Date
June 23, 2025, 7:07 a.m.
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 36.189694] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 36.404450] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 36.313397] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 36.572736] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[ 66.380406] ================================================================== [ 66.380504] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 66.380504] [ 66.380617] Use-after-free read at 0x00000000a1a519f6 (in kfence-#191): [ 66.380679] test_krealloc+0x51c/0x830 [ 66.380741] kunit_try_run_case+0x170/0x3f0 [ 66.380801] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.380860] kthread+0x328/0x630 [ 66.380909] ret_from_fork+0x10/0x20 [ 66.380961] [ 66.380990] kfence-#191: 0x00000000a1a519f6-0x0000000039b9aabb, size=32, cache=kmalloc-32 [ 66.380990] [ 66.381079] allocated by task 349 on cpu 1 at 66.379406s (0.001668s ago): [ 66.381164] test_alloc+0x29c/0x628 [ 66.381218] test_krealloc+0xc0/0x830 [ 66.381268] kunit_try_run_case+0x170/0x3f0 [ 66.381317] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.381374] kthread+0x328/0x630 [ 66.381419] ret_from_fork+0x10/0x20 [ 66.381466] [ 66.381494] freed by task 349 on cpu 1 at 66.379795s (0.001694s ago): [ 66.381568] krealloc_noprof+0x148/0x360 [ 66.381619] test_krealloc+0x1dc/0x830 [ 66.381667] kunit_try_run_case+0x170/0x3f0 [ 66.381718] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.381771] kthread+0x328/0x630 [ 66.381815] ret_from_fork+0x10/0x20 [ 66.381864] [ 66.381916] CPU: 1 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 66.382012] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.382084] Hardware name: linux,dummy-virt (DT) [ 66.382131] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[ 39.200247] ================================================================== [ 39.200443] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 39.200443] [ 39.200591] Invalid free of 0x00000000ca7e0302 (in kfence-#126): [ 39.200730] test_double_free+0x1bc/0x238 [ 39.200847] kunit_try_run_case+0x170/0x3f0 [ 39.200958] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.201087] kthread+0x328/0x630 [ 39.201189] ret_from_fork+0x10/0x20 [ 39.201290] [ 39.201349] kfence-#126: 0x00000000ca7e0302-0x000000000cb24181, size=32, cache=kmalloc-32 [ 39.201349] [ 39.201474] allocated by task 315 on cpu 0 at 39.198062s (0.003403s ago): [ 39.201618] test_alloc+0x29c/0x628 [ 39.201720] test_double_free+0xd4/0x238 [ 39.201821] kunit_try_run_case+0x170/0x3f0 [ 39.201916] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.202020] kthread+0x328/0x630 [ 39.202180] ret_from_fork+0x10/0x20 [ 39.202299] [ 39.202364] freed by task 315 on cpu 0 at 39.199682s (0.002673s ago): [ 39.202688] test_double_free+0x1ac/0x238 [ 39.202828] kunit_try_run_case+0x170/0x3f0 [ 39.202942] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.203195] kthread+0x328/0x630 [ 39.203389] ret_from_fork+0x10/0x20 [ 39.203531] [ 39.203634] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 39.203904] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.204014] Hardware name: linux,dummy-virt (DT) [ 39.204161] ================================================================== [ 39.304794] ================================================================== [ 39.304864] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 39.304864] [ 39.304934] Invalid free of 0x00000000a8618b22 (in kfence-#127): [ 39.304995] test_double_free+0x100/0x238 [ 39.305104] kunit_try_run_case+0x170/0x3f0 [ 39.305220] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.305394] kthread+0x328/0x630 [ 39.305506] ret_from_fork+0x10/0x20 [ 39.305624] [ 39.305679] kfence-#127: 0x00000000a8618b22-0x0000000060c9e402, size=32, cache=test [ 39.305679] [ 39.306522] allocated by task 317 on cpu 0 at 39.304205s (0.002285s ago): [ 39.306791] test_alloc+0x230/0x628 [ 39.307528] test_double_free+0xd4/0x238 [ 39.307632] kunit_try_run_case+0x170/0x3f0 [ 39.308269] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.308713] kthread+0x328/0x630 [ 39.308808] ret_from_fork+0x10/0x20 [ 39.308901] [ 39.308956] freed by task 317 on cpu 0 at 39.304325s (0.004623s ago): [ 39.310066] test_double_free+0xf0/0x238 [ 39.310375] kunit_try_run_case+0x170/0x3f0 [ 39.310857] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.311296] kthread+0x328/0x630 [ 39.311520] ret_from_fork+0x10/0x20 [ 39.311910] [ 39.312048] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 39.312704] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.313204] Hardware name: linux,dummy-virt (DT) [ 39.313291] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[ 66.189611] ================================================================== [ 66.189705] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 66.189705] [ 66.189813] Use-after-free read at 0x000000007d625021 (in kfence-#189): [ 66.189874] test_memcache_typesafe_by_rcu+0x280/0x560 [ 66.189941] kunit_try_run_case+0x170/0x3f0 [ 66.189997] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.190134] kthread+0x328/0x630 [ 66.190196] ret_from_fork+0x10/0x20 [ 66.190245] [ 66.190274] kfence-#189: 0x000000007d625021-0x0000000067006ca6, size=32, cache=test [ 66.190274] [ 66.190338] allocated by task 347 on cpu 0 at 66.167851s (0.022483s ago): [ 66.190422] test_alloc+0x230/0x628 [ 66.190475] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 66.190529] kunit_try_run_case+0x170/0x3f0 [ 66.190631] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.190692] kthread+0x328/0x630 [ 66.190753] ret_from_fork+0x10/0x20 [ 66.190804] [ 66.190833] freed by task 347 on cpu 0 at 66.168011s (0.022818s ago): [ 66.190906] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 66.190964] kunit_try_run_case+0x170/0x3f0 [ 66.191012] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.191100] kthread+0x328/0x630 [ 66.191148] ret_from_fork+0x10/0x20 [ 66.191197] [ 66.191253] CPU: 0 UID: 0 PID: 347 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 66.191350] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.191387] Hardware name: linux,dummy-virt (DT) [ 66.191430] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[ 45.593389] ================================================================== [ 45.593629] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 45.593629] [ 45.593841] Invalid read at 0x00000000e65d83af: [ 45.594130] test_invalid_access+0xdc/0x1f0 [ 45.594276] kunit_try_run_case+0x170/0x3f0 [ 45.594412] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.594532] kthread+0x328/0x630 [ 45.594659] ret_from_fork+0x10/0x20 [ 45.594803] [ 45.594916] CPU: 1 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 45.595144] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.595234] Hardware name: linux,dummy-virt (DT) [ 45.595325] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[ 45.363494] ================================================================== [ 45.363581] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 45.363581] [ 45.363656] Corrupted memory at 0x00000000df0aed74 [ ! . . . . . . . . . . . . . . . ] (in kfence-#185): [ 45.364015] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 45.364112] kunit_try_run_case+0x170/0x3f0 [ 45.364169] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.364224] kthread+0x328/0x630 [ 45.364270] ret_from_fork+0x10/0x20 [ 45.364321] [ 45.364350] kfence-#185: 0x000000008c50db01-0x000000009d0de778, size=73, cache=kmalloc-96 [ 45.364350] [ 45.364414] allocated by task 337 on cpu 1 at 45.363200s (0.001209s ago): [ 45.364488] test_alloc+0x29c/0x628 [ 45.364541] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 45.364598] kunit_try_run_case+0x170/0x3f0 [ 45.364650] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.364705] kthread+0x328/0x630 [ 45.364750] ret_from_fork+0x10/0x20 [ 45.364798] [ 45.364827] freed by task 337 on cpu 1 at 45.363407s (0.001415s ago): [ 45.364906] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 45.364962] kunit_try_run_case+0x170/0x3f0 [ 45.365013] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.365088] kthread+0x328/0x630 [ 45.365134] ret_from_fork+0x10/0x20 [ 45.365183] [ 45.365229] CPU: 1 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 45.365326] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.365363] Hardware name: linux,dummy-virt (DT) [ 45.365403] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[ 45.259689] ================================================================== [ 45.259824] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 45.259824] [ 45.259943] Out-of-bounds read at 0x00000000a528ab6f (105B right of kfence-#184): [ 45.260015] test_kmalloc_aligned_oob_read+0x238/0x468 [ 45.260115] kunit_try_run_case+0x170/0x3f0 [ 45.260177] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.260231] kthread+0x328/0x630 [ 45.260279] ret_from_fork+0x10/0x20 [ 45.260331] [ 45.260360] kfence-#184: 0x0000000000ba79a4-0x0000000023382c9c, size=73, cache=kmalloc-96 [ 45.260360] [ 45.260424] allocated by task 335 on cpu 1 at 45.259292s (0.001127s ago): [ 45.260509] test_alloc+0x29c/0x628 [ 45.260562] test_kmalloc_aligned_oob_read+0x100/0x468 [ 45.260615] kunit_try_run_case+0x170/0x3f0 [ 45.260667] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.260722] kthread+0x328/0x630 [ 45.260766] ret_from_fork+0x10/0x20 [ 45.260814] [ 45.260869] CPU: 1 UID: 0 PID: 335 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 45.260966] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.261002] Hardware name: linux,dummy-virt (DT) [ 45.261062] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[ 40.156068] ================================================================== [ 40.156212] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 40.156212] [ 40.156339] Corrupted memory at 0x00000000e7ee4673 [ ! ] (in kfence-#135): [ 40.156684] test_corruption+0x284/0x378 [ 40.157212] kunit_try_run_case+0x170/0x3f0 [ 40.157635] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.158129] kthread+0x328/0x630 [ 40.158244] ret_from_fork+0x10/0x20 [ 40.159601] [ 40.159672] kfence-#135: 0x00000000ba58ed36-0x0000000069adc79a, size=32, cache=kmalloc-32 [ 40.159672] [ 40.159845] allocated by task 323 on cpu 0 at 40.155585s (0.004248s ago): [ 40.160012] test_alloc+0x29c/0x628 [ 40.160202] test_corruption+0x198/0x378 [ 40.160361] kunit_try_run_case+0x170/0x3f0 [ 40.160461] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.160567] kthread+0x328/0x630 [ 40.160652] ret_from_fork+0x10/0x20 [ 40.161863] [ 40.161943] freed by task 323 on cpu 0 at 40.155743s (0.006188s ago): [ 40.162646] test_corruption+0x284/0x378 [ 40.162783] kunit_try_run_case+0x170/0x3f0 [ 40.163496] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.163648] kthread+0x328/0x630 [ 40.163939] ret_from_fork+0x10/0x20 [ 40.164072] [ 40.164474] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 40.165462] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.165545] Hardware name: linux,dummy-virt (DT) [ 40.165624] ================================================================== [ 39.837251] ================================================================== [ 39.837395] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 39.837395] [ 39.837522] Corrupted memory at 0x000000006fd693aa [ ! . . . . . . . . . . . . . . . ] (in kfence-#132): [ 39.839612] test_corruption+0x278/0x378 [ 39.839766] kunit_try_run_case+0x170/0x3f0 [ 39.839980] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.840184] kthread+0x328/0x630 [ 39.840299] ret_from_fork+0x10/0x20 [ 39.840488] [ 39.840567] kfence-#132: 0x000000004d318858-0x00000000cb81aea1, size=32, cache=kmalloc-32 [ 39.840567] [ 39.840885] allocated by task 323 on cpu 0 at 39.836901s (0.003906s ago): [ 39.841343] test_alloc+0x29c/0x628 [ 39.841492] test_corruption+0xdc/0x378 [ 39.841679] kunit_try_run_case+0x170/0x3f0 [ 39.841735] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.841807] kthread+0x328/0x630 [ 39.841946] ret_from_fork+0x10/0x20 [ 39.842185] [ 39.842244] freed by task 323 on cpu 0 at 39.837085s (0.005150s ago): [ 39.842424] test_corruption+0x278/0x378 [ 39.842949] kunit_try_run_case+0x170/0x3f0 [ 39.843272] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.843485] kthread+0x328/0x630 [ 39.843594] ret_from_fork+0x10/0x20 [ 39.843913] [ 39.844176] CPU: 0 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 39.844672] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.844775] Hardware name: linux,dummy-virt (DT) [ 39.844858] ================================================================== [ 40.261277] ================================================================== [ 40.261418] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 40.261418] [ 40.261544] Corrupted memory at 0x0000000048c98904 [ ! . . . . . . . . . . . . . . . ] (in kfence-#136): [ 40.264219] test_corruption+0x120/0x378 [ 40.264429] kunit_try_run_case+0x170/0x3f0 [ 40.264837] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.265094] kthread+0x328/0x630 [ 40.265416] ret_from_fork+0x10/0x20 [ 40.265542] [ 40.265606] kfence-#136: 0x00000000e134741e-0x000000002f4eda49, size=32, cache=test [ 40.265606] [ 40.265746] allocated by task 325 on cpu 0 at 40.260990s (0.004745s ago): [ 40.266684] test_alloc+0x230/0x628 [ 40.266759] test_corruption+0xdc/0x378 [ 40.266820] kunit_try_run_case+0x170/0x3f0 [ 40.266998] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.267148] kthread+0x328/0x630 [ 40.267689] ret_from_fork+0x10/0x20 [ 40.267824] [ 40.267887] freed by task 325 on cpu 0 at 40.261126s (0.006752s ago): [ 40.268171] test_corruption+0x120/0x378 [ 40.268346] kunit_try_run_case+0x170/0x3f0 [ 40.268565] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.268838] kthread+0x328/0x630 [ 40.268925] ret_from_fork+0x10/0x20 [ 40.269809] [ 40.270119] CPU: 0 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 40.270316] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.270389] Hardware name: linux,dummy-virt (DT) [ 40.270505] ================================================================== [ 40.365656] ================================================================== [ 40.366098] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 40.366098] [ 40.366347] Corrupted memory at 0x00000000b10f91d0 [ ! ] (in kfence-#137): [ 40.366712] test_corruption+0x1d8/0x378 [ 40.366965] kunit_try_run_case+0x170/0x3f0 [ 40.367097] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.367262] kthread+0x328/0x630 [ 40.367365] ret_from_fork+0x10/0x20 [ 40.367492] [ 40.367660] kfence-#137: 0x00000000b2749bc3-0x000000007ed02576, size=32, cache=test [ 40.367660] [ 40.368011] allocated by task 325 on cpu 0 at 40.364950s (0.003033s ago): [ 40.368367] test_alloc+0x230/0x628 [ 40.368470] test_corruption+0x198/0x378 [ 40.368579] kunit_try_run_case+0x170/0x3f0 [ 40.368688] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.368858] kthread+0x328/0x630 [ 40.369435] ret_from_fork+0x10/0x20 [ 40.369774] [ 40.369847] freed by task 325 on cpu 0 at 40.365104s (0.004733s ago): [ 40.370012] test_corruption+0x1d8/0x378 [ 40.370240] kunit_try_run_case+0x170/0x3f0 [ 40.370344] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.370527] kthread+0x328/0x630 [ 40.370712] ret_from_fork+0x10/0x20 [ 40.370836] [ 40.370925] CPU: 0 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 40.371231] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.371445] Hardware name: linux,dummy-virt (DT) [ 40.371548] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[ 39.512570] ================================================================== [ 39.512713] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 39.512713] [ 39.512836] Invalid free of 0x000000008e0e8cde (in kfence-#129): [ 39.512949] test_invalid_addr_free+0xec/0x238 [ 39.513080] kunit_try_run_case+0x170/0x3f0 [ 39.513189] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.513295] kthread+0x328/0x630 [ 39.513390] ret_from_fork+0x10/0x20 [ 39.513482] [ 39.513535] kfence-#129: 0x00000000ca51d17b-0x000000000770dc52, size=32, cache=test [ 39.513535] [ 39.513651] allocated by task 321 on cpu 0 at 39.512359s (0.001285s ago): [ 39.513792] test_alloc+0x230/0x628 [ 39.513888] test_invalid_addr_free+0xd4/0x238 [ 39.513986] kunit_try_run_case+0x170/0x3f0 [ 39.514865] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.514960] kthread+0x328/0x630 [ 39.515009] ret_from_fork+0x10/0x20 [ 39.515117] [ 39.515337] CPU: 0 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 39.515805] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.515882] Hardware name: linux,dummy-virt (DT) [ 39.515972] ================================================================== [ 39.405979] ================================================================== [ 39.406679] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 39.406679] [ 39.406954] Invalid free of 0x00000000264f8b1b (in kfence-#128): [ 39.407137] test_invalid_addr_free+0x1ac/0x238 [ 39.407261] kunit_try_run_case+0x170/0x3f0 [ 39.407394] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.407793] kthread+0x328/0x630 [ 39.408148] ret_from_fork+0x10/0x20 [ 39.408299] [ 39.408502] kfence-#128: 0x000000000ebc1ead-0x00000000778f2188, size=32, cache=kmalloc-32 [ 39.408502] [ 39.408687] allocated by task 319 on cpu 0 at 39.405717s (0.002960s ago): [ 39.408841] test_alloc+0x29c/0x628 [ 39.408967] test_invalid_addr_free+0xd4/0x238 [ 39.409473] kunit_try_run_case+0x170/0x3f0 [ 39.409936] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.410098] kthread+0x328/0x630 [ 39.410488] ret_from_fork+0x10/0x20 [ 39.411008] [ 39.411160] CPU: 0 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 39.411358] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.411442] Hardware name: linux,dummy-virt (DT) [ 39.411522] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 33.323547] ================================================================== [ 33.323696] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 33.323967] Read of size 1 at addr fff00000c63f7473 by task kunit_try_catch/206 [ 33.324200] [ 33.324463] CPU: 1 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 33.324694] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.324767] Hardware name: linux,dummy-virt (DT) [ 33.324884] Call trace: [ 33.325095] show_stack+0x20/0x38 (C) [ 33.325338] dump_stack_lvl+0x8c/0xd0 [ 33.325456] print_report+0x118/0x608 [ 33.325572] kasan_report+0xdc/0x128 [ 33.325694] __asan_report_load1_noabort+0x20/0x30 [ 33.326056] ksize_unpoisons_memory+0x628/0x740 [ 33.326403] kunit_try_run_case+0x170/0x3f0 [ 33.326734] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.326993] kthread+0x328/0x630 [ 33.327199] ret_from_fork+0x10/0x20 [ 33.327694] [ 33.327756] Allocated by task 206: [ 33.327840] kasan_save_stack+0x3c/0x68 [ 33.327995] kasan_save_track+0x20/0x40 [ 33.328114] kasan_save_alloc_info+0x40/0x58 [ 33.328224] __kasan_kmalloc+0xd4/0xd8 [ 33.328325] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.328429] ksize_unpoisons_memory+0xc0/0x740 [ 33.328522] kunit_try_run_case+0x170/0x3f0 [ 33.328628] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.328929] kthread+0x328/0x630 [ 33.329115] ret_from_fork+0x10/0x20 [ 33.329245] [ 33.329400] The buggy address belongs to the object at fff00000c63f7400 [ 33.329400] which belongs to the cache kmalloc-128 of size 128 [ 33.329592] The buggy address is located 0 bytes to the right of [ 33.329592] allocated 115-byte region [fff00000c63f7400, fff00000c63f7473) [ 33.329745] [ 33.329796] The buggy address belongs to the physical page: [ 33.329935] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f7 [ 33.330148] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.330349] page_type: f5(slab) [ 33.330461] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.330589] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.330781] page dumped because: kasan: bad access detected [ 33.330867] [ 33.330914] Memory state around the buggy address: [ 33.331057] fff00000c63f7300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.331255] fff00000c63f7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.331371] >fff00000c63f7400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 33.331469] ^ [ 33.331611] fff00000c63f7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.331794] fff00000c63f7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.331890] ================================================================== [ 33.333202] ================================================================== [ 33.333301] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 33.333413] Read of size 1 at addr fff00000c63f7478 by task kunit_try_catch/206 [ 33.333529] [ 33.333592] CPU: 1 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 33.333780] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.333844] Hardware name: linux,dummy-virt (DT) [ 33.333915] Call trace: [ 33.333967] show_stack+0x20/0x38 (C) [ 33.334135] dump_stack_lvl+0x8c/0xd0 [ 33.334276] print_report+0x118/0x608 [ 33.334765] kasan_report+0xdc/0x128 [ 33.334963] __asan_report_load1_noabort+0x20/0x30 [ 33.335174] ksize_unpoisons_memory+0x618/0x740 [ 33.335316] kunit_try_run_case+0x170/0x3f0 [ 33.335445] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.336019] kthread+0x328/0x630 [ 33.336154] ret_from_fork+0x10/0x20 [ 33.336274] [ 33.336337] Allocated by task 206: [ 33.336410] kasan_save_stack+0x3c/0x68 [ 33.336520] kasan_save_track+0x20/0x40 [ 33.336822] kasan_save_alloc_info+0x40/0x58 [ 33.336992] __kasan_kmalloc+0xd4/0xd8 [ 33.337136] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.337248] ksize_unpoisons_memory+0xc0/0x740 [ 33.337534] kunit_try_run_case+0x170/0x3f0 [ 33.338835] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.338976] kthread+0x328/0x630 [ 33.339081] ret_from_fork+0x10/0x20 [ 33.339177] [ 33.339222] The buggy address belongs to the object at fff00000c63f7400 [ 33.339222] which belongs to the cache kmalloc-128 of size 128 [ 33.340131] The buggy address is located 5 bytes to the right of [ 33.340131] allocated 115-byte region [fff00000c63f7400, fff00000c63f7473) [ 33.340383] [ 33.340441] The buggy address belongs to the physical page: [ 33.340512] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f7 [ 33.341791] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.341923] page_type: f5(slab) [ 33.342516] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.342837] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.342939] page dumped because: kasan: bad access detected [ 33.343575] [ 33.343626] Memory state around the buggy address: [ 33.343876] fff00000c63f7300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.344146] fff00000c63f7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.344203] >fff00000c63f7400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 33.344272] ^ [ 33.344440] fff00000c63f7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.344561] fff00000c63f7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.344818] ================================================================== [ 33.345973] ================================================================== [ 33.346094] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 33.346230] Read of size 1 at addr fff00000c63f747f by task kunit_try_catch/206 [ 33.346357] [ 33.346424] CPU: 1 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 33.346689] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.346781] Hardware name: linux,dummy-virt (DT) [ 33.346867] Call trace: [ 33.346923] show_stack+0x20/0x38 (C) [ 33.347077] dump_stack_lvl+0x8c/0xd0 [ 33.347366] print_report+0x118/0x608 [ 33.347535] kasan_report+0xdc/0x128 [ 33.347701] __asan_report_load1_noabort+0x20/0x30 [ 33.347848] ksize_unpoisons_memory+0x690/0x740 [ 33.347996] kunit_try_run_case+0x170/0x3f0 [ 33.348145] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.348421] kthread+0x328/0x630 [ 33.348733] ret_from_fork+0x10/0x20 [ 33.348915] [ 33.348962] Allocated by task 206: [ 33.349052] kasan_save_stack+0x3c/0x68 [ 33.349154] kasan_save_track+0x20/0x40 [ 33.349247] kasan_save_alloc_info+0x40/0x58 [ 33.349332] __kasan_kmalloc+0xd4/0xd8 [ 33.349454] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.349745] ksize_unpoisons_memory+0xc0/0x740 [ 33.349885] kunit_try_run_case+0x170/0x3f0 [ 33.350006] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.350145] kthread+0x328/0x630 [ 33.350250] ret_from_fork+0x10/0x20 [ 33.350356] [ 33.350412] The buggy address belongs to the object at fff00000c63f7400 [ 33.350412] which belongs to the cache kmalloc-128 of size 128 [ 33.350569] The buggy address is located 12 bytes to the right of [ 33.350569] allocated 115-byte region [fff00000c63f7400, fff00000c63f7473) [ 33.350738] [ 33.350798] The buggy address belongs to the physical page: [ 33.350873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f7 [ 33.350994] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.351118] page_type: f5(slab) [ 33.351205] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.351442] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.351674] page dumped because: kasan: bad access detected [ 33.351755] [ 33.351813] Memory state around the buggy address: [ 33.351984] fff00000c63f7300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.352126] fff00000c63f7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.352236] >fff00000c63f7400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 33.352335] ^ [ 33.352454] fff00000c63f7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.352574] fff00000c63f7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.352682] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[ 38.875906] ================================================================== [ 38.876060] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 38.876060] [ 38.876226] Use-after-free read at 0x00000000abd44aef (in kfence-#123): [ 38.876339] test_use_after_free_read+0x114/0x248 [ 38.876456] kunit_try_run_case+0x170/0x3f0 [ 38.876561] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.876667] kthread+0x328/0x630 [ 38.876758] ret_from_fork+0x10/0x20 [ 38.876849] [ 38.876904] kfence-#123: 0x00000000abd44aef-0x0000000056336da7, size=32, cache=test [ 38.876904] [ 38.877052] allocated by task 309 on cpu 0 at 38.875449s (0.001561s ago): [ 38.877239] test_alloc+0x230/0x628 [ 38.877363] test_use_after_free_read+0xd0/0x248 [ 38.877486] kunit_try_run_case+0x170/0x3f0 [ 38.877644] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.877775] kthread+0x328/0x630 [ 38.877883] ret_from_fork+0x10/0x20 [ 38.878002] [ 38.878125] freed by task 309 on cpu 0 at 38.875540s (0.002553s ago): [ 38.878530] test_use_after_free_read+0xf0/0x248 [ 38.878808] kunit_try_run_case+0x170/0x3f0 [ 38.878920] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.879099] kthread+0x328/0x630 [ 38.879221] ret_from_fork+0x10/0x20 [ 38.879341] [ 38.879442] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 38.879771] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.879854] Hardware name: linux,dummy-virt (DT) [ 38.879957] ================================================================== [ 38.773528] ================================================================== [ 38.773677] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 38.773677] [ 38.773888] Use-after-free read at 0x000000009ddcc803 (in kfence-#122): [ 38.774534] test_use_after_free_read+0x114/0x248 [ 38.774837] kunit_try_run_case+0x170/0x3f0 [ 38.774989] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.775313] kthread+0x328/0x630 [ 38.775599] ret_from_fork+0x10/0x20 [ 38.775883] [ 38.776009] kfence-#122: 0x000000009ddcc803-0x00000000bb47c840, size=32, cache=kmalloc-32 [ 38.776009] [ 38.776157] allocated by task 307 on cpu 0 at 38.772468s (0.003679s ago): [ 38.776923] test_alloc+0x29c/0x628 [ 38.777054] test_use_after_free_read+0xd0/0x248 [ 38.777463] kunit_try_run_case+0x170/0x3f0 [ 38.777669] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.777777] kthread+0x328/0x630 [ 38.778629] ret_from_fork+0x10/0x20 [ 38.779204] [ 38.779518] freed by task 307 on cpu 0 at 38.772561s (0.006947s ago): [ 38.779681] test_use_after_free_read+0x1c0/0x248 [ 38.780452] kunit_try_run_case+0x170/0x3f0 [ 38.781307] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.782073] kthread+0x328/0x630 [ 38.782692] ret_from_fork+0x10/0x20 [ 38.783587] [ 38.783835] CPU: 0 UID: 0 PID: 307 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 38.785581] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.785698] Hardware name: linux,dummy-virt (DT) [ 38.786463] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[ 38.669644] ================================================================== [ 38.669778] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 38.669778] [ 38.670926] Out-of-bounds write at 0x00000000dd1f3a7a (1B left of kfence-#121): [ 38.671118] test_out_of_bounds_write+0x100/0x240 [ 38.672458] kunit_try_run_case+0x170/0x3f0 [ 38.672657] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.673458] kthread+0x328/0x630 [ 38.673598] ret_from_fork+0x10/0x20 [ 38.673695] [ 38.673757] kfence-#121: 0x00000000ecde970c-0x00000000cc58a22c, size=32, cache=test [ 38.673757] [ 38.675237] allocated by task 305 on cpu 0 at 38.669004s (0.006103s ago): [ 38.676015] test_alloc+0x230/0x628 [ 38.676569] test_out_of_bounds_write+0xc8/0x240 [ 38.676688] kunit_try_run_case+0x170/0x3f0 [ 38.676792] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.678076] kthread+0x328/0x630 [ 38.678228] ret_from_fork+0x10/0x20 [ 38.679014] [ 38.679549] CPU: 0 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 38.680230] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.680303] Hardware name: linux,dummy-virt (DT) [ 38.681248] ================================================================== [ 38.564916] ================================================================== [ 38.565157] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 38.565157] [ 38.565341] Out-of-bounds write at 0x0000000070181cce (1B left of kfence-#120): [ 38.565464] test_out_of_bounds_write+0x100/0x240 [ 38.565572] kunit_try_run_case+0x170/0x3f0 [ 38.565677] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.565783] kthread+0x328/0x630 [ 38.565877] ret_from_fork+0x10/0x20 [ 38.565974] [ 38.566047] kfence-#120: 0x000000005c11ca3d-0x00000000afa1abd7, size=32, cache=kmalloc-32 [ 38.566047] [ 38.566169] allocated by task 303 on cpu 0 at 38.562167s (0.003993s ago): [ 38.566323] test_alloc+0x29c/0x628 [ 38.566421] test_out_of_bounds_write+0xc8/0x240 [ 38.566517] kunit_try_run_case+0x170/0x3f0 [ 38.566960] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.567432] kthread+0x328/0x630 [ 38.567819] ret_from_fork+0x10/0x20 [ 38.568490] [ 38.569219] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 38.569489] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.569562] Hardware name: linux,dummy-virt (DT) [ 38.570638] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[ 38.031923] ================================================================== [ 38.032085] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 38.032085] [ 38.032261] Out-of-bounds read at 0x00000000cac57414 (1B left of kfence-#115): [ 38.032400] test_out_of_bounds_read+0x114/0x3e0 [ 38.032513] kunit_try_run_case+0x170/0x3f0 [ 38.032617] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.032719] kthread+0x328/0x630 [ 38.032813] ret_from_fork+0x10/0x20 [ 38.034423] [ 38.034759] kfence-#115: 0x00000000e394ed70-0x00000000e9a42170, size=32, cache=test [ 38.034759] [ 38.034903] allocated by task 301 on cpu 0 at 38.031634s (0.003259s ago): [ 38.035153] test_alloc+0x230/0x628 [ 38.035222] test_out_of_bounds_read+0xdc/0x3e0 [ 38.035305] kunit_try_run_case+0x170/0x3f0 [ 38.035551] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.035667] kthread+0x328/0x630 [ 38.035756] ret_from_fork+0x10/0x20 [ 38.035865] [ 38.036020] CPU: 0 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 38.036328] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.036498] Hardware name: linux,dummy-virt (DT) [ 38.036782] ================================================================== [ 37.601309] ================================================================== [ 37.602684] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 37.602684] [ 37.603566] Out-of-bounds read at 0x00000000d32db099 (1B left of kfence-#111): [ 37.604066] test_out_of_bounds_read+0x114/0x3e0 [ 37.604328] kunit_try_run_case+0x170/0x3f0 [ 37.604678] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.605268] kthread+0x328/0x630 [ 37.605409] ret_from_fork+0x10/0x20 [ 37.605672] [ 37.605751] kfence-#111: 0x000000009f851da8-0x00000000ac7bc858, size=32, cache=kmalloc-32 [ 37.605751] [ 37.606303] allocated by task 299 on cpu 0 at 37.599854s (0.006273s ago): [ 37.606476] test_alloc+0x29c/0x628 [ 37.606696] test_out_of_bounds_read+0xdc/0x3e0 [ 37.606962] kunit_try_run_case+0x170/0x3f0 [ 37.607558] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.607908] kthread+0x328/0x630 [ 37.608202] ret_from_fork+0x10/0x20 [ 37.608460] [ 37.608737] CPU: 0 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 37.609199] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.609613] Hardware name: linux,dummy-virt (DT) [ 37.609895] ================================================================== [ 38.245700] ================================================================== [ 38.246997] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 38.246997] [ 38.247669] Out-of-bounds read at 0x00000000dfa7e149 (32B right of kfence-#117): [ 38.247908] test_out_of_bounds_read+0x1c8/0x3e0 [ 38.248046] kunit_try_run_case+0x170/0x3f0 [ 38.248158] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.248974] kthread+0x328/0x630 [ 38.249276] ret_from_fork+0x10/0x20 [ 38.249622] [ 38.249686] kfence-#117: 0x00000000394e334d-0x000000002b4ab4a5, size=32, cache=test [ 38.249686] [ 38.250527] allocated by task 301 on cpu 0 at 38.245444s (0.005074s ago): [ 38.251071] test_alloc+0x230/0x628 [ 38.251471] test_out_of_bounds_read+0x198/0x3e0 [ 38.251588] kunit_try_run_case+0x170/0x3f0 [ 38.251685] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.251779] kthread+0x328/0x630 [ 38.252441] ret_from_fork+0x10/0x20 [ 38.253194] [ 38.253477] CPU: 0 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 38.253665] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.254685] Hardware name: linux,dummy-virt (DT) [ 38.254872] ================================================================== [ 37.817085] ================================================================== [ 37.817238] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 37.817238] [ 37.817437] Out-of-bounds read at 0x0000000027fcb00c (32B right of kfence-#113): [ 37.817566] test_out_of_bounds_read+0x1c8/0x3e0 [ 37.818659] kunit_try_run_case+0x170/0x3f0 [ 37.818930] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.820092] kthread+0x328/0x630 [ 37.821544] ret_from_fork+0x10/0x20 [ 37.821953] [ 37.822066] kfence-#113: 0x00000000d12e21e8-0x00000000d9cce558, size=32, cache=kmalloc-32 [ 37.822066] [ 37.822577] allocated by task 299 on cpu 0 at 37.816766s (0.005416s ago): [ 37.822897] test_alloc+0x29c/0x628 [ 37.822998] test_out_of_bounds_read+0x198/0x3e0 [ 37.823242] kunit_try_run_case+0x170/0x3f0 [ 37.823498] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.823841] kthread+0x328/0x630 [ 37.824401] ret_from_fork+0x10/0x20 [ 37.824550] [ 37.824671] CPU: 0 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 37.824864] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.824958] Hardware name: linux,dummy-virt (DT) [ 37.825069] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-kmalloc_oob_memset_4
[ 32.978970] ================================================================== [ 32.979255] BUG: KFENCE: memory corruption in kmalloc_oob_memset_4+0x170/0x300 [ 32.979255] [ 32.979559] Corrupted memory at 0x0000000025034bd4 [ ! . . . . . . . . . . . . . . . ] (in kfence-#81): [ 32.983127] kmalloc_oob_memset_4+0x170/0x300 [ 32.983359] kunit_try_run_case+0x170/0x3f0 [ 32.983564] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.983797] kthread+0x328/0x630 [ 32.983908] ret_from_fork+0x10/0x20 [ 32.984130] [ 32.984598] kfence-#81: 0x000000004d816a72-0x00000000243d6fd4, size=120, cache=kmalloc-128 [ 32.984598] [ 32.985070] allocated by task 186 on cpu 1 at 32.973465s (0.011386s ago): [ 32.985618] kmalloc_oob_memset_4+0xb0/0x300 [ 32.985775] kunit_try_run_case+0x170/0x3f0 [ 32.986076] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.986206] kthread+0x328/0x630 [ 32.986285] ret_from_fork+0x10/0x20 [ 32.986448] [ 32.986770] freed by task 186 on cpu 1 at 32.977198s (0.009333s ago): [ 32.986986] kmalloc_oob_memset_4+0x170/0x300 [ 32.987155] kunit_try_run_case+0x170/0x3f0 [ 32.987264] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.987381] kthread+0x328/0x630 [ 32.987621] ret_from_fork+0x10/0x20 [ 32.987815] [ 32.988212] CPU: 1 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 32.989169] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.989266] Hardware name: linux,dummy-virt (DT) [ 32.989739] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[ 37.400880] ================================================================== [ 37.400981] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 37.401116] Write of size 1 at addr fff00000c7801378 by task kunit_try_catch/297 [ 37.401233] [ 37.401302] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 37.403649] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.403736] Hardware name: linux,dummy-virt (DT) [ 37.403908] Call trace: [ 37.403971] show_stack+0x20/0x38 (C) [ 37.404504] dump_stack_lvl+0x8c/0xd0 [ 37.404750] print_report+0x118/0x608 [ 37.404886] kasan_report+0xdc/0x128 [ 37.405836] __asan_report_store1_noabort+0x20/0x30 [ 37.406227] strncpy_from_user+0x270/0x2a0 [ 37.407103] copy_user_test_oob+0x5c0/0xec8 [ 37.407654] kunit_try_run_case+0x170/0x3f0 [ 37.407789] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.407934] kthread+0x328/0x630 [ 37.408065] ret_from_fork+0x10/0x20 [ 37.408201] [ 37.409307] Allocated by task 297: [ 37.409582] kasan_save_stack+0x3c/0x68 [ 37.410850] kasan_save_track+0x20/0x40 [ 37.410968] kasan_save_alloc_info+0x40/0x58 [ 37.411102] __kasan_kmalloc+0xd4/0xd8 [ 37.411205] __kmalloc_noprof+0x198/0x4c8 [ 37.411309] kunit_kmalloc_array+0x34/0x88 [ 37.413197] copy_user_test_oob+0xac/0xec8 [ 37.413362] kunit_try_run_case+0x170/0x3f0 [ 37.414497] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.415130] kthread+0x328/0x630 [ 37.415231] ret_from_fork+0x10/0x20 [ 37.416169] [ 37.416747] The buggy address belongs to the object at fff00000c7801300 [ 37.416747] which belongs to the cache kmalloc-128 of size 128 [ 37.417473] The buggy address is located 0 bytes to the right of [ 37.417473] allocated 120-byte region [fff00000c7801300, fff00000c7801378) [ 37.417678] [ 37.418799] The buggy address belongs to the physical page: [ 37.419222] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107801 [ 37.419761] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.420394] page_type: f5(slab) [ 37.420500] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.421146] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 37.421281] page dumped because: kasan: bad access detected [ 37.421363] [ 37.421745] Memory state around the buggy address: [ 37.422272] fff00000c7801200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.422707] fff00000c7801280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.423812] >fff00000c7801300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.424096] ^ [ 37.424207] fff00000c7801380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.425147] fff00000c7801400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.426156] ================================================================== [ 37.388687] ================================================================== [ 37.388866] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 37.388996] Write of size 121 at addr fff00000c7801300 by task kunit_try_catch/297 [ 37.389140] [ 37.389212] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 37.389414] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.389555] Hardware name: linux,dummy-virt (DT) [ 37.389640] Call trace: [ 37.389730] show_stack+0x20/0x38 (C) [ 37.389881] dump_stack_lvl+0x8c/0xd0 [ 37.390121] print_report+0x118/0x608 [ 37.390348] kasan_report+0xdc/0x128 [ 37.390535] kasan_check_range+0x100/0x1a8 [ 37.390779] __kasan_check_write+0x20/0x30 [ 37.390919] strncpy_from_user+0x3c/0x2a0 [ 37.391274] copy_user_test_oob+0x5c0/0xec8 [ 37.391459] kunit_try_run_case+0x170/0x3f0 [ 37.391725] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.391966] kthread+0x328/0x630 [ 37.392194] ret_from_fork+0x10/0x20 [ 37.392390] [ 37.392466] Allocated by task 297: [ 37.392553] kasan_save_stack+0x3c/0x68 [ 37.392663] kasan_save_track+0x20/0x40 [ 37.392766] kasan_save_alloc_info+0x40/0x58 [ 37.392937] __kasan_kmalloc+0xd4/0xd8 [ 37.393165] __kmalloc_noprof+0x198/0x4c8 [ 37.393304] kunit_kmalloc_array+0x34/0x88 [ 37.393428] copy_user_test_oob+0xac/0xec8 [ 37.393553] kunit_try_run_case+0x170/0x3f0 [ 37.393768] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.393949] kthread+0x328/0x630 [ 37.394163] ret_from_fork+0x10/0x20 [ 37.394281] [ 37.394335] The buggy address belongs to the object at fff00000c7801300 [ 37.394335] which belongs to the cache kmalloc-128 of size 128 [ 37.394491] The buggy address is located 0 bytes inside of [ 37.394491] allocated 120-byte region [fff00000c7801300, fff00000c7801378) [ 37.394720] [ 37.394796] The buggy address belongs to the physical page: [ 37.394879] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107801 [ 37.395139] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.395310] page_type: f5(slab) [ 37.395585] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.396065] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 37.396250] page dumped because: kasan: bad access detected [ 37.396331] [ 37.396379] Memory state around the buggy address: [ 37.396450] fff00000c7801200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.396561] fff00000c7801280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.396662] >fff00000c7801300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.396757] ^ [ 37.396967] fff00000c7801380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.397862] fff00000c7801400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.398090] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[ 37.332680] ================================================================== [ 37.332786] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 37.332907] Write of size 121 at addr fff00000c7801300 by task kunit_try_catch/297 [ 37.333483] [ 37.333714] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 37.335060] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.335228] Hardware name: linux,dummy-virt (DT) [ 37.335455] Call trace: [ 37.336220] show_stack+0x20/0x38 (C) [ 37.336353] dump_stack_lvl+0x8c/0xd0 [ 37.337706] print_report+0x118/0x608 [ 37.338494] kasan_report+0xdc/0x128 [ 37.339179] kasan_check_range+0x100/0x1a8 [ 37.339882] __kasan_check_write+0x20/0x30 [ 37.340337] copy_user_test_oob+0x35c/0xec8 [ 37.340513] kunit_try_run_case+0x170/0x3f0 [ 37.340634] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.341267] kthread+0x328/0x630 [ 37.341758] ret_from_fork+0x10/0x20 [ 37.342345] [ 37.342418] Allocated by task 297: [ 37.342757] kasan_save_stack+0x3c/0x68 [ 37.343177] kasan_save_track+0x20/0x40 [ 37.343287] kasan_save_alloc_info+0x40/0x58 [ 37.343384] __kasan_kmalloc+0xd4/0xd8 [ 37.343474] __kmalloc_noprof+0x198/0x4c8 [ 37.343572] kunit_kmalloc_array+0x34/0x88 [ 37.343890] copy_user_test_oob+0xac/0xec8 [ 37.344171] kunit_try_run_case+0x170/0x3f0 [ 37.344569] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.345218] kthread+0x328/0x630 [ 37.345336] ret_from_fork+0x10/0x20 [ 37.345435] [ 37.346113] The buggy address belongs to the object at fff00000c7801300 [ 37.346113] which belongs to the cache kmalloc-128 of size 128 [ 37.346896] The buggy address is located 0 bytes inside of [ 37.346896] allocated 120-byte region [fff00000c7801300, fff00000c7801378) [ 37.347529] [ 37.347588] The buggy address belongs to the physical page: [ 37.347666] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107801 [ 37.347809] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.348167] page_type: f5(slab) [ 37.348381] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.348509] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 37.348613] page dumped because: kasan: bad access detected [ 37.348691] [ 37.348738] Memory state around the buggy address: [ 37.348817] fff00000c7801200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.348930] fff00000c7801280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.349129] >fff00000c7801300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.349234] ^ [ 37.349356] fff00000c7801380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.349560] fff00000c7801400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.350268] ================================================================== [ 37.280098] ================================================================== [ 37.280341] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 37.280506] Write of size 121 at addr fff00000c7801300 by task kunit_try_catch/297 [ 37.280633] [ 37.280724] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 37.280926] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.280994] Hardware name: linux,dummy-virt (DT) [ 37.281628] Call trace: [ 37.281708] show_stack+0x20/0x38 (C) [ 37.281874] dump_stack_lvl+0x8c/0xd0 [ 37.282121] print_report+0x118/0x608 [ 37.282258] kasan_report+0xdc/0x128 [ 37.282375] kasan_check_range+0x100/0x1a8 [ 37.282496] __kasan_check_write+0x20/0x30 [ 37.282635] copy_user_test_oob+0x234/0xec8 [ 37.282794] kunit_try_run_case+0x170/0x3f0 [ 37.282953] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.283226] kthread+0x328/0x630 [ 37.283366] ret_from_fork+0x10/0x20 [ 37.283639] [ 37.283937] Allocated by task 297: [ 37.284077] kasan_save_stack+0x3c/0x68 [ 37.284199] kasan_save_track+0x20/0x40 [ 37.284488] kasan_save_alloc_info+0x40/0x58 [ 37.284737] __kasan_kmalloc+0xd4/0xd8 [ 37.284909] __kmalloc_noprof+0x198/0x4c8 [ 37.285392] kunit_kmalloc_array+0x34/0x88 [ 37.285774] copy_user_test_oob+0xac/0xec8 [ 37.285943] kunit_try_run_case+0x170/0x3f0 [ 37.286100] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.286209] kthread+0x328/0x630 [ 37.286330] ret_from_fork+0x10/0x20 [ 37.286754] [ 37.286853] The buggy address belongs to the object at fff00000c7801300 [ 37.286853] which belongs to the cache kmalloc-128 of size 128 [ 37.287003] The buggy address is located 0 bytes inside of [ 37.287003] allocated 120-byte region [fff00000c7801300, fff00000c7801378) [ 37.287191] [ 37.287255] The buggy address belongs to the physical page: [ 37.287340] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107801 [ 37.287607] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.287745] page_type: f5(slab) [ 37.287897] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.288043] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 37.288157] page dumped because: kasan: bad access detected [ 37.288235] [ 37.288283] Memory state around the buggy address: [ 37.288408] fff00000c7801200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.288520] fff00000c7801280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.288626] >fff00000c7801300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.288726] ^ [ 37.288875] fff00000c7801380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.288984] fff00000c7801400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.289618] ================================================================== [ 37.302652] ================================================================== [ 37.303556] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 37.304219] Read of size 121 at addr fff00000c7801300 by task kunit_try_catch/297 [ 37.304375] [ 37.304452] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 37.304930] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.305086] Hardware name: linux,dummy-virt (DT) [ 37.305225] Call trace: [ 37.305291] show_stack+0x20/0x38 (C) [ 37.305444] dump_stack_lvl+0x8c/0xd0 [ 37.305696] print_report+0x118/0x608 [ 37.305938] kasan_report+0xdc/0x128 [ 37.306286] kasan_check_range+0x100/0x1a8 [ 37.306451] __kasan_check_read+0x20/0x30 [ 37.306690] copy_user_test_oob+0x728/0xec8 [ 37.307143] kunit_try_run_case+0x170/0x3f0 [ 37.307426] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.307600] kthread+0x328/0x630 [ 37.307783] ret_from_fork+0x10/0x20 [ 37.307943] [ 37.308002] Allocated by task 297: [ 37.308103] kasan_save_stack+0x3c/0x68 [ 37.308209] kasan_save_track+0x20/0x40 [ 37.308388] kasan_save_alloc_info+0x40/0x58 [ 37.308583] __kasan_kmalloc+0xd4/0xd8 [ 37.308868] __kmalloc_noprof+0x198/0x4c8 [ 37.308996] kunit_kmalloc_array+0x34/0x88 [ 37.309129] copy_user_test_oob+0xac/0xec8 [ 37.309437] kunit_try_run_case+0x170/0x3f0 [ 37.309716] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.309845] kthread+0x328/0x630 [ 37.310123] ret_from_fork+0x10/0x20 [ 37.310326] [ 37.310381] The buggy address belongs to the object at fff00000c7801300 [ 37.310381] which belongs to the cache kmalloc-128 of size 128 [ 37.310661] The buggy address is located 0 bytes inside of [ 37.310661] allocated 120-byte region [fff00000c7801300, fff00000c7801378) [ 37.310845] [ 37.310913] The buggy address belongs to the physical page: [ 37.311178] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107801 [ 37.312327] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.312524] page_type: f5(slab) [ 37.312632] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.312760] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 37.312914] page dumped because: kasan: bad access detected [ 37.313059] [ 37.313145] Memory state around the buggy address: [ 37.313396] fff00000c7801200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.313510] fff00000c7801280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.313617] >fff00000c7801300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.313713] ^ [ 37.313814] fff00000c7801380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.313920] fff00000c7801400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.314015] ================================================================== [ 37.376958] ================================================================== [ 37.377190] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 37.377472] Read of size 121 at addr fff00000c7801300 by task kunit_try_catch/297 [ 37.377697] [ 37.377904] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 37.378220] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.378292] Hardware name: linux,dummy-virt (DT) [ 37.378374] Call trace: [ 37.378560] show_stack+0x20/0x38 (C) [ 37.378715] dump_stack_lvl+0x8c/0xd0 [ 37.378872] print_report+0x118/0x608 [ 37.379088] kasan_report+0xdc/0x128 [ 37.379277] kasan_check_range+0x100/0x1a8 [ 37.379501] __kasan_check_read+0x20/0x30 [ 37.379660] copy_user_test_oob+0x4a0/0xec8 [ 37.379850] kunit_try_run_case+0x170/0x3f0 [ 37.380054] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.380216] kthread+0x328/0x630 [ 37.380995] ret_from_fork+0x10/0x20 [ 37.381192] [ 37.381327] Allocated by task 297: [ 37.381406] kasan_save_stack+0x3c/0x68 [ 37.381509] kasan_save_track+0x20/0x40 [ 37.381613] kasan_save_alloc_info+0x40/0x58 [ 37.381733] __kasan_kmalloc+0xd4/0xd8 [ 37.381857] __kmalloc_noprof+0x198/0x4c8 [ 37.382147] kunit_kmalloc_array+0x34/0x88 [ 37.382290] copy_user_test_oob+0xac/0xec8 [ 37.382391] kunit_try_run_case+0x170/0x3f0 [ 37.382493] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.382666] kthread+0x328/0x630 [ 37.382790] ret_from_fork+0x10/0x20 [ 37.383022] [ 37.383141] The buggy address belongs to the object at fff00000c7801300 [ 37.383141] which belongs to the cache kmalloc-128 of size 128 [ 37.383353] The buggy address is located 0 bytes inside of [ 37.383353] allocated 120-byte region [fff00000c7801300, fff00000c7801378) [ 37.383589] [ 37.383654] The buggy address belongs to the physical page: [ 37.383743] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107801 [ 37.383885] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.384014] page_type: f5(slab) [ 37.384259] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.384617] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 37.384909] page dumped because: kasan: bad access detected [ 37.385107] [ 37.385165] Memory state around the buggy address: [ 37.385282] fff00000c7801200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.385397] fff00000c7801280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.385542] >fff00000c7801300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.385641] ^ [ 37.385747] fff00000c7801380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.385851] fff00000c7801400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.385944] ================================================================== [ 37.368233] ================================================================== [ 37.368407] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 37.368559] Write of size 121 at addr fff00000c7801300 by task kunit_try_catch/297 [ 37.368698] [ 37.368794] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 37.369233] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.369430] Hardware name: linux,dummy-virt (DT) [ 37.369562] Call trace: [ 37.369670] show_stack+0x20/0x38 (C) [ 37.369903] dump_stack_lvl+0x8c/0xd0 [ 37.370050] print_report+0x118/0x608 [ 37.370173] kasan_report+0xdc/0x128 [ 37.370290] kasan_check_range+0x100/0x1a8 [ 37.370426] __kasan_check_write+0x20/0x30 [ 37.370633] copy_user_test_oob+0x434/0xec8 [ 37.370845] kunit_try_run_case+0x170/0x3f0 [ 37.371020] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.371180] kthread+0x328/0x630 [ 37.371310] ret_from_fork+0x10/0x20 [ 37.371429] [ 37.371569] Allocated by task 297: [ 37.371680] kasan_save_stack+0x3c/0x68 [ 37.371790] kasan_save_track+0x20/0x40 [ 37.371884] kasan_save_alloc_info+0x40/0x58 [ 37.371980] __kasan_kmalloc+0xd4/0xd8 [ 37.372097] __kmalloc_noprof+0x198/0x4c8 [ 37.372194] kunit_kmalloc_array+0x34/0x88 [ 37.372288] copy_user_test_oob+0xac/0xec8 [ 37.372385] kunit_try_run_case+0x170/0x3f0 [ 37.372482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.372612] kthread+0x328/0x630 [ 37.372722] ret_from_fork+0x10/0x20 [ 37.372918] [ 37.372976] The buggy address belongs to the object at fff00000c7801300 [ 37.372976] which belongs to the cache kmalloc-128 of size 128 [ 37.373183] The buggy address is located 0 bytes inside of [ 37.373183] allocated 120-byte region [fff00000c7801300, fff00000c7801378) [ 37.373428] [ 37.373492] The buggy address belongs to the physical page: [ 37.373596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107801 [ 37.373827] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.374057] page_type: f5(slab) [ 37.374172] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.374299] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 37.374399] page dumped because: kasan: bad access detected [ 37.374539] [ 37.374608] Memory state around the buggy address: [ 37.374801] fff00000c7801200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.374951] fff00000c7801280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.375143] >fff00000c7801300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.375243] ^ [ 37.375413] fff00000c7801380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.375529] fff00000c7801400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.375633] ================================================================== [ 37.352200] ================================================================== [ 37.352304] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 37.352421] Read of size 121 at addr fff00000c7801300 by task kunit_try_catch/297 [ 37.352551] [ 37.352625] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 37.352832] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.352903] Hardware name: linux,dummy-virt (DT) [ 37.352974] Call trace: [ 37.353051] show_stack+0x20/0x38 (C) [ 37.353174] dump_stack_lvl+0x8c/0xd0 [ 37.353288] print_report+0x118/0x608 [ 37.353418] kasan_report+0xdc/0x128 [ 37.353564] kasan_check_range+0x100/0x1a8 [ 37.354165] __kasan_check_read+0x20/0x30 [ 37.354614] copy_user_test_oob+0x3c8/0xec8 [ 37.354792] kunit_try_run_case+0x170/0x3f0 [ 37.354924] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.355090] kthread+0x328/0x630 [ 37.355235] ret_from_fork+0x10/0x20 [ 37.355379] [ 37.355554] Allocated by task 297: [ 37.356486] kasan_save_stack+0x3c/0x68 [ 37.356765] kasan_save_track+0x20/0x40 [ 37.356978] kasan_save_alloc_info+0x40/0x58 [ 37.357279] __kasan_kmalloc+0xd4/0xd8 [ 37.357549] __kmalloc_noprof+0x198/0x4c8 [ 37.357651] kunit_kmalloc_array+0x34/0x88 [ 37.357747] copy_user_test_oob+0xac/0xec8 [ 37.357847] kunit_try_run_case+0x170/0x3f0 [ 37.357944] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.358073] kthread+0x328/0x630 [ 37.358173] ret_from_fork+0x10/0x20 [ 37.358288] [ 37.358350] The buggy address belongs to the object at fff00000c7801300 [ 37.358350] which belongs to the cache kmalloc-128 of size 128 [ 37.359302] The buggy address is located 0 bytes inside of [ 37.359302] allocated 120-byte region [fff00000c7801300, fff00000c7801378) [ 37.360301] [ 37.360418] The buggy address belongs to the physical page: [ 37.360558] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107801 [ 37.360730] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.360872] page_type: f5(slab) [ 37.360986] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.361732] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 37.361836] page dumped because: kasan: bad access detected [ 37.362068] [ 37.362121] Memory state around the buggy address: [ 37.362200] fff00000c7801200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.362307] fff00000c7801280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.362412] >fff00000c7801300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.362501] ^ [ 37.362660] fff00000c7801380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.362783] fff00000c7801400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.362962] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[ 37.188986] ================================================================== [ 37.189145] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 37.189313] Read of size 8 at addr fff00000c7801278 by task kunit_try_catch/293 [ 37.189448] [ 37.190010] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 37.190488] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.190629] Hardware name: linux,dummy-virt (DT) [ 37.191145] Call trace: [ 37.191211] show_stack+0x20/0x38 (C) [ 37.191349] dump_stack_lvl+0x8c/0xd0 [ 37.191718] print_report+0x118/0x608 [ 37.191867] kasan_report+0xdc/0x128 [ 37.192129] __asan_report_load8_noabort+0x20/0x30 [ 37.192658] copy_to_kernel_nofault+0x204/0x250 [ 37.193113] copy_to_kernel_nofault_oob+0x158/0x418 [ 37.193251] kunit_try_run_case+0x170/0x3f0 [ 37.193379] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.194550] kthread+0x328/0x630 [ 37.194780] ret_from_fork+0x10/0x20 [ 37.195480] [ 37.195539] Allocated by task 293: [ 37.196245] kasan_save_stack+0x3c/0x68 [ 37.196567] kasan_save_track+0x20/0x40 [ 37.196996] kasan_save_alloc_info+0x40/0x58 [ 37.197183] __kasan_kmalloc+0xd4/0xd8 [ 37.197290] __kmalloc_cache_noprof+0x16c/0x3c0 [ 37.197712] copy_to_kernel_nofault_oob+0xc8/0x418 [ 37.197817] kunit_try_run_case+0x170/0x3f0 [ 37.198129] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.198656] kthread+0x328/0x630 [ 37.198774] ret_from_fork+0x10/0x20 [ 37.199088] [ 37.199159] The buggy address belongs to the object at fff00000c7801200 [ 37.199159] which belongs to the cache kmalloc-128 of size 128 [ 37.200007] The buggy address is located 0 bytes to the right of [ 37.200007] allocated 120-byte region [fff00000c7801200, fff00000c7801278) [ 37.200199] [ 37.200261] The buggy address belongs to the physical page: [ 37.200342] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107801 [ 37.201319] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.202581] page_type: f5(slab) [ 37.202714] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.202986] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 37.203104] page dumped because: kasan: bad access detected [ 37.203927] [ 37.203992] Memory state around the buggy address: [ 37.204491] fff00000c7801100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.204605] fff00000c7801180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.204717] >fff00000c7801200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.205856] ^ [ 37.206183] fff00000c7801280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.206590] fff00000c7801300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.206701] ================================================================== [ 37.216834] ================================================================== [ 37.216930] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 37.217696] Write of size 8 at addr fff00000c7801278 by task kunit_try_catch/293 [ 37.218842] [ 37.218927] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 37.219743] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.219967] Hardware name: linux,dummy-virt (DT) [ 37.220215] Call trace: [ 37.220294] show_stack+0x20/0x38 (C) [ 37.220791] dump_stack_lvl+0x8c/0xd0 [ 37.221136] print_report+0x118/0x608 [ 37.221265] kasan_report+0xdc/0x128 [ 37.222153] kasan_check_range+0x100/0x1a8 [ 37.222665] __kasan_check_write+0x20/0x30 [ 37.222803] copy_to_kernel_nofault+0x8c/0x250 [ 37.223756] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 37.223980] kunit_try_run_case+0x170/0x3f0 [ 37.224120] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.224277] kthread+0x328/0x630 [ 37.224412] ret_from_fork+0x10/0x20 [ 37.224551] [ 37.224608] Allocated by task 293: [ 37.224715] kasan_save_stack+0x3c/0x68 [ 37.224919] kasan_save_track+0x20/0x40 [ 37.225092] kasan_save_alloc_info+0x40/0x58 [ 37.225433] __kasan_kmalloc+0xd4/0xd8 [ 37.225586] __kmalloc_cache_noprof+0x16c/0x3c0 [ 37.225856] copy_to_kernel_nofault_oob+0xc8/0x418 [ 37.225993] kunit_try_run_case+0x170/0x3f0 [ 37.226537] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.226848] kthread+0x328/0x630 [ 37.227045] ret_from_fork+0x10/0x20 [ 37.227149] [ 37.227217] The buggy address belongs to the object at fff00000c7801200 [ 37.227217] which belongs to the cache kmalloc-128 of size 128 [ 37.227480] The buggy address is located 0 bytes to the right of [ 37.227480] allocated 120-byte region [fff00000c7801200, fff00000c7801278) [ 37.227646] [ 37.227751] The buggy address belongs to the physical page: [ 37.227845] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107801 [ 37.227979] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.228331] page_type: f5(slab) [ 37.228675] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 37.228803] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 37.228936] page dumped because: kasan: bad access detected [ 37.229320] [ 37.229384] Memory state around the buggy address: [ 37.229479] fff00000c7801100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.229652] fff00000c7801180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.229772] >fff00000c7801200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.229877] ^ [ 37.229990] fff00000c7801280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.230122] fff00000c7801300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.230237] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 32.450041] ================================================================== [ 32.450179] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 32.450319] Read of size 1 at addr fff00000c7720000 by task kunit_try_catch/166 [ 32.450431] [ 32.450509] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 32.450702] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.450772] Hardware name: linux,dummy-virt (DT) [ 32.450875] Call trace: [ 32.450935] show_stack+0x20/0x38 (C) [ 32.451112] dump_stack_lvl+0x8c/0xd0 [ 32.451904] print_report+0x118/0x608 [ 32.452624] kasan_report+0xdc/0x128 [ 32.452791] __asan_report_load1_noabort+0x20/0x30 [ 32.452919] page_alloc_uaf+0x328/0x350 [ 32.453063] kunit_try_run_case+0x170/0x3f0 [ 32.453195] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.454614] kthread+0x328/0x630 [ 32.455078] ret_from_fork+0x10/0x20 [ 32.455218] [ 32.455520] The buggy address belongs to the physical page: [ 32.455878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107720 [ 32.456002] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.456783] page_type: f0(buddy) [ 32.457166] raw: 0bfffe0000000000 fff00000ff616108 fff00000ff616108 0000000000000000 [ 32.457286] raw: 0000000000000000 0000000000000005 00000000f0000000 0000000000000000 [ 32.457846] page dumped because: kasan: bad access detected [ 32.458067] [ 32.458134] Memory state around the buggy address: [ 32.458583] fff00000c771ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.458889] fff00000c771ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.458992] >fff00000c7720000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.459095] ^ [ 32.459173] fff00000c7720080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.459520] fff00000c7720100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.461244] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 37.109345] ================================================================== [ 37.109444] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 37.109555] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/281 [ 37.109670] [ 37.109735] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 37.109925] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.109995] Hardware name: linux,dummy-virt (DT) [ 37.110108] Call trace: [ 37.110183] show_stack+0x20/0x38 (C) [ 37.110326] dump_stack_lvl+0x8c/0xd0 [ 37.110468] print_report+0x310/0x608 [ 37.110666] kasan_report+0xdc/0x128 [ 37.110824] __asan_report_load1_noabort+0x20/0x30 [ 37.111000] vmalloc_oob+0x51c/0x5d0 [ 37.111240] kunit_try_run_case+0x170/0x3f0 [ 37.111372] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.111566] kthread+0x328/0x630 [ 37.111700] ret_from_fork+0x10/0x20 [ 37.111842] [ 37.111906] The buggy address belongs to the virtual mapping at [ 37.111906] [ffff8000800fe000, ffff800080100000) created by: [ 37.111906] vmalloc_oob+0x98/0x5d0 [ 37.112102] [ 37.112212] The buggy address belongs to the physical page: [ 37.112329] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107807 [ 37.112482] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.112811] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 37.112937] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 37.113057] page dumped because: kasan: bad access detected [ 37.113140] [ 37.113219] Memory state around the buggy address: [ 37.113301] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.113418] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.113526] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 37.113657] ^ [ 37.113940] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 37.114073] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 37.114186] ================================================================== [ 37.103098] ================================================================== [ 37.103253] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 37.103515] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/281 [ 37.103729] [ 37.103914] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 37.104243] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.104326] Hardware name: linux,dummy-virt (DT) [ 37.104416] Call trace: [ 37.104489] show_stack+0x20/0x38 (C) [ 37.104634] dump_stack_lvl+0x8c/0xd0 [ 37.104769] print_report+0x310/0x608 [ 37.104951] kasan_report+0xdc/0x128 [ 37.105103] __asan_report_load1_noabort+0x20/0x30 [ 37.105229] vmalloc_oob+0x578/0x5d0 [ 37.105340] kunit_try_run_case+0x170/0x3f0 [ 37.105465] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.105603] kthread+0x328/0x630 [ 37.105715] ret_from_fork+0x10/0x20 [ 37.105851] [ 37.105937] The buggy address belongs to the virtual mapping at [ 37.105937] [ffff8000800fe000, ffff800080100000) created by: [ 37.105937] vmalloc_oob+0x98/0x5d0 [ 37.106154] [ 37.106223] The buggy address belongs to the physical page: [ 37.106328] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107807 [ 37.106588] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.106774] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 37.106915] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 37.107043] page dumped because: kasan: bad access detected [ 37.107158] [ 37.107212] Memory state around the buggy address: [ 37.107290] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.107516] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.107699] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 37.107800] ^ [ 37.107906] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 37.108006] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 37.108136] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 36.904212] ================================================================== [ 36.904311] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 36.904429] Read of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.904558] [ 36.904759] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.904957] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.905045] Hardware name: linux,dummy-virt (DT) [ 36.905122] Call trace: [ 36.905180] show_stack+0x20/0x38 (C) [ 36.905307] dump_stack_lvl+0x8c/0xd0 [ 36.905648] print_report+0x118/0x608 [ 36.906018] kasan_report+0xdc/0x128 [ 36.906168] __asan_report_load8_noabort+0x20/0x30 [ 36.906460] kasan_atomics_helper+0x3f04/0x4858 [ 36.906616] kasan_atomics+0x198/0x2e0 [ 36.906842] kunit_try_run_case+0x170/0x3f0 [ 36.907023] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.907303] kthread+0x328/0x630 [ 36.907514] ret_from_fork+0x10/0x20 [ 36.907842] [ 36.907914] Allocated by task 277: [ 36.907992] kasan_save_stack+0x3c/0x68 [ 36.908202] kasan_save_track+0x20/0x40 [ 36.908350] kasan_save_alloc_info+0x40/0x58 [ 36.908460] __kasan_kmalloc+0xd4/0xd8 [ 36.908611] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.908679] kasan_atomics+0xb8/0x2e0 [ 36.908728] kunit_try_run_case+0x170/0x3f0 [ 36.908777] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.908834] kthread+0x328/0x630 [ 36.908876] ret_from_fork+0x10/0x20 [ 36.908922] [ 36.908947] The buggy address belongs to the object at fff00000c7805380 [ 36.908947] which belongs to the cache kmalloc-64 of size 64 [ 36.909020] The buggy address is located 0 bytes to the right of [ 36.909020] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.909127] [ 36.909153] The buggy address belongs to the physical page: [ 36.909193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.909256] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.909314] page_type: f5(slab) [ 36.909361] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.909424] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.909475] page dumped because: kasan: bad access detected [ 36.909514] [ 36.909537] Memory state around the buggy address: [ 36.909576] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.909630] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.909683] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.909729] ^ [ 36.909772] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.909827] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.909876] ================================================================== [ 37.013113] ================================================================== [ 37.013221] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 37.013356] Read of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 37.013493] [ 37.013574] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 37.014399] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.014477] Hardware name: linux,dummy-virt (DT) [ 37.014556] Call trace: [ 37.014628] show_stack+0x20/0x38 (C) [ 37.014750] dump_stack_lvl+0x8c/0xd0 [ 37.014925] print_report+0x118/0x608 [ 37.015060] kasan_report+0xdc/0x128 [ 37.015199] __asan_report_load8_noabort+0x20/0x30 [ 37.015348] kasan_atomics_helper+0x3df4/0x4858 [ 37.015494] kasan_atomics+0x198/0x2e0 [ 37.015603] kunit_try_run_case+0x170/0x3f0 [ 37.015736] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.015885] kthread+0x328/0x630 [ 37.016048] ret_from_fork+0x10/0x20 [ 37.016177] [ 37.016299] Allocated by task 277: [ 37.016504] kasan_save_stack+0x3c/0x68 [ 37.016644] kasan_save_track+0x20/0x40 [ 37.016817] kasan_save_alloc_info+0x40/0x58 [ 37.016921] __kasan_kmalloc+0xd4/0xd8 [ 37.017020] __kmalloc_cache_noprof+0x16c/0x3c0 [ 37.017165] kasan_atomics+0xb8/0x2e0 [ 37.017282] kunit_try_run_case+0x170/0x3f0 [ 37.017396] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.017503] kthread+0x328/0x630 [ 37.017609] ret_from_fork+0x10/0x20 [ 37.017727] [ 37.017792] The buggy address belongs to the object at fff00000c7805380 [ 37.017792] which belongs to the cache kmalloc-64 of size 64 [ 37.017944] The buggy address is located 0 bytes to the right of [ 37.017944] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 37.018135] [ 37.018184] The buggy address belongs to the physical page: [ 37.018258] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 37.018514] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.018625] page_type: f5(slab) [ 37.018738] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.019126] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.019234] page dumped because: kasan: bad access detected [ 37.019368] [ 37.019420] Memory state around the buggy address: [ 37.019497] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.019615] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.019722] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.019813] ^ [ 37.019978] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.020433] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.020543] ================================================================== [ 36.503305] ================================================================== [ 36.503570] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 36.503745] Write of size 4 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.504006] [ 36.504154] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.504368] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.504527] Hardware name: linux,dummy-virt (DT) [ 36.504645] Call trace: [ 36.504798] show_stack+0x20/0x38 (C) [ 36.505112] dump_stack_lvl+0x8c/0xd0 [ 36.505262] print_report+0x118/0x608 [ 36.505384] kasan_report+0xdc/0x128 [ 36.506196] kasan_check_range+0x100/0x1a8 [ 36.508923] __kasan_check_write+0x20/0x30 [ 36.509135] kasan_atomics_helper+0x99c/0x4858 [ 36.509654] kasan_atomics+0x198/0x2e0 [ 36.509867] kunit_try_run_case+0x170/0x3f0 [ 36.510101] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.510254] kthread+0x328/0x630 [ 36.510367] ret_from_fork+0x10/0x20 [ 36.510492] [ 36.510543] Allocated by task 277: [ 36.510624] kasan_save_stack+0x3c/0x68 [ 36.510725] kasan_save_track+0x20/0x40 [ 36.510857] kasan_save_alloc_info+0x40/0x58 [ 36.510978] __kasan_kmalloc+0xd4/0xd8 [ 36.511190] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.511386] kasan_atomics+0xb8/0x2e0 [ 36.511662] kunit_try_run_case+0x170/0x3f0 [ 36.511842] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.511965] kthread+0x328/0x630 [ 36.512085] ret_from_fork+0x10/0x20 [ 36.512242] [ 36.512334] The buggy address belongs to the object at fff00000c7805380 [ 36.512334] which belongs to the cache kmalloc-64 of size 64 [ 36.512475] The buggy address is located 0 bytes to the right of [ 36.512475] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.512698] [ 36.512836] The buggy address belongs to the physical page: [ 36.512925] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.513114] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.513442] page_type: f5(slab) [ 36.513584] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.514272] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.514377] page dumped because: kasan: bad access detected [ 36.514476] [ 36.514547] Memory state around the buggy address: [ 36.514657] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.514782] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.514895] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.515054] ^ [ 36.515163] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.515284] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.515390] ================================================================== [ 36.843660] ================================================================== [ 36.843771] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 36.844138] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.844574] [ 36.844672] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.845463] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.845544] Hardware name: linux,dummy-virt (DT) [ 36.845796] Call trace: [ 36.845893] show_stack+0x20/0x38 (C) [ 36.846081] dump_stack_lvl+0x8c/0xd0 [ 36.846375] print_report+0x118/0x608 [ 36.846521] kasan_report+0xdc/0x128 [ 36.846940] kasan_check_range+0x100/0x1a8 [ 36.847159] __kasan_check_write+0x20/0x30 [ 36.847486] kasan_atomics_helper+0x11f8/0x4858 [ 36.847685] kasan_atomics+0x198/0x2e0 [ 36.848143] kunit_try_run_case+0x170/0x3f0 [ 36.849194] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.849498] kthread+0x328/0x630 [ 36.849778] ret_from_fork+0x10/0x20 [ 36.850048] [ 36.850120] Allocated by task 277: [ 36.850482] kasan_save_stack+0x3c/0x68 [ 36.850796] kasan_save_track+0x20/0x40 [ 36.851178] kasan_save_alloc_info+0x40/0x58 [ 36.851632] __kasan_kmalloc+0xd4/0xd8 [ 36.851781] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.852180] kasan_atomics+0xb8/0x2e0 [ 36.852333] kunit_try_run_case+0x170/0x3f0 [ 36.852438] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.852729] kthread+0x328/0x630 [ 36.852900] ret_from_fork+0x10/0x20 [ 36.853377] [ 36.853436] The buggy address belongs to the object at fff00000c7805380 [ 36.853436] which belongs to the cache kmalloc-64 of size 64 [ 36.853648] The buggy address is located 0 bytes to the right of [ 36.853648] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.854386] [ 36.854462] The buggy address belongs to the physical page: [ 36.854601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.854963] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.855295] page_type: f5(slab) [ 36.855415] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.855813] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.855949] page dumped because: kasan: bad access detected [ 36.856127] [ 36.856358] Memory state around the buggy address: [ 36.856469] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.856611] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.856992] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.857106] ^ [ 36.857626] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.857938] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.858229] ================================================================== [ 36.632630] ================================================================== [ 36.632737] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 36.632860] Read of size 4 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.632980] [ 36.634514] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.635763] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.635846] Hardware name: linux,dummy-virt (DT) [ 36.636058] Call trace: [ 36.636122] show_stack+0x20/0x38 (C) [ 36.636916] dump_stack_lvl+0x8c/0xd0 [ 36.637496] print_report+0x118/0x608 [ 36.638198] kasan_report+0xdc/0x128 [ 36.638359] __asan_report_load4_noabort+0x20/0x30 [ 36.639087] kasan_atomics_helper+0x3dd8/0x4858 [ 36.639232] kasan_atomics+0x198/0x2e0 [ 36.639370] kunit_try_run_case+0x170/0x3f0 [ 36.639522] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.640154] kthread+0x328/0x630 [ 36.640343] ret_from_fork+0x10/0x20 [ 36.640710] [ 36.640820] Allocated by task 277: [ 36.640903] kasan_save_stack+0x3c/0x68 [ 36.641010] kasan_save_track+0x20/0x40 [ 36.641596] kasan_save_alloc_info+0x40/0x58 [ 36.641790] __kasan_kmalloc+0xd4/0xd8 [ 36.641994] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.642125] kasan_atomics+0xb8/0x2e0 [ 36.642233] kunit_try_run_case+0x170/0x3f0 [ 36.642603] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.643411] kthread+0x328/0x630 [ 36.643604] ret_from_fork+0x10/0x20 [ 36.643856] [ 36.643973] The buggy address belongs to the object at fff00000c7805380 [ 36.643973] which belongs to the cache kmalloc-64 of size 64 [ 36.644144] The buggy address is located 0 bytes to the right of [ 36.644144] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.644514] [ 36.644590] The buggy address belongs to the physical page: [ 36.644891] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.645227] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.645508] page_type: f5(slab) [ 36.645736] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.646003] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.646134] page dumped because: kasan: bad access detected [ 36.646287] [ 36.646335] Memory state around the buggy address: [ 36.646414] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.646572] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.647202] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.647324] ^ [ 36.647509] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.647648] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.647844] ================================================================== [ 36.756664] ================================================================== [ 36.756773] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 36.757102] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.757444] [ 36.757555] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.757766] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.757954] Hardware name: linux,dummy-virt (DT) [ 36.758616] Call trace: [ 36.758736] show_stack+0x20/0x38 (C) [ 36.758922] dump_stack_lvl+0x8c/0xd0 [ 36.759064] print_report+0x118/0x608 [ 36.759220] kasan_report+0xdc/0x128 [ 36.759579] kasan_check_range+0x100/0x1a8 [ 36.759826] __kasan_check_write+0x20/0x30 [ 36.759992] kasan_atomics_helper+0xf20/0x4858 [ 36.760213] kasan_atomics+0x198/0x2e0 [ 36.760561] kunit_try_run_case+0x170/0x3f0 [ 36.760686] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.760818] kthread+0x328/0x630 [ 36.760926] ret_from_fork+0x10/0x20 [ 36.761068] [ 36.761116] Allocated by task 277: [ 36.761199] kasan_save_stack+0x3c/0x68 [ 36.761357] kasan_save_track+0x20/0x40 [ 36.761473] kasan_save_alloc_info+0x40/0x58 [ 36.762242] __kasan_kmalloc+0xd4/0xd8 [ 36.762523] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.762855] kasan_atomics+0xb8/0x2e0 [ 36.763114] kunit_try_run_case+0x170/0x3f0 [ 36.764169] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.764460] kthread+0x328/0x630 [ 36.764754] ret_from_fork+0x10/0x20 [ 36.764847] [ 36.764960] The buggy address belongs to the object at fff00000c7805380 [ 36.764960] which belongs to the cache kmalloc-64 of size 64 [ 36.765208] The buggy address is located 0 bytes to the right of [ 36.765208] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.765508] [ 36.765563] The buggy address belongs to the physical page: [ 36.765673] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.766016] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.766515] page_type: f5(slab) [ 36.767821] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.767954] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.768086] page dumped because: kasan: bad access detected [ 36.768399] [ 36.770393] Memory state around the buggy address: [ 36.770503] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.770642] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.770762] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.770813] ^ [ 36.770860] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.770915] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.770960] ================================================================== [ 36.516863] ================================================================== [ 36.516966] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 36.517105] Write of size 4 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.518853] kasan_atomics_helper+0xa04/0x4858 [ 36.521392] kthread+0x328/0x630 [ 36.522280] [ 36.522376] The buggy address belongs to the physical page: [ 36.522507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.522680] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.522832] page_type: f5(slab) [ 36.522939] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.523267] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.523410] page dumped because: kasan: bad access detected [ 36.523492] [ 36.523549] Memory state around the buggy address: [ 36.523673] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.523803] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.523976] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.524121] ^ [ 36.524221] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.524415] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.524704] ================================================================== [ 36.832338] ================================================================== [ 36.832441] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 36.832570] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.832804] [ 36.832876] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.833317] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.833515] Hardware name: linux,dummy-virt (DT) [ 36.833665] Call trace: [ 36.833734] show_stack+0x20/0x38 (C) [ 36.834008] dump_stack_lvl+0x8c/0xd0 [ 36.834147] print_report+0x118/0x608 [ 36.834401] kasan_report+0xdc/0x128 [ 36.834530] kasan_check_range+0x100/0x1a8 [ 36.834727] __kasan_check_write+0x20/0x30 [ 36.834912] kasan_atomics_helper+0x1190/0x4858 [ 36.835134] kasan_atomics+0x198/0x2e0 [ 36.835251] kunit_try_run_case+0x170/0x3f0 [ 36.835397] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.835776] kthread+0x328/0x630 [ 36.835904] ret_from_fork+0x10/0x20 [ 36.836041] [ 36.836107] Allocated by task 277: [ 36.836194] kasan_save_stack+0x3c/0x68 [ 36.836411] kasan_save_track+0x20/0x40 [ 36.836521] kasan_save_alloc_info+0x40/0x58 [ 36.836618] __kasan_kmalloc+0xd4/0xd8 [ 36.836713] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.836887] kasan_atomics+0xb8/0x2e0 [ 36.837073] kunit_try_run_case+0x170/0x3f0 [ 36.837302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.837419] kthread+0x328/0x630 [ 36.837508] ret_from_fork+0x10/0x20 [ 36.837604] [ 36.837663] The buggy address belongs to the object at fff00000c7805380 [ 36.837663] which belongs to the cache kmalloc-64 of size 64 [ 36.837919] The buggy address is located 0 bytes to the right of [ 36.837919] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.838120] [ 36.838174] The buggy address belongs to the physical page: [ 36.838304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.838648] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.838779] page_type: f5(slab) [ 36.838928] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.839154] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.839299] page dumped because: kasan: bad access detected [ 36.839409] [ 36.839460] Memory state around the buggy address: [ 36.839555] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.839705] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.839996] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.840150] ^ [ 36.840247] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.840361] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.840457] ================================================================== [ 36.995972] ================================================================== [ 36.996102] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 36.996219] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.996336] [ 36.996407] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.996619] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.996745] Hardware name: linux,dummy-virt (DT) [ 36.997551] Call trace: [ 36.997756] show_stack+0x20/0x38 (C) [ 36.997891] dump_stack_lvl+0x8c/0xd0 [ 36.998007] print_report+0x118/0x608 [ 37.000181] kasan_report+0xdc/0x128 [ 37.000338] kasan_check_range+0x100/0x1a8 [ 37.000460] __kasan_check_write+0x20/0x30 [ 37.001532] kasan_atomics_helper+0x1644/0x4858 [ 37.002114] kasan_atomics+0x198/0x2e0 [ 37.003001] kunit_try_run_case+0x170/0x3f0 [ 37.003686] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.004093] kthread+0x328/0x630 [ 37.004216] ret_from_fork+0x10/0x20 [ 37.004335] [ 37.004388] Allocated by task 277: [ 37.005261] kasan_save_stack+0x3c/0x68 [ 37.005389] kasan_save_track+0x20/0x40 [ 37.006073] kasan_save_alloc_info+0x40/0x58 [ 37.006389] __kasan_kmalloc+0xd4/0xd8 [ 37.006567] __kmalloc_cache_noprof+0x16c/0x3c0 [ 37.006856] kasan_atomics+0xb8/0x2e0 [ 37.007020] kunit_try_run_case+0x170/0x3f0 [ 37.007500] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.007642] kthread+0x328/0x630 [ 37.007772] ret_from_fork+0x10/0x20 [ 37.007866] [ 37.007915] The buggy address belongs to the object at fff00000c7805380 [ 37.007915] which belongs to the cache kmalloc-64 of size 64 [ 37.008481] The buggy address is located 0 bytes to the right of [ 37.008481] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 37.008834] [ 37.008892] The buggy address belongs to the physical page: [ 37.009008] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 37.009170] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.009530] page_type: f5(slab) [ 37.010781] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.010922] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.011054] page dumped because: kasan: bad access detected [ 37.011145] [ 37.011205] Memory state around the buggy address: [ 37.011295] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.011419] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.011522] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.011682] ^ [ 37.011833] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.011949] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.012066] ================================================================== [ 36.679044] ================================================================== [ 36.679146] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 36.681521] Read of size 4 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.681646] [ 36.681719] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.681913] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.681979] Hardware name: linux,dummy-virt (DT) [ 36.682088] Call trace: [ 36.682156] show_stack+0x20/0x38 (C) [ 36.682685] dump_stack_lvl+0x8c/0xd0 [ 36.682836] print_report+0x118/0x608 [ 36.682966] kasan_report+0xdc/0x128 [ 36.683169] __asan_report_load4_noabort+0x20/0x30 [ 36.683660] kasan_atomics_helper+0x3e04/0x4858 [ 36.683828] kasan_atomics+0x198/0x2e0 [ 36.684000] kunit_try_run_case+0x170/0x3f0 [ 36.684309] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.684458] kthread+0x328/0x630 [ 36.684632] ret_from_fork+0x10/0x20 [ 36.684933] [ 36.684984] Allocated by task 277: [ 36.685086] kasan_save_stack+0x3c/0x68 [ 36.685205] kasan_save_track+0x20/0x40 [ 36.685325] kasan_save_alloc_info+0x40/0x58 [ 36.686136] __kasan_kmalloc+0xd4/0xd8 [ 36.686254] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.686376] kasan_atomics+0xb8/0x2e0 [ 36.686616] kunit_try_run_case+0x170/0x3f0 [ 36.686723] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.686854] kthread+0x328/0x630 [ 36.686969] ret_from_fork+0x10/0x20 [ 36.687102] [ 36.687396] The buggy address belongs to the object at fff00000c7805380 [ 36.687396] which belongs to the cache kmalloc-64 of size 64 [ 36.687639] The buggy address is located 0 bytes to the right of [ 36.687639] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.687874] [ 36.687991] The buggy address belongs to the physical page: [ 36.688091] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.688355] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.688574] page_type: f5(slab) [ 36.688684] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.688846] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.689174] page dumped because: kasan: bad access detected [ 36.689431] [ 36.689553] Memory state around the buggy address: [ 36.689639] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.689770] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.689907] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.690014] ^ [ 36.690132] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.690525] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.690788] ================================================================== [ 36.796598] ================================================================== [ 36.796720] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 36.796843] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.796968] [ 36.797057] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.797258] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.797327] Hardware name: linux,dummy-virt (DT) [ 36.799164] Call trace: [ 36.799252] show_stack+0x20/0x38 (C) [ 36.799775] dump_stack_lvl+0x8c/0xd0 [ 36.799937] print_report+0x118/0x608 [ 36.800163] kasan_report+0xdc/0x128 [ 36.800322] kasan_check_range+0x100/0x1a8 [ 36.800446] __kasan_check_write+0x20/0x30 [ 36.800558] kasan_atomics_helper+0x1058/0x4858 [ 36.800680] kasan_atomics+0x198/0x2e0 [ 36.800805] kunit_try_run_case+0x170/0x3f0 [ 36.801151] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.802135] kthread+0x328/0x630 [ 36.802313] ret_from_fork+0x10/0x20 [ 36.802781] [ 36.802840] Allocated by task 277: [ 36.802913] kasan_save_stack+0x3c/0x68 [ 36.803016] kasan_save_track+0x20/0x40 [ 36.803773] kasan_save_alloc_info+0x40/0x58 [ 36.804196] __kasan_kmalloc+0xd4/0xd8 [ 36.804746] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.805013] kasan_atomics+0xb8/0x2e0 [ 36.805526] kunit_try_run_case+0x170/0x3f0 [ 36.805829] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.806353] kthread+0x328/0x630 [ 36.806695] ret_from_fork+0x10/0x20 [ 36.807165] [ 36.807221] The buggy address belongs to the object at fff00000c7805380 [ 36.807221] which belongs to the cache kmalloc-64 of size 64 [ 36.807360] The buggy address is located 0 bytes to the right of [ 36.807360] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.808295] [ 36.808731] The buggy address belongs to the physical page: [ 36.808918] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.809103] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.809655] page_type: f5(slab) [ 36.809831] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.810499] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.811086] page dumped because: kasan: bad access detected [ 36.811804] [ 36.812357] Memory state around the buggy address: [ 36.812657] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.813149] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.813303] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.813401] ^ [ 36.813737] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.813863] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.814263] ================================================================== [ 36.525961] ================================================================== [ 36.526090] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 36.526305] Write of size 4 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.526620] [ 36.526770] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.527055] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.527131] Hardware name: linux,dummy-virt (DT) [ 36.527354] Call trace: [ 36.527447] show_stack+0x20/0x38 (C) [ 36.527689] dump_stack_lvl+0x8c/0xd0 [ 36.527813] print_report+0x118/0x608 [ 36.527929] kasan_report+0xdc/0x128 [ 36.528118] kasan_check_range+0x100/0x1a8 [ 36.528313] __kasan_check_write+0x20/0x30 [ 36.528462] kasan_atomics_helper+0xa6c/0x4858 [ 36.528595] kasan_atomics+0x198/0x2e0 [ 36.528759] kunit_try_run_case+0x170/0x3f0 [ 36.529749] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.530406] kthread+0x328/0x630 [ 36.530832] ret_from_fork+0x10/0x20 [ 36.531167] [ 36.531255] Allocated by task 277: [ 36.531529] kasan_save_stack+0x3c/0x68 [ 36.531697] kasan_save_track+0x20/0x40 [ 36.533686] ret_from_fork+0x10/0x20 [ 36.535716] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.535923] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.536108] page_type: f5(slab) [ 36.536296] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.536419] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.536520] page dumped because: kasan: bad access detected [ 36.536632] [ 36.536810] Memory state around the buggy address: [ 36.536904] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.537110] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.537233] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.539134] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 36.540706] show_stack+0x20/0x38 (C) [ 36.543792] kasan_save_track+0x20/0x40 [ 36.546827] The buggy address is located 0 bytes to the right of [ 36.546827] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.547763] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.547882] page_type: f5(slab) [ 36.547989] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.548134] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.548236] page dumped because: kasan: bad access detected [ 36.548316] [ 36.549636] Memory state around the buggy address: [ 36.549759] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.549934] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.550064] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.550171] ^ [ 36.550431] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.550665] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.550792] ================================================================== [ 36.713958] ================================================================== [ 36.714227] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 36.714504] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.714818] [ 36.714891] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.715195] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.715267] Hardware name: linux,dummy-virt (DT) [ 36.715374] Call trace: [ 36.715435] show_stack+0x20/0x38 (C) [ 36.715588] dump_stack_lvl+0x8c/0xd0 [ 36.715723] print_report+0x118/0x608 [ 36.715849] kasan_report+0xdc/0x128 [ 36.715966] kasan_check_range+0x100/0x1a8 [ 36.716108] __kasan_check_write+0x20/0x30 [ 36.716284] kasan_atomics_helper+0xe44/0x4858 [ 36.716614] kasan_atomics+0x198/0x2e0 [ 36.716737] kunit_try_run_case+0x170/0x3f0 [ 36.716894] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.717136] kthread+0x328/0x630 [ 36.717306] ret_from_fork+0x10/0x20 [ 36.717448] [ 36.717511] Allocated by task 277: [ 36.718319] kasan_save_stack+0x3c/0x68 [ 36.718586] kasan_save_track+0x20/0x40 [ 36.719059] kasan_save_alloc_info+0x40/0x58 [ 36.719194] __kasan_kmalloc+0xd4/0xd8 [ 36.719298] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.719415] kasan_atomics+0xb8/0x2e0 [ 36.721090] kunit_try_run_case+0x170/0x3f0 [ 36.721583] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.722196] kthread+0x328/0x630 [ 36.722296] ret_from_fork+0x10/0x20 [ 36.722395] [ 36.723294] The buggy address belongs to the object at fff00000c7805380 [ 36.723294] which belongs to the cache kmalloc-64 of size 64 [ 36.724128] The buggy address is located 0 bytes to the right of [ 36.724128] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.724731] [ 36.725173] The buggy address belongs to the physical page: [ 36.725293] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.725418] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.725700] page_type: f5(slab) [ 36.726606] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.727460] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.727565] page dumped because: kasan: bad access detected [ 36.727610] [ 36.727635] Memory state around the buggy address: [ 36.727699] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.727807] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.727922] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.728126] ^ [ 36.728386] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.728544] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.728906] ================================================================== [ 36.729753] ================================================================== [ 36.729810] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 36.729899] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.730000] [ 36.730076] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.730302] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.730378] Hardware name: linux,dummy-virt (DT) [ 36.730453] Call trace: [ 36.730517] show_stack+0x20/0x38 (C) [ 36.731170] dump_stack_lvl+0x8c/0xd0 [ 36.731284] print_report+0x118/0x608 [ 36.731355] kasan_report+0xdc/0x128 [ 36.731447] __asan_report_store8_noabort+0x20/0x30 [ 36.731690] kasan_atomics_helper+0x3e5c/0x4858 [ 36.731826] kasan_atomics+0x198/0x2e0 [ 36.732182] kunit_try_run_case+0x170/0x3f0 [ 36.732321] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.732584] kthread+0x328/0x630 [ 36.732740] ret_from_fork+0x10/0x20 [ 36.732860] [ 36.732908] Allocated by task 277: [ 36.733079] kasan_save_stack+0x3c/0x68 [ 36.733487] kasan_save_track+0x20/0x40 [ 36.733629] kasan_save_alloc_info+0x40/0x58 [ 36.733730] __kasan_kmalloc+0xd4/0xd8 [ 36.733850] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.733977] kasan_atomics+0xb8/0x2e0 [ 36.734526] kunit_try_run_case+0x170/0x3f0 [ 36.734782] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.734915] kthread+0x328/0x630 [ 36.735013] ret_from_fork+0x10/0x20 [ 36.735142] [ 36.735190] The buggy address belongs to the object at fff00000c7805380 [ 36.735190] which belongs to the cache kmalloc-64 of size 64 [ 36.735595] The buggy address is located 0 bytes to the right of [ 36.735595] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.735816] [ 36.735886] The buggy address belongs to the physical page: [ 36.735964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.736134] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.736266] page_type: f5(slab) [ 36.736737] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.736897] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.737151] page dumped because: kasan: bad access detected [ 36.737235] [ 36.737320] Memory state around the buggy address: [ 36.737409] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.737528] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.737632] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.737727] ^ [ 36.737824] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.737963] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.738083] ================================================================== [ 36.910197] ================================================================== [ 36.910293] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 36.910477] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.910654] [ 36.910822] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.911453] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.911616] Hardware name: linux,dummy-virt (DT) [ 36.911715] Call trace: [ 36.911883] show_stack+0x20/0x38 (C) [ 36.912067] dump_stack_lvl+0x8c/0xd0 [ 36.912461] print_report+0x118/0x608 [ 36.912599] kasan_report+0xdc/0x128 [ 36.912730] kasan_check_range+0x100/0x1a8 [ 36.912852] __kasan_check_write+0x20/0x30 [ 36.913153] kasan_atomics_helper+0x1414/0x4858 [ 36.913293] kasan_atomics+0x198/0x2e0 [ 36.913441] kunit_try_run_case+0x170/0x3f0 [ 36.913571] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.913715] kthread+0x328/0x630 [ 36.913825] ret_from_fork+0x10/0x20 [ 36.913941] [ 36.913994] Allocated by task 277: [ 36.914509] kasan_save_stack+0x3c/0x68 [ 36.914641] kasan_save_track+0x20/0x40 [ 36.915477] kasan_save_alloc_info+0x40/0x58 [ 36.915864] __kasan_kmalloc+0xd4/0xd8 [ 36.916193] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.916411] kasan_atomics+0xb8/0x2e0 [ 36.916634] kunit_try_run_case+0x170/0x3f0 [ 36.916746] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.917333] kthread+0x328/0x630 [ 36.917507] ret_from_fork+0x10/0x20 [ 36.918004] [ 36.918160] The buggy address belongs to the object at fff00000c7805380 [ 36.918160] which belongs to the cache kmalloc-64 of size 64 [ 36.918821] The buggy address is located 0 bytes to the right of [ 36.918821] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.918986] [ 36.919314] The buggy address belongs to the physical page: [ 36.919451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.919577] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.919951] page_type: f5(slab) [ 36.920287] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.920649] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.920758] page dumped because: kasan: bad access detected [ 36.920936] [ 36.921007] Memory state around the buggy address: [ 36.921397] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.921516] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.922214] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.922328] ^ [ 36.922418] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.922764] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.923149] ================================================================== [ 36.480591] ================================================================== [ 36.480922] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 36.481467] Read of size 4 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.481659] [ 36.481735] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.481931] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.481999] Hardware name: linux,dummy-virt (DT) [ 36.482095] Call trace: [ 36.482150] show_stack+0x20/0x38 (C) [ 36.482271] dump_stack_lvl+0x8c/0xd0 [ 36.482390] print_report+0x118/0x608 [ 36.482529] kasan_report+0xdc/0x128 [ 36.489268] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.491413] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.496129] Write of size 4 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.498187] kunit_try_run_case+0x170/0x3f0 [ 36.499138] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.499249] kasan_atomics+0xb8/0x2e0 [ 36.499348] kunit_try_run_case+0x170/0x3f0 [ 36.499445] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.499615] kthread+0x328/0x630 [ 36.499750] ret_from_fork+0x10/0x20 [ 36.499934] [ 36.499995] The buggy address belongs to the object at fff00000c7805380 [ 36.499995] which belongs to the cache kmalloc-64 of size 64 [ 36.500345] The buggy address is located 0 bytes to the right of [ 36.500345] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.500500] [ 36.500551] The buggy address belongs to the physical page: [ 36.500629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.500794] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.500914] page_type: f5(slab) [ 36.501063] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.501246] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.501365] page dumped because: kasan: bad access detected [ 36.501505] [ 36.501594] Memory state around the buggy address: [ 36.501688] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.501812] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.501951] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.502219] ^ [ 36.502320] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.502435] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.502529] ================================================================== [ 36.815119] ================================================================== [ 36.815217] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 36.815326] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.815444] [ 36.815524] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.816069] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.816264] Hardware name: linux,dummy-virt (DT) [ 36.816477] Call trace: [ 36.816640] show_stack+0x20/0x38 (C) [ 36.816834] dump_stack_lvl+0x8c/0xd0 [ 36.816962] print_report+0x118/0x608 [ 36.817102] kasan_report+0xdc/0x128 [ 36.817231] kasan_check_range+0x100/0x1a8 [ 36.817462] __kasan_check_write+0x20/0x30 [ 36.817619] kasan_atomics_helper+0x10c0/0x4858 [ 36.817753] kasan_atomics+0x198/0x2e0 [ 36.817928] kunit_try_run_case+0x170/0x3f0 [ 36.818131] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.818425] kthread+0x328/0x630 [ 36.818658] ret_from_fork+0x10/0x20 [ 36.818882] [ 36.818937] Allocated by task 277: [ 36.819043] kasan_save_stack+0x3c/0x68 [ 36.819237] kasan_save_track+0x20/0x40 [ 36.819339] kasan_save_alloc_info+0x40/0x58 [ 36.819550] __kasan_kmalloc+0xd4/0xd8 [ 36.819666] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.819808] kasan_atomics+0xb8/0x2e0 [ 36.819969] kunit_try_run_case+0x170/0x3f0 [ 36.820049] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.820347] kthread+0x328/0x630 [ 36.820450] ret_from_fork+0x10/0x20 [ 36.820711] [ 36.820829] The buggy address belongs to the object at fff00000c7805380 [ 36.820829] which belongs to the cache kmalloc-64 of size 64 [ 36.820990] The buggy address is located 0 bytes to the right of [ 36.820990] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.821435] [ 36.821516] The buggy address belongs to the physical page: [ 36.821660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.821784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.821897] page_type: f5(slab) [ 36.822092] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.822227] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.822420] page dumped because: kasan: bad access detected [ 36.822514] [ 36.822561] Memory state around the buggy address: [ 36.822672] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.822852] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.822998] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.823109] ^ [ 36.823204] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.823349] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.823443] ================================================================== [ 36.985326] ================================================================== [ 36.985451] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 36.985622] Read of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.985855] [ 36.985965] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.986179] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.986249] Hardware name: linux,dummy-virt (DT) [ 36.986321] Call trace: [ 36.986377] show_stack+0x20/0x38 (C) [ 36.986493] dump_stack_lvl+0x8c/0xd0 [ 36.986629] print_report+0x118/0x608 [ 36.986763] kasan_report+0xdc/0x128 [ 36.986903] __asan_report_load8_noabort+0x20/0x30 [ 36.987066] kasan_atomics_helper+0x3db0/0x4858 [ 36.987203] kasan_atomics+0x198/0x2e0 [ 36.987355] kunit_try_run_case+0x170/0x3f0 [ 36.987501] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.987652] kthread+0x328/0x630 [ 36.988088] ret_from_fork+0x10/0x20 [ 36.988280] [ 36.988339] Allocated by task 277: [ 36.989212] kasan_save_stack+0x3c/0x68 [ 36.989347] kasan_save_track+0x20/0x40 [ 36.991017] kasan_save_alloc_info+0x40/0x58 [ 36.991173] __kasan_kmalloc+0xd4/0xd8 [ 36.991583] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.991703] kasan_atomics+0xb8/0x2e0 [ 36.991859] kunit_try_run_case+0x170/0x3f0 [ 36.992058] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.992193] kthread+0x328/0x630 [ 36.992285] ret_from_fork+0x10/0x20 [ 36.992382] [ 36.992431] The buggy address belongs to the object at fff00000c7805380 [ 36.992431] which belongs to the cache kmalloc-64 of size 64 [ 36.992740] The buggy address is located 0 bytes to the right of [ 36.992740] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.992953] [ 36.993122] The buggy address belongs to the physical page: [ 36.993241] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.993428] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.993569] page_type: f5(slab) [ 36.993711] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.994047] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.994151] page dumped because: kasan: bad access detected [ 36.994231] [ 36.994288] Memory state around the buggy address: [ 36.994444] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.994643] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.994761] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.994868] ^ [ 36.994986] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.995336] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.995502] ================================================================== [ 36.954893] ================================================================== [ 36.955005] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 36.955165] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.955297] [ 36.955369] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.955574] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.955646] Hardware name: linux,dummy-virt (DT) [ 36.955723] Call trace: [ 36.955780] show_stack+0x20/0x38 (C) [ 36.955898] dump_stack_lvl+0x8c/0xd0 [ 36.956015] print_report+0x118/0x608 [ 36.956157] kasan_report+0xdc/0x128 [ 36.956269] kasan_check_range+0x100/0x1a8 [ 36.956386] __kasan_check_write+0x20/0x30 [ 36.956993] kasan_atomics_helper+0x154c/0x4858 [ 36.957148] kasan_atomics+0x198/0x2e0 [ 36.957291] kunit_try_run_case+0x170/0x3f0 [ 36.957442] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.958066] kthread+0x328/0x630 [ 36.958282] ret_from_fork+0x10/0x20 [ 36.958540] [ 36.958650] Allocated by task 277: [ 36.958755] kasan_save_stack+0x3c/0x68 [ 36.959253] kasan_save_track+0x20/0x40 [ 36.959359] kasan_save_alloc_info+0x40/0x58 [ 36.959455] __kasan_kmalloc+0xd4/0xd8 [ 36.959554] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.959669] kasan_atomics+0xb8/0x2e0 [ 36.959834] kunit_try_run_case+0x170/0x3f0 [ 36.960051] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.960191] kthread+0x328/0x630 [ 36.960283] ret_from_fork+0x10/0x20 [ 36.960518] [ 36.960656] The buggy address belongs to the object at fff00000c7805380 [ 36.960656] which belongs to the cache kmalloc-64 of size 64 [ 36.960979] The buggy address is located 0 bytes to the right of [ 36.960979] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.961152] [ 36.961203] The buggy address belongs to the physical page: [ 36.961279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.961399] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.961512] page_type: f5(slab) [ 36.961705] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.962011] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.962128] page dumped because: kasan: bad access detected [ 36.962214] [ 36.962272] Memory state around the buggy address: [ 36.962642] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.962816] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.962936] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.963049] ^ [ 36.963353] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.963476] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.963577] ================================================================== [ 36.771707] ================================================================== [ 36.772001] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 36.772260] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.772392] [ 36.772566] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.772917] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.773008] Hardware name: linux,dummy-virt (DT) [ 36.773465] Call trace: [ 36.773537] show_stack+0x20/0x38 (C) [ 36.773677] dump_stack_lvl+0x8c/0xd0 [ 36.774057] print_report+0x118/0x608 [ 36.774540] kasan_report+0xdc/0x128 [ 36.774756] kasan_check_range+0x100/0x1a8 [ 36.774888] __kasan_check_write+0x20/0x30 [ 36.775024] kasan_atomics_helper+0xf88/0x4858 [ 36.775714] kasan_atomics+0x198/0x2e0 [ 36.776222] kunit_try_run_case+0x170/0x3f0 [ 36.776575] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.776915] kthread+0x328/0x630 [ 36.777307] ret_from_fork+0x10/0x20 [ 36.777769] [ 36.777846] Allocated by task 277: [ 36.778109] kasan_save_stack+0x3c/0x68 [ 36.778222] kasan_save_track+0x20/0x40 [ 36.778321] kasan_save_alloc_info+0x40/0x58 [ 36.778479] __kasan_kmalloc+0xd4/0xd8 [ 36.778735] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.779148] kasan_atomics+0xb8/0x2e0 [ 36.779870] kunit_try_run_case+0x170/0x3f0 [ 36.780191] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.780339] kthread+0x328/0x630 [ 36.780494] ret_from_fork+0x10/0x20 [ 36.780599] [ 36.780660] The buggy address belongs to the object at fff00000c7805380 [ 36.780660] which belongs to the cache kmalloc-64 of size 64 [ 36.780800] The buggy address is located 0 bytes to the right of [ 36.780800] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.781011] [ 36.781084] The buggy address belongs to the physical page: [ 36.781215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.781567] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.781728] page_type: f5(slab) [ 36.781821] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.781957] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.782336] page dumped because: kasan: bad access detected [ 36.782432] [ 36.782550] Memory state around the buggy address: [ 36.782974] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.783109] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.783233] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.783612] ^ [ 36.783889] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.784230] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.784347] ================================================================== [ 36.964080] ================================================================== [ 36.964261] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 36.964393] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.964508] [ 36.964606] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.964944] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.965014] Hardware name: linux,dummy-virt (DT) [ 36.965115] Call trace: [ 36.965278] show_stack+0x20/0x38 (C) [ 36.965580] dump_stack_lvl+0x8c/0xd0 [ 36.965701] print_report+0x118/0x608 [ 36.965999] kasan_report+0xdc/0x128 [ 36.966148] kasan_check_range+0x100/0x1a8 [ 36.966369] __kasan_check_write+0x20/0x30 [ 36.966651] kasan_atomics_helper+0x15b4/0x4858 [ 36.966813] kasan_atomics+0x198/0x2e0 [ 36.967530] kunit_try_run_case+0x170/0x3f0 [ 36.967714] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.968659] kthread+0x328/0x630 [ 36.968788] ret_from_fork+0x10/0x20 [ 36.969896] [ 36.970063] Allocated by task 277: [ 36.970353] kasan_save_stack+0x3c/0x68 [ 36.970466] kasan_save_track+0x20/0x40 [ 36.971422] kasan_save_alloc_info+0x40/0x58 [ 36.972193] __kasan_kmalloc+0xd4/0xd8 [ 36.972359] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.972578] kasan_atomics+0xb8/0x2e0 [ 36.972846] kunit_try_run_case+0x170/0x3f0 [ 36.973703] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.973861] kthread+0x328/0x630 [ 36.974663] ret_from_fork+0x10/0x20 [ 36.975391] [ 36.975456] The buggy address belongs to the object at fff00000c7805380 [ 36.975456] which belongs to the cache kmalloc-64 of size 64 [ 36.975599] The buggy address is located 0 bytes to the right of [ 36.975599] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.976306] [ 36.976811] The buggy address belongs to the physical page: [ 36.977058] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.977465] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.977674] page_type: f5(slab) [ 36.977764] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.977886] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.979544] page dumped because: kasan: bad access detected [ 36.979910] [ 36.979963] Memory state around the buggy address: [ 36.980061] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.981607] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.982519] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.982896] ^ [ 36.983294] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.983713] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.984135] ================================================================== [ 36.691694] ================================================================== [ 36.691795] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 36.692057] Read of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.692284] [ 36.692360] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.692560] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.692630] Hardware name: linux,dummy-virt (DT) [ 36.692704] Call trace: [ 36.692759] show_stack+0x20/0x38 (C) [ 36.692876] dump_stack_lvl+0x8c/0xd0 [ 36.692987] print_report+0x118/0x608 [ 36.693129] kasan_report+0xdc/0x128 [ 36.693249] kasan_check_range+0x100/0x1a8 [ 36.693371] __kasan_check_read+0x20/0x30 [ 36.693481] kasan_atomics_helper+0xdd4/0x4858 [ 36.693602] kasan_atomics+0x198/0x2e0 [ 36.693717] kunit_try_run_case+0x170/0x3f0 [ 36.693834] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.693963] kthread+0x328/0x630 [ 36.694102] ret_from_fork+0x10/0x20 [ 36.694250] [ 36.694310] Allocated by task 277: [ 36.694397] kasan_save_stack+0x3c/0x68 [ 36.694516] kasan_save_track+0x20/0x40 [ 36.695168] kasan_save_alloc_info+0x40/0x58 [ 36.695503] __kasan_kmalloc+0xd4/0xd8 [ 36.695622] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.695743] kasan_atomics+0xb8/0x2e0 [ 36.695844] kunit_try_run_case+0x170/0x3f0 [ 36.696703] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.696919] kthread+0x328/0x630 [ 36.697112] ret_from_fork+0x10/0x20 [ 36.697280] [ 36.697346] The buggy address belongs to the object at fff00000c7805380 [ 36.697346] which belongs to the cache kmalloc-64 of size 64 [ 36.698015] The buggy address is located 0 bytes to the right of [ 36.698015] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.698225] [ 36.698339] The buggy address belongs to the physical page: [ 36.698416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.698539] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.698736] page_type: f5(slab) [ 36.699375] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.699546] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.699716] page dumped because: kasan: bad access detected [ 36.699803] [ 36.699855] Memory state around the buggy address: [ 36.699934] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.700054] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.700163] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.700288] ^ [ 36.700532] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.700715] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.700810] ================================================================== [ 36.551976] ================================================================== [ 36.552098] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 36.552217] Read of size 4 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.552341] [ 36.552466] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.552687] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.552982] show_stack+0x20/0x38 (C) [ 36.555108] kunit_try_run_case+0x170/0x3f0 [ 36.556672] __kasan_kmalloc+0xd4/0xd8 [ 36.557734] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.558109] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.560429] ================================================================== [ 36.701198] ================================================================== [ 36.701309] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 36.701445] Read of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.701570] [ 36.701647] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.702521] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.703149] Hardware name: linux,dummy-virt (DT) [ 36.703435] Call trace: [ 36.703506] show_stack+0x20/0x38 (C) [ 36.703820] dump_stack_lvl+0x8c/0xd0 [ 36.703949] print_report+0x118/0x608 [ 36.704136] kasan_report+0xdc/0x128 [ 36.704500] __asan_report_load8_noabort+0x20/0x30 [ 36.704667] kasan_atomics_helper+0x3f58/0x4858 [ 36.705047] kasan_atomics+0x198/0x2e0 [ 36.705356] kunit_try_run_case+0x170/0x3f0 [ 36.705477] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.705613] kthread+0x328/0x630 [ 36.705778] ret_from_fork+0x10/0x20 [ 36.705965] [ 36.706076] Allocated by task 277: [ 36.706160] kasan_save_stack+0x3c/0x68 [ 36.706315] kasan_save_track+0x20/0x40 [ 36.707175] kasan_save_alloc_info+0x40/0x58 [ 36.707291] __kasan_kmalloc+0xd4/0xd8 [ 36.707414] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.707617] kasan_atomics+0xb8/0x2e0 [ 36.707928] kunit_try_run_case+0x170/0x3f0 [ 36.708062] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.708337] kthread+0x328/0x630 [ 36.708563] ret_from_fork+0x10/0x20 [ 36.708829] [ 36.708894] The buggy address belongs to the object at fff00000c7805380 [ 36.708894] which belongs to the cache kmalloc-64 of size 64 [ 36.709189] The buggy address is located 0 bytes to the right of [ 36.709189] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.709346] [ 36.709404] The buggy address belongs to the physical page: [ 36.709607] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.709734] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.710011] page_type: f5(slab) [ 36.710259] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.710382] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.710479] page dumped because: kasan: bad access detected [ 36.710616] [ 36.710673] Memory state around the buggy address: [ 36.710806] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.710966] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.711739] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.712094] ^ [ 36.712532] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.712644] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.712994] ================================================================== [ 36.939363] ================================================================== [ 36.939497] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 36.939610] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.939729] [ 36.939799] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.939995] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.940172] Hardware name: linux,dummy-virt (DT) [ 36.940382] Call trace: [ 36.940554] show_stack+0x20/0x38 (C) [ 36.940875] dump_stack_lvl+0x8c/0xd0 [ 36.941162] print_report+0x118/0x608 [ 36.941415] kasan_report+0xdc/0x128 [ 36.941608] kasan_check_range+0x100/0x1a8 [ 36.941974] __kasan_check_write+0x20/0x30 [ 36.942211] kasan_atomics_helper+0x14e4/0x4858 [ 36.942336] kasan_atomics+0x198/0x2e0 [ 36.942453] kunit_try_run_case+0x170/0x3f0 [ 36.942621] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.942786] kthread+0x328/0x630 [ 36.943210] ret_from_fork+0x10/0x20 [ 36.943356] [ 36.943415] Allocated by task 277: [ 36.943499] kasan_save_stack+0x3c/0x68 [ 36.943607] kasan_save_track+0x20/0x40 [ 36.943711] kasan_save_alloc_info+0x40/0x58 [ 36.943919] __kasan_kmalloc+0xd4/0xd8 [ 36.944048] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.944305] kasan_atomics+0xb8/0x2e0 [ 36.944526] kunit_try_run_case+0x170/0x3f0 [ 36.944636] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.944745] kthread+0x328/0x630 [ 36.944878] ret_from_fork+0x10/0x20 [ 36.945061] [ 36.945119] The buggy address belongs to the object at fff00000c7805380 [ 36.945119] which belongs to the cache kmalloc-64 of size 64 [ 36.945291] The buggy address is located 0 bytes to the right of [ 36.945291] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.945551] [ 36.945660] The buggy address belongs to the physical page: [ 36.945760] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.946477] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.947242] page_type: f5(slab) [ 36.947873] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.948179] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.949500] page dumped because: kasan: bad access detected [ 36.949597] [ 36.949648] Memory state around the buggy address: [ 36.950391] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.950860] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.950973] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.951478] ^ [ 36.951610] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.951734] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.952418] ================================================================== [ 37.039236] ================================================================== [ 37.039348] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 37.039606] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 37.039732] [ 37.039809] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 37.040400] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.040471] Hardware name: linux,dummy-virt (DT) [ 37.040547] Call trace: [ 37.040601] show_stack+0x20/0x38 (C) [ 37.040719] dump_stack_lvl+0x8c/0xd0 [ 37.040829] print_report+0x118/0x608 [ 37.040955] kasan_report+0xdc/0x128 [ 37.041102] kasan_check_range+0x100/0x1a8 [ 37.041219] __kasan_check_write+0x20/0x30 [ 37.041397] kasan_atomics_helper+0x175c/0x4858 [ 37.041577] kasan_atomics+0x198/0x2e0 [ 37.041721] kunit_try_run_case+0x170/0x3f0 [ 37.041855] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.041980] kthread+0x328/0x630 [ 37.042147] ret_from_fork+0x10/0x20 [ 37.042290] [ 37.042580] Allocated by task 277: [ 37.042673] kasan_save_stack+0x3c/0x68 [ 37.042783] kasan_save_track+0x20/0x40 [ 37.042875] kasan_save_alloc_info+0x40/0x58 [ 37.042960] __kasan_kmalloc+0xd4/0xd8 [ 37.043011] __kmalloc_cache_noprof+0x16c/0x3c0 [ 37.043127] kasan_atomics+0xb8/0x2e0 [ 37.043212] kunit_try_run_case+0x170/0x3f0 [ 37.043378] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.043755] kthread+0x328/0x630 [ 37.044411] ret_from_fork+0x10/0x20 [ 37.044682] [ 37.044745] The buggy address belongs to the object at fff00000c7805380 [ 37.044745] which belongs to the cache kmalloc-64 of size 64 [ 37.045345] The buggy address is located 0 bytes to the right of [ 37.045345] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 37.045545] [ 37.046051] The buggy address belongs to the physical page: [ 37.046480] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 37.046780] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.047338] page_type: f5(slab) [ 37.047481] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.047715] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.047837] page dumped because: kasan: bad access detected [ 37.047921] [ 37.048016] Memory state around the buggy address: [ 37.048197] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.048307] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.048489] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.048757] ^ [ 37.048957] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.049084] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.049181] ================================================================== [ 37.049520] ================================================================== [ 37.049628] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 37.050716] Read of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 37.050844] [ 37.050886] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 37.051069] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.051132] Hardware name: linux,dummy-virt (DT) [ 37.051196] Call trace: [ 37.051225] show_stack+0x20/0x38 (C) [ 37.051290] dump_stack_lvl+0x8c/0xd0 [ 37.051349] print_report+0x118/0x608 [ 37.051413] kasan_report+0xdc/0x128 [ 37.051471] __asan_report_load8_noabort+0x20/0x30 [ 37.051532] kasan_atomics_helper+0x3e20/0x4858 [ 37.051591] kasan_atomics+0x198/0x2e0 [ 37.051646] kunit_try_run_case+0x170/0x3f0 [ 37.051704] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.051770] kthread+0x328/0x630 [ 37.051823] ret_from_fork+0x10/0x20 [ 37.051883] [ 37.051909] Allocated by task 277: [ 37.051945] kasan_save_stack+0x3c/0x68 [ 37.052001] kasan_save_track+0x20/0x40 [ 37.052237] kasan_save_alloc_info+0x40/0x58 [ 37.052770] __kasan_kmalloc+0xd4/0xd8 [ 37.052870] __kmalloc_cache_noprof+0x16c/0x3c0 [ 37.052975] kasan_atomics+0xb8/0x2e0 [ 37.053087] kunit_try_run_case+0x170/0x3f0 [ 37.053196] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.053320] kthread+0x328/0x630 [ 37.053416] ret_from_fork+0x10/0x20 [ 37.053505] [ 37.053556] The buggy address belongs to the object at fff00000c7805380 [ 37.053556] which belongs to the cache kmalloc-64 of size 64 [ 37.053692] The buggy address is located 0 bytes to the right of [ 37.053692] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 37.055002] [ 37.055108] The buggy address belongs to the physical page: [ 37.055195] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 37.055337] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.056509] page_type: f5(slab) [ 37.056902] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.057042] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.058357] page dumped because: kasan: bad access detected [ 37.058486] [ 37.058604] Memory state around the buggy address: [ 37.058689] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.058798] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.058996] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.059112] ^ [ 37.059892] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.060464] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.060607] ================================================================== [ 36.924069] ================================================================== [ 36.924170] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 36.924280] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.924395] [ 36.924461] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.924658] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.924726] Hardware name: linux,dummy-virt (DT) [ 36.924795] Call trace: [ 36.924852] show_stack+0x20/0x38 (C) [ 36.924967] dump_stack_lvl+0x8c/0xd0 [ 36.925107] print_report+0x118/0x608 [ 36.925228] kasan_report+0xdc/0x128 [ 36.925340] kasan_check_range+0x100/0x1a8 [ 36.925457] __kasan_check_write+0x20/0x30 [ 36.925573] kasan_atomics_helper+0x147c/0x4858 [ 36.925697] kasan_atomics+0x198/0x2e0 [ 36.925813] kunit_try_run_case+0x170/0x3f0 [ 36.931271] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.931428] kthread+0x328/0x630 [ 36.932555] ret_from_fork+0x10/0x20 [ 36.932712] [ 36.932773] Allocated by task 277: [ 36.932999] kasan_save_stack+0x3c/0x68 [ 36.933809] kasan_save_track+0x20/0x40 [ 36.933976] kasan_save_alloc_info+0x40/0x58 [ 36.934605] __kasan_kmalloc+0xd4/0xd8 [ 36.934729] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.934868] kasan_atomics+0xb8/0x2e0 [ 36.934980] kunit_try_run_case+0x170/0x3f0 [ 36.935130] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.935353] kthread+0x328/0x630 [ 36.935506] ret_from_fork+0x10/0x20 [ 36.935644] [ 36.935697] The buggy address belongs to the object at fff00000c7805380 [ 36.935697] which belongs to the cache kmalloc-64 of size 64 [ 36.935928] The buggy address is located 0 bytes to the right of [ 36.935928] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.936145] [ 36.936227] The buggy address belongs to the physical page: [ 36.936437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.936714] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.936832] page_type: f5(slab) [ 36.936947] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.937101] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.937213] page dumped because: kasan: bad access detected [ 36.937307] [ 36.937366] Memory state around the buggy address: [ 36.937618] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.937781] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.938238] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.938433] ^ [ 36.938530] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.938776] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.938914] ================================================================== [ 37.021059] ================================================================== [ 37.021157] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 37.021286] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 37.021583] [ 37.021784] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 37.022349] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.022444] Hardware name: linux,dummy-virt (DT) [ 37.022516] Call trace: [ 37.022637] show_stack+0x20/0x38 (C) [ 37.022760] dump_stack_lvl+0x8c/0xd0 [ 37.022940] print_report+0x118/0x608 [ 37.023165] kasan_report+0xdc/0x128 [ 37.023287] kasan_check_range+0x100/0x1a8 [ 37.023418] __kasan_check_write+0x20/0x30 [ 37.023568] kasan_atomics_helper+0x16d0/0x4858 [ 37.023845] kasan_atomics+0x198/0x2e0 [ 37.024083] kunit_try_run_case+0x170/0x3f0 [ 37.024215] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.024348] kthread+0x328/0x630 [ 37.024456] ret_from_fork+0x10/0x20 [ 37.024571] [ 37.024623] Allocated by task 277: [ 37.024726] kasan_save_stack+0x3c/0x68 [ 37.024979] kasan_save_track+0x20/0x40 [ 37.025113] kasan_save_alloc_info+0x40/0x58 [ 37.025265] __kasan_kmalloc+0xd4/0xd8 [ 37.025369] __kmalloc_cache_noprof+0x16c/0x3c0 [ 37.025484] kasan_atomics+0xb8/0x2e0 [ 37.025640] kunit_try_run_case+0x170/0x3f0 [ 37.025838] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.025971] kthread+0x328/0x630 [ 37.026081] ret_from_fork+0x10/0x20 [ 37.026175] [ 37.026228] The buggy address belongs to the object at fff00000c7805380 [ 37.026228] which belongs to the cache kmalloc-64 of size 64 [ 37.026363] The buggy address is located 0 bytes to the right of [ 37.026363] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 37.026772] [ 37.026829] The buggy address belongs to the physical page: [ 37.026906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 37.027024] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.027158] page_type: f5(slab) [ 37.027301] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.027520] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.027815] page dumped because: kasan: bad access detected [ 37.028064] [ 37.028199] Memory state around the buggy address: [ 37.028279] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.028428] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.028537] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.028770] ^ [ 37.028900] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.029385] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.029984] ================================================================== [ 36.739783] ================================================================== [ 36.741079] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 36.741218] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.741334] [ 36.741405] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.741607] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.741762] Hardware name: linux,dummy-virt (DT) [ 36.741849] Call trace: [ 36.742380] show_stack+0x20/0x38 (C) [ 36.742520] dump_stack_lvl+0x8c/0xd0 [ 36.743869] print_report+0x118/0x608 [ 36.743983] kasan_report+0xdc/0x128 [ 36.744487] kasan_check_range+0x100/0x1a8 [ 36.744679] __kasan_check_write+0x20/0x30 [ 36.744805] kasan_atomics_helper+0xeb8/0x4858 [ 36.744934] kasan_atomics+0x198/0x2e0 [ 36.745325] kunit_try_run_case+0x170/0x3f0 [ 36.745673] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.746365] kthread+0x328/0x630 [ 36.746758] ret_from_fork+0x10/0x20 [ 36.747603] [ 36.747643] Allocated by task 277: [ 36.747705] kasan_save_stack+0x3c/0x68 [ 36.747815] kasan_save_track+0x20/0x40 [ 36.747878] kasan_save_alloc_info+0x40/0x58 [ 36.747929] __kasan_kmalloc+0xd4/0xd8 [ 36.747977] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.748055] kasan_atomics+0xb8/0x2e0 [ 36.748479] kunit_try_run_case+0x170/0x3f0 [ 36.748612] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.748734] kthread+0x328/0x630 [ 36.749093] ret_from_fork+0x10/0x20 [ 36.749808] [ 36.750210] The buggy address belongs to the object at fff00000c7805380 [ 36.750210] which belongs to the cache kmalloc-64 of size 64 [ 36.750935] The buggy address is located 0 bytes to the right of [ 36.750935] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.751181] [ 36.751236] The buggy address belongs to the physical page: [ 36.751660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.752177] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.752318] page_type: f5(slab) [ 36.752411] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.752537] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.752880] page dumped because: kasan: bad access detected [ 36.753159] [ 36.753257] Memory state around the buggy address: [ 36.753444] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.753985] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.754212] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.754873] ^ [ 36.755013] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.755332] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.755437] ================================================================== [ 37.030468] ================================================================== [ 37.030621] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 37.030730] Read of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 37.030959] [ 37.031040] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 37.031431] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.031535] Hardware name: linux,dummy-virt (DT) [ 37.031615] Call trace: [ 37.031710] show_stack+0x20/0x38 (C) [ 37.031830] dump_stack_lvl+0x8c/0xd0 [ 37.032142] print_report+0x118/0x608 [ 37.032335] kasan_report+0xdc/0x128 [ 37.032497] __asan_report_load8_noabort+0x20/0x30 [ 37.032630] kasan_atomics_helper+0x3e10/0x4858 [ 37.033003] kasan_atomics+0x198/0x2e0 [ 37.033141] kunit_try_run_case+0x170/0x3f0 [ 37.033266] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.033469] kthread+0x328/0x630 [ 37.033673] ret_from_fork+0x10/0x20 [ 37.033788] [ 37.033866] Allocated by task 277: [ 37.033983] kasan_save_stack+0x3c/0x68 [ 37.034159] kasan_save_track+0x20/0x40 [ 37.034436] kasan_save_alloc_info+0x40/0x58 [ 37.034630] __kasan_kmalloc+0xd4/0xd8 [ 37.034726] __kmalloc_cache_noprof+0x16c/0x3c0 [ 37.034909] kasan_atomics+0xb8/0x2e0 [ 37.035069] kunit_try_run_case+0x170/0x3f0 [ 37.035172] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.035276] kthread+0x328/0x630 [ 37.035380] ret_from_fork+0x10/0x20 [ 37.035516] [ 37.035563] The buggy address belongs to the object at fff00000c7805380 [ 37.035563] which belongs to the cache kmalloc-64 of size 64 [ 37.035945] The buggy address is located 0 bytes to the right of [ 37.035945] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 37.036194] [ 37.036309] The buggy address belongs to the physical page: [ 37.036453] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 37.036750] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.036871] page_type: f5(slab) [ 37.037016] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.037156] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.037250] page dumped because: kasan: bad access detected [ 37.037344] [ 37.037402] Memory state around the buggy address: [ 37.037487] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.037667] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.037821] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.037927] ^ [ 37.038007] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.038149] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.038477] ================================================================== [ 36.891690] ================================================================== [ 36.891886] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 36.892019] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.892731] [ 36.892822] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.893042] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.893126] Hardware name: linux,dummy-virt (DT) [ 36.893385] Call trace: [ 36.893488] show_stack+0x20/0x38 (C) [ 36.893629] dump_stack_lvl+0x8c/0xd0 [ 36.893999] print_report+0x118/0x608 [ 36.894157] kasan_report+0xdc/0x128 [ 36.894350] kasan_check_range+0x100/0x1a8 [ 36.894495] __kasan_check_write+0x20/0x30 [ 36.894643] kasan_atomics_helper+0x1384/0x4858 [ 36.895132] kasan_atomics+0x198/0x2e0 [ 36.895457] kunit_try_run_case+0x170/0x3f0 [ 36.895599] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.896052] kthread+0x328/0x630 [ 36.896484] ret_from_fork+0x10/0x20 [ 36.896854] [ 36.897141] Allocated by task 277: [ 36.897221] kasan_save_stack+0x3c/0x68 [ 36.897417] kasan_save_track+0x20/0x40 [ 36.897718] kasan_save_alloc_info+0x40/0x58 [ 36.898114] __kasan_kmalloc+0xd4/0xd8 [ 36.898407] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.898661] kasan_atomics+0xb8/0x2e0 [ 36.898885] kunit_try_run_case+0x170/0x3f0 [ 36.899008] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.899463] kthread+0x328/0x630 [ 36.899570] ret_from_fork+0x10/0x20 [ 36.899683] [ 36.899800] The buggy address belongs to the object at fff00000c7805380 [ 36.899800] which belongs to the cache kmalloc-64 of size 64 [ 36.899942] The buggy address is located 0 bytes to the right of [ 36.899942] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.900133] [ 36.900207] The buggy address belongs to the physical page: [ 36.900286] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.900409] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.900521] page_type: f5(slab) [ 36.900610] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.900731] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.900827] page dumped because: kasan: bad access detected [ 36.900905] [ 36.900952] Memory state around the buggy address: [ 36.901410] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.901750] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.901896] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.902118] ^ [ 36.902351] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.903323] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.903426] ================================================================== [ 36.785234] ================================================================== [ 36.785336] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 36.785454] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.785575] [ 36.785896] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.786734] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.786853] Hardware name: linux,dummy-virt (DT) [ 36.786932] Call trace: [ 36.787371] show_stack+0x20/0x38 (C) [ 36.787690] dump_stack_lvl+0x8c/0xd0 [ 36.788101] print_report+0x118/0x608 [ 36.788628] kasan_report+0xdc/0x128 [ 36.789100] kasan_check_range+0x100/0x1a8 [ 36.789372] __kasan_check_write+0x20/0x30 [ 36.789628] kasan_atomics_helper+0xff0/0x4858 [ 36.789772] kasan_atomics+0x198/0x2e0 [ 36.789889] kunit_try_run_case+0x170/0x3f0 [ 36.790461] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.790762] kthread+0x328/0x630 [ 36.791019] ret_from_fork+0x10/0x20 [ 36.791202] [ 36.791310] Allocated by task 277: [ 36.791382] kasan_save_stack+0x3c/0x68 [ 36.791486] kasan_save_track+0x20/0x40 [ 36.791581] kasan_save_alloc_info+0x40/0x58 [ 36.791689] __kasan_kmalloc+0xd4/0xd8 [ 36.791831] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.792107] kasan_atomics+0xb8/0x2e0 [ 36.792257] kunit_try_run_case+0x170/0x3f0 [ 36.792370] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.792636] kthread+0x328/0x630 [ 36.792801] ret_from_fork+0x10/0x20 [ 36.792900] [ 36.792954] The buggy address belongs to the object at fff00000c7805380 [ 36.792954] which belongs to the cache kmalloc-64 of size 64 [ 36.793104] The buggy address is located 0 bytes to the right of [ 36.793104] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.793278] [ 36.793341] The buggy address belongs to the physical page: [ 36.793424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.794295] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.794494] page_type: f5(slab) [ 36.794694] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.794795] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.794849] page dumped because: kasan: bad access detected [ 36.794909] [ 36.794963] Memory state around the buggy address: [ 36.795016] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.795828] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.795969] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.796022] ^ [ 36.796098] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.796208] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.796260] ================================================================== [ 36.648826] ================================================================== [ 36.648929] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 36.649066] Write of size 4 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.649218] [ 36.649352] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.649765] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.649926] Hardware name: linux,dummy-virt (DT) [ 36.650005] Call trace: [ 36.650089] show_stack+0x20/0x38 (C) [ 36.650215] dump_stack_lvl+0x8c/0xd0 [ 36.650470] print_report+0x118/0x608 [ 36.651088] kasan_report+0xdc/0x128 [ 36.652131] kasan_check_range+0x100/0x1a8 [ 36.652559] __kasan_check_write+0x20/0x30 [ 36.653389] kasan_atomics_helper+0xd3c/0x4858 [ 36.653523] kasan_atomics+0x198/0x2e0 [ 36.654137] kunit_try_run_case+0x170/0x3f0 [ 36.655235] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.655717] kthread+0x328/0x630 [ 36.656349] ret_from_fork+0x10/0x20 [ 36.656479] [ 36.657413] Allocated by task 277: [ 36.657727] kasan_save_stack+0x3c/0x68 [ 36.658275] kasan_save_track+0x20/0x40 [ 36.658447] kasan_save_alloc_info+0x40/0x58 [ 36.659244] __kasan_kmalloc+0xd4/0xd8 [ 36.659788] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.659905] kasan_atomics+0xb8/0x2e0 [ 36.660007] kunit_try_run_case+0x170/0x3f0 [ 36.661062] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.661766] kthread+0x328/0x630 [ 36.662068] ret_from_fork+0x10/0x20 [ 36.662852] [ 36.662944] The buggy address belongs to the object at fff00000c7805380 [ 36.662944] which belongs to the cache kmalloc-64 of size 64 [ 36.663256] The buggy address is located 0 bytes to the right of [ 36.663256] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.664203] [ 36.664509] The buggy address belongs to the physical page: [ 36.664591] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.664714] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.664824] page_type: f5(slab) [ 36.667452] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.667987] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.668283] page dumped because: kasan: bad access detected [ 36.668671] [ 36.669265] Memory state around the buggy address: [ 36.669736] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.670499] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.670854] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.671769] ^ [ 36.671945] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.672074] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.673402] ================================================================== [ 37.063446] ================================================================== [ 37.063549] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 37.063912] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 37.064063] [ 37.064257] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 37.064841] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.064913] Hardware name: linux,dummy-virt (DT) [ 37.066414] Call trace: [ 37.066506] show_stack+0x20/0x38 (C) [ 37.066678] dump_stack_lvl+0x8c/0xd0 [ 37.067271] print_report+0x118/0x608 [ 37.067497] kasan_report+0xdc/0x128 [ 37.067832] kasan_check_range+0x100/0x1a8 [ 37.067987] __kasan_check_write+0x20/0x30 [ 37.068173] kasan_atomics_helper+0x17ec/0x4858 [ 37.068356] kasan_atomics+0x198/0x2e0 [ 37.068478] kunit_try_run_case+0x170/0x3f0 [ 37.068612] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.069001] kthread+0x328/0x630 [ 37.069155] ret_from_fork+0x10/0x20 [ 37.069282] [ 37.069330] Allocated by task 277: [ 37.069401] kasan_save_stack+0x3c/0x68 [ 37.069611] kasan_save_track+0x20/0x40 [ 37.069857] kasan_save_alloc_info+0x40/0x58 [ 37.069972] __kasan_kmalloc+0xd4/0xd8 [ 37.070729] __kmalloc_cache_noprof+0x16c/0x3c0 [ 37.070872] kasan_atomics+0xb8/0x2e0 [ 37.070987] kunit_try_run_case+0x170/0x3f0 [ 37.071124] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.071327] kthread+0x328/0x630 [ 37.071440] ret_from_fork+0x10/0x20 [ 37.071542] [ 37.071603] The buggy address belongs to the object at fff00000c7805380 [ 37.071603] which belongs to the cache kmalloc-64 of size 64 [ 37.071745] The buggy address is located 0 bytes to the right of [ 37.071745] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 37.071897] [ 37.071953] The buggy address belongs to the physical page: [ 37.072047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 37.072635] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.073193] page_type: f5(slab) [ 37.073365] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.073569] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.073675] page dumped because: kasan: bad access detected [ 37.074145] [ 37.074198] Memory state around the buggy address: [ 37.074432] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.074926] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.075211] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.075547] ^ [ 37.075668] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.075775] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.075870] ================================================================== [ 36.877669] ================================================================== [ 36.877976] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 36.878312] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.878498] [ 36.878656] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.878868] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.878943] Hardware name: linux,dummy-virt (DT) [ 36.879162] Call trace: [ 36.879223] show_stack+0x20/0x38 (C) [ 36.879520] dump_stack_lvl+0x8c/0xd0 [ 36.879647] print_report+0x118/0x608 [ 36.880062] kasan_report+0xdc/0x128 [ 36.880301] kasan_check_range+0x100/0x1a8 [ 36.880469] __kasan_check_write+0x20/0x30 [ 36.880595] kasan_atomics_helper+0x12d8/0x4858 [ 36.880725] kasan_atomics+0x198/0x2e0 [ 36.880845] kunit_try_run_case+0x170/0x3f0 [ 36.880986] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.881164] kthread+0x328/0x630 [ 36.881738] ret_from_fork+0x10/0x20 [ 36.882110] [ 36.882178] Allocated by task 277: [ 36.882272] kasan_save_stack+0x3c/0x68 [ 36.882448] kasan_save_track+0x20/0x40 [ 36.883188] kasan_save_alloc_info+0x40/0x58 [ 36.883635] __kasan_kmalloc+0xd4/0xd8 [ 36.884022] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.884191] kasan_atomics+0xb8/0x2e0 [ 36.884298] kunit_try_run_case+0x170/0x3f0 [ 36.884402] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.884514] kthread+0x328/0x630 [ 36.884599] ret_from_fork+0x10/0x20 [ 36.884786] [ 36.885153] The buggy address belongs to the object at fff00000c7805380 [ 36.885153] which belongs to the cache kmalloc-64 of size 64 [ 36.885359] The buggy address is located 0 bytes to the right of [ 36.885359] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.886207] [ 36.886639] The buggy address belongs to the physical page: [ 36.886825] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.887155] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.887754] page_type: f5(slab) [ 36.887953] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.888299] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.888411] page dumped because: kasan: bad access detected [ 36.888492] [ 36.889064] Memory state around the buggy address: [ 36.889801] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.890056] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.890172] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.890267] ^ [ 36.890414] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.890524] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.890624] ================================================================== [ 36.823905] ================================================================== [ 36.824081] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 36.824267] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.824546] [ 36.824682] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.824932] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.825079] Hardware name: linux,dummy-virt (DT) [ 36.825157] Call trace: [ 36.825353] show_stack+0x20/0x38 (C) [ 36.825550] dump_stack_lvl+0x8c/0xd0 [ 36.825731] print_report+0x118/0x608 [ 36.825928] kasan_report+0xdc/0x128 [ 36.826067] kasan_check_range+0x100/0x1a8 [ 36.826193] __kasan_check_write+0x20/0x30 [ 36.826308] kasan_atomics_helper+0x1128/0x4858 [ 36.826427] kasan_atomics+0x198/0x2e0 [ 36.826600] kunit_try_run_case+0x170/0x3f0 [ 36.826727] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.826898] kthread+0x328/0x630 [ 36.827141] ret_from_fork+0x10/0x20 [ 36.827280] [ 36.827335] Allocated by task 277: [ 36.827407] kasan_save_stack+0x3c/0x68 [ 36.827606] kasan_save_track+0x20/0x40 [ 36.827746] kasan_save_alloc_info+0x40/0x58 [ 36.827895] __kasan_kmalloc+0xd4/0xd8 [ 36.828095] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.828206] kasan_atomics+0xb8/0x2e0 [ 36.828398] kunit_try_run_case+0x170/0x3f0 [ 36.828539] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.828664] kthread+0x328/0x630 [ 36.828756] ret_from_fork+0x10/0x20 [ 36.828920] [ 36.829010] The buggy address belongs to the object at fff00000c7805380 [ 36.829010] which belongs to the cache kmalloc-64 of size 64 [ 36.829177] The buggy address is located 0 bytes to the right of [ 36.829177] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.829365] [ 36.829420] The buggy address belongs to the physical page: [ 36.829493] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.829637] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.829917] page_type: f5(slab) [ 36.830013] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.830153] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.830272] page dumped because: kasan: bad access detected [ 36.830368] [ 36.830479] Memory state around the buggy address: [ 36.830675] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.830810] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.830915] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.831011] ^ [ 36.831160] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.831282] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.831440] ================================================================== [ 36.859612] ================================================================== [ 36.859710] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 36.859825] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277 [ 36.859941] [ 36.860817] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 36.861406] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.861475] Hardware name: linux,dummy-virt (DT) [ 36.862044] Call trace: [ 36.862440] show_stack+0x20/0x38 (C) [ 36.862739] dump_stack_lvl+0x8c/0xd0 [ 36.862869] print_report+0x118/0x608 [ 36.862988] kasan_report+0xdc/0x128 [ 36.864291] kasan_check_range+0x100/0x1a8 [ 36.865209] __kasan_check_write+0x20/0x30 [ 36.865674] kasan_atomics_helper+0x126c/0x4858 [ 36.865951] kasan_atomics+0x198/0x2e0 [ 36.866090] kunit_try_run_case+0x170/0x3f0 [ 36.866217] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.866656] kthread+0x328/0x630 [ 36.866983] ret_from_fork+0x10/0x20 [ 36.867225] [ 36.867441] Allocated by task 277: [ 36.868047] kasan_save_stack+0x3c/0x68 [ 36.868382] kasan_save_track+0x20/0x40 [ 36.868734] kasan_save_alloc_info+0x40/0x58 [ 36.868890] __kasan_kmalloc+0xd4/0xd8 [ 36.869494] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.869625] kasan_atomics+0xb8/0x2e0 [ 36.869721] kunit_try_run_case+0x170/0x3f0 [ 36.869817] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.869928] kthread+0x328/0x630 [ 36.870018] ret_from_fork+0x10/0x20 [ 36.870822] [ 36.871114] The buggy address belongs to the object at fff00000c7805380 [ 36.871114] which belongs to the cache kmalloc-64 of size 64 [ 36.871688] The buggy address is located 0 bytes to the right of [ 36.871688] allocated 48-byte region [fff00000c7805380, fff00000c78053b0) [ 36.871915] [ 36.872198] The buggy address belongs to the physical page: [ 36.872360] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805 [ 36.872637] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.873472] page_type: f5(slab) [ 36.873651] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.873820] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.874540] page dumped because: kasan: bad access detected [ 36.874771] [ 36.874949] Memory state around the buggy address: [ 36.875049] fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.875878] fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.875992] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.876337] ^ [ 36.876748] fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.876875] fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.876972] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 35.852749] ================================================================== [ 35.852917] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 35.853073] Read of size 1 at addr ffff800080b07c2a by task kunit_try_catch/261 [ 35.853220] [ 35.853389] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 35.853744] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.853816] Hardware name: linux,dummy-virt (DT) [ 35.853899] Call trace: [ 35.853958] show_stack+0x20/0x38 (C) [ 35.854106] dump_stack_lvl+0x8c/0xd0 [ 35.854229] print_report+0x310/0x608 [ 35.854354] kasan_report+0xdc/0x128 [ 35.854468] __asan_report_load1_noabort+0x20/0x30 [ 35.854727] kasan_stack_oob+0x238/0x270 [ 35.854887] kunit_try_run_case+0x170/0x3f0 [ 35.855056] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.855323] kthread+0x328/0x630 [ 35.855519] ret_from_fork+0x10/0x20 [ 35.855660] [ 35.855793] The buggy address belongs to stack of task kunit_try_catch/261 [ 35.856161] and is located at offset 138 in frame: [ 35.856267] kasan_stack_oob+0x0/0x270 [ 35.856669] [ 35.856745] This frame has 4 objects: [ 35.857154] [48, 49) '__assertion' [ 35.857272] [64, 72) 'array' [ 35.857372] [96, 112) '__assertion' [ 35.857499] [128, 138) 'stack_array' [ 35.857631] [ 35.857723] The buggy address belongs to the virtual mapping at [ 35.857723] [ffff800080b00000, ffff800080b09000) created by: [ 35.857723] kernel_clone+0x150/0x7a8 [ 35.858140] [ 35.858315] The buggy address belongs to the physical page: [ 35.858935] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 35.868222] ok 57 kasan_stack_oob [ 35.873308] Read of size 1 at addr ffff800080b07b5f by task kunit_try_catch/263 [ 35.875534] kasan_alloca_oob_left+0x2b8/0x310 [ 35.877259] [ 35.878170] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 35.879780] ffff800080b07c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 35.903849] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.905273] __asan_report_load1_noabort+0x20/0x30 [ 35.907782] [ 35.907850] The buggy address belongs to the physical page: [ 35.908104] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643d [ 35.908489] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.908644] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 35.909459] ffff800080b07a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.933428] # kasan_memchr: EXPECTATION FAILED at mm/kasan/kasan_test_c.c:1535 [ 35.933428] KASAN failure expected in "kasan_ptr_result = memchr(ptr, '1', size + 1)", but none occurred [ 35.955501] __kasan_kmalloc+0xd4/0xd8 [ 35.962647] [ 35.963719] page dumped because: kasan: bad access detected [ 35.993323] # kasan_strings: EXPECTATION FAILED at mm/kasan/kasan_test_c.c:1610 [ 35.993323] KASAN failure expected in "kasan_ptr_result = strchr(ptr, '1')", but none occurred [ 36.000449] Read of size 1 at addr fff00000c77fd290 by task kunit_try_catch/271 [ 36.002294] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.005303] print_report+0x118/0x608 [ 36.007487] kasan_save_track+0x20/0x40 [ 36.008152] kasan_strings+0xc8/0xb00 [ 36.010234] kunit_try_run_case+0x170/0x3f0 [ 36.011721] [ 36.014653] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 36.016039] >fff00000c77fd280: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 36.018002] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 35.816332] ================================================================== [ 35.816453] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 35.816570] Read of size 1 at addr ffffa42cff05668d by task kunit_try_catch/257 [ 35.816683] [ 35.816757] CPU: 0 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 35.816948] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.817009] Hardware name: linux,dummy-virt (DT) [ 35.821809] Call trace: [ 35.821914] show_stack+0x20/0x38 (C) [ 35.822617] dump_stack_lvl+0x8c/0xd0 [ 35.822799] print_report+0x310/0x608 [ 35.823696] kasan_report+0xdc/0x128 [ 35.823825] __asan_report_load1_noabort+0x20/0x30 [ 35.824460] kasan_global_oob_right+0x230/0x270 [ 35.825166] kunit_try_run_case+0x170/0x3f0 [ 35.825305] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.825649] kthread+0x328/0x630 [ 35.825995] ret_from_fork+0x10/0x20 [ 35.826232] [ 35.826717] The buggy address belongs to the variable: [ 35.826818] global_array+0xd/0x40 [ 35.826912] [ 35.827007] The buggy address belongs to the virtual mapping at [ 35.827007] [ffffa42cfd210000, ffffa42cff111000) created by: [ 35.827007] paging_init+0x66c/0x7d0 [ 35.827260] [ 35.827588] The buggy address belongs to the physical page: [ 35.827674] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47c56 [ 35.827859] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 35.828046] raw: 03fffe0000002000 ffffc1ffc01f1588 ffffc1ffc01f1588 0000000000000000 [ 35.828196] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 35.828294] page dumped because: kasan: bad access detected [ 35.828366] [ 35.828416] Memory state around the buggy address: [ 35.828509] ffffa42cff056580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.828616] ffffa42cff056600: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9 [ 35.828721] >ffffa42cff056680: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 [ 35.828812] ^ [ 35.828892] ffffa42cff056700: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 [ 35.828997] ffffa42cff056780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.829128] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 35.769187] ================================================================== [ 35.769254] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 35.769320] Free of addr fff00000c76da801 by task kunit_try_catch/253 [ 35.769372] [ 35.769407] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 35.769510] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.769545] Hardware name: linux,dummy-virt (DT) [ 35.769582] Call trace: [ 35.769608] show_stack+0x20/0x38 (C) [ 35.769672] dump_stack_lvl+0x8c/0xd0 [ 35.769727] print_report+0x118/0x608 [ 35.769788] kasan_report_invalid_free+0xc0/0xe8 [ 35.769851] check_slab_allocation+0xfc/0x108 [ 35.769912] __kasan_mempool_poison_object+0x78/0x150 [ 35.769975] mempool_free+0x28c/0x328 [ 35.770184] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 35.770334] mempool_kmalloc_invalid_free+0xc0/0x118 [ 35.770961] kunit_try_run_case+0x170/0x3f0 [ 35.771372] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.771536] kthread+0x328/0x630 [ 35.771736] ret_from_fork+0x10/0x20 [ 35.772106] [ 35.772248] Allocated by task 253: [ 35.772507] kasan_save_stack+0x3c/0x68 [ 35.772608] kasan_save_track+0x20/0x40 [ 35.773015] kasan_save_alloc_info+0x40/0x58 [ 35.773165] __kasan_mempool_unpoison_object+0x11c/0x180 [ 35.773307] remove_element+0x130/0x1f8 [ 35.773502] mempool_alloc_preallocated+0x58/0xc0 [ 35.773614] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 35.773723] mempool_kmalloc_invalid_free+0xc0/0x118 [ 35.774255] kunit_try_run_case+0x170/0x3f0 [ 35.774421] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.774695] kthread+0x328/0x630 [ 35.774847] ret_from_fork+0x10/0x20 [ 35.774960] [ 35.775013] The buggy address belongs to the object at fff00000c76da800 [ 35.775013] which belongs to the cache kmalloc-128 of size 128 [ 35.775170] The buggy address is located 1 bytes inside of [ 35.775170] 128-byte region [fff00000c76da800, fff00000c76da880) [ 35.775361] [ 35.775413] The buggy address belongs to the physical page: [ 35.775576] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da [ 35.775720] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.775897] page_type: f5(slab) [ 35.776099] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 35.776221] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 35.776317] page dumped because: kasan: bad access detected [ 35.776422] [ 35.776533] Memory state around the buggy address: [ 35.776608] fff00000c76da700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.776716] fff00000c76da780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.776848] >fff00000c76da800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.777015] ^ [ 35.777321] fff00000c76da880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.777441] fff00000c76da900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.777549] ================================================================== [ 35.793674] ================================================================== [ 35.793782] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 35.793903] Free of addr fff00000c77b4001 by task kunit_try_catch/255 [ 35.794010] [ 35.794116] CPU: 0 UID: 0 PID: 255 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 35.794375] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.794450] Hardware name: linux,dummy-virt (DT) [ 35.794540] Call trace: [ 35.794663] show_stack+0x20/0x38 (C) [ 35.794819] dump_stack_lvl+0x8c/0xd0 [ 35.795045] print_report+0x118/0x608 [ 35.795197] kasan_report_invalid_free+0xc0/0xe8 [ 35.795361] __kasan_mempool_poison_object+0xfc/0x150 [ 35.795524] mempool_free+0x28c/0x328 [ 35.795647] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 35.795769] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 35.795907] kunit_try_run_case+0x170/0x3f0 [ 35.796144] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.796308] kthread+0x328/0x630 [ 35.796422] ret_from_fork+0x10/0x20 [ 35.796548] [ 35.796670] The buggy address belongs to the physical page: [ 35.796975] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077b4 [ 35.797126] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 35.797239] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 35.797371] page_type: f8(unknown) [ 35.797546] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 35.797669] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 35.797786] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 35.797909] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 35.798114] head: 0bfffe0000000002 ffffc1ffc31ded01 00000000ffffffff 00000000ffffffff [ 35.798334] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 35.798431] page dumped because: kasan: bad access detected [ 35.798504] [ 35.798600] Memory state around the buggy address: [ 35.798680] fff00000c77b3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.798837] fff00000c77b3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.799002] >fff00000c77b4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.799149] ^ [ 35.799234] fff00000c77b4080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.799479] fff00000c77b4100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.799584] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 35.729808] ================================================================== [ 35.729940] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 35.730112] Free of addr fff00000c77b0000 by task kunit_try_catch/249 [ 35.730216] [ 35.730294] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 35.730490] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.730596] Hardware name: linux,dummy-virt (DT) [ 35.730764] Call trace: [ 35.730835] show_stack+0x20/0x38 (C) [ 35.730988] dump_stack_lvl+0x8c/0xd0 [ 35.731144] print_report+0x118/0x608 [ 35.731282] kasan_report_invalid_free+0xc0/0xe8 [ 35.731452] __kasan_mempool_poison_object+0x14c/0x150 [ 35.731684] mempool_free+0x28c/0x328 [ 35.731819] mempool_double_free_helper+0x150/0x2e8 [ 35.731942] mempool_kmalloc_large_double_free+0xc0/0x118 [ 35.732096] kunit_try_run_case+0x170/0x3f0 [ 35.732291] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.732427] kthread+0x328/0x630 [ 35.732596] ret_from_fork+0x10/0x20 [ 35.732806] [ 35.732860] The buggy address belongs to the physical page: [ 35.732935] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077b0 [ 35.733086] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 35.733274] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 35.733465] page_type: f8(unknown) [ 35.733572] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 35.733707] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 35.733889] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 35.734104] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 35.734321] head: 0bfffe0000000002 ffffc1ffc31dec01 00000000ffffffff 00000000ffffffff [ 35.734442] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 35.734535] page dumped because: kasan: bad access detected [ 35.734866] [ 35.735557] Memory state around the buggy address: [ 35.735624] fff00000c77aff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.735679] fff00000c77aff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.735744] >fff00000c77b0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.735822] ^ [ 35.735864] fff00000c77b0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.735916] fff00000c77b0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.735961] ================================================================== [ 35.755618] ================================================================== [ 35.755704] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 35.755835] Free of addr fff00000c77b0000 by task kunit_try_catch/251 [ 35.755934] [ 35.756005] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 35.756223] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.756289] Hardware name: linux,dummy-virt (DT) [ 35.756357] Call trace: [ 35.756407] show_stack+0x20/0x38 (C) [ 35.756545] dump_stack_lvl+0x8c/0xd0 [ 35.756664] print_report+0x118/0x608 [ 35.756785] kasan_report_invalid_free+0xc0/0xe8 [ 35.756908] __kasan_mempool_poison_pages+0xe0/0xe8 [ 35.757045] mempool_free+0x24c/0x328 [ 35.757163] mempool_double_free_helper+0x150/0x2e8 [ 35.757280] mempool_page_alloc_double_free+0xbc/0x118 [ 35.757405] kunit_try_run_case+0x170/0x3f0 [ 35.757523] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.757661] kthread+0x328/0x630 [ 35.757915] ret_from_fork+0x10/0x20 [ 35.758076] [ 35.758140] The buggy address belongs to the physical page: [ 35.758276] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077b0 [ 35.758425] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.759131] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 35.759623] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 35.759766] page dumped because: kasan: bad access detected [ 35.759848] [ 35.759896] Memory state around the buggy address: [ 35.760051] fff00000c77aff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.760176] fff00000c77aff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.760329] >fff00000c77b0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.760744] ^ [ 35.760836] fff00000c77b0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.761002] fff00000c77b0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.761095] ================================================================== [ 35.693015] ================================================================== [ 35.693650] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 35.694297] Free of addr fff00000c76da400 by task kunit_try_catch/247 [ 35.694403] [ 35.695529] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 35.695856] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.695969] Hardware name: linux,dummy-virt (DT) [ 35.696067] Call trace: [ 35.696164] show_stack+0x20/0x38 (C) [ 35.696296] dump_stack_lvl+0x8c/0xd0 [ 35.696416] print_report+0x118/0x608 [ 35.696767] kasan_report_invalid_free+0xc0/0xe8 [ 35.697157] check_slab_allocation+0xd4/0x108 [ 35.697521] __kasan_mempool_poison_object+0x78/0x150 [ 35.697747] mempool_free+0x28c/0x328 [ 35.698041] mempool_double_free_helper+0x150/0x2e8 [ 35.698188] mempool_kmalloc_double_free+0xc0/0x118 [ 35.698331] kunit_try_run_case+0x170/0x3f0 [ 35.698454] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.698668] kthread+0x328/0x630 [ 35.698852] ret_from_fork+0x10/0x20 [ 35.698987] [ 35.699061] Allocated by task 247: [ 35.699209] kasan_save_stack+0x3c/0x68 [ 35.699364] kasan_save_track+0x20/0x40 [ 35.699622] kasan_save_alloc_info+0x40/0x58 [ 35.699730] __kasan_mempool_unpoison_object+0x11c/0x180 [ 35.700387] remove_element+0x130/0x1f8 [ 35.700846] mempool_alloc_preallocated+0x58/0xc0 [ 35.701731] mempool_double_free_helper+0x94/0x2e8 [ 35.702045] mempool_kmalloc_double_free+0xc0/0x118 [ 35.702153] kunit_try_run_case+0x170/0x3f0 [ 35.702249] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.702896] kthread+0x328/0x630 [ 35.703564] ret_from_fork+0x10/0x20 [ 35.703926] [ 35.704055] Freed by task 247: [ 35.704176] kasan_save_stack+0x3c/0x68 [ 35.704423] kasan_save_track+0x20/0x40 [ 35.704999] kasan_save_free_info+0x4c/0x78 [ 35.705128] __kasan_mempool_poison_object+0xc0/0x150 [ 35.705337] mempool_free+0x28c/0x328 [ 35.705458] mempool_double_free_helper+0x100/0x2e8 [ 35.705562] mempool_kmalloc_double_free+0xc0/0x118 [ 35.705710] kunit_try_run_case+0x170/0x3f0 [ 35.705940] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.706100] kthread+0x328/0x630 [ 35.706333] ret_from_fork+0x10/0x20 [ 35.706437] [ 35.706620] The buggy address belongs to the object at fff00000c76da400 [ 35.706620] which belongs to the cache kmalloc-128 of size 128 [ 35.706785] The buggy address is located 0 bytes inside of [ 35.706785] 128-byte region [fff00000c76da400, fff00000c76da480) [ 35.707061] [ 35.707159] The buggy address belongs to the physical page: [ 35.707289] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da [ 35.707504] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.707631] page_type: f5(slab) [ 35.707733] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 35.707946] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 35.708100] page dumped because: kasan: bad access detected [ 35.708210] [ 35.708259] Memory state around the buggy address: [ 35.708414] fff00000c76da300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.708520] fff00000c76da380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.708618] >fff00000c76da400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.708765] ^ [ 35.708970] fff00000c76da480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.709163] fff00000c76da500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.709350] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 35.672725] ================================================================== [ 35.672847] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 35.672987] Read of size 1 at addr fff00000c77b0000 by task kunit_try_catch/245 [ 35.673122] [ 35.673987] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 35.674867] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.675311] Hardware name: linux,dummy-virt (DT) [ 35.675616] Call trace: [ 35.675683] show_stack+0x20/0x38 (C) [ 35.676394] dump_stack_lvl+0x8c/0xd0 [ 35.676643] print_report+0x118/0x608 [ 35.676822] kasan_report+0xdc/0x128 [ 35.677181] __asan_report_load1_noabort+0x20/0x30 [ 35.677557] mempool_uaf_helper+0x314/0x340 [ 35.677712] mempool_page_alloc_uaf+0xc0/0x118 [ 35.677851] kunit_try_run_case+0x170/0x3f0 [ 35.678487] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.678680] kthread+0x328/0x630 [ 35.678739] ret_from_fork+0x10/0x20 [ 35.678852] [ 35.679049] The buggy address belongs to the physical page: [ 35.679134] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077b0 [ 35.679577] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.680357] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 35.680481] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 35.680577] page dumped because: kasan: bad access detected [ 35.680651] [ 35.681077] Memory state around the buggy address: [ 35.681169] fff00000c77aff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.681390] fff00000c77aff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.681659] >fff00000c77b0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.682020] ^ [ 35.682399] fff00000c77b0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.682729] fff00000c77b0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.683118] ================================================================== [ 35.577853] ================================================================== [ 35.577923] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 35.577994] Read of size 1 at addr fff00000c77b0000 by task kunit_try_catch/241 [ 35.578101] [ 35.578175] CPU: 0 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 35.578407] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.578474] Hardware name: linux,dummy-virt (DT) [ 35.578546] Call trace: [ 35.578602] show_stack+0x20/0x38 (C) [ 35.578719] dump_stack_lvl+0x8c/0xd0 [ 35.578843] print_report+0x118/0x608 [ 35.578957] kasan_report+0xdc/0x128 [ 35.579101] __asan_report_load1_noabort+0x20/0x30 [ 35.579464] mempool_uaf_helper+0x314/0x340 [ 35.579596] mempool_kmalloc_large_uaf+0xc4/0x120 [ 35.579729] kunit_try_run_case+0x170/0x3f0 [ 35.579847] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.579972] kthread+0x328/0x630 [ 35.580381] ret_from_fork+0x10/0x20 [ 35.581165] [ 35.581522] The buggy address belongs to the physical page: [ 35.581862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077b0 [ 35.581995] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 35.583095] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 35.583793] page_type: f8(unknown) [ 35.584533] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 35.584718] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 35.585070] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 35.585210] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 35.585482] head: 0bfffe0000000002 ffffc1ffc31dec01 00000000ffffffff 00000000ffffffff [ 35.585985] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 35.586132] page dumped because: kasan: bad access detected [ 35.586211] [ 35.586254] Memory state around the buggy address: [ 35.586335] fff00000c77aff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.588115] fff00000c77aff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.588181] >fff00000c77b0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.588227] ^ [ 35.588291] fff00000c77b0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.588563] fff00000c77b0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.588674] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 35.544244] ================================================================== [ 35.544375] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 35.544518] Read of size 1 at addr fff00000c76da000 by task kunit_try_catch/239 [ 35.544647] [ 35.544806] CPU: 0 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 35.545542] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.545627] Hardware name: linux,dummy-virt (DT) [ 35.545712] Call trace: [ 35.545772] show_stack+0x20/0x38 (C) [ 35.546070] dump_stack_lvl+0x8c/0xd0 [ 35.546258] print_report+0x118/0x608 [ 35.546439] kasan_report+0xdc/0x128 [ 35.546673] __asan_report_load1_noabort+0x20/0x30 [ 35.546807] mempool_uaf_helper+0x314/0x340 [ 35.546923] mempool_kmalloc_uaf+0xc4/0x120 [ 35.547050] kunit_try_run_case+0x170/0x3f0 [ 35.547178] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.547301] kthread+0x328/0x630 [ 35.547408] ret_from_fork+0x10/0x20 [ 35.547523] [ 35.547566] Allocated by task 239: [ 35.547634] kasan_save_stack+0x3c/0x68 [ 35.547733] kasan_save_track+0x20/0x40 [ 35.547822] kasan_save_alloc_info+0x40/0x58 [ 35.547912] __kasan_mempool_unpoison_object+0x11c/0x180 [ 35.549176] remove_element+0x130/0x1f8 [ 35.549288] mempool_alloc_preallocated+0x58/0xc0 [ 35.549396] mempool_uaf_helper+0xa4/0x340 [ 35.549614] mempool_kmalloc_uaf+0xc4/0x120 [ 35.549719] kunit_try_run_case+0x170/0x3f0 [ 35.549812] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.549919] kthread+0x328/0x630 [ 35.550993] ret_from_fork+0x10/0x20 [ 35.551536] [ 35.551729] Freed by task 239: [ 35.551812] kasan_save_stack+0x3c/0x68 [ 35.552020] kasan_save_track+0x20/0x40 [ 35.552831] kasan_save_free_info+0x4c/0x78 [ 35.553196] __kasan_mempool_poison_object+0xc0/0x150 [ 35.553587] mempool_free+0x28c/0x328 [ 35.553982] mempool_uaf_helper+0x104/0x340 [ 35.554111] mempool_kmalloc_uaf+0xc4/0x120 [ 35.554211] kunit_try_run_case+0x170/0x3f0 [ 35.554303] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.554407] kthread+0x328/0x630 [ 35.554487] ret_from_fork+0x10/0x20 [ 35.555046] [ 35.555114] The buggy address belongs to the object at fff00000c76da000 [ 35.555114] which belongs to the cache kmalloc-128 of size 128 [ 35.555249] The buggy address is located 0 bytes inside of [ 35.555249] freed 128-byte region [fff00000c76da000, fff00000c76da080) [ 35.555584] [ 35.555648] The buggy address belongs to the physical page: [ 35.555730] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076da [ 35.556336] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.556507] page_type: f5(slab) [ 35.556821] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 35.556977] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 35.557364] page dumped because: kasan: bad access detected [ 35.557539] [ 35.557617] Memory state around the buggy address: [ 35.557862] fff00000c76d9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.557996] fff00000c76d9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.558319] >fff00000c76da000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.558446] ^ [ 35.558659] fff00000c76da080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.558983] fff00000c76da100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.559100] ================================================================== [ 35.611521] ================================================================== [ 35.611754] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 35.611947] Read of size 1 at addr fff00000c76dc240 by task kunit_try_catch/243 [ 35.612463] [ 35.612613] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 35.612810] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.613616] Hardware name: linux,dummy-virt (DT) [ 35.613724] Call trace: [ 35.613789] show_stack+0x20/0x38 (C) [ 35.614277] dump_stack_lvl+0x8c/0xd0 [ 35.614739] print_report+0x118/0x608 [ 35.615024] kasan_report+0xdc/0x128 [ 35.615238] __asan_report_load1_noabort+0x20/0x30 [ 35.615495] mempool_uaf_helper+0x314/0x340 [ 35.615730] mempool_slab_uaf+0xc0/0x118 [ 35.615866] kunit_try_run_case+0x170/0x3f0 [ 35.616111] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.616262] kthread+0x328/0x630 [ 35.616387] ret_from_fork+0x10/0x20 [ 35.617041] [ 35.617110] Allocated by task 243: [ 35.617295] kasan_save_stack+0x3c/0x68 [ 35.617438] kasan_save_track+0x20/0x40 [ 35.617643] kasan_save_alloc_info+0x40/0x58 [ 35.617761] __kasan_mempool_unpoison_object+0xbc/0x180 [ 35.617965] remove_element+0x16c/0x1f8 [ 35.618186] mempool_alloc_preallocated+0x58/0xc0 [ 35.618305] mempool_uaf_helper+0xa4/0x340 [ 35.618657] mempool_slab_uaf+0xc0/0x118 [ 35.618861] kunit_try_run_case+0x170/0x3f0 [ 35.619159] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.619410] kthread+0x328/0x630 [ 35.619557] ret_from_fork+0x10/0x20 [ 35.619664] [ 35.619833] Freed by task 243: [ 35.619963] kasan_save_stack+0x3c/0x68 [ 35.620333] kasan_save_track+0x20/0x40 [ 35.620492] kasan_save_free_info+0x4c/0x78 [ 35.620838] __kasan_mempool_poison_object+0xc0/0x150 [ 35.621105] mempool_free+0x28c/0x328 [ 35.621330] mempool_uaf_helper+0x104/0x340 [ 35.621677] mempool_slab_uaf+0xc0/0x118 [ 35.621793] kunit_try_run_case+0x170/0x3f0 [ 35.622066] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.622373] kthread+0x328/0x630 [ 35.622525] ret_from_fork+0x10/0x20 [ 35.622777] [ 35.622844] The buggy address belongs to the object at fff00000c76dc240 [ 35.622844] which belongs to the cache test_cache of size 123 [ 35.623009] The buggy address is located 0 bytes inside of [ 35.623009] freed 123-byte region [fff00000c76dc240, fff00000c76dc2bb) [ 35.623175] [ 35.623231] The buggy address belongs to the physical page: [ 35.623735] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076dc [ 35.623899] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.624154] page_type: f5(slab) [ 35.624447] raw: 0bfffe0000000000 fff00000c598fb40 dead000000000122 0000000000000000 [ 35.624571] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 35.624669] page dumped because: kasan: bad access detected [ 35.625637] [ 35.625795] Memory state around the buggy address: [ 35.625876] fff00000c76dc100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.625972] fff00000c76dc180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.626100] >fff00000c76dc200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 35.626202] ^ [ 35.626295] fff00000c76dc280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.626399] fff00000c76dc300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.626486] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 35.458163] ================================================================== [ 35.458552] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 35.458713] Read of size 1 at addr fff00000c77ae001 by task kunit_try_catch/235 [ 35.458914] [ 35.459006] CPU: 0 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 35.459888] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.459955] Hardware name: linux,dummy-virt (DT) [ 35.460059] Call trace: [ 35.460119] show_stack+0x20/0x38 (C) [ 35.460244] dump_stack_lvl+0x8c/0xd0 [ 35.461697] print_report+0x118/0x608 [ 35.461851] kasan_report+0xdc/0x128 [ 35.461918] __asan_report_load1_noabort+0x20/0x30 [ 35.461977] mempool_oob_right_helper+0x2ac/0x2f0 [ 35.462073] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 35.462182] kunit_try_run_case+0x170/0x3f0 [ 35.462247] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.462341] kthread+0x328/0x630 [ 35.462522] ret_from_fork+0x10/0x20 [ 35.462800] [ 35.462856] The buggy address belongs to the physical page: [ 35.462955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077ac [ 35.463218] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 35.463520] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 35.463650] page_type: f8(unknown) [ 35.463786] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 35.463990] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 35.464343] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 35.464694] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 35.464816] head: 0bfffe0000000002 ffffc1ffc31deb01 00000000ffffffff 00000000ffffffff [ 35.464929] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 35.465023] page dumped because: kasan: bad access detected [ 35.465121] [ 35.465173] Memory state around the buggy address: [ 35.465327] fff00000c77adf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.465497] fff00000c77adf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.465616] >fff00000c77ae000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 35.465720] ^ [ 35.465792] fff00000c77ae080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 35.466075] fff00000c77ae100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 35.466257] ================================================================== [ 35.420200] ================================================================== [ 35.420325] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 35.420475] Read of size 1 at addr fff00000c63f0c73 by task kunit_try_catch/233 [ 35.420590] [ 35.420700] CPU: 0 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 35.421558] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.422022] Hardware name: linux,dummy-virt (DT) [ 35.422136] Call trace: [ 35.422206] show_stack+0x20/0x38 (C) [ 35.423157] dump_stack_lvl+0x8c/0xd0 [ 35.423440] print_report+0x118/0x608 [ 35.423839] kasan_report+0xdc/0x128 [ 35.424015] __asan_report_load1_noabort+0x20/0x30 [ 35.424242] mempool_oob_right_helper+0x2ac/0x2f0 [ 35.424408] mempool_kmalloc_oob_right+0xc4/0x120 [ 35.424539] kunit_try_run_case+0x170/0x3f0 [ 35.424662] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.424813] kthread+0x328/0x630 [ 35.425106] ret_from_fork+0x10/0x20 [ 35.425509] [ 35.425559] Allocated by task 233: [ 35.425932] kasan_save_stack+0x3c/0x68 [ 35.426065] kasan_save_track+0x20/0x40 [ 35.426187] kasan_save_alloc_info+0x40/0x58 [ 35.426450] __kasan_mempool_unpoison_object+0x11c/0x180 [ 35.426631] remove_element+0x130/0x1f8 [ 35.426825] mempool_alloc_preallocated+0x58/0xc0 [ 35.427182] mempool_oob_right_helper+0x98/0x2f0 [ 35.427470] mempool_kmalloc_oob_right+0xc4/0x120 [ 35.427769] kunit_try_run_case+0x170/0x3f0 [ 35.428278] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.428397] kthread+0x328/0x630 [ 35.428483] ret_from_fork+0x10/0x20 [ 35.428577] [ 35.428653] The buggy address belongs to the object at fff00000c63f0c00 [ 35.428653] which belongs to the cache kmalloc-128 of size 128 [ 35.429042] The buggy address is located 0 bytes to the right of [ 35.429042] allocated 115-byte region [fff00000c63f0c00, fff00000c63f0c73) [ 35.429351] [ 35.429413] The buggy address belongs to the physical page: [ 35.429506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f0 [ 35.429644] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.429768] page_type: f5(slab) [ 35.429867] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 35.429980] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 35.430756] page dumped because: kasan: bad access detected [ 35.430863] [ 35.431260] Memory state around the buggy address: [ 35.431379] fff00000c63f0b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.431690] fff00000c63f0b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.431819] >fff00000c63f0c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 35.431914] ^ [ 35.432841] fff00000c63f0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.432974] fff00000c63f0d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 35.433116] ================================================================== [ 35.489653] ================================================================== [ 35.489938] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 35.490251] Read of size 1 at addr fff00000c76d92bb by task kunit_try_catch/237 [ 35.490551] [ 35.490717] CPU: 0 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 35.491076] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.491175] Hardware name: linux,dummy-virt (DT) [ 35.491255] Call trace: [ 35.491654] show_stack+0x20/0x38 (C) [ 35.491786] dump_stack_lvl+0x8c/0xd0 [ 35.491966] print_report+0x118/0x608 [ 35.492158] kasan_report+0xdc/0x128 [ 35.492376] __asan_report_load1_noabort+0x20/0x30 [ 35.492686] mempool_oob_right_helper+0x2ac/0x2f0 [ 35.492850] mempool_slab_oob_right+0xc0/0x118 [ 35.492975] kunit_try_run_case+0x170/0x3f0 [ 35.493123] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.493427] kthread+0x328/0x630 [ 35.493564] ret_from_fork+0x10/0x20 [ 35.493684] [ 35.493728] Allocated by task 237: [ 35.493799] kasan_save_stack+0x3c/0x68 [ 35.493898] kasan_save_track+0x20/0x40 [ 35.493989] kasan_save_alloc_info+0x40/0x58 [ 35.494108] __kasan_mempool_unpoison_object+0xbc/0x180 [ 35.494235] remove_element+0x16c/0x1f8 [ 35.494351] mempool_alloc_preallocated+0x58/0xc0 [ 35.494454] mempool_oob_right_helper+0x98/0x2f0 [ 35.494551] mempool_slab_oob_right+0xc0/0x118 [ 35.494659] kunit_try_run_case+0x170/0x3f0 [ 35.494812] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.494991] kthread+0x328/0x630 [ 35.495502] ret_from_fork+0x10/0x20 [ 35.495620] [ 35.495676] The buggy address belongs to the object at fff00000c76d9240 [ 35.495676] which belongs to the cache test_cache of size 123 [ 35.495820] The buggy address is located 0 bytes to the right of [ 35.495820] allocated 123-byte region [fff00000c76d9240, fff00000c76d92bb) [ 35.496457] [ 35.496586] The buggy address belongs to the physical page: [ 35.496737] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076d9 [ 35.497217] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.497395] page_type: f5(slab) [ 35.497496] raw: 0bfffe0000000000 fff00000c598fa00 dead000000000122 0000000000000000 [ 35.497609] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 35.497701] page dumped because: kasan: bad access detected [ 35.497786] [ 35.497834] Memory state around the buggy address: [ 35.497909] fff00000c76d9180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.498260] fff00000c76d9200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 35.498885] >fff00000c76d9280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 35.499223] ^ [ 35.499431] fff00000c76d9300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.499695] fff00000c76d9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.501080] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
[ 33.272816] ================================================================== [ 33.272943] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 33.273072] Free of addr fff00000c56f1320 by task kunit_try_catch/204 [ 33.273170] [ 33.273231] CPU: 1 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 33.273422] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.273489] Hardware name: linux,dummy-virt (DT) [ 33.273561] Call trace: [ 33.273610] show_stack+0x20/0x38 (C) [ 33.273728] dump_stack_lvl+0x8c/0xd0 [ 33.273840] print_report+0x118/0x608 [ 33.273981] kasan_report_invalid_free+0xc0/0xe8 [ 33.275234] check_slab_allocation+0xd4/0x108 [ 33.275374] __kasan_slab_pre_free+0x2c/0x48 [ 33.275811] kfree+0xe8/0x3c8 [ 33.275943] kfree_sensitive+0x3c/0xb0 [ 33.276568] kmalloc_double_kzfree+0x168/0x308 [ 33.276876] kunit_try_run_case+0x170/0x3f0 [ 33.277117] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.277255] kthread+0x328/0x630 [ 33.277394] ret_from_fork+0x10/0x20 [ 33.277653] [ 33.277704] Allocated by task 204: [ 33.277819] kasan_save_stack+0x3c/0x68 [ 33.277918] kasan_save_track+0x20/0x40 [ 33.278010] kasan_save_alloc_info+0x40/0x58 [ 33.278129] __kasan_kmalloc+0xd4/0xd8 [ 33.278377] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.278479] kmalloc_double_kzfree+0xb8/0x308 [ 33.280357] kunit_try_run_case+0x170/0x3f0 [ 33.280494] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.280618] kthread+0x328/0x630 [ 33.280754] ret_from_fork+0x10/0x20 [ 33.280949] [ 33.280996] Freed by task 204: [ 33.281225] kasan_save_stack+0x3c/0x68 [ 33.281818] kasan_save_track+0x20/0x40 [ 33.281917] kasan_save_free_info+0x4c/0x78 [ 33.282475] __kasan_slab_free+0x6c/0x98 [ 33.282595] kfree+0x214/0x3c8 [ 33.282949] kfree_sensitive+0x80/0xb0 [ 33.283494] kmalloc_double_kzfree+0x11c/0x308 [ 33.283630] kunit_try_run_case+0x170/0x3f0 [ 33.283964] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.284558] kthread+0x328/0x630 [ 33.284653] ret_from_fork+0x10/0x20 [ 33.284946] [ 33.285009] The buggy address belongs to the object at fff00000c56f1320 [ 33.285009] which belongs to the cache kmalloc-16 of size 16 [ 33.285625] The buggy address is located 0 bytes inside of [ 33.285625] 16-byte region [fff00000c56f1320, fff00000c56f1330) [ 33.286571] [ 33.286873] The buggy address belongs to the physical page: [ 33.286950] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f1 [ 33.287093] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.287204] page_type: f5(slab) [ 33.287293] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 33.288878] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 33.289896] page dumped because: kasan: bad access detected [ 33.290626] [ 33.290894] Memory state around the buggy address: [ 33.291022] fff00000c56f1200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.291145] fff00000c56f1280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.291246] >fff00000c56f1300: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 33.292681] ^ [ 33.292815] fff00000c56f1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.293066] fff00000c56f1400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.293535] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 34.756512] ================================================================== [ 34.756671] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300 [ 34.756850] Read of size 1 at addr fff00000c598f640 by task kunit_try_catch/227 [ 34.756977] [ 34.757303] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 34.757744] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.757832] Hardware name: linux,dummy-virt (DT) [ 34.758114] Call trace: [ 34.758191] show_stack+0x20/0x38 (C) [ 34.758337] dump_stack_lvl+0x8c/0xd0 [ 34.758524] print_report+0x118/0x608 [ 34.758665] kasan_report+0xdc/0x128 [ 34.758807] __kasan_check_byte+0x54/0x70 [ 34.758970] kmem_cache_destroy+0x34/0x218 [ 34.759197] kmem_cache_double_destroy+0x174/0x300 [ 34.759406] kunit_try_run_case+0x170/0x3f0 [ 34.759536] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.759684] kthread+0x328/0x630 [ 34.759811] ret_from_fork+0x10/0x20 [ 34.759941] [ 34.760005] Allocated by task 227: [ 34.760102] kasan_save_stack+0x3c/0x68 [ 34.760207] kasan_save_track+0x20/0x40 [ 34.760322] kasan_save_alloc_info+0x40/0x58 [ 34.760425] __kasan_slab_alloc+0xa8/0xb0 [ 34.760523] kmem_cache_alloc_noprof+0x10c/0x398 [ 34.760651] __kmem_cache_create_args+0x178/0x280 [ 34.760774] kmem_cache_double_destroy+0xc0/0x300 [ 34.760881] kunit_try_run_case+0x170/0x3f0 [ 34.760977] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.761503] kthread+0x328/0x630 [ 34.761903] ret_from_fork+0x10/0x20 [ 34.762373] [ 34.762613] Freed by task 227: [ 34.762823] kasan_save_stack+0x3c/0x68 [ 34.763158] kasan_save_track+0x20/0x40 [ 34.763508] kasan_save_free_info+0x4c/0x78 [ 34.763872] __kasan_slab_free+0x6c/0x98 [ 34.764424] kmem_cache_free+0x260/0x468 [ 34.764695] slab_kmem_cache_release+0x38/0x50 [ 34.765088] kmem_cache_release+0x1c/0x30 [ 34.765272] kobject_put+0x17c/0x420 [ 34.765517] sysfs_slab_release+0x1c/0x30 [ 34.765726] kmem_cache_destroy+0x118/0x218 [ 34.765826] kmem_cache_double_destroy+0x128/0x300 [ 34.766221] kunit_try_run_case+0x170/0x3f0 [ 34.766530] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.766658] kthread+0x328/0x630 [ 34.766766] ret_from_fork+0x10/0x20 [ 34.766873] [ 34.767158] The buggy address belongs to the object at fff00000c598f640 [ 34.767158] which belongs to the cache kmem_cache of size 208 [ 34.767672] The buggy address is located 0 bytes inside of [ 34.767672] freed 208-byte region [fff00000c598f640, fff00000c598f710) [ 34.768117] [ 34.768301] The buggy address belongs to the physical page: [ 34.768542] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10598f [ 34.768760] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.769826] page_type: f5(slab) [ 34.769984] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000 [ 34.771189] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000 [ 34.771323] page dumped because: kasan: bad access detected [ 34.771400] [ 34.771445] Memory state around the buggy address: [ 34.772672] fff00000c598f500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.773272] fff00000c598f580: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 34.773871] >fff00000c598f600: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 34.773977] ^ [ 34.774880] fff00000c598f680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.775427] fff00000c598f700: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.775614] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 34.333723] ================================================================== [ 34.333867] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468 [ 34.334016] Read of size 1 at addr fff00000c76cf000 by task kunit_try_catch/225 [ 34.334161] [ 34.334250] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 34.334466] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.334548] Hardware name: linux,dummy-virt (DT) [ 34.334681] Call trace: [ 34.335307] show_stack+0x20/0x38 (C) [ 34.335467] dump_stack_lvl+0x8c/0xd0 [ 34.335655] print_report+0x118/0x608 [ 34.335973] kasan_report+0xdc/0x128 [ 34.336147] __asan_report_load1_noabort+0x20/0x30 [ 34.336468] kmem_cache_rcu_uaf+0x388/0x468 [ 34.336662] kunit_try_run_case+0x170/0x3f0 [ 34.336796] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.336953] kthread+0x328/0x630 [ 34.337141] ret_from_fork+0x10/0x20 [ 34.337647] [ 34.337704] Allocated by task 225: [ 34.337881] kasan_save_stack+0x3c/0x68 [ 34.338398] kasan_save_track+0x20/0x40 [ 34.338591] kasan_save_alloc_info+0x40/0x58 [ 34.338819] __kasan_slab_alloc+0xa8/0xb0 [ 34.338961] kmem_cache_alloc_noprof+0x10c/0x398 [ 34.339240] kmem_cache_rcu_uaf+0x12c/0x468 [ 34.339413] kunit_try_run_case+0x170/0x3f0 [ 34.339520] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.339648] kthread+0x328/0x630 [ 34.339787] ret_from_fork+0x10/0x20 [ 34.339892] [ 34.339941] Freed by task 32: [ 34.340012] kasan_save_stack+0x3c/0x68 [ 34.340425] kasan_save_track+0x20/0x40 [ 34.340536] kasan_save_free_info+0x4c/0x78 [ 34.340638] __kasan_slab_free+0x6c/0x98 [ 34.340796] slab_free_after_rcu_debug+0xd4/0x2f8 [ 34.340998] rcu_core+0x9f4/0x1e20 [ 34.341126] rcu_core_si+0x18/0x30 [ 34.341237] handle_softirqs+0x374/0xb28 [ 34.341628] __do_softirq+0x1c/0x28 [ 34.342074] [ 34.342123] Last potentially related work creation: [ 34.342201] kasan_save_stack+0x3c/0x68 [ 34.342446] kasan_record_aux_stack+0xb4/0xc8 [ 34.342612] kmem_cache_free+0x120/0x468 [ 34.342775] kmem_cache_rcu_uaf+0x16c/0x468 [ 34.343060] kunit_try_run_case+0x170/0x3f0 [ 34.343173] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.343357] kthread+0x328/0x630 [ 34.343452] ret_from_fork+0x10/0x20 [ 34.343556] [ 34.343607] The buggy address belongs to the object at fff00000c76cf000 [ 34.343607] which belongs to the cache test_cache of size 200 [ 34.343753] The buggy address is located 0 bytes inside of [ 34.343753] freed 200-byte region [fff00000c76cf000, fff00000c76cf0c8) [ 34.344448] [ 34.344507] The buggy address belongs to the physical page: [ 34.344590] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076cf [ 34.344723] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.345183] page_type: f5(slab) [ 34.345530] raw: 0bfffe0000000000 fff00000c598f500 dead000000000122 0000000000000000 [ 34.345696] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 34.345796] page dumped because: kasan: bad access detected [ 34.345875] [ 34.345916] Memory state around the buggy address: [ 34.346019] fff00000c76cef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.346445] fff00000c76cef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.346573] >fff00000c76cf000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.346854] ^ [ 34.347076] fff00000c76cf080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 34.347189] fff00000c76cf100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.347835] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 34.116563] ================================================================== [ 34.116700] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 34.116846] Free of addr fff00000c6469001 by task kunit_try_catch/223 [ 34.116947] [ 34.117435] CPU: 1 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 34.118175] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.118252] Hardware name: linux,dummy-virt (DT) [ 34.118343] Call trace: [ 34.118404] show_stack+0x20/0x38 (C) [ 34.119426] dump_stack_lvl+0x8c/0xd0 [ 34.119722] print_report+0x118/0x608 [ 34.119863] kasan_report_invalid_free+0xc0/0xe8 [ 34.120250] check_slab_allocation+0xfc/0x108 [ 34.120388] __kasan_slab_pre_free+0x2c/0x48 [ 34.120640] kmem_cache_free+0xf0/0x468 [ 34.120994] kmem_cache_invalid_free+0x184/0x3c8 [ 34.121173] kunit_try_run_case+0x170/0x3f0 [ 34.121508] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.121639] kthread+0x328/0x630 [ 34.121753] ret_from_fork+0x10/0x20 [ 34.121871] [ 34.121966] Allocated by task 223: [ 34.122063] kasan_save_stack+0x3c/0x68 [ 34.122183] kasan_save_track+0x20/0x40 [ 34.122367] kasan_save_alloc_info+0x40/0x58 [ 34.122544] __kasan_slab_alloc+0xa8/0xb0 [ 34.122962] kmem_cache_alloc_noprof+0x10c/0x398 [ 34.123512] kmem_cache_invalid_free+0x12c/0x3c8 [ 34.123644] kunit_try_run_case+0x170/0x3f0 [ 34.123759] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.123881] kthread+0x328/0x630 [ 34.123977] ret_from_fork+0x10/0x20 [ 34.124095] [ 34.124143] The buggy address belongs to the object at fff00000c6469000 [ 34.124143] which belongs to the cache test_cache of size 200 [ 34.125010] The buggy address is located 1 bytes inside of [ 34.125010] 200-byte region [fff00000c6469000, fff00000c64690c8) [ 34.125267] [ 34.125420] The buggy address belongs to the physical page: [ 34.125519] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106469 [ 34.125782] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.125973] page_type: f5(slab) [ 34.126100] raw: 0bfffe0000000000 fff00000c56418c0 dead000000000122 0000000000000000 [ 34.126702] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 34.126984] page dumped because: kasan: bad access detected [ 34.127529] [ 34.127728] Memory state around the buggy address: [ 34.127852] fff00000c6468f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.128097] fff00000c6468f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.128487] >fff00000c6469000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.128587] ^ [ 34.128864] fff00000c6469080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 34.128997] fff00000c6469100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.129113] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 34.033515] ================================================================== [ 34.033670] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 34.033826] Free of addr fff00000c646a000 by task kunit_try_catch/221 [ 34.033930] [ 34.034112] CPU: 1 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 34.034431] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.034807] Hardware name: linux,dummy-virt (DT) [ 34.034897] Call trace: [ 34.035298] show_stack+0x20/0x38 (C) [ 34.035663] dump_stack_lvl+0x8c/0xd0 [ 34.035808] print_report+0x118/0x608 [ 34.035979] kasan_report_invalid_free+0xc0/0xe8 [ 34.036134] check_slab_allocation+0xd4/0x108 [ 34.036318] __kasan_slab_pre_free+0x2c/0x48 [ 34.036455] kmem_cache_free+0xf0/0x468 [ 34.036602] kmem_cache_double_free+0x190/0x3c8 [ 34.037137] kunit_try_run_case+0x170/0x3f0 [ 34.037292] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.037721] kthread+0x328/0x630 [ 34.037890] ret_from_fork+0x10/0x20 [ 34.038017] [ 34.038089] Allocated by task 221: [ 34.038184] kasan_save_stack+0x3c/0x68 [ 34.038346] kasan_save_track+0x20/0x40 [ 34.038489] kasan_save_alloc_info+0x40/0x58 [ 34.038854] __kasan_slab_alloc+0xa8/0xb0 [ 34.039195] kmem_cache_alloc_noprof+0x10c/0x398 [ 34.039461] kmem_cache_double_free+0x12c/0x3c8 [ 34.039570] kunit_try_run_case+0x170/0x3f0 [ 34.039682] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.039802] kthread+0x328/0x630 [ 34.040253] ret_from_fork+0x10/0x20 [ 34.040516] [ 34.040630] Freed by task 221: [ 34.040812] kasan_save_stack+0x3c/0x68 [ 34.040925] kasan_save_track+0x20/0x40 [ 34.041052] kasan_save_free_info+0x4c/0x78 [ 34.041206] __kasan_slab_free+0x6c/0x98 [ 34.041604] kmem_cache_free+0x260/0x468 [ 34.041719] kmem_cache_double_free+0x140/0x3c8 [ 34.041915] kunit_try_run_case+0x170/0x3f0 [ 34.042287] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.042632] kthread+0x328/0x630 [ 34.042811] ret_from_fork+0x10/0x20 [ 34.043041] [ 34.043207] The buggy address belongs to the object at fff00000c646a000 [ 34.043207] which belongs to the cache test_cache of size 200 [ 34.043384] The buggy address is located 0 bytes inside of [ 34.043384] 200-byte region [fff00000c646a000, fff00000c646a0c8) [ 34.043530] [ 34.043589] The buggy address belongs to the physical page: [ 34.043669] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10646a [ 34.043825] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.044020] page_type: f5(slab) [ 34.044269] raw: 0bfffe0000000000 fff00000c5641780 dead000000000122 0000000000000000 [ 34.044769] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 34.044900] page dumped because: kasan: bad access detected [ 34.044994] [ 34.045157] Memory state around the buggy address: [ 34.045268] fff00000c6469f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.045370] fff00000c6469f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.045481] >fff00000c646a000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.045646] ^ [ 34.045746] fff00000c646a080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 34.045979] fff00000c646a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.046093] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 33.721804] ================================================================== [ 33.722070] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430 [ 33.722211] Read of size 1 at addr fff00000c64500c8 by task kunit_try_catch/219 [ 33.722333] [ 33.722418] CPU: 1 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 33.722631] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.722697] Hardware name: linux,dummy-virt (DT) [ 33.722783] Call trace: [ 33.722838] show_stack+0x20/0x38 (C) [ 33.722961] dump_stack_lvl+0x8c/0xd0 [ 33.723096] print_report+0x118/0x608 [ 33.723217] kasan_report+0xdc/0x128 [ 33.723335] __asan_report_load1_noabort+0x20/0x30 [ 33.723457] kmem_cache_oob+0x344/0x430 [ 33.723569] kunit_try_run_case+0x170/0x3f0 [ 33.723756] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.723883] kthread+0x328/0x630 [ 33.723988] ret_from_fork+0x10/0x20 [ 33.730832] [ 33.731351] Allocated by task 219: [ 33.731445] kasan_save_stack+0x3c/0x68 [ 33.731565] kasan_save_track+0x20/0x40 [ 33.731666] kasan_save_alloc_info+0x40/0x58 [ 33.731825] __kasan_slab_alloc+0xa8/0xb0 [ 33.731963] kmem_cache_alloc_noprof+0x10c/0x398 [ 33.732091] kmem_cache_oob+0x12c/0x430 [ 33.732180] kunit_try_run_case+0x170/0x3f0 [ 33.732275] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.732721] kthread+0x328/0x630 [ 33.732827] ret_from_fork+0x10/0x20 [ 33.732941] [ 33.733053] The buggy address belongs to the object at fff00000c6450000 [ 33.733053] which belongs to the cache test_cache of size 200 [ 33.733249] The buggy address is located 0 bytes to the right of [ 33.733249] allocated 200-byte region [fff00000c6450000, fff00000c64500c8) [ 33.733657] [ 33.733789] The buggy address belongs to the physical page: [ 33.733864] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106450 [ 33.733990] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.734129] page_type: f5(slab) [ 33.734315] raw: 0bfffe0000000000 fff00000c5641640 dead000000000122 0000000000000000 [ 33.734509] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 33.734898] page dumped because: kasan: bad access detected [ 33.735044] [ 33.736294] Memory state around the buggy address: [ 33.736383] fff00000c644ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.736486] fff00000c6450000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.736588] >fff00000c6450080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 33.737159] ^ [ 33.737456] fff00000c6450100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.737773] fff00000c6450180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.738425] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 33.652346] ================================================================== [ 33.652965] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 33.653412] Read of size 8 at addr fff00000c57bf600 by task kunit_try_catch/212 [ 33.653968] [ 33.654077] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 33.654589] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.655072] Hardware name: linux,dummy-virt (DT) [ 33.655165] Call trace: [ 33.655793] show_stack+0x20/0x38 (C) [ 33.655972] dump_stack_lvl+0x8c/0xd0 [ 33.656159] print_report+0x118/0x608 [ 33.656487] kasan_report+0xdc/0x128 [ 33.656969] __asan_report_load8_noabort+0x20/0x30 [ 33.657351] workqueue_uaf+0x480/0x4a8 [ 33.657653] kunit_try_run_case+0x170/0x3f0 [ 33.657901] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.658207] kthread+0x328/0x630 [ 33.658676] ret_from_fork+0x10/0x20 [ 33.659214] [ 33.659272] Allocated by task 212: [ 33.659359] kasan_save_stack+0x3c/0x68 [ 33.659467] kasan_save_track+0x20/0x40 [ 33.659569] kasan_save_alloc_info+0x40/0x58 [ 33.659675] __kasan_kmalloc+0xd4/0xd8 [ 33.660321] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.661001] workqueue_uaf+0x13c/0x4a8 [ 33.661143] kunit_try_run_case+0x170/0x3f0 [ 33.661879] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.662525] kthread+0x328/0x630 [ 33.662627] ret_from_fork+0x10/0x20 [ 33.662730] [ 33.662795] Freed by task 24: [ 33.663519] kasan_save_stack+0x3c/0x68 [ 33.663678] kasan_save_track+0x20/0x40 [ 33.664231] kasan_save_free_info+0x4c/0x78 [ 33.664625] __kasan_slab_free+0x6c/0x98 [ 33.664739] kfree+0x214/0x3c8 [ 33.665073] workqueue_uaf_work+0x18/0x30 [ 33.665190] process_one_work+0x530/0xf98 [ 33.665490] worker_thread+0x618/0xf38 [ 33.665910] kthread+0x328/0x630 [ 33.666001] ret_from_fork+0x10/0x20 [ 33.666116] [ 33.666270] Last potentially related work creation: [ 33.666475] kasan_save_stack+0x3c/0x68 [ 33.666808] kasan_record_aux_stack+0xb4/0xc8 [ 33.667374] __queue_work+0x65c/0xfe0 [ 33.667554] queue_work_on+0xbc/0xf8 [ 33.667812] workqueue_uaf+0x210/0x4a8 [ 33.667935] kunit_try_run_case+0x170/0x3f0 [ 33.668051] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.668199] kthread+0x328/0x630 [ 33.668288] ret_from_fork+0x10/0x20 [ 33.668423] [ 33.668492] The buggy address belongs to the object at fff00000c57bf600 [ 33.668492] which belongs to the cache kmalloc-32 of size 32 [ 33.668626] The buggy address is located 0 bytes inside of [ 33.668626] freed 32-byte region [fff00000c57bf600, fff00000c57bf620) [ 33.668778] [ 33.668827] The buggy address belongs to the physical page: [ 33.668908] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057bf [ 33.669049] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.669179] page_type: f5(slab) [ 33.669545] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 33.669730] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 33.669895] page dumped because: kasan: bad access detected [ 33.670004] [ 33.670070] Memory state around the buggy address: [ 33.670207] fff00000c57bf500: 00 00 03 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 33.670324] fff00000c57bf580: 00 00 00 fc fc fc fc fc 00 00 00 07 fc fc fc fc [ 33.670477] >fff00000c57bf600: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 33.670584] ^ [ 33.670907] fff00000c57bf680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.671043] fff00000c57bf700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.671141] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[ 33.593901] ================================================================== [ 33.595404] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 33.595654] Read of size 4 at addr fff00000c57bf400 by task swapper/1/0 [ 33.596826] [ 33.596957] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 33.597177] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.597240] Hardware name: linux,dummy-virt (DT) [ 33.599406] Call trace: [ 33.599721] show_stack+0x20/0x38 (C) [ 33.599968] dump_stack_lvl+0x8c/0xd0 [ 33.601254] print_report+0x118/0x608 [ 33.601386] kasan_report+0xdc/0x128 [ 33.601500] __asan_report_load4_noabort+0x20/0x30 [ 33.601617] rcu_uaf_reclaim+0x64/0x70 [ 33.601733] rcu_core+0x9f4/0x1e20 [ 33.601844] rcu_core_si+0x18/0x30 [ 33.601951] handle_softirqs+0x374/0xb28 [ 33.605128] __do_softirq+0x1c/0x28 [ 33.605264] ____do_softirq+0x18/0x30 [ 33.605392] call_on_irq_stack+0x24/0x30 [ 33.605522] do_softirq_own_stack+0x24/0x38 [ 33.605658] __irq_exit_rcu+0x1fc/0x318 [ 33.605784] irq_exit_rcu+0x1c/0x80 [ 33.605911] el1_interrupt+0x38/0x58 [ 33.605977] el1h_64_irq_handler+0x18/0x28 [ 33.606067] el1h_64_irq+0x6c/0x70 [ 33.606191] tick_nohz_idle_enter+0x12c/0x1a8 (P) [ 33.606263] do_idle+0xac/0x4e8 [ 33.606319] cpu_startup_entry+0x64/0x80 [ 33.606373] secondary_start_kernel+0x288/0x340 [ 33.606429] __secondary_switched+0xc0/0xc8 [ 33.606496] [ 33.606519] Allocated by task 210: [ 33.606585] kasan_save_stack+0x3c/0x68 [ 33.606762] kasan_save_track+0x20/0x40 [ 33.606903] kasan_save_alloc_info+0x40/0x58 [ 33.607000] __kasan_kmalloc+0xd4/0xd8 [ 33.607139] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.607247] rcu_uaf+0xb0/0x2d8 [ 33.607330] kunit_try_run_case+0x170/0x3f0 [ 33.607429] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.607545] kthread+0x328/0x630 [ 33.607650] ret_from_fork+0x10/0x20 [ 33.607747] [ 33.607792] Freed by task 0: [ 33.607878] kasan_save_stack+0x3c/0x68 [ 33.608007] kasan_save_track+0x20/0x40 [ 33.608129] kasan_save_free_info+0x4c/0x78 [ 33.608224] __kasan_slab_free+0x6c/0x98 [ 33.608317] kfree+0x214/0x3c8 [ 33.608424] rcu_uaf_reclaim+0x28/0x70 [ 33.608513] rcu_core+0x9f4/0x1e20 [ 33.608603] rcu_core_si+0x18/0x30 [ 33.608688] handle_softirqs+0x374/0xb28 [ 33.608779] __do_softirq+0x1c/0x28 [ 33.608882] [ 33.608979] Last potentially related work creation: [ 33.609078] kasan_save_stack+0x3c/0x68 [ 33.609198] kasan_record_aux_stack+0xb4/0xc8 [ 33.609316] __call_rcu_common.constprop.0+0x74/0x8c8 [ 33.609478] call_rcu+0x18/0x30 [ 33.609579] rcu_uaf+0x14c/0x2d8 [ 33.609684] kunit_try_run_case+0x170/0x3f0 [ 33.609841] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.610059] kthread+0x328/0x630 [ 33.610289] ret_from_fork+0x10/0x20 [ 33.610536] [ 33.610895] The buggy address belongs to the object at fff00000c57bf400 [ 33.610895] which belongs to the cache kmalloc-32 of size 32 [ 33.611070] The buggy address is located 0 bytes inside of [ 33.611070] freed 32-byte region [fff00000c57bf400, fff00000c57bf420) [ 33.611330] [ 33.611402] The buggy address belongs to the physical page: [ 33.611586] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1057bf [ 33.611759] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.612143] page_type: f5(slab) [ 33.612278] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 33.612399] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 33.612526] page dumped because: kasan: bad access detected [ 33.612613] [ 33.612691] Memory state around the buggy address: [ 33.612910] fff00000c57bf300: 00 00 00 fc fc fc fc fc 00 00 05 fc fc fc fc fc [ 33.613175] fff00000c57bf380: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 33.613422] >fff00000c57bf400: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 33.613537] ^ [ 33.613696] fff00000c57bf480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.613935] fff00000c57bf500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.614420] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 33.372348] ================================================================== [ 33.372470] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 33.372595] Read of size 1 at addr fff00000c63f7500 by task kunit_try_catch/208 [ 33.372704] [ 33.372774] CPU: 1 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 33.372968] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.373065] Hardware name: linux,dummy-virt (DT) [ 33.373152] Call trace: [ 33.373218] show_stack+0x20/0x38 (C) [ 33.373359] dump_stack_lvl+0x8c/0xd0 [ 33.373717] print_report+0x118/0x608 [ 33.373857] kasan_report+0xdc/0x128 [ 33.373993] __kasan_check_byte+0x54/0x70 [ 33.374342] ksize+0x30/0x88 [ 33.374463] ksize_uaf+0x168/0x5f8 [ 33.374689] kunit_try_run_case+0x170/0x3f0 [ 33.374826] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.375014] kthread+0x328/0x630 [ 33.375281] ret_from_fork+0x10/0x20 [ 33.375417] [ 33.375464] Allocated by task 208: [ 33.375541] kasan_save_stack+0x3c/0x68 [ 33.375700] kasan_save_track+0x20/0x40 [ 33.375843] kasan_save_alloc_info+0x40/0x58 [ 33.375963] __kasan_kmalloc+0xd4/0xd8 [ 33.376220] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.376332] ksize_uaf+0xb8/0x5f8 [ 33.376427] kunit_try_run_case+0x170/0x3f0 [ 33.376543] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.376936] kthread+0x328/0x630 [ 33.377439] ret_from_fork+0x10/0x20 [ 33.377535] [ 33.378176] Freed by task 208: [ 33.378267] kasan_save_stack+0x3c/0x68 [ 33.378366] kasan_save_track+0x20/0x40 [ 33.378459] kasan_save_free_info+0x4c/0x78 [ 33.379284] __kasan_slab_free+0x6c/0x98 [ 33.379425] kfree+0x214/0x3c8 [ 33.379521] ksize_uaf+0x11c/0x5f8 [ 33.379746] kunit_try_run_case+0x170/0x3f0 [ 33.379841] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.380360] kthread+0x328/0x630 [ 33.380452] ret_from_fork+0x10/0x20 [ 33.380901] [ 33.381070] The buggy address belongs to the object at fff00000c63f7500 [ 33.381070] which belongs to the cache kmalloc-128 of size 128 [ 33.381939] The buggy address is located 0 bytes inside of [ 33.381939] freed 128-byte region [fff00000c63f7500, fff00000c63f7580) [ 33.382645] [ 33.382697] The buggy address belongs to the physical page: [ 33.382767] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f7 [ 33.382839] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.382900] page_type: f5(slab) [ 33.382946] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.383007] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.383257] page dumped because: kasan: bad access detected [ 33.383534] [ 33.383685] Memory state around the buggy address: [ 33.383834] fff00000c63f7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.383946] fff00000c63f7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.384327] >fff00000c63f7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.384745] ^ [ 33.384964] fff00000c63f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.385084] fff00000c63f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.385897] ================================================================== [ 33.401168] ================================================================== [ 33.401276] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 33.401397] Read of size 1 at addr fff00000c63f7578 by task kunit_try_catch/208 [ 33.401509] [ 33.401580] CPU: 1 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 33.401776] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.401842] Hardware name: linux,dummy-virt (DT) [ 33.401910] Call trace: [ 33.401961] show_stack+0x20/0x38 (C) [ 33.403370] dump_stack_lvl+0x8c/0xd0 [ 33.403659] print_report+0x118/0x608 [ 33.403786] kasan_report+0xdc/0x128 [ 33.403908] __asan_report_load1_noabort+0x20/0x30 [ 33.404066] ksize_uaf+0x544/0x5f8 [ 33.404253] kunit_try_run_case+0x170/0x3f0 [ 33.404419] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.404641] kthread+0x328/0x630 [ 33.404831] ret_from_fork+0x10/0x20 [ 33.405073] [ 33.405235] Allocated by task 208: [ 33.405311] kasan_save_stack+0x3c/0x68 [ 33.405421] kasan_save_track+0x20/0x40 [ 33.405514] kasan_save_alloc_info+0x40/0x58 [ 33.405605] __kasan_kmalloc+0xd4/0xd8 [ 33.405690] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.405783] ksize_uaf+0xb8/0x5f8 [ 33.405864] kunit_try_run_case+0x170/0x3f0 [ 33.406017] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.406245] kthread+0x328/0x630 [ 33.406337] ret_from_fork+0x10/0x20 [ 33.406506] [ 33.406609] Freed by task 208: [ 33.406723] kasan_save_stack+0x3c/0x68 [ 33.406845] kasan_save_track+0x20/0x40 [ 33.406945] kasan_save_free_info+0x4c/0x78 [ 33.407121] __kasan_slab_free+0x6c/0x98 [ 33.407318] kfree+0x214/0x3c8 [ 33.407419] ksize_uaf+0x11c/0x5f8 [ 33.407586] kunit_try_run_case+0x170/0x3f0 [ 33.407887] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.408049] kthread+0x328/0x630 [ 33.408284] ret_from_fork+0x10/0x20 [ 33.408381] [ 33.408428] The buggy address belongs to the object at fff00000c63f7500 [ 33.408428] which belongs to the cache kmalloc-128 of size 128 [ 33.408615] The buggy address is located 120 bytes inside of [ 33.408615] freed 128-byte region [fff00000c63f7500, fff00000c63f7580) [ 33.409044] [ 33.409103] The buggy address belongs to the physical page: [ 33.409188] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f7 [ 33.409571] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.410288] page_type: f5(slab) [ 33.411346] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.411746] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.412098] page dumped because: kasan: bad access detected [ 33.412283] [ 33.412332] Memory state around the buggy address: [ 33.412420] fff00000c63f7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.412535] fff00000c63f7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.413305] >fff00000c63f7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.414323] ^ [ 33.414691] fff00000c63f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.415282] fff00000c63f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.415622] ================================================================== [ 33.388375] ================================================================== [ 33.388495] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 33.388607] Read of size 1 at addr fff00000c63f7500 by task kunit_try_catch/208 [ 33.388718] [ 33.388789] CPU: 1 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 33.388980] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.389062] Hardware name: linux,dummy-virt (DT) [ 33.389148] Call trace: [ 33.389210] show_stack+0x20/0x38 (C) [ 33.389408] dump_stack_lvl+0x8c/0xd0 [ 33.389637] print_report+0x118/0x608 [ 33.389781] kasan_report+0xdc/0x128 [ 33.389911] __asan_report_load1_noabort+0x20/0x30 [ 33.390129] ksize_uaf+0x598/0x5f8 [ 33.390352] kunit_try_run_case+0x170/0x3f0 [ 33.390475] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.390862] kthread+0x328/0x630 [ 33.390981] ret_from_fork+0x10/0x20 [ 33.391167] [ 33.391227] Allocated by task 208: [ 33.391345] kasan_save_stack+0x3c/0x68 [ 33.391478] kasan_save_track+0x20/0x40 [ 33.391587] kasan_save_alloc_info+0x40/0x58 [ 33.391713] __kasan_kmalloc+0xd4/0xd8 [ 33.392047] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.392156] ksize_uaf+0xb8/0x5f8 [ 33.392245] kunit_try_run_case+0x170/0x3f0 [ 33.392367] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.392502] kthread+0x328/0x630 [ 33.392586] ret_from_fork+0x10/0x20 [ 33.392686] [ 33.392815] Freed by task 208: [ 33.393011] kasan_save_stack+0x3c/0x68 [ 33.393133] kasan_save_track+0x20/0x40 [ 33.393251] kasan_save_free_info+0x4c/0x78 [ 33.393386] __kasan_slab_free+0x6c/0x98 [ 33.393798] kfree+0x214/0x3c8 [ 33.393907] ksize_uaf+0x11c/0x5f8 [ 33.394104] kunit_try_run_case+0x170/0x3f0 [ 33.394341] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.394527] kthread+0x328/0x630 [ 33.394673] ret_from_fork+0x10/0x20 [ 33.394797] [ 33.394848] The buggy address belongs to the object at fff00000c63f7500 [ 33.394848] which belongs to the cache kmalloc-128 of size 128 [ 33.395073] The buggy address is located 0 bytes inside of [ 33.395073] freed 128-byte region [fff00000c63f7500, fff00000c63f7580) [ 33.395364] [ 33.395435] The buggy address belongs to the physical page: [ 33.395522] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f7 [ 33.395698] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.395818] page_type: f5(slab) [ 33.395907] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.396043] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.396143] page dumped because: kasan: bad access detected [ 33.396236] [ 33.396291] Memory state around the buggy address: [ 33.396378] fff00000c63f7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.396825] fff00000c63f7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.396964] >fff00000c63f7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.397477] ^ [ 33.397555] fff00000c63f7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.397659] fff00000c63f7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.397762] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[ 33.257662] ================================================================== [ 33.257781] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 33.257911] Read of size 1 at addr fff00000c56f1320 by task kunit_try_catch/204 [ 33.258044] [ 33.258121] CPU: 1 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 33.258317] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.258376] Hardware name: linux,dummy-virt (DT) [ 33.258448] Call trace: [ 33.258500] show_stack+0x20/0x38 (C) [ 33.258616] dump_stack_lvl+0x8c/0xd0 [ 33.258733] print_report+0x118/0x608 [ 33.258857] kasan_report+0xdc/0x128 [ 33.258971] __kasan_check_byte+0x54/0x70 [ 33.259153] kfree_sensitive+0x30/0xb0 [ 33.259327] kmalloc_double_kzfree+0x168/0x308 [ 33.259562] kunit_try_run_case+0x170/0x3f0 [ 33.259705] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.259845] kthread+0x328/0x630 [ 33.260140] ret_from_fork+0x10/0x20 [ 33.260271] [ 33.260316] Allocated by task 204: [ 33.260391] kasan_save_stack+0x3c/0x68 [ 33.260488] kasan_save_track+0x20/0x40 [ 33.260582] kasan_save_alloc_info+0x40/0x58 [ 33.260689] __kasan_kmalloc+0xd4/0xd8 [ 33.260886] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.260996] kmalloc_double_kzfree+0xb8/0x308 [ 33.261120] kunit_try_run_case+0x170/0x3f0 [ 33.261428] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.261749] kthread+0x328/0x630 [ 33.261847] ret_from_fork+0x10/0x20 [ 33.262185] [ 33.262233] Freed by task 204: [ 33.262982] kasan_save_stack+0x3c/0x68 [ 33.263210] kasan_save_track+0x20/0x40 [ 33.263358] kasan_save_free_info+0x4c/0x78 [ 33.263616] __kasan_slab_free+0x6c/0x98 [ 33.263714] kfree+0x214/0x3c8 [ 33.263853] kfree_sensitive+0x80/0xb0 [ 33.263959] kmalloc_double_kzfree+0x11c/0x308 [ 33.264296] kunit_try_run_case+0x170/0x3f0 [ 33.264674] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.265107] kthread+0x328/0x630 [ 33.265196] ret_from_fork+0x10/0x20 [ 33.265970] [ 33.266022] The buggy address belongs to the object at fff00000c56f1320 [ 33.266022] which belongs to the cache kmalloc-16 of size 16 [ 33.266263] The buggy address is located 0 bytes inside of [ 33.266263] freed 16-byte region [fff00000c56f1320, fff00000c56f1330) [ 33.266463] [ 33.266512] The buggy address belongs to the physical page: [ 33.266638] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f1 [ 33.266921] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.267143] page_type: f5(slab) [ 33.267324] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 33.267453] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 33.267559] page dumped because: kasan: bad access detected [ 33.267845] [ 33.267930] Memory state around the buggy address: [ 33.267979] fff00000c56f1200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.268062] fff00000c56f1280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.268213] >fff00000c56f1300: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 33.268491] ^ [ 33.268967] fff00000c56f1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.269644] fff00000c56f1400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.269961] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[ 33.198926] ================================================================== [ 33.199115] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 33.199288] Read of size 1 at addr fff00000c570b7a8 by task kunit_try_catch/200 [ 33.199512] [ 33.199578] CPU: 1 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 33.199770] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.199836] Hardware name: linux,dummy-virt (DT) [ 33.199908] Call trace: [ 33.199959] show_stack+0x20/0x38 (C) [ 33.200107] dump_stack_lvl+0x8c/0xd0 [ 33.200249] print_report+0x118/0x608 [ 33.200807] kasan_report+0xdc/0x128 [ 33.200941] __asan_report_load1_noabort+0x20/0x30 [ 33.201414] kmalloc_uaf2+0x3f4/0x468 [ 33.201543] kunit_try_run_case+0x170/0x3f0 [ 33.201662] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.202020] kthread+0x328/0x630 [ 33.202176] ret_from_fork+0x10/0x20 [ 33.202349] [ 33.202394] Allocated by task 200: [ 33.202533] kasan_save_stack+0x3c/0x68 [ 33.202802] kasan_save_track+0x20/0x40 [ 33.203258] kasan_save_alloc_info+0x40/0x58 [ 33.203363] __kasan_kmalloc+0xd4/0xd8 [ 33.203745] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.203884] kmalloc_uaf2+0xc4/0x468 [ 33.204348] kunit_try_run_case+0x170/0x3f0 [ 33.204440] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.204544] kthread+0x328/0x630 [ 33.205903] ret_from_fork+0x10/0x20 [ 33.206072] [ 33.206119] Freed by task 200: [ 33.206227] kasan_save_stack+0x3c/0x68 [ 33.206341] kasan_save_track+0x20/0x40 [ 33.206568] kasan_save_free_info+0x4c/0x78 [ 33.206663] __kasan_slab_free+0x6c/0x98 [ 33.206785] kfree+0x214/0x3c8 [ 33.207454] kmalloc_uaf2+0x134/0x468 [ 33.207633] kunit_try_run_case+0x170/0x3f0 [ 33.207731] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.207851] kthread+0x328/0x630 [ 33.207937] ret_from_fork+0x10/0x20 [ 33.208049] [ 33.209713] The buggy address belongs to the object at fff00000c570b780 [ 33.209713] which belongs to the cache kmalloc-64 of size 64 [ 33.209921] The buggy address is located 40 bytes inside of [ 33.209921] freed 64-byte region [fff00000c570b780, fff00000c570b7c0) [ 33.210944] [ 33.211024] The buggy address belongs to the physical page: [ 33.211282] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10570b [ 33.212171] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.212309] page_type: f5(slab) [ 33.212487] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.212684] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.212814] page dumped because: kasan: bad access detected [ 33.212900] [ 33.212954] Memory state around the buggy address: [ 33.213050] fff00000c570b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.213212] fff00000c570b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.213659] >fff00000c570b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.214107] ^ [ 33.214196] fff00000c570b800: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 33.214662] fff00000c570b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.215401] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 33.173832] ================================================================== [ 33.173902] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 33.173968] Write of size 33 at addr fff00000c570b600 by task kunit_try_catch/198 [ 33.174056] [ 33.174125] CPU: 1 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 33.174339] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.174404] Hardware name: linux,dummy-virt (DT) [ 33.174475] Call trace: [ 33.174530] show_stack+0x20/0x38 (C) [ 33.174762] dump_stack_lvl+0x8c/0xd0 [ 33.175154] print_report+0x118/0x608 [ 33.175286] kasan_report+0xdc/0x128 [ 33.175411] kasan_check_range+0x100/0x1a8 [ 33.175697] __asan_memset+0x34/0x78 [ 33.175851] kmalloc_uaf_memset+0x170/0x310 [ 33.176105] kunit_try_run_case+0x170/0x3f0 [ 33.176265] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.176398] kthread+0x328/0x630 [ 33.176502] ret_from_fork+0x10/0x20 [ 33.176616] [ 33.176662] Allocated by task 198: [ 33.176738] kasan_save_stack+0x3c/0x68 [ 33.177010] kasan_save_track+0x20/0x40 [ 33.177134] kasan_save_alloc_info+0x40/0x58 [ 33.177624] __kasan_kmalloc+0xd4/0xd8 [ 33.178051] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.178248] kmalloc_uaf_memset+0xb8/0x310 [ 33.178347] kunit_try_run_case+0x170/0x3f0 [ 33.178446] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.178596] kthread+0x328/0x630 [ 33.178787] ret_from_fork+0x10/0x20 [ 33.178969] [ 33.179021] Freed by task 198: [ 33.179107] kasan_save_stack+0x3c/0x68 [ 33.179222] kasan_save_track+0x20/0x40 [ 33.179395] kasan_save_free_info+0x4c/0x78 [ 33.179500] __kasan_slab_free+0x6c/0x98 [ 33.179805] kfree+0x214/0x3c8 [ 33.179937] kmalloc_uaf_memset+0x11c/0x310 [ 33.180106] kunit_try_run_case+0x170/0x3f0 [ 33.180381] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.180567] kthread+0x328/0x630 [ 33.180689] ret_from_fork+0x10/0x20 [ 33.180802] [ 33.180916] The buggy address belongs to the object at fff00000c570b600 [ 33.180916] which belongs to the cache kmalloc-64 of size 64 [ 33.181130] The buggy address is located 0 bytes inside of [ 33.181130] freed 64-byte region [fff00000c570b600, fff00000c570b640) [ 33.181378] [ 33.181436] The buggy address belongs to the physical page: [ 33.181507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10570b [ 33.181651] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.181837] page_type: f5(slab) [ 33.181976] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.182118] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.182226] page dumped because: kasan: bad access detected [ 33.182309] [ 33.182351] Memory state around the buggy address: [ 33.182423] fff00000c570b500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.182522] fff00000c570b580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.183121] >fff00000c570b600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.183364] ^ [ 33.183440] fff00000c570b680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.183585] fff00000c570b700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.183720] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[ 33.139977] ================================================================== [ 33.140115] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 33.140234] Read of size 1 at addr fff00000c56f1308 by task kunit_try_catch/196 [ 33.140347] [ 33.140420] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 33.140613] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.140679] Hardware name: linux,dummy-virt (DT) [ 33.140763] Call trace: [ 33.140916] show_stack+0x20/0x38 (C) [ 33.141142] dump_stack_lvl+0x8c/0xd0 [ 33.141318] print_report+0x118/0x608 [ 33.141463] kasan_report+0xdc/0x128 [ 33.141691] __asan_report_load1_noabort+0x20/0x30 [ 33.141912] kmalloc_uaf+0x300/0x338 [ 33.142064] kunit_try_run_case+0x170/0x3f0 [ 33.142248] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.142392] kthread+0x328/0x630 [ 33.142623] ret_from_fork+0x10/0x20 [ 33.142849] [ 33.142960] Allocated by task 196: [ 33.143131] kasan_save_stack+0x3c/0x68 [ 33.143241] kasan_save_track+0x20/0x40 [ 33.143440] kasan_save_alloc_info+0x40/0x58 [ 33.143635] __kasan_kmalloc+0xd4/0xd8 [ 33.143808] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.143916] kmalloc_uaf+0xb8/0x338 [ 33.144010] kunit_try_run_case+0x170/0x3f0 [ 33.144665] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.145017] kthread+0x328/0x630 [ 33.145123] ret_from_fork+0x10/0x20 [ 33.145791] [ 33.146051] Freed by task 196: [ 33.146125] kasan_save_stack+0x3c/0x68 [ 33.146226] kasan_save_track+0x20/0x40 [ 33.146319] kasan_save_free_info+0x4c/0x78 [ 33.147565] __kasan_slab_free+0x6c/0x98 [ 33.147915] kfree+0x214/0x3c8 [ 33.148786] kmalloc_uaf+0x11c/0x338 [ 33.149910] kunit_try_run_case+0x170/0x3f0 [ 33.150052] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.150150] kthread+0x328/0x630 [ 33.150199] ret_from_fork+0x10/0x20 [ 33.150243] [ 33.150289] The buggy address belongs to the object at fff00000c56f1300 [ 33.150289] which belongs to the cache kmalloc-16 of size 16 [ 33.150386] The buggy address is located 8 bytes inside of [ 33.150386] freed 16-byte region [fff00000c56f1300, fff00000c56f1310) [ 33.150457] [ 33.150483] The buggy address belongs to the physical page: [ 33.150520] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f1 [ 33.150663] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.150787] page_type: f5(slab) [ 33.150874] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 33.151100] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 33.151203] page dumped because: kasan: bad access detected [ 33.151285] [ 33.151330] Memory state around the buggy address: [ 33.151408] fff00000c56f1200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.151509] fff00000c56f1280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.151608] >fff00000c56f1300: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.151734] ^ [ 33.151859] fff00000c56f1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.151981] fff00000c56f1400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.152121] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 32.174446] ================================================================== [ 32.174674] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 32.174865] Read of size 1 at addr fff00000c56f127f by task kunit_try_catch/150 [ 32.175015] [ 32.175127] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 32.175544] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.175965] Hardware name: linux,dummy-virt (DT) [ 32.176064] Call trace: [ 32.176594] show_stack+0x20/0x38 (C) [ 32.176950] dump_stack_lvl+0x8c/0xd0 [ 32.177535] print_report+0x118/0x608 [ 32.177659] kasan_report+0xdc/0x128 [ 32.178409] __asan_report_load1_noabort+0x20/0x30 [ 32.178916] kmalloc_oob_left+0x2ec/0x320 [ 32.179314] kunit_try_run_case+0x170/0x3f0 [ 32.179468] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.179999] kthread+0x328/0x630 [ 32.180240] ret_from_fork+0x10/0x20 [ 32.180383] [ 32.181004] Allocated by task 21: [ 32.181472] kasan_save_stack+0x3c/0x68 [ 32.181691] kasan_save_track+0x20/0x40 [ 32.182273] kasan_save_alloc_info+0x40/0x58 [ 32.182503] __kasan_kmalloc+0xd4/0xd8 [ 32.182778] __kmalloc_cache_node_noprof+0x178/0x3d0 [ 32.183415] build_sched_domains+0x32c/0x3768 [ 32.183529] partition_sched_domains+0x79c/0x1098 [ 32.183640] rebuild_sched_domains_locked+0x494/0xde0 [ 32.183754] cpuset_handle_hotplug+0xab0/0x1480 [ 32.184980] cpuset_update_active_cpus+0x18/0x30 [ 32.185098] sched_cpu_activate+0x2d0/0x388 [ 32.185642] cpuhp_invoke_callback+0x5b8/0x1620 [ 32.186330] cpuhp_thread_fun+0x230/0x5d8 [ 32.186485] smpboot_thread_fn+0x2e8/0x760 [ 32.186625] kthread+0x328/0x630 [ 32.186726] ret_from_fork+0x10/0x20 [ 32.187095] [ 32.187419] Freed by task 21: [ 32.187529] kasan_save_stack+0x3c/0x68 [ 32.187630] kasan_save_track+0x20/0x40 [ 32.187719] kasan_save_free_info+0x4c/0x78 [ 32.187805] __kasan_slab_free+0x6c/0x98 [ 32.187996] kfree+0x214/0x3c8 [ 32.188099] build_sched_domains+0x1c64/0x3768 [ 32.188194] partition_sched_domains+0x79c/0x1098 [ 32.188322] rebuild_sched_domains_locked+0x494/0xde0 [ 32.188458] cpuset_handle_hotplug+0xab0/0x1480 [ 32.188554] cpuset_update_active_cpus+0x18/0x30 [ 32.188643] sched_cpu_activate+0x2d0/0x388 [ 32.188732] cpuhp_invoke_callback+0x5b8/0x1620 [ 32.188835] cpuhp_thread_fun+0x230/0x5d8 [ 32.188922] smpboot_thread_fn+0x2e8/0x760 [ 32.189016] kthread+0x328/0x630 [ 32.189743] ret_from_fork+0x10/0x20 [ 32.190729] [ 32.190776] The buggy address belongs to the object at fff00000c56f1260 [ 32.190776] which belongs to the cache kmalloc-16 of size 16 [ 32.190870] The buggy address is located 15 bytes to the right of [ 32.190870] allocated 16-byte region [fff00000c56f1260, fff00000c56f1270) [ 32.191252] [ 32.191422] The buggy address belongs to the physical page: [ 32.191496] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f1 [ 32.191623] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.191740] page_type: f5(slab) [ 32.191830] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 32.191945] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 32.192057] page dumped because: kasan: bad access detected [ 32.192127] [ 32.192170] Memory state around the buggy address: [ 32.192243] fff00000c56f1100: 00 06 fc fc 00 06 fc fc 00 00 fc fc fa fb fc fc [ 32.192343] fff00000c56f1180: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 32.192489] >fff00000c56f1200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.192716] ^ [ 32.192815] fff00000c56f1280: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.192910] fff00000c56f1300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.193005] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 32.128492] ================================================================== [ 32.128625] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 32.128736] Write of size 1 at addr fff00000c56e8d78 by task kunit_try_catch/148 [ 32.128941] [ 32.129133] CPU: 1 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 32.129551] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.129614] Hardware name: linux,dummy-virt (DT) [ 32.129681] Call trace: [ 32.129730] show_stack+0x20/0x38 (C) [ 32.129842] dump_stack_lvl+0x8c/0xd0 [ 32.129959] print_report+0x118/0x608 [ 32.130091] kasan_report+0xdc/0x128 [ 32.130203] __asan_report_store1_noabort+0x20/0x30 [ 32.130331] kmalloc_oob_right+0x538/0x660 [ 32.130640] kunit_try_run_case+0x170/0x3f0 [ 32.130792] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.130945] kthread+0x328/0x630 [ 32.131090] ret_from_fork+0x10/0x20 [ 32.131276] [ 32.131329] Allocated by task 148: [ 32.131405] kasan_save_stack+0x3c/0x68 [ 32.131512] kasan_save_track+0x20/0x40 [ 32.131727] kasan_save_alloc_info+0x40/0x58 [ 32.131959] __kasan_kmalloc+0xd4/0xd8 [ 32.132075] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.132175] kmalloc_oob_right+0xb0/0x660 [ 32.133140] kunit_try_run_case+0x170/0x3f0 [ 32.133258] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.133428] kthread+0x328/0x630 [ 32.133519] ret_from_fork+0x10/0x20 [ 32.133927] [ 32.133974] The buggy address belongs to the object at fff00000c56e8d00 [ 32.133974] which belongs to the cache kmalloc-128 of size 128 [ 32.134457] The buggy address is located 5 bytes to the right of [ 32.134457] allocated 115-byte region [fff00000c56e8d00, fff00000c56e8d73) [ 32.134810] [ 32.134861] The buggy address belongs to the physical page: [ 32.135269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e8 [ 32.135416] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.135815] page_type: f5(slab) [ 32.135912] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 32.136046] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.136451] page dumped because: kasan: bad access detected [ 32.136678] [ 32.137112] Memory state around the buggy address: [ 32.137200] fff00000c56e8c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.137331] fff00000c56e8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.137845] >fff00000c56e8d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.137936] ^ [ 32.138050] fff00000c56e8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.138150] fff00000c56e8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.138235] ================================================================== [ 32.141746] ================================================================== [ 32.142189] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 32.142530] Read of size 1 at addr fff00000c56e8d80 by task kunit_try_catch/148 [ 32.142834] [ 32.142922] CPU: 1 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 32.143850] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.144262] Hardware name: linux,dummy-virt (DT) [ 32.144361] Call trace: [ 32.144417] show_stack+0x20/0x38 (C) [ 32.144812] dump_stack_lvl+0x8c/0xd0 [ 32.144928] print_report+0x118/0x608 [ 32.145066] kasan_report+0xdc/0x128 [ 32.145200] __asan_report_load1_noabort+0x20/0x30 [ 32.145323] kmalloc_oob_right+0x5d0/0x660 [ 32.145939] kunit_try_run_case+0x170/0x3f0 [ 32.146170] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.146711] kthread+0x328/0x630 [ 32.147093] ret_from_fork+0x10/0x20 [ 32.147229] [ 32.147274] Allocated by task 148: [ 32.147576] kasan_save_stack+0x3c/0x68 [ 32.147706] kasan_save_track+0x20/0x40 [ 32.147806] kasan_save_alloc_info+0x40/0x58 [ 32.148528] __kasan_kmalloc+0xd4/0xd8 [ 32.148839] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.148969] kmalloc_oob_right+0xb0/0x660 [ 32.149409] kunit_try_run_case+0x170/0x3f0 [ 32.149507] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.150053] kthread+0x328/0x630 [ 32.150174] ret_from_fork+0x10/0x20 [ 32.150499] [ 32.150545] The buggy address belongs to the object at fff00000c56e8d00 [ 32.150545] which belongs to the cache kmalloc-128 of size 128 [ 32.151449] The buggy address is located 13 bytes to the right of [ 32.151449] allocated 115-byte region [fff00000c56e8d00, fff00000c56e8d73) [ 32.151645] [ 32.151947] The buggy address belongs to the physical page: [ 32.152163] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e8 [ 32.152313] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.152679] page_type: f5(slab) [ 32.152864] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 32.153045] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.153298] page dumped because: kasan: bad access detected [ 32.153561] [ 32.153801] Memory state around the buggy address: [ 32.154019] fff00000c56e8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.154298] fff00000c56e8d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.154396] >fff00000c56e8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.154480] ^ [ 32.154549] fff00000c56e8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.154661] fff00000c56e8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.154768] ================================================================== [ 32.116990] ================================================================== [ 32.117378] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 32.118346] Write of size 1 at addr fff00000c56e8d73 by task kunit_try_catch/148 [ 32.118478] [ 32.119665] CPU: 1 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 32.119843] Tainted: [N]=TEST [ 32.119888] Hardware name: linux,dummy-virt (DT) [ 32.120191] Call trace: [ 32.120401] show_stack+0x20/0x38 (C) [ 32.120569] dump_stack_lvl+0x8c/0xd0 [ 32.120640] print_report+0x118/0x608 [ 32.120700] kasan_report+0xdc/0x128 [ 32.120754] __asan_report_store1_noabort+0x20/0x30 [ 32.120811] kmalloc_oob_right+0x5a4/0x660 [ 32.120866] kunit_try_run_case+0x170/0x3f0 [ 32.120926] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.120990] kthread+0x328/0x630 [ 32.121061] ret_from_fork+0x10/0x20 [ 32.121247] [ 32.121296] Allocated by task 148: [ 32.121438] kasan_save_stack+0x3c/0x68 [ 32.121525] kasan_save_track+0x20/0x40 [ 32.121576] kasan_save_alloc_info+0x40/0x58 [ 32.121622] __kasan_kmalloc+0xd4/0xd8 [ 32.121666] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.121715] kmalloc_oob_right+0xb0/0x660 [ 32.121759] kunit_try_run_case+0x170/0x3f0 [ 32.121803] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.121854] kthread+0x328/0x630 [ 32.121894] ret_from_fork+0x10/0x20 [ 32.121961] [ 32.122052] The buggy address belongs to the object at fff00000c56e8d00 [ 32.122052] which belongs to the cache kmalloc-128 of size 128 [ 32.122168] The buggy address is located 0 bytes to the right of [ 32.122168] allocated 115-byte region [fff00000c56e8d00, fff00000c56e8d73) [ 32.122252] [ 32.122345] The buggy address belongs to the physical page: [ 32.122554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e8 [ 32.122880] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.123245] page_type: f5(slab) [ 32.123577] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 32.123652] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.123789] page dumped because: kasan: bad access detected [ 32.123843] [ 32.123877] Memory state around the buggy address: [ 32.124151] fff00000c56e8c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.124242] fff00000c56e8c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.124312] >fff00000c56e8d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.124379] ^ [ 32.124486] fff00000c56e8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.124539] fff00000c56e8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.124614] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 33.105684] ================================================================== [ 33.105824] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0 [ 33.106045] Read of size 64 at addr fff00000c570b304 by task kunit_try_catch/194 [ 33.106215] [ 33.106357] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 33.106624] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.106703] Hardware name: linux,dummy-virt (DT) [ 33.106829] Call trace: [ 33.107086] show_stack+0x20/0x38 (C) [ 33.107653] dump_stack_lvl+0x8c/0xd0 [ 33.108474] print_report+0x118/0x608 [ 33.108725] kasan_report+0xdc/0x128 [ 33.108908] kasan_check_range+0x100/0x1a8 [ 33.109043] __asan_memmove+0x3c/0x98 [ 33.110195] kmalloc_memmove_invalid_size+0x154/0x2e0 [ 33.110605] kunit_try_run_case+0x170/0x3f0 [ 33.110827] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.111013] kthread+0x328/0x630 [ 33.111232] ret_from_fork+0x10/0x20 [ 33.111389] [ 33.111443] Allocated by task 194: [ 33.111530] kasan_save_stack+0x3c/0x68 [ 33.111826] kasan_save_track+0x20/0x40 [ 33.111927] kasan_save_alloc_info+0x40/0x58 [ 33.112113] __kasan_kmalloc+0xd4/0xd8 [ 33.112328] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.112617] kmalloc_memmove_invalid_size+0xb0/0x2e0 [ 33.112856] kunit_try_run_case+0x170/0x3f0 [ 33.113670] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.114012] kthread+0x328/0x630 [ 33.114124] ret_from_fork+0x10/0x20 [ 33.114614] [ 33.114705] The buggy address belongs to the object at fff00000c570b300 [ 33.114705] which belongs to the cache kmalloc-64 of size 64 [ 33.115233] The buggy address is located 4 bytes inside of [ 33.115233] allocated 64-byte region [fff00000c570b300, fff00000c570b340) [ 33.115856] [ 33.115924] The buggy address belongs to the physical page: [ 33.116150] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10570b [ 33.116374] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.116548] page_type: f5(slab) [ 33.116786] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.116934] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.117045] page dumped because: kasan: bad access detected [ 33.117131] [ 33.117278] Memory state around the buggy address: [ 33.117356] fff00000c570b200: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc [ 33.117459] fff00000c570b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.117559] >fff00000c570b300: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 33.117646] ^ [ 33.117733] fff00000c570b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.117833] fff00000c570b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.117973] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 33.074168] ================================================================== [ 33.074416] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 33.074606] Read of size 18446744073709551614 at addr fff00000c570b104 by task kunit_try_catch/192 [ 33.074823] [ 33.074900] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 33.075127] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.075163] Hardware name: linux,dummy-virt (DT) [ 33.075205] Call trace: [ 33.075232] show_stack+0x20/0x38 (C) [ 33.075298] dump_stack_lvl+0x8c/0xd0 [ 33.075357] print_report+0x118/0x608 [ 33.075413] kasan_report+0xdc/0x128 [ 33.075470] kasan_check_range+0x100/0x1a8 [ 33.075530] __asan_memmove+0x3c/0x98 [ 33.075587] kmalloc_memmove_negative_size+0x154/0x2e0 [ 33.075650] kunit_try_run_case+0x170/0x3f0 [ 33.075706] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.075769] kthread+0x328/0x630 [ 33.075824] ret_from_fork+0x10/0x20 [ 33.075881] [ 33.075905] Allocated by task 192: [ 33.075940] kasan_save_stack+0x3c/0x68 [ 33.075994] kasan_save_track+0x20/0x40 [ 33.076068] kasan_save_alloc_info+0x40/0x58 [ 33.076120] __kasan_kmalloc+0xd4/0xd8 [ 33.076165] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.076216] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 33.076266] kunit_try_run_case+0x170/0x3f0 [ 33.076312] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.076365] kthread+0x328/0x630 [ 33.076404] ret_from_fork+0x10/0x20 [ 33.076446] [ 33.076471] The buggy address belongs to the object at fff00000c570b100 [ 33.076471] which belongs to the cache kmalloc-64 of size 64 [ 33.076538] The buggy address is located 4 bytes inside of [ 33.076538] 64-byte region [fff00000c570b100, fff00000c570b140) [ 33.076605] [ 33.076631] The buggy address belongs to the physical page: [ 33.076667] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10570b [ 33.076729] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.076788] page_type: f5(slab) [ 33.076831] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.076890] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.076934] page dumped because: kasan: bad access detected [ 33.076971] [ 33.076992] Memory state around the buggy address: [ 33.077294] fff00000c570b000: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc [ 33.077421] fff00000c570b080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.077854] >fff00000c570b100: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 33.077974] ^ [ 33.078136] fff00000c570b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.078619] fff00000c570b200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.078975] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[ 33.046404] ================================================================== [ 33.046517] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 33.046673] Write of size 16 at addr fff00000c63f7369 by task kunit_try_catch/190 [ 33.047696] [ 33.047818] CPU: 1 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 33.048128] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.048194] Hardware name: linux,dummy-virt (DT) [ 33.048269] Call trace: [ 33.048386] show_stack+0x20/0x38 (C) [ 33.048506] dump_stack_lvl+0x8c/0xd0 [ 33.048618] print_report+0x118/0x608 [ 33.048728] kasan_report+0xdc/0x128 [ 33.048869] kasan_check_range+0x100/0x1a8 [ 33.048989] __asan_memset+0x34/0x78 [ 33.049113] kmalloc_oob_memset_16+0x150/0x2f8 [ 33.049228] kunit_try_run_case+0x170/0x3f0 [ 33.049347] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.049469] kthread+0x328/0x630 [ 33.049582] ret_from_fork+0x10/0x20 [ 33.049907] [ 33.050444] Allocated by task 190: [ 33.050521] kasan_save_stack+0x3c/0x68 [ 33.050814] kasan_save_track+0x20/0x40 [ 33.050931] kasan_save_alloc_info+0x40/0x58 [ 33.051631] __kasan_kmalloc+0xd4/0xd8 [ 33.052322] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.052431] kmalloc_oob_memset_16+0xb0/0x2f8 [ 33.052526] kunit_try_run_case+0x170/0x3f0 [ 33.052616] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.052716] kthread+0x328/0x630 [ 33.052849] ret_from_fork+0x10/0x20 [ 33.053378] [ 33.053514] The buggy address belongs to the object at fff00000c63f7300 [ 33.053514] which belongs to the cache kmalloc-128 of size 128 [ 33.053931] The buggy address is located 105 bytes inside of [ 33.053931] allocated 120-byte region [fff00000c63f7300, fff00000c63f7378) [ 33.054298] [ 33.054500] The buggy address belongs to the physical page: [ 33.054600] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f7 [ 33.054770] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.054939] page_type: f5(slab) [ 33.055148] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.055405] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.056112] page dumped because: kasan: bad access detected [ 33.057315] [ 33.057380] Memory state around the buggy address: [ 33.057456] fff00000c63f7200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.057728] fff00000c63f7280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.058260] >fff00000c63f7300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.058676] ^ [ 33.058818] fff00000c63f7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.058948] fff00000c63f7400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.059066] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[ 33.011208] ================================================================== [ 33.011323] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 33.011441] Write of size 8 at addr fff00000c63f7271 by task kunit_try_catch/188 [ 33.011549] [ 33.011617] CPU: 1 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 33.011809] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.011869] Hardware name: linux,dummy-virt (DT) [ 33.011937] Call trace: [ 33.011991] show_stack+0x20/0x38 (C) [ 33.012189] dump_stack_lvl+0x8c/0xd0 [ 33.012671] print_report+0x118/0x608 [ 33.012806] kasan_report+0xdc/0x128 [ 33.012937] kasan_check_range+0x100/0x1a8 [ 33.013084] __asan_memset+0x34/0x78 [ 33.014505] kmalloc_oob_memset_8+0x150/0x2f8 [ 33.015607] kunit_try_run_case+0x170/0x3f0 [ 33.016141] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.016377] kthread+0x328/0x630 [ 33.016539] ret_from_fork+0x10/0x20 [ 33.016939] [ 33.016991] Allocated by task 188: [ 33.017089] kasan_save_stack+0x3c/0x68 [ 33.017191] kasan_save_track+0x20/0x40 [ 33.017285] kasan_save_alloc_info+0x40/0x58 [ 33.017922] __kasan_kmalloc+0xd4/0xd8 [ 33.018016] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.018210] kmalloc_oob_memset_8+0xb0/0x2f8 [ 33.018809] kunit_try_run_case+0x170/0x3f0 [ 33.019017] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.019336] kthread+0x328/0x630 [ 33.019418] ret_from_fork+0x10/0x20 [ 33.019503] [ 33.019550] The buggy address belongs to the object at fff00000c63f7200 [ 33.019550] which belongs to the cache kmalloc-128 of size 128 [ 33.019678] The buggy address is located 113 bytes inside of [ 33.019678] allocated 120-byte region [fff00000c63f7200, fff00000c63f7278) [ 33.019821] [ 33.020302] The buggy address belongs to the physical page: [ 33.020490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f7 [ 33.021586] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.021992] page_type: f5(slab) [ 33.022241] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.022681] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.022842] page dumped because: kasan: bad access detected [ 33.023281] [ 33.023355] Memory state around the buggy address: [ 33.023451] fff00000c63f7100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.023630] fff00000c63f7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.024295] >fff00000c63f7200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.024438] ^ [ 33.024535] fff00000c63f7280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.024630] fff00000c63f7300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.024716] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[ 32.937155] ================================================================== [ 32.937272] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 32.937440] Write of size 2 at addr fff00000c63f7177 by task kunit_try_catch/184 [ 32.937643] [ 32.937975] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 32.938228] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.938297] Hardware name: linux,dummy-virt (DT) [ 32.938372] Call trace: [ 32.938532] show_stack+0x20/0x38 (C) [ 32.938660] dump_stack_lvl+0x8c/0xd0 [ 32.938864] print_report+0x118/0x608 [ 32.938975] kasan_report+0xdc/0x128 [ 32.939100] kasan_check_range+0x100/0x1a8 [ 32.939213] __asan_memset+0x34/0x78 [ 32.939313] kmalloc_oob_memset_2+0x150/0x2f8 [ 32.939421] kunit_try_run_case+0x170/0x3f0 [ 32.939534] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.939654] kthread+0x328/0x630 [ 32.939757] ret_from_fork+0x10/0x20 [ 32.939870] [ 32.939914] Allocated by task 184: [ 32.940315] kasan_save_stack+0x3c/0x68 [ 32.940488] kasan_save_track+0x20/0x40 [ 32.940598] kasan_save_alloc_info+0x40/0x58 [ 32.940809] __kasan_kmalloc+0xd4/0xd8 [ 32.941063] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.941270] kmalloc_oob_memset_2+0xb0/0x2f8 [ 32.941607] kunit_try_run_case+0x170/0x3f0 [ 32.941920] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.942156] kthread+0x328/0x630 [ 32.942298] ret_from_fork+0x10/0x20 [ 32.942396] [ 32.942445] The buggy address belongs to the object at fff00000c63f7100 [ 32.942445] which belongs to the cache kmalloc-128 of size 128 [ 32.942690] The buggy address is located 119 bytes inside of [ 32.942690] allocated 120-byte region [fff00000c63f7100, fff00000c63f7178) [ 32.942966] [ 32.943244] The buggy address belongs to the physical page: [ 32.943327] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f7 [ 32.943466] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.943811] page_type: f5(slab) [ 32.944181] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.944304] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.944484] page dumped because: kasan: bad access detected [ 32.944562] [ 32.946611] Memory state around the buggy address: [ 32.946699] fff00000c63f7000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.946815] fff00000c63f7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.946969] >fff00000c63f7100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.947077] ^ [ 32.947460] fff00000c63f7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.947562] fff00000c63f7200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.947648] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 32.910633] ================================================================== [ 32.910796] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 32.910922] Write of size 128 at addr fff00000c63f7000 by task kunit_try_catch/182 [ 32.911051] [ 32.911132] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 32.911650] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.911846] Hardware name: linux,dummy-virt (DT) [ 32.912388] Call trace: [ 32.912571] show_stack+0x20/0x38 (C) [ 32.913219] dump_stack_lvl+0x8c/0xd0 [ 32.913411] print_report+0x118/0x608 [ 32.913837] kasan_report+0xdc/0x128 [ 32.914397] kasan_check_range+0x100/0x1a8 [ 32.914524] __asan_memset+0x34/0x78 [ 32.915000] kmalloc_oob_in_memset+0x144/0x2d0 [ 32.915670] kunit_try_run_case+0x170/0x3f0 [ 32.915834] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.915988] kthread+0x328/0x630 [ 32.916125] ret_from_fork+0x10/0x20 [ 32.916244] [ 32.916395] Allocated by task 182: [ 32.916478] kasan_save_stack+0x3c/0x68 [ 32.916592] kasan_save_track+0x20/0x40 [ 32.916773] kasan_save_alloc_info+0x40/0x58 [ 32.916992] __kasan_kmalloc+0xd4/0xd8 [ 32.917104] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.917241] kmalloc_oob_in_memset+0xb0/0x2d0 [ 32.917340] kunit_try_run_case+0x170/0x3f0 [ 32.917463] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.917571] kthread+0x328/0x630 [ 32.917681] ret_from_fork+0x10/0x20 [ 32.917807] [ 32.917894] The buggy address belongs to the object at fff00000c63f7000 [ 32.917894] which belongs to the cache kmalloc-128 of size 128 [ 32.918041] The buggy address is located 0 bytes inside of [ 32.918041] allocated 120-byte region [fff00000c63f7000, fff00000c63f7078) [ 32.918180] [ 32.918230] The buggy address belongs to the physical page: [ 32.918370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063f7 [ 32.918656] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.918798] page_type: f5(slab) [ 32.918904] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.919086] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.919188] page dumped because: kasan: bad access detected [ 32.919272] [ 32.919322] Memory state around the buggy address: [ 32.919406] fff00000c63f6f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.919517] fff00000c63f6f80: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 32.919648] >fff00000c63f7000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.919773] ^ [ 32.919937] fff00000c63f7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.920076] fff00000c63f7100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.920327] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[ 32.861142] ================================================================== [ 32.861390] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 32.861683] Read of size 16 at addr fff00000c56f12e0 by task kunit_try_catch/180 [ 32.861808] [ 32.862003] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 32.862903] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.862969] Hardware name: linux,dummy-virt (DT) [ 32.863067] Call trace: [ 32.863317] show_stack+0x20/0x38 (C) [ 32.863447] dump_stack_lvl+0x8c/0xd0 [ 32.864339] print_report+0x118/0x608 [ 32.864811] kasan_report+0xdc/0x128 [ 32.865660] __asan_report_load16_noabort+0x20/0x30 [ 32.866220] kmalloc_uaf_16+0x3bc/0x438 [ 32.866455] kunit_try_run_case+0x170/0x3f0 [ 32.867350] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.867997] kthread+0x328/0x630 [ 32.868342] ret_from_fork+0x10/0x20 [ 32.868464] [ 32.868508] Allocated by task 180: [ 32.868575] kasan_save_stack+0x3c/0x68 [ 32.869878] kasan_save_track+0x20/0x40 [ 32.870467] kasan_save_alloc_info+0x40/0x58 [ 32.871279] __kasan_kmalloc+0xd4/0xd8 [ 32.871402] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.871833] kmalloc_uaf_16+0x140/0x438 [ 32.871944] kunit_try_run_case+0x170/0x3f0 [ 32.872419] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.873048] kthread+0x328/0x630 [ 32.873140] ret_from_fork+0x10/0x20 [ 32.873547] [ 32.873892] Freed by task 180: [ 32.874445] kasan_save_stack+0x3c/0x68 [ 32.874654] kasan_save_track+0x20/0x40 [ 32.874918] kasan_save_free_info+0x4c/0x78 [ 32.875102] __kasan_slab_free+0x6c/0x98 [ 32.875865] kfree+0x214/0x3c8 [ 32.876667] kmalloc_uaf_16+0x190/0x438 [ 32.877167] kunit_try_run_case+0x170/0x3f0 [ 32.877269] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.877741] kthread+0x328/0x630 [ 32.878384] ret_from_fork+0x10/0x20 [ 32.878484] [ 32.878957] The buggy address belongs to the object at fff00000c56f12e0 [ 32.878957] which belongs to the cache kmalloc-16 of size 16 [ 32.879204] The buggy address is located 0 bytes inside of [ 32.879204] freed 16-byte region [fff00000c56f12e0, fff00000c56f12f0) [ 32.879571] [ 32.879623] The buggy address belongs to the physical page: [ 32.879693] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f1 [ 32.879813] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.879925] page_type: f5(slab) [ 32.880485] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 32.881190] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 32.881775] page dumped because: kasan: bad access detected [ 32.881851] [ 32.881895] Memory state around the buggy address: [ 32.881971] fff00000c56f1180: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 32.883270] fff00000c56f1200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.883392] >fff00000c56f1280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.884485] ^ [ 32.884661] fff00000c56f1300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.884764] fff00000c56f1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.885072] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[ 32.823647] ================================================================== [ 32.823775] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 32.823892] Write of size 16 at addr fff00000c56f12a0 by task kunit_try_catch/178 [ 32.824012] [ 32.824101] CPU: 1 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 32.824289] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.824348] Hardware name: linux,dummy-virt (DT) [ 32.824417] Call trace: [ 32.825341] show_stack+0x20/0x38 (C) [ 32.825571] dump_stack_lvl+0x8c/0xd0 [ 32.826660] print_report+0x118/0x608 [ 32.826728] kasan_report+0xdc/0x128 [ 32.826831] __asan_report_store16_noabort+0x20/0x30 [ 32.826964] kmalloc_oob_16+0x3a0/0x3f8 [ 32.827388] kunit_try_run_case+0x170/0x3f0 [ 32.827526] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.827828] kthread+0x328/0x630 [ 32.828002] ret_from_fork+0x10/0x20 [ 32.828205] [ 32.828338] Allocated by task 178: [ 32.828614] kasan_save_stack+0x3c/0x68 [ 32.828718] kasan_save_track+0x20/0x40 [ 32.829430] kasan_save_alloc_info+0x40/0x58 [ 32.829528] __kasan_kmalloc+0xd4/0xd8 [ 32.830153] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.830289] kmalloc_oob_16+0xb4/0x3f8 [ 32.830699] kunit_try_run_case+0x170/0x3f0 [ 32.831152] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.831737] kthread+0x328/0x630 [ 32.831870] ret_from_fork+0x10/0x20 [ 32.832185] [ 32.832235] The buggy address belongs to the object at fff00000c56f12a0 [ 32.832235] which belongs to the cache kmalloc-16 of size 16 [ 32.832360] The buggy address is located 0 bytes inside of [ 32.832360] allocated 13-byte region [fff00000c56f12a0, fff00000c56f12ad) [ 32.833536] [ 32.833597] The buggy address belongs to the physical page: [ 32.833664] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056f1 [ 32.833781] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.833889] page_type: f5(slab) [ 32.833976] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 32.834107] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 32.834198] page dumped because: kasan: bad access detected [ 32.834268] [ 32.834312] Memory state around the buggy address: [ 32.834381] fff00000c56f1180: fa fb fc fc 00 00 fc fc fa fb fc fc fa fb fc fc [ 32.834476] fff00000c56f1200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.835649] >fff00000c56f1280: fa fb fc fc 00 05 fc fc 00 00 fc fc fc fc fc fc [ 32.835732] ^ [ 32.835814] fff00000c56f1300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.835941] fff00000c56f1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.836080] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 32.759789] ================================================================== [ 32.759931] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 32.760122] Read of size 1 at addr fff00000c4511400 by task kunit_try_catch/176 [ 32.760358] [ 32.760483] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 32.760892] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.761458] Hardware name: linux,dummy-virt (DT) [ 32.761835] Call trace: [ 32.762265] show_stack+0x20/0x38 (C) [ 32.762483] dump_stack_lvl+0x8c/0xd0 [ 32.762925] print_report+0x118/0x608 [ 32.763355] kasan_report+0xdc/0x128 [ 32.763875] __kasan_check_byte+0x54/0x70 [ 32.763998] krealloc_noprof+0x44/0x360 [ 32.764136] krealloc_uaf+0x180/0x520 [ 32.764244] kunit_try_run_case+0x170/0x3f0 [ 32.765291] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.765562] kthread+0x328/0x630 [ 32.766307] ret_from_fork+0x10/0x20 [ 32.766779] [ 32.766836] Allocated by task 176: [ 32.767263] kasan_save_stack+0x3c/0x68 [ 32.767397] kasan_save_track+0x20/0x40 [ 32.767736] kasan_save_alloc_info+0x40/0x58 [ 32.767946] __kasan_kmalloc+0xd4/0xd8 [ 32.768376] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.768577] krealloc_uaf+0xc8/0x520 [ 32.768668] kunit_try_run_case+0x170/0x3f0 [ 32.768759] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.768859] kthread+0x328/0x630 [ 32.768941] ret_from_fork+0x10/0x20 [ 32.769725] [ 32.769784] Freed by task 176: [ 32.770429] kasan_save_stack+0x3c/0x68 [ 32.770739] kasan_save_track+0x20/0x40 [ 32.770875] kasan_save_free_info+0x4c/0x78 [ 32.770983] __kasan_slab_free+0x6c/0x98 [ 32.771793] kfree+0x214/0x3c8 [ 32.772134] krealloc_uaf+0x12c/0x520 [ 32.772689] kunit_try_run_case+0x170/0x3f0 [ 32.772839] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.773458] kthread+0x328/0x630 [ 32.773654] ret_from_fork+0x10/0x20 [ 32.774171] [ 32.774232] The buggy address belongs to the object at fff00000c4511400 [ 32.774232] which belongs to the cache kmalloc-256 of size 256 [ 32.774560] The buggy address is located 0 bytes inside of [ 32.774560] freed 256-byte region [fff00000c4511400, fff00000c4511500) [ 32.774704] [ 32.775266] The buggy address belongs to the physical page: [ 32.775585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104510 [ 32.775721] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.776087] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.776474] page_type: f5(slab) [ 32.776770] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 32.777112] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.777362] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 32.777481] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.777901] head: 0bfffe0000000001 ffffc1ffc3114401 00000000ffffffff 00000000ffffffff [ 32.778159] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 32.778256] page dumped because: kasan: bad access detected [ 32.779091] [ 32.779150] Memory state around the buggy address: [ 32.779236] fff00000c4511300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.779344] fff00000c4511380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.780075] >fff00000c4511400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.780169] ^ [ 32.780237] fff00000c4511480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.780345] fff00000c4511500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.780435] ================================================================== [ 32.790247] ================================================================== [ 32.790347] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 32.791078] Read of size 1 at addr fff00000c4511400 by task kunit_try_catch/176 [ 32.791211] [ 32.791284] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 32.792232] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.792691] Hardware name: linux,dummy-virt (DT) [ 32.792772] Call trace: [ 32.792824] show_stack+0x20/0x38 (C) [ 32.792941] dump_stack_lvl+0x8c/0xd0 [ 32.793072] print_report+0x118/0x608 [ 32.793189] kasan_report+0xdc/0x128 [ 32.793302] __asan_report_load1_noabort+0x20/0x30 [ 32.794633] krealloc_uaf+0x4c8/0x520 [ 32.795792] kunit_try_run_case+0x170/0x3f0 [ 32.796330] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.797348] kthread+0x328/0x630 [ 32.798091] ret_from_fork+0x10/0x20 [ 32.798496] [ 32.798663] Allocated by task 176: [ 32.798932] kasan_save_stack+0x3c/0x68 [ 32.799606] kasan_save_track+0x20/0x40 [ 32.799792] kasan_save_alloc_info+0x40/0x58 [ 32.800488] __kasan_kmalloc+0xd4/0xd8 [ 32.800833] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.800949] krealloc_uaf+0xc8/0x520 [ 32.801904] kunit_try_run_case+0x170/0x3f0 [ 32.802826] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.803258] kthread+0x328/0x630 [ 32.804137] ret_from_fork+0x10/0x20 [ 32.804814] [ 32.804866] Freed by task 176: [ 32.805148] kasan_save_stack+0x3c/0x68 [ 32.805251] kasan_save_track+0x20/0x40 [ 32.805341] kasan_save_free_info+0x4c/0x78 [ 32.806202] __kasan_slab_free+0x6c/0x98 [ 32.806481] kfree+0x214/0x3c8 [ 32.806735] krealloc_uaf+0x12c/0x520 [ 32.806844] kunit_try_run_case+0x170/0x3f0 [ 32.807819] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.807967] kthread+0x328/0x630 [ 32.808081] ret_from_fork+0x10/0x20 [ 32.808186] [ 32.808240] The buggy address belongs to the object at fff00000c4511400 [ 32.808240] which belongs to the cache kmalloc-256 of size 256 [ 32.808382] The buggy address is located 0 bytes inside of [ 32.808382] freed 256-byte region [fff00000c4511400, fff00000c4511500) [ 32.808540] [ 32.808592] The buggy address belongs to the physical page: [ 32.808766] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104510 [ 32.808941] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.809286] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.809432] page_type: f5(slab) [ 32.809522] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 32.809634] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.809745] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 32.809854] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.809965] head: 0bfffe0000000001 ffffc1ffc3114401 00000000ffffffff 00000000ffffffff [ 32.810264] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 32.810630] page dumped because: kasan: bad access detected [ 32.810709] [ 32.810798] Memory state around the buggy address: [ 32.810982] fff00000c4511300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.811116] fff00000c4511380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.811228] >fff00000c4511400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.811325] ^ [ 32.811421] fff00000c4511480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.811674] fff00000c4511500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.811768] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 32.537006] ================================================================== [ 32.537327] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 32.537459] Write of size 1 at addr fff00000c45112c9 by task kunit_try_catch/170 [ 32.537580] [ 32.537781] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 32.538138] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.538203] Hardware name: linux,dummy-virt (DT) [ 32.538275] Call trace: [ 32.538326] show_stack+0x20/0x38 (C) [ 32.538449] dump_stack_lvl+0x8c/0xd0 [ 32.538671] print_report+0x118/0x608 [ 32.538822] kasan_report+0xdc/0x128 [ 32.539022] __asan_report_store1_noabort+0x20/0x30 [ 32.539435] krealloc_less_oob_helper+0xa48/0xc50 [ 32.539746] krealloc_less_oob+0x20/0x38 [ 32.539932] kunit_try_run_case+0x170/0x3f0 [ 32.540091] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.540348] kthread+0x328/0x630 [ 32.540475] ret_from_fork+0x10/0x20 [ 32.540739] [ 32.541209] Allocated by task 170: [ 32.541328] kasan_save_stack+0x3c/0x68 [ 32.542089] kasan_save_track+0x20/0x40 [ 32.542197] kasan_save_alloc_info+0x40/0x58 [ 32.542375] __kasan_krealloc+0x118/0x178 [ 32.542862] krealloc_noprof+0x128/0x360 [ 32.542986] krealloc_less_oob_helper+0x168/0xc50 [ 32.543102] krealloc_less_oob+0x20/0x38 [ 32.543221] kunit_try_run_case+0x170/0x3f0 [ 32.543442] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.543560] kthread+0x328/0x630 [ 32.543746] ret_from_fork+0x10/0x20 [ 32.543842] [ 32.543922] The buggy address belongs to the object at fff00000c4511200 [ 32.543922] which belongs to the cache kmalloc-256 of size 256 [ 32.546071] The buggy address is located 0 bytes to the right of [ 32.546071] allocated 201-byte region [fff00000c4511200, fff00000c45112c9) [ 32.546162] [ 32.546191] The buggy address belongs to the physical page: [ 32.546240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104510 [ 32.546904] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.547039] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.547349] page_type: f5(slab) [ 32.547523] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 32.547638] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.547806] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 32.547995] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.548130] head: 0bfffe0000000001 ffffc1ffc3114401 00000000ffffffff 00000000ffffffff [ 32.548242] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 32.548331] page dumped because: kasan: bad access detected [ 32.548399] [ 32.548442] Memory state around the buggy address: [ 32.548517] fff00000c4511180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.548705] fff00000c4511200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.548807] >fff00000c4511280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 32.548950] ^ [ 32.549167] fff00000c4511300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.549346] fff00000c4511380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.549823] ================================================================== [ 32.694732] ================================================================== [ 32.694919] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 32.695097] Write of size 1 at addr fff00000c577e0c9 by task kunit_try_catch/174 [ 32.695226] [ 32.695304] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 32.695605] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.695691] Hardware name: linux,dummy-virt (DT) [ 32.695848] Call trace: [ 32.695908] show_stack+0x20/0x38 (C) [ 32.696088] dump_stack_lvl+0x8c/0xd0 [ 32.696217] print_report+0x118/0x608 [ 32.696352] kasan_report+0xdc/0x128 [ 32.696490] __asan_report_store1_noabort+0x20/0x30 [ 32.696778] krealloc_less_oob_helper+0xa48/0xc50 [ 32.697154] krealloc_large_less_oob+0x20/0x38 [ 32.697494] kunit_try_run_case+0x170/0x3f0 [ 32.697842] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.697976] kthread+0x328/0x630 [ 32.698120] ret_from_fork+0x10/0x20 [ 32.698351] [ 32.698412] The buggy address belongs to the physical page: [ 32.698492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10577c [ 32.699333] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.700022] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.700229] page_type: f8(unknown) [ 32.700325] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.700442] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.700559] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.702184] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.702360] head: 0bfffe0000000002 ffffc1ffc315df01 00000000ffffffff 00000000ffffffff [ 32.702576] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.703118] page dumped because: kasan: bad access detected [ 32.703215] [ 32.703261] Memory state around the buggy address: [ 32.703679] fff00000c577df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.704405] fff00000c577e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.704511] >fff00000c577e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 32.705257] ^ [ 32.705830] fff00000c577e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.706371] fff00000c577e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.706493] ================================================================== [ 32.738096] ================================================================== [ 32.738303] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 32.738425] Write of size 1 at addr fff00000c577e0eb by task kunit_try_catch/174 [ 32.738650] [ 32.738720] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 32.738958] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.739058] Hardware name: linux,dummy-virt (DT) [ 32.739260] Call trace: [ 32.739315] show_stack+0x20/0x38 (C) [ 32.739445] dump_stack_lvl+0x8c/0xd0 [ 32.739754] print_report+0x118/0x608 [ 32.740048] kasan_report+0xdc/0x128 [ 32.740231] __asan_report_store1_noabort+0x20/0x30 [ 32.740354] krealloc_less_oob_helper+0xa58/0xc50 [ 32.740483] krealloc_large_less_oob+0x20/0x38 [ 32.740598] kunit_try_run_case+0x170/0x3f0 [ 32.740709] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.740834] kthread+0x328/0x630 [ 32.740963] ret_from_fork+0x10/0x20 [ 32.741469] [ 32.741520] The buggy address belongs to the physical page: [ 32.741721] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10577c [ 32.742172] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.742284] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.742396] page_type: f8(unknown) [ 32.742483] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.742615] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.743832] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.743952] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.744463] head: 0bfffe0000000002 ffffc1ffc315df01 00000000ffffffff 00000000ffffffff [ 32.744645] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.744743] page dumped because: kasan: bad access detected [ 32.744815] [ 32.744858] Memory state around the buggy address: [ 32.744937] fff00000c577df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.745195] fff00000c577e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.745298] >fff00000c577e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 32.745414] ^ [ 32.745703] fff00000c577e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.745806] fff00000c577e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.745893] ================================================================== [ 32.709290] ================================================================== [ 32.709344] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 32.709478] Write of size 1 at addr fff00000c577e0d0 by task kunit_try_catch/174 [ 32.709602] [ 32.709727] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 32.709917] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.709980] Hardware name: linux,dummy-virt (DT) [ 32.710069] Call trace: [ 32.710121] show_stack+0x20/0x38 (C) [ 32.710235] dump_stack_lvl+0x8c/0xd0 [ 32.710344] print_report+0x118/0x608 [ 32.710456] kasan_report+0xdc/0x128 [ 32.710580] __asan_report_store1_noabort+0x20/0x30 [ 32.710935] krealloc_less_oob_helper+0xb9c/0xc50 [ 32.711606] krealloc_large_less_oob+0x20/0x38 [ 32.711844] kunit_try_run_case+0x170/0x3f0 [ 32.712196] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.712620] kthread+0x328/0x630 [ 32.713439] ret_from_fork+0x10/0x20 [ 32.713565] [ 32.713612] The buggy address belongs to the physical page: [ 32.714365] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10577c [ 32.714498] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.714607] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.714724] page_type: f8(unknown) [ 32.714830] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.714950] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.716384] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.716636] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.717303] head: 0bfffe0000000002 ffffc1ffc315df01 00000000ffffffff 00000000ffffffff [ 32.717419] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.717511] page dumped because: kasan: bad access detected [ 32.718497] [ 32.718592] Memory state around the buggy address: [ 32.718869] fff00000c577df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.718971] fff00000c577e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.719709] >fff00000c577e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 32.719956] ^ [ 32.720175] fff00000c577e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.720364] fff00000c577e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.720510] ================================================================== [ 32.731101] ================================================================== [ 32.731196] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 32.731310] Write of size 1 at addr fff00000c577e0ea by task kunit_try_catch/174 [ 32.731435] [ 32.731556] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 32.731780] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.731858] Hardware name: linux,dummy-virt (DT) [ 32.731990] Call trace: [ 32.732199] show_stack+0x20/0x38 (C) [ 32.732381] dump_stack_lvl+0x8c/0xd0 [ 32.732514] print_report+0x118/0x608 [ 32.732761] kasan_report+0xdc/0x128 [ 32.732928] __asan_report_store1_noabort+0x20/0x30 [ 32.733007] krealloc_less_oob_helper+0xae4/0xc50 [ 32.733131] krealloc_large_less_oob+0x20/0x38 [ 32.733249] kunit_try_run_case+0x170/0x3f0 [ 32.733447] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.733606] kthread+0x328/0x630 [ 32.733815] ret_from_fork+0x10/0x20 [ 32.734040] [ 32.734106] The buggy address belongs to the physical page: [ 32.734255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10577c [ 32.734467] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.734731] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.734940] page_type: f8(unknown) [ 32.735108] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.735229] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.735349] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.735505] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.735842] head: 0bfffe0000000002 ffffc1ffc315df01 00000000ffffffff 00000000ffffffff [ 32.735976] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.736246] page dumped because: kasan: bad access detected [ 32.736450] [ 32.736605] Memory state around the buggy address: [ 32.736679] fff00000c577df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.736779] fff00000c577e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.736879] >fff00000c577e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 32.736973] ^ [ 32.737119] fff00000c577e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.737352] fff00000c577e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.737592] ================================================================== [ 32.721733] ================================================================== [ 32.721964] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 32.722173] Write of size 1 at addr fff00000c577e0da by task kunit_try_catch/174 [ 32.722405] [ 32.722483] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 32.722712] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.722783] Hardware name: linux,dummy-virt (DT) [ 32.722846] Call trace: [ 32.722875] show_stack+0x20/0x38 (C) [ 32.722938] dump_stack_lvl+0x8c/0xd0 [ 32.723046] print_report+0x118/0x608 [ 32.723212] kasan_report+0xdc/0x128 [ 32.723340] __asan_report_store1_noabort+0x20/0x30 [ 32.723682] krealloc_less_oob_helper+0xa80/0xc50 [ 32.724095] krealloc_large_less_oob+0x20/0x38 [ 32.724224] kunit_try_run_case+0x170/0x3f0 [ 32.724340] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.724469] kthread+0x328/0x630 [ 32.724655] ret_from_fork+0x10/0x20 [ 32.725172] [ 32.725267] The buggy address belongs to the physical page: [ 32.725337] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10577c [ 32.725451] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.726181] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.727160] page_type: f8(unknown) [ 32.727292] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.727642] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.727768] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.727883] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.728085] head: 0bfffe0000000002 ffffc1ffc315df01 00000000ffffffff 00000000ffffffff [ 32.728361] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.728456] page dumped because: kasan: bad access detected [ 32.728565] [ 32.728633] Memory state around the buggy address: [ 32.728752] fff00000c577df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.728946] fff00000c577e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.729061] >fff00000c577e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 32.729180] ^ [ 32.729426] fff00000c577e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.729526] fff00000c577e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.729610] ================================================================== [ 32.564958] ================================================================== [ 32.565139] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 32.565408] Write of size 1 at addr fff00000c45112da by task kunit_try_catch/170 [ 32.565997] [ 32.566155] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 32.566357] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.566418] Hardware name: linux,dummy-virt (DT) [ 32.566492] Call trace: [ 32.566814] show_stack+0x20/0x38 (C) [ 32.567391] dump_stack_lvl+0x8c/0xd0 [ 32.567629] print_report+0x118/0x608 [ 32.567906] kasan_report+0xdc/0x128 [ 32.568142] __asan_report_store1_noabort+0x20/0x30 [ 32.568337] krealloc_less_oob_helper+0xa80/0xc50 [ 32.568550] krealloc_less_oob+0x20/0x38 [ 32.569022] kunit_try_run_case+0x170/0x3f0 [ 32.569234] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.569429] kthread+0x328/0x630 [ 32.569547] ret_from_fork+0x10/0x20 [ 32.570113] [ 32.570222] Allocated by task 170: [ 32.570314] kasan_save_stack+0x3c/0x68 [ 32.570489] kasan_save_track+0x20/0x40 [ 32.570592] kasan_save_alloc_info+0x40/0x58 [ 32.571094] __kasan_krealloc+0x118/0x178 [ 32.571331] krealloc_noprof+0x128/0x360 [ 32.571694] krealloc_less_oob_helper+0x168/0xc50 [ 32.572006] krealloc_less_oob+0x20/0x38 [ 32.572123] kunit_try_run_case+0x170/0x3f0 [ 32.572213] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.572311] kthread+0x328/0x630 [ 32.572389] ret_from_fork+0x10/0x20 [ 32.572519] [ 32.572567] The buggy address belongs to the object at fff00000c4511200 [ 32.572567] which belongs to the cache kmalloc-256 of size 256 [ 32.572694] The buggy address is located 17 bytes to the right of [ 32.572694] allocated 201-byte region [fff00000c4511200, fff00000c45112c9) [ 32.572869] [ 32.572936] The buggy address belongs to the physical page: [ 32.573007] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104510 [ 32.574024] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.574180] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.574435] page_type: f5(slab) [ 32.574633] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 32.574965] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.575113] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 32.575239] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.575588] head: 0bfffe0000000001 ffffc1ffc3114401 00000000ffffffff 00000000ffffffff [ 32.575940] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 32.576268] page dumped because: kasan: bad access detected [ 32.576617] [ 32.576969] Memory state around the buggy address: [ 32.577102] fff00000c4511180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.577488] fff00000c4511200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.577592] >fff00000c4511280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 32.577643] ^ [ 32.577689] fff00000c4511300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.577738] fff00000c4511380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.577780] ================================================================== [ 32.602636] ================================================================== [ 32.602742] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 32.603170] Write of size 1 at addr fff00000c45112eb by task kunit_try_catch/170 [ 32.603330] [ 32.603407] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 32.603605] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.603676] Hardware name: linux,dummy-virt (DT) [ 32.603818] Call trace: [ 32.604014] show_stack+0x20/0x38 (C) [ 32.604560] dump_stack_lvl+0x8c/0xd0 [ 32.604790] print_report+0x118/0x608 [ 32.605043] kasan_report+0xdc/0x128 [ 32.605284] __asan_report_store1_noabort+0x20/0x30 [ 32.605451] krealloc_less_oob_helper+0xa58/0xc50 [ 32.605743] krealloc_less_oob+0x20/0x38 [ 32.605954] kunit_try_run_case+0x170/0x3f0 [ 32.606092] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.607161] kthread+0x328/0x630 [ 32.607926] ret_from_fork+0x10/0x20 [ 32.608632] [ 32.609303] Allocated by task 170: [ 32.609473] kasan_save_stack+0x3c/0x68 [ 32.610433] kasan_save_track+0x20/0x40 [ 32.611064] kasan_save_alloc_info+0x40/0x58 [ 32.611169] __kasan_krealloc+0x118/0x178 [ 32.611271] krealloc_noprof+0x128/0x360 [ 32.612292] krealloc_less_oob_helper+0x168/0xc50 [ 32.613136] krealloc_less_oob+0x20/0x38 [ 32.613757] kunit_try_run_case+0x170/0x3f0 [ 32.613859] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.614516] kthread+0x328/0x630 [ 32.614645] ret_from_fork+0x10/0x20 [ 32.614799] [ 32.614902] The buggy address belongs to the object at fff00000c4511200 [ 32.614902] which belongs to the cache kmalloc-256 of size 256 [ 32.615043] The buggy address is located 34 bytes to the right of [ 32.615043] allocated 201-byte region [fff00000c4511200, fff00000c45112c9) [ 32.615189] [ 32.615245] The buggy address belongs to the physical page: [ 32.615476] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104510 [ 32.615598] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.615768] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.615920] page_type: f5(slab) [ 32.616013] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 32.616148] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.616261] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 32.616371] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.616481] head: 0bfffe0000000001 ffffc1ffc3114401 00000000ffffffff 00000000ffffffff [ 32.616668] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 32.616869] page dumped because: kasan: bad access detected [ 32.616941] [ 32.617483] Memory state around the buggy address: [ 32.618047] fff00000c4511180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.618610] fff00000c4511200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.619239] >fff00000c4511280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 32.620211] ^ [ 32.620524] fff00000c4511300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.620626] fff00000c4511380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.620716] ================================================================== [ 32.551790] ================================================================== [ 32.551879] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 32.551985] Write of size 1 at addr fff00000c45112d0 by task kunit_try_catch/170 [ 32.552201] [ 32.552306] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 32.552694] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.552761] Hardware name: linux,dummy-virt (DT) [ 32.552898] Call trace: [ 32.552981] show_stack+0x20/0x38 (C) [ 32.553422] dump_stack_lvl+0x8c/0xd0 [ 32.553729] print_report+0x118/0x608 [ 32.553877] kasan_report+0xdc/0x128 [ 32.553995] __asan_report_store1_noabort+0x20/0x30 [ 32.554882] krealloc_less_oob_helper+0xb9c/0xc50 [ 32.555517] krealloc_less_oob+0x20/0x38 [ 32.555654] kunit_try_run_case+0x170/0x3f0 [ 32.555767] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.555901] kthread+0x328/0x630 [ 32.556362] ret_from_fork+0x10/0x20 [ 32.556737] [ 32.556842] Allocated by task 170: [ 32.556914] kasan_save_stack+0x3c/0x68 [ 32.557074] kasan_save_track+0x20/0x40 [ 32.557204] kasan_save_alloc_info+0x40/0x58 [ 32.557447] __kasan_krealloc+0x118/0x178 [ 32.557592] krealloc_noprof+0x128/0x360 [ 32.557758] krealloc_less_oob_helper+0x168/0xc50 [ 32.558050] krealloc_less_oob+0x20/0x38 [ 32.558166] kunit_try_run_case+0x170/0x3f0 [ 32.558288] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.558616] kthread+0x328/0x630 [ 32.558717] ret_from_fork+0x10/0x20 [ 32.558837] [ 32.558891] The buggy address belongs to the object at fff00000c4511200 [ 32.558891] which belongs to the cache kmalloc-256 of size 256 [ 32.559081] The buggy address is located 7 bytes to the right of [ 32.559081] allocated 201-byte region [fff00000c4511200, fff00000c45112c9) [ 32.559240] [ 32.559294] The buggy address belongs to the physical page: [ 32.559367] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104510 [ 32.559534] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.559658] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.559791] page_type: f5(slab) [ 32.559889] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 32.560013] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.560162] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 32.560316] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.560473] head: 0bfffe0000000001 ffffc1ffc3114401 00000000ffffffff 00000000ffffffff [ 32.560597] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 32.560710] page dumped because: kasan: bad access detected [ 32.560813] [ 32.560868] Memory state around the buggy address: [ 32.560988] fff00000c4511180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.561117] fff00000c4511200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.561269] >fff00000c4511280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 32.561409] ^ [ 32.561514] fff00000c4511300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.561630] fff00000c4511380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.561742] ================================================================== [ 32.583425] ================================================================== [ 32.583527] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 32.583846] Write of size 1 at addr fff00000c45112ea by task kunit_try_catch/170 [ 32.584576] [ 32.584646] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 32.584941] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.585718] Hardware name: linux,dummy-virt (DT) [ 32.585853] Call trace: [ 32.586185] show_stack+0x20/0x38 (C) [ 32.586502] dump_stack_lvl+0x8c/0xd0 [ 32.586691] print_report+0x118/0x608 [ 32.587339] kasan_report+0xdc/0x128 [ 32.587470] __asan_report_store1_noabort+0x20/0x30 [ 32.587847] krealloc_less_oob_helper+0xae4/0xc50 [ 32.588766] krealloc_less_oob+0x20/0x38 [ 32.588944] kunit_try_run_case+0x170/0x3f0 [ 32.589450] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.589969] kthread+0x328/0x630 [ 32.590528] ret_from_fork+0x10/0x20 [ 32.590670] [ 32.590722] Allocated by task 170: [ 32.590813] kasan_save_stack+0x3c/0x68 [ 32.590927] kasan_save_track+0x20/0x40 [ 32.591024] kasan_save_alloc_info+0x40/0x58 [ 32.591342] __kasan_krealloc+0x118/0x178 [ 32.591527] krealloc_noprof+0x128/0x360 [ 32.592272] krealloc_less_oob_helper+0x168/0xc50 [ 32.592783] krealloc_less_oob+0x20/0x38 [ 32.593472] kunit_try_run_case+0x170/0x3f0 [ 32.593735] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.593842] kthread+0x328/0x630 [ 32.594365] ret_from_fork+0x10/0x20 [ 32.594548] [ 32.594735] The buggy address belongs to the object at fff00000c4511200 [ 32.594735] which belongs to the cache kmalloc-256 of size 256 [ 32.594882] The buggy address is located 33 bytes to the right of [ 32.594882] allocated 201-byte region [fff00000c4511200, fff00000c45112c9) [ 32.595023] [ 32.596041] The buggy address belongs to the physical page: [ 32.596117] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104510 [ 32.596467] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.596626] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.596751] page_type: f5(slab) [ 32.597338] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 32.597537] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.597810] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 32.598208] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.598417] head: 0bfffe0000000001 ffffc1ffc3114401 00000000ffffffff 00000000ffffffff [ 32.598536] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 32.598630] page dumped because: kasan: bad access detected [ 32.599086] [ 32.599144] Memory state around the buggy address: [ 32.599408] fff00000c4511180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.599874] fff00000c4511200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.599979] >fff00000c4511280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 32.600334] ^ [ 32.600926] fff00000c4511300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.601394] fff00000c4511380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.601523] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 32.486682] ================================================================== [ 32.486853] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 32.486990] Write of size 1 at addr fff00000c45110eb by task kunit_try_catch/168 [ 32.487123] [ 32.490405] CPU: 1 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 32.490532] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.490680] Hardware name: linux,dummy-virt (DT) [ 32.490894] Call trace: [ 32.490960] show_stack+0x20/0x38 (C) [ 32.491116] dump_stack_lvl+0x8c/0xd0 [ 32.491779] print_report+0x118/0x608 [ 32.492218] kasan_report+0xdc/0x128 [ 32.492453] __asan_report_store1_noabort+0x20/0x30 [ 32.492838] krealloc_more_oob_helper+0x60c/0x678 [ 32.493097] krealloc_more_oob+0x20/0x38 [ 32.493226] kunit_try_run_case+0x170/0x3f0 [ 32.493459] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.493657] kthread+0x328/0x630 [ 32.493826] ret_from_fork+0x10/0x20 [ 32.494042] [ 32.494368] Allocated by task 168: [ 32.494448] kasan_save_stack+0x3c/0x68 [ 32.496209] kasan_save_track+0x20/0x40 [ 32.496320] kasan_save_alloc_info+0x40/0x58 [ 32.496487] __kasan_krealloc+0x118/0x178 [ 32.496617] krealloc_noprof+0x128/0x360 [ 32.497111] krealloc_more_oob_helper+0x168/0x678 [ 32.497211] krealloc_more_oob+0x20/0x38 [ 32.497300] kunit_try_run_case+0x170/0x3f0 [ 32.498094] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.499527] kthread+0x328/0x630 [ 32.500373] ret_from_fork+0x10/0x20 [ 32.500863] [ 32.500945] The buggy address belongs to the object at fff00000c4511000 [ 32.500945] which belongs to the cache kmalloc-256 of size 256 [ 32.501459] The buggy address is located 0 bytes to the right of [ 32.501459] allocated 235-byte region [fff00000c4511000, fff00000c45110eb) [ 32.501608] [ 32.501660] The buggy address belongs to the physical page: [ 32.501737] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104510 [ 32.501856] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.504423] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.505460] page_type: f5(slab) [ 32.505563] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 32.506575] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.507524] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 32.507656] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.507787] head: 0bfffe0000000001 ffffc1ffc3114401 00000000ffffffff 00000000ffffffff [ 32.507907] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 32.508118] page dumped because: kasan: bad access detected [ 32.509016] [ 32.509573] Memory state around the buggy address: [ 32.509660] fff00000c4510f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.509763] fff00000c4511000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.509859] >fff00000c4511080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 32.510511] ^ [ 32.510652] fff00000c4511100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.510784] fff00000c4511180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.511184] ================================================================== [ 32.653188] ================================================================== [ 32.653457] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 32.654345] Write of size 1 at addr fff00000c577e0eb by task kunit_try_catch/172 [ 32.655116] [ 32.655372] CPU: 1 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 32.655957] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.656053] Hardware name: linux,dummy-virt (DT) [ 32.656355] Call trace: [ 32.656654] show_stack+0x20/0x38 (C) [ 32.657306] dump_stack_lvl+0x8c/0xd0 [ 32.657700] print_report+0x118/0x608 [ 32.657818] kasan_report+0xdc/0x128 [ 32.658600] __asan_report_store1_noabort+0x20/0x30 [ 32.658741] krealloc_more_oob_helper+0x60c/0x678 [ 32.658886] krealloc_large_more_oob+0x20/0x38 [ 32.659018] kunit_try_run_case+0x170/0x3f0 [ 32.659164] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.659291] kthread+0x328/0x630 [ 32.660287] ret_from_fork+0x10/0x20 [ 32.660444] [ 32.660832] The buggy address belongs to the physical page: [ 32.661380] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10577c [ 32.661890] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.662678] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.663220] page_type: f8(unknown) [ 32.663319] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.663744] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.664159] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.664629] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.664749] head: 0bfffe0000000002 ffffc1ffc315df01 00000000ffffffff 00000000ffffffff [ 32.665625] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.665925] page dumped because: kasan: bad access detected [ 32.666003] [ 32.666063] Memory state around the buggy address: [ 32.666148] fff00000c577df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.666255] fff00000c577e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.666358] >fff00000c577e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 32.666448] ^ [ 32.666541] fff00000c577e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.666655] fff00000c577e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.666880] ================================================================== [ 32.514647] ================================================================== [ 32.514762] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 32.514954] Write of size 1 at addr fff00000c45110f0 by task kunit_try_catch/168 [ 32.515088] [ 32.515165] CPU: 1 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 32.515398] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.515474] Hardware name: linux,dummy-virt (DT) [ 32.515750] Call trace: [ 32.515810] show_stack+0x20/0x38 (C) [ 32.515968] dump_stack_lvl+0x8c/0xd0 [ 32.516210] print_report+0x118/0x608 [ 32.516387] kasan_report+0xdc/0x128 [ 32.516512] __asan_report_store1_noabort+0x20/0x30 [ 32.516649] krealloc_more_oob_helper+0x5c0/0x678 [ 32.516773] krealloc_more_oob+0x20/0x38 [ 32.516896] kunit_try_run_case+0x170/0x3f0 [ 32.517010] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.517156] kthread+0x328/0x630 [ 32.517265] ret_from_fork+0x10/0x20 [ 32.517413] [ 32.517477] Allocated by task 168: [ 32.517548] kasan_save_stack+0x3c/0x68 [ 32.517653] kasan_save_track+0x20/0x40 [ 32.517764] kasan_save_alloc_info+0x40/0x58 [ 32.517850] __kasan_krealloc+0x118/0x178 [ 32.517948] krealloc_noprof+0x128/0x360 [ 32.518060] krealloc_more_oob_helper+0x168/0x678 [ 32.518172] krealloc_more_oob+0x20/0x38 [ 32.518344] kunit_try_run_case+0x170/0x3f0 [ 32.518483] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.519013] kthread+0x328/0x630 [ 32.519147] ret_from_fork+0x10/0x20 [ 32.519241] [ 32.519289] The buggy address belongs to the object at fff00000c4511000 [ 32.519289] which belongs to the cache kmalloc-256 of size 256 [ 32.519438] The buggy address is located 5 bytes to the right of [ 32.519438] allocated 235-byte region [fff00000c4511000, fff00000c45110eb) [ 32.519690] [ 32.519871] The buggy address belongs to the physical page: [ 32.519962] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104510 [ 32.520115] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.520339] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.520560] page_type: f5(slab) [ 32.520707] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 32.520960] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.521112] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 32.521230] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.521399] head: 0bfffe0000000001 ffffc1ffc3114401 00000000ffffffff 00000000ffffffff [ 32.522648] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 32.522711] page dumped because: kasan: bad access detected [ 32.522758] [ 32.522780] Memory state around the buggy address: [ 32.522844] fff00000c4510f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.522921] fff00000c4511000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.522972] >fff00000c4511080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 32.523015] ^ [ 32.523187] fff00000c4511100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.523481] fff00000c4511180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.524007] ================================================================== [ 32.668599] ================================================================== [ 32.668719] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 32.668955] Write of size 1 at addr fff00000c577e0f0 by task kunit_try_catch/172 [ 32.669184] [ 32.669363] CPU: 1 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 32.669871] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.670049] Hardware name: linux,dummy-virt (DT) [ 32.670140] Call trace: [ 32.670256] show_stack+0x20/0x38 (C) [ 32.670382] dump_stack_lvl+0x8c/0xd0 [ 32.670642] print_report+0x118/0x608 [ 32.670777] kasan_report+0xdc/0x128 [ 32.670931] __asan_report_store1_noabort+0x20/0x30 [ 32.671080] krealloc_more_oob_helper+0x5c0/0x678 [ 32.671241] krealloc_large_more_oob+0x20/0x38 [ 32.671473] kunit_try_run_case+0x170/0x3f0 [ 32.671695] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.671830] kthread+0x328/0x630 [ 32.671961] ret_from_fork+0x10/0x20 [ 32.672242] [ 32.672340] The buggy address belongs to the physical page: [ 32.672415] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10577c [ 32.672682] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.672792] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.672941] page_type: f8(unknown) [ 32.673207] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.673484] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.673685] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.673796] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.673907] head: 0bfffe0000000002 ffffc1ffc315df01 00000000ffffffff 00000000ffffffff [ 32.674018] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.674131] page dumped because: kasan: bad access detected [ 32.674210] [ 32.674328] Memory state around the buggy address: [ 32.674530] fff00000c577df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.674693] fff00000c577e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.674987] >fff00000c577e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 32.675126] ^ [ 32.675235] fff00000c577e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.675380] fff00000c577e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.675547] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[ 32.381052] ================================================================== [ 32.381358] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 32.382155] Free of addr fff00000c5778001 by task kunit_try_catch/162 [ 32.382662] [ 32.382766] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 32.383500] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.383568] Hardware name: linux,dummy-virt (DT) [ 32.383651] Call trace: [ 32.383717] show_stack+0x20/0x38 (C) [ 32.383981] dump_stack_lvl+0x8c/0xd0 [ 32.384124] print_report+0x118/0x608 [ 32.384507] kasan_report_invalid_free+0xc0/0xe8 [ 32.384711] __kasan_kfree_large+0x5c/0xa8 [ 32.385001] free_large_kmalloc+0x68/0x150 [ 32.385135] kfree+0x270/0x3c8 [ 32.385238] kmalloc_large_invalid_free+0x108/0x270 [ 32.385607] kunit_try_run_case+0x170/0x3f0 [ 32.385759] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.385943] kthread+0x328/0x630 [ 32.387137] ret_from_fork+0x10/0x20 [ 32.387489] [ 32.387561] The buggy address belongs to the physical page: [ 32.387635] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105778 [ 32.387756] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.387868] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.388074] page_type: f8(unknown) [ 32.388264] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.388510] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.388750] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.388862] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.388973] head: 0bfffe0000000002 ffffc1ffc315de01 00000000ffffffff 00000000ffffffff [ 32.389754] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.389862] page dumped because: kasan: bad access detected [ 32.390188] [ 32.390234] Memory state around the buggy address: [ 32.390309] fff00000c5777f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.390414] fff00000c5777f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.390513] >fff00000c5778000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.390722] ^ [ 32.391511] fff00000c5778080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.391634] fff00000c5778100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.392147] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 32.356401] ================================================================== [ 32.356480] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 32.356550] Read of size 1 at addr fff00000c5778000 by task kunit_try_catch/160 [ 32.356608] [ 32.356648] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 32.356749] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.356779] Hardware name: linux,dummy-virt (DT) [ 32.356816] Call trace: [ 32.356843] show_stack+0x20/0x38 (C) [ 32.356905] dump_stack_lvl+0x8c/0xd0 [ 32.356962] print_report+0x118/0x608 [ 32.357020] kasan_report+0xdc/0x128 [ 32.357106] __asan_report_load1_noabort+0x20/0x30 [ 32.357164] kmalloc_large_uaf+0x2cc/0x2f8 [ 32.357218] kunit_try_run_case+0x170/0x3f0 [ 32.357275] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.357336] kthread+0x328/0x630 [ 32.357386] ret_from_fork+0x10/0x20 [ 32.357443] [ 32.357469] The buggy address belongs to the physical page: [ 32.357504] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105778 [ 32.357562] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.357636] raw: 0bfffe0000000000 ffffc1ffc315df08 fff00000da496c80 0000000000000000 [ 32.357693] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 32.357739] page dumped because: kasan: bad access detected [ 32.357776] [ 32.357797] Memory state around the buggy address: [ 32.357834] fff00000c5777f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.357884] fff00000c5777f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.357932] >fff00000c5778000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.357974] ^ [ 32.358007] fff00000c5778080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.358135] fff00000c5778100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.358236] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 32.322115] ================================================================== [ 32.322384] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 32.322530] Write of size 1 at addr fff00000c577a00a by task kunit_try_catch/158 [ 32.322659] [ 32.322751] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 32.322993] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.323152] Hardware name: linux,dummy-virt (DT) [ 32.323399] Call trace: [ 32.323469] show_stack+0x20/0x38 (C) [ 32.323592] dump_stack_lvl+0x8c/0xd0 [ 32.323718] print_report+0x118/0x608 [ 32.324100] kasan_report+0xdc/0x128 [ 32.324243] __asan_report_store1_noabort+0x20/0x30 [ 32.324595] kmalloc_large_oob_right+0x278/0x2b8 [ 32.324789] kunit_try_run_case+0x170/0x3f0 [ 32.325372] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.325826] kthread+0x328/0x630 [ 32.326116] ret_from_fork+0x10/0x20 [ 32.326374] [ 32.326675] The buggy address belongs to the physical page: [ 32.326782] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105778 [ 32.326906] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.327009] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.327235] page_type: f8(unknown) [ 32.327341] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.327487] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.327605] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.327789] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.328005] head: 0bfffe0000000002 ffffc1ffc315de01 00000000ffffffff 00000000ffffffff [ 32.328170] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.328335] page dumped because: kasan: bad access detected [ 32.328408] [ 32.328451] Memory state around the buggy address: [ 32.328603] fff00000c5779f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.328748] fff00000c5779f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.328891] >fff00000c577a000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.329062] ^ [ 32.329150] fff00000c577a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.329327] fff00000c577a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.329455] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 32.289464] ================================================================== [ 32.289583] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 32.289715] Write of size 1 at addr fff00000c64f5f00 by task kunit_try_catch/156 [ 32.289824] [ 32.289898] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 32.291005] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.291094] Hardware name: linux,dummy-virt (DT) [ 32.291173] Call trace: [ 32.291248] show_stack+0x20/0x38 (C) [ 32.291838] dump_stack_lvl+0x8c/0xd0 [ 32.292072] print_report+0x118/0x608 [ 32.292207] kasan_report+0xdc/0x128 [ 32.292539] __asan_report_store1_noabort+0x20/0x30 [ 32.292689] kmalloc_big_oob_right+0x2a4/0x2f0 [ 32.292802] kunit_try_run_case+0x170/0x3f0 [ 32.293151] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.293496] kthread+0x328/0x630 [ 32.293734] ret_from_fork+0x10/0x20 [ 32.293940] [ 32.293989] Allocated by task 156: [ 32.294077] kasan_save_stack+0x3c/0x68 [ 32.294193] kasan_save_track+0x20/0x40 [ 32.294287] kasan_save_alloc_info+0x40/0x58 [ 32.294391] __kasan_kmalloc+0xd4/0xd8 [ 32.294497] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.294603] kmalloc_big_oob_right+0xb8/0x2f0 [ 32.294768] kunit_try_run_case+0x170/0x3f0 [ 32.295041] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.295158] kthread+0x328/0x630 [ 32.295264] ret_from_fork+0x10/0x20 [ 32.295480] [ 32.295533] The buggy address belongs to the object at fff00000c64f4000 [ 32.295533] which belongs to the cache kmalloc-8k of size 8192 [ 32.295935] The buggy address is located 0 bytes to the right of [ 32.295935] allocated 7936-byte region [fff00000c64f4000, fff00000c64f5f00) [ 32.296344] [ 32.296471] The buggy address belongs to the physical page: [ 32.296546] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f0 [ 32.296666] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.297150] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.297508] page_type: f5(slab) [ 32.297695] raw: 0bfffe0000000040 fff00000c0002280 dead000000000100 dead000000000122 [ 32.297808] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 32.297921] head: 0bfffe0000000040 fff00000c0002280 dead000000000100 dead000000000122 [ 32.298051] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 32.298859] head: 0bfffe0000000003 ffffc1ffc3193c01 00000000ffffffff 00000000ffffffff [ 32.299043] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 32.299272] page dumped because: kasan: bad access detected [ 32.299579] [ 32.299641] Memory state around the buggy address: [ 32.299955] fff00000c64f5e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.300474] fff00000c64f5e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.300586] >fff00000c64f5f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.300817] ^ [ 32.300924] fff00000c64f5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.301363] fff00000c64f6000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.301471] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[ 32.245869] ================================================================== [ 32.246699] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 32.246882] Write of size 1 at addr fff00000c56e8e78 by task kunit_try_catch/154 [ 32.246958] [ 32.247002] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 32.247175] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.247209] Hardware name: linux,dummy-virt (DT) [ 32.247248] Call trace: [ 32.247275] show_stack+0x20/0x38 (C) [ 32.247340] dump_stack_lvl+0x8c/0xd0 [ 32.247398] print_report+0x118/0x608 [ 32.247456] kasan_report+0xdc/0x128 [ 32.247510] __asan_report_store1_noabort+0x20/0x30 [ 32.247566] kmalloc_track_caller_oob_right+0x40c/0x488 [ 32.247625] kunit_try_run_case+0x170/0x3f0 [ 32.247683] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.247744] kthread+0x328/0x630 [ 32.247794] ret_from_fork+0x10/0x20 [ 32.247851] [ 32.247874] Allocated by task 154: [ 32.247908] kasan_save_stack+0x3c/0x68 [ 32.247959] kasan_save_track+0x20/0x40 [ 32.248005] kasan_save_alloc_info+0x40/0x58 [ 32.248077] __kasan_kmalloc+0xd4/0xd8 [ 32.248126] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 32.248181] kmalloc_track_caller_oob_right+0xa8/0x488 [ 32.248231] kunit_try_run_case+0x170/0x3f0 [ 32.248275] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.248326] kthread+0x328/0x630 [ 32.248363] ret_from_fork+0x10/0x20 [ 32.248404] [ 32.248427] The buggy address belongs to the object at fff00000c56e8e00 [ 32.248427] which belongs to the cache kmalloc-128 of size 128 [ 32.248494] The buggy address is located 0 bytes to the right of [ 32.248494] allocated 120-byte region [fff00000c56e8e00, fff00000c56e8e78) [ 32.248566] [ 32.248589] The buggy address belongs to the physical page: [ 32.248625] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e8 [ 32.248686] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.248747] page_type: f5(slab) [ 32.248793] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 32.248849] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.248895] page dumped because: kasan: bad access detected [ 32.248929] [ 32.248949] Memory state around the buggy address: [ 32.248985] fff00000c56e8d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.249190] fff00000c56e8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.249341] >fff00000c56e8e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.249435] ^ [ 32.250483] fff00000c56e8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.250655] fff00000c56e8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.250785] ================================================================== [ 32.252433] ================================================================== [ 32.252522] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488 [ 32.252647] Write of size 1 at addr fff00000c56e8f78 by task kunit_try_catch/154 [ 32.252780] [ 32.253335] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 32.253962] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.254090] Hardware name: linux,dummy-virt (DT) [ 32.254306] Call trace: [ 32.254362] show_stack+0x20/0x38 (C) [ 32.254476] dump_stack_lvl+0x8c/0xd0 [ 32.254644] print_report+0x118/0x608 [ 32.254799] kasan_report+0xdc/0x128 [ 32.255182] __asan_report_store1_noabort+0x20/0x30 [ 32.255319] kmalloc_track_caller_oob_right+0x418/0x488 [ 32.255465] kunit_try_run_case+0x170/0x3f0 [ 32.256455] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.256597] kthread+0x328/0x630 [ 32.257003] ret_from_fork+0x10/0x20 [ 32.257672] [ 32.257731] Allocated by task 154: [ 32.257828] kasan_save_stack+0x3c/0x68 [ 32.257998] kasan_save_track+0x20/0x40 [ 32.258246] kasan_save_alloc_info+0x40/0x58 [ 32.258362] __kasan_kmalloc+0xd4/0xd8 [ 32.258677] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 32.258831] kmalloc_track_caller_oob_right+0x184/0x488 [ 32.258998] kunit_try_run_case+0x170/0x3f0 [ 32.259224] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.259451] kthread+0x328/0x630 [ 32.259753] ret_from_fork+0x10/0x20 [ 32.259857] [ 32.260014] The buggy address belongs to the object at fff00000c56e8f00 [ 32.260014] which belongs to the cache kmalloc-128 of size 128 [ 32.260207] The buggy address is located 0 bytes to the right of [ 32.260207] allocated 120-byte region [fff00000c56e8f00, fff00000c56e8f78) [ 32.260443] [ 32.260496] The buggy address belongs to the physical page: [ 32.260760] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056e8 [ 32.261061] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.261351] page_type: f5(slab) [ 32.261718] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 32.261891] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.262061] page dumped because: kasan: bad access detected [ 32.262243] [ 32.262340] Memory state around the buggy address: [ 32.262705] fff00000c56e8e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.262872] fff00000c56e8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.262979] >fff00000c56e8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.263084] ^ [ 32.263183] fff00000c56e8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.263285] fff00000c56e9000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.263422] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 32.210060] ================================================================== [ 32.210190] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 32.210315] Read of size 1 at addr fff00000c76e9000 by task kunit_try_catch/152 [ 32.210426] [ 32.210499] CPU: 1 UID: 0 PID: 152 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 32.210690] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.210761] Hardware name: linux,dummy-virt (DT) [ 32.210835] Call trace: [ 32.210897] show_stack+0x20/0x38 (C) [ 32.211234] dump_stack_lvl+0x8c/0xd0 [ 32.211406] print_report+0x118/0x608 [ 32.211530] kasan_report+0xdc/0x128 [ 32.211638] __asan_report_load1_noabort+0x20/0x30 [ 32.211754] kmalloc_node_oob_right+0x2f4/0x330 [ 32.211882] kunit_try_run_case+0x170/0x3f0 [ 32.212923] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.213111] kthread+0x328/0x630 [ 32.214204] ret_from_fork+0x10/0x20 [ 32.214342] [ 32.214655] Allocated by task 152: [ 32.214882] kasan_save_stack+0x3c/0x68 [ 32.215008] kasan_save_track+0x20/0x40 [ 32.215445] kasan_save_alloc_info+0x40/0x58 [ 32.215644] __kasan_kmalloc+0xd4/0xd8 [ 32.215865] __kmalloc_cache_node_noprof+0x178/0x3d0 [ 32.216046] kmalloc_node_oob_right+0xbc/0x330 [ 32.216144] kunit_try_run_case+0x170/0x3f0 [ 32.217182] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.217659] kthread+0x328/0x630 [ 32.217749] ret_from_fork+0x10/0x20 [ 32.217854] [ 32.217902] The buggy address belongs to the object at fff00000c76e8000 [ 32.217902] which belongs to the cache kmalloc-4k of size 4096 [ 32.218049] The buggy address is located 0 bytes to the right of [ 32.218049] allocated 4096-byte region [fff00000c76e8000, fff00000c76e9000) [ 32.218211] [ 32.218344] The buggy address belongs to the physical page: [ 32.218482] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1076e8 [ 32.219862] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.220239] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.220622] page_type: f5(slab) [ 32.220740] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 32.220856] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 32.221090] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 32.221447] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 32.221634] head: 0bfffe0000000003 ffffc1ffc31dba01 00000000ffffffff 00000000ffffffff [ 32.221769] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 32.221877] page dumped because: kasan: bad access detected [ 32.221953] [ 32.222266] Memory state around the buggy address: [ 32.222360] fff00000c76e8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.222471] fff00000c76e8f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.223533] >fff00000c76e9000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.223633] ^ [ 32.224176] fff00000c76e9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.224315] fff00000c76e9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.224405] ==================================================================
Failure - log-parser-boot - exception-warning-libmathint_log-at-intlog10
------------[ cut here ]------------ [ 119.957471] WARNING: lib/math/int_log.c:120 at intlog10+0x38/0x48, CPU#1: kunit_try_catch/670 [ 119.959421] Modules linked in: [ 119.960392] CPU: 1 UID: 0 PID: 670 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 119.961504] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 119.962187] Hardware name: linux,dummy-virt (DT) [ 119.962702] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 119.963494] pc : intlog10+0x38/0x48 [ 119.964067] lr : intlog10_test+0xe4/0x200 [ 119.964626] sp : ffff8000824a7c10 [ 119.965111] x29: ffff8000824a7c90 x28: 0000000000000000 x27: 0000000000000000 [ 119.966083] x26: 1ffe000018effca1 x25: 0000000000000000 x24: ffff8000824a7ce0 [ 119.967054] x23: ffff8000824a7d00 x22: 0000000000000000 x21: 1ffff00010494f82 [ 119.968005] x20: ffffa42cfb1ccaa0 x19: ffff800080087990 x18: 00000000e0b7aac4 [ 119.968961] x17: 000000008580d5f9 x16: 000000003d420f14 x15: 00000000aee485a7 [ 119.969904] x14: 00000000b7956979 x13: 0000000000000005 x12: ffff74859fe04189 [ 119.970861] x11: 1ffff4859fe04188 x10: ffff74859fe04188 x9 : ffffa42cf883bd4c [ 119.971807] x8 : ffffa42cff020c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 119.972666] x5 : ffff700010494f82 x4 : 1ffff00010010f3a x3 : 1ffff4859f639954 [ 119.974141] x2 : 1ffff4859f639954 x1 : 0000000000000003 x0 : 0000000000000000 [ 119.975586] Call trace: [ 119.975876] intlog10+0x38/0x48 (P) [ 119.976463] kunit_try_run_case+0x170/0x3f0 [ 119.976963] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 119.977713] kthread+0x328/0x630 [ 119.978234] ret_from_fork+0x10/0x20 [ 119.978737] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-libmathint_log-at-intlog2
------------[ cut here ]------------ [ 119.871618] WARNING: lib/math/int_log.c:63 at intlog2+0xd8/0xf8, CPU#0: kunit_try_catch/652 [ 119.873227] Modules linked in: [ 119.873715] CPU: 0 UID: 0 PID: 652 Comm: kunit_try_catch Tainted: G B D N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 119.874824] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 119.875448] Hardware name: linux,dummy-virt (DT) [ 119.876343] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 119.877537] pc : intlog2+0xd8/0xf8 [ 119.878006] lr : intlog2_test+0xe4/0x200 [ 119.878599] sp : ffff800082377c10 [ 119.879288] x29: ffff800082377c90 x28: 0000000000000000 x27: 0000000000000000 [ 119.880288] x26: 1ffe000018f206c1 x25: 0000000000000000 x24: ffff800082377ce0 [ 119.881380] x23: ffff800082377d00 x22: 0000000000000000 x21: 1ffff0001046ef82 [ 119.882278] x20: ffffa42cfb1cc9a0 x19: ffff800080087990 x18: 00000000c5d65f4c [ 119.883303] x17: 000000000984d305 x16: fff00000c5ea283c x15: fff00000ff616b08 [ 119.884253] x14: 0000000000018fff x13: 1ffe00001b48e189 x12: ffff74859fe04189 [ 119.885321] x11: 1ffff4859fe04188 x10: ffff74859fe04188 x9 : ffffa42cf883bf4c [ 119.886272] x8 : ffffa42cff020c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 119.887301] x5 : ffff70001046ef82 x4 : 1ffff00010010f3a x3 : 1ffff4859f639934 [ 119.888689] x2 : 1ffff4859f639934 x1 : 0000000000000003 x0 : 0000000000000000 [ 119.889662] Call trace: [ 119.890078] intlog2+0xd8/0xf8 (P) [ 119.890958] kunit_try_run_case+0x170/0x3f0 [ 119.891516] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 119.892156] kthread+0x328/0x630 [ 119.892568] ret_from_fork+0x10/0x20 [ 119.893147] ---[ end trace 0000000000000000 ]---
Failure - kunit - lib_ratelimit_lib_ratelimit
<8>[ 452.896860] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=lib_ratelimit_lib_ratelimit RESULT=fail>
Failure - kunit - lib_ratelimit_test_ratelimit_smoke
<8>[ 452.537262] <LAVA_SIGNAL_TESTCASE TEST_CASE_ID=lib_ratelimit_test_ratelimit_smoke RESULT=fail>
Failure - log-parser-boot - internal-error-oops-oops-smp
KNOWN ISSUE - LKFT: Dragonboard 845c: Internal error: Oops: ufs_qcom_setup_clocks
[ 118.565105] Internal error: Oops: 0000000096000005 [#1] SMP [ 118.578888] Modules linked in: [ 118.579985] CPU: 0 UID: 0 PID: 544 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250623 #1 PREEMPT [ 118.582747] Tainted: [B]=BAD_PAGE, [N]=TEST [ 118.583879] Hardware name: linux,dummy-virt (DT) [ 118.584862] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 118.585693] pc : kunit_test_null_dereference+0x70/0x170 [ 118.586211] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 118.587297] sp : ffff8000820f7d30 [ 118.587696] x29: ffff8000820f7d90 x28: 0000000000000000 x27: 0000000000000000 [ 118.588706] x26: 1ffe000018c8dd41 x25: 0000000000000000 x24: 0000000000000004 [ 118.589883] x23: fff00000c646ea0c x22: ffffa42cf88287f0 x21: fff00000c43ddf08 [ 118.591438] x20: 1ffff0001041efa6 x19: ffff800080087990 x18: 00000000a37a9bc2 [ 118.592411] x17: 0000000000000001 x16: fff00000c5ea283c x15: fff00000ff616b08 [ 118.593341] x14: 0000000000018fff x13: 1ffe00001b4925cd x12: fffd8000193538b4 [ 118.594140] x11: 1ffe0000193538b3 x10: fffd8000193538b3 x9 : ffffa42cf881ff98 [ 118.595207] x8 : ffff8000820f7c18 x7 : 0000000000000001 x6 : 0000000041b58ab3 [ 118.596158] x5 : ffff70001041efa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 118.597734] x2 : dfff800000000000 x1 : fff00000c9a9bcc0 x0 : ffff800080087990 [ 118.598505] Call trace: [ 118.599240] kunit_test_null_dereference+0x70/0x170 (P) [ 118.599856] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 118.600555] kthread+0x328/0x630 [ 118.601098] ret_from_fork+0x10/0x20 [ 118.602088] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 118.603318] ---[ end trace 0000000000000000 ]---