: f5(slab) [ 35.185412] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 35.185475] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 35.214047] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.217877] >fff00000c3f4e880: 00 04 fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 35.223043] Hardware name: linux,dummy-virt (DT) [ 35.223709] kunit_try_run_case+0x170/0x3f0 [ 35.223834] kthread+0x328/0x630 [ 35.224298] kunit_try_run_case+0x170/0x3f0 [ 35.226717] [ 35.229146] Memory state around the buggy address: [ 35.232316] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 35.235146] [ 35.236071] kunit_try_run_case+0x170/0x3f0 [ 35.237349] [ 35.237764] page_type: f5(slab) [ 35.239021] fff00000c3f4e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.241564] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.242938] kthread+0x328/0x630 [ 35.243663] __kasan_kmalloc+0xd4/0xd8 [ 35.245742] page dumped because: kasan: bad access detected [ 35.248781] [ 35.249216] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.250466] kasan_bitops_generic+0x110/0x1c8 [ 35.251926] kunit_try_run_case+0x170/0x3f0 [ 35.252932] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f4e [ 35.257529] Write of size 8 at addr fff00000c3f4e8c8 by task kunit_try_catch/272 [ 35.259218] __kasan_check_write+0x20/0x30 [ 35.260406] kasan_save_track+0x20/0x40 [ 35.261149] kthread+0x328/0x630 [ 35.262114] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.266489] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 35.271829] kasan_save_track+0x20/0x40 [ 35.274083] The buggy address belongs to the object at fff00000c3f4e8c0 [ 35.274083] which belongs to the cache kmalloc-16 of size 16 [ 35.277759] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen
[ 35.161130] ================================================================== [ 35.161505] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0 [ 35.161931] Read of size 1 at addr fff00000c7699cd0 by task kunit_try_catch/270 [ 35.162347] [ 35.162672] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 35.163239] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.163356] Hardware name: linux,dummy-virt (DT) [ 35.163459] Call trace: [ 35.163534] show_stack+0x20/0x38 (C) [ 35.163704] dump_stack_lvl+0x8c/0xd0 [ 35.163819] print_report+0x118/0x608 [ 35.163951] kasan_report+0xdc/0x128 [ 35.164078] __asan_report_load1_noabort+0x20/0x30 [ 35.164211] strlen+0xa8/0xb0 [ 35.164725] kasan_strings+0x418/0xb00 [ 35.164965] kunit_try_run_case+0x170/0x3f0 [ 35.165352] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.165820] kthread+0x328/0x630 [ 35.166239] ret_from_fork+0x10/0x20 [ 35.166813] [ 35.167055] Allocated by task 270: [ 35.167256] kasan_save_stack+0x3c/0x68 [ 35.167628] kasan_save_track+0x20/0x40 [ 35.168162] kasan_save_alloc_info+0x40/0x58 [ 35.168439] __kasan_kmalloc+0xd4/0xd8 [ 35.168685] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.168839] kasan_strings+0xc8/0xb00 [ 35.168911] kunit_try_run_case+0x170/0x3f0 [ 35.168987] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.169081] kthread+0x328/0x630 [ 35.169165] ret_from_fork+0x10/0x20 [ 35.169847] [ 35.170037] Freed by task 270: [ 35.170185] kasan_save_stack+0x3c/0x68 [ 35.170320] kasan_save_track+0x20/0x40 [ 35.170419] kasan_save_free_info+0x4c/0x78 [ 35.170527] __kasan_slab_free+0x6c/0x98 [ 35.170645] kfree+0x214/0x3c8 [ 35.170743] kasan_strings+0x24c/0xb00 [ 35.170843] kunit_try_run_case+0x170/0x3f0 [ 35.171310] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.171579] kthread+0x328/0x630 [ 35.172220] ret_from_fork+0x10/0x20 [ 35.172407] [ 35.172483] The buggy address belongs to the object at fff00000c7699cc0 [ 35.172483] which belongs to the cache kmalloc-32 of size 32 [ 35.172643] The buggy address is located 16 bytes inside of [ 35.172643] freed 32-byte region [fff00000c7699cc0, fff00000c7699ce0) [ 35.172767] [ 35.172812] The buggy address belongs to the physical page: [ 35.173408] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107699 [ 35.173800] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.174145] page_type: f5(slab) [ 35.174269] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 35.174416] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 35.174538] page dumped because: kasan: bad access detected [ 35.174640] [ 35.175104] Memory state around the buggy address: [ 35.175536] fff00000c7699b80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 35.175681] fff00000c7699c00: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 35.176370] >fff00000c7699c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.176602] ^ [ 35.176859] fff00000c7699d00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.177097] fff00000c7699d80: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.177211] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[ 35.142219] ================================================================== [ 35.142399] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00 [ 35.142550] Read of size 1 at addr fff00000c7699cd0 by task kunit_try_catch/270 [ 35.143012] [ 35.143209] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 35.143796] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.143997] Hardware name: linux,dummy-virt (DT) [ 35.144159] Call trace: [ 35.144228] show_stack+0x20/0x38 (C) [ 35.144646] dump_stack_lvl+0x8c/0xd0 [ 35.144743] print_report+0x118/0x608 [ 35.144848] kasan_report+0xdc/0x128 [ 35.144953] __asan_report_load1_noabort+0x20/0x30 [ 35.145082] kasan_strings+0x95c/0xb00 [ 35.145675] kunit_try_run_case+0x170/0x3f0 [ 35.145938] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.146089] kthread+0x328/0x630 [ 35.146450] ret_from_fork+0x10/0x20 [ 35.146696] [ 35.146777] Allocated by task 270: [ 35.146914] kasan_save_stack+0x3c/0x68 [ 35.147039] kasan_save_track+0x20/0x40 [ 35.147141] kasan_save_alloc_info+0x40/0x58 [ 35.147252] __kasan_kmalloc+0xd4/0xd8 [ 35.147348] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.147474] kasan_strings+0xc8/0xb00 [ 35.147577] kunit_try_run_case+0x170/0x3f0 [ 35.147692] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.147815] kthread+0x328/0x630 [ 35.147913] ret_from_fork+0x10/0x20 [ 35.148010] [ 35.148069] Freed by task 270: [ 35.148424] kasan_save_stack+0x3c/0x68 [ 35.148773] kasan_save_track+0x20/0x40 [ 35.149039] kasan_save_free_info+0x4c/0x78 [ 35.149135] __kasan_slab_free+0x6c/0x98 [ 35.149239] kfree+0x214/0x3c8 [ 35.149329] kasan_strings+0x24c/0xb00 [ 35.149516] kunit_try_run_case+0x170/0x3f0 [ 35.149723] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.149921] kthread+0x328/0x630 [ 35.150082] ret_from_fork+0x10/0x20 [ 35.150261] [ 35.150355] The buggy address belongs to the object at fff00000c7699cc0 [ 35.150355] which belongs to the cache kmalloc-32 of size 32 [ 35.150902] The buggy address is located 16 bytes inside of [ 35.150902] freed 32-byte region [fff00000c7699cc0, fff00000c7699ce0) [ 35.151251] [ 35.151316] The buggy address belongs to the physical page: [ 35.151741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107699 [ 35.151976] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.152209] page_type: f5(slab) [ 35.152465] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 35.152810] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 35.152986] page dumped because: kasan: bad access detected [ 35.153257] [ 35.153341] Memory state around the buggy address: [ 35.153454] fff00000c7699b80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 35.153577] fff00000c7699c00: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 35.153695] >fff00000c7699c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.153805] ^ [ 35.154043] fff00000c7699d00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.154289] fff00000c7699d80: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.154847] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
[ 35.126081] ================================================================== [ 35.126269] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 [ 35.126429] Read of size 1 at addr fff00000c7699cd0 by task kunit_try_catch/270 [ 35.126561] [ 35.126736] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 35.127508] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.127639] Hardware name: linux,dummy-virt (DT) [ 35.127779] Call trace: [ 35.127844] show_stack+0x20/0x38 (C) [ 35.127984] dump_stack_lvl+0x8c/0xd0 [ 35.128090] print_report+0x118/0x608 [ 35.128215] kasan_report+0xdc/0x128 [ 35.128375] __asan_report_load1_noabort+0x20/0x30 [ 35.128495] strcmp+0xc0/0xc8 [ 35.128998] kasan_strings+0x340/0xb00 [ 35.129108] kunit_try_run_case+0x170/0x3f0 [ 35.129408] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.129527] kthread+0x328/0x630 [ 35.129671] ret_from_fork+0x10/0x20 [ 35.129778] [ 35.129825] Allocated by task 270: [ 35.129888] kasan_save_stack+0x3c/0x68 [ 35.129988] kasan_save_track+0x20/0x40 [ 35.130076] kasan_save_alloc_info+0x40/0x58 [ 35.130172] __kasan_kmalloc+0xd4/0xd8 [ 35.130318] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.130439] kasan_strings+0xc8/0xb00 [ 35.130555] kunit_try_run_case+0x170/0x3f0 [ 35.130726] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.130859] kthread+0x328/0x630 [ 35.130998] ret_from_fork+0x10/0x20 [ 35.131562] [ 35.132042] Freed by task 270: [ 35.132173] kasan_save_stack+0x3c/0x68 [ 35.132343] kasan_save_track+0x20/0x40 [ 35.132466] kasan_save_free_info+0x4c/0x78 [ 35.132643] __kasan_slab_free+0x6c/0x98 [ 35.132736] kfree+0x214/0x3c8 [ 35.132805] kasan_strings+0x24c/0xb00 [ 35.132886] kunit_try_run_case+0x170/0x3f0 [ 35.132977] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.133084] kthread+0x328/0x630 [ 35.133622] ret_from_fork+0x10/0x20 [ 35.133822] [ 35.133904] The buggy address belongs to the object at fff00000c7699cc0 [ 35.133904] which belongs to the cache kmalloc-32 of size 32 [ 35.134511] The buggy address is located 16 bytes inside of [ 35.134511] freed 32-byte region [fff00000c7699cc0, fff00000c7699ce0) [ 35.134750] [ 35.134836] The buggy address belongs to the physical page: [ 35.135338] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107699 [ 35.135524] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.135797] page_type: f5(slab) [ 35.136157] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 35.136385] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 35.136631] page dumped because: kasan: bad access detected [ 35.136808] [ 35.136870] Memory state around the buggy address: [ 35.137168] fff00000c7699b80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 35.137264] fff00000c7699c00: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 35.137399] >fff00000c7699c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.137500] ^ [ 35.137764] fff00000c7699d00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.137912] fff00000c7699d80: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.138078] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[ 35.080163] ================================================================== [ 35.080383] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 35.080557] Read of size 1 at addr fff00000c7699b18 by task kunit_try_catch/268 [ 35.081151] [ 35.081275] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 35.081701] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.081888] Hardware name: linux,dummy-virt (DT) [ 35.082075] Call trace: [ 35.082158] show_stack+0x20/0x38 (C) [ 35.082686] dump_stack_lvl+0x8c/0xd0 [ 35.083009] print_report+0x118/0x608 [ 35.083443] kasan_report+0xdc/0x128 [ 35.083802] __asan_report_load1_noabort+0x20/0x30 [ 35.084015] memcmp+0x198/0x1d8 [ 35.084168] kasan_memcmp+0x16c/0x300 [ 35.084298] kunit_try_run_case+0x170/0x3f0 [ 35.084413] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.084524] kthread+0x328/0x630 [ 35.084640] ret_from_fork+0x10/0x20 [ 35.085059] [ 35.085444] Allocated by task 268: [ 35.085823] kasan_save_stack+0x3c/0x68 [ 35.086181] kasan_save_track+0x20/0x40 [ 35.086302] kasan_save_alloc_info+0x40/0x58 [ 35.086686] __kasan_kmalloc+0xd4/0xd8 [ 35.087032] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.087226] kasan_memcmp+0xbc/0x300 [ 35.087389] kunit_try_run_case+0x170/0x3f0 [ 35.087791] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.088167] kthread+0x328/0x630 [ 35.088468] ret_from_fork+0x10/0x20 [ 35.088727] [ 35.088790] The buggy address belongs to the object at fff00000c7699b00 [ 35.088790] which belongs to the cache kmalloc-32 of size 32 [ 35.088960] The buggy address is located 0 bytes to the right of [ 35.088960] allocated 24-byte region [fff00000c7699b00, fff00000c7699b18) [ 35.089143] [ 35.089209] The buggy address belongs to the physical page: [ 35.089304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107699 [ 35.089505] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.089931] page_type: f5(slab) [ 35.090418] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 35.090672] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 35.090830] page dumped because: kasan: bad access detected [ 35.090942] [ 35.091063] Memory state around the buggy address: [ 35.091159] fff00000c7699a00: 00 00 00 fc fc fc fc fc 00 00 00 04 fc fc fc fc [ 35.091285] fff00000c7699a80: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 35.091402] >fff00000c7699b00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.091526] ^ [ 35.091625] fff00000c7699b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.091767] fff00000c7699c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.091873] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[ 35.030283] ================================================================== [ 35.030472] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340 [ 35.030649] Read of size 1 at addr ffff800080a57b4a by task kunit_try_catch/264 [ 35.030784] [ 35.030881] CPU: 0 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 35.031124] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.031186] Hardware name: linux,dummy-virt (DT) [ 35.031266] Call trace: [ 35.031321] show_stack+0x20/0x38 (C) [ 35.031514] dump_stack_lvl+0x8c/0xd0 [ 35.031702] print_report+0x310/0x608 [ 35.031815] kasan_report+0xdc/0x128 [ 35.031926] __asan_report_load1_noabort+0x20/0x30 [ 35.032530] kasan_alloca_oob_right+0x2dc/0x340 [ 35.032723] kunit_try_run_case+0x170/0x3f0 [ 35.032880] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.033017] kthread+0x328/0x630 [ 35.033129] ret_from_fork+0x10/0x20 [ 35.033255] [ 35.033310] The buggy address belongs to stack of task kunit_try_catch/264 [ 35.033445] [ 35.033514] The buggy address belongs to the virtual mapping at [ 35.033514] [ffff800080a50000, ffff800080a59000) created by: [ 35.033514] kernel_clone+0x150/0x7a8 [ 35.033727] [ 35.033782] The buggy address belongs to the physical page: [ 35.033850] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105955 [ 35.034161] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.034317] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 35.034449] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 35.034585] page dumped because: kasan: bad access detected [ 35.034687] [ 35.034750] Memory state around the buggy address: [ 35.034840] ffff800080a57a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.034969] ffff800080a57a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.035128] >ffff800080a57b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 35.035227] ^ [ 35.035319] ffff800080a57b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 35.035437] ffff800080a57c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 35.035540] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[ 34.995246] ================================================================== [ 34.995489] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 34.995670] Read of size 1 at addr ffff800080a57b5f by task kunit_try_catch/262 [ 34.995806] [ 34.995903] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 34.996690] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.996811] Hardware name: linux,dummy-virt (DT) [ 34.996900] Call trace: [ 34.996949] show_stack+0x20/0x38 (C) [ 34.997065] dump_stack_lvl+0x8c/0xd0 [ 34.997178] print_report+0x310/0x608 [ 34.997301] kasan_report+0xdc/0x128 [ 34.997741] __asan_report_load1_noabort+0x20/0x30 [ 34.998043] kasan_alloca_oob_left+0x2b8/0x310 [ 34.998287] kunit_try_run_case+0x170/0x3f0 [ 34.998411] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.998552] kthread+0x328/0x630 [ 34.999023] ret_from_fork+0x10/0x20 [ 34.999171] [ 34.999234] The buggy address belongs to stack of task kunit_try_catch/262 [ 34.999823] [ 34.999930] The buggy address belongs to the virtual mapping at [ 34.999930] [ffff800080a50000, ffff800080a59000) created by: [ 34.999930] kernel_clone+0x150/0x7a8 [ 35.000241] [ 35.000488] The buggy address belongs to the physical page: [ 35.000539] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105955 [ 35.000622] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.000758] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 35.000819] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 35.000867] page dumped because: kasan: bad access detected [ 35.000904] [ 35.000924] Memory state around the buggy address: [ 35.000965] ffff800080a57a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.001017] ffff800080a57a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.001064] >ffff800080a57b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 35.001109] ^ [ 35.001156] ffff800080a57b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 35.001205] ffff800080a57c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 35.001251] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 34.955030] ================================================================== [ 34.955791] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 34.956429] Read of size 1 at addr ffff800080a57c2a by task kunit_try_catch/260 [ 34.956957] [ 34.957300] CPU: 0 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 34.958928] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.959009] Hardware name: linux,dummy-virt (DT) [ 34.959092] Call trace: [ 34.959693] show_stack+0x20/0x38 (C) [ 34.960037] dump_stack_lvl+0x8c/0xd0 [ 34.960237] print_report+0x310/0x608 [ 34.960353] kasan_report+0xdc/0x128 [ 34.960541] __asan_report_load1_noabort+0x20/0x30 [ 34.960715] kasan_stack_oob+0x238/0x270 [ 34.960886] kunit_try_run_case+0x170/0x3f0 [ 34.961060] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.961383] kthread+0x328/0x630 [ 34.961482] ret_from_fork+0x10/0x20 [ 34.961605] [ 34.962061] The buggy address belongs to stack of task kunit_try_catch/260 [ 34.962783] and is located at offset 138 in frame: [ 34.962952] kasan_stack_oob+0x0/0x270 [ 34.963933] [ 34.964032] This frame has 4 objects: [ 34.964745] [48, 49) '__assertion' [ 34.964862] [64, 72) 'array' [ 34.964939] [96, 112) '__assertion' [ 34.965307] [128, 138) 'stack_array' [ 34.965534] [ 34.966076] The buggy address belongs to the virtual mapping at [ 34.966076] [ffff800080a50000, ffff800080a59000) created by: [ 34.966076] kernel_clone+0x150/0x7a8 [ 34.966306] [ 34.966361] The buggy address belongs to the physical page: [ 34.966984] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105955 [ 34.967141] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.967619] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 34.967762] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 34.968305] page dumped because: kasan: bad access detected [ 34.968625] [ 34.968700] Memory state around the buggy address: [ 34.968800] ffff800080a57b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.968891] ffff800080a57b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 34.968971] >ffff800080a57c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 34.969041] ^ [ 34.969399] ffff800080a57c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 [ 34.969869] ffff800080a57d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 34.970035] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 34.899201] ================================================================== [ 34.899437] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 34.899662] Read of size 1 at addr ffff94c64644f68d by task kunit_try_catch/256 [ 34.899810] [ 34.899920] CPU: 1 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 34.900156] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.900238] Hardware name: linux,dummy-virt (DT) [ 34.900329] Call trace: [ 34.900394] show_stack+0x20/0x38 (C) [ 34.900528] dump_stack_lvl+0x8c/0xd0 [ 34.900652] print_report+0x310/0x608 [ 34.900780] kasan_report+0xdc/0x128 [ 34.900895] __asan_report_load1_noabort+0x20/0x30 [ 34.901026] kasan_global_oob_right+0x230/0x270 [ 34.901153] kunit_try_run_case+0x170/0x3f0 [ 34.901315] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.901477] kthread+0x328/0x630 [ 34.901604] ret_from_fork+0x10/0x20 [ 34.901764] [ 34.901899] The buggy address belongs to the variable: [ 34.902005] global_array+0xd/0x40 [ 34.902126] [ 34.902393] The buggy address belongs to the virtual mapping at [ 34.902393] [ffff94c644610000, ffff94c646501000) created by: [ 34.902393] paging_init+0x66c/0x7d0 [ 34.902641] [ 34.902936] The buggy address belongs to the physical page: [ 34.902994] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47c4f [ 34.903067] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 34.903165] raw: 03fffe0000002000 ffffc1ffc01f13c8 ffffc1ffc01f13c8 0000000000000000 [ 34.903225] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 34.903276] page dumped because: kasan: bad access detected [ 34.903312] [ 34.903332] Memory state around the buggy address: [ 34.903374] ffff94c64644f580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.903445] ffff94c64644f600: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9 [ 34.903509] >ffff94c64644f680: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 [ 34.903554] ^ [ 34.903591] ffff94c64644f700: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 [ 34.903670] ffff94c64644f780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.903719] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 34.801902] ================================================================== [ 34.802108] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 34.802278] Free of addr fff00000c59fbb01 by task kunit_try_catch/252 [ 34.802395] [ 34.802487] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 34.802735] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.802809] Hardware name: linux,dummy-virt (DT) [ 34.802894] Call trace: [ 34.802958] show_stack+0x20/0x38 (C) [ 34.803084] dump_stack_lvl+0x8c/0xd0 [ 34.803206] print_report+0x118/0x608 [ 34.803329] kasan_report_invalid_free+0xc0/0xe8 [ 34.803478] check_slab_allocation+0xfc/0x108 [ 34.803626] __kasan_mempool_poison_object+0x78/0x150 [ 34.803750] mempool_free+0x28c/0x328 [ 34.803900] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 34.804055] mempool_kmalloc_invalid_free+0xc0/0x118 [ 34.805938] kunit_try_run_case+0x170/0x3f0 [ 34.806127] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.806573] kthread+0x328/0x630 [ 34.806784] ret_from_fork+0x10/0x20 [ 34.806907] [ 34.806955] Allocated by task 252: [ 34.807029] kasan_save_stack+0x3c/0x68 [ 34.807137] kasan_save_track+0x20/0x40 [ 34.807249] kasan_save_alloc_info+0x40/0x58 [ 34.807343] __kasan_mempool_unpoison_object+0x11c/0x180 [ 34.807556] remove_element+0x130/0x1f8 [ 34.807865] mempool_alloc_preallocated+0x58/0xc0 [ 34.808083] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 34.808192] mempool_kmalloc_invalid_free+0xc0/0x118 [ 34.808289] kunit_try_run_case+0x170/0x3f0 [ 34.808418] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.808532] kthread+0x328/0x630 [ 34.808808] ret_from_fork+0x10/0x20 [ 34.808926] [ 34.809001] The buggy address belongs to the object at fff00000c59fbb00 [ 34.809001] which belongs to the cache kmalloc-128 of size 128 [ 34.809206] The buggy address is located 1 bytes inside of [ 34.809206] 128-byte region [fff00000c59fbb00, fff00000c59fbb80) [ 34.809395] [ 34.809559] The buggy address belongs to the physical page: [ 34.809668] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059fb [ 34.809820] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.809943] page_type: f5(slab) [ 34.810077] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.810187] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.810275] page dumped because: kasan: bad access detected [ 34.810334] [ 34.810369] Memory state around the buggy address: [ 34.810647] fff00000c59fba00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.810784] fff00000c59fba80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.810920] >fff00000c59fbb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.811129] ^ [ 34.811218] fff00000c59fbb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.811323] fff00000c59fbc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.811449] ================================================================== [ 34.834163] ================================================================== [ 34.834352] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 34.834516] Free of addr fff00000c5a48001 by task kunit_try_catch/254 [ 34.836080] [ 34.836196] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 34.836449] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.836514] Hardware name: linux,dummy-virt (DT) [ 34.836597] Call trace: [ 34.836666] show_stack+0x20/0x38 (C) [ 34.836780] dump_stack_lvl+0x8c/0xd0 [ 34.836837] print_report+0x118/0x608 [ 34.836895] kasan_report_invalid_free+0xc0/0xe8 [ 34.836950] __kasan_mempool_poison_object+0xfc/0x150 [ 34.837009] mempool_free+0x28c/0x328 [ 34.837059] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 34.837119] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 34.837179] kunit_try_run_case+0x170/0x3f0 [ 34.837235] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.837294] kthread+0x328/0x630 [ 34.837341] ret_from_fork+0x10/0x20 [ 34.837399] [ 34.837428] The buggy address belongs to the physical page: [ 34.837470] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a48 [ 34.837537] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.837592] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 34.838071] page_type: f8(unknown) [ 34.838369] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.838656] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 34.839067] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.839183] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 34.839852] head: 0bfffe0000000002 ffffc1ffc3169201 00000000ffffffff 00000000ffffffff [ 34.840250] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 34.840356] page dumped because: kasan: bad access detected [ 34.840426] [ 34.840460] Memory state around the buggy address: [ 34.840959] fff00000c5a47f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.841128] fff00000c5a47f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.841246] >fff00000c5a48000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.841353] ^ [ 34.841427] fff00000c5a48080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.841545] fff00000c5a48100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.841665] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 34.719598] ================================================================== [ 34.720169] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 34.720481] Free of addr fff00000c59fb700 by task kunit_try_catch/246 [ 34.720685] [ 34.721009] CPU: 1 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 34.721326] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.721382] Hardware name: linux,dummy-virt (DT) [ 34.721451] Call trace: [ 34.721507] show_stack+0x20/0x38 (C) [ 34.721731] dump_stack_lvl+0x8c/0xd0 [ 34.722037] print_report+0x118/0x608 [ 34.722298] kasan_report_invalid_free+0xc0/0xe8 [ 34.722602] check_slab_allocation+0xd4/0x108 [ 34.722817] __kasan_mempool_poison_object+0x78/0x150 [ 34.723101] mempool_free+0x28c/0x328 [ 34.723220] mempool_double_free_helper+0x150/0x2e8 [ 34.723621] mempool_kmalloc_double_free+0xc0/0x118 [ 34.723903] kunit_try_run_case+0x170/0x3f0 [ 34.724131] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.724275] kthread+0x328/0x630 [ 34.724468] ret_from_fork+0x10/0x20 [ 34.724851] [ 34.724918] Allocated by task 246: [ 34.724978] kasan_save_stack+0x3c/0x68 [ 34.725068] kasan_save_track+0x20/0x40 [ 34.725263] kasan_save_alloc_info+0x40/0x58 [ 34.725435] __kasan_mempool_unpoison_object+0x11c/0x180 [ 34.725694] remove_element+0x130/0x1f8 [ 34.725899] mempool_alloc_preallocated+0x58/0xc0 [ 34.726015] mempool_double_free_helper+0x94/0x2e8 [ 34.726190] mempool_kmalloc_double_free+0xc0/0x118 [ 34.726519] kunit_try_run_case+0x170/0x3f0 [ 34.726760] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.726872] kthread+0x328/0x630 [ 34.727055] ret_from_fork+0x10/0x20 [ 34.727257] [ 34.727330] Freed by task 246: [ 34.727549] kasan_save_stack+0x3c/0x68 [ 34.727763] kasan_save_track+0x20/0x40 [ 34.727856] kasan_save_free_info+0x4c/0x78 [ 34.727960] __kasan_mempool_poison_object+0xc0/0x150 [ 34.728383] mempool_free+0x28c/0x328 [ 34.728503] mempool_double_free_helper+0x100/0x2e8 [ 34.728835] mempool_kmalloc_double_free+0xc0/0x118 [ 34.728924] kunit_try_run_case+0x170/0x3f0 [ 34.729007] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.729107] kthread+0x328/0x630 [ 34.729328] ret_from_fork+0x10/0x20 [ 34.729420] [ 34.729477] The buggy address belongs to the object at fff00000c59fb700 [ 34.729477] which belongs to the cache kmalloc-128 of size 128 [ 34.729578] The buggy address is located 0 bytes inside of [ 34.729578] 128-byte region [fff00000c59fb700, fff00000c59fb780) [ 34.729672] [ 34.729704] The buggy address belongs to the physical page: [ 34.729741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059fb [ 34.729810] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.729875] page_type: f5(slab) [ 34.729928] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.729988] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.730038] page dumped because: kasan: bad access detected [ 34.730073] [ 34.730094] Memory state around the buggy address: [ 34.730136] fff00000c59fb600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.730188] fff00000c59fb680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.730239] >fff00000c59fb700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.730285] ^ [ 34.730318] fff00000c59fb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.730367] fff00000c59fb800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.730413] ================================================================== [ 34.743116] ================================================================== [ 34.743301] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 34.743460] Free of addr fff00000c5a48000 by task kunit_try_catch/248 [ 34.743550] [ 34.743641] CPU: 1 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 34.743828] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.743890] Hardware name: linux,dummy-virt (DT) [ 34.743969] Call trace: [ 34.744133] show_stack+0x20/0x38 (C) [ 34.744463] dump_stack_lvl+0x8c/0xd0 [ 34.744693] print_report+0x118/0x608 [ 34.744817] kasan_report_invalid_free+0xc0/0xe8 [ 34.745342] __kasan_mempool_poison_object+0x14c/0x150 [ 34.745525] mempool_free+0x28c/0x328 [ 34.745647] mempool_double_free_helper+0x150/0x2e8 [ 34.745756] mempool_kmalloc_large_double_free+0xc0/0x118 [ 34.745990] kunit_try_run_case+0x170/0x3f0 [ 34.746128] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.746786] kthread+0x328/0x630 [ 34.746926] ret_from_fork+0x10/0x20 [ 34.747054] [ 34.747112] The buggy address belongs to the physical page: [ 34.747204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a48 [ 34.747350] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.747509] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 34.747683] page_type: f8(unknown) [ 34.747796] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.747928] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 34.748071] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.748253] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 34.748379] head: 0bfffe0000000002 ffffc1ffc3169201 00000000ffffffff 00000000ffffffff [ 34.748503] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 34.749047] page dumped because: kasan: bad access detected [ 34.749237] [ 34.749297] Memory state around the buggy address: [ 34.749424] fff00000c5a47f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.749549] fff00000c5a47f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.749655] >fff00000c5a48000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.749730] ^ [ 34.749788] fff00000c5a48080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.749878] fff00000c5a48100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.749979] ================================================================== [ 34.766759] ================================================================== [ 34.766959] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 34.767511] Free of addr fff00000c5a48000 by task kunit_try_catch/250 [ 34.767722] [ 34.767856] CPU: 1 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 34.768368] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.768637] Hardware name: linux,dummy-virt (DT) [ 34.768769] Call trace: [ 34.768866] show_stack+0x20/0x38 (C) [ 34.769066] dump_stack_lvl+0x8c/0xd0 [ 34.769398] print_report+0x118/0x608 [ 34.769501] kasan_report_invalid_free+0xc0/0xe8 [ 34.769670] __kasan_mempool_poison_pages+0xe0/0xe8 [ 34.769866] mempool_free+0x24c/0x328 [ 34.770109] mempool_double_free_helper+0x150/0x2e8 [ 34.770450] mempool_page_alloc_double_free+0xbc/0x118 [ 34.770703] kunit_try_run_case+0x170/0x3f0 [ 34.770919] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.771099] kthread+0x328/0x630 [ 34.771204] ret_from_fork+0x10/0x20 [ 34.771533] [ 34.771623] The buggy address belongs to the physical page: [ 34.771712] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a48 [ 34.771984] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.772189] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 34.772516] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 34.772655] page dumped because: kasan: bad access detected [ 34.772744] [ 34.773055] Memory state around the buggy address: [ 34.773170] fff00000c5a47f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.773482] fff00000c5a47f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.773578] >fff00000c5a48000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.773737] ^ [ 34.773814] fff00000c5a48080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.774029] fff00000c5a48100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.774213] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 32.116100] ================================================================== [ 32.116749] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 32.117155] Read of size 18446744073709551614 at addr fff00000c596c704 by task kunit_try_catch/191 [ 32.117357] [ 32.117443] CPU: 1 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 32.118044] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.118184] Hardware name: linux,dummy-virt (DT) [ 32.118265] Call trace: [ 32.118770] show_stack+0x20/0x38 (C) [ 32.118996] dump_stack_lvl+0x8c/0xd0 [ 32.119180] print_report+0x118/0x608 [ 32.119361] kasan_report+0xdc/0x128 [ 32.119488] kasan_check_range+0x100/0x1a8 [ 32.120075] __asan_memmove+0x3c/0x98 [ 32.120198] kmalloc_memmove_negative_size+0x154/0x2e0 [ 32.120327] kunit_try_run_case+0x170/0x3f0 [ 32.120557] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.120768] kthread+0x328/0x630 [ 32.121096] ret_from_fork+0x10/0x20 [ 32.121467] [ 32.121529] Allocated by task 191: [ 32.121666] kasan_save_stack+0x3c/0x68 [ 32.121875] kasan_save_track+0x20/0x40 [ 32.121988] kasan_save_alloc_info+0x40/0x58 [ 32.122163] __kasan_kmalloc+0xd4/0xd8 [ 32.122335] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.122435] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 32.122543] kunit_try_run_case+0x170/0x3f0 [ 32.122654] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.122769] kthread+0x328/0x630 [ 32.123423] ret_from_fork+0x10/0x20 [ 32.124149] [ 32.124363] The buggy address belongs to the object at fff00000c596c700 [ 32.124363] which belongs to the cache kmalloc-64 of size 64 [ 32.125201] The buggy address is located 4 bytes inside of [ 32.125201] 64-byte region [fff00000c596c700, fff00000c596c740) [ 32.125380] [ 32.125564] The buggy address belongs to the physical page: [ 32.125703] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10596c [ 32.125848] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.126073] page_type: f5(slab) [ 32.126328] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.126846] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.127147] page dumped because: kasan: bad access detected [ 32.127496] [ 32.127668] Memory state around the buggy address: [ 32.127798] fff00000c596c600: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc [ 32.128298] fff00000c596c680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.128746] >fff00000c596c700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 32.129013] ^ [ 32.129292] fff00000c596c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.129671] fff00000c596c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.130297] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 34.692331] ================================================================== [ 34.692597] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 34.692764] Read of size 1 at addr fff00000c5a48000 by task kunit_try_catch/244 [ 34.692873] [ 34.692960] CPU: 1 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 34.693170] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.693238] Hardware name: linux,dummy-virt (DT) [ 34.693367] Call trace: [ 34.693422] show_stack+0x20/0x38 (C) [ 34.693526] dump_stack_lvl+0x8c/0xd0 [ 34.693652] print_report+0x118/0x608 [ 34.694049] kasan_report+0xdc/0x128 [ 34.694170] __asan_report_load1_noabort+0x20/0x30 [ 34.694324] mempool_uaf_helper+0x314/0x340 [ 34.694424] mempool_page_alloc_uaf+0xc0/0x118 [ 34.694554] kunit_try_run_case+0x170/0x3f0 [ 34.694765] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.694922] kthread+0x328/0x630 [ 34.695021] ret_from_fork+0x10/0x20 [ 34.695161] [ 34.695250] The buggy address belongs to the physical page: [ 34.695364] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a48 [ 34.695579] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.695795] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 34.695960] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 34.696108] page dumped because: kasan: bad access detected [ 34.696215] [ 34.696265] Memory state around the buggy address: [ 34.696397] fff00000c5a47f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.696495] fff00000c5a47f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.696594] >fff00000c5a48000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.696705] ^ [ 34.697159] fff00000c5a48080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.697298] fff00000c5a48100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.697441] ================================================================== [ 34.588000] ================================================================== [ 34.588552] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 34.588972] Read of size 1 at addr fff00000c5a44000 by task kunit_try_catch/240 [ 34.589146] [ 34.589277] CPU: 1 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 34.589509] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.589562] Hardware name: linux,dummy-virt (DT) [ 34.589643] Call trace: [ 34.589911] show_stack+0x20/0x38 (C) [ 34.590051] dump_stack_lvl+0x8c/0xd0 [ 34.590437] print_report+0x118/0x608 [ 34.590565] kasan_report+0xdc/0x128 [ 34.590699] __asan_report_load1_noabort+0x20/0x30 [ 34.590841] mempool_uaf_helper+0x314/0x340 [ 34.591005] mempool_kmalloc_large_uaf+0xc4/0x120 [ 34.591171] kunit_try_run_case+0x170/0x3f0 [ 34.591342] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.591531] kthread+0x328/0x630 [ 34.591692] ret_from_fork+0x10/0x20 [ 34.591835] [ 34.591917] The buggy address belongs to the physical page: [ 34.592044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a44 [ 34.592265] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.592383] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 34.592524] page_type: f8(unknown) [ 34.592639] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.592778] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 34.592908] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.593008] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 34.593105] head: 0bfffe0000000002 ffffc1ffc3169101 00000000ffffffff 00000000ffffffff [ 34.593216] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 34.593324] page dumped because: kasan: bad access detected [ 34.593411] [ 34.593511] Memory state around the buggy address: [ 34.593628] fff00000c5a43f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.593948] fff00000c5a43f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.594319] >fff00000c5a44000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.594954] ^ [ 34.595292] fff00000c5a44080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.595441] fff00000c5a44100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.595543] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 34.619311] ================================================================== [ 34.619485] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 34.619581] Read of size 1 at addr fff00000c7686240 by task kunit_try_catch/242 [ 34.619965] [ 34.620232] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 34.621199] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.621302] Hardware name: linux,dummy-virt (DT) [ 34.621395] Call trace: [ 34.621461] show_stack+0x20/0x38 (C) [ 34.621603] dump_stack_lvl+0x8c/0xd0 [ 34.621731] print_report+0x118/0x608 [ 34.621968] kasan_report+0xdc/0x128 [ 34.622373] __asan_report_load1_noabort+0x20/0x30 [ 34.622591] mempool_uaf_helper+0x314/0x340 [ 34.622882] mempool_slab_uaf+0xc0/0x118 [ 34.622988] kunit_try_run_case+0x170/0x3f0 [ 34.623769] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.624072] kthread+0x328/0x630 [ 34.624277] ret_from_fork+0x10/0x20 [ 34.624542] [ 34.624662] Allocated by task 242: [ 34.624735] kasan_save_stack+0x3c/0x68 [ 34.624943] kasan_save_track+0x20/0x40 [ 34.625126] kasan_save_alloc_info+0x40/0x58 [ 34.625314] __kasan_mempool_unpoison_object+0xbc/0x180 [ 34.625653] remove_element+0x16c/0x1f8 [ 34.625813] mempool_alloc_preallocated+0x58/0xc0 [ 34.625984] mempool_uaf_helper+0xa4/0x340 [ 34.626178] mempool_slab_uaf+0xc0/0x118 [ 34.626361] kunit_try_run_case+0x170/0x3f0 [ 34.626757] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.626894] kthread+0x328/0x630 [ 34.626969] ret_from_fork+0x10/0x20 [ 34.627015] [ 34.627040] Freed by task 242: [ 34.627076] kasan_save_stack+0x3c/0x68 [ 34.627120] kasan_save_track+0x20/0x40 [ 34.627164] kasan_save_free_info+0x4c/0x78 [ 34.627209] __kasan_mempool_poison_object+0xc0/0x150 [ 34.627256] mempool_free+0x28c/0x328 [ 34.627296] mempool_uaf_helper+0x104/0x340 [ 34.627339] mempool_slab_uaf+0xc0/0x118 [ 34.627379] kunit_try_run_case+0x170/0x3f0 [ 34.627441] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.627503] kthread+0x328/0x630 [ 34.627540] ret_from_fork+0x10/0x20 [ 34.627581] [ 34.627606] The buggy address belongs to the object at fff00000c7686240 [ 34.627606] which belongs to the cache test_cache of size 123 [ 34.627896] The buggy address is located 0 bytes inside of [ 34.627896] freed 123-byte region [fff00000c7686240, fff00000c76862bb) [ 34.628224] [ 34.628282] The buggy address belongs to the physical page: [ 34.628738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107686 [ 34.629012] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.629436] page_type: f5(slab) [ 34.629589] raw: 0bfffe0000000000 fff00000c59f3500 dead000000000122 0000000000000000 [ 34.629927] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 34.630064] page dumped because: kasan: bad access detected [ 34.630157] [ 34.630922] Memory state around the buggy address: [ 34.631259] fff00000c7686100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.632149] fff00000c7686180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.632352] >fff00000c7686200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 34.632816] ^ [ 34.632929] fff00000c7686280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.633043] fff00000c7686300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.633123] ================================================================== [ 34.558589] ================================================================== [ 34.558813] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 34.558991] Read of size 1 at addr fff00000c59fb300 by task kunit_try_catch/238 [ 34.559130] [ 34.559231] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 34.559492] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.559564] Hardware name: linux,dummy-virt (DT) [ 34.559653] Call trace: [ 34.559714] show_stack+0x20/0x38 (C) [ 34.559835] dump_stack_lvl+0x8c/0xd0 [ 34.559967] print_report+0x118/0x608 [ 34.560082] kasan_report+0xdc/0x128 [ 34.560189] __asan_report_load1_noabort+0x20/0x30 [ 34.560835] mempool_uaf_helper+0x314/0x340 [ 34.561009] mempool_kmalloc_uaf+0xc4/0x120 [ 34.561175] kunit_try_run_case+0x170/0x3f0 [ 34.561324] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.561450] kthread+0x328/0x630 [ 34.561550] ret_from_fork+0x10/0x20 [ 34.561670] [ 34.561711] Allocated by task 238: [ 34.561779] kasan_save_stack+0x3c/0x68 [ 34.561866] kasan_save_track+0x20/0x40 [ 34.561973] kasan_save_alloc_info+0x40/0x58 [ 34.562061] __kasan_mempool_unpoison_object+0x11c/0x180 [ 34.562356] remove_element+0x130/0x1f8 [ 34.562467] mempool_alloc_preallocated+0x58/0xc0 [ 34.562572] mempool_uaf_helper+0xa4/0x340 [ 34.562727] mempool_kmalloc_uaf+0xc4/0x120 [ 34.562834] kunit_try_run_case+0x170/0x3f0 [ 34.562929] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.563052] kthread+0x328/0x630 [ 34.563179] ret_from_fork+0x10/0x20 [ 34.563310] [ 34.563378] Freed by task 238: [ 34.563501] kasan_save_stack+0x3c/0x68 [ 34.564004] kasan_save_track+0x20/0x40 [ 34.564122] kasan_save_free_info+0x4c/0x78 [ 34.564224] __kasan_mempool_poison_object+0xc0/0x150 [ 34.564783] mempool_free+0x28c/0x328 [ 34.564924] mempool_uaf_helper+0x104/0x340 [ 34.565092] mempool_kmalloc_uaf+0xc4/0x120 [ 34.565256] kunit_try_run_case+0x170/0x3f0 [ 34.565346] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.565447] kthread+0x328/0x630 [ 34.565530] ret_from_fork+0x10/0x20 [ 34.565857] [ 34.565910] The buggy address belongs to the object at fff00000c59fb300 [ 34.565910] which belongs to the cache kmalloc-128 of size 128 [ 34.566122] The buggy address is located 0 bytes inside of [ 34.566122] freed 128-byte region [fff00000c59fb300, fff00000c59fb380) [ 34.566340] [ 34.566402] The buggy address belongs to the physical page: [ 34.566527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059fb [ 34.566719] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.566862] page_type: f5(slab) [ 34.566963] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.567100] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.567213] page dumped because: kasan: bad access detected [ 34.567298] [ 34.567350] Memory state around the buggy address: [ 34.567488] fff00000c59fb200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.567645] fff00000c59fb280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.567753] >fff00000c59fb300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.567895] ^ [ 34.568052] fff00000c59fb380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.568407] fff00000c59fb400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.568765] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 34.478263] ================================================================== [ 34.478575] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 34.479139] Read of size 1 at addr fff00000c5a992bb by task kunit_try_catch/236 [ 34.479681] [ 34.479779] CPU: 1 UID: 0 PID: 236 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 34.480014] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.480085] Hardware name: linux,dummy-virt (DT) [ 34.480169] Call trace: [ 34.480227] show_stack+0x20/0x38 (C) [ 34.481121] dump_stack_lvl+0x8c/0xd0 [ 34.481339] print_report+0x118/0x608 [ 34.481771] kasan_report+0xdc/0x128 [ 34.482317] __asan_report_load1_noabort+0x20/0x30 [ 34.482720] mempool_oob_right_helper+0x2ac/0x2f0 [ 34.483112] mempool_slab_oob_right+0xc0/0x118 [ 34.483408] kunit_try_run_case+0x170/0x3f0 [ 34.483729] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.484132] kthread+0x328/0x630 [ 34.484601] ret_from_fork+0x10/0x20 [ 34.484967] [ 34.485008] Allocated by task 236: [ 34.485065] kasan_save_stack+0x3c/0x68 [ 34.485147] kasan_save_track+0x20/0x40 [ 34.485514] kasan_save_alloc_info+0x40/0x58 [ 34.486109] __kasan_mempool_unpoison_object+0xbc/0x180 [ 34.486262] remove_element+0x16c/0x1f8 [ 34.486362] mempool_alloc_preallocated+0x58/0xc0 [ 34.486461] mempool_oob_right_helper+0x98/0x2f0 [ 34.486567] mempool_slab_oob_right+0xc0/0x118 [ 34.487965] kunit_try_run_case+0x170/0x3f0 [ 34.488379] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.488703] kthread+0x328/0x630 [ 34.488813] ret_from_fork+0x10/0x20 [ 34.488902] [ 34.488946] The buggy address belongs to the object at fff00000c5a99240 [ 34.488946] which belongs to the cache test_cache of size 123 [ 34.489071] The buggy address is located 0 bytes to the right of [ 34.489071] allocated 123-byte region [fff00000c5a99240, fff00000c5a992bb) [ 34.489217] [ 34.489272] The buggy address belongs to the physical page: [ 34.490266] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a99 [ 34.490890] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.491262] page_type: f5(slab) [ 34.491490] raw: 0bfffe0000000000 fff00000c59f33c0 dead000000000122 0000000000000000 [ 34.492100] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 34.492282] page dumped because: kasan: bad access detected [ 34.492835] [ 34.492894] Memory state around the buggy address: [ 34.492989] fff00000c5a99180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.493097] fff00000c5a99200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 34.493212] >fff00000c5a99280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 34.493308] ^ [ 34.493410] fff00000c5a99300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.493488] fff00000c5a99380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.493536] ================================================================== [ 34.417345] ================================================================== [ 34.417591] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 34.417738] Read of size 1 at addr fff00000c44dff73 by task kunit_try_catch/232 [ 34.417808] [ 34.417863] CPU: 1 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 34.417976] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.418009] Hardware name: linux,dummy-virt (DT) [ 34.418056] Call trace: [ 34.418090] show_stack+0x20/0x38 (C) [ 34.418153] dump_stack_lvl+0x8c/0xd0 [ 34.418212] print_report+0x118/0x608 [ 34.418269] kasan_report+0xdc/0x128 [ 34.418323] __asan_report_load1_noabort+0x20/0x30 [ 34.418381] mempool_oob_right_helper+0x2ac/0x2f0 [ 34.418437] mempool_kmalloc_oob_right+0xc4/0x120 [ 34.418492] kunit_try_run_case+0x170/0x3f0 [ 34.418551] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.418625] kthread+0x328/0x630 [ 34.418680] ret_from_fork+0x10/0x20 [ 34.418738] [ 34.418761] Allocated by task 232: [ 34.418797] kasan_save_stack+0x3c/0x68 [ 34.418850] kasan_save_track+0x20/0x40 [ 34.418895] kasan_save_alloc_info+0x40/0x58 [ 34.418944] __kasan_mempool_unpoison_object+0x11c/0x180 [ 34.418996] remove_element+0x130/0x1f8 [ 34.419041] mempool_alloc_preallocated+0x58/0xc0 [ 34.419087] mempool_oob_right_helper+0x98/0x2f0 [ 34.419131] mempool_kmalloc_oob_right+0xc4/0x120 [ 34.419176] kunit_try_run_case+0x170/0x3f0 [ 34.419245] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.419298] kthread+0x328/0x630 [ 34.419334] ret_from_fork+0x10/0x20 [ 34.419375] [ 34.419401] The buggy address belongs to the object at fff00000c44dff00 [ 34.419401] which belongs to the cache kmalloc-128 of size 128 [ 34.419495] The buggy address is located 0 bytes to the right of [ 34.419495] allocated 115-byte region [fff00000c44dff00, fff00000c44dff73) [ 34.419590] [ 34.419639] The buggy address belongs to the physical page: [ 34.419701] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044df [ 34.419784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.419867] page_type: f5(slab) [ 34.419934] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.420008] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000 [ 34.420066] page dumped because: kasan: bad access detected [ 34.420114] [ 34.420136] Memory state around the buggy address: [ 34.420191] fff00000c44dfe00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.420257] fff00000c44dfe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.420358] >fff00000c44dff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 34.420458] ^ [ 34.420541] fff00000c44dff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.420641] fff00000c44e0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.420729] ================================================================== [ 34.449189] ================================================================== [ 34.449389] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 34.449534] Read of size 1 at addr fff00000c5a42001 by task kunit_try_catch/234 [ 34.449682] [ 34.449775] CPU: 1 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 34.450004] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.450071] Hardware name: linux,dummy-virt (DT) [ 34.450144] Call trace: [ 34.450201] show_stack+0x20/0x38 (C) [ 34.450353] dump_stack_lvl+0x8c/0xd0 [ 34.450505] print_report+0x118/0x608 [ 34.450679] kasan_report+0xdc/0x128 [ 34.450831] __asan_report_load1_noabort+0x20/0x30 [ 34.450994] mempool_oob_right_helper+0x2ac/0x2f0 [ 34.451158] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 34.451279] kunit_try_run_case+0x170/0x3f0 [ 34.451451] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.451633] kthread+0x328/0x630 [ 34.451721] ret_from_fork+0x10/0x20 [ 34.451834] [ 34.451927] The buggy address belongs to the physical page: [ 34.452011] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a40 [ 34.452141] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.452383] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 34.452508] page_type: f8(unknown) [ 34.452565] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.452658] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 34.452798] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.452927] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 34.453043] head: 0bfffe0000000002 ffffc1ffc3169001 00000000ffffffff 00000000ffffffff [ 34.453135] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 34.453213] page dumped because: kasan: bad access detected [ 34.453301] [ 34.453345] Memory state around the buggy address: [ 34.453750] fff00000c5a41f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.454090] fff00000c5a41f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.454309] >fff00000c5a42000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 34.454419] ^ [ 34.454489] fff00000c5a42080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 34.454595] fff00000c5a42100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 34.454716] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 33.806679] ================================================================== [ 33.806893] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300 [ 33.807622] Read of size 1 at addr fff00000c1b9eb40 by task kunit_try_catch/226 [ 33.808264] [ 33.808423] CPU: 0 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 33.808781] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.808855] Hardware name: linux,dummy-virt (DT) [ 33.809326] Call trace: [ 33.809455] show_stack+0x20/0x38 (C) [ 33.809802] dump_stack_lvl+0x8c/0xd0 [ 33.810122] print_report+0x118/0x608 [ 33.810396] kasan_report+0xdc/0x128 [ 33.810852] __kasan_check_byte+0x54/0x70 [ 33.811833] kmem_cache_destroy+0x34/0x218 [ 33.812352] kmem_cache_double_destroy+0x174/0x300 [ 33.812881] kunit_try_run_case+0x170/0x3f0 [ 33.813094] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.813197] kthread+0x328/0x630 [ 33.813308] ret_from_fork+0x10/0x20 [ 33.813418] [ 33.813455] Allocated by task 226: [ 33.813514] kasan_save_stack+0x3c/0x68 [ 33.813591] kasan_save_track+0x20/0x40 [ 33.813689] kasan_save_alloc_info+0x40/0x58 [ 33.813771] __kasan_slab_alloc+0xa8/0xb0 [ 33.813941] kmem_cache_alloc_noprof+0x10c/0x398 [ 33.814176] __kmem_cache_create_args+0x178/0x280 [ 33.814351] kmem_cache_double_destroy+0xc0/0x300 [ 33.814451] kunit_try_run_case+0x170/0x3f0 [ 33.815162] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.815353] kthread+0x328/0x630 [ 33.815466] ret_from_fork+0x10/0x20 [ 33.815566] [ 33.815631] Freed by task 226: [ 33.815700] kasan_save_stack+0x3c/0x68 [ 33.815798] kasan_save_track+0x20/0x40 [ 33.815894] kasan_save_free_info+0x4c/0x78 [ 33.815993] __kasan_slab_free+0x6c/0x98 [ 33.816350] kmem_cache_free+0x260/0x468 [ 33.817012] slab_kmem_cache_release+0x38/0x50 [ 33.817106] kmem_cache_release+0x1c/0x30 [ 33.817175] kobject_put+0x17c/0x420 [ 33.817519] sysfs_slab_release+0x1c/0x30 [ 33.817601] kmem_cache_destroy+0x118/0x218 [ 33.817692] kmem_cache_double_destroy+0x128/0x300 [ 33.817777] kunit_try_run_case+0x170/0x3f0 [ 33.817863] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.817949] kthread+0x328/0x630 [ 33.818021] ret_from_fork+0x10/0x20 [ 33.818138] [ 33.818246] The buggy address belongs to the object at fff00000c1b9eb40 [ 33.818246] which belongs to the cache kmem_cache of size 208 [ 33.818517] The buggy address is located 0 bytes inside of [ 33.818517] freed 208-byte region [fff00000c1b9eb40, fff00000c1b9ec10) [ 33.818792] [ 33.818867] The buggy address belongs to the physical page: [ 33.818957] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101b9e [ 33.819093] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.819705] page_type: f5(slab) [ 33.819871] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000 [ 33.820122] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000 [ 33.820390] page dumped because: kasan: bad access detected [ 33.820559] [ 33.820636] Memory state around the buggy address: [ 33.820729] fff00000c1b9ea00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.820844] fff00000c1b9ea80: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 33.820954] >fff00000c1b9eb00: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 33.821054] ^ [ 33.821149] fff00000c1b9eb80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.821311] fff00000c1b9ec00: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.821645] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 33.565738] ================================================================== [ 33.565949] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468 [ 33.566124] Read of size 1 at addr fff00000c769b000 by task kunit_try_catch/224 [ 33.566258] [ 33.566353] CPU: 0 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 33.566574] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.567679] Hardware name: linux,dummy-virt (DT) [ 33.567842] Call trace: [ 33.567920] show_stack+0x20/0x38 (C) [ 33.568067] dump_stack_lvl+0x8c/0xd0 [ 33.568541] print_report+0x118/0x608 [ 33.568850] kasan_report+0xdc/0x128 [ 33.569113] __asan_report_load1_noabort+0x20/0x30 [ 33.569216] kmem_cache_rcu_uaf+0x388/0x468 [ 33.569303] kunit_try_run_case+0x170/0x3f0 [ 33.569672] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.569891] kthread+0x328/0x630 [ 33.570001] ret_from_fork+0x10/0x20 [ 33.570324] [ 33.570395] Allocated by task 224: [ 33.570537] kasan_save_stack+0x3c/0x68 [ 33.570768] kasan_save_track+0x20/0x40 [ 33.571005] kasan_save_alloc_info+0x40/0x58 [ 33.571182] __kasan_slab_alloc+0xa8/0xb0 [ 33.571324] kmem_cache_alloc_noprof+0x10c/0x398 [ 33.571652] kmem_cache_rcu_uaf+0x12c/0x468 [ 33.571752] kunit_try_run_case+0x170/0x3f0 [ 33.571997] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.572273] kthread+0x328/0x630 [ 33.572529] ret_from_fork+0x10/0x20 [ 33.572776] [ 33.573087] Freed by task 0: [ 33.573266] kasan_save_stack+0x3c/0x68 [ 33.573400] kasan_save_track+0x20/0x40 [ 33.573490] kasan_save_free_info+0x4c/0x78 [ 33.573646] __kasan_slab_free+0x6c/0x98 [ 33.573911] slab_free_after_rcu_debug+0xd4/0x2f8 [ 33.574115] rcu_core+0x9f4/0x1e20 [ 33.574273] rcu_core_si+0x18/0x30 [ 33.574419] handle_softirqs+0x374/0xb28 [ 33.574735] __do_softirq+0x1c/0x28 [ 33.574938] [ 33.574986] Last potentially related work creation: [ 33.575055] kasan_save_stack+0x3c/0x68 [ 33.575694] kasan_record_aux_stack+0xb4/0xc8 [ 33.575935] kmem_cache_free+0x120/0x468 [ 33.576030] kmem_cache_rcu_uaf+0x16c/0x468 [ 33.576374] kunit_try_run_case+0x170/0x3f0 [ 33.576478] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.576588] kthread+0x328/0x630 [ 33.576819] ret_from_fork+0x10/0x20 [ 33.577042] [ 33.577112] The buggy address belongs to the object at fff00000c769b000 [ 33.577112] which belongs to the cache test_cache of size 200 [ 33.577547] The buggy address is located 0 bytes inside of [ 33.577547] freed 200-byte region [fff00000c769b000, fff00000c769b0c8) [ 33.577683] [ 33.577810] The buggy address belongs to the physical page: [ 33.578053] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10769b [ 33.578370] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.578738] page_type: f5(slab) [ 33.578981] raw: 0bfffe0000000000 fff00000c1b9ea00 dead000000000122 0000000000000000 [ 33.579358] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 33.579556] page dumped because: kasan: bad access detected [ 33.579726] [ 33.579799] Memory state around the buggy address: [ 33.580041] fff00000c769af00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.580282] fff00000c769af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.580466] >fff00000c769b000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.580551] ^ [ 33.580618] fff00000c769b080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 33.581030] fff00000c769b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.581136] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 33.256340] ================================================================== [ 33.256659] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 33.256915] Free of addr fff00000c59f8001 by task kunit_try_catch/222 [ 33.257115] [ 33.257447] CPU: 1 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 33.257811] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.257949] Hardware name: linux,dummy-virt (DT) [ 33.258069] Call trace: [ 33.258254] show_stack+0x20/0x38 (C) [ 33.258877] dump_stack_lvl+0x8c/0xd0 [ 33.259355] print_report+0x118/0x608 [ 33.259618] kasan_report_invalid_free+0xc0/0xe8 [ 33.259897] check_slab_allocation+0xfc/0x108 [ 33.260047] __kasan_slab_pre_free+0x2c/0x48 [ 33.260168] kmem_cache_free+0xf0/0x468 [ 33.260671] kmem_cache_invalid_free+0x184/0x3c8 [ 33.260943] kunit_try_run_case+0x170/0x3f0 [ 33.261201] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.261548] kthread+0x328/0x630 [ 33.261667] ret_from_fork+0x10/0x20 [ 33.261859] [ 33.262023] Allocated by task 222: [ 33.262123] kasan_save_stack+0x3c/0x68 [ 33.262365] kasan_save_track+0x20/0x40 [ 33.262638] kasan_save_alloc_info+0x40/0x58 [ 33.263005] __kasan_slab_alloc+0xa8/0xb0 [ 33.263178] kmem_cache_alloc_noprof+0x10c/0x398 [ 33.263508] kmem_cache_invalid_free+0x12c/0x3c8 [ 33.263831] kunit_try_run_case+0x170/0x3f0 [ 33.264034] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.264299] kthread+0x328/0x630 [ 33.264450] ret_from_fork+0x10/0x20 [ 33.264542] [ 33.264593] The buggy address belongs to the object at fff00000c59f8000 [ 33.264593] which belongs to the cache test_cache of size 200 [ 33.264775] The buggy address is located 1 bytes inside of [ 33.264775] 200-byte region [fff00000c59f8000, fff00000c59f80c8) [ 33.264935] [ 33.264989] The buggy address belongs to the physical page: [ 33.265167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059f8 [ 33.265546] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.265779] page_type: f5(slab) [ 33.265949] raw: 0bfffe0000000000 fff00000c59f3140 dead000000000122 0000000000000000 [ 33.266241] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 33.266640] page dumped because: kasan: bad access detected [ 33.266852] [ 33.266951] Memory state around the buggy address: [ 33.267180] fff00000c59f7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.267453] fff00000c59f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.267571] >fff00000c59f8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.267701] ^ [ 33.267780] fff00000c59f8080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 33.267897] fff00000c59f8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.268571] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 33.159259] ================================================================== [ 33.160087] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 33.160513] Free of addr fff00000c7685000 by task kunit_try_catch/220 [ 33.160667] [ 33.160782] CPU: 0 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 33.161012] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.161094] Hardware name: linux,dummy-virt (DT) [ 33.161173] Call trace: [ 33.161220] show_stack+0x20/0x38 (C) [ 33.161344] dump_stack_lvl+0x8c/0xd0 [ 33.161465] print_report+0x118/0x608 [ 33.161591] kasan_report_invalid_free+0xc0/0xe8 [ 33.161726] check_slab_allocation+0xd4/0x108 [ 33.161892] __kasan_slab_pre_free+0x2c/0x48 [ 33.162062] kmem_cache_free+0xf0/0x468 [ 33.162187] kmem_cache_double_free+0x190/0x3c8 [ 33.162310] kunit_try_run_case+0x170/0x3f0 [ 33.162441] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.162620] kthread+0x328/0x630 [ 33.162719] ret_from_fork+0x10/0x20 [ 33.162834] [ 33.162876] Allocated by task 220: [ 33.163699] kasan_save_stack+0x3c/0x68 [ 33.163836] kasan_save_track+0x20/0x40 [ 33.163927] kasan_save_alloc_info+0x40/0x58 [ 33.164029] __kasan_slab_alloc+0xa8/0xb0 [ 33.164115] kmem_cache_alloc_noprof+0x10c/0x398 [ 33.164212] kmem_cache_double_free+0x12c/0x3c8 [ 33.164327] kunit_try_run_case+0x170/0x3f0 [ 33.164417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.164520] kthread+0x328/0x630 [ 33.164850] ret_from_fork+0x10/0x20 [ 33.164920] [ 33.164958] Freed by task 220: [ 33.165025] kasan_save_stack+0x3c/0x68 [ 33.165109] kasan_save_track+0x20/0x40 [ 33.165262] kasan_save_free_info+0x4c/0x78 [ 33.165538] __kasan_slab_free+0x6c/0x98 [ 33.165662] kmem_cache_free+0x260/0x468 [ 33.165761] kmem_cache_double_free+0x140/0x3c8 [ 33.165860] kunit_try_run_case+0x170/0x3f0 [ 33.166036] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.166261] kthread+0x328/0x630 [ 33.166342] ret_from_fork+0x10/0x20 [ 33.166710] [ 33.167051] The buggy address belongs to the object at fff00000c7685000 [ 33.167051] which belongs to the cache test_cache of size 200 [ 33.167348] The buggy address is located 0 bytes inside of [ 33.167348] 200-byte region [fff00000c7685000, fff00000c76850c8) [ 33.167843] [ 33.168089] The buggy address belongs to the physical page: [ 33.168186] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107685 [ 33.168577] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.168935] page_type: f5(slab) [ 33.169147] raw: 0bfffe0000000000 fff00000c1b9e8c0 dead000000000122 0000000000000000 [ 33.169295] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 33.169400] page dumped because: kasan: bad access detected [ 33.169459] [ 33.169491] Memory state around the buggy address: [ 33.169554] fff00000c7684f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.169645] fff00000c7684f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.170030] >fff00000c7685000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.170580] ^ [ 33.170705] fff00000c7685080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 33.170831] fff00000c7685100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.170935] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 32.827329] ================================================================== [ 32.827550] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430 [ 32.828234] Read of size 1 at addr fff00000c59f60c8 by task kunit_try_catch/218 [ 32.828819] [ 32.829212] CPU: 1 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 32.829805] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.829876] Hardware name: linux,dummy-virt (DT) [ 32.829959] Call trace: [ 32.830018] show_stack+0x20/0x38 (C) [ 32.830184] dump_stack_lvl+0x8c/0xd0 [ 32.830311] print_report+0x118/0x608 [ 32.830428] kasan_report+0xdc/0x128 [ 32.830545] __asan_report_load1_noabort+0x20/0x30 [ 32.831483] kmem_cache_oob+0x344/0x430 [ 32.831844] kunit_try_run_case+0x170/0x3f0 [ 32.831974] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.832567] kthread+0x328/0x630 [ 32.832802] ret_from_fork+0x10/0x20 [ 32.833008] [ 32.833056] Allocated by task 218: [ 32.833115] kasan_save_stack+0x3c/0x68 [ 32.833196] kasan_save_track+0x20/0x40 [ 32.833277] kasan_save_alloc_info+0x40/0x58 [ 32.833368] __kasan_slab_alloc+0xa8/0xb0 [ 32.834037] kmem_cache_alloc_noprof+0x10c/0x398 [ 32.834304] kmem_cache_oob+0x12c/0x430 [ 32.834413] kunit_try_run_case+0x170/0x3f0 [ 32.834505] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.834604] kthread+0x328/0x630 [ 32.835135] ret_from_fork+0x10/0x20 [ 32.835248] [ 32.835540] The buggy address belongs to the object at fff00000c59f6000 [ 32.835540] which belongs to the cache test_cache of size 200 [ 32.836133] The buggy address is located 0 bytes to the right of [ 32.836133] allocated 200-byte region [fff00000c59f6000, fff00000c59f60c8) [ 32.836388] [ 32.836555] The buggy address belongs to the physical page: [ 32.836662] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059f6 [ 32.836899] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.837019] page_type: f5(slab) [ 32.837607] raw: 0bfffe0000000000 fff00000c59f3000 dead000000000122 0000000000000000 [ 32.837841] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 32.838050] page dumped because: kasan: bad access detected [ 32.838290] [ 32.838359] Memory state around the buggy address: [ 32.838445] fff00000c59f5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.838736] fff00000c59f6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.838857] >fff00000c59f6080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 32.838966] ^ [ 32.839065] fff00000c59f6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.840335] fff00000c59f6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.840798] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 32.711354] ================================================================== [ 32.711579] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 32.712922] Read of size 8 at addr fff00000c59d4c40 by task kunit_try_catch/211 [ 32.713046] [ 32.713206] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 32.713480] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.713596] Hardware name: linux,dummy-virt (DT) [ 32.713805] Call trace: [ 32.713946] show_stack+0x20/0x38 (C) [ 32.714238] dump_stack_lvl+0x8c/0xd0 [ 32.714475] print_report+0x118/0x608 [ 32.714837] kasan_report+0xdc/0x128 [ 32.715176] __asan_report_load8_noabort+0x20/0x30 [ 32.715580] workqueue_uaf+0x480/0x4a8 [ 32.715871] kunit_try_run_case+0x170/0x3f0 [ 32.716048] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.716262] kthread+0x328/0x630 [ 32.716463] ret_from_fork+0x10/0x20 [ 32.716704] [ 32.716841] Allocated by task 211: [ 32.716920] kasan_save_stack+0x3c/0x68 [ 32.717271] kasan_save_track+0x20/0x40 [ 32.717359] kasan_save_alloc_info+0x40/0x58 [ 32.717436] __kasan_kmalloc+0xd4/0xd8 [ 32.717539] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.717650] workqueue_uaf+0x13c/0x4a8 [ 32.717741] kunit_try_run_case+0x170/0x3f0 [ 32.717840] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.717969] kthread+0x328/0x630 [ 32.718128] ret_from_fork+0x10/0x20 [ 32.718281] [ 32.718336] Freed by task 42: [ 32.718405] kasan_save_stack+0x3c/0x68 [ 32.718744] kasan_save_track+0x20/0x40 [ 32.718855] kasan_save_free_info+0x4c/0x78 [ 32.718966] __kasan_slab_free+0x6c/0x98 [ 32.719062] kfree+0x214/0x3c8 [ 32.719203] workqueue_uaf_work+0x18/0x30 [ 32.719302] process_one_work+0x530/0xf98 [ 32.719397] worker_thread+0x618/0xf38 [ 32.719883] kthread+0x328/0x630 [ 32.719999] ret_from_fork+0x10/0x20 [ 32.720102] [ 32.721107] Last potentially related work creation: [ 32.721194] kasan_save_stack+0x3c/0x68 [ 32.721262] kasan_record_aux_stack+0xb4/0xc8 [ 32.721309] __queue_work+0x65c/0xfe0 [ 32.721382] queue_work_on+0xbc/0xf8 [ 32.721425] workqueue_uaf+0x210/0x4a8 [ 32.721468] kunit_try_run_case+0x170/0x3f0 [ 32.721513] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.721564] kthread+0x328/0x630 [ 32.721600] ret_from_fork+0x10/0x20 [ 32.721688] [ 32.721731] The buggy address belongs to the object at fff00000c59d4c40 [ 32.721731] which belongs to the cache kmalloc-32 of size 32 [ 32.721882] The buggy address is located 0 bytes inside of [ 32.721882] freed 32-byte region [fff00000c59d4c40, fff00000c59d4c60) [ 32.722040] [ 32.722099] The buggy address belongs to the physical page: [ 32.722382] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059d4 [ 32.722526] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.722680] page_type: f5(slab) [ 32.722951] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 32.723081] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 32.723190] page dumped because: kasan: bad access detected [ 32.723281] [ 32.723323] Memory state around the buggy address: [ 32.723405] fff00000c59d4b00: 00 00 00 fc fc fc fc fc 00 00 03 fc fc fc fc fc [ 32.723913] fff00000c59d4b80: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 32.724063] >fff00000c59d4c00: 00 00 00 07 fc fc fc fc fa fb fb fb fc fc fc fc [ 32.724261] ^ [ 32.724367] fff00000c59d4c80: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.724450] fff00000c59d4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.724521] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[ 32.306994] ================================================================== [ 32.307493] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 32.307869] Read of size 1 at addr fff00000c596cda8 by task kunit_try_catch/199 [ 32.308009] [ 32.308152] CPU: 1 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 32.308469] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.308578] Hardware name: linux,dummy-virt (DT) [ 32.308667] Call trace: [ 32.308722] show_stack+0x20/0x38 (C) [ 32.308913] dump_stack_lvl+0x8c/0xd0 [ 32.309287] print_report+0x118/0x608 [ 32.309607] kasan_report+0xdc/0x128 [ 32.309797] __asan_report_load1_noabort+0x20/0x30 [ 32.309976] kmalloc_uaf2+0x3f4/0x468 [ 32.310126] kunit_try_run_case+0x170/0x3f0 [ 32.310302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.310441] kthread+0x328/0x630 [ 32.310547] ret_from_fork+0x10/0x20 [ 32.310686] [ 32.310732] Allocated by task 199: [ 32.310964] kasan_save_stack+0x3c/0x68 [ 32.311283] kasan_save_track+0x20/0x40 [ 32.311480] kasan_save_alloc_info+0x40/0x58 [ 32.311601] __kasan_kmalloc+0xd4/0xd8 [ 32.311752] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.311867] kmalloc_uaf2+0xc4/0x468 [ 32.311977] kunit_try_run_case+0x170/0x3f0 [ 32.312101] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.312236] kthread+0x328/0x630 [ 32.312421] ret_from_fork+0x10/0x20 [ 32.312517] [ 32.312572] Freed by task 199: [ 32.312654] kasan_save_stack+0x3c/0x68 [ 32.312956] kasan_save_track+0x20/0x40 [ 32.313048] kasan_save_free_info+0x4c/0x78 [ 32.313145] __kasan_slab_free+0x6c/0x98 [ 32.313254] kfree+0x214/0x3c8 [ 32.313367] kmalloc_uaf2+0x134/0x468 [ 32.313457] kunit_try_run_case+0x170/0x3f0 [ 32.313585] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.313740] kthread+0x328/0x630 [ 32.313882] ret_from_fork+0x10/0x20 [ 32.314083] [ 32.314157] The buggy address belongs to the object at fff00000c596cd80 [ 32.314157] which belongs to the cache kmalloc-64 of size 64 [ 32.314444] The buggy address is located 40 bytes inside of [ 32.314444] freed 64-byte region [fff00000c596cd80, fff00000c596cdc0) [ 32.314652] [ 32.314711] The buggy address belongs to the physical page: [ 32.314792] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10596c [ 32.314930] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.315216] page_type: f5(slab) [ 32.315569] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.315812] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.315926] page dumped because: kasan: bad access detected [ 32.316012] [ 32.316057] Memory state around the buggy address: [ 32.316144] fff00000c596cc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.316254] fff00000c596cd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.316376] >fff00000c596cd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.316482] ^ [ 32.316681] fff00000c596ce00: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 32.317036] fff00000c596ce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.317144] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 32.262396] ================================================================== [ 32.262601] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 32.263201] Write of size 33 at addr fff00000c596cc00 by task kunit_try_catch/197 [ 32.263446] [ 32.263605] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 32.264202] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.264384] Hardware name: linux,dummy-virt (DT) [ 32.264725] Call trace: [ 32.264806] show_stack+0x20/0x38 (C) [ 32.264967] dump_stack_lvl+0x8c/0xd0 [ 32.265155] print_report+0x118/0x608 [ 32.265364] kasan_report+0xdc/0x128 [ 32.265700] kasan_check_range+0x100/0x1a8 [ 32.266001] __asan_memset+0x34/0x78 [ 32.266115] kmalloc_uaf_memset+0x170/0x310 [ 32.266253] kunit_try_run_case+0x170/0x3f0 [ 32.266395] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.266592] kthread+0x328/0x630 [ 32.266774] ret_from_fork+0x10/0x20 [ 32.266957] [ 32.267030] Allocated by task 197: [ 32.267136] kasan_save_stack+0x3c/0x68 [ 32.267287] kasan_save_track+0x20/0x40 [ 32.267398] kasan_save_alloc_info+0x40/0x58 [ 32.267522] __kasan_kmalloc+0xd4/0xd8 [ 32.267903] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.268020] kmalloc_uaf_memset+0xb8/0x310 [ 32.268403] kunit_try_run_case+0x170/0x3f0 [ 32.268460] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.268536] kthread+0x328/0x630 [ 32.268591] ret_from_fork+0x10/0x20 [ 32.268781] [ 32.268837] Freed by task 197: [ 32.268914] kasan_save_stack+0x3c/0x68 [ 32.269029] kasan_save_track+0x20/0x40 [ 32.269125] kasan_save_free_info+0x4c/0x78 [ 32.269204] __kasan_slab_free+0x6c/0x98 [ 32.269269] kfree+0x214/0x3c8 [ 32.269326] kmalloc_uaf_memset+0x11c/0x310 [ 32.269442] kunit_try_run_case+0x170/0x3f0 [ 32.269540] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.269664] kthread+0x328/0x630 [ 32.269756] ret_from_fork+0x10/0x20 [ 32.269842] [ 32.269897] The buggy address belongs to the object at fff00000c596cc00 [ 32.269897] which belongs to the cache kmalloc-64 of size 64 [ 32.270058] The buggy address is located 0 bytes inside of [ 32.270058] freed 64-byte region [fff00000c596cc00, fff00000c596cc40) [ 32.270226] [ 32.270282] The buggy address belongs to the physical page: [ 32.270358] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10596c [ 32.270510] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.271324] page_type: f5(slab) [ 32.271457] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.271595] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.272088] page dumped because: kasan: bad access detected [ 32.272189] [ 32.272754] Memory state around the buggy address: [ 32.272862] fff00000c596cb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.273109] fff00000c596cb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.273471] >fff00000c596cc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.273681] ^ [ 32.273824] fff00000c596cc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.273937] fff00000c596cd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.274541] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[ 32.218110] ================================================================== [ 32.218316] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 32.218472] Read of size 1 at addr fff00000c58d29a8 by task kunit_try_catch/195 [ 32.218599] [ 32.220105] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 32.221384] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.221914] Hardware name: linux,dummy-virt (DT) [ 32.222003] Call trace: [ 32.222102] show_stack+0x20/0x38 (C) [ 32.222442] dump_stack_lvl+0x8c/0xd0 [ 32.222647] print_report+0x118/0x608 [ 32.222893] kasan_report+0xdc/0x128 [ 32.223188] __asan_report_load1_noabort+0x20/0x30 [ 32.224098] kmalloc_uaf+0x300/0x338 [ 32.224505] kunit_try_run_case+0x170/0x3f0 [ 32.224727] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.224870] kthread+0x328/0x630 [ 32.224980] ret_from_fork+0x10/0x20 [ 32.225099] [ 32.225141] Allocated by task 195: [ 32.225199] kasan_save_stack+0x3c/0x68 [ 32.225279] kasan_save_track+0x20/0x40 [ 32.225363] kasan_save_alloc_info+0x40/0x58 [ 32.226460] __kasan_kmalloc+0xd4/0xd8 [ 32.226917] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.227496] kmalloc_uaf+0xb8/0x338 [ 32.227720] kunit_try_run_case+0x170/0x3f0 [ 32.227902] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.228149] kthread+0x328/0x630 [ 32.228492] ret_from_fork+0x10/0x20 [ 32.229309] [ 32.229378] Freed by task 195: [ 32.229492] kasan_save_stack+0x3c/0x68 [ 32.229727] kasan_save_track+0x20/0x40 [ 32.229945] kasan_save_free_info+0x4c/0x78 [ 32.230067] __kasan_slab_free+0x6c/0x98 [ 32.230284] kfree+0x214/0x3c8 [ 32.230382] kmalloc_uaf+0x11c/0x338 [ 32.231055] kunit_try_run_case+0x170/0x3f0 [ 32.231304] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.231900] kthread+0x328/0x630 [ 32.232083] ret_from_fork+0x10/0x20 [ 32.232357] [ 32.232473] The buggy address belongs to the object at fff00000c58d29a0 [ 32.232473] which belongs to the cache kmalloc-16 of size 16 [ 32.232653] The buggy address is located 8 bytes inside of [ 32.232653] freed 16-byte region [fff00000c58d29a0, fff00000c58d29b0) [ 32.232791] [ 32.232840] The buggy address belongs to the physical page: [ 32.232906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d2 [ 32.234144] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.234764] page_type: f5(slab) [ 32.235381] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 32.235599] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 32.235721] page dumped because: kasan: bad access detected [ 32.236350] [ 32.236538] Memory state around the buggy address: [ 32.236729] fff00000c58d2880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.237115] fff00000c58d2900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.237216] >fff00000c58d2980: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 32.237288] ^ [ 32.237353] fff00000c58d2a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.237428] fff00000c58d2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.237878] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 32.186812] ================================================================== [ 32.187093] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0 [ 32.187254] Read of size 64 at addr fff00000c596c904 by task kunit_try_catch/193 [ 32.187791] [ 32.187893] CPU: 1 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 32.188118] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.188180] Hardware name: linux,dummy-virt (DT) [ 32.188260] Call trace: [ 32.188374] show_stack+0x20/0x38 (C) [ 32.188816] dump_stack_lvl+0x8c/0xd0 [ 32.188996] print_report+0x118/0x608 [ 32.189159] kasan_report+0xdc/0x128 [ 32.189334] kasan_check_range+0x100/0x1a8 [ 32.189505] __asan_memmove+0x3c/0x98 [ 32.189597] kmalloc_memmove_invalid_size+0x154/0x2e0 [ 32.189719] kunit_try_run_case+0x170/0x3f0 [ 32.189992] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.190149] kthread+0x328/0x630 [ 32.190260] ret_from_fork+0x10/0x20 [ 32.190461] [ 32.190532] Allocated by task 193: [ 32.190721] kasan_save_stack+0x3c/0x68 [ 32.190840] kasan_save_track+0x20/0x40 [ 32.190933] kasan_save_alloc_info+0x40/0x58 [ 32.191031] __kasan_kmalloc+0xd4/0xd8 [ 32.191398] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.191554] kmalloc_memmove_invalid_size+0xb0/0x2e0 [ 32.191679] kunit_try_run_case+0x170/0x3f0 [ 32.191834] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.191958] kthread+0x328/0x630 [ 32.192041] ret_from_fork+0x10/0x20 [ 32.192134] [ 32.192185] The buggy address belongs to the object at fff00000c596c900 [ 32.192185] which belongs to the cache kmalloc-64 of size 64 [ 32.192409] The buggy address is located 4 bytes inside of [ 32.192409] allocated 64-byte region [fff00000c596c900, fff00000c596c940) [ 32.192599] [ 32.192660] The buggy address belongs to the physical page: [ 32.192742] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10596c [ 32.192905] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.193023] page_type: f5(slab) [ 32.193362] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.193552] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.193713] page dumped because: kasan: bad access detected [ 32.193797] [ 32.193849] Memory state around the buggy address: [ 32.193956] fff00000c596c800: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc [ 32.194074] fff00000c596c880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.194183] >fff00000c596c900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 32.194489] ^ [ 32.194694] fff00000c596c980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.194866] fff00000c596ca00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.195019] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[ 32.070623] ================================================================== [ 32.071382] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 32.071575] Write of size 16 at addr fff00000c44df969 by task kunit_try_catch/189 [ 32.071719] [ 32.071814] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 32.072037] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.072107] Hardware name: linux,dummy-virt (DT) [ 32.072189] Call trace: [ 32.072249] show_stack+0x20/0x38 (C) [ 32.073260] dump_stack_lvl+0x8c/0xd0 [ 32.074082] print_report+0x118/0x608 [ 32.074472] kasan_report+0xdc/0x128 [ 32.075008] kasan_check_range+0x100/0x1a8 [ 32.075336] __asan_memset+0x34/0x78 [ 32.075459] kmalloc_oob_memset_16+0x150/0x2f8 [ 32.076029] kunit_try_run_case+0x170/0x3f0 [ 32.076470] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.076732] kthread+0x328/0x630 [ 32.076817] ret_from_fork+0x10/0x20 [ 32.076907] [ 32.076945] Allocated by task 189: [ 32.077011] kasan_save_stack+0x3c/0x68 [ 32.077112] kasan_save_track+0x20/0x40 [ 32.078108] kasan_save_alloc_info+0x40/0x58 [ 32.078236] __kasan_kmalloc+0xd4/0xd8 [ 32.078647] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.079009] kmalloc_oob_memset_16+0xb0/0x2f8 [ 32.079375] kunit_try_run_case+0x170/0x3f0 [ 32.079490] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.079773] kthread+0x328/0x630 [ 32.080086] ret_from_fork+0x10/0x20 [ 32.080419] [ 32.080729] The buggy address belongs to the object at fff00000c44df900 [ 32.080729] which belongs to the cache kmalloc-128 of size 128 [ 32.081176] The buggy address is located 105 bytes inside of [ 32.081176] allocated 120-byte region [fff00000c44df900, fff00000c44df978) [ 32.081588] [ 32.081682] The buggy address belongs to the physical page: [ 32.081787] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044df [ 32.082128] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.082232] page_type: f5(slab) [ 32.082664] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.082890] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.083039] page dumped because: kasan: bad access detected [ 32.083150] [ 32.083350] Memory state around the buggy address: [ 32.083547] fff00000c44df800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.083675] fff00000c44df880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.084050] >fff00000c44df900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.084354] ^ [ 32.084477] fff00000c44df980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.084814] fff00000c44dfa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.084897] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[ 32.013591] ================================================================== [ 32.013796] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 32.013932] Write of size 8 at addr fff00000c44df871 by task kunit_try_catch/187 [ 32.014031] [ 32.014115] CPU: 1 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 32.014337] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.014450] Hardware name: linux,dummy-virt (DT) [ 32.014521] Call trace: [ 32.014572] show_stack+0x20/0x38 (C) [ 32.014697] dump_stack_lvl+0x8c/0xd0 [ 32.014786] print_report+0x118/0x608 [ 32.014889] kasan_report+0xdc/0x128 [ 32.014995] kasan_check_range+0x100/0x1a8 [ 32.015128] __asan_memset+0x34/0x78 [ 32.015251] kmalloc_oob_memset_8+0x150/0x2f8 [ 32.015396] kunit_try_run_case+0x170/0x3f0 [ 32.015540] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.015708] kthread+0x328/0x630 [ 32.015838] ret_from_fork+0x10/0x20 [ 32.015982] [ 32.016038] Allocated by task 187: [ 32.016109] kasan_save_stack+0x3c/0x68 [ 32.016240] kasan_save_track+0x20/0x40 [ 32.016360] kasan_save_alloc_info+0x40/0x58 [ 32.016452] __kasan_kmalloc+0xd4/0xd8 [ 32.016526] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.016628] kmalloc_oob_memset_8+0xb0/0x2f8 [ 32.016710] kunit_try_run_case+0x170/0x3f0 [ 32.016786] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.016867] kthread+0x328/0x630 [ 32.016959] ret_from_fork+0x10/0x20 [ 32.017042] [ 32.017088] The buggy address belongs to the object at fff00000c44df800 [ 32.017088] which belongs to the cache kmalloc-128 of size 128 [ 32.017274] The buggy address is located 113 bytes inside of [ 32.017274] allocated 120-byte region [fff00000c44df800, fff00000c44df878) [ 32.017436] [ 32.017512] The buggy address belongs to the physical page: [ 32.017626] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044df [ 32.017779] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.017964] page_type: f5(slab) [ 32.018068] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.018204] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.018331] page dumped because: kasan: bad access detected [ 32.018439] [ 32.018501] Memory state around the buggy address: [ 32.018618] fff00000c44df700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.018711] fff00000c44df780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.018808] >fff00000c44df800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.018885] ^ [ 32.018978] fff00000c44df880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.019071] fff00000c44df900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.019185] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[ 31.979622] ================================================================== [ 31.979816] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 31.979971] Write of size 4 at addr fff00000c44df775 by task kunit_try_catch/185 [ 31.980100] [ 31.980193] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 31.981244] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.981332] Hardware name: linux,dummy-virt (DT) [ 31.981394] Call trace: [ 31.981447] show_stack+0x20/0x38 (C) [ 31.981568] dump_stack_lvl+0x8c/0xd0 [ 31.981683] print_report+0x118/0x608 [ 31.981785] kasan_report+0xdc/0x128 [ 31.981879] kasan_check_range+0x100/0x1a8 [ 31.981983] __asan_memset+0x34/0x78 [ 31.982073] kmalloc_oob_memset_4+0x150/0x300 [ 31.982171] kunit_try_run_case+0x170/0x3f0 [ 31.982277] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.982386] kthread+0x328/0x630 [ 31.982478] ret_from_fork+0x10/0x20 [ 31.982589] [ 31.982649] Allocated by task 185: [ 31.982712] kasan_save_stack+0x3c/0x68 [ 31.982807] kasan_save_track+0x20/0x40 [ 31.982882] kasan_save_alloc_info+0x40/0x58 [ 31.982975] __kasan_kmalloc+0xd4/0xd8 [ 31.983064] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.983151] kmalloc_oob_memset_4+0xb0/0x300 [ 31.983234] kunit_try_run_case+0x170/0x3f0 [ 31.983320] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.983426] kthread+0x328/0x630 [ 31.983508] ret_from_fork+0x10/0x20 [ 31.983591] [ 31.983647] The buggy address belongs to the object at fff00000c44df700 [ 31.983647] which belongs to the cache kmalloc-128 of size 128 [ 31.983765] The buggy address is located 117 bytes inside of [ 31.983765] allocated 120-byte region [fff00000c44df700, fff00000c44df778) [ 31.983878] [ 31.983947] The buggy address belongs to the physical page: [ 31.984032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044df [ 31.984257] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.984520] page_type: f5(slab) [ 31.985431] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.985641] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.985835] page dumped because: kasan: bad access detected [ 31.985920] [ 31.985967] Memory state around the buggy address: [ 31.986049] fff00000c44df600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.986163] fff00000c44df680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.986276] >fff00000c44df700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 31.986375] ^ [ 31.986974] fff00000c44df780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.987159] fff00000c44df800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.987372] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 31.916091] ================================================================== [ 31.916275] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 31.916519] Write of size 128 at addr fff00000c44df600 by task kunit_try_catch/181 [ 31.917355] [ 31.917409] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 31.917514] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.917543] Hardware name: linux,dummy-virt (DT) [ 31.917582] Call trace: [ 31.917632] show_stack+0x20/0x38 (C) [ 31.917752] dump_stack_lvl+0x8c/0xd0 [ 31.917848] print_report+0x118/0x608 [ 31.917919] kasan_report+0xdc/0x128 [ 31.918008] kasan_check_range+0x100/0x1a8 [ 31.918063] __asan_memset+0x34/0x78 [ 31.918110] kmalloc_oob_in_memset+0x144/0x2d0 [ 31.918162] kunit_try_run_case+0x170/0x3f0 [ 31.918214] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.918272] kthread+0x328/0x630 [ 31.918317] ret_from_fork+0x10/0x20 [ 31.918373] [ 31.918398] Allocated by task 181: [ 31.918431] kasan_save_stack+0x3c/0x68 [ 31.918483] kasan_save_track+0x20/0x40 [ 31.918525] kasan_save_alloc_info+0x40/0x58 [ 31.918570] __kasan_kmalloc+0xd4/0xd8 [ 31.918624] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.918674] kmalloc_oob_in_memset+0xb0/0x2d0 [ 31.918715] kunit_try_run_case+0x170/0x3f0 [ 31.918756] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.918803] kthread+0x328/0x630 [ 31.918838] ret_from_fork+0x10/0x20 [ 31.918878] [ 31.918902] The buggy address belongs to the object at fff00000c44df600 [ 31.918902] which belongs to the cache kmalloc-128 of size 128 [ 31.918968] The buggy address is located 0 bytes inside of [ 31.918968] allocated 120-byte region [fff00000c44df600, fff00000c44df678) [ 31.919035] [ 31.919061] The buggy address belongs to the physical page: [ 31.919098] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044df [ 31.919159] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.919221] page_type: f5(slab) [ 31.919273] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.919329] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.919376] page dumped because: kasan: bad access detected [ 31.919410] [ 31.919449] Memory state around the buggy address: [ 31.919498] fff00000c44df500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.919547] fff00000c44df580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.919593] >fff00000c44df600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 31.920053] ^ [ 31.920183] fff00000c44df680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.920304] fff00000c44df700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.920410] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[ 31.894063] ================================================================== [ 31.894278] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 31.894433] Read of size 16 at addr fff00000c58d2980 by task kunit_try_catch/179 [ 31.894593] [ 31.894702] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 31.895013] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.895107] Hardware name: linux,dummy-virt (DT) [ 31.895220] Call trace: [ 31.895305] show_stack+0x20/0x38 (C) [ 31.895494] dump_stack_lvl+0x8c/0xd0 [ 31.895670] print_report+0x118/0x608 [ 31.895798] kasan_report+0xdc/0x128 [ 31.895943] __asan_report_load16_noabort+0x20/0x30 [ 31.896111] kmalloc_uaf_16+0x3bc/0x438 [ 31.896264] kunit_try_run_case+0x170/0x3f0 [ 31.896427] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.896550] kthread+0x328/0x630 [ 31.896821] ret_from_fork+0x10/0x20 [ 31.897166] [ 31.897211] Allocated by task 179: [ 31.897315] kasan_save_stack+0x3c/0x68 [ 31.897441] kasan_save_track+0x20/0x40 [ 31.897552] kasan_save_alloc_info+0x40/0x58 [ 31.897742] __kasan_kmalloc+0xd4/0xd8 [ 31.897841] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.897929] kmalloc_uaf_16+0x140/0x438 [ 31.898012] kunit_try_run_case+0x170/0x3f0 [ 31.898157] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.898252] kthread+0x328/0x630 [ 31.898325] ret_from_fork+0x10/0x20 [ 31.898405] [ 31.898453] Freed by task 179: [ 31.898506] kasan_save_stack+0x3c/0x68 [ 31.898575] kasan_save_track+0x20/0x40 [ 31.898703] kasan_save_free_info+0x4c/0x78 [ 31.898804] __kasan_slab_free+0x6c/0x98 [ 31.898901] kfree+0x214/0x3c8 [ 31.899080] kmalloc_uaf_16+0x190/0x438 [ 31.899275] kunit_try_run_case+0x170/0x3f0 [ 31.899406] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.899547] kthread+0x328/0x630 [ 31.899725] ret_from_fork+0x10/0x20 [ 31.899854] [ 31.899900] The buggy address belongs to the object at fff00000c58d2980 [ 31.899900] which belongs to the cache kmalloc-16 of size 16 [ 31.900110] The buggy address is located 0 bytes inside of [ 31.900110] freed 16-byte region [fff00000c58d2980, fff00000c58d2990) [ 31.900268] [ 31.900356] The buggy address belongs to the physical page: [ 31.900430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d2 [ 31.900655] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.900848] page_type: f5(slab) [ 31.900991] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 31.901172] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 31.901321] page dumped because: kasan: bad access detected [ 31.901422] [ 31.901488] Memory state around the buggy address: [ 31.901602] fff00000c58d2880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.901741] fff00000c58d2900: fa fb fc fc fa fb fc fc fa fb fc fc 00 00 fc fc [ 31.901825] >fff00000c58d2980: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.901896] ^ [ 31.901976] fff00000c58d2a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.902075] fff00000c58d2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.902171] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[ 31.870275] ================================================================== [ 31.870476] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 31.870648] Write of size 16 at addr fff00000c58d2920 by task kunit_try_catch/177 [ 31.870763] [ 31.870850] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 31.871066] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.871167] Hardware name: linux,dummy-virt (DT) [ 31.871263] Call trace: [ 31.871324] show_stack+0x20/0x38 (C) [ 31.871477] dump_stack_lvl+0x8c/0xd0 [ 31.871587] print_report+0x118/0x608 [ 31.871733] kasan_report+0xdc/0x128 [ 31.871875] __asan_report_store16_noabort+0x20/0x30 [ 31.872029] kmalloc_oob_16+0x3a0/0x3f8 [ 31.872160] kunit_try_run_case+0x170/0x3f0 [ 31.872301] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.872459] kthread+0x328/0x630 [ 31.872556] ret_from_fork+0x10/0x20 [ 31.872681] [ 31.872723] Allocated by task 177: [ 31.872831] kasan_save_stack+0x3c/0x68 [ 31.872950] kasan_save_track+0x20/0x40 [ 31.873022] kasan_save_alloc_info+0x40/0x58 [ 31.873096] __kasan_kmalloc+0xd4/0xd8 [ 31.873174] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.873256] kmalloc_oob_16+0xb4/0x3f8 [ 31.873338] kunit_try_run_case+0x170/0x3f0 [ 31.873458] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.873591] kthread+0x328/0x630 [ 31.873707] ret_from_fork+0x10/0x20 [ 31.873808] [ 31.873855] The buggy address belongs to the object at fff00000c58d2920 [ 31.873855] which belongs to the cache kmalloc-16 of size 16 [ 31.874017] The buggy address is located 0 bytes inside of [ 31.874017] allocated 13-byte region [fff00000c58d2920, fff00000c58d292d) [ 31.874214] [ 31.874289] The buggy address belongs to the physical page: [ 31.874398] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058d2 [ 31.874591] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.874763] page_type: f5(slab) [ 31.874880] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 31.875064] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 31.875210] page dumped because: kasan: bad access detected [ 31.875297] [ 31.875360] Memory state around the buggy address: [ 31.875454] fff00000c58d2800: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 31.875582] fff00000c58d2880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.875734] >fff00000c58d2900: fa fb fc fc 00 05 fc fc 00 00 fc fc fc fc fc fc [ 31.875835] ^ [ 31.875921] fff00000c58d2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.876081] fff00000c58d2a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.876190] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 31.819452] ================================================================== [ 31.820586] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 31.821153] Read of size 1 at addr fff00000c4497000 by task kunit_try_catch/175 [ 31.821351] [ 31.821644] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 31.822184] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.822257] Hardware name: linux,dummy-virt (DT) [ 31.822747] Call trace: [ 31.822913] show_stack+0x20/0x38 (C) [ 31.823240] dump_stack_lvl+0x8c/0xd0 [ 31.823524] print_report+0x118/0x608 [ 31.824877] kasan_report+0xdc/0x128 [ 31.825191] __kasan_check_byte+0x54/0x70 [ 31.825329] krealloc_noprof+0x44/0x360 [ 31.825461] krealloc_uaf+0x180/0x520 [ 31.825575] kunit_try_run_case+0x170/0x3f0 [ 31.825676] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.825780] kthread+0x328/0x630 [ 31.825875] ret_from_fork+0x10/0x20 [ 31.826123] [ 31.826257] Allocated by task 175: [ 31.826345] kasan_save_stack+0x3c/0x68 [ 31.826553] kasan_save_track+0x20/0x40 [ 31.826881] kasan_save_alloc_info+0x40/0x58 [ 31.827189] __kasan_kmalloc+0xd4/0xd8 [ 31.827388] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.827766] krealloc_uaf+0xc8/0x520 [ 31.827869] kunit_try_run_case+0x170/0x3f0 [ 31.828404] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.828640] kthread+0x328/0x630 [ 31.828784] ret_from_fork+0x10/0x20 [ 31.828861] [ 31.828964] Freed by task 175: [ 31.829317] kasan_save_stack+0x3c/0x68 [ 31.829547] kasan_save_track+0x20/0x40 [ 31.829659] kasan_save_free_info+0x4c/0x78 [ 31.829756] __kasan_slab_free+0x6c/0x98 [ 31.829859] kfree+0x214/0x3c8 [ 31.829944] krealloc_uaf+0x12c/0x520 [ 31.830338] kunit_try_run_case+0x170/0x3f0 [ 31.830560] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.830839] kthread+0x328/0x630 [ 31.830965] ret_from_fork+0x10/0x20 [ 31.831173] [ 31.831460] The buggy address belongs to the object at fff00000c4497000 [ 31.831460] which belongs to the cache kmalloc-256 of size 256 [ 31.831809] The buggy address is located 0 bytes inside of [ 31.831809] freed 256-byte region [fff00000c4497000, fff00000c4497100) [ 31.832071] [ 31.832220] The buggy address belongs to the physical page: [ 31.832429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104496 [ 31.832836] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.833012] anon flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.833214] page_type: f5(slab) [ 31.833305] raw: 0bfffe0000000040 fff00000c0001b40 0000000000000000 dead000000000001 [ 31.833394] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.833483] head: 0bfffe0000000040 fff00000c0001b40 0000000000000000 dead000000000001 [ 31.833591] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.833727] head: 0bfffe0000000001 ffffc1ffc3112581 00000000ffffffff 00000000ffffffff [ 31.833854] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 31.833959] page dumped because: kasan: bad access detected [ 31.834041] [ 31.834091] Memory state around the buggy address: [ 31.834177] fff00000c4496f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.834288] fff00000c4496f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.834396] >fff00000c4497000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.834498] ^ [ 31.834576] fff00000c4497080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.835432] fff00000c4497100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.835551] ================================================================== [ 31.840083] ================================================================== [ 31.840404] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 31.840556] Read of size 1 at addr fff00000c4497000 by task kunit_try_catch/175 [ 31.841185] [ 31.841468] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 31.841908] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.842054] Hardware name: linux,dummy-virt (DT) [ 31.842216] Call trace: [ 31.842357] show_stack+0x20/0x38 (C) [ 31.842735] dump_stack_lvl+0x8c/0xd0 [ 31.842929] print_report+0x118/0x608 [ 31.843307] kasan_report+0xdc/0x128 [ 31.843549] __asan_report_load1_noabort+0x20/0x30 [ 31.843846] krealloc_uaf+0x4c8/0x520 [ 31.843967] kunit_try_run_case+0x170/0x3f0 [ 31.844458] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.844583] kthread+0x328/0x630 [ 31.844699] ret_from_fork+0x10/0x20 [ 31.844794] [ 31.844830] Allocated by task 175: [ 31.844883] kasan_save_stack+0x3c/0x68 [ 31.844973] kasan_save_track+0x20/0x40 [ 31.845228] kasan_save_alloc_info+0x40/0x58 [ 31.845462] __kasan_kmalloc+0xd4/0xd8 [ 31.846099] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.846434] krealloc_uaf+0xc8/0x520 [ 31.846546] kunit_try_run_case+0x170/0x3f0 [ 31.846659] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.847114] kthread+0x328/0x630 [ 31.847213] ret_from_fork+0x10/0x20 [ 31.847386] [ 31.847450] Freed by task 175: [ 31.847518] kasan_save_stack+0x3c/0x68 [ 31.847631] kasan_save_track+0x20/0x40 [ 31.847932] kasan_save_free_info+0x4c/0x78 [ 31.848222] __kasan_slab_free+0x6c/0x98 [ 31.848604] kfree+0x214/0x3c8 [ 31.848720] krealloc_uaf+0x12c/0x520 [ 31.848800] kunit_try_run_case+0x170/0x3f0 [ 31.848888] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.849190] kthread+0x328/0x630 [ 31.849342] ret_from_fork+0x10/0x20 [ 31.849447] [ 31.849497] The buggy address belongs to the object at fff00000c4497000 [ 31.849497] which belongs to the cache kmalloc-256 of size 256 [ 31.849998] The buggy address is located 0 bytes inside of [ 31.849998] freed 256-byte region [fff00000c4497000, fff00000c4497100) [ 31.850417] [ 31.850509] The buggy address belongs to the physical page: [ 31.850665] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104496 [ 31.851072] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.851520] anon flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.851707] page_type: f5(slab) [ 31.851814] raw: 0bfffe0000000040 fff00000c0001b40 0000000000000000 dead000000000001 [ 31.851944] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.852076] head: 0bfffe0000000040 fff00000c0001b40 0000000000000000 dead000000000001 [ 31.852206] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.852757] head: 0bfffe0000000001 ffffc1ffc3112581 00000000ffffffff 00000000ffffffff [ 31.852964] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 31.853018] page dumped because: kasan: bad access detected [ 31.853055] [ 31.853076] Memory state around the buggy address: [ 31.853116] fff00000c4496f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.853165] fff00000c4496f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.853212] >fff00000c4497000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.853258] ^ [ 31.853291] fff00000c4497080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.853337] fff00000c4497100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.853379] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 31.590453] ================================================================== [ 31.590583] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 31.590727] Write of size 1 at addr fff00000c44972eb by task kunit_try_catch/169 [ 31.590855] [ 31.590939] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 31.591152] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.591217] Hardware name: linux,dummy-virt (DT) [ 31.591296] Call trace: [ 31.591355] show_stack+0x20/0x38 (C) [ 31.591489] dump_stack_lvl+0x8c/0xd0 [ 31.591603] print_report+0x118/0x608 [ 31.592793] kasan_report+0xdc/0x128 [ 31.592925] __asan_report_store1_noabort+0x20/0x30 [ 31.593048] krealloc_less_oob_helper+0xa58/0xc50 [ 31.593242] krealloc_less_oob+0x20/0x38 [ 31.593528] kunit_try_run_case+0x170/0x3f0 [ 31.593824] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.594078] kthread+0x328/0x630 [ 31.594574] ret_from_fork+0x10/0x20 [ 31.594699] [ 31.594790] Allocated by task 169: [ 31.594878] kasan_save_stack+0x3c/0x68 [ 31.595146] kasan_save_track+0x20/0x40 [ 31.595376] kasan_save_alloc_info+0x40/0x58 [ 31.595626] __kasan_krealloc+0x118/0x178 [ 31.596033] krealloc_noprof+0x128/0x360 [ 31.596295] krealloc_less_oob_helper+0x168/0xc50 [ 31.596806] krealloc_less_oob+0x20/0x38 [ 31.596885] kunit_try_run_case+0x170/0x3f0 [ 31.596955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.597084] kthread+0x328/0x630 [ 31.597159] ret_from_fork+0x10/0x20 [ 31.597297] [ 31.597467] The buggy address belongs to the object at fff00000c4497200 [ 31.597467] which belongs to the cache kmalloc-256 of size 256 [ 31.597835] The buggy address is located 34 bytes to the right of [ 31.597835] allocated 201-byte region [fff00000c4497200, fff00000c44972c9) [ 31.598097] [ 31.598148] The buggy address belongs to the physical page: [ 31.598228] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104496 [ 31.598838] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.599127] anon flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.599468] page_type: f5(slab) [ 31.599574] raw: 0bfffe0000000040 fff00000c0001b40 0000000000000000 dead000000000001 [ 31.599713] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.599844] head: 0bfffe0000000040 fff00000c0001b40 0000000000000000 dead000000000001 [ 31.599970] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.600094] head: 0bfffe0000000001 ffffc1ffc3112581 00000000ffffffff 00000000ffffffff [ 31.600216] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 31.600750] page dumped because: kasan: bad access detected [ 31.600957] [ 31.601026] Memory state around the buggy address: [ 31.601108] fff00000c4497180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.601272] fff00000c4497200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.601563] >fff00000c4497280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 31.602494] ^ [ 31.602752] fff00000c4497300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.603018] fff00000c4497380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.603354] ================================================================== [ 31.541560] ================================================================== [ 31.542320] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 31.542499] Write of size 1 at addr fff00000c44972d0 by task kunit_try_catch/169 [ 31.542642] [ 31.542733] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 31.542949] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.543014] Hardware name: linux,dummy-virt (DT) [ 31.543093] Call trace: [ 31.543904] show_stack+0x20/0x38 (C) [ 31.544229] dump_stack_lvl+0x8c/0xd0 [ 31.544604] print_report+0x118/0x608 [ 31.544949] kasan_report+0xdc/0x128 [ 31.545069] __asan_report_store1_noabort+0x20/0x30 [ 31.545284] krealloc_less_oob_helper+0xb9c/0xc50 [ 31.545553] krealloc_less_oob+0x20/0x38 [ 31.545691] kunit_try_run_case+0x170/0x3f0 [ 31.545818] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.546217] kthread+0x328/0x630 [ 31.546479] ret_from_fork+0x10/0x20 [ 31.546833] [ 31.546884] Allocated by task 169: [ 31.547082] kasan_save_stack+0x3c/0x68 [ 31.547181] kasan_save_track+0x20/0x40 [ 31.547619] kasan_save_alloc_info+0x40/0x58 [ 31.547834] __kasan_krealloc+0x118/0x178 [ 31.548029] krealloc_noprof+0x128/0x360 [ 31.548272] krealloc_less_oob_helper+0x168/0xc50 [ 31.548413] krealloc_less_oob+0x20/0x38 [ 31.548774] kunit_try_run_case+0x170/0x3f0 [ 31.548909] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.549008] kthread+0x328/0x630 [ 31.549219] ret_from_fork+0x10/0x20 [ 31.549441] [ 31.549515] The buggy address belongs to the object at fff00000c4497200 [ 31.549515] which belongs to the cache kmalloc-256 of size 256 [ 31.549833] The buggy address is located 7 bytes to the right of [ 31.549833] allocated 201-byte region [fff00000c4497200, fff00000c44972c9) [ 31.550461] [ 31.550538] The buggy address belongs to the physical page: [ 31.550781] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104496 [ 31.550939] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.551062] anon flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.551752] page_type: f5(slab) [ 31.552073] raw: 0bfffe0000000040 fff00000c0001b40 0000000000000000 dead000000000001 [ 31.552238] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.552708] head: 0bfffe0000000040 fff00000c0001b40 0000000000000000 dead000000000001 [ 31.553083] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.553353] head: 0bfffe0000000001 ffffc1ffc3112581 00000000ffffffff 00000000ffffffff [ 31.553502] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 31.553593] page dumped because: kasan: bad access detected [ 31.553663] [ 31.553697] Memory state around the buggy address: [ 31.553757] fff00000c4497180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.554361] fff00000c4497200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.554756] >fff00000c4497280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 31.555248] ^ [ 31.555400] fff00000c4497300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.555542] fff00000c4497380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.555692] ================================================================== [ 31.558922] ================================================================== [ 31.559060] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 31.559197] Write of size 1 at addr fff00000c44972da by task kunit_try_catch/169 [ 31.559316] [ 31.559403] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 31.560124] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.560340] Hardware name: linux,dummy-virt (DT) [ 31.560581] Call trace: [ 31.560720] show_stack+0x20/0x38 (C) [ 31.561030] dump_stack_lvl+0x8c/0xd0 [ 31.561221] print_report+0x118/0x608 [ 31.561348] kasan_report+0xdc/0x128 [ 31.561465] __asan_report_store1_noabort+0x20/0x30 [ 31.561606] krealloc_less_oob_helper+0xa80/0xc50 [ 31.561729] krealloc_less_oob+0x20/0x38 [ 31.561923] kunit_try_run_case+0x170/0x3f0 [ 31.562412] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.562683] kthread+0x328/0x630 [ 31.562866] ret_from_fork+0x10/0x20 [ 31.563331] [ 31.563391] Allocated by task 169: [ 31.564018] kasan_save_stack+0x3c/0x68 [ 31.564285] kasan_save_track+0x20/0x40 [ 31.564723] kasan_save_alloc_info+0x40/0x58 [ 31.564819] __kasan_krealloc+0x118/0x178 [ 31.564919] krealloc_noprof+0x128/0x360 [ 31.564998] krealloc_less_oob_helper+0x168/0xc50 [ 31.565174] krealloc_less_oob+0x20/0x38 [ 31.565281] kunit_try_run_case+0x170/0x3f0 [ 31.565394] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.565500] kthread+0x328/0x630 [ 31.565579] ret_from_fork+0x10/0x20 [ 31.565708] [ 31.565794] The buggy address belongs to the object at fff00000c4497200 [ 31.565794] which belongs to the cache kmalloc-256 of size 256 [ 31.566350] The buggy address is located 17 bytes to the right of [ 31.566350] allocated 201-byte region [fff00000c4497200, fff00000c44972c9) [ 31.566820] [ 31.566879] The buggy address belongs to the physical page: [ 31.566970] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104496 [ 31.567217] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.567455] anon flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.567748] page_type: f5(slab) [ 31.567848] raw: 0bfffe0000000040 fff00000c0001b40 0000000000000000 dead000000000001 [ 31.568289] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.568573] head: 0bfffe0000000040 fff00000c0001b40 0000000000000000 dead000000000001 [ 31.568696] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.568788] head: 0bfffe0000000001 ffffc1ffc3112581 00000000ffffffff 00000000ffffffff [ 31.569352] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 31.569494] page dumped because: kasan: bad access detected [ 31.569576] [ 31.569633] Memory state around the buggy address: [ 31.569817] fff00000c4497180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.570219] fff00000c4497200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.570487] >fff00000c4497280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 31.570640] ^ [ 31.570730] fff00000c4497300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.571045] fff00000c4497380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.571256] ================================================================== [ 31.527938] ================================================================== [ 31.528371] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 31.528563] Write of size 1 at addr fff00000c44972c9 by task kunit_try_catch/169 [ 31.528769] [ 31.528869] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 31.529278] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.529539] Hardware name: linux,dummy-virt (DT) [ 31.529628] Call trace: [ 31.529691] show_stack+0x20/0x38 (C) [ 31.529882] dump_stack_lvl+0x8c/0xd0 [ 31.530042] print_report+0x118/0x608 [ 31.530180] kasan_report+0xdc/0x128 [ 31.530299] __asan_report_store1_noabort+0x20/0x30 [ 31.530419] krealloc_less_oob_helper+0xa48/0xc50 [ 31.530541] krealloc_less_oob+0x20/0x38 [ 31.530661] kunit_try_run_case+0x170/0x3f0 [ 31.530784] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.530917] kthread+0x328/0x630 [ 31.531022] ret_from_fork+0x10/0x20 [ 31.531141] [ 31.531189] Allocated by task 169: [ 31.531260] kasan_save_stack+0x3c/0x68 [ 31.531361] kasan_save_track+0x20/0x40 [ 31.531461] kasan_save_alloc_info+0x40/0x58 [ 31.531560] __kasan_krealloc+0x118/0x178 [ 31.532664] krealloc_noprof+0x128/0x360 [ 31.533089] krealloc_less_oob_helper+0x168/0xc50 [ 31.533187] krealloc_less_oob+0x20/0x38 [ 31.533378] kunit_try_run_case+0x170/0x3f0 [ 31.533594] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.533945] kthread+0x328/0x630 [ 31.534084] ret_from_fork+0x10/0x20 [ 31.534162] [ 31.534207] The buggy address belongs to the object at fff00000c4497200 [ 31.534207] which belongs to the cache kmalloc-256 of size 256 [ 31.534436] The buggy address is located 0 bytes to the right of [ 31.534436] allocated 201-byte region [fff00000c4497200, fff00000c44972c9) [ 31.534863] [ 31.534923] The buggy address belongs to the physical page: [ 31.535118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104496 [ 31.535679] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.535797] anon flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.535948] page_type: f5(slab) [ 31.536144] raw: 0bfffe0000000040 fff00000c0001b40 0000000000000000 dead000000000001 [ 31.536542] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.536994] head: 0bfffe0000000040 fff00000c0001b40 0000000000000000 dead000000000001 [ 31.537122] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.537320] head: 0bfffe0000000001 ffffc1ffc3112581 00000000ffffffff 00000000ffffffff [ 31.537507] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 31.537636] page dumped because: kasan: bad access detected [ 31.537718] [ 31.537763] Memory state around the buggy address: [ 31.537848] fff00000c4497180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.538056] fff00000c4497200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.538299] >fff00000c4497280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 31.538715] ^ [ 31.538888] fff00000c4497300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.539055] fff00000c4497380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.539157] ================================================================== [ 31.729993] ================================================================== [ 31.730181] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 31.730342] Write of size 1 at addr fff00000c59ba0c9 by task kunit_try_catch/173 [ 31.730475] [ 31.730561] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 31.733576] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.733741] Hardware name: linux,dummy-virt (DT) [ 31.734207] Call trace: [ 31.734286] show_stack+0x20/0x38 (C) [ 31.734503] dump_stack_lvl+0x8c/0xd0 [ 31.734790] print_report+0x118/0x608 [ 31.735020] kasan_report+0xdc/0x128 [ 31.735281] __asan_report_store1_noabort+0x20/0x30 [ 31.735463] krealloc_less_oob_helper+0xa48/0xc50 [ 31.736116] krealloc_large_less_oob+0x20/0x38 [ 31.736278] kunit_try_run_case+0x170/0x3f0 [ 31.736490] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.737114] kthread+0x328/0x630 [ 31.737272] ret_from_fork+0x10/0x20 [ 31.737514] [ 31.737572] The buggy address belongs to the physical page: [ 31.737651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059b8 [ 31.738306] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.738491] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.738788] page_type: f8(unknown) [ 31.739046] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.739223] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.739357] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.739900] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.740347] head: 0bfffe0000000002 ffffc1ffc3166e01 00000000ffffffff 00000000ffffffff [ 31.740447] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 31.740737] page dumped because: kasan: bad access detected [ 31.741118] [ 31.741388] Memory state around the buggy address: [ 31.741542] fff00000c59b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.741679] fff00000c59ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.741786] >fff00000c59ba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 31.741877] ^ [ 31.741973] fff00000c59ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.742735] fff00000c59ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.743235] ================================================================== [ 31.785656] ================================================================== [ 31.785785] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 31.785923] Write of size 1 at addr fff00000c59ba0eb by task kunit_try_catch/173 [ 31.786054] [ 31.786140] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 31.786359] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.786430] Hardware name: linux,dummy-virt (DT) [ 31.786512] Call trace: [ 31.786569] show_stack+0x20/0x38 (C) [ 31.786825] dump_stack_lvl+0x8c/0xd0 [ 31.786937] print_report+0x118/0x608 [ 31.787046] kasan_report+0xdc/0x128 [ 31.787100] __asan_report_store1_noabort+0x20/0x30 [ 31.787153] krealloc_less_oob_helper+0xa58/0xc50 [ 31.787207] krealloc_large_less_oob+0x20/0x38 [ 31.787259] kunit_try_run_case+0x170/0x3f0 [ 31.787312] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.787369] kthread+0x328/0x630 [ 31.787424] ret_from_fork+0x10/0x20 [ 31.787504] [ 31.787531] The buggy address belongs to the physical page: [ 31.787570] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059b8 [ 31.787923] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.788054] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.788254] page_type: f8(unknown) [ 31.788753] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.789017] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.789178] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.789336] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.789448] head: 0bfffe0000000002 ffffc1ffc3166e01 00000000ffffffff 00000000ffffffff [ 31.789562] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 31.789663] page dumped because: kasan: bad access detected [ 31.789723] [ 31.789760] Memory state around the buggy address: [ 31.789832] fff00000c59b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.790286] fff00000c59ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.790450] >fff00000c59ba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 31.790587] ^ [ 31.790696] fff00000c59ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.790806] fff00000c59ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.790916] ================================================================== [ 31.773990] ================================================================== [ 31.774396] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 31.774693] Write of size 1 at addr fff00000c59ba0ea by task kunit_try_catch/173 [ 31.774882] [ 31.774978] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 31.775483] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.775567] Hardware name: linux,dummy-virt (DT) [ 31.775706] Call trace: [ 31.775770] show_stack+0x20/0x38 (C) [ 31.775966] dump_stack_lvl+0x8c/0xd0 [ 31.776135] print_report+0x118/0x608 [ 31.776262] kasan_report+0xdc/0x128 [ 31.776857] __asan_report_store1_noabort+0x20/0x30 [ 31.777171] krealloc_less_oob_helper+0xae4/0xc50 [ 31.777309] krealloc_large_less_oob+0x20/0x38 [ 31.777421] kunit_try_run_case+0x170/0x3f0 [ 31.777638] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.777858] kthread+0x328/0x630 [ 31.778073] ret_from_fork+0x10/0x20 [ 31.778462] [ 31.778535] The buggy address belongs to the physical page: [ 31.778648] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059b8 [ 31.779209] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.779408] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.779768] page_type: f8(unknown) [ 31.779877] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.780092] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.780292] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.780643] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.780858] head: 0bfffe0000000002 ffffc1ffc3166e01 00000000ffffffff 00000000ffffffff [ 31.781072] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 31.781309] page dumped because: kasan: bad access detected [ 31.781439] [ 31.781703] Memory state around the buggy address: [ 31.781828] fff00000c59b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.781946] fff00000c59ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.782057] >fff00000c59ba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 31.782157] ^ [ 31.782513] fff00000c59ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.782982] fff00000c59ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.783328] ================================================================== [ 31.575414] ================================================================== [ 31.575567] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 31.575717] Write of size 1 at addr fff00000c44972ea by task kunit_try_catch/169 [ 31.576456] [ 31.576683] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 31.577252] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.577323] Hardware name: linux,dummy-virt (DT) [ 31.577434] Call trace: [ 31.577546] show_stack+0x20/0x38 (C) [ 31.577847] dump_stack_lvl+0x8c/0xd0 [ 31.578103] print_report+0x118/0x608 [ 31.578245] kasan_report+0xdc/0x128 [ 31.578362] __asan_report_store1_noabort+0x20/0x30 [ 31.578476] krealloc_less_oob_helper+0xae4/0xc50 [ 31.578598] krealloc_less_oob+0x20/0x38 [ 31.579076] kunit_try_run_case+0x170/0x3f0 [ 31.579356] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.580125] kthread+0x328/0x630 [ 31.580332] ret_from_fork+0x10/0x20 [ 31.580760] [ 31.580811] Allocated by task 169: [ 31.580894] kasan_save_stack+0x3c/0x68 [ 31.581093] kasan_save_track+0x20/0x40 [ 31.581234] kasan_save_alloc_info+0x40/0x58 [ 31.581472] __kasan_krealloc+0x118/0x178 [ 31.581591] krealloc_noprof+0x128/0x360 [ 31.581698] krealloc_less_oob_helper+0x168/0xc50 [ 31.581795] krealloc_less_oob+0x20/0x38 [ 31.581884] kunit_try_run_case+0x170/0x3f0 [ 31.582078] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.582180] kthread+0x328/0x630 [ 31.582585] ret_from_fork+0x10/0x20 [ 31.582818] [ 31.582981] The buggy address belongs to the object at fff00000c4497200 [ 31.582981] which belongs to the cache kmalloc-256 of size 256 [ 31.583286] The buggy address is located 33 bytes to the right of [ 31.583286] allocated 201-byte region [fff00000c4497200, fff00000c44972c9) [ 31.583842] [ 31.583897] The buggy address belongs to the physical page: [ 31.583991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104496 [ 31.584225] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.584510] anon flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.584837] page_type: f5(slab) [ 31.585096] raw: 0bfffe0000000040 fff00000c0001b40 0000000000000000 dead000000000001 [ 31.585232] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.585326] head: 0bfffe0000000040 fff00000c0001b40 0000000000000000 dead000000000001 [ 31.585886] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.586239] head: 0bfffe0000000001 ffffc1ffc3112581 00000000ffffffff 00000000ffffffff [ 31.586500] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 31.586644] page dumped because: kasan: bad access detected [ 31.586725] [ 31.586770] Memory state around the buggy address: [ 31.587289] fff00000c4497180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.587538] fff00000c4497200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.587911] >fff00000c4497280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 31.588105] ^ [ 31.588366] fff00000c4497300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.588449] fff00000c4497380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.588522] ================================================================== [ 31.762163] ================================================================== [ 31.762238] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 31.762320] Write of size 1 at addr fff00000c59ba0da by task kunit_try_catch/173 [ 31.762379] [ 31.762423] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 31.762520] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.762549] Hardware name: linux,dummy-virt (DT) [ 31.762587] Call trace: [ 31.762639] show_stack+0x20/0x38 (C) [ 31.762732] dump_stack_lvl+0x8c/0xd0 [ 31.762833] print_report+0x118/0x608 [ 31.762942] kasan_report+0xdc/0x128 [ 31.763055] __asan_report_store1_noabort+0x20/0x30 [ 31.763179] krealloc_less_oob_helper+0xa80/0xc50 [ 31.763305] krealloc_large_less_oob+0x20/0x38 [ 31.763431] kunit_try_run_case+0x170/0x3f0 [ 31.763557] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.763705] kthread+0x328/0x630 [ 31.763812] ret_from_fork+0x10/0x20 [ 31.763931] [ 31.763983] The buggy address belongs to the physical page: [ 31.764064] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059b8 [ 31.764205] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.764324] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.764676] page_type: f8(unknown) [ 31.765307] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.765494] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.765718] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.766017] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.766138] head: 0bfffe0000000002 ffffc1ffc3166e01 00000000ffffffff 00000000ffffffff [ 31.766250] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 31.766456] page dumped because: kasan: bad access detected [ 31.766590] [ 31.766663] Memory state around the buggy address: [ 31.766802] fff00000c59b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.766982] fff00000c59ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.767147] >fff00000c59ba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 31.767246] ^ [ 31.767356] fff00000c59ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.767484] fff00000c59ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.768149] ================================================================== [ 31.748391] ================================================================== [ 31.748978] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 31.749657] Write of size 1 at addr fff00000c59ba0d0 by task kunit_try_catch/173 [ 31.749775] [ 31.749923] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 31.750439] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.750580] Hardware name: linux,dummy-virt (DT) [ 31.750819] Call trace: [ 31.750910] show_stack+0x20/0x38 (C) [ 31.751050] dump_stack_lvl+0x8c/0xd0 [ 31.751667] print_report+0x118/0x608 [ 31.752065] kasan_report+0xdc/0x128 [ 31.752275] __asan_report_store1_noabort+0x20/0x30 [ 31.752846] krealloc_less_oob_helper+0xb9c/0xc50 [ 31.753090] krealloc_large_less_oob+0x20/0x38 [ 31.753212] kunit_try_run_case+0x170/0x3f0 [ 31.753330] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.753431] kthread+0x328/0x630 [ 31.753507] ret_from_fork+0x10/0x20 [ 31.753605] [ 31.753667] The buggy address belongs to the physical page: [ 31.753746] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059b8 [ 31.753887] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.754007] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.754145] page_type: f8(unknown) [ 31.754247] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.754375] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.754498] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.757735] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.758395] head: 0bfffe0000000002 ffffc1ffc3166e01 00000000ffffffff 00000000ffffffff [ 31.758671] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 31.758784] page dumped because: kasan: bad access detected [ 31.758914] [ 31.758985] Memory state around the buggy address: [ 31.759107] fff00000c59b9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.759218] fff00000c59ba000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.759324] >fff00000c59ba080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 31.760360] ^ [ 31.760484] fff00000c59ba100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.760607] fff00000c59ba180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.760720] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 31.633461] ================================================================== [ 31.633658] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 31.633832] Write of size 1 at addr fff00000c60720eb by task kunit_try_catch/171 [ 31.633997] [ 31.634094] CPU: 1 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 31.634366] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.634438] Hardware name: linux,dummy-virt (DT) [ 31.634518] Call trace: [ 31.634815] show_stack+0x20/0x38 (C) [ 31.634955] dump_stack_lvl+0x8c/0xd0 [ 31.635069] print_report+0x118/0x608 [ 31.635130] kasan_report+0xdc/0x128 [ 31.635181] __asan_report_store1_noabort+0x20/0x30 [ 31.635274] krealloc_more_oob_helper+0x60c/0x678 [ 31.635336] krealloc_large_more_oob+0x20/0x38 [ 31.635389] kunit_try_run_case+0x170/0x3f0 [ 31.635467] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.635528] kthread+0x328/0x630 [ 31.635575] ret_from_fork+0x10/0x20 [ 31.635655] [ 31.635686] The buggy address belongs to the physical page: [ 31.635725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106070 [ 31.635789] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.635843] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.635911] page_type: f8(unknown) [ 31.635964] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.636021] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.636077] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.636130] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.636184] head: 0bfffe0000000002 ffffc1ffc3181c01 00000000ffffffff 00000000ffffffff [ 31.636238] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 31.636283] page dumped because: kasan: bad access detected [ 31.636417] [ 31.636491] Memory state around the buggy address: [ 31.636677] fff00000c6071f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.636897] fff00000c6072000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.637124] >fff00000c6072080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 31.637861] ^ [ 31.637999] fff00000c6072100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.638116] fff00000c6072180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.638216] ================================================================== [ 31.488270] ================================================================== [ 31.488522] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 31.488664] Write of size 1 at addr fff00000c4496cf0 by task kunit_try_catch/167 [ 31.488771] [ 31.488852] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 31.489327] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.489695] Hardware name: linux,dummy-virt (DT) [ 31.489802] Call trace: [ 31.489928] show_stack+0x20/0x38 (C) [ 31.490082] dump_stack_lvl+0x8c/0xd0 [ 31.490254] print_report+0x118/0x608 [ 31.490364] kasan_report+0xdc/0x128 [ 31.490898] __asan_report_store1_noabort+0x20/0x30 [ 31.491100] krealloc_more_oob_helper+0x5c0/0x678 [ 31.491311] krealloc_more_oob+0x20/0x38 [ 31.491488] kunit_try_run_case+0x170/0x3f0 [ 31.491696] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.491835] kthread+0x328/0x630 [ 31.491937] ret_from_fork+0x10/0x20 [ 31.492064] [ 31.492112] Allocated by task 167: [ 31.492183] kasan_save_stack+0x3c/0x68 [ 31.492564] kasan_save_track+0x20/0x40 [ 31.492796] kasan_save_alloc_info+0x40/0x58 [ 31.492974] __kasan_krealloc+0x118/0x178 [ 31.493138] krealloc_noprof+0x128/0x360 [ 31.493415] krealloc_more_oob_helper+0x168/0x678 [ 31.493505] krealloc_more_oob+0x20/0x38 [ 31.493585] kunit_try_run_case+0x170/0x3f0 [ 31.493852] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.494076] kthread+0x328/0x630 [ 31.494178] ret_from_fork+0x10/0x20 [ 31.494350] [ 31.494416] The buggy address belongs to the object at fff00000c4496c00 [ 31.494416] which belongs to the cache kmalloc-256 of size 256 [ 31.494639] The buggy address is located 5 bytes to the right of [ 31.494639] allocated 235-byte region [fff00000c4496c00, fff00000c4496ceb) [ 31.494895] [ 31.495302] The buggy address belongs to the physical page: [ 31.495525] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104496 [ 31.495707] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.495914] anon flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.496140] page_type: f5(slab) [ 31.496320] raw: 0bfffe0000000040 fff00000c0001b40 0000000000000000 dead000000000001 [ 31.496461] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.496567] head: 0bfffe0000000040 fff00000c0001b40 0000000000000000 dead000000000001 [ 31.496672] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.496768] head: 0bfffe0000000001 ffffc1ffc3112581 00000000ffffffff 00000000ffffffff [ 31.496876] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 31.496979] page dumped because: kasan: bad access detected [ 31.497341] [ 31.497404] Memory state around the buggy address: [ 31.497561] fff00000c4496b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.497754] fff00000c4496c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.498121] >fff00000c4496c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 31.498383] ^ [ 31.498499] fff00000c4496d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.498821] fff00000c4496d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.498912] ================================================================== [ 31.473754] ================================================================== [ 31.473960] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 31.474108] Write of size 1 at addr fff00000c4496ceb by task kunit_try_catch/167 [ 31.474218] [ 31.474303] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 31.474538] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.474630] Hardware name: linux,dummy-virt (DT) [ 31.474713] Call trace: [ 31.474966] show_stack+0x20/0x38 (C) [ 31.475127] dump_stack_lvl+0x8c/0xd0 [ 31.475245] print_report+0x118/0x608 [ 31.475351] kasan_report+0xdc/0x128 [ 31.475637] __asan_report_store1_noabort+0x20/0x30 [ 31.475772] krealloc_more_oob_helper+0x60c/0x678 [ 31.475896] krealloc_more_oob+0x20/0x38 [ 31.476009] kunit_try_run_case+0x170/0x3f0 [ 31.476128] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.476253] kthread+0x328/0x630 [ 31.476345] ret_from_fork+0x10/0x20 [ 31.476460] [ 31.476898] Allocated by task 167: [ 31.476996] kasan_save_stack+0x3c/0x68 [ 31.477107] kasan_save_track+0x20/0x40 [ 31.477277] kasan_save_alloc_info+0x40/0x58 [ 31.477400] __kasan_krealloc+0x118/0x178 [ 31.477501] krealloc_noprof+0x128/0x360 [ 31.477817] krealloc_more_oob_helper+0x168/0x678 [ 31.478146] krealloc_more_oob+0x20/0x38 [ 31.478286] kunit_try_run_case+0x170/0x3f0 [ 31.478431] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.478976] kthread+0x328/0x630 [ 31.479092] ret_from_fork+0x10/0x20 [ 31.479244] [ 31.479307] The buggy address belongs to the object at fff00000c4496c00 [ 31.479307] which belongs to the cache kmalloc-256 of size 256 [ 31.479537] The buggy address is located 0 bytes to the right of [ 31.479537] allocated 235-byte region [fff00000c4496c00, fff00000c4496ceb) [ 31.479966] [ 31.480405] The buggy address belongs to the physical page: [ 31.480509] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104496 [ 31.481036] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.481173] anon flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.481553] page_type: f5(slab) [ 31.481967] raw: 0bfffe0000000040 fff00000c0001b40 0000000000000000 dead000000000001 [ 31.482256] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.482450] head: 0bfffe0000000040 fff00000c0001b40 0000000000000000 dead000000000001 [ 31.482781] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.483141] head: 0bfffe0000000001 ffffc1ffc3112581 00000000ffffffff 00000000ffffffff [ 31.483334] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 31.483566] page dumped because: kasan: bad access detected [ 31.483678] [ 31.483727] Memory state around the buggy address: [ 31.483808] fff00000c4496b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.483923] fff00000c4496c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.484035] >fff00000c4496c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 31.484134] ^ [ 31.484768] fff00000c4496d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.484999] fff00000c4496d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.485119] ================================================================== [ 31.639198] ================================================================== [ 31.639983] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 31.640453] Write of size 1 at addr fff00000c60720f0 by task kunit_try_catch/171 [ 31.640558] [ 31.640646] CPU: 1 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 31.642059] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.642143] Hardware name: linux,dummy-virt (DT) [ 31.642224] Call trace: [ 31.642281] show_stack+0x20/0x38 (C) [ 31.642412] dump_stack_lvl+0x8c/0xd0 [ 31.644197] print_report+0x118/0x608 [ 31.645359] kasan_report+0xdc/0x128 [ 31.645601] __asan_report_store1_noabort+0x20/0x30 [ 31.646129] krealloc_more_oob_helper+0x5c0/0x678 [ 31.646468] krealloc_large_more_oob+0x20/0x38 [ 31.647208] kunit_try_run_case+0x170/0x3f0 [ 31.647621] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.648349] kthread+0x328/0x630 [ 31.649080] ret_from_fork+0x10/0x20 [ 31.649360] [ 31.649415] The buggy address belongs to the physical page: [ 31.649877] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106070 [ 31.650359] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.650765] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.650915] page_type: f8(unknown) [ 31.651023] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.652400] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.653025] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.653728] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.653893] head: 0bfffe0000000002 ffffc1ffc3181c01 00000000ffffffff 00000000ffffffff [ 31.654560] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 31.654844] page dumped because: kasan: bad access detected [ 31.654925] [ 31.655640] Memory state around the buggy address: [ 31.655961] fff00000c6071f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.656411] fff00000c6072000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.656886] >fff00000c6072080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 31.657178] ^ [ 31.657397] fff00000c6072100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.657638] fff00000c6072180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.658174] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 31.439984] ================================================================== [ 31.440277] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 31.440635] Read of size 1 at addr fff00000c59a0000 by task kunit_try_catch/165 [ 31.440771] [ 31.440863] CPU: 1 UID: 0 PID: 165 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 31.441053] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.441107] Hardware name: linux,dummy-virt (DT) [ 31.441178] Call trace: [ 31.441231] show_stack+0x20/0x38 (C) [ 31.441355] dump_stack_lvl+0x8c/0xd0 [ 31.441478] print_report+0x118/0x608 [ 31.441597] kasan_report+0xdc/0x128 [ 31.441741] __asan_report_load1_noabort+0x20/0x30 [ 31.441853] page_alloc_uaf+0x328/0x350 [ 31.442094] kunit_try_run_case+0x170/0x3f0 [ 31.442239] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.442373] kthread+0x328/0x630 [ 31.442469] ret_from_fork+0x10/0x20 [ 31.442589] [ 31.442662] The buggy address belongs to the physical page: [ 31.442755] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059a0 [ 31.442914] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.443033] page_type: f0(buddy) [ 31.443193] raw: 0bfffe0000000000 fff00000ff616108 fff00000ff616108 0000000000000000 [ 31.443380] raw: 0000000000000000 0000000000000005 00000000f0000000 0000000000000000 [ 31.443545] page dumped because: kasan: bad access detected [ 31.443670] [ 31.443734] Memory state around the buggy address: [ 31.443859] fff00000c599ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.444015] fff00000c599ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.444167] >fff00000c59a0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.444298] ^ [ 31.444359] fff00000c59a0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.444461] fff00000c59a0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.444555] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[ 31.400178] ================================================================== [ 31.400710] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 31.400920] Free of addr fff00000c6070001 by task kunit_try_catch/161 [ 31.401280] [ 31.401371] CPU: 1 UID: 0 PID: 161 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 31.401569] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.401662] Hardware name: linux,dummy-virt (DT) [ 31.401759] Call trace: [ 31.401835] show_stack+0x20/0x38 (C) [ 31.401965] dump_stack_lvl+0x8c/0xd0 [ 31.402085] print_report+0x118/0x608 [ 31.402208] kasan_report_invalid_free+0xc0/0xe8 [ 31.404644] __kasan_kfree_large+0x5c/0xa8 [ 31.405526] free_large_kmalloc+0x68/0x150 [ 31.405666] kfree+0x270/0x3c8 [ 31.405772] kmalloc_large_invalid_free+0x108/0x270 [ 31.405887] kunit_try_run_case+0x170/0x3f0 [ 31.406020] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.406140] kthread+0x328/0x630 [ 31.406239] ret_from_fork+0x10/0x20 [ 31.406434] [ 31.406493] The buggy address belongs to the physical page: [ 31.406599] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106070 [ 31.406753] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.407067] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.407482] page_type: f8(unknown) [ 31.407711] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.408012] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.408279] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.408504] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.408712] head: 0bfffe0000000002 ffffc1ffc3181c01 00000000ffffffff 00000000ffffffff [ 31.408846] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 31.408935] page dumped because: kasan: bad access detected [ 31.408993] [ 31.409304] Memory state around the buggy address: [ 31.409396] fff00000c606ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.409503] fff00000c606ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.409651] >fff00000c6070000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.409746] ^ [ 31.409815] fff00000c6070080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.409924] fff00000c6070100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.410104] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 31.370146] ================================================================== [ 31.370338] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 31.370492] Read of size 1 at addr fff00000c767c000 by task kunit_try_catch/159 [ 31.370705] [ 31.370946] CPU: 1 UID: 0 PID: 159 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 31.371587] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.371708] Hardware name: linux,dummy-virt (DT) [ 31.371799] Call trace: [ 31.371895] show_stack+0x20/0x38 (C) [ 31.372125] dump_stack_lvl+0x8c/0xd0 [ 31.372412] print_report+0x118/0x608 [ 31.372599] kasan_report+0xdc/0x128 [ 31.372696] __asan_report_load1_noabort+0x20/0x30 [ 31.373050] kmalloc_large_uaf+0x2cc/0x2f8 [ 31.373198] kunit_try_run_case+0x170/0x3f0 [ 31.373333] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.373635] kthread+0x328/0x630 [ 31.373759] ret_from_fork+0x10/0x20 [ 31.373967] [ 31.374057] The buggy address belongs to the physical page: [ 31.374220] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767c [ 31.374681] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.374947] raw: 0bfffe0000000000 ffffc1ffc3181c08 fff00000da498c80 0000000000000000 [ 31.375231] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 31.375358] page dumped because: kasan: bad access detected [ 31.375873] [ 31.375934] Memory state around the buggy address: [ 31.376027] fff00000c767bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.376140] fff00000c767bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.376684] >fff00000c767c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.376873] ^ [ 31.377080] fff00000c767c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.377225] fff00000c767c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.377303] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 31.320053] ================================================================== [ 31.320652] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 31.320937] Write of size 1 at addr fff00000c767e00a by task kunit_try_catch/157 [ 31.321219] [ 31.321313] CPU: 1 UID: 0 PID: 157 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 31.321767] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.321904] Hardware name: linux,dummy-virt (DT) [ 31.322115] Call trace: [ 31.322219] show_stack+0x20/0x38 (C) [ 31.322363] dump_stack_lvl+0x8c/0xd0 [ 31.322481] print_report+0x118/0x608 [ 31.322600] kasan_report+0xdc/0x128 [ 31.323024] __asan_report_store1_noabort+0x20/0x30 [ 31.323391] kmalloc_large_oob_right+0x278/0x2b8 [ 31.323685] kunit_try_run_case+0x170/0x3f0 [ 31.323881] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.324029] kthread+0x328/0x630 [ 31.324181] ret_from_fork+0x10/0x20 [ 31.324408] [ 31.324665] The buggy address belongs to the physical page: [ 31.324758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10767c [ 31.324873] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.324960] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.325489] page_type: f8(unknown) [ 31.325882] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.326011] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.326247] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.326394] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.326522] head: 0bfffe0000000002 ffffc1ffc31d9f01 00000000ffffffff 00000000ffffffff [ 31.326704] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 31.327123] page dumped because: kasan: bad access detected [ 31.327207] [ 31.327351] Memory state around the buggy address: [ 31.327594] fff00000c767df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.327853] fff00000c767df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.328079] >fff00000c767e000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.328186] ^ [ 31.328266] fff00000c767e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.328872] fff00000c767e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.329009] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 31.278977] ================================================================== [ 31.279271] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 31.279462] Write of size 1 at addr fff00000c5979f00 by task kunit_try_catch/155 [ 31.279697] [ 31.279800] CPU: 1 UID: 0 PID: 155 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 31.280039] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.280107] Hardware name: linux,dummy-virt (DT) [ 31.280190] Call trace: [ 31.280248] show_stack+0x20/0x38 (C) [ 31.280582] dump_stack_lvl+0x8c/0xd0 [ 31.280800] print_report+0x118/0x608 [ 31.280892] kasan_report+0xdc/0x128 [ 31.280989] __asan_report_store1_noabort+0x20/0x30 [ 31.281444] kmalloc_big_oob_right+0x2a4/0x2f0 [ 31.281713] kunit_try_run_case+0x170/0x3f0 [ 31.281964] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.282243] kthread+0x328/0x630 [ 31.282350] ret_from_fork+0x10/0x20 [ 31.282471] [ 31.282522] Allocated by task 155: [ 31.282593] kasan_save_stack+0x3c/0x68 [ 31.282711] kasan_save_track+0x20/0x40 [ 31.283234] kasan_save_alloc_info+0x40/0x58 [ 31.283354] __kasan_kmalloc+0xd4/0xd8 [ 31.283582] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.283971] kmalloc_big_oob_right+0xb8/0x2f0 [ 31.284218] kunit_try_run_case+0x170/0x3f0 [ 31.284371] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.284642] kthread+0x328/0x630 [ 31.284734] ret_from_fork+0x10/0x20 [ 31.284901] [ 31.284957] The buggy address belongs to the object at fff00000c5978000 [ 31.284957] which belongs to the cache kmalloc-8k of size 8192 [ 31.285171] The buggy address is located 0 bytes to the right of [ 31.285171] allocated 7936-byte region [fff00000c5978000, fff00000c5979f00) [ 31.285294] [ 31.285341] The buggy address belongs to the physical page: [ 31.285416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105978 [ 31.285859] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.286086] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.286414] page_type: f5(slab) [ 31.286676] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 31.286848] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 31.287303] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 31.287446] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 31.287747] head: 0bfffe0000000003 ffffc1ffc3165e01 00000000ffffffff 00000000ffffffff [ 31.288057] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 31.288205] page dumped because: kasan: bad access detected [ 31.288285] [ 31.288791] Memory state around the buggy address: [ 31.289084] fff00000c5979e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.289293] fff00000c5979e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.289502] >fff00000c5979f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.289594] ^ [ 31.289668] fff00000c5979f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.289747] fff00000c597a000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.289829] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[ 31.185866] ================================================================== [ 31.186374] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 31.186559] Write of size 1 at addr fff00000c44df478 by task kunit_try_catch/153 [ 31.186820] [ 31.186918] CPU: 1 UID: 0 PID: 153 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 31.187119] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.187580] Hardware name: linux,dummy-virt (DT) [ 31.187730] Call trace: [ 31.187836] show_stack+0x20/0x38 (C) [ 31.187980] dump_stack_lvl+0x8c/0xd0 [ 31.188094] print_report+0x118/0x608 [ 31.188207] kasan_report+0xdc/0x128 [ 31.188319] __asan_report_store1_noabort+0x20/0x30 [ 31.188444] kmalloc_track_caller_oob_right+0x40c/0x488 [ 31.188569] kunit_try_run_case+0x170/0x3f0 [ 31.188701] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.188830] kthread+0x328/0x630 [ 31.188936] ret_from_fork+0x10/0x20 [ 31.189088] [ 31.189130] Allocated by task 153: [ 31.189195] kasan_save_stack+0x3c/0x68 [ 31.189292] kasan_save_track+0x20/0x40 [ 31.189382] kasan_save_alloc_info+0x40/0x58 [ 31.189480] __kasan_kmalloc+0xd4/0xd8 [ 31.189558] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 31.189680] kmalloc_track_caller_oob_right+0xa8/0x488 [ 31.189770] kunit_try_run_case+0x170/0x3f0 [ 31.189862] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.189944] kthread+0x328/0x630 [ 31.190000] ret_from_fork+0x10/0x20 [ 31.190071] [ 31.190110] The buggy address belongs to the object at fff00000c44df400 [ 31.190110] which belongs to the cache kmalloc-128 of size 128 [ 31.190216] The buggy address is located 0 bytes to the right of [ 31.190216] allocated 120-byte region [fff00000c44df400, fff00000c44df478) [ 31.190896] [ 31.190951] The buggy address belongs to the physical page: [ 31.191256] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044df [ 31.191406] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.191619] page_type: f5(slab) [ 31.191721] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.191929] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.192053] page dumped because: kasan: bad access detected [ 31.192191] [ 31.192240] Memory state around the buggy address: [ 31.192362] fff00000c44df300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.192470] fff00000c44df380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.193088] >fff00000c44df400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 31.193203] ^ [ 31.193376] fff00000c44df480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.193990] fff00000c44df500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.194124] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 31.146405] ================================================================== [ 31.146654] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 31.146821] Read of size 1 at addr fff00000c5949000 by task kunit_try_catch/151 [ 31.146952] [ 31.147043] CPU: 1 UID: 0 PID: 151 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 31.147755] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.147836] Hardware name: linux,dummy-virt (DT) [ 31.148013] Call trace: [ 31.148204] show_stack+0x20/0x38 (C) [ 31.148507] dump_stack_lvl+0x8c/0xd0 [ 31.148783] print_report+0x118/0x608 [ 31.149147] kasan_report+0xdc/0x128 [ 31.149402] __asan_report_load1_noabort+0x20/0x30 [ 31.149673] kmalloc_node_oob_right+0x2f4/0x330 [ 31.149907] kunit_try_run_case+0x170/0x3f0 [ 31.150184] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.150462] kthread+0x328/0x630 [ 31.150767] ret_from_fork+0x10/0x20 [ 31.150974] [ 31.151053] Allocated by task 151: [ 31.151282] kasan_save_stack+0x3c/0x68 [ 31.151577] kasan_save_track+0x20/0x40 [ 31.151813] kasan_save_alloc_info+0x40/0x58 [ 31.151994] __kasan_kmalloc+0xd4/0xd8 [ 31.152093] __kmalloc_cache_node_noprof+0x178/0x3d0 [ 31.152756] kmalloc_node_oob_right+0xbc/0x330 [ 31.153032] kunit_try_run_case+0x170/0x3f0 [ 31.153279] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.153506] kthread+0x328/0x630 [ 31.153573] ret_from_fork+0x10/0x20 [ 31.153652] [ 31.153690] The buggy address belongs to the object at fff00000c5948000 [ 31.153690] which belongs to the cache kmalloc-4k of size 4096 [ 31.153823] The buggy address is located 0 bytes to the right of [ 31.153823] allocated 4096-byte region [fff00000c5948000, fff00000c5949000) [ 31.154532] [ 31.154672] The buggy address belongs to the physical page: [ 31.154915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105948 [ 31.155281] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.155414] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.155630] page_type: f5(slab) [ 31.155737] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 31.155868] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 31.156011] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 31.156142] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 31.156269] head: 0bfffe0000000003 ffffc1ffc3165201 00000000ffffffff 00000000ffffffff [ 31.156994] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 31.158351] page dumped because: kasan: bad access detected [ 31.158518] [ 31.158588] Memory state around the buggy address: [ 31.158717] fff00000c5948f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.158832] fff00000c5948f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.158951] >fff00000c5949000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.159055] ^ [ 31.159137] fff00000c5949080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.159253] fff00000c5949100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.159361] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 31.030562] ================================================================== [ 31.030723] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 31.030865] Write of size 1 at addr fff00000c44df278 by task kunit_try_catch/147 [ 31.030995] [ 31.031074] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 31.031287] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.031356] Hardware name: linux,dummy-virt (DT) [ 31.031469] Call trace: [ 31.031529] show_stack+0x20/0x38 (C) [ 31.031666] dump_stack_lvl+0x8c/0xd0 [ 31.031785] print_report+0x118/0x608 [ 31.031903] kasan_report+0xdc/0x128 [ 31.032019] __asan_report_store1_noabort+0x20/0x30 [ 31.032145] kmalloc_oob_right+0x538/0x660 [ 31.032260] kunit_try_run_case+0x170/0x3f0 [ 31.032422] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.032535] kthread+0x328/0x630 [ 31.032624] ret_from_fork+0x10/0x20 [ 31.032723] [ 31.032763] Allocated by task 147: [ 31.032823] kasan_save_stack+0x3c/0x68 [ 31.034662] kasan_save_track+0x20/0x40 [ 31.034792] kasan_save_alloc_info+0x40/0x58 [ 31.034912] __kasan_kmalloc+0xd4/0xd8 [ 31.035025] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.035174] kmalloc_oob_right+0xb0/0x660 [ 31.035347] kunit_try_run_case+0x170/0x3f0 [ 31.035470] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.035585] kthread+0x328/0x630 [ 31.035685] ret_from_fork+0x10/0x20 [ 31.035779] [ 31.035834] The buggy address belongs to the object at fff00000c44df200 [ 31.035834] which belongs to the cache kmalloc-128 of size 128 [ 31.036036] The buggy address is located 5 bytes to the right of [ 31.036036] allocated 115-byte region [fff00000c44df200, fff00000c44df273) [ 31.036208] [ 31.036262] The buggy address belongs to the physical page: [ 31.036346] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044df [ 31.036553] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.036859] page_type: f5(slab) [ 31.037057] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.037176] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.037680] page dumped because: kasan: bad access detected [ 31.037798] [ 31.037928] Memory state around the buggy address: [ 31.038260] fff00000c44df100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.038489] fff00000c44df180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.038659] >fff00000c44df200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.039148] ^ [ 31.039469] fff00000c44df280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.040366] fff00000c44df300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.040544] ================================================================== [ 31.020040] ================================================================== [ 31.020685] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 31.022119] Write of size 1 at addr fff00000c44df273 by task kunit_try_catch/147 [ 31.022266] [ 31.023339] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 31.023574] Tainted: [N]=TEST [ 31.023627] Hardware name: linux,dummy-virt (DT) [ 31.023918] Call trace: [ 31.024136] show_stack+0x20/0x38 (C) [ 31.024365] dump_stack_lvl+0x8c/0xd0 [ 31.024517] print_report+0x118/0x608 [ 31.024630] kasan_report+0xdc/0x128 [ 31.024728] __asan_report_store1_noabort+0x20/0x30 [ 31.024829] kmalloc_oob_right+0x5a4/0x660 [ 31.024916] kunit_try_run_case+0x170/0x3f0 [ 31.025015] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.025097] kthread+0x328/0x630 [ 31.025147] ret_from_fork+0x10/0x20 [ 31.025355] [ 31.025404] Allocated by task 147: [ 31.025546] kasan_save_stack+0x3c/0x68 [ 31.025654] kasan_save_track+0x20/0x40 [ 31.025705] kasan_save_alloc_info+0x40/0x58 [ 31.025750] __kasan_kmalloc+0xd4/0xd8 [ 31.025791] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.025837] kmalloc_oob_right+0xb0/0x660 [ 31.025877] kunit_try_run_case+0x170/0x3f0 [ 31.025918] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.025965] kthread+0x328/0x630 [ 31.026000] ret_from_fork+0x10/0x20 [ 31.026064] [ 31.026137] The buggy address belongs to the object at fff00000c44df200 [ 31.026137] which belongs to the cache kmalloc-128 of size 128 [ 31.026253] The buggy address is located 0 bytes to the right of [ 31.026253] allocated 115-byte region [fff00000c44df200, fff00000c44df273) [ 31.026329] [ 31.026429] The buggy address belongs to the physical page: [ 31.026663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044df [ 31.027022] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.027382] page_type: f5(slab) [ 31.027899] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.027979] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.028114] page dumped because: kasan: bad access detected [ 31.028165] [ 31.028196] Memory state around the buggy address: [ 31.028477] fff00000c44df100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.028564] fff00000c44df180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.028642] >fff00000c44df200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.028710] ^ [ 31.028812] fff00000c44df280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.028862] fff00000c44df300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.028938] ================================================================== [ 31.043724] ================================================================== [ 31.043857] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 31.043991] Read of size 1 at addr fff00000c44df280 by task kunit_try_catch/147 [ 31.044115] [ 31.044199] CPU: 1 UID: 0 PID: 147 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 31.045759] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.045858] Hardware name: linux,dummy-virt (DT) [ 31.046807] Call trace: [ 31.046977] show_stack+0x20/0x38 (C) [ 31.047235] dump_stack_lvl+0x8c/0xd0 [ 31.047524] print_report+0x118/0x608 [ 31.047692] kasan_report+0xdc/0x128 [ 31.048116] __asan_report_load1_noabort+0x20/0x30 [ 31.048807] kmalloc_oob_right+0x5d0/0x660 [ 31.049139] kunit_try_run_case+0x170/0x3f0 [ 31.049590] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.050346] kthread+0x328/0x630 [ 31.050719] ret_from_fork+0x10/0x20 [ 31.051079] [ 31.051126] Allocated by task 147: [ 31.051841] kasan_save_stack+0x3c/0x68 [ 31.052086] kasan_save_track+0x20/0x40 [ 31.052183] kasan_save_alloc_info+0x40/0x58 [ 31.052453] __kasan_kmalloc+0xd4/0xd8 [ 31.052590] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.052768] kmalloc_oob_right+0xb0/0x660 [ 31.052852] kunit_try_run_case+0x170/0x3f0 [ 31.052947] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.053077] kthread+0x328/0x630 [ 31.053155] ret_from_fork+0x10/0x20 [ 31.053222] [ 31.053292] The buggy address belongs to the object at fff00000c44df200 [ 31.053292] which belongs to the cache kmalloc-128 of size 128 [ 31.053452] The buggy address is located 13 bytes to the right of [ 31.053452] allocated 115-byte region [fff00000c44df200, fff00000c44df273) [ 31.053652] [ 31.053732] The buggy address belongs to the physical page: [ 31.053962] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1044df [ 31.054232] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.054429] page_type: f5(slab) [ 31.054747] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.055237] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.055351] page dumped because: kasan: bad access detected [ 31.055441] [ 31.056112] Memory state around the buggy address: [ 31.056517] fff00000c44df180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.056812] fff00000c44df200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.056896] >fff00000c44df280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.056973] ^ [ 31.057040] fff00000c44df300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.057863] fff00000c44df380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.058161] ==================================================================
Failure - log-parser-boot - exception-warning-libteststest_ratelimit-at-test_ratelimit_stress_child
------------[ cut here ]------------ [ 192.806705] WARNING: lib/tests/test_ratelimit.c:87 at test_ratelimit_stress_child+0x160/0x1b8, CPU#1: test_ratelimit_/1565 [ 192.807752] Modules linked in: [ 192.808087] CPU: 1 UID: 0 PID: 1565 Comm: test_ratelimit_ Tainted: G B D W N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 192.808811] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 192.809215] Hardware name: linux,dummy-virt (DT) [ 192.809532] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 192.810014] pc : test_ratelimit_stress_child+0x160/0x1b8 [ 192.810683] lr : test_ratelimit_stress_child+0x30/0x1b8 [ 192.811194] sp : ffff8000893a7d90 [ 192.811376] x29: ffff8000893a7d90 x28: 0000000000000000 x27: 0000000000000000 [ 192.811970] x26: 1ffe000018fd1741 x25: 0000000000000000 x24: 0000000000000004 [ 192.812654] x23: fff00000c7e8ba0c x22: fff00000c7ff48a8 x21: ffff94c63fd3bb50 [ 192.813290] x20: fff00000c7e8ba00 x19: fff00000c7ff48a8 x18: 000000004b71b62a [ 192.813977] x17: 0000000000000001 x16: fff00000c6069c3c x15: fff00000ff616b08 [ 192.814623] x14: 0000000000018fff x13: 1ffe00001b48e5cd x12: fffd80001b492849 [ 192.815405] x11: 1ffe00001b492848 x10: fffd80001b492848 x9 : ffff94c642304e0c [ 192.816025] x8 : ffff8000893a7ae8 x7 : 0000000000000001 x6 : ffff8000893a7c00 [ 192.816378] x5 : 0000000000000001 x4 : ffff94c6446243e0 x3 : 0000000000000000 [ 192.817297] x2 : 1ffe000018ffe919 x1 : 0000000000000000 x0 : 0000000000000000 [ 192.818587] Call trace: [ 192.819019] test_ratelimit_stress_child+0x160/0x1b8 (P) [ 192.819411] kthread+0x328/0x630 [ 192.819730] ret_from_fork+0x10/0x20 [ 192.820013] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-libmathint_log-at-intlog10
------------[ cut here ]------------ [ 120.598221] WARNING: lib/math/int_log.c:120 at intlog10+0x38/0x48, CPU#1: kunit_try_catch/669 [ 120.599835] Modules linked in: [ 120.600449] CPU: 1 UID: 0 PID: 669 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 120.601587] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 120.601818] Hardware name: linux,dummy-virt (DT) [ 120.601988] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 120.602204] pc : intlog10+0x38/0x48 [ 120.602379] lr : intlog10_test+0xe4/0x200 [ 120.602535] sp : ffff800082417c10 [ 120.602723] x29: ffff800082417c90 x28: 0000000000000000 x27: 0000000000000000 [ 120.604019] x26: 1ffe000018b2d641 x25: 0000000000000000 x24: ffff800082417ce0 [ 120.604719] x23: ffff800082417d00 x22: 0000000000000000 x21: 1ffff00010482f82 [ 120.605381] x20: ffff94c6425ccf20 x19: ffff800080087990 x18: 00000000371ecb61 [ 120.606711] x17: 0000000000000001 x16: fff00000da494d28 x15: fff00000da4840d8 [ 120.607550] x14: fff00000c5f6bcd0 x13: 1ffe00001b492989 x12: ffff7298c8c83389 [ 120.608435] x11: 1ffff298c8c83388 x10: ffff7298c8c83388 x9 : ffff94c63fc3e784 [ 120.609472] x8 : ffff94c646419c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 120.610343] x5 : ffff700010482f82 x4 : 1ffff00010010f3a x3 : 1ffff298c84b99e4 [ 120.611156] x2 : 1ffff298c84b99e4 x1 : 0000000000000003 x0 : 0000000000000000 [ 120.611805] Call trace: [ 120.612088] intlog10+0x38/0x48 (P) [ 120.612590] kunit_try_run_case+0x170/0x3f0 [ 120.613405] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 120.613955] kthread+0x328/0x630 [ 120.614281] ret_from_fork+0x10/0x20 [ 120.614637] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-libmathint_log-at-intlog2
------------[ cut here ]------------ [ 120.497478] WARNING: lib/math/int_log.c:63 at intlog2+0xd8/0xf8, CPU#0: kunit_try_catch/651 [ 120.501595] Modules linked in: [ 120.503216] CPU: 0 UID: 0 PID: 651 Comm: kunit_try_catch Tainted: G B D N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 120.504038] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 120.504232] Hardware name: linux,dummy-virt (DT) [ 120.504562] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 120.505404] pc : intlog2+0xd8/0xf8 [ 120.505981] lr : intlog2_test+0xe4/0x200 [ 120.506312] sp : ffff800082367c10 [ 120.506532] x29: ffff800082367c90 x28: 0000000000000000 x27: 0000000000000000 [ 120.507049] x26: 1ffe000018bba901 x25: 0000000000000000 x24: ffff800082367ce0 [ 120.507925] x23: ffff800082367d00 x22: 0000000000000000 x21: 1ffff0001046cf82 [ 120.509191] x20: ffff94c6425cce20 x19: ffff800080087990 x18: 000000003328d4c9 [ 120.510142] x17: 00000000eb621b4e x16: 0000000000000100 x15: 00000000183fa90a [ 120.511085] x14: 00000000f1f1f1f1 x13: 1ffe00001b48e589 x12: ffff7298c8c83389 [ 120.512048] x11: 1ffff298c8c83388 x10: ffff7298c8c83388 x9 : ffff94c63fc3e984 [ 120.513096] x8 : ffff94c646419c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 120.514011] x5 : ffff70001046cf82 x4 : 1ffff00010010f3a x3 : 1ffff298c84b99c4 [ 120.514723] x2 : 1ffff298c84b99c4 x1 : 0000000000000003 x0 : 0000000000000000 [ 120.515139] Call trace: [ 120.515275] intlog2+0xd8/0xf8 (P) [ 120.515479] kunit_try_run_case+0x170/0x3f0 [ 120.515685] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 120.515886] kthread+0x328/0x630 [ 120.516047] ret_from_fork+0x10/0x20 [ 120.516262] ---[ end trace 0000000000000000 ]---
Failure - kunit - lib_ratelimit_lib_ratelimit
<8>[ 504.013301] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=lib_ratelimit_lib_ratelimit RESULT=fail>
Failure - kunit - lib_ratelimit_test_ratelimit_smoke
<8>[ 503.582709] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=lib_ratelimit_test_ratelimit_smoke RESULT=fail>
Failure - log-parser-boot - internal-error-oops-oops-smp
KNOWN ISSUE - LKFT: Dragonboard 845c: Internal error: Oops: ufs_qcom_setup_clocks
[ 119.071881] Internal error: Oops: 0000000096000005 [#1] SMP [ 119.080512] Modules linked in: [ 119.081482] CPU: 0 UID: 0 PID: 543 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc2-next-20250620 #1 PREEMPT [ 119.082920] Tainted: [B]=BAD_PAGE, [N]=TEST [ 119.083359] Hardware name: linux,dummy-virt (DT) [ 119.084234] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 119.085017] pc : kunit_test_null_dereference+0x70/0x170 [ 119.085706] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 119.086382] sp : ffff800080ff7d30 [ 119.086932] x29: ffff800080ff7d90 x28: 0000000000000000 x27: 0000000000000000 [ 119.087738] x26: 1ffe000018b2dc41 x25: 0000000000000000 x24: 0000000000000004 [ 119.088395] x23: fff00000c596e20c x22: ffff94c63fc2b228 x21: fff00000c3da2388 [ 119.089386] x20: 1ffff000101fefa6 x19: ffff800080087990 x18: 00000000024ba1df [ 119.090230] x17: 000000003ab9253e x16: fff00000c606a03c x15: 0000000075d900e8 [ 119.091071] x14: 00000000874ec3ea x13: 1ffe00001b4929cd x12: fffd80001909362c [ 119.091869] x11: 1ffe00001909362b x10: fffd80001909362b x9 : ffff94c63fc229d0 [ 119.092741] x8 : ffff800080ff7c18 x7 : 0000000000000001 x6 : 0000000041b58ab3 [ 119.093562] x5 : ffff7000101fefa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 119.094362] x2 : dfff800000000000 x1 : fff00000c849a880 x0 : ffff800080087990 [ 119.095440] Call trace: [ 119.095745] kunit_test_null_dereference+0x70/0x170 (P) [ 119.096459] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 119.097064] kthread+0x328/0x630 [ 119.097461] ret_from_fork+0x10/0x20 [ 119.098248] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 119.099373] ---[ end trace 0000000000000000 ]---