Date
June 24, 2025, 11:37 a.m.
Failure - log-parser-boot - internal-error-oops-oops-smp
[ 123.147341] Internal error: Oops: 0000000096000005 [#1] SMP [ 123.153074] Modules linked in: [ 123.156195] CPU: 4 UID: 0 PID: 631 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 123.167466] Tainted: [B]=BAD_PAGE, [N]=TEST [ 123.171708] Hardware name: Thundercomm Dragonboard 845c (DT) [ 123.177439] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 123.184493] pc : kunit_test_null_dereference+0x70/0x170 [ 123.189811] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 123.195730] sp : ffff800085ff7d30 [ 123.199097] x29: ffff800085ff7d90 x28: 0000000000000000 x27: 0000000000000000 [ 123.206342] x26: 1fffe000128f8ec1 x25: 0000000000000000 x24: 0000000000000004 [ 123.213580] x23: ffff0000947c760c x22: ffffae1d5d82a688 x21: ffff000094649a88 [ 123.220820] x20: 1ffff00010bfefa6 x19: ffff8000800a7990 x18: 00000000a6c4e74d [ 123.228059] x17: 000000040044ffff x16: 005000f4b5503510 x15: 0000000000000000 [ 123.235301] x14: ffff0000808ed100 x13: ffff51e378d28000 x12: ffff6000106108b4 [ 123.242541] x11: 1fffe000106108b3 x10: ffff6000106108b3 x9 : ffffae1d5d821e30 [ 123.249781] x8 : ffff800085ff7c18 x7 : 0000000000000000 x6 : 0000000041b58ab3 [ 123.257018] x5 : ffff700010bfefa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 123.264255] x2 : dfff800000000000 x1 : ffff000083083cc0 x0 : ffff8000800a7990 [ 123.271493] Call trace: [ 123.273983] kunit_test_null_dereference+0x70/0x170 (P) [ 123.279286] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 123.284847] kthread+0x328/0x630 [ 123.288132] ret_from_fork+0x10/0x20 [ 123.291785] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 123.297968] ---[ end trace 0000000000000000 ]--- [ 209.015722] Internal error: Oops: 0000000096000005 [#2] SMP [ 209.015737] Modules linked in: qcom_rng(+) videobuf2_common(+) gpi(+) typec qrtr stm_core cfg80211(+) qcom_q6v5_mss qcrypto ufs_qcom(+) slim_qcom_ngd_ctrl(+) phy_qcom_qmp_ufs icc_osm_l3 phy_qcom_qmp_pcie lmh display_connector qcom_q6v5_pas(+) rfkill qcom_pil_info slimbus drm_kms_helper qcom_q6v5 pdr_interface qcom_wdt qcom_pdr_msg qcom_sysmon qcom_common icc_bwmon drm llcc_qcom qcom_glink_smem mdt_loader qmi_helpers backlight socinfo rmtfs_mem [ 209.015930] CPU: 4 UID: 0 PID: 3564 Comm: (udev-worker) Tainted: G B D W N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 209.015960] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 209.015968] Hardware name: Thundercomm Dragonboard 845c (DT) [ 209.015978] pstate: 20400005 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 209.015994] pc : ufs_qcom_setup_clocks+0x50/0x270 [ufs_qcom] [ 209.016029] lr : ufshcd_setup_clocks+0xc0/0xd28 [ 209.016051] sp : ffff80008ef76de0 [ 209.016058] x29: ffff80008ef76de0 x28: 1fffe00010a94127 x27: ffff0000854a0870 [ 209.016084] x26: ffff0000854a12a0 x25: 1ffff00011deedf6 x24: ffff0000854a0870 [ 209.016106] x23: ffff0000854a1280 x22: 0000000000000001 x21: ffff0000854a1298 [ 209.016128] x20: 0000000000000000 x19: ffff0000854a0870 x18: ffff000083310218 [ 209.016150] x17: 0000000000000000 x16: 0000000000000000 x15: ffffae1d5c995db4 [ 209.016171] x14: ffffae1d5c99582c x13: ffffae1d5ff35da4 x12: ffff75c3ac812189 [ 209.016191] x11: 1ffff5c3ac812188 x10: ffff75c3ac812188 x9 : ffffae1d5f442338 [ 209.016213] x8 : ffffae1d64090c43 x7 : 0000000000000001 x6 : ffff75c3ac812188 [ 209.016233] x5 : ffffae1d64090c40 x4 : 1fffe00010a94125 x3 : 0000000000000000 [ 209.016254] x2 : 0000000000000000 x1 : 0000000000000001 x0 : dfff800000000000 [ 209.016276] Call trace: [ 209.016285] ufs_qcom_setup_clocks+0x50/0x270 [ufs_qcom] (P) [ 209.016313] ufshcd_setup_clocks+0xc0/0xd28 [ 209.016329] ufshcd_init+0x5c0/0x3690 [ 209.016348] ufshcd_pltfrm_init+0x868/0xf10 [ 209.016366] ufs_qcom_probe+0x2c/0x68 [ufs_qcom] [ 209.016389] platform_probe+0xcc/0x198 [ 209.016409] really_probe+0x188/0x7f0 [ 209.016424] __driver_probe_device+0x164/0x378 [ 209.016441] driver_probe_device+0x64/0x180 [ 209.016454] __driver_attach+0x1cc/0x478 [ 209.016468] bus_for_each_dev+0x10c/0x1a0 [ 209.016487] driver_attach+0x44/0x68 [ 209.016500] bus_add_driver+0x23c/0x4e8 [ 209.016519] driver_register+0xf8/0x3d0 [ 209.016533] __platform_driver_register+0x64/0x98 [ 209.016550] ufs_qcom_pltform_init+0x28/0xff8 [ufs_qcom] [ 209.016574] do_one_initcall+0xcc/0x610 [ 209.016592] do_init_module+0x234/0x730 [ 209.016613] load_module+0x4afc/0x5e20 [ 209.016630] init_module_from_file+0xec/0x158 [ 209.016648] __arm64_sys_finit_module+0x434/0x790 [ 209.016666] invoke_syscall+0x74/0x268 [ 209.016682] el0_svc_common.constprop.0+0xb4/0x240 [ 209.016697] do_el0_svc+0x48/0x68 [ 209.016710] el0_svc+0x38/0xb8 [ 209.016730] el0t_64_sync_handler+0x10c/0x138 [ 209.016749] el0t_64_sync+0x198/0x1a0 [ 209.016769] Code: f9405e74 d2d00000 f2fbffe0 d343fe83 (38e06860) [ 209.016781] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[ 110.483167] ================================================================== [ 110.490494] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 110.490494] [ 110.498882] Use-after-free read at 0x000000000955ff11 (in kfence-#60): [ 110.505502] test_krealloc+0x51c/0x830 [ 110.509329] kunit_try_run_case+0x170/0x3f0 [ 110.513594] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 110.519169] kthread+0x328/0x630 [ 110.522461] ret_from_fork+0x10/0x20 [ 110.526104] [ 110.527637] kfence-#60: 0x000000000955ff11-0x00000000995ea25e, size=32, cache=kmalloc-32 [ 110.527637] [ 110.537327] allocated by task 435 on cpu 3 at 110.483101s (0.054225s ago): [ 110.544318] test_alloc+0x29c/0x628 [ 110.547875] test_krealloc+0xc0/0x830 [ 110.551604] kunit_try_run_case+0x170/0x3f0 [ 110.555858] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 110.561425] kthread+0x328/0x630 [ 110.564718] ret_from_fork+0x10/0x20 [ 110.568364] [ 110.569896] freed by task 435 on cpu 3 at 110.483122s (0.086772s ago): [ 110.576524] krealloc_noprof+0x148/0x360 [ 110.580520] test_krealloc+0x1dc/0x830 [ 110.584337] kunit_try_run_case+0x170/0x3f0 [ 110.588592] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 110.594159] kthread+0x328/0x630 [ 110.597453] ret_from_fork+0x10/0x20 [ 110.601097] [ 110.602638] CPU: 3 UID: 0 PID: 435 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 110.613909] Tainted: [B]=BAD_PAGE, [N]=TEST [ 110.618159] Hardware name: Thundercomm Dragonboard 845c (DT) [ 110.623901] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[ 110.231198] ================================================================== [ 110.238558] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 110.238558] [ 110.248353] Use-after-free read at 0x000000007ada8e89 (in kfence-#58): [ 110.254968] test_memcache_typesafe_by_rcu+0x280/0x560 [ 110.260184] kunit_try_run_case+0x170/0x3f0 [ 110.264442] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 110.270013] kthread+0x328/0x630 [ 110.273301] ret_from_fork+0x10/0x20 [ 110.276940] [ 110.278467] kfence-#58: 0x000000007ada8e89-0x000000004de71c8c, size=32, cache=test [ 110.278467] [ 110.287628] allocated by task 433 on cpu 4 at 110.180926s (0.106700s ago): [ 110.294611] test_alloc+0x230/0x628 [ 110.298160] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 110.303370] kunit_try_run_case+0x170/0x3f0 [ 110.307623] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 110.313191] kthread+0x328/0x630 [ 110.316477] ret_from_fork+0x10/0x20 [ 110.320110] [ 110.321635] freed by task 433 on cpu 4 at 110.180936s (0.140697s ago): [ 110.328250] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 110.333460] kunit_try_run_case+0x170/0x3f0 [ 110.337714] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 110.343282] kthread+0x328/0x630 [ 110.346567] ret_from_fork+0x10/0x20 [ 110.350202] [ 110.351734] CPU: 5 UID: 0 PID: 433 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 110.363001] Tainted: [B]=BAD_PAGE, [N]=TEST [ 110.367249] Hardware name: Thundercomm Dragonboard 845c (DT) [ 110.372990] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[ 89.175964] ================================================================== [ 89.187372] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 89.187372] [ 89.195622] Invalid read at 0x0000000056174ab1: [ 89.200263] test_invalid_access+0xdc/0x1f0 [ 89.205385] kunit_try_run_case+0x170/0x3f0 [ 89.209706] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 89.215299] kthread+0x328/0x630 [ 89.218596] ret_from_fork+0x10/0x20 [ 89.222250] [ 89.223810] CPU: 5 UID: 0 PID: 429 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 89.235099] Tainted: [B]=BAD_PAGE, [N]=TEST [ 89.239358] Hardware name: Thundercomm Dragonboard 845c (DT) [ 89.245115] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[ 88.807235] ================================================================== [ 88.814585] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 88.814585] [ 88.824279] Corrupted memory at 0x00000000872b9ec7 [ ! . . . . . . . . . . . . . . . ] (in kfence-#41): [ 88.833914] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 88.839218] kunit_try_run_case+0x170/0x3f0 [ 88.843477] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 88.849046] kthread+0x328/0x630 [ 88.852334] ret_from_fork+0x10/0x20 [ 88.855972] [ 88.857498] kfence-#41: 0x00000000ef1c4856-0x000000001879bfaf, size=73, cache=kmalloc-96 [ 88.857498] [ 88.867180] allocated by task 423 on cpu 5 at 88.807186s (0.059991s ago): [ 88.874070] test_alloc+0x29c/0x628 [ 88.877621] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 88.882832] kunit_try_run_case+0x170/0x3f0 [ 88.887086] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 88.892653] kthread+0x328/0x630 [ 88.895939] ret_from_fork+0x10/0x20 [ 88.899573] [ 88.901096] freed by task 423 on cpu 5 at 88.807195s (0.093899s ago): [ 88.907627] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 88.912925] kunit_try_run_case+0x170/0x3f0 [ 88.917177] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 88.922745] kthread+0x328/0x630 [ 88.926031] ret_from_fork+0x10/0x20 [ 88.929666] [ 88.931197] CPU: 5 UID: 0 PID: 423 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 88.942464] Tainted: [B]=BAD_PAGE, [N]=TEST [ 88.946712] Hardware name: Thundercomm Dragonboard 845c (DT) [ 88.952450] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[ 88.271217] ================================================================== [ 88.278566] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 88.278566] [ 88.288273] Out-of-bounds read at 0x00000000af97c6b6 (105B right of kfence-#36): [ 88.295769] test_kmalloc_aligned_oob_read+0x238/0x468 [ 88.300988] kunit_try_run_case+0x170/0x3f0 [ 88.305246] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 88.310817] kthread+0x328/0x630 [ 88.314105] ret_from_fork+0x10/0x20 [ 88.317744] [ 88.319271] kfence-#36: 0x000000000f436cf1-0x0000000049478458, size=73, cache=kmalloc-96 [ 88.319271] [ 88.328955] allocated by task 421 on cpu 7 at 88.271191s (0.057762s ago): [ 88.335849] test_alloc+0x29c/0x628 [ 88.339399] test_kmalloc_aligned_oob_read+0x100/0x468 [ 88.344611] kunit_try_run_case+0x170/0x3f0 [ 88.348864] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 88.354432] kthread+0x328/0x630 [ 88.357717] ret_from_fork+0x10/0x20 [ 88.361352] [ 88.362882] CPU: 7 UID: 0 PID: 421 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 88.374149] Tainted: [B]=BAD_PAGE, [N]=TEST [ 88.378397] Hardware name: Thundercomm Dragonboard 845c (DT) [ 88.384134] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[ 83.135216] ================================================================== [ 83.142572] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 83.142572] [ 83.150947] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#213): [ 83.157949] test_corruption+0x1d8/0x378 [ 83.161938] kunit_try_run_case+0x170/0x3f0 [ 83.166196] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 83.171765] kthread+0x328/0x630 [ 83.175053] ret_from_fork+0x10/0x20 [ 83.178691] [ 83.180217] kfence-#213: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 83.180217] [ 83.189456] allocated by task 411 on cpu 5 at 83.135166s (0.054289s ago): [ 83.196345] test_alloc+0x230/0x628 [ 83.199894] test_corruption+0x198/0x378 [ 83.203878] kunit_try_run_case+0x170/0x3f0 [ 83.208130] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 83.213698] kthread+0x328/0x630 [ 83.216984] ret_from_fork+0x10/0x20 [ 83.220619] [ 83.222144] freed by task 411 on cpu 5 at 83.135175s (0.086967s ago): [ 83.228674] test_corruption+0x1d8/0x378 [ 83.232658] kunit_try_run_case+0x170/0x3f0 [ 83.236910] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 83.242478] kthread+0x328/0x630 [ 83.245763] ret_from_fork+0x10/0x20 [ 83.249398] [ 83.250927] CPU: 5 UID: 0 PID: 411 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 83.262196] Tainted: [B]=BAD_PAGE, [N]=TEST [ 83.266443] Hardware name: Thundercomm Dragonboard 845c (DT) [ 83.272181] ================================================================== [ 82.535265] ================================================================== [ 82.542620] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 82.542620] [ 82.550998] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#208): [ 82.558001] test_corruption+0x284/0x378 [ 82.561989] kunit_try_run_case+0x170/0x3f0 [ 82.566248] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 82.571818] kthread+0x328/0x630 [ 82.575106] ret_from_fork+0x10/0x20 [ 82.578743] [ 82.580269] kfence-#208: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 82.580269] [ 82.590040] allocated by task 409 on cpu 5 at 82.535214s (0.054823s ago): [ 82.596928] test_alloc+0x29c/0x628 [ 82.600477] test_corruption+0x198/0x378 [ 82.604461] kunit_try_run_case+0x170/0x3f0 [ 82.608714] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 82.614282] kthread+0x328/0x630 [ 82.617567] ret_from_fork+0x10/0x20 [ 82.621201] [ 82.622726] freed by task 409 on cpu 5 at 82.535225s (0.087499s ago): [ 82.629257] test_corruption+0x284/0x378 [ 82.633240] kunit_try_run_case+0x170/0x3f0 [ 82.637492] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 82.643058] kthread+0x328/0x630 [ 82.646343] ret_from_fork+0x10/0x20 [ 82.649977] [ 82.651508] CPU: 5 UID: 0 PID: 409 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 82.662776] Tainted: [B]=BAD_PAGE, [N]=TEST [ 82.667024] Hardware name: Thundercomm Dragonboard 845c (DT) [ 82.672762] ================================================================== [ 82.783180] ================================================================== [ 82.790509] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 82.790509] [ 82.798888] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#210): [ 82.808607] test_corruption+0x120/0x378 [ 82.812596] kunit_try_run_case+0x170/0x3f0 [ 82.816854] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 82.822424] kthread+0x328/0x630 [ 82.825712] ret_from_fork+0x10/0x20 [ 82.829349] [ 82.830875] kfence-#210: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 82.830875] [ 82.840114] allocated by task 411 on cpu 5 at 82.783139s (0.056973s ago): [ 82.847005] test_alloc+0x230/0x628 [ 82.850554] test_corruption+0xdc/0x378 [ 82.854451] kunit_try_run_case+0x170/0x3f0 [ 82.858704] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 82.864271] kthread+0x328/0x630 [ 82.867557] ret_from_fork+0x10/0x20 [ 82.871191] [ 82.872716] freed by task 411 on cpu 5 at 82.783149s (0.089565s ago): [ 82.879247] test_corruption+0x120/0x378 [ 82.883232] kunit_try_run_case+0x170/0x3f0 [ 82.887484] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 82.893052] kthread+0x328/0x630 [ 82.896337] ret_from_fork+0x10/0x20 [ 82.899972] [ 82.901501] CPU: 5 UID: 0 PID: 411 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 82.912767] Tainted: [B]=BAD_PAGE, [N]=TEST [ 82.917016] Hardware name: Thundercomm Dragonboard 845c (DT) [ 82.922751] ================================================================== [ 82.075232] ================================================================== [ 82.082588] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 82.082588] [ 82.090966] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#204): [ 82.100688] test_corruption+0x278/0x378 [ 82.104678] kunit_try_run_case+0x170/0x3f0 [ 82.108937] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 82.114507] kthread+0x328/0x630 [ 82.117796] ret_from_fork+0x10/0x20 [ 82.121435] [ 82.122963] kfence-#204: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 82.122963] [ 82.132731] allocated by task 409 on cpu 5 at 82.075182s (0.057548s ago): [ 82.139620] test_alloc+0x29c/0x628 [ 82.143169] test_corruption+0xdc/0x378 [ 82.147066] kunit_try_run_case+0x170/0x3f0 [ 82.151320] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 82.156888] kthread+0x328/0x630 [ 82.160173] ret_from_fork+0x10/0x20 [ 82.163807] [ 82.165330] freed by task 409 on cpu 5 at 82.075191s (0.090137s ago): [ 82.171861] test_corruption+0x278/0x378 [ 82.175846] kunit_try_run_case+0x170/0x3f0 [ 82.180099] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 82.185666] kthread+0x328/0x630 [ 82.188952] ret_from_fork+0x10/0x20 [ 82.192586] [ 82.194117] CPU: 5 UID: 0 PID: 409 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 82.205385] Tainted: [B]=BAD_PAGE, [N]=TEST [ 82.209633] Hardware name: Thundercomm Dragonboard 845c (DT) [ 82.215372] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[ 81.647195] ================================================================== [ 81.654527] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 81.654527] [ 81.662989] Invalid free of 0x(____ptrval____) (in kfence-#200): [ 81.669080] test_invalid_addr_free+0xec/0x238 [ 81.673600] kunit_try_run_case+0x170/0x3f0 [ 81.677858] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 81.683428] kthread+0x328/0x630 [ 81.686716] ret_from_fork+0x10/0x20 [ 81.690353] [ 81.691880] kfence-#200: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 81.691880] [ 81.701119] allocated by task 407 on cpu 4 at 81.647159s (0.053958s ago): [ 81.708008] test_alloc+0x230/0x628 [ 81.711557] test_invalid_addr_free+0xd4/0x238 [ 81.716074] kunit_try_run_case+0x170/0x3f0 [ 81.720327] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 81.725894] kthread+0x328/0x630 [ 81.729178] ret_from_fork+0x10/0x20 [ 81.732813] [ 81.734345] CPU: 4 UID: 0 PID: 407 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 81.745610] Tainted: [B]=BAD_PAGE, [N]=TEST [ 81.749858] Hardware name: Thundercomm Dragonboard 845c (DT) [ 81.755597] ================================================================== [ 81.427194] ================================================================== [ 81.434544] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 81.434544] [ 81.443100] Invalid free of 0x(____ptrval____) (in kfence-#198): [ 81.449195] test_invalid_addr_free+0x1ac/0x238 [ 81.453803] kunit_try_run_case+0x170/0x3f0 [ 81.458063] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 81.463635] kthread+0x328/0x630 [ 81.466925] ret_from_fork+0x10/0x20 [ 81.470565] [ 81.472091] kfence-#198: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 81.472091] [ 81.481862] allocated by task 405 on cpu 4 at 81.427154s (0.054706s ago): [ 81.488751] test_alloc+0x29c/0x628 [ 81.492301] test_invalid_addr_free+0xd4/0x238 [ 81.496816] kunit_try_run_case+0x170/0x3f0 [ 81.501069] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 81.506637] kthread+0x328/0x630 [ 81.509922] ret_from_fork+0x10/0x20 [ 81.513556] [ 81.515086] CPU: 4 UID: 0 PID: 405 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 81.526353] Tainted: [B]=BAD_PAGE, [N]=TEST [ 81.530600] Hardware name: Thundercomm Dragonboard 845c (DT) [ 81.536337] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[ 80.935238] ================================================================== [ 80.942589] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 80.942589] [ 80.950620] Invalid free of 0x(____ptrval____) (in kfence-#194): [ 80.956711] test_double_free+0x1bc/0x238 [ 80.960788] kunit_try_run_case+0x170/0x3f0 [ 80.965047] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 80.970615] kthread+0x328/0x630 [ 80.973904] ret_from_fork+0x10/0x20 [ 80.977542] [ 80.979068] kfence-#194: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 80.979068] [ 80.988838] allocated by task 401 on cpu 4 at 80.935184s (0.053653s ago): [ 80.995727] test_alloc+0x29c/0x628 [ 80.999278] test_double_free+0xd4/0x238 [ 81.003262] kunit_try_run_case+0x170/0x3f0 [ 81.007514] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 81.013082] kthread+0x328/0x630 [ 81.016367] ret_from_fork+0x10/0x20 [ 81.020002] [ 81.021526] freed by task 401 on cpu 4 at 80.935194s (0.086330s ago): [ 81.028057] test_double_free+0x1ac/0x238 [ 81.032128] kunit_try_run_case+0x170/0x3f0 [ 81.036381] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 81.041948] kthread+0x328/0x630 [ 81.045233] ret_from_fork+0x10/0x20 [ 81.048867] [ 81.050399] CPU: 4 UID: 0 PID: 401 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 81.061667] Tainted: [B]=BAD_PAGE, [N]=TEST [ 81.065915] Hardware name: Thundercomm Dragonboard 845c (DT) [ 81.071651] ================================================================== [ 81.183164] ================================================================== [ 81.190502] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 81.190502] [ 81.198531] Invalid free of 0x(____ptrval____) (in kfence-#196): [ 81.204623] test_double_free+0x100/0x238 [ 81.208708] kunit_try_run_case+0x170/0x3f0 [ 81.212964] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 81.218533] kthread+0x328/0x630 [ 81.221822] ret_from_fork+0x10/0x20 [ 81.225459] [ 81.226986] kfence-#196: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 81.226986] [ 81.236224] allocated by task 403 on cpu 5 at 81.183118s (0.053103s ago): [ 81.243112] test_alloc+0x230/0x628 [ 81.246662] test_double_free+0xd4/0x238 [ 81.250645] kunit_try_run_case+0x170/0x3f0 [ 81.254898] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 81.260466] kthread+0x328/0x630 [ 81.263750] ret_from_fork+0x10/0x20 [ 81.267385] [ 81.268908] freed by task 403 on cpu 5 at 81.183126s (0.085780s ago): [ 81.275439] test_double_free+0xf0/0x238 [ 81.279423] kunit_try_run_case+0x170/0x3f0 [ 81.283676] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 81.289243] kthread+0x328/0x630 [ 81.292528] ret_from_fork+0x10/0x20 [ 81.296164] [ 81.297695] CPU: 5 UID: 0 PID: 403 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 81.308961] Tainted: [B]=BAD_PAGE, [N]=TEST [ 81.313208] Hardware name: Thundercomm Dragonboard 845c (DT) [ 81.318945] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[ 80.227520] ================================================================== [ 80.234858] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 80.234858] [ 80.244207] Use-after-free read at 0x(____ptrval____) (in kfence-#188): [ 80.250917] test_use_after_free_read+0x114/0x248 [ 80.255698] kunit_try_run_case+0x170/0x3f0 [ 80.259957] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 80.265526] kthread+0x328/0x630 [ 80.268815] ret_from_fork+0x10/0x20 [ 80.272453] [ 80.273979] kfence-#188: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 80.273979] [ 80.283748] allocated by task 393 on cpu 4 at 80.227478s (0.056268s ago): [ 80.290641] test_alloc+0x29c/0x628 [ 80.294190] test_use_after_free_read+0xd0/0x248 [ 80.298881] kunit_try_run_case+0x170/0x3f0 [ 80.303134] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 80.308701] kthread+0x328/0x630 [ 80.311986] ret_from_fork+0x10/0x20 [ 80.315621] [ 80.317145] freed by task 393 on cpu 4 at 80.227488s (0.089655s ago): [ 80.323676] test_use_after_free_read+0x1c0/0x248 [ 80.328451] kunit_try_run_case+0x170/0x3f0 [ 80.332704] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 80.338272] kthread+0x328/0x630 [ 80.341557] ret_from_fork+0x10/0x20 [ 80.345192] [ 80.346723] CPU: 4 UID: 0 PID: 393 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 80.357988] Tainted: [B]=BAD_PAGE, [N]=TEST [ 80.362236] Hardware name: Thundercomm Dragonboard 845c (DT) [ 80.367974] ================================================================== [ 80.479182] ================================================================== [ 80.486519] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 80.486519] [ 80.495873] Use-after-free read at 0x(____ptrval____) (in kfence-#190): [ 80.502584] test_use_after_free_read+0x114/0x248 [ 80.507367] kunit_try_run_case+0x170/0x3f0 [ 80.511625] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 80.517194] kthread+0x328/0x630 [ 80.520483] ret_from_fork+0x10/0x20 [ 80.524122] [ 80.525647] kfence-#190: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 80.525647] [ 80.534886] allocated by task 395 on cpu 5 at 80.479146s (0.055738s ago): [ 80.541780] test_alloc+0x230/0x628 [ 80.545329] test_use_after_free_read+0xd0/0x248 [ 80.550018] kunit_try_run_case+0x170/0x3f0 [ 80.554271] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 80.559838] kthread+0x328/0x630 [ 80.563125] ret_from_fork+0x10/0x20 [ 80.566759] [ 80.568283] freed by task 395 on cpu 5 at 80.479155s (0.089127s ago): [ 80.574814] test_use_after_free_read+0xf0/0x248 [ 80.579505] kunit_try_run_case+0x170/0x3f0 [ 80.583758] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 80.589324] kthread+0x328/0x630 [ 80.592611] ret_from_fork+0x10/0x20 [ 80.596246] [ 80.597776] CPU: 5 UID: 0 PID: 395 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 80.609041] Tainted: [B]=BAD_PAGE, [N]=TEST [ 80.613290] Hardware name: Thundercomm Dragonboard 845c (DT) [ 80.619027] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[ 79.475176] ================================================================== [ 79.482519] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 79.482519] [ 79.491880] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#181): [ 79.499289] test_out_of_bounds_write+0x100/0x240 [ 79.504072] kunit_try_run_case+0x170/0x3f0 [ 79.508332] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 79.513902] kthread+0x328/0x630 [ 79.517190] ret_from_fork+0x10/0x20 [ 79.520827] [ 79.522353] kfence-#181: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 79.522353] [ 79.532123] allocated by task 389 on cpu 5 at 79.475151s (0.056969s ago): [ 79.539015] test_alloc+0x29c/0x628 [ 79.542565] test_out_of_bounds_write+0xc8/0x240 [ 79.547254] kunit_try_run_case+0x170/0x3f0 [ 79.551507] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 79.557073] kthread+0x328/0x630 [ 79.560359] ret_from_fork+0x10/0x20 [ 79.563993] [ 79.565523] CPU: 5 UID: 0 PID: 389 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 79.576790] Tainted: [B]=BAD_PAGE, [N]=TEST [ 79.581039] Hardware name: Thundercomm Dragonboard 845c (DT) [ 79.586776] ================================================================== [ 80.007203] ================================================================== [ 80.014563] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 80.014563] [ 80.023912] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#186): [ 80.031320] test_out_of_bounds_write+0x100/0x240 [ 80.036102] kunit_try_run_case+0x170/0x3f0 [ 80.040361] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 80.045929] kthread+0x328/0x630 [ 80.049217] ret_from_fork+0x10/0x20 [ 80.052856] [ 80.054381] kfence-#186: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 80.054381] [ 80.063619] allocated by task 391 on cpu 4 at 80.007178s (0.056440s ago): [ 80.070514] test_alloc+0x230/0x628 [ 80.074064] test_out_of_bounds_write+0xc8/0x240 [ 80.078754] kunit_try_run_case+0x170/0x3f0 [ 80.083006] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 80.088574] kthread+0x328/0x630 [ 80.091859] ret_from_fork+0x10/0x20 [ 80.095494] [ 80.097024] CPU: 4 UID: 0 PID: 391 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 80.108291] Tainted: [B]=BAD_PAGE, [N]=TEST [ 80.112540] Hardware name: Thundercomm Dragonboard 845c (DT) [ 80.118279] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[ 78.931214] ================================================================== [ 78.938574] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 78.938574] [ 78.947747] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#176): [ 78.955071] test_out_of_bounds_read+0x114/0x3e0 [ 78.959766] kunit_try_run_case+0x170/0x3f0 [ 78.964024] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 78.969595] kthread+0x328/0x630 [ 78.972884] ret_from_fork+0x10/0x20 [ 78.976522] [ 78.978046] kfence-#176: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 78.978046] [ 78.987282] allocated by task 387 on cpu 4 at 78.931188s (0.056093s ago): [ 78.994172] test_alloc+0x230/0x628 [ 78.997722] test_out_of_bounds_read+0xdc/0x3e0 [ 79.002326] kunit_try_run_case+0x170/0x3f0 [ 79.006579] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 79.012146] kthread+0x328/0x630 [ 79.015431] ret_from_fork+0x10/0x20 [ 79.019067] [ 79.020597] CPU: 4 UID: 0 PID: 387 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 79.031863] Tainted: [B]=BAD_PAGE, [N]=TEST [ 79.036110] Hardware name: Thundercomm Dragonboard 845c (DT) [ 79.041846] ================================================================== [ 79.255191] ================================================================== [ 79.262545] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 79.262545] [ 79.271716] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#179): [ 79.279209] test_out_of_bounds_read+0x1c8/0x3e0 [ 79.283903] kunit_try_run_case+0x170/0x3f0 [ 79.288161] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 79.293730] kthread+0x328/0x630 [ 79.297019] ret_from_fork+0x10/0x20 [ 79.300656] [ 79.302192] kfence-#179: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 79.302192] [ 79.311430] allocated by task 387 on cpu 4 at 79.255168s (0.056260s ago): [ 79.318322] test_alloc+0x230/0x628 [ 79.321871] test_out_of_bounds_read+0x198/0x3e0 [ 79.326562] kunit_try_run_case+0x170/0x3f0 [ 79.330815] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 79.336382] kthread+0x328/0x630 [ 79.339667] ret_from_fork+0x10/0x20 [ 79.343303] [ 79.344833] CPU: 4 UID: 0 PID: 387 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 79.356100] Tainted: [B]=BAD_PAGE, [N]=TEST [ 79.360348] Hardware name: Thundercomm Dragonboard 845c (DT) [ 79.366085] ================================================================== [ 78.283153] ================================================================== [ 78.290478] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 78.290478] [ 78.299642] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#170): [ 78.306964] test_out_of_bounds_read+0x114/0x3e0 [ 78.311658] kunit_try_run_case+0x170/0x3f0 [ 78.315910] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 78.321480] kthread+0x328/0x630 [ 78.324768] ret_from_fork+0x10/0x20 [ 78.328403] [ 78.329930] kfence-#170: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 78.329930] [ 78.339699] allocated by task 385 on cpu 4 at 78.283131s (0.056566s ago): [ 78.346590] test_alloc+0x29c/0x628 [ 78.350140] test_out_of_bounds_read+0xdc/0x3e0 [ 78.354742] kunit_try_run_case+0x170/0x3f0 [ 78.358995] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 78.364564] kthread+0x328/0x630 [ 78.367849] ret_from_fork+0x10/0x20 [ 78.371484] [ 78.373013] CPU: 4 UID: 0 PID: 385 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 78.384276] Tainted: [B]=BAD_PAGE, [N]=TEST [ 78.388524] Hardware name: Thundercomm Dragonboard 845c (DT) [ 78.394260] ================================================================== [ 78.503190] ================================================================== [ 78.510523] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 78.510523] [ 78.519688] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#172): [ 78.527183] test_out_of_bounds_read+0x1c8/0x3e0 [ 78.531875] kunit_try_run_case+0x170/0x3f0 [ 78.536133] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 78.541703] kthread+0x328/0x630 [ 78.544991] ret_from_fork+0x10/0x20 [ 78.548624] [ 78.550150] kfence-#172: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 78.550150] [ 78.559917] allocated by task 385 on cpu 4 at 78.503167s (0.056748s ago): [ 78.566811] test_alloc+0x29c/0x628 [ 78.570361] test_out_of_bounds_read+0x198/0x3e0 [ 78.575051] kunit_try_run_case+0x170/0x3f0 [ 78.579304] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 78.584873] kthread+0x328/0x630 [ 78.588158] ret_from_fork+0x10/0x20 [ 78.591792] [ 78.593322] CPU: 4 UID: 0 PID: 385 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 78.604587] Tainted: [B]=BAD_PAGE, [N]=TEST [ 78.608837] Hardware name: Thundercomm Dragonboard 845c (DT) [ 78.614574] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-kmalloc_track_caller_oob_right
[ 30.358053] ================================================================== [ 30.381778] BUG: KFENCE: memory corruption in kmalloc_track_caller_oob_right+0x224/0x488 [ 30.381778] [ 30.391464] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . ] (in kfence-#98): [ 30.399638] kmalloc_track_caller_oob_right+0x224/0x488 [ 30.404941] kunit_try_run_case+0x170/0x3f0 [ 30.409189] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.414752] kthread+0x328/0x630 [ 30.418031] ret_from_fork+0x10/0x20 [ 30.421671] [ 30.423204] kfence-#98: 0x(____ptrval____)-0x(____ptrval____), size=120, cache=kmalloc-128 [ 30.423204] [ 30.433064] allocated by task 240 on cpu 3 at 30.357028s (0.076034s ago): [ 30.439952] kmalloc_track_caller_oob_right+0x184/0x488 [ 30.445253] kunit_try_run_case+0x170/0x3f0 [ 30.449501] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.455060] kthread+0x328/0x630 [ 30.458340] ret_from_fork+0x10/0x20 [ 30.461976] [ 30.463506] freed by task 240 on cpu 7 at 30.358025s (0.105479s ago): [ 30.470039] kmalloc_track_caller_oob_right+0x224/0x488 [ 30.475339] kunit_try_run_case+0x170/0x3f0 [ 30.479591] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.485150] kthread+0x328/0x630 [ 30.488429] ret_from_fork+0x10/0x20 [ 30.492068] [ 30.493594] CPU: 7 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 30.504863] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.509103] Hardware name: Thundercomm Dragonboard 845c (DT) [ 30.514833] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-__nvmem_cell_readpart
[ 210.183881] ================================================================== [ 210.183888] BUG: KASAN: slab-out-of-bounds in __nvmem_cell_read.part.0+0x518/0x650 [ 210.183904] Read of size 1 at addr ffff000091646f24 by task kworker/u32:2/67 [ 210.183910] [ 210.183917] CPU: 7 UID: 0 PID: 67 Comm: kworker/u32:2 Tainted: G B D W N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 210.183929] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 210.183931] Hardware name: Thundercomm Dragonboard 845c (DT) [ 210.183936] Workqueue: events_unbound deferred_probe_work_func [ 210.183947] Call trace: [ 210.183951] show_stack+0x20/0x38 (C) [ 210.183959] dump_stack_lvl+0x8c/0xd0 [ 210.183967] print_report+0x118/0x608 [ 210.183976] kasan_report+0xdc/0x128 [ 210.183981] __asan_report_load1_noabort+0x20/0x30 [ 210.183986] __nvmem_cell_read.part.0+0x518/0x650 [ 210.183991] nvmem_cell_read+0x18c/0x248 [ 210.183995] qusb2_phy_init+0x6a4/0x1748 [ 210.184003] phy_init+0x120/0x2f8 [ 210.184010] dwc3_core_init+0x298/0x5290 [ 210.184016] dwc3_core_probe+0x1d1c/0x4bf8 [ 210.184021] dwc3_probe+0xd4/0x158 [ 210.184025] platform_probe+0xcc/0x198 [ 210.184032] really_probe+0x188/0x7f0 [ 210.184036] __driver_probe_device+0x164/0x378 [ 210.184041] driver_probe_device+0x64/0x180 [ 210.184046] __device_attach_driver+0x174/0x280 [ 210.184050] bus_for_each_drv+0x118/0x1b0 [ 210.184056] __device_attach+0x174/0x378 [ 210.184061] device_initial_probe+0x1c/0x30 [ 210.184065] bus_probe_device+0x12c/0x170 [ 210.184071] deferred_probe_work_func+0x140/0x208 [ 210.184075] process_one_work+0x530/0xf98 [ 210.184082] worker_thread+0x618/0xf38 [ 210.184086] kthread+0x328/0x630 [ 210.184091] ret_from_fork+0x10/0x20 [ 210.184098] [ 210.184101] Allocated by task 67: [ 210.184105] kasan_save_stack+0x3c/0x68 [ 210.184110] kasan_save_track+0x20/0x40 [ 210.184114] kasan_save_alloc_info+0x40/0x58 [ 210.184118] __kasan_kmalloc+0xd4/0xd8 [ 210.184123] __kmalloc_noprof+0x198/0x4c8 [ 210.184129] nvmem_cell_read+0xb8/0x248 [ 210.184133] qusb2_phy_init+0x6a4/0x1748 [ 210.184138] phy_init+0x120/0x2f8 [ 210.184143] dwc3_core_init+0x298/0x5290 [ 210.184147] dwc3_core_probe+0x1d1c/0x4bf8 [ 210.184150] dwc3_probe+0xd4/0x158 [ 210.184154] platform_probe+0xcc/0x198 [ 210.184160] really_probe+0x188/0x7f0 [ 210.184163] __driver_probe_device+0x164/0x378 [ 210.184167] driver_probe_device+0x64/0x180 [ 210.184171] __device_attach_driver+0x174/0x280 [ 210.184174] bus_for_each_drv+0x118/0x1b0 [ 210.184179] __device_attach+0x174/0x378 [ 210.184183] device_initial_probe+0x1c/0x30 [ 210.184186] bus_probe_device+0x12c/0x170 [ 210.184192] deferred_probe_work_func+0x140/0x208 [ 210.184196] process_one_work+0x530/0xf98 [ 210.184200] worker_thread+0x618/0xf38 [ 210.184204] kthread+0x328/0x630 [ 210.184208] ret_from_fork+0x10/0x20 [ 210.184212] [ 210.184213] The buggy address belongs to the object at ffff000091646f20 [ 210.184213] which belongs to the cache kmalloc-8 of size 8 [ 210.184218] The buggy address is located 0 bytes to the right of [ 210.184218] allocated 4-byte region [ffff000091646f20, ffff000091646f24) [ 210.184223] [ 210.184226] The buggy address belongs to the physical page: [ 210.184230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff000091646680 pfn:0x111646 [ 210.184236] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 210.184243] page_type: f5(slab) [ 210.184250] raw: 0bfffe0000000000 ffff000080002500 dead000000000122 0000000000000000 [ 210.184255] raw: ffff000091646680 0000000080800067 00000000f5000000 0000000000000000 [ 210.184258] page dumped because: kasan: bad access detected [ 210.184260] [ 210.184262] Memory state around the buggy address: [ 210.184265] ffff000091646e00: 00 fc fc fc 00 fc fc fc 04 fc fc fc 04 fc fc fc [ 210.184268] ffff000091646e80: 00 fc fc fc 00 fc fc fc fa fc fc fc fa fc fc fc [ 210.184272] >ffff000091646f00: 00 fc fc fc 04 fc fc fc fc fc fc fc fc fc fc fc [ 210.184275] ^ [ 210.184277] ffff000091646f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 210.184280] ffff000091647000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 210.184283] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[ 77.551244] ================================================================== [ 77.558555] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 77.565528] Write of size 121 at addr ffff0000947c2c00 by task kunit_try_catch/383 [ 77.573192] [ 77.574718] CPU: 7 UID: 0 PID: 383 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 77.574746] Tainted: [B]=BAD_PAGE, [N]=TEST [ 77.574754] Hardware name: Thundercomm Dragonboard 845c (DT) [ 77.574765] Call trace: [ 77.574771] show_stack+0x20/0x38 (C) [ 77.574788] dump_stack_lvl+0x8c/0xd0 [ 77.574806] print_report+0x118/0x608 [ 77.574825] kasan_report+0xdc/0x128 [ 77.574844] kasan_check_range+0x100/0x1a8 [ 77.574864] __kasan_check_write+0x20/0x30 [ 77.574880] strncpy_from_user+0x3c/0x2a0 [ 77.574896] copy_user_test_oob+0x5c0/0xec8 [ 77.574914] kunit_try_run_case+0x170/0x3f0 [ 77.574933] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.574954] kthread+0x328/0x630 [ 77.574968] ret_from_fork+0x10/0x20 [ 77.574985] [ 77.648151] Allocated by task 383: [ 77.651607] kasan_save_stack+0x3c/0x68 [ 77.655506] kasan_save_track+0x20/0x40 [ 77.659404] kasan_save_alloc_info+0x40/0x58 [ 77.663742] __kasan_kmalloc+0xd4/0xd8 [ 77.667552] __kmalloc_noprof+0x198/0x4c8 [ 77.671622] kunit_kmalloc_array+0x34/0x88 [ 77.675789] copy_user_test_oob+0xac/0xec8 [ 77.679955] kunit_try_run_case+0x170/0x3f0 [ 77.684210] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.689778] kthread+0x328/0x630 [ 77.693064] ret_from_fork+0x10/0x20 [ 77.696699] [ 77.698223] The buggy address belongs to the object at ffff0000947c2c00 [ 77.698223] which belongs to the cache kmalloc-128 of size 128 [ 77.710875] The buggy address is located 0 bytes inside of [ 77.710875] allocated 120-byte region [ffff0000947c2c00, ffff0000947c2c78) [ 77.723445] [ 77.724969] The buggy address belongs to the physical page: [ 77.730614] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1147c2 [ 77.738720] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 77.746467] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 77.753521] page_type: f5(slab) [ 77.756720] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 77.764557] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 77.772392] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 77.780314] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 77.788237] head: 0bfffe0000000001 fffffdffc251f081 00000000ffffffff 00000000ffffffff [ 77.796159] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 77.804076] page dumped because: kasan: bad access detected [ 77.809723] [ 77.811246] Memory state around the buggy address: [ 77.816101] ffff0000947c2b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 77.823415] ffff0000947c2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.830727] >ffff0000947c2c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 77.838037] ^ [ 77.845261] ffff0000947c2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.852574] ffff0000947c2d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.859884] ================================================================== [ 77.867256] ================================================================== [ 77.874567] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 77.881624] Write of size 1 at addr ffff0000947c2c78 by task kunit_try_catch/383 [ 77.889113] [ 77.890648] CPU: 7 UID: 0 PID: 383 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 77.890678] Tainted: [B]=BAD_PAGE, [N]=TEST [ 77.890686] Hardware name: Thundercomm Dragonboard 845c (DT) [ 77.890697] Call trace: [ 77.890702] show_stack+0x20/0x38 (C) [ 77.890719] dump_stack_lvl+0x8c/0xd0 [ 77.890738] print_report+0x118/0x608 [ 77.890757] kasan_report+0xdc/0x128 [ 77.890776] __asan_report_store1_noabort+0x20/0x30 [ 77.890793] strncpy_from_user+0x270/0x2a0 [ 77.890810] copy_user_test_oob+0x5c0/0xec8 [ 77.890829] kunit_try_run_case+0x170/0x3f0 [ 77.890846] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.890866] kthread+0x328/0x630 [ 77.890881] ret_from_fork+0x10/0x20 [ 77.890897] [ 77.960792] Allocated by task 383: [ 77.964248] kasan_save_stack+0x3c/0x68 [ 77.968146] kasan_save_track+0x20/0x40 [ 77.972044] kasan_save_alloc_info+0x40/0x58 [ 77.976382] __kasan_kmalloc+0xd4/0xd8 [ 77.980191] __kmalloc_noprof+0x198/0x4c8 [ 77.984261] kunit_kmalloc_array+0x34/0x88 [ 77.988417] copy_user_test_oob+0xac/0xec8 [ 77.992585] kunit_try_run_case+0x170/0x3f0 [ 77.996837] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 78.002404] kthread+0x328/0x630 [ 78.005691] ret_from_fork+0x10/0x20 [ 78.009325] [ 78.010848] The buggy address belongs to the object at ffff0000947c2c00 [ 78.010848] which belongs to the cache kmalloc-128 of size 128 [ 78.023500] The buggy address is located 0 bytes to the right of [ 78.023500] allocated 120-byte region [ffff0000947c2c00, ffff0000947c2c78) [ 78.036589] [ 78.038112] The buggy address belongs to the physical page: [ 78.043758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1147c2 [ 78.051864] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 78.059611] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 78.066664] page_type: f5(slab) [ 78.069862] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 78.077699] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 78.085536] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 78.093459] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 78.101382] head: 0bfffe0000000001 fffffdffc251f081 00000000ffffffff 00000000ffffffff [ 78.109303] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 78.117222] page dumped because: kasan: bad access detected [ 78.122867] [ 78.124390] Memory state around the buggy address: [ 78.129246] ffff0000947c2b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 78.136558] ffff0000947c2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.143870] >ffff0000947c2c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 78.151180] ^ [ 78.158403] ffff0000947c2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.165714] ffff0000947c2d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.173024] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[ 76.303171] ================================================================== [ 76.310490] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 76.317634] Write of size 121 at addr ffff0000947c2c00 by task kunit_try_catch/383 [ 76.325298] [ 76.326824] CPU: 7 UID: 0 PID: 383 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 76.326853] Tainted: [B]=BAD_PAGE, [N]=TEST [ 76.326861] Hardware name: Thundercomm Dragonboard 845c (DT) [ 76.326871] Call trace: [ 76.326879] show_stack+0x20/0x38 (C) [ 76.326898] dump_stack_lvl+0x8c/0xd0 [ 76.326916] print_report+0x118/0x608 [ 76.326934] kasan_report+0xdc/0x128 [ 76.326953] kasan_check_range+0x100/0x1a8 [ 76.326972] __kasan_check_write+0x20/0x30 [ 76.326987] copy_user_test_oob+0x35c/0xec8 [ 76.327004] kunit_try_run_case+0x170/0x3f0 [ 76.327022] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.327042] kthread+0x328/0x630 [ 76.327057] ret_from_fork+0x10/0x20 [ 76.327073] [ 76.396165] Allocated by task 383: [ 76.399616] kasan_save_stack+0x3c/0x68 [ 76.403520] kasan_save_track+0x20/0x40 [ 76.407425] kasan_save_alloc_info+0x40/0x58 [ 76.411758] __kasan_kmalloc+0xd4/0xd8 [ 76.415574] __kmalloc_noprof+0x198/0x4c8 [ 76.419650] kunit_kmalloc_array+0x34/0x88 [ 76.423811] copy_user_test_oob+0xac/0xec8 [ 76.427973] kunit_try_run_case+0x170/0x3f0 [ 76.432222] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.437786] kthread+0x328/0x630 [ 76.441066] ret_from_fork+0x10/0x20 [ 76.444708] [ 76.446230] The buggy address belongs to the object at ffff0000947c2c00 [ 76.446230] which belongs to the cache kmalloc-128 of size 128 [ 76.458879] The buggy address is located 0 bytes inside of [ 76.458879] allocated 120-byte region [ffff0000947c2c00, ffff0000947c2c78) [ 76.471450] [ 76.472972] The buggy address belongs to the physical page: [ 76.478614] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1147c2 [ 76.486712] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 76.494460] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 76.501516] page_type: f5(slab) [ 76.504712] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 76.512550] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 76.520389] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 76.528312] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 76.536237] head: 0bfffe0000000001 fffffdffc251f081 00000000ffffffff 00000000ffffffff [ 76.544160] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 76.552080] page dumped because: kasan: bad access detected [ 76.557722] [ 76.559252] Memory state around the buggy address: [ 76.564111] ffff0000947c2b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.571423] ffff0000947c2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.578729] >ffff0000947c2c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 76.586039] ^ [ 76.593262] ffff0000947c2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.600575] ffff0000947c2d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.607888] ================================================================== [ 77.239310] ================================================================== [ 77.246620] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 77.253763] Read of size 121 at addr ffff0000947c2c00 by task kunit_try_catch/383 [ 77.261340] [ 77.262865] CPU: 7 UID: 0 PID: 383 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 77.262894] Tainted: [B]=BAD_PAGE, [N]=TEST [ 77.262902] Hardware name: Thundercomm Dragonboard 845c (DT) [ 77.262912] Call trace: [ 77.262918] show_stack+0x20/0x38 (C) [ 77.262934] dump_stack_lvl+0x8c/0xd0 [ 77.262952] print_report+0x118/0x608 [ 77.262970] kasan_report+0xdc/0x128 [ 77.262988] kasan_check_range+0x100/0x1a8 [ 77.263007] __kasan_check_read+0x20/0x30 [ 77.263022] copy_user_test_oob+0x4a0/0xec8 [ 77.263041] kunit_try_run_case+0x170/0x3f0 [ 77.263058] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.263078] kthread+0x328/0x630 [ 77.263092] ret_from_fork+0x10/0x20 [ 77.263110] [ 77.332135] Allocated by task 383: [ 77.335591] kasan_save_stack+0x3c/0x68 [ 77.339490] kasan_save_track+0x20/0x40 [ 77.343387] kasan_save_alloc_info+0x40/0x58 [ 77.347726] __kasan_kmalloc+0xd4/0xd8 [ 77.351534] __kmalloc_noprof+0x198/0x4c8 [ 77.355604] kunit_kmalloc_array+0x34/0x88 [ 77.359770] copy_user_test_oob+0xac/0xec8 [ 77.363937] kunit_try_run_case+0x170/0x3f0 [ 77.368191] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.373761] kthread+0x328/0x630 [ 77.377046] ret_from_fork+0x10/0x20 [ 77.380682] [ 77.382205] The buggy address belongs to the object at ffff0000947c2c00 [ 77.382205] which belongs to the cache kmalloc-128 of size 128 [ 77.394857] The buggy address is located 0 bytes inside of [ 77.394857] allocated 120-byte region [ffff0000947c2c00, ffff0000947c2c78) [ 77.407426] [ 77.408950] The buggy address belongs to the physical page: [ 77.414596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1147c2 [ 77.422703] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 77.430452] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 77.437505] page_type: f5(slab) [ 77.440703] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 77.448539] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 77.456375] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 77.464296] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 77.472218] head: 0bfffe0000000001 fffffdffc251f081 00000000ffffffff 00000000ffffffff [ 77.480139] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 77.488058] page dumped because: kasan: bad access detected [ 77.493703] [ 77.495225] Memory state around the buggy address: [ 77.500080] ffff0000947c2b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 77.507392] ffff0000947c2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.514703] >ffff0000947c2c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 77.522013] ^ [ 77.529235] ffff0000947c2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.536547] ffff0000947c2d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.543857] ================================================================== [ 75.672698] ================================================================== [ 75.686193] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 75.693341] Write of size 121 at addr ffff0000947c2c00 by task kunit_try_catch/383 [ 75.701008] [ 75.702538] CPU: 7 UID: 0 PID: 383 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 75.702570] Tainted: [B]=BAD_PAGE, [N]=TEST [ 75.702578] Hardware name: Thundercomm Dragonboard 845c (DT) [ 75.702590] Call trace: [ 75.702597] show_stack+0x20/0x38 (C) [ 75.702616] dump_stack_lvl+0x8c/0xd0 [ 75.702636] print_report+0x118/0x608 [ 75.702656] kasan_report+0xdc/0x128 [ 75.702675] kasan_check_range+0x100/0x1a8 [ 75.702694] __kasan_check_write+0x20/0x30 [ 75.702710] copy_user_test_oob+0x234/0xec8 [ 75.702729] kunit_try_run_case+0x170/0x3f0 [ 75.702749] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.702770] kthread+0x328/0x630 [ 75.702785] ret_from_fork+0x10/0x20 [ 75.702803] [ 75.771925] Allocated by task 383: [ 75.775379] kasan_save_stack+0x3c/0x68 [ 75.779285] kasan_save_track+0x20/0x40 [ 75.783190] kasan_save_alloc_info+0x40/0x58 [ 75.787520] __kasan_kmalloc+0xd4/0xd8 [ 75.791336] __kmalloc_noprof+0x198/0x4c8 [ 75.795411] kunit_kmalloc_array+0x34/0x88 [ 75.799571] copy_user_test_oob+0xac/0xec8 [ 75.803733] kunit_try_run_case+0x170/0x3f0 [ 75.807980] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.813543] kthread+0x328/0x630 [ 75.816825] ret_from_fork+0x10/0x20 [ 75.820465] [ 75.821989] The buggy address belongs to the object at ffff0000947c2c00 [ 75.821989] which belongs to the cache kmalloc-128 of size 128 [ 75.834639] The buggy address is located 0 bytes inside of [ 75.834639] allocated 120-byte region [ffff0000947c2c00, ffff0000947c2c78) [ 75.847211] [ 75.848743] The buggy address belongs to the physical page: [ 75.854385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1147c2 [ 75.862491] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 75.870239] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 75.877297] page_type: f5(slab) [ 75.880492] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 75.888330] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 75.896168] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 75.904091] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 75.912014] head: 0bfffe0000000001 fffffdffc251f081 00000000ffffffff 00000000ffffffff [ 75.919936] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 75.927856] page dumped because: kasan: bad access detected [ 75.933497] [ 75.935030] Memory state around the buggy address: [ 75.939886] ffff0000947c2b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 75.947202] ffff0000947c2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.954516] >ffff0000947c2c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 75.961826] ^ [ 75.969050] ffff0000947c2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.976362] ffff0000947c2d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.983673] ================================================================== [ 76.927172] ================================================================== [ 76.934488] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 76.941634] Write of size 121 at addr ffff0000947c2c00 by task kunit_try_catch/383 [ 76.949300] [ 76.950825] CPU: 7 UID: 0 PID: 383 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 76.950854] Tainted: [B]=BAD_PAGE, [N]=TEST [ 76.950861] Hardware name: Thundercomm Dragonboard 845c (DT) [ 76.950872] Call trace: [ 76.950879] show_stack+0x20/0x38 (C) [ 76.950896] dump_stack_lvl+0x8c/0xd0 [ 76.950913] print_report+0x118/0x608 [ 76.950931] kasan_report+0xdc/0x128 [ 76.950949] kasan_check_range+0x100/0x1a8 [ 76.950969] __kasan_check_write+0x20/0x30 [ 76.950986] copy_user_test_oob+0x434/0xec8 [ 76.951004] kunit_try_run_case+0x170/0x3f0 [ 76.951022] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.951042] kthread+0x328/0x630 [ 76.951056] ret_from_fork+0x10/0x20 [ 76.951073] [ 77.020199] Allocated by task 383: [ 77.023655] kasan_save_stack+0x3c/0x68 [ 77.027555] kasan_save_track+0x20/0x40 [ 77.031453] kasan_save_alloc_info+0x40/0x58 [ 77.035792] __kasan_kmalloc+0xd4/0xd8 [ 77.039602] __kmalloc_noprof+0x198/0x4c8 [ 77.043672] kunit_kmalloc_array+0x34/0x88 [ 77.047839] copy_user_test_oob+0xac/0xec8 [ 77.052005] kunit_try_run_case+0x170/0x3f0 [ 77.056258] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.061827] kthread+0x328/0x630 [ 77.065113] ret_from_fork+0x10/0x20 [ 77.068750] [ 77.070274] The buggy address belongs to the object at ffff0000947c2c00 [ 77.070274] which belongs to the cache kmalloc-128 of size 128 [ 77.082924] The buggy address is located 0 bytes inside of [ 77.082924] allocated 120-byte region [ffff0000947c2c00, ffff0000947c2c78) [ 77.095494] [ 77.097017] The buggy address belongs to the physical page: [ 77.102664] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1147c2 [ 77.110771] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 77.118518] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 77.125572] page_type: f5(slab) [ 77.128771] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 77.136607] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 77.144444] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 77.152366] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 77.160289] head: 0bfffe0000000001 fffffdffc251f081 00000000ffffffff 00000000ffffffff [ 77.168210] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 77.176127] page dumped because: kasan: bad access detected [ 77.181774] [ 77.183296] Memory state around the buggy address: [ 77.188151] ffff0000947c2b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 77.195463] ffff0000947c2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.202774] >ffff0000947c2c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 77.210084] ^ [ 77.217306] ffff0000947c2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.224618] ffff0000947c2d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.231927] ================================================================== [ 75.991135] ================================================================== [ 75.998459] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 76.005605] Read of size 121 at addr ffff0000947c2c00 by task kunit_try_catch/383 [ 76.013184] [ 76.014712] CPU: 7 UID: 0 PID: 383 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 76.014742] Tainted: [B]=BAD_PAGE, [N]=TEST [ 76.014750] Hardware name: Thundercomm Dragonboard 845c (DT) [ 76.014761] Call trace: [ 76.014768] show_stack+0x20/0x38 (C) [ 76.014786] dump_stack_lvl+0x8c/0xd0 [ 76.014805] print_report+0x118/0x608 [ 76.014825] kasan_report+0xdc/0x128 [ 76.014843] kasan_check_range+0x100/0x1a8 [ 76.014864] __kasan_check_read+0x20/0x30 [ 76.014880] copy_user_test_oob+0x728/0xec8 [ 76.014897] kunit_try_run_case+0x170/0x3f0 [ 76.014915] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.014937] kthread+0x328/0x630 [ 76.014950] ret_from_fork+0x10/0x20 [ 76.014967] [ 76.083987] Allocated by task 383: [ 76.087439] kasan_save_stack+0x3c/0x68 [ 76.091346] kasan_save_track+0x20/0x40 [ 76.095249] kasan_save_alloc_info+0x40/0x58 [ 76.099581] __kasan_kmalloc+0xd4/0xd8 [ 76.103396] __kmalloc_noprof+0x198/0x4c8 [ 76.107471] kunit_kmalloc_array+0x34/0x88 [ 76.111633] copy_user_test_oob+0xac/0xec8 [ 76.115795] kunit_try_run_case+0x170/0x3f0 [ 76.120044] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.125607] kthread+0x328/0x630 [ 76.128887] ret_from_fork+0x10/0x20 [ 76.132528] [ 76.134053] The buggy address belongs to the object at ffff0000947c2c00 [ 76.134053] which belongs to the cache kmalloc-128 of size 128 [ 76.146702] The buggy address is located 0 bytes inside of [ 76.146702] allocated 120-byte region [ffff0000947c2c00, ffff0000947c2c78) [ 76.159266] [ 76.160798] The buggy address belongs to the physical page: [ 76.166440] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1147c2 [ 76.174548] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 76.182297] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 76.189352] page_type: f5(slab) [ 76.192547] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 76.200385] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 76.208223] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 76.216145] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 76.224069] head: 0bfffe0000000001 fffffdffc251f081 00000000ffffffff 00000000ffffffff [ 76.231993] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 76.239911] page dumped because: kasan: bad access detected [ 76.245552] [ 76.247085] Memory state around the buggy address: [ 76.251943] ffff0000947c2b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.259258] ffff0000947c2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.266573] >ffff0000947c2c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 76.273884] ^ [ 76.281107] ffff0000947c2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.288420] ffff0000947c2d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.295731] ================================================================== [ 76.615255] ================================================================== [ 76.622563] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 76.629699] Read of size 121 at addr ffff0000947c2c00 by task kunit_try_catch/383 [ 76.637278] [ 76.638804] CPU: 7 UID: 0 PID: 383 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 76.638833] Tainted: [B]=BAD_PAGE, [N]=TEST [ 76.638842] Hardware name: Thundercomm Dragonboard 845c (DT) [ 76.638854] Call trace: [ 76.638860] show_stack+0x20/0x38 (C) [ 76.638877] dump_stack_lvl+0x8c/0xd0 [ 76.638895] print_report+0x118/0x608 [ 76.638913] kasan_report+0xdc/0x128 [ 76.638932] kasan_check_range+0x100/0x1a8 [ 76.638951] __kasan_check_read+0x20/0x30 [ 76.638966] copy_user_test_oob+0x3c8/0xec8 [ 76.638984] kunit_try_run_case+0x170/0x3f0 [ 76.639000] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.639021] kthread+0x328/0x630 [ 76.639035] ret_from_fork+0x10/0x20 [ 76.639051] [ 76.708088] Allocated by task 383: [ 76.711539] kasan_save_stack+0x3c/0x68 [ 76.715443] kasan_save_track+0x20/0x40 [ 76.719347] kasan_save_alloc_info+0x40/0x58 [ 76.723679] __kasan_kmalloc+0xd4/0xd8 [ 76.727495] __kmalloc_noprof+0x198/0x4c8 [ 76.731571] kunit_kmalloc_array+0x34/0x88 [ 76.735732] copy_user_test_oob+0xac/0xec8 [ 76.739894] kunit_try_run_case+0x170/0x3f0 [ 76.744142] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.749706] kthread+0x328/0x630 [ 76.752988] ret_from_fork+0x10/0x20 [ 76.756629] [ 76.758152] The buggy address belongs to the object at ffff0000947c2c00 [ 76.758152] which belongs to the cache kmalloc-128 of size 128 [ 76.770802] The buggy address is located 0 bytes inside of [ 76.770802] allocated 120-byte region [ffff0000947c2c00, ffff0000947c2c78) [ 76.783373] [ 76.784905] The buggy address belongs to the physical page: [ 76.790546] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1147c2 [ 76.798645] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 76.806394] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 76.813439] page_type: f5(slab) [ 76.816635] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 76.824470] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 76.832308] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 76.840231] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 76.848155] head: 0bfffe0000000001 fffffdffc251f081 00000000ffffffff 00000000ffffffff [ 76.856077] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 76.863997] page dumped because: kasan: bad access detected [ 76.869639] [ 76.871170] Memory state around the buggy address: [ 76.876029] ffff0000947c2b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 76.883342] ffff0000947c2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.890647] >ffff0000947c2c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 76.897957] ^ [ 76.905180] ffff0000947c2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.912494] ffff0000947c2d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.919805] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[ 75.025784] ================================================================== [ 75.040868] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 75.048373] Read of size 8 at addr ffff0000822c2c78 by task kunit_try_catch/379 [ 75.055785] [ 75.057319] CPU: 3 UID: 0 PID: 379 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 75.057349] Tainted: [B]=BAD_PAGE, [N]=TEST [ 75.057360] Hardware name: Thundercomm Dragonboard 845c (DT) [ 75.057374] Call trace: [ 75.057381] show_stack+0x20/0x38 (C) [ 75.057401] dump_stack_lvl+0x8c/0xd0 [ 75.057423] print_report+0x118/0x608 [ 75.057444] kasan_report+0xdc/0x128 [ 75.057464] __asan_report_load8_noabort+0x20/0x30 [ 75.057483] copy_to_kernel_nofault+0x204/0x250 [ 75.057503] copy_to_kernel_nofault_oob+0x158/0x418 [ 75.057524] kunit_try_run_case+0x170/0x3f0 [ 75.057547] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.057569] kthread+0x328/0x630 [ 75.057586] ret_from_fork+0x10/0x20 [ 75.057605] [ 75.128617] Allocated by task 379: [ 75.132077] kasan_save_stack+0x3c/0x68 [ 75.135988] kasan_save_track+0x20/0x40 [ 75.139897] kasan_save_alloc_info+0x40/0x58 [ 75.144235] __kasan_kmalloc+0xd4/0xd8 [ 75.148057] __kmalloc_cache_noprof+0x16c/0x3c0 [ 75.152671] copy_to_kernel_nofault_oob+0xc8/0x418 [ 75.157540] kunit_try_run_case+0x170/0x3f0 [ 75.161793] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.167363] kthread+0x328/0x630 [ 75.170656] ret_from_fork+0x10/0x20 [ 75.174299] [ 75.175835] The buggy address belongs to the object at ffff0000822c2c00 [ 75.175835] which belongs to the cache kmalloc-128 of size 128 [ 75.188493] The buggy address is located 0 bytes to the right of [ 75.188493] allocated 120-byte region [ffff0000822c2c00, ffff0000822c2c78) [ 75.201601] [ 75.203130] The buggy address belongs to the physical page: [ 75.208784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022c2 [ 75.216897] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 75.224651] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 75.231710] page_type: f5(slab) [ 75.234918] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 75.242769] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 75.250611] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 75.258551] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 75.266490] head: 0bfffe0000000001 fffffdffc208b081 00000000ffffffff 00000000ffffffff [ 75.274429] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 75.282365] page dumped because: kasan: bad access detected [ 75.288017] [ 75.289546] Memory state around the buggy address: [ 75.294407] ffff0000822c2b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 75.301728] ffff0000822c2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.309049] >ffff0000822c2c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 75.316369] ^ [ 75.323597] ffff0000822c2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.330911] ffff0000822c2d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.338223] ================================================================== [ 75.345608] ================================================================== [ 75.352932] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 75.360347] Write of size 8 at addr ffff0000822c2c78 by task kunit_try_catch/379 [ 75.367844] [ 75.369378] CPU: 3 UID: 0 PID: 379 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 75.369410] Tainted: [B]=BAD_PAGE, [N]=TEST [ 75.369418] Hardware name: Thundercomm Dragonboard 845c (DT) [ 75.369431] Call trace: [ 75.369439] show_stack+0x20/0x38 (C) [ 75.369460] dump_stack_lvl+0x8c/0xd0 [ 75.369482] print_report+0x118/0x608 [ 75.369504] kasan_report+0xdc/0x128 [ 75.369523] kasan_check_range+0x100/0x1a8 [ 75.369544] __kasan_check_write+0x20/0x30 [ 75.369563] copy_to_kernel_nofault+0x8c/0x250 [ 75.369583] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 75.369603] kunit_try_run_case+0x170/0x3f0 [ 75.369625] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.369650] kthread+0x328/0x630 [ 75.369666] ret_from_fork+0x10/0x20 [ 75.369684] [ 75.444028] Allocated by task 379: [ 75.447493] kasan_save_stack+0x3c/0x68 [ 75.451402] kasan_save_track+0x20/0x40 [ 75.455312] kasan_save_alloc_info+0x40/0x58 [ 75.459660] __kasan_kmalloc+0xd4/0xd8 [ 75.463482] __kmalloc_cache_noprof+0x16c/0x3c0 [ 75.468089] copy_to_kernel_nofault_oob+0xc8/0x418 [ 75.472958] kunit_try_run_case+0x170/0x3f0 [ 75.477212] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.482785] kthread+0x328/0x630 [ 75.486075] ret_from_fork+0x10/0x20 [ 75.489723] [ 75.491253] The buggy address belongs to the object at ffff0000822c2c00 [ 75.491253] which belongs to the cache kmalloc-128 of size 128 [ 75.503920] The buggy address is located 0 bytes to the right of [ 75.503920] allocated 120-byte region [ffff0000822c2c00, ffff0000822c2c78) [ 75.517024] [ 75.518555] The buggy address belongs to the physical page: [ 75.524205] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022c2 [ 75.532318] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 75.540073] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 75.547132] page_type: f5(slab) [ 75.550338] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 75.558182] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 75.566025] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 75.573966] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 75.581906] head: 0bfffe0000000001 fffffdffc208b081 00000000ffffffff 00000000ffffffff [ 75.589846] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 75.597780] page dumped because: kasan: bad access detected [ 75.603426] [ 75.604962] Memory state around the buggy address: [ 75.609824] ffff0000822c2b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 75.617145] ffff0000822c2b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.624467] >ffff0000822c2c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 75.631787] ^ [ 75.639019] ffff0000822c2c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.646339] ffff0000822c2d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.653659] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 74.562942] ================================================================== [ 74.578277] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 74.585080] Read of size 1 at addr ffff8000802bd7f3 by task kunit_try_catch/367 [ 74.592485] [ 74.594019] CPU: 3 UID: 0 PID: 367 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 74.594050] Tainted: [B]=BAD_PAGE, [N]=TEST [ 74.594060] Hardware name: Thundercomm Dragonboard 845c (DT) [ 74.594073] Call trace: [ 74.594081] show_stack+0x20/0x38 (C) [ 74.594100] dump_stack_lvl+0x8c/0xd0 [ 74.594120] print_report+0x310/0x608 [ 74.594140] kasan_report+0xdc/0x128 [ 74.594160] __asan_report_load1_noabort+0x20/0x30 [ 74.594179] vmalloc_oob+0x578/0x5d0 [ 74.594196] kunit_try_run_case+0x170/0x3f0 [ 74.594219] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.594243] kthread+0x328/0x630 [ 74.594258] ret_from_fork+0x10/0x20 [ 74.594276] [ 74.659356] The buggy address belongs to the virtual mapping at [ 74.659356] [ffff8000802bd000, ffff8000802bf000) created by: [ 74.659356] vmalloc_oob+0x98/0x5d0 [ 74.674655] [ 74.676194] The buggy address belongs to the physical page: [ 74.681845] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1168cc [ 74.689952] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 74.696574] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 74.704424] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 74.712269] page dumped because: kasan: bad access detected [ 74.717919] [ 74.719449] Memory state around the buggy address: [ 74.724309] ffff8000802bd680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.731628] ffff8000802bd700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.738946] >ffff8000802bd780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 74.746261] ^ [ 74.753232] ffff8000802bd800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 74.760549] ffff8000802bd880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 74.767864] ================================================================== [ 74.775255] ================================================================== [ 74.782571] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 74.789372] Read of size 1 at addr ffff8000802bd7f8 by task kunit_try_catch/367 [ 74.796776] [ 74.798312] CPU: 3 UID: 0 PID: 367 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 74.798341] Tainted: [B]=BAD_PAGE, [N]=TEST [ 74.798351] Hardware name: Thundercomm Dragonboard 845c (DT) [ 74.798362] Call trace: [ 74.798370] show_stack+0x20/0x38 (C) [ 74.798388] dump_stack_lvl+0x8c/0xd0 [ 74.798409] print_report+0x310/0x608 [ 74.798429] kasan_report+0xdc/0x128 [ 74.798449] __asan_report_load1_noabort+0x20/0x30 [ 74.798467] vmalloc_oob+0x51c/0x5d0 [ 74.798484] kunit_try_run_case+0x170/0x3f0 [ 74.798505] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.798528] kthread+0x328/0x630 [ 74.798543] ret_from_fork+0x10/0x20 [ 74.798563] [ 74.863663] The buggy address belongs to the virtual mapping at [ 74.863663] [ffff8000802bd000, ffff8000802bf000) created by: [ 74.863663] vmalloc_oob+0x98/0x5d0 [ 74.878962] [ 74.880499] The buggy address belongs to the physical page: [ 74.886150] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1168cc [ 74.894254] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 74.900874] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 74.908724] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 74.916567] page dumped because: kasan: bad access detected [ 74.922218] [ 74.923754] Memory state around the buggy address: [ 74.928617] ffff8000802bd680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.935933] ffff8000802bd700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.943253] >ffff8000802bd780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 74.950568] ^ [ 74.957795] ffff8000802bd800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 74.965111] ffff8000802bd880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 74.972425] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 61.350118] ================================================================== [ 61.357428] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 61.364832] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363 [ 61.372320] [ 61.373846] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 61.373875] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.373883] Hardware name: Thundercomm Dragonboard 845c (DT) [ 61.373894] Call trace: [ 61.373899] show_stack+0x20/0x38 (C) [ 61.373916] dump_stack_lvl+0x8c/0xd0 [ 61.373935] print_report+0x118/0x608 [ 61.373953] kasan_report+0xdc/0x128 [ 61.373972] kasan_check_range+0x100/0x1a8 [ 61.373992] __kasan_check_write+0x20/0x30 [ 61.374007] kasan_atomics_helper+0x6ec/0x4858 [ 61.374024] kasan_atomics+0x198/0x2e0 [ 61.374041] kunit_try_run_case+0x170/0x3f0 [ 61.374059] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.374081] kthread+0x328/0x630 [ 61.374095] ret_from_fork+0x10/0x20 [ 61.374111] [ 61.447277] Allocated by task 363: [ 61.450732] kasan_save_stack+0x3c/0x68 [ 61.454630] kasan_save_track+0x20/0x40 [ 61.458526] kasan_save_alloc_info+0x40/0x58 [ 61.462864] __kasan_kmalloc+0xd4/0xd8 [ 61.466675] __kmalloc_cache_noprof+0x16c/0x3c0 [ 61.471277] kasan_atomics+0xb8/0x2e0 [ 61.474998] kunit_try_run_case+0x170/0x3f0 [ 61.479251] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.484820] kthread+0x328/0x630 [ 61.488107] ret_from_fork+0x10/0x20 [ 61.491740] [ 61.493263] The buggy address belongs to the object at ffff000080acff00 [ 61.493263] which belongs to the cache kmalloc-64 of size 64 [ 61.505740] The buggy address is located 0 bytes to the right of [ 61.505740] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 61.518741] [ 61.520276] The buggy address belongs to the physical page: [ 61.525921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 61.534026] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.540633] page_type: f5(slab) [ 61.543832] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 61.551671] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.559503] page dumped because: kasan: bad access detected [ 61.565149] [ 61.566672] Memory state around the buggy address: [ 61.571529] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.578841] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.586154] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.593463] ^ [ 61.598318] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.605630] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 61.612940] ================================================================== [ 66.196670] ================================================================== [ 66.203980] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 66.211471] Read of size 4 at addr ffff000080acff30 by task kunit_try_catch/363 [ 66.218871] [ 66.220396] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 66.220427] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.220435] Hardware name: Thundercomm Dragonboard 845c (DT) [ 66.220445] Call trace: [ 66.220451] show_stack+0x20/0x38 (C) [ 66.220468] dump_stack_lvl+0x8c/0xd0 [ 66.220486] print_report+0x118/0x608 [ 66.220504] kasan_report+0xdc/0x128 [ 66.220523] __asan_report_load4_noabort+0x20/0x30 [ 66.220540] kasan_atomics_helper+0x3e04/0x4858 [ 66.220558] kasan_atomics+0x198/0x2e0 [ 66.220574] kunit_try_run_case+0x170/0x3f0 [ 66.220591] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.220612] kthread+0x328/0x630 [ 66.220627] ret_from_fork+0x10/0x20 [ 66.220643] [ 66.290439] Allocated by task 363: [ 66.293895] kasan_save_stack+0x3c/0x68 [ 66.297794] kasan_save_track+0x20/0x40 [ 66.301692] kasan_save_alloc_info+0x40/0x58 [ 66.306030] __kasan_kmalloc+0xd4/0xd8 [ 66.309839] __kmalloc_cache_noprof+0x16c/0x3c0 [ 66.314440] kasan_atomics+0xb8/0x2e0 [ 66.318161] kunit_try_run_case+0x170/0x3f0 [ 66.322415] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.327984] kthread+0x328/0x630 [ 66.331269] ret_from_fork+0x10/0x20 [ 66.334903] [ 66.336426] The buggy address belongs to the object at ffff000080acff00 [ 66.336426] which belongs to the cache kmalloc-64 of size 64 [ 66.348902] The buggy address is located 0 bytes to the right of [ 66.348902] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 66.361903] [ 66.363427] The buggy address belongs to the physical page: [ 66.369071] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 66.377177] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 66.383783] page_type: f5(slab) [ 66.386981] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 66.394817] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.402648] page dumped because: kasan: bad access detected [ 66.408293] [ 66.409816] Memory state around the buggy address: [ 66.414670] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.421981] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.429293] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 66.436602] ^ [ 66.441458] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.448769] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 66.456078] ================================================================== [ 72.399561] ================================================================== [ 72.406873] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 72.414364] Read of size 8 at addr ffff000080acff30 by task kunit_try_catch/363 [ 72.421766] [ 72.423290] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 72.423320] Tainted: [B]=BAD_PAGE, [N]=TEST [ 72.423329] Hardware name: Thundercomm Dragonboard 845c (DT) [ 72.423338] Call trace: [ 72.423345] show_stack+0x20/0x38 (C) [ 72.423362] dump_stack_lvl+0x8c/0xd0 [ 72.423380] print_report+0x118/0x608 [ 72.423399] kasan_report+0xdc/0x128 [ 72.423419] __asan_report_load8_noabort+0x20/0x30 [ 72.423436] kasan_atomics_helper+0x3db0/0x4858 [ 72.423454] kasan_atomics+0x198/0x2e0 [ 72.423472] kunit_try_run_case+0x170/0x3f0 [ 72.423491] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.423511] kthread+0x328/0x630 [ 72.423527] ret_from_fork+0x10/0x20 [ 72.423544] [ 72.493342] Allocated by task 363: [ 72.496798] kasan_save_stack+0x3c/0x68 [ 72.500696] kasan_save_track+0x20/0x40 [ 72.504594] kasan_save_alloc_info+0x40/0x58 [ 72.508933] __kasan_kmalloc+0xd4/0xd8 [ 72.512741] __kmalloc_cache_noprof+0x16c/0x3c0 [ 72.517343] kasan_atomics+0xb8/0x2e0 [ 72.521064] kunit_try_run_case+0x170/0x3f0 [ 72.525317] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.530887] kthread+0x328/0x630 [ 72.534173] ret_from_fork+0x10/0x20 [ 72.537808] [ 72.539331] The buggy address belongs to the object at ffff000080acff00 [ 72.539331] which belongs to the cache kmalloc-64 of size 64 [ 72.551809] The buggy address is located 0 bytes to the right of [ 72.551809] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 72.564810] [ 72.566333] The buggy address belongs to the physical page: [ 72.571979] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 72.580086] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 72.586694] page_type: f5(slab) [ 72.589893] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 72.597730] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 72.605563] page dumped because: kasan: bad access detected [ 72.611210] [ 72.612733] Memory state around the buggy address: [ 72.617587] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.624900] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.632212] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 72.639522] ^ [ 72.644379] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.651690] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 72.659000] ================================================================== [ 58.384768] ================================================================== [ 58.392084] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 58.399580] Read of size 4 at addr ffff000080acff30 by task kunit_try_catch/363 [ 58.406978] [ 58.408510] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 58.408539] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.408547] Hardware name: Thundercomm Dragonboard 845c (DT) [ 58.408557] Call trace: [ 58.408563] show_stack+0x20/0x38 (C) [ 58.408579] dump_stack_lvl+0x8c/0xd0 [ 58.408598] print_report+0x118/0x608 [ 58.408617] kasan_report+0xdc/0x128 [ 58.408636] __asan_report_load4_noabort+0x20/0x30 [ 58.408651] kasan_atomics_helper+0x40fc/0x4858 [ 58.408669] kasan_atomics+0x198/0x2e0 [ 58.408687] kunit_try_run_case+0x170/0x3f0 [ 58.408704] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.408726] kthread+0x328/0x630 [ 58.408739] ret_from_fork+0x10/0x20 [ 58.408756] [ 58.478546] Allocated by task 363: [ 58.481997] kasan_save_stack+0x3c/0x68 [ 58.485894] kasan_save_track+0x20/0x40 [ 58.489799] kasan_save_alloc_info+0x40/0x58 [ 58.494137] __kasan_kmalloc+0xd4/0xd8 [ 58.497952] __kmalloc_cache_noprof+0x16c/0x3c0 [ 58.502552] kasan_atomics+0xb8/0x2e0 [ 58.506279] kunit_try_run_case+0x170/0x3f0 [ 58.510530] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.516095] kthread+0x328/0x630 [ 58.519377] ret_from_fork+0x10/0x20 [ 58.523011] [ 58.524543] The buggy address belongs to the object at ffff000080acff00 [ 58.524543] which belongs to the cache kmalloc-64 of size 64 [ 58.537021] The buggy address is located 0 bytes to the right of [ 58.537021] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 58.550023] [ 58.551554] The buggy address belongs to the physical page: [ 58.557197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 58.565298] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.571907] page_type: f5(slab) [ 58.575105] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 58.582947] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 58.590784] page dumped because: kasan: bad access detected [ 58.596423] [ 58.597945] Memory state around the buggy address: [ 58.602806] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.610123] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.617440] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.624755] ^ [ 58.629610] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.636916] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 58.644230] ================================================================== [ 59.999242] ================================================================== [ 60.006552] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 60.013956] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363 [ 60.021445] [ 60.022971] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 60.023001] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.023008] Hardware name: Thundercomm Dragonboard 845c (DT) [ 60.023018] Call trace: [ 60.023024] show_stack+0x20/0x38 (C) [ 60.023041] dump_stack_lvl+0x8c/0xd0 [ 60.023058] print_report+0x118/0x608 [ 60.023077] kasan_report+0xdc/0x128 [ 60.023095] kasan_check_range+0x100/0x1a8 [ 60.023114] __kasan_check_write+0x20/0x30 [ 60.023129] kasan_atomics_helper+0x4e4/0x4858 [ 60.023147] kasan_atomics+0x198/0x2e0 [ 60.023164] kunit_try_run_case+0x170/0x3f0 [ 60.023182] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.023202] kthread+0x328/0x630 [ 60.023217] ret_from_fork+0x10/0x20 [ 60.023233] [ 60.096395] Allocated by task 363: [ 60.099851] kasan_save_stack+0x3c/0x68 [ 60.103749] kasan_save_track+0x20/0x40 [ 60.107646] kasan_save_alloc_info+0x40/0x58 [ 60.111984] __kasan_kmalloc+0xd4/0xd8 [ 60.115792] __kmalloc_cache_noprof+0x16c/0x3c0 [ 60.120394] kasan_atomics+0xb8/0x2e0 [ 60.124116] kunit_try_run_case+0x170/0x3f0 [ 60.128368] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.133937] kthread+0x328/0x630 [ 60.137223] ret_from_fork+0x10/0x20 [ 60.140859] [ 60.142383] The buggy address belongs to the object at ffff000080acff00 [ 60.142383] which belongs to the cache kmalloc-64 of size 64 [ 60.154861] The buggy address is located 0 bytes to the right of [ 60.154861] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 60.167862] [ 60.169385] The buggy address belongs to the physical page: [ 60.175031] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 60.183137] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.189745] page_type: f5(slab) [ 60.192946] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 60.200782] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.208613] page dumped because: kasan: bad access detected [ 60.214260] [ 60.215783] Memory state around the buggy address: [ 60.220639] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.227951] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.235263] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.242571] ^ [ 60.247428] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.254738] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 60.262049] ================================================================== [ 64.315559] ================================================================== [ 64.322870] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 64.330275] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363 [ 64.337764] [ 64.339289] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 64.339318] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.339328] Hardware name: Thundercomm Dragonboard 845c (DT) [ 64.339337] Call trace: [ 64.339343] show_stack+0x20/0x38 (C) [ 64.339360] dump_stack_lvl+0x8c/0xd0 [ 64.339378] print_report+0x118/0x608 [ 64.339398] kasan_report+0xdc/0x128 [ 64.339418] kasan_check_range+0x100/0x1a8 [ 64.339438] __kasan_check_write+0x20/0x30 [ 64.339454] kasan_atomics_helper+0xb70/0x4858 [ 64.339471] kasan_atomics+0x198/0x2e0 [ 64.339488] kunit_try_run_case+0x170/0x3f0 [ 64.339506] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.339527] kthread+0x328/0x630 [ 64.339541] ret_from_fork+0x10/0x20 [ 64.339557] [ 64.412733] Allocated by task 363: [ 64.416190] kasan_save_stack+0x3c/0x68 [ 64.420089] kasan_save_track+0x20/0x40 [ 64.423987] kasan_save_alloc_info+0x40/0x58 [ 64.428324] __kasan_kmalloc+0xd4/0xd8 [ 64.432135] __kmalloc_cache_noprof+0x16c/0x3c0 [ 64.436736] kasan_atomics+0xb8/0x2e0 [ 64.440457] kunit_try_run_case+0x170/0x3f0 [ 64.444710] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.450279] kthread+0x328/0x630 [ 64.453564] ret_from_fork+0x10/0x20 [ 64.457200] [ 64.458722] The buggy address belongs to the object at ffff000080acff00 [ 64.458722] which belongs to the cache kmalloc-64 of size 64 [ 64.471200] The buggy address is located 0 bytes to the right of [ 64.471200] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 64.484203] [ 64.485725] The buggy address belongs to the physical page: [ 64.491372] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 64.499478] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 64.506084] page_type: f5(slab) [ 64.509283] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 64.517120] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.524952] page dumped because: kasan: bad access detected [ 64.530599] [ 64.532122] Memory state around the buggy address: [ 64.536978] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.544290] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.551603] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 64.558914] ^ [ 64.563770] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.571081] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 64.578391] ================================================================== [ 62.697717] ================================================================== [ 62.705027] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 62.712431] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363 [ 62.719920] [ 62.721456] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 62.721484] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.721491] Hardware name: Thundercomm Dragonboard 845c (DT) [ 62.721501] Call trace: [ 62.721507] show_stack+0x20/0x38 (C) [ 62.721525] dump_stack_lvl+0x8c/0xd0 [ 62.721542] print_report+0x118/0x608 [ 62.721560] kasan_report+0xdc/0x128 [ 62.721579] kasan_check_range+0x100/0x1a8 [ 62.721599] __kasan_check_write+0x20/0x30 [ 62.721616] kasan_atomics_helper+0x934/0x4858 [ 62.721634] kasan_atomics+0x198/0x2e0 [ 62.721652] kunit_try_run_case+0x170/0x3f0 [ 62.721669] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.721689] kthread+0x328/0x630 [ 62.721702] ret_from_fork+0x10/0x20 [ 62.721719] [ 62.794874] Allocated by task 363: [ 62.798331] kasan_save_stack+0x3c/0x68 [ 62.802229] kasan_save_track+0x20/0x40 [ 62.806126] kasan_save_alloc_info+0x40/0x58 [ 62.810465] __kasan_kmalloc+0xd4/0xd8 [ 62.814274] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.818876] kasan_atomics+0xb8/0x2e0 [ 62.822596] kunit_try_run_case+0x170/0x3f0 [ 62.826849] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.832418] kthread+0x328/0x630 [ 62.835704] ret_from_fork+0x10/0x20 [ 62.839339] [ 62.840861] The buggy address belongs to the object at ffff000080acff00 [ 62.840861] which belongs to the cache kmalloc-64 of size 64 [ 62.853339] The buggy address is located 0 bytes to the right of [ 62.853339] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 62.866341] [ 62.867865] The buggy address belongs to the physical page: [ 62.873511] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 62.881619] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.888227] page_type: f5(slab) [ 62.891426] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 62.899263] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.907096] page dumped because: kasan: bad access detected [ 62.912742] [ 62.914265] Memory state around the buggy address: [ 62.919119] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.926431] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.933742] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.941051] ^ [ 62.945907] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.953220] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 62.960528] ================================================================== [ 68.347895] ================================================================== [ 68.355204] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 68.362607] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363 [ 68.370095] [ 68.371620] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 68.371648] Tainted: [B]=BAD_PAGE, [N]=TEST [ 68.371657] Hardware name: Thundercomm Dragonboard 845c (DT) [ 68.371666] Call trace: [ 68.371673] show_stack+0x20/0x38 (C) [ 68.371690] dump_stack_lvl+0x8c/0xd0 [ 68.371707] print_report+0x118/0x608 [ 68.371725] kasan_report+0xdc/0x128 [ 68.371745] kasan_check_range+0x100/0x1a8 [ 68.371766] __kasan_check_write+0x20/0x30 [ 68.371781] kasan_atomics_helper+0xff0/0x4858 [ 68.371800] kasan_atomics+0x198/0x2e0 [ 68.371817] kunit_try_run_case+0x170/0x3f0 [ 68.371836] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.371857] kthread+0x328/0x630 [ 68.371871] ret_from_fork+0x10/0x20 [ 68.371887] [ 68.445051] Allocated by task 363: [ 68.448507] kasan_save_stack+0x3c/0x68 [ 68.452406] kasan_save_track+0x20/0x40 [ 68.456303] kasan_save_alloc_info+0x40/0x58 [ 68.460641] __kasan_kmalloc+0xd4/0xd8 [ 68.464450] __kmalloc_cache_noprof+0x16c/0x3c0 [ 68.469054] kasan_atomics+0xb8/0x2e0 [ 68.472775] kunit_try_run_case+0x170/0x3f0 [ 68.477028] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.482597] kthread+0x328/0x630 [ 68.485884] ret_from_fork+0x10/0x20 [ 68.489518] [ 68.491041] The buggy address belongs to the object at ffff000080acff00 [ 68.491041] which belongs to the cache kmalloc-64 of size 64 [ 68.503519] The buggy address is located 0 bytes to the right of [ 68.503519] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 68.516519] [ 68.518043] The buggy address belongs to the physical page: [ 68.523689] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 68.531796] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 68.538401] page_type: f5(slab) [ 68.541601] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 68.549436] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 68.557268] page dumped because: kasan: bad access detected [ 68.562914] [ 68.564437] Memory state around the buggy address: [ 68.569292] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.576604] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.583916] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 68.591227] ^ [ 68.596082] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.603395] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 68.610704] ================================================================== [ 61.620303] ================================================================== [ 61.627615] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858 [ 61.635020] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363 [ 61.642510] [ 61.644036] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 61.644066] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.644076] Hardware name: Thundercomm Dragonboard 845c (DT) [ 61.644086] Call trace: [ 61.644093] show_stack+0x20/0x38 (C) [ 61.644110] dump_stack_lvl+0x8c/0xd0 [ 61.644128] print_report+0x118/0x608 [ 61.644148] kasan_report+0xdc/0x128 [ 61.644167] kasan_check_range+0x100/0x1a8 [ 61.644188] __kasan_check_write+0x20/0x30 [ 61.644204] kasan_atomics_helper+0x760/0x4858 [ 61.644223] kasan_atomics+0x198/0x2e0 [ 61.644240] kunit_try_run_case+0x170/0x3f0 [ 61.644259] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.644281] kthread+0x328/0x630 [ 61.644295] ret_from_fork+0x10/0x20 [ 61.644311] [ 61.717477] Allocated by task 363: [ 61.720933] kasan_save_stack+0x3c/0x68 [ 61.724831] kasan_save_track+0x20/0x40 [ 61.728728] kasan_save_alloc_info+0x40/0x58 [ 61.733066] __kasan_kmalloc+0xd4/0xd8 [ 61.736874] __kmalloc_cache_noprof+0x16c/0x3c0 [ 61.741476] kasan_atomics+0xb8/0x2e0 [ 61.745199] kunit_try_run_case+0x170/0x3f0 [ 61.749452] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.755020] kthread+0x328/0x630 [ 61.758306] ret_from_fork+0x10/0x20 [ 61.761940] [ 61.763463] The buggy address belongs to the object at ffff000080acff00 [ 61.763463] which belongs to the cache kmalloc-64 of size 64 [ 61.775940] The buggy address is located 0 bytes to the right of [ 61.775940] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 61.788943] [ 61.790467] The buggy address belongs to the physical page: [ 61.796112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 61.804219] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.810827] page_type: f5(slab) [ 61.814026] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 61.821863] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.829696] page dumped because: kasan: bad access detected [ 61.835343] [ 61.836866] Memory state around the buggy address: [ 61.841720] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.849034] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.856345] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.863656] ^ [ 61.868513] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.875824] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 61.883134] ================================================================== [ 72.129206] ================================================================== [ 72.136518] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 72.144012] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363 [ 72.151501] [ 72.153026] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 72.153055] Tainted: [B]=BAD_PAGE, [N]=TEST [ 72.153063] Hardware name: Thundercomm Dragonboard 845c (DT) [ 72.153072] Call trace: [ 72.153078] show_stack+0x20/0x38 (C) [ 72.153094] dump_stack_lvl+0x8c/0xd0 [ 72.153112] print_report+0x118/0x608 [ 72.153130] kasan_report+0xdc/0x128 [ 72.153149] kasan_check_range+0x100/0x1a8 [ 72.153169] __kasan_check_write+0x20/0x30 [ 72.153185] kasan_atomics_helper+0x15b4/0x4858 [ 72.153203] kasan_atomics+0x198/0x2e0 [ 72.153219] kunit_try_run_case+0x170/0x3f0 [ 72.153236] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.153258] kthread+0x328/0x630 [ 72.153271] ret_from_fork+0x10/0x20 [ 72.153287] [ 72.226542] Allocated by task 363: [ 72.229998] kasan_save_stack+0x3c/0x68 [ 72.233897] kasan_save_track+0x20/0x40 [ 72.237795] kasan_save_alloc_info+0x40/0x58 [ 72.242133] __kasan_kmalloc+0xd4/0xd8 [ 72.245942] __kmalloc_cache_noprof+0x16c/0x3c0 [ 72.250544] kasan_atomics+0xb8/0x2e0 [ 72.254266] kunit_try_run_case+0x170/0x3f0 [ 72.258520] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.264088] kthread+0x328/0x630 [ 72.267373] ret_from_fork+0x10/0x20 [ 72.271008] [ 72.272530] The buggy address belongs to the object at ffff000080acff00 [ 72.272530] which belongs to the cache kmalloc-64 of size 64 [ 72.285010] The buggy address is located 0 bytes to the right of [ 72.285010] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 72.298011] [ 72.299534] The buggy address belongs to the physical page: [ 72.305179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 72.313287] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 72.319893] page_type: f5(slab) [ 72.323093] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 72.330930] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 72.338763] page dumped because: kasan: bad access detected [ 72.344409] [ 72.345932] Memory state around the buggy address: [ 72.350787] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.358100] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.365412] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 72.372722] ^ [ 72.377578] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.384889] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 72.392198] ================================================================== [ 73.203536] ================================================================== [ 73.210847] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 73.218337] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363 [ 73.225825] [ 73.227350] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 73.227379] Tainted: [B]=BAD_PAGE, [N]=TEST [ 73.227388] Hardware name: Thundercomm Dragonboard 845c (DT) [ 73.227398] Call trace: [ 73.227404] show_stack+0x20/0x38 (C) [ 73.227421] dump_stack_lvl+0x8c/0xd0 [ 73.227440] print_report+0x118/0x608 [ 73.227458] kasan_report+0xdc/0x128 [ 73.227476] kasan_check_range+0x100/0x1a8 [ 73.227495] __kasan_check_write+0x20/0x30 [ 73.227510] kasan_atomics_helper+0x16d0/0x4858 [ 73.227529] kasan_atomics+0x198/0x2e0 [ 73.227546] kunit_try_run_case+0x170/0x3f0 [ 73.227564] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.227583] kthread+0x328/0x630 [ 73.227597] ret_from_fork+0x10/0x20 [ 73.227613] [ 73.300865] Allocated by task 363: [ 73.304321] kasan_save_stack+0x3c/0x68 [ 73.308220] kasan_save_track+0x20/0x40 [ 73.312118] kasan_save_alloc_info+0x40/0x58 [ 73.316456] __kasan_kmalloc+0xd4/0xd8 [ 73.320265] __kmalloc_cache_noprof+0x16c/0x3c0 [ 73.324868] kasan_atomics+0xb8/0x2e0 [ 73.328589] kunit_try_run_case+0x170/0x3f0 [ 73.332842] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.338410] kthread+0x328/0x630 [ 73.341695] ret_from_fork+0x10/0x20 [ 73.345330] [ 73.346853] The buggy address belongs to the object at ffff000080acff00 [ 73.346853] which belongs to the cache kmalloc-64 of size 64 [ 73.359330] The buggy address is located 0 bytes to the right of [ 73.359330] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 73.372331] [ 73.373854] The buggy address belongs to the physical page: [ 73.379499] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 73.387605] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 73.394211] page_type: f5(slab) [ 73.397411] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 73.405245] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 73.413077] page dumped because: kasan: bad access detected [ 73.418723] [ 73.420246] Memory state around the buggy address: [ 73.425101] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.432412] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.439723] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.447032] ^ [ 73.451887] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.459199] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 73.466508] ================================================================== [ 60.809766] ================================================================== [ 60.817075] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 60.824479] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363 [ 60.831966] [ 60.833492] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 60.833520] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.833528] Hardware name: Thundercomm Dragonboard 845c (DT) [ 60.833538] Call trace: [ 60.833544] show_stack+0x20/0x38 (C) [ 60.833562] dump_stack_lvl+0x8c/0xd0 [ 60.833580] print_report+0x118/0x608 [ 60.833598] kasan_report+0xdc/0x128 [ 60.833616] kasan_check_range+0x100/0x1a8 [ 60.833637] __kasan_check_write+0x20/0x30 [ 60.833652] kasan_atomics_helper+0x61c/0x4858 [ 60.833670] kasan_atomics+0x198/0x2e0 [ 60.833687] kunit_try_run_case+0x170/0x3f0 [ 60.833705] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.833727] kthread+0x328/0x630 [ 60.833740] ret_from_fork+0x10/0x20 [ 60.833756] [ 60.906920] Allocated by task 363: [ 60.910376] kasan_save_stack+0x3c/0x68 [ 60.914274] kasan_save_track+0x20/0x40 [ 60.918172] kasan_save_alloc_info+0x40/0x58 [ 60.922510] __kasan_kmalloc+0xd4/0xd8 [ 60.926319] __kmalloc_cache_noprof+0x16c/0x3c0 [ 60.930919] kasan_atomics+0xb8/0x2e0 [ 60.934641] kunit_try_run_case+0x170/0x3f0 [ 60.938895] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.944464] kthread+0x328/0x630 [ 60.947749] ret_from_fork+0x10/0x20 [ 60.951383] [ 60.952906] The buggy address belongs to the object at ffff000080acff00 [ 60.952906] which belongs to the cache kmalloc-64 of size 64 [ 60.965385] The buggy address is located 0 bytes to the right of [ 60.965385] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 60.978387] [ 60.979909] The buggy address belongs to the physical page: [ 60.985555] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 60.993660] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.000267] page_type: f5(slab) [ 61.003467] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 61.011303] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.019135] page dumped because: kasan: bad access detected [ 61.024781] [ 61.026303] Memory state around the buggy address: [ 61.031159] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.038472] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.045783] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.053092] ^ [ 61.057947] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.065258] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 61.072569] ================================================================== [ 73.473868] ================================================================== [ 73.481179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 73.488670] Read of size 8 at addr ffff000080acff30 by task kunit_try_catch/363 [ 73.496071] [ 73.497596] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 73.497624] Tainted: [B]=BAD_PAGE, [N]=TEST [ 73.497632] Hardware name: Thundercomm Dragonboard 845c (DT) [ 73.497641] Call trace: [ 73.497647] show_stack+0x20/0x38 (C) [ 73.497665] dump_stack_lvl+0x8c/0xd0 [ 73.497684] print_report+0x118/0x608 [ 73.497703] kasan_report+0xdc/0x128 [ 73.497722] __asan_report_load8_noabort+0x20/0x30 [ 73.497739] kasan_atomics_helper+0x3e10/0x4858 [ 73.497757] kasan_atomics+0x198/0x2e0 [ 73.497774] kunit_try_run_case+0x170/0x3f0 [ 73.497792] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.497812] kthread+0x328/0x630 [ 73.497825] ret_from_fork+0x10/0x20 [ 73.497842] [ 73.567640] Allocated by task 363: [ 73.571095] kasan_save_stack+0x3c/0x68 [ 73.574995] kasan_save_track+0x20/0x40 [ 73.578891] kasan_save_alloc_info+0x40/0x58 [ 73.583229] __kasan_kmalloc+0xd4/0xd8 [ 73.587037] __kmalloc_cache_noprof+0x16c/0x3c0 [ 73.591639] kasan_atomics+0xb8/0x2e0 [ 73.595361] kunit_try_run_case+0x170/0x3f0 [ 73.599613] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.605181] kthread+0x328/0x630 [ 73.608467] ret_from_fork+0x10/0x20 [ 73.612101] [ 73.613623] The buggy address belongs to the object at ffff000080acff00 [ 73.613623] which belongs to the cache kmalloc-64 of size 64 [ 73.626100] The buggy address is located 0 bytes to the right of [ 73.626100] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 73.639099] [ 73.640622] The buggy address belongs to the physical page: [ 73.646267] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 73.654372] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 73.660979] page_type: f5(slab) [ 73.664178] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 73.672013] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 73.679844] page dumped because: kasan: bad access detected [ 73.685489] [ 73.687011] Memory state around the buggy address: [ 73.691865] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.699175] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.706486] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.713794] ^ [ 73.718650] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.725960] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 73.733269] ================================================================== [ 74.010951] ================================================================== [ 74.018262] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 74.025751] Read of size 8 at addr ffff000080acff30 by task kunit_try_catch/363 [ 74.033153] [ 74.034688] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 74.034717] Tainted: [B]=BAD_PAGE, [N]=TEST [ 74.034725] Hardware name: Thundercomm Dragonboard 845c (DT) [ 74.034735] Call trace: [ 74.034741] show_stack+0x20/0x38 (C) [ 74.034758] dump_stack_lvl+0x8c/0xd0 [ 74.034776] print_report+0x118/0x608 [ 74.034794] kasan_report+0xdc/0x128 [ 74.034812] __asan_report_load8_noabort+0x20/0x30 [ 74.034828] kasan_atomics_helper+0x3e20/0x4858 [ 74.034847] kasan_atomics+0x198/0x2e0 [ 74.034864] kunit_try_run_case+0x170/0x3f0 [ 74.034881] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.034902] kthread+0x328/0x630 [ 74.034915] ret_from_fork+0x10/0x20 [ 74.034932] [ 74.104729] Allocated by task 363: [ 74.108184] kasan_save_stack+0x3c/0x68 [ 74.112083] kasan_save_track+0x20/0x40 [ 74.115980] kasan_save_alloc_info+0x40/0x58 [ 74.120318] __kasan_kmalloc+0xd4/0xd8 [ 74.124127] __kmalloc_cache_noprof+0x16c/0x3c0 [ 74.128728] kasan_atomics+0xb8/0x2e0 [ 74.132449] kunit_try_run_case+0x170/0x3f0 [ 74.136702] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.142271] kthread+0x328/0x630 [ 74.145557] ret_from_fork+0x10/0x20 [ 74.149191] [ 74.150714] The buggy address belongs to the object at ffff000080acff00 [ 74.150714] which belongs to the cache kmalloc-64 of size 64 [ 74.163190] The buggy address is located 0 bytes to the right of [ 74.163190] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 74.176190] [ 74.177713] The buggy address belongs to the physical page: [ 74.183359] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 74.191465] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 74.198072] page_type: f5(slab) [ 74.201271] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 74.209108] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 74.216939] page dumped because: kasan: bad access detected [ 74.222584] [ 74.224107] Memory state around the buggy address: [ 74.228962] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.236273] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.243585] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 74.250893] ^ [ 74.255749] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.263059] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.270368] ================================================================== [ 74.277740] ================================================================== [ 74.285051] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 74.292541] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363 [ 74.300028] [ 74.301553] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 74.301582] Tainted: [B]=BAD_PAGE, [N]=TEST [ 74.301590] Hardware name: Thundercomm Dragonboard 845c (DT) [ 74.301600] Call trace: [ 74.301606] show_stack+0x20/0x38 (C) [ 74.301623] dump_stack_lvl+0x8c/0xd0 [ 74.301640] print_report+0x118/0x608 [ 74.301658] kasan_report+0xdc/0x128 [ 74.301677] kasan_check_range+0x100/0x1a8 [ 74.301698] __kasan_check_write+0x20/0x30 [ 74.301714] kasan_atomics_helper+0x17ec/0x4858 [ 74.301733] kasan_atomics+0x198/0x2e0 [ 74.301751] kunit_try_run_case+0x170/0x3f0 [ 74.301769] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.301790] kthread+0x328/0x630 [ 74.301804] ret_from_fork+0x10/0x20 [ 74.301821] [ 74.375070] Allocated by task 363: [ 74.378526] kasan_save_stack+0x3c/0x68 [ 74.382424] kasan_save_track+0x20/0x40 [ 74.386321] kasan_save_alloc_info+0x40/0x58 [ 74.390659] __kasan_kmalloc+0xd4/0xd8 [ 74.394468] __kmalloc_cache_noprof+0x16c/0x3c0 [ 74.399069] kasan_atomics+0xb8/0x2e0 [ 74.402791] kunit_try_run_case+0x170/0x3f0 [ 74.407044] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.412613] kthread+0x328/0x630 [ 74.415898] ret_from_fork+0x10/0x20 [ 74.419533] [ 74.421055] The buggy address belongs to the object at ffff000080acff00 [ 74.421055] which belongs to the cache kmalloc-64 of size 64 [ 74.433531] The buggy address is located 0 bytes to the right of [ 74.433531] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 74.446532] [ 74.448056] The buggy address belongs to the physical page: [ 74.453700] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 74.461806] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 74.468413] page_type: f5(slab) [ 74.471613] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 74.479448] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 74.487280] page dumped because: kasan: bad access detected [ 74.492926] [ 74.494448] Memory state around the buggy address: [ 74.499303] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.506613] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.513925] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 74.521234] ^ [ 74.526090] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.533401] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.540710] ================================================================== [ 69.699541] ================================================================== [ 69.706853] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 69.714347] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363 [ 69.721838] [ 69.723363] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 69.723393] Tainted: [B]=BAD_PAGE, [N]=TEST [ 69.723401] Hardware name: Thundercomm Dragonboard 845c (DT) [ 69.723411] Call trace: [ 69.723418] show_stack+0x20/0x38 (C) [ 69.723435] dump_stack_lvl+0x8c/0xd0 [ 69.723454] print_report+0x118/0x608 [ 69.723473] kasan_report+0xdc/0x128 [ 69.723491] kasan_check_range+0x100/0x1a8 [ 69.723512] __kasan_check_write+0x20/0x30 [ 69.723528] kasan_atomics_helper+0x11f8/0x4858 [ 69.723546] kasan_atomics+0x198/0x2e0 [ 69.723562] kunit_try_run_case+0x170/0x3f0 [ 69.723580] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.723601] kthread+0x328/0x630 [ 69.723614] ret_from_fork+0x10/0x20 [ 69.723630] [ 69.796882] Allocated by task 363: [ 69.800339] kasan_save_stack+0x3c/0x68 [ 69.804239] kasan_save_track+0x20/0x40 [ 69.808136] kasan_save_alloc_info+0x40/0x58 [ 69.812476] __kasan_kmalloc+0xd4/0xd8 [ 69.816285] __kmalloc_cache_noprof+0x16c/0x3c0 [ 69.820886] kasan_atomics+0xb8/0x2e0 [ 69.824607] kunit_try_run_case+0x170/0x3f0 [ 69.828859] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.834429] kthread+0x328/0x630 [ 69.837715] ret_from_fork+0x10/0x20 [ 69.841349] [ 69.842872] The buggy address belongs to the object at ffff000080acff00 [ 69.842872] which belongs to the cache kmalloc-64 of size 64 [ 69.855349] The buggy address is located 0 bytes to the right of [ 69.855349] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 69.868350] [ 69.869874] The buggy address belongs to the physical page: [ 69.875519] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 69.883628] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 69.890235] page_type: f5(slab) [ 69.893434] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 69.901271] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 69.909102] page dumped because: kasan: bad access detected [ 69.914748] [ 69.916270] Memory state around the buggy address: [ 69.921125] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.928438] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.935750] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 69.943059] ^ [ 69.947916] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.955227] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 69.962536] ================================================================== [ 58.114772] ================================================================== [ 58.122087] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 58.129494] Read of size 4 at addr ffff000080acff30 by task kunit_try_catch/363 [ 58.136897] [ 58.138422] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 58.138452] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.138460] Hardware name: Thundercomm Dragonboard 845c (DT) [ 58.138470] Call trace: [ 58.138477] show_stack+0x20/0x38 (C) [ 58.138494] dump_stack_lvl+0x8c/0xd0 [ 58.138512] print_report+0x118/0x608 [ 58.138531] kasan_report+0xdc/0x128 [ 58.138549] kasan_check_range+0x100/0x1a8 [ 58.138569] __kasan_check_read+0x20/0x30 [ 58.138585] kasan_atomics_helper+0x2b0/0x4858 [ 58.138604] kasan_atomics+0x198/0x2e0 [ 58.138622] kunit_try_run_case+0x170/0x3f0 [ 58.138641] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.138661] kthread+0x328/0x630 [ 58.138676] ret_from_fork+0x10/0x20 [ 58.138692] [ 58.211760] Allocated by task 363: [ 58.215215] kasan_save_stack+0x3c/0x68 [ 58.219121] kasan_save_track+0x20/0x40 [ 58.223018] kasan_save_alloc_info+0x40/0x58 [ 58.227352] __kasan_kmalloc+0xd4/0xd8 [ 58.231161] __kmalloc_cache_noprof+0x16c/0x3c0 [ 58.235759] kasan_atomics+0xb8/0x2e0 [ 58.239488] kunit_try_run_case+0x170/0x3f0 [ 58.243741] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.249306] kthread+0x328/0x630 [ 58.252590] ret_from_fork+0x10/0x20 [ 58.256221] [ 58.257744] The buggy address belongs to the object at ffff000080acff00 [ 58.257744] which belongs to the cache kmalloc-64 of size 64 [ 58.270222] The buggy address is located 0 bytes to the right of [ 58.270222] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 58.283235] [ 58.284759] The buggy address belongs to the physical page: [ 58.290401] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 58.298500] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.305111] page_type: f5(slab) [ 58.308311] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 58.316151] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 58.323987] page dumped because: kasan: bad access detected [ 58.329630] [ 58.331162] Memory state around the buggy address: [ 58.336014] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.343321] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.350626] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.357941] ^ [ 58.362795] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.370108] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 58.377423] ================================================================== [ 68.888416] ================================================================== [ 68.895726] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 68.903217] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363 [ 68.910705] [ 68.912230] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 68.912259] Tainted: [B]=BAD_PAGE, [N]=TEST [ 68.912268] Hardware name: Thundercomm Dragonboard 845c (DT) [ 68.912278] Call trace: [ 68.912285] show_stack+0x20/0x38 (C) [ 68.912302] dump_stack_lvl+0x8c/0xd0 [ 68.912320] print_report+0x118/0x608 [ 68.912338] kasan_report+0xdc/0x128 [ 68.912358] kasan_check_range+0x100/0x1a8 [ 68.912377] __kasan_check_write+0x20/0x30 [ 68.912394] kasan_atomics_helper+0x10c0/0x4858 [ 68.912413] kasan_atomics+0x198/0x2e0 [ 68.912429] kunit_try_run_case+0x170/0x3f0 [ 68.912447] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.912469] kthread+0x328/0x630 [ 68.912483] ret_from_fork+0x10/0x20 [ 68.912500] [ 68.985750] Allocated by task 363: [ 68.989206] kasan_save_stack+0x3c/0x68 [ 68.993103] kasan_save_track+0x20/0x40 [ 68.997000] kasan_save_alloc_info+0x40/0x58 [ 69.001339] __kasan_kmalloc+0xd4/0xd8 [ 69.005148] __kmalloc_cache_noprof+0x16c/0x3c0 [ 69.009749] kasan_atomics+0xb8/0x2e0 [ 69.013471] kunit_try_run_case+0x170/0x3f0 [ 69.017725] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.023294] kthread+0x328/0x630 [ 69.026580] ret_from_fork+0x10/0x20 [ 69.030214] [ 69.031737] The buggy address belongs to the object at ffff000080acff00 [ 69.031737] which belongs to the cache kmalloc-64 of size 64 [ 69.044215] The buggy address is located 0 bytes to the right of [ 69.044215] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 69.057216] [ 69.058740] The buggy address belongs to the physical page: [ 69.064385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 69.072490] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 69.079098] page_type: f5(slab) [ 69.082296] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 69.090133] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 69.097966] page dumped because: kasan: bad access detected [ 69.103611] [ 69.105134] Memory state around the buggy address: [ 69.109989] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.117301] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.124615] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 69.131924] ^ [ 69.136780] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.144092] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 69.151402] ================================================================== [ 70.780970] ================================================================== [ 70.788282] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 70.795773] Read of size 8 at addr ffff000080acff30 by task kunit_try_catch/363 [ 70.803175] [ 70.804700] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 70.804729] Tainted: [B]=BAD_PAGE, [N]=TEST [ 70.804736] Hardware name: Thundercomm Dragonboard 845c (DT) [ 70.804746] Call trace: [ 70.804753] show_stack+0x20/0x38 (C) [ 70.804770] dump_stack_lvl+0x8c/0xd0 [ 70.804788] print_report+0x118/0x608 [ 70.804807] kasan_report+0xdc/0x128 [ 70.804826] __asan_report_load8_noabort+0x20/0x30 [ 70.804843] kasan_atomics_helper+0x3f04/0x4858 [ 70.804861] kasan_atomics+0x198/0x2e0 [ 70.804878] kunit_try_run_case+0x170/0x3f0 [ 70.804897] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.804917] kthread+0x328/0x630 [ 70.804931] ret_from_fork+0x10/0x20 [ 70.804947] [ 70.874746] Allocated by task 363: [ 70.878203] kasan_save_stack+0x3c/0x68 [ 70.882102] kasan_save_track+0x20/0x40 [ 70.886000] kasan_save_alloc_info+0x40/0x58 [ 70.890339] __kasan_kmalloc+0xd4/0xd8 [ 70.894148] __kmalloc_cache_noprof+0x16c/0x3c0 [ 70.898750] kasan_atomics+0xb8/0x2e0 [ 70.902472] kunit_try_run_case+0x170/0x3f0 [ 70.906724] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.912293] kthread+0x328/0x630 [ 70.915580] ret_from_fork+0x10/0x20 [ 70.919215] [ 70.920738] The buggy address belongs to the object at ffff000080acff00 [ 70.920738] which belongs to the cache kmalloc-64 of size 64 [ 70.933216] The buggy address is located 0 bytes to the right of [ 70.933216] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 70.946218] [ 70.947742] The buggy address belongs to the physical page: [ 70.953387] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 70.961494] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 70.968102] page_type: f5(slab) [ 70.971301] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 70.979138] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 70.986970] page dumped because: kasan: bad access detected [ 70.992616] [ 70.994138] Memory state around the buggy address: [ 70.998993] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.006305] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.013616] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 71.020926] ^ [ 71.025782] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.033095] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 71.040406] ================================================================== [ 65.926483] ================================================================== [ 65.933795] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 65.941199] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363 [ 65.948688] [ 65.950214] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 65.950243] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.950253] Hardware name: Thundercomm Dragonboard 845c (DT) [ 65.950262] Call trace: [ 65.950269] show_stack+0x20/0x38 (C) [ 65.950285] dump_stack_lvl+0x8c/0xd0 [ 65.950304] print_report+0x118/0x608 [ 65.950322] kasan_report+0xdc/0x128 [ 65.950340] kasan_check_range+0x100/0x1a8 [ 65.950360] __kasan_check_write+0x20/0x30 [ 65.950374] kasan_atomics_helper+0xd3c/0x4858 [ 65.950392] kasan_atomics+0x198/0x2e0 [ 65.950409] kunit_try_run_case+0x170/0x3f0 [ 65.950426] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.950446] kthread+0x328/0x630 [ 65.950459] ret_from_fork+0x10/0x20 [ 65.950475] [ 66.023642] Allocated by task 363: [ 66.027099] kasan_save_stack+0x3c/0x68 [ 66.030998] kasan_save_track+0x20/0x40 [ 66.034895] kasan_save_alloc_info+0x40/0x58 [ 66.039234] __kasan_kmalloc+0xd4/0xd8 [ 66.043043] __kmalloc_cache_noprof+0x16c/0x3c0 [ 66.047644] kasan_atomics+0xb8/0x2e0 [ 66.051367] kunit_try_run_case+0x170/0x3f0 [ 66.055621] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.061190] kthread+0x328/0x630 [ 66.064477] ret_from_fork+0x10/0x20 [ 66.068111] [ 66.069634] The buggy address belongs to the object at ffff000080acff00 [ 66.069634] which belongs to the cache kmalloc-64 of size 64 [ 66.082111] The buggy address is located 0 bytes to the right of [ 66.082111] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 66.095112] [ 66.096636] The buggy address belongs to the physical page: [ 66.102281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 66.110388] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 66.116995] page_type: f5(slab) [ 66.120195] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 66.128030] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.135862] page dumped because: kasan: bad access detected [ 66.141508] [ 66.143031] Memory state around the buggy address: [ 66.147886] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.155198] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.162510] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 66.169819] ^ [ 66.174676] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.181987] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 66.189297] ================================================================== [ 57.844583] ================================================================== [ 57.851902] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 57.859312] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363 [ 57.866796] [ 57.868331] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 57.868360] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.868369] Hardware name: Thundercomm Dragonboard 845c (DT) [ 57.868380] Call trace: [ 57.868386] show_stack+0x20/0x38 (C) [ 57.868403] dump_stack_lvl+0x8c/0xd0 [ 57.868422] print_report+0x118/0x608 [ 57.868441] kasan_report+0xdc/0x128 [ 57.868460] kasan_check_range+0x100/0x1a8 [ 57.868481] __kasan_check_write+0x20/0x30 [ 57.868496] kasan_atomics_helper+0x24c/0x4858 [ 57.868514] kasan_atomics+0x198/0x2e0 [ 57.868530] kunit_try_run_case+0x170/0x3f0 [ 57.868548] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.868569] kthread+0x328/0x630 [ 57.868582] ret_from_fork+0x10/0x20 [ 57.868600] [ 57.941765] Allocated by task 363: [ 57.945217] kasan_save_stack+0x3c/0x68 [ 57.949121] kasan_save_track+0x20/0x40 [ 57.953025] kasan_save_alloc_info+0x40/0x58 [ 57.957360] __kasan_kmalloc+0xd4/0xd8 [ 57.961175] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.965773] kasan_atomics+0xb8/0x2e0 [ 57.969501] kunit_try_run_case+0x170/0x3f0 [ 57.973751] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.979311] kthread+0x328/0x630 [ 57.982597] ret_from_fork+0x10/0x20 [ 57.986228] [ 57.987758] The buggy address belongs to the object at ffff000080acff00 [ 57.987758] which belongs to the cache kmalloc-64 of size 64 [ 58.000237] The buggy address is located 0 bytes to the right of [ 58.000237] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 58.013236] [ 58.014762] The buggy address belongs to the physical page: [ 58.020399] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 58.028498] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.035111] page_type: f5(slab) [ 58.038308] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 58.046148] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 58.053980] page dumped because: kasan: bad access detected [ 58.059618] [ 58.061142] Memory state around the buggy address: [ 58.065993] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.073308] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.080623] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.087937] ^ [ 58.092789] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.100103] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 58.107416] ================================================================== [ 58.921754] ================================================================== [ 58.929064] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 58.936556] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363 [ 58.944044] [ 58.945569] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 58.945599] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.945606] Hardware name: Thundercomm Dragonboard 845c (DT) [ 58.945617] Call trace: [ 58.945623] show_stack+0x20/0x38 (C) [ 58.945640] dump_stack_lvl+0x8c/0xd0 [ 58.945658] print_report+0x118/0x608 [ 58.945676] kasan_report+0xdc/0x128 [ 58.945693] __asan_report_store4_noabort+0x20/0x30 [ 58.945711] kasan_atomics_helper+0x3f94/0x4858 [ 58.945729] kasan_atomics+0x198/0x2e0 [ 58.945746] kunit_try_run_case+0x170/0x3f0 [ 58.945765] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.945786] kthread+0x328/0x630 [ 58.945800] ret_from_fork+0x10/0x20 [ 58.945817] [ 59.015700] Allocated by task 363: [ 59.019156] kasan_save_stack+0x3c/0x68 [ 59.023054] kasan_save_track+0x20/0x40 [ 59.026951] kasan_save_alloc_info+0x40/0x58 [ 59.031290] __kasan_kmalloc+0xd4/0xd8 [ 59.035098] __kmalloc_cache_noprof+0x16c/0x3c0 [ 59.039699] kasan_atomics+0xb8/0x2e0 [ 59.043420] kunit_try_run_case+0x170/0x3f0 [ 59.047673] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.053243] kthread+0x328/0x630 [ 59.056528] ret_from_fork+0x10/0x20 [ 59.060162] [ 59.061685] The buggy address belongs to the object at ffff000080acff00 [ 59.061685] which belongs to the cache kmalloc-64 of size 64 [ 59.074163] The buggy address is located 0 bytes to the right of [ 59.074163] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 59.087164] [ 59.088687] The buggy address belongs to the physical page: [ 59.094332] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 59.102441] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.109048] page_type: f5(slab) [ 59.112246] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 59.120084] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.127916] page dumped because: kasan: bad access detected [ 59.133562] [ 59.135085] Memory state around the buggy address: [ 59.139940] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.147253] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.154565] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.161874] ^ [ 59.166730] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.174041] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 59.181350] ================================================================== [ 62.160697] ================================================================== [ 62.168008] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 62.175412] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363 [ 62.182900] [ 62.184427] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 62.184455] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.184464] Hardware name: Thundercomm Dragonboard 845c (DT) [ 62.184474] Call trace: [ 62.184480] show_stack+0x20/0x38 (C) [ 62.184498] dump_stack_lvl+0x8c/0xd0 [ 62.184515] print_report+0x118/0x608 [ 62.184534] kasan_report+0xdc/0x128 [ 62.184552] kasan_check_range+0x100/0x1a8 [ 62.184572] __kasan_check_write+0x20/0x30 [ 62.184588] kasan_atomics_helper+0x894/0x4858 [ 62.184608] kasan_atomics+0x198/0x2e0 [ 62.184625] kunit_try_run_case+0x170/0x3f0 [ 62.184643] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.184663] kthread+0x328/0x630 [ 62.184677] ret_from_fork+0x10/0x20 [ 62.184695] [ 62.257858] Allocated by task 363: [ 62.261314] kasan_save_stack+0x3c/0x68 [ 62.265212] kasan_save_track+0x20/0x40 [ 62.269111] kasan_save_alloc_info+0x40/0x58 [ 62.273449] __kasan_kmalloc+0xd4/0xd8 [ 62.277260] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.281861] kasan_atomics+0xb8/0x2e0 [ 62.285583] kunit_try_run_case+0x170/0x3f0 [ 62.289836] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.295405] kthread+0x328/0x630 [ 62.298690] ret_from_fork+0x10/0x20 [ 62.302324] [ 62.303848] The buggy address belongs to the object at ffff000080acff00 [ 62.303848] which belongs to the cache kmalloc-64 of size 64 [ 62.316326] The buggy address is located 0 bytes to the right of [ 62.316326] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 62.329327] [ 62.330851] The buggy address belongs to the physical page: [ 62.336496] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 62.344604] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.351210] page_type: f5(slab) [ 62.354408] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 62.362244] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.370074] page dumped because: kasan: bad access detected [ 62.375720] [ 62.377242] Memory state around the buggy address: [ 62.382097] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.389409] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.396720] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.404029] ^ [ 62.408884] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.416195] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 62.423505] ================================================================== [ 67.000232] ================================================================== [ 67.007542] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 67.014947] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363 [ 67.022436] [ 67.023961] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 67.023990] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.023998] Hardware name: Thundercomm Dragonboard 845c (DT) [ 67.024008] Call trace: [ 67.024015] show_stack+0x20/0x38 (C) [ 67.024032] dump_stack_lvl+0x8c/0xd0 [ 67.024049] print_report+0x118/0x608 [ 67.024068] kasan_report+0xdc/0x128 [ 67.024087] kasan_check_range+0x100/0x1a8 [ 67.024107] __kasan_check_write+0x20/0x30 [ 67.024123] kasan_atomics_helper+0xe44/0x4858 [ 67.024142] kasan_atomics+0x198/0x2e0 [ 67.024158] kunit_try_run_case+0x170/0x3f0 [ 67.024177] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.024197] kthread+0x328/0x630 [ 67.024210] ret_from_fork+0x10/0x20 [ 67.024228] [ 67.097396] Allocated by task 363: [ 67.100851] kasan_save_stack+0x3c/0x68 [ 67.104748] kasan_save_track+0x20/0x40 [ 67.108647] kasan_save_alloc_info+0x40/0x58 [ 67.112984] __kasan_kmalloc+0xd4/0xd8 [ 67.116794] __kmalloc_cache_noprof+0x16c/0x3c0 [ 67.121395] kasan_atomics+0xb8/0x2e0 [ 67.125116] kunit_try_run_case+0x170/0x3f0 [ 67.129368] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.134938] kthread+0x328/0x630 [ 67.138223] ret_from_fork+0x10/0x20 [ 67.141858] [ 67.143381] The buggy address belongs to the object at ffff000080acff00 [ 67.143381] which belongs to the cache kmalloc-64 of size 64 [ 67.155860] The buggy address is located 0 bytes to the right of [ 67.155860] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 67.168861] [ 67.170386] The buggy address belongs to the physical page: [ 67.176031] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 67.184138] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 67.190745] page_type: f5(slab) [ 67.193945] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 67.201781] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 67.209614] page dumped because: kasan: bad access detected [ 67.215259] [ 67.216782] Memory state around the buggy address: [ 67.221638] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.228950] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.236263] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 67.243572] ^ [ 67.248429] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.255743] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 67.263055] ================================================================== [ 66.463440] ================================================================== [ 66.470751] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 66.478154] Read of size 8 at addr ffff000080acff30 by task kunit_try_catch/363 [ 66.485555] [ 66.487082] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 66.487111] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.487118] Hardware name: Thundercomm Dragonboard 845c (DT) [ 66.487129] Call trace: [ 66.487135] show_stack+0x20/0x38 (C) [ 66.487152] dump_stack_lvl+0x8c/0xd0 [ 66.487170] print_report+0x118/0x608 [ 66.487189] kasan_report+0xdc/0x128 [ 66.487207] kasan_check_range+0x100/0x1a8 [ 66.487227] __kasan_check_read+0x20/0x30 [ 66.487243] kasan_atomics_helper+0xdd4/0x4858 [ 66.487261] kasan_atomics+0x198/0x2e0 [ 66.487278] kunit_try_run_case+0x170/0x3f0 [ 66.487295] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.487316] kthread+0x328/0x630 [ 66.487330] ret_from_fork+0x10/0x20 [ 66.487346] [ 66.560416] Allocated by task 363: [ 66.563873] kasan_save_stack+0x3c/0x68 [ 66.567771] kasan_save_track+0x20/0x40 [ 66.571670] kasan_save_alloc_info+0x40/0x58 [ 66.576009] __kasan_kmalloc+0xd4/0xd8 [ 66.579817] __kmalloc_cache_noprof+0x16c/0x3c0 [ 66.584419] kasan_atomics+0xb8/0x2e0 [ 66.588140] kunit_try_run_case+0x170/0x3f0 [ 66.592392] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.597961] kthread+0x328/0x630 [ 66.601246] ret_from_fork+0x10/0x20 [ 66.604881] [ 66.606403] The buggy address belongs to the object at ffff000080acff00 [ 66.606403] which belongs to the cache kmalloc-64 of size 64 [ 66.618880] The buggy address is located 0 bytes to the right of [ 66.618880] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 66.631879] [ 66.633402] The buggy address belongs to the physical page: [ 66.639047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 66.647153] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 66.653760] page_type: f5(slab) [ 66.656959] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 66.664794] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.672625] page dumped because: kasan: bad access detected [ 66.678270] [ 66.679793] Memory state around the buggy address: [ 66.684648] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.691959] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.699269] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 66.706579] ^ [ 66.711435] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.718746] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 66.726057] ================================================================== [ 63.238080] ================================================================== [ 63.245389] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 63.252794] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363 [ 63.260282] [ 63.261808] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 63.261837] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.261845] Hardware name: Thundercomm Dragonboard 845c (DT) [ 63.261856] Call trace: [ 63.261861] show_stack+0x20/0x38 (C) [ 63.261879] dump_stack_lvl+0x8c/0xd0 [ 63.261897] print_report+0x118/0x608 [ 63.261916] kasan_report+0xdc/0x128 [ 63.261935] kasan_check_range+0x100/0x1a8 [ 63.261955] __kasan_check_write+0x20/0x30 [ 63.261970] kasan_atomics_helper+0xa04/0x4858 [ 63.261988] kasan_atomics+0x198/0x2e0 [ 63.262006] kunit_try_run_case+0x170/0x3f0 [ 63.262023] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.262045] kthread+0x328/0x630 [ 63.262058] ret_from_fork+0x10/0x20 [ 63.262075] [ 63.335241] Allocated by task 363: [ 63.338697] kasan_save_stack+0x3c/0x68 [ 63.342594] kasan_save_track+0x20/0x40 [ 63.346490] kasan_save_alloc_info+0x40/0x58 [ 63.350829] __kasan_kmalloc+0xd4/0xd8 [ 63.354640] __kmalloc_cache_noprof+0x16c/0x3c0 [ 63.359241] kasan_atomics+0xb8/0x2e0 [ 63.362964] kunit_try_run_case+0x170/0x3f0 [ 63.367216] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.372786] kthread+0x328/0x630 [ 63.376073] ret_from_fork+0x10/0x20 [ 63.379708] [ 63.381232] The buggy address belongs to the object at ffff000080acff00 [ 63.381232] which belongs to the cache kmalloc-64 of size 64 [ 63.393711] The buggy address is located 0 bytes to the right of [ 63.393711] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 63.406712] [ 63.408236] The buggy address belongs to the physical page: [ 63.413882] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 63.421988] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.428596] page_type: f5(slab) [ 63.431794] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 63.439630] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.447463] page dumped because: kasan: bad access detected [ 63.453109] [ 63.454638] Memory state around the buggy address: [ 63.459498] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.466813] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.474129] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 63.481440] ^ [ 63.486297] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.493611] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 63.500921] ================================================================== [ 63.508310] ================================================================== [ 63.515621] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 63.523028] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363 [ 63.530520] [ 63.532048] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 63.532076] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.532084] Hardware name: Thundercomm Dragonboard 845c (DT) [ 63.532095] Call trace: [ 63.532103] show_stack+0x20/0x38 (C) [ 63.532121] dump_stack_lvl+0x8c/0xd0 [ 63.532139] print_report+0x118/0x608 [ 63.532158] kasan_report+0xdc/0x128 [ 63.532177] kasan_check_range+0x100/0x1a8 [ 63.532197] __kasan_check_write+0x20/0x30 [ 63.532213] kasan_atomics_helper+0xa6c/0x4858 [ 63.532230] kasan_atomics+0x198/0x2e0 [ 63.532249] kunit_try_run_case+0x170/0x3f0 [ 63.532266] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.532286] kthread+0x328/0x630 [ 63.532300] ret_from_fork+0x10/0x20 [ 63.532316] [ 63.605484] Allocated by task 363: [ 63.608941] kasan_save_stack+0x3c/0x68 [ 63.612841] kasan_save_track+0x20/0x40 [ 63.616739] kasan_save_alloc_info+0x40/0x58 [ 63.621077] __kasan_kmalloc+0xd4/0xd8 [ 63.624885] __kmalloc_cache_noprof+0x16c/0x3c0 [ 63.629489] kasan_atomics+0xb8/0x2e0 [ 63.633210] kunit_try_run_case+0x170/0x3f0 [ 63.637464] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.643033] kthread+0x328/0x630 [ 63.646320] ret_from_fork+0x10/0x20 [ 63.649955] [ 63.651479] The buggy address belongs to the object at ffff000080acff00 [ 63.651479] which belongs to the cache kmalloc-64 of size 64 [ 63.663957] The buggy address is located 0 bytes to the right of [ 63.663957] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 63.676959] [ 63.678483] The buggy address belongs to the physical page: [ 63.684129] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 63.692237] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.698845] page_type: f5(slab) [ 63.702047] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 63.709885] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.717717] page dumped because: kasan: bad access detected [ 63.723363] [ 63.724886] Memory state around the buggy address: [ 63.729742] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.737055] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.744367] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 63.751678] ^ [ 63.756535] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.763847] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 63.771157] ================================================================== [ 68.077722] ================================================================== [ 68.085033] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 68.092437] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363 [ 68.099925] [ 68.101450] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 68.101479] Tainted: [B]=BAD_PAGE, [N]=TEST [ 68.101486] Hardware name: Thundercomm Dragonboard 845c (DT) [ 68.101497] Call trace: [ 68.101504] show_stack+0x20/0x38 (C) [ 68.101521] dump_stack_lvl+0x8c/0xd0 [ 68.101538] print_report+0x118/0x608 [ 68.101556] kasan_report+0xdc/0x128 [ 68.101574] kasan_check_range+0x100/0x1a8 [ 68.101594] __kasan_check_write+0x20/0x30 [ 68.101609] kasan_atomics_helper+0xf88/0x4858 [ 68.101627] kasan_atomics+0x198/0x2e0 [ 68.101643] kunit_try_run_case+0x170/0x3f0 [ 68.101661] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.101682] kthread+0x328/0x630 [ 68.101695] ret_from_fork+0x10/0x20 [ 68.101713] [ 68.174880] Allocated by task 363: [ 68.178336] kasan_save_stack+0x3c/0x68 [ 68.182235] kasan_save_track+0x20/0x40 [ 68.186131] kasan_save_alloc_info+0x40/0x58 [ 68.190468] __kasan_kmalloc+0xd4/0xd8 [ 68.194278] __kmalloc_cache_noprof+0x16c/0x3c0 [ 68.198879] kasan_atomics+0xb8/0x2e0 [ 68.202601] kunit_try_run_case+0x170/0x3f0 [ 68.206855] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.212423] kthread+0x328/0x630 [ 68.215708] ret_from_fork+0x10/0x20 [ 68.219343] [ 68.220866] The buggy address belongs to the object at ffff000080acff00 [ 68.220866] which belongs to the cache kmalloc-64 of size 64 [ 68.233343] The buggy address is located 0 bytes to the right of [ 68.233343] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 68.246345] [ 68.247868] The buggy address belongs to the physical page: [ 68.253512] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 68.261618] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 68.268225] page_type: f5(slab) [ 68.271423] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 68.279259] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 68.287091] page dumped because: kasan: bad access detected [ 68.292738] [ 68.294260] Memory state around the buggy address: [ 68.299114] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.306426] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.313736] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 68.321045] ^ [ 68.325901] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.333212] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 68.340522] ================================================================== [ 64.048734] ================================================================== [ 64.056044] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 64.063536] Read of size 4 at addr ffff000080acff30 by task kunit_try_catch/363 [ 64.070938] [ 64.072463] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 64.072494] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.072502] Hardware name: Thundercomm Dragonboard 845c (DT) [ 64.072513] Call trace: [ 64.072519] show_stack+0x20/0x38 (C) [ 64.072537] dump_stack_lvl+0x8c/0xd0 [ 64.072555] print_report+0x118/0x608 [ 64.072575] kasan_report+0xdc/0x128 [ 64.072593] __asan_report_load4_noabort+0x20/0x30 [ 64.072610] kasan_atomics_helper+0x3dcc/0x4858 [ 64.072629] kasan_atomics+0x198/0x2e0 [ 64.072645] kunit_try_run_case+0x170/0x3f0 [ 64.072663] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.072685] kthread+0x328/0x630 [ 64.072698] ret_from_fork+0x10/0x20 [ 64.072715] [ 64.142513] Allocated by task 363: [ 64.145970] kasan_save_stack+0x3c/0x68 [ 64.149871] kasan_save_track+0x20/0x40 [ 64.153769] kasan_save_alloc_info+0x40/0x58 [ 64.158108] __kasan_kmalloc+0xd4/0xd8 [ 64.161917] __kmalloc_cache_noprof+0x16c/0x3c0 [ 64.166519] kasan_atomics+0xb8/0x2e0 [ 64.170241] kunit_try_run_case+0x170/0x3f0 [ 64.174495] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.180065] kthread+0x328/0x630 [ 64.183352] ret_from_fork+0x10/0x20 [ 64.186987] [ 64.188511] The buggy address belongs to the object at ffff000080acff00 [ 64.188511] which belongs to the cache kmalloc-64 of size 64 [ 64.200989] The buggy address is located 0 bytes to the right of [ 64.200989] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 64.213991] [ 64.215515] The buggy address belongs to the physical page: [ 64.221161] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 64.229268] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 64.235876] page_type: f5(slab) [ 64.239075] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 64.246913] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.254744] page dumped because: kasan: bad access detected [ 64.260391] [ 64.261925] Memory state around the buggy address: [ 64.266779] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.274093] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.281406] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 64.288716] ^ [ 64.293573] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.300884] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 64.308195] ================================================================== [ 71.858855] ================================================================== [ 71.866166] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 71.873657] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363 [ 71.881144] [ 71.882670] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 71.882699] Tainted: [B]=BAD_PAGE, [N]=TEST [ 71.882707] Hardware name: Thundercomm Dragonboard 845c (DT) [ 71.882718] Call trace: [ 71.882724] show_stack+0x20/0x38 (C) [ 71.882740] dump_stack_lvl+0x8c/0xd0 [ 71.882758] print_report+0x118/0x608 [ 71.882776] kasan_report+0xdc/0x128 [ 71.882796] kasan_check_range+0x100/0x1a8 [ 71.882815] __kasan_check_write+0x20/0x30 [ 71.882832] kasan_atomics_helper+0x154c/0x4858 [ 71.882851] kasan_atomics+0x198/0x2e0 [ 71.882868] kunit_try_run_case+0x170/0x3f0 [ 71.882886] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.882906] kthread+0x328/0x630 [ 71.882920] ret_from_fork+0x10/0x20 [ 71.882936] [ 71.956187] Allocated by task 363: [ 71.959643] kasan_save_stack+0x3c/0x68 [ 71.963542] kasan_save_track+0x20/0x40 [ 71.967438] kasan_save_alloc_info+0x40/0x58 [ 71.971776] __kasan_kmalloc+0xd4/0xd8 [ 71.975586] __kmalloc_cache_noprof+0x16c/0x3c0 [ 71.980187] kasan_atomics+0xb8/0x2e0 [ 71.983908] kunit_try_run_case+0x170/0x3f0 [ 71.988161] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.993730] kthread+0x328/0x630 [ 71.997016] ret_from_fork+0x10/0x20 [ 72.000650] [ 72.002173] The buggy address belongs to the object at ffff000080acff00 [ 72.002173] which belongs to the cache kmalloc-64 of size 64 [ 72.014653] The buggy address is located 0 bytes to the right of [ 72.014653] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 72.027654] [ 72.029177] The buggy address belongs to the physical page: [ 72.034822] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 72.042928] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 72.049535] page_type: f5(slab) [ 72.052734] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 72.060570] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 72.068401] page dumped because: kasan: bad access detected [ 72.074047] [ 72.075569] Memory state around the buggy address: [ 72.080424] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.087735] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.095047] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 72.102357] ^ [ 72.107212] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.114524] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 72.121833] ================================================================== [ 57.574485] ================================================================== [ 57.581814] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 57.589227] Read of size 4 at addr ffff000080acff30 by task kunit_try_catch/363 [ 57.596635] [ 57.598164] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 57.598195] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.598203] Hardware name: Thundercomm Dragonboard 845c (DT) [ 57.598216] Call trace: [ 57.598222] show_stack+0x20/0x38 (C) [ 57.598241] dump_stack_lvl+0x8c/0xd0 [ 57.598260] print_report+0x118/0x608 [ 57.598280] kasan_report+0xdc/0x128 [ 57.598299] kasan_check_range+0x100/0x1a8 [ 57.598319] __kasan_check_read+0x20/0x30 [ 57.598335] kasan_atomics_helper+0x1ec/0x4858 [ 57.598354] kasan_atomics+0x198/0x2e0 [ 57.598373] kunit_try_run_case+0x170/0x3f0 [ 57.598391] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.598413] kthread+0x328/0x630 [ 57.598427] ret_from_fork+0x10/0x20 [ 57.598447] [ 57.671530] Allocated by task 363: [ 57.674988] kasan_save_stack+0x3c/0x68 [ 57.678894] kasan_save_track+0x20/0x40 [ 57.682799] kasan_save_alloc_info+0x40/0x58 [ 57.687134] __kasan_kmalloc+0xd4/0xd8 [ 57.690940] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.695545] kasan_atomics+0xb8/0x2e0 [ 57.699263] kunit_try_run_case+0x170/0x3f0 [ 57.703512] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.709079] kthread+0x328/0x630 [ 57.712362] ret_from_fork+0x10/0x20 [ 57.715994] [ 57.717517] The buggy address belongs to the object at ffff000080acff00 [ 57.717517] which belongs to the cache kmalloc-64 of size 64 [ 57.729996] The buggy address is located 0 bytes to the right of [ 57.729996] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 57.743006] [ 57.744537] The buggy address belongs to the physical page: [ 57.750181] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 57.758282] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.764897] page_type: f5(slab) [ 57.768095] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 57.775937] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.783772] page dumped because: kasan: bad access detected [ 57.789418] [ 57.790940] Memory state around the buggy address: [ 57.795799] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.803107] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.810423] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 57.817736] ^ [ 57.822588] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.829903] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 57.837217] ================================================================== [ 64.852563] ================================================================== [ 64.859873] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 64.867278] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363 [ 64.874767] [ 64.876293] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 64.876321] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.876330] Hardware name: Thundercomm Dragonboard 845c (DT) [ 64.876340] Call trace: [ 64.876346] show_stack+0x20/0x38 (C) [ 64.876363] dump_stack_lvl+0x8c/0xd0 [ 64.876380] print_report+0x118/0x608 [ 64.876398] kasan_report+0xdc/0x128 [ 64.876416] kasan_check_range+0x100/0x1a8 [ 64.876436] __kasan_check_write+0x20/0x30 [ 64.876451] kasan_atomics_helper+0xc08/0x4858 [ 64.876469] kasan_atomics+0x198/0x2e0 [ 64.876485] kunit_try_run_case+0x170/0x3f0 [ 64.876502] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.876523] kthread+0x328/0x630 [ 64.876536] ret_from_fork+0x10/0x20 [ 64.876552] [ 64.949715] Allocated by task 363: [ 64.953171] kasan_save_stack+0x3c/0x68 [ 64.957069] kasan_save_track+0x20/0x40 [ 64.960966] kasan_save_alloc_info+0x40/0x58 [ 64.965303] __kasan_kmalloc+0xd4/0xd8 [ 64.969112] __kmalloc_cache_noprof+0x16c/0x3c0 [ 64.973713] kasan_atomics+0xb8/0x2e0 [ 64.977434] kunit_try_run_case+0x170/0x3f0 [ 64.981686] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.987255] kthread+0x328/0x630 [ 64.990540] ret_from_fork+0x10/0x20 [ 64.994176] [ 64.995699] The buggy address belongs to the object at ffff000080acff00 [ 64.995699] which belongs to the cache kmalloc-64 of size 64 [ 65.008175] The buggy address is located 0 bytes to the right of [ 65.008175] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 65.021176] [ 65.022699] The buggy address belongs to the physical page: [ 65.028344] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 65.036450] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 65.043056] page_type: f5(slab) [ 65.046255] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 65.054090] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.061921] page dumped because: kasan: bad access detected [ 65.067567] [ 65.069089] Memory state around the buggy address: [ 65.073942] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.081253] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.088564] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 65.095874] ^ [ 65.100729] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.108040] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 65.115349] ================================================================== [ 71.047781] ================================================================== [ 71.055093] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 71.062586] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363 [ 71.070075] [ 71.071601] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 71.071631] Tainted: [B]=BAD_PAGE, [N]=TEST [ 71.071639] Hardware name: Thundercomm Dragonboard 845c (DT) [ 71.071649] Call trace: [ 71.071654] show_stack+0x20/0x38 (C) [ 71.071671] dump_stack_lvl+0x8c/0xd0 [ 71.071689] print_report+0x118/0x608 [ 71.071707] kasan_report+0xdc/0x128 [ 71.071726] kasan_check_range+0x100/0x1a8 [ 71.071746] __kasan_check_write+0x20/0x30 [ 71.071762] kasan_atomics_helper+0x1414/0x4858 [ 71.071780] kasan_atomics+0x198/0x2e0 [ 71.071798] kunit_try_run_case+0x170/0x3f0 [ 71.071816] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.071837] kthread+0x328/0x630 [ 71.071852] ret_from_fork+0x10/0x20 [ 71.071868] [ 71.145122] Allocated by task 363: [ 71.148579] kasan_save_stack+0x3c/0x68 [ 71.152477] kasan_save_track+0x20/0x40 [ 71.156375] kasan_save_alloc_info+0x40/0x58 [ 71.160713] __kasan_kmalloc+0xd4/0xd8 [ 71.164522] __kmalloc_cache_noprof+0x16c/0x3c0 [ 71.169123] kasan_atomics+0xb8/0x2e0 [ 71.172845] kunit_try_run_case+0x170/0x3f0 [ 71.177099] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.182668] kthread+0x328/0x630 [ 71.185953] ret_from_fork+0x10/0x20 [ 71.189587] [ 71.191111] The buggy address belongs to the object at ffff000080acff00 [ 71.191111] which belongs to the cache kmalloc-64 of size 64 [ 71.203589] The buggy address is located 0 bytes to the right of [ 71.203589] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 71.216590] [ 71.218112] The buggy address belongs to the physical page: [ 71.223757] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 71.231865] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 71.238472] page_type: f5(slab) [ 71.241673] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 71.249509] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 71.257341] page dumped because: kasan: bad access detected [ 71.262987] [ 71.264510] Memory state around the buggy address: [ 71.269366] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.276678] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.283989] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 71.291299] ^ [ 71.296154] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.303466] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 71.310777] ================================================================== [ 60.539584] ================================================================== [ 60.546895] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 60.554299] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363 [ 60.561787] [ 60.563312] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 60.563341] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.563349] Hardware name: Thundercomm Dragonboard 845c (DT) [ 60.563359] Call trace: [ 60.563365] show_stack+0x20/0x38 (C) [ 60.563382] dump_stack_lvl+0x8c/0xd0 [ 60.563399] print_report+0x118/0x608 [ 60.563417] kasan_report+0xdc/0x128 [ 60.563436] kasan_check_range+0x100/0x1a8 [ 60.563457] __kasan_check_write+0x20/0x30 [ 60.563472] kasan_atomics_helper+0x5b4/0x4858 [ 60.563491] kasan_atomics+0x198/0x2e0 [ 60.563507] kunit_try_run_case+0x170/0x3f0 [ 60.563525] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.563545] kthread+0x328/0x630 [ 60.563558] ret_from_fork+0x10/0x20 [ 60.563574] [ 60.636738] Allocated by task 363: [ 60.640195] kasan_save_stack+0x3c/0x68 [ 60.644093] kasan_save_track+0x20/0x40 [ 60.647990] kasan_save_alloc_info+0x40/0x58 [ 60.652328] __kasan_kmalloc+0xd4/0xd8 [ 60.656138] __kmalloc_cache_noprof+0x16c/0x3c0 [ 60.660739] kasan_atomics+0xb8/0x2e0 [ 60.664460] kunit_try_run_case+0x170/0x3f0 [ 60.668714] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.674282] kthread+0x328/0x630 [ 60.677567] ret_from_fork+0x10/0x20 [ 60.681201] [ 60.682725] The buggy address belongs to the object at ffff000080acff00 [ 60.682725] which belongs to the cache kmalloc-64 of size 64 [ 60.695204] The buggy address is located 0 bytes to the right of [ 60.695204] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 60.708204] [ 60.709727] The buggy address belongs to the physical page: [ 60.715373] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 60.723480] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.730088] page_type: f5(slab) [ 60.733287] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 60.741124] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.748956] page dumped because: kasan: bad access detected [ 60.754603] [ 60.756125] Memory state around the buggy address: [ 60.760980] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.768291] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.775603] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.782914] ^ [ 60.787771] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.795083] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 60.802393] ================================================================== [ 59.458897] ================================================================== [ 59.466207] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 59.473611] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363 [ 59.481101] [ 59.482626] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 59.482655] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.482663] Hardware name: Thundercomm Dragonboard 845c (DT) [ 59.482674] Call trace: [ 59.482681] show_stack+0x20/0x38 (C) [ 59.482698] dump_stack_lvl+0x8c/0xd0 [ 59.482715] print_report+0x118/0x608 [ 59.482734] kasan_report+0xdc/0x128 [ 59.482753] kasan_check_range+0x100/0x1a8 [ 59.482774] __kasan_check_write+0x20/0x30 [ 59.482791] kasan_atomics_helper+0x414/0x4858 [ 59.482810] kasan_atomics+0x198/0x2e0 [ 59.482826] kunit_try_run_case+0x170/0x3f0 [ 59.482844] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.482864] kthread+0x328/0x630 [ 59.482877] ret_from_fork+0x10/0x20 [ 59.482893] [ 59.556058] Allocated by task 363: [ 59.559514] kasan_save_stack+0x3c/0x68 [ 59.563411] kasan_save_track+0x20/0x40 [ 59.567308] kasan_save_alloc_info+0x40/0x58 [ 59.571647] __kasan_kmalloc+0xd4/0xd8 [ 59.575455] __kmalloc_cache_noprof+0x16c/0x3c0 [ 59.580057] kasan_atomics+0xb8/0x2e0 [ 59.583779] kunit_try_run_case+0x170/0x3f0 [ 59.588033] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.593601] kthread+0x328/0x630 [ 59.596886] ret_from_fork+0x10/0x20 [ 59.600521] [ 59.602044] The buggy address belongs to the object at ffff000080acff00 [ 59.602044] which belongs to the cache kmalloc-64 of size 64 [ 59.614523] The buggy address is located 0 bytes to the right of [ 59.614523] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 59.627525] [ 59.629048] The buggy address belongs to the physical page: [ 59.634694] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 59.642801] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.649410] page_type: f5(slab) [ 59.652609] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 59.660447] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.668279] page dumped because: kasan: bad access detected [ 59.673926] [ 59.675448] Memory state around the buggy address: [ 59.680303] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.687617] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.694928] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.702238] ^ [ 59.707094] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.714405] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 59.721715] ================================================================== [ 68.618065] ================================================================== [ 68.625377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 68.632869] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363 [ 68.640357] [ 68.641883] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 68.641912] Tainted: [B]=BAD_PAGE, [N]=TEST [ 68.641921] Hardware name: Thundercomm Dragonboard 845c (DT) [ 68.641930] Call trace: [ 68.641937] show_stack+0x20/0x38 (C) [ 68.641955] dump_stack_lvl+0x8c/0xd0 [ 68.641973] print_report+0x118/0x608 [ 68.641991] kasan_report+0xdc/0x128 [ 68.642010] kasan_check_range+0x100/0x1a8 [ 68.642030] __kasan_check_write+0x20/0x30 [ 68.642045] kasan_atomics_helper+0x1058/0x4858 [ 68.642064] kasan_atomics+0x198/0x2e0 [ 68.642080] kunit_try_run_case+0x170/0x3f0 [ 68.642098] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.642119] kthread+0x328/0x630 [ 68.642133] ret_from_fork+0x10/0x20 [ 68.642149] [ 68.715390] Allocated by task 363: [ 68.718847] kasan_save_stack+0x3c/0x68 [ 68.722745] kasan_save_track+0x20/0x40 [ 68.726642] kasan_save_alloc_info+0x40/0x58 [ 68.730980] __kasan_kmalloc+0xd4/0xd8 [ 68.734788] __kmalloc_cache_noprof+0x16c/0x3c0 [ 68.739390] kasan_atomics+0xb8/0x2e0 [ 68.743112] kunit_try_run_case+0x170/0x3f0 [ 68.747365] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.752934] kthread+0x328/0x630 [ 68.756220] ret_from_fork+0x10/0x20 [ 68.759853] [ 68.761377] The buggy address belongs to the object at ffff000080acff00 [ 68.761377] which belongs to the cache kmalloc-64 of size 64 [ 68.773856] The buggy address is located 0 bytes to the right of [ 68.773856] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 68.786858] [ 68.788382] The buggy address belongs to the physical page: [ 68.794028] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 68.802134] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 68.808741] page_type: f5(slab) [ 68.811940] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 68.819778] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 68.827609] page dumped because: kasan: bad access detected [ 68.833255] [ 68.834778] Memory state around the buggy address: [ 68.839633] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.846944] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.854255] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 68.861566] ^ [ 68.866423] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.873735] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 68.881044] ================================================================== [ 65.122723] ================================================================== [ 65.130032] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 65.137524] Read of size 4 at addr ffff000080acff30 by task kunit_try_catch/363 [ 65.144924] [ 65.146449] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 65.146478] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.146485] Hardware name: Thundercomm Dragonboard 845c (DT) [ 65.146495] Call trace: [ 65.146502] show_stack+0x20/0x38 (C) [ 65.146518] dump_stack_lvl+0x8c/0xd0 [ 65.146536] print_report+0x118/0x608 [ 65.146555] kasan_report+0xdc/0x128 [ 65.146573] __asan_report_load4_noabort+0x20/0x30 [ 65.146589] kasan_atomics_helper+0x3de4/0x4858 [ 65.146608] kasan_atomics+0x198/0x2e0 [ 65.146624] kunit_try_run_case+0x170/0x3f0 [ 65.146641] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.146660] kthread+0x328/0x630 [ 65.146674] ret_from_fork+0x10/0x20 [ 65.146691] [ 65.216488] Allocated by task 363: [ 65.219944] kasan_save_stack+0x3c/0x68 [ 65.223843] kasan_save_track+0x20/0x40 [ 65.227740] kasan_save_alloc_info+0x40/0x58 [ 65.232078] __kasan_kmalloc+0xd4/0xd8 [ 65.235887] __kmalloc_cache_noprof+0x16c/0x3c0 [ 65.240489] kasan_atomics+0xb8/0x2e0 [ 65.244211] kunit_try_run_case+0x170/0x3f0 [ 65.248463] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.254032] kthread+0x328/0x630 [ 65.257317] ret_from_fork+0x10/0x20 [ 65.260953] [ 65.262476] The buggy address belongs to the object at ffff000080acff00 [ 65.262476] which belongs to the cache kmalloc-64 of size 64 [ 65.274956] The buggy address is located 0 bytes to the right of [ 65.274956] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 65.287958] [ 65.289482] The buggy address belongs to the physical page: [ 65.295128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 65.303236] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 65.309844] page_type: f5(slab) [ 65.313042] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 65.320880] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.328711] page dumped because: kasan: bad access detected [ 65.334357] [ 65.335880] Memory state around the buggy address: [ 65.340736] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.348049] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.355361] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 65.362671] ^ [ 65.367528] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.374840] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 65.382150] ================================================================== [ 57.031457] ================================================================== [ 57.046538] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 57.054036] Read of size 4 at addr ffff000080acff30 by task kunit_try_catch/363 [ 57.061441] [ 57.062976] CPU: 3 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 57.063009] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.063019] Hardware name: Thundercomm Dragonboard 845c (DT) [ 57.063032] Call trace: [ 57.063041] show_stack+0x20/0x38 (C) [ 57.063060] dump_stack_lvl+0x8c/0xd0 [ 57.063083] print_report+0x118/0x608 [ 57.063104] kasan_report+0xdc/0x128 [ 57.063125] __asan_report_load4_noabort+0x20/0x30 [ 57.063146] kasan_atomics_helper+0x40a8/0x4858 [ 57.063168] kasan_atomics+0x198/0x2e0 [ 57.063186] kunit_try_run_case+0x170/0x3f0 [ 57.063206] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.063231] kthread+0x328/0x630 [ 57.063246] ret_from_fork+0x10/0x20 [ 57.063265] [ 57.133078] Allocated by task 363: [ 57.136540] kasan_save_stack+0x3c/0x68 [ 57.140454] kasan_save_track+0x20/0x40 [ 57.144368] kasan_save_alloc_info+0x40/0x58 [ 57.148708] __kasan_kmalloc+0xd4/0xd8 [ 57.152524] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.157127] kasan_atomics+0xb8/0x2e0 [ 57.160854] kunit_try_run_case+0x170/0x3f0 [ 57.165109] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.170685] kthread+0x328/0x630 [ 57.173977] ret_from_fork+0x10/0x20 [ 57.177619] [ 57.179150] The buggy address belongs to the object at ffff000080acff00 [ 57.179150] which belongs to the cache kmalloc-64 of size 64 [ 57.191634] The buggy address is located 0 bytes to the right of [ 57.191634] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 57.204646] [ 57.206178] The buggy address belongs to the physical page: [ 57.211829] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 57.219934] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.226553] page_type: f5(slab) [ 57.229759] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 57.237606] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.245451] page dumped because: kasan: bad access detected [ 57.251102] [ 57.252629] Memory state around the buggy address: [ 57.257495] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.264812] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.272129] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 57.279446] ^ [ 57.284310] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.291628] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 57.298945] ================================================================== [ 72.666372] ================================================================== [ 72.673684] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 72.681176] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363 [ 72.688665] [ 72.690190] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 72.690219] Tainted: [B]=BAD_PAGE, [N]=TEST [ 72.690228] Hardware name: Thundercomm Dragonboard 845c (DT) [ 72.690238] Call trace: [ 72.690246] show_stack+0x20/0x38 (C) [ 72.690264] dump_stack_lvl+0x8c/0xd0 [ 72.690282] print_report+0x118/0x608 [ 72.690300] kasan_report+0xdc/0x128 [ 72.690320] kasan_check_range+0x100/0x1a8 [ 72.690339] __kasan_check_write+0x20/0x30 [ 72.690356] kasan_atomics_helper+0x1644/0x4858 [ 72.690375] kasan_atomics+0x198/0x2e0 [ 72.690391] kunit_try_run_case+0x170/0x3f0 [ 72.690410] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.690430] kthread+0x328/0x630 [ 72.690444] ret_from_fork+0x10/0x20 [ 72.690463] [ 72.763713] Allocated by task 363: [ 72.767169] kasan_save_stack+0x3c/0x68 [ 72.771067] kasan_save_track+0x20/0x40 [ 72.774964] kasan_save_alloc_info+0x40/0x58 [ 72.779303] __kasan_kmalloc+0xd4/0xd8 [ 72.783113] __kmalloc_cache_noprof+0x16c/0x3c0 [ 72.787715] kasan_atomics+0xb8/0x2e0 [ 72.791437] kunit_try_run_case+0x170/0x3f0 [ 72.795689] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.801259] kthread+0x328/0x630 [ 72.804546] ret_from_fork+0x10/0x20 [ 72.808181] [ 72.809703] The buggy address belongs to the object at ffff000080acff00 [ 72.809703] which belongs to the cache kmalloc-64 of size 64 [ 72.822181] The buggy address is located 0 bytes to the right of [ 72.822181] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 72.835183] [ 72.836706] The buggy address belongs to the physical page: [ 72.842352] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 72.850460] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 72.857068] page_type: f5(slab) [ 72.860267] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 72.868104] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 72.875936] page dumped because: kasan: bad access detected [ 72.881583] [ 72.883105] Memory state around the buggy address: [ 72.887959] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.895271] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.902583] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 72.909892] ^ [ 72.914749] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.922060] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 72.929370] ================================================================== [ 72.936732] ================================================================== [ 72.944044] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 72.951536] Read of size 8 at addr ffff000080acff30 by task kunit_try_catch/363 [ 72.958939] [ 72.960464] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 72.960492] Tainted: [B]=BAD_PAGE, [N]=TEST [ 72.960500] Hardware name: Thundercomm Dragonboard 845c (DT) [ 72.960512] Call trace: [ 72.960519] show_stack+0x20/0x38 (C) [ 72.960537] dump_stack_lvl+0x8c/0xd0 [ 72.960555] print_report+0x118/0x608 [ 72.960574] kasan_report+0xdc/0x128 [ 72.960592] __asan_report_load8_noabort+0x20/0x30 [ 72.960609] kasan_atomics_helper+0x3df4/0x4858 [ 72.960628] kasan_atomics+0x198/0x2e0 [ 72.960645] kunit_try_run_case+0x170/0x3f0 [ 72.960662] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.960682] kthread+0x328/0x630 [ 72.960695] ret_from_fork+0x10/0x20 [ 72.960711] [ 73.030509] Allocated by task 363: [ 73.033965] kasan_save_stack+0x3c/0x68 [ 73.037863] kasan_save_track+0x20/0x40 [ 73.041761] kasan_save_alloc_info+0x40/0x58 [ 73.046099] __kasan_kmalloc+0xd4/0xd8 [ 73.049908] __kmalloc_cache_noprof+0x16c/0x3c0 [ 73.054510] kasan_atomics+0xb8/0x2e0 [ 73.058232] kunit_try_run_case+0x170/0x3f0 [ 73.062484] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.068052] kthread+0x328/0x630 [ 73.071338] ret_from_fork+0x10/0x20 [ 73.074972] [ 73.076495] The buggy address belongs to the object at ffff000080acff00 [ 73.076495] which belongs to the cache kmalloc-64 of size 64 [ 73.088972] The buggy address is located 0 bytes to the right of [ 73.088972] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 73.101973] [ 73.103496] The buggy address belongs to the physical page: [ 73.109141] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 73.117248] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 73.123855] page_type: f5(slab) [ 73.127054] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 73.134890] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 73.142722] page dumped because: kasan: bad access detected [ 73.148368] [ 73.149902] Memory state around the buggy address: [ 73.154756] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.162067] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.169378] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.176687] ^ [ 73.181542] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.188853] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 73.196162] ================================================================== [ 63.778525] ================================================================== [ 63.785838] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 63.793244] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363 [ 63.800734] [ 63.802272] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 63.802302] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.802310] Hardware name: Thundercomm Dragonboard 845c (DT) [ 63.802322] Call trace: [ 63.802329] show_stack+0x20/0x38 (C) [ 63.802347] dump_stack_lvl+0x8c/0xd0 [ 63.802366] print_report+0x118/0x608 [ 63.802384] kasan_report+0xdc/0x128 [ 63.802401] kasan_check_range+0x100/0x1a8 [ 63.802420] __kasan_check_write+0x20/0x30 [ 63.802436] kasan_atomics_helper+0xad4/0x4858 [ 63.802454] kasan_atomics+0x198/0x2e0 [ 63.802472] kunit_try_run_case+0x170/0x3f0 [ 63.802490] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.802510] kthread+0x328/0x630 [ 63.802524] ret_from_fork+0x10/0x20 [ 63.802540] [ 63.875706] Allocated by task 363: [ 63.879164] kasan_save_stack+0x3c/0x68 [ 63.883063] kasan_save_track+0x20/0x40 [ 63.886961] kasan_save_alloc_info+0x40/0x58 [ 63.891299] __kasan_kmalloc+0xd4/0xd8 [ 63.895108] __kmalloc_cache_noprof+0x16c/0x3c0 [ 63.899710] kasan_atomics+0xb8/0x2e0 [ 63.903433] kunit_try_run_case+0x170/0x3f0 [ 63.907687] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.913255] kthread+0x328/0x630 [ 63.916540] ret_from_fork+0x10/0x20 [ 63.920175] [ 63.921699] The buggy address belongs to the object at ffff000080acff00 [ 63.921699] which belongs to the cache kmalloc-64 of size 64 [ 63.934176] The buggy address is located 0 bytes to the right of [ 63.934176] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 63.947177] [ 63.948700] The buggy address belongs to the physical page: [ 63.954345] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 63.962450] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.969058] page_type: f5(slab) [ 63.972257] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 63.980093] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.987925] page dumped because: kasan: bad access detected [ 63.993571] [ 63.995093] Memory state around the buggy address: [ 63.999948] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.007259] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.014570] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 64.021879] ^ [ 64.026736] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.034048] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 64.041358] ================================================================== [ 67.270428] ================================================================== [ 67.277738] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 67.285230] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363 [ 67.292718] [ 67.294243] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 67.294272] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.294282] Hardware name: Thundercomm Dragonboard 845c (DT) [ 67.294293] Call trace: [ 67.294299] show_stack+0x20/0x38 (C) [ 67.294317] dump_stack_lvl+0x8c/0xd0 [ 67.294335] print_report+0x118/0x608 [ 67.294354] kasan_report+0xdc/0x128 [ 67.294374] __asan_report_store8_noabort+0x20/0x30 [ 67.294390] kasan_atomics_helper+0x3e5c/0x4858 [ 67.294409] kasan_atomics+0x198/0x2e0 [ 67.294426] kunit_try_run_case+0x170/0x3f0 [ 67.294444] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.294465] kthread+0x328/0x630 [ 67.294479] ret_from_fork+0x10/0x20 [ 67.294496] [ 67.364377] Allocated by task 363: [ 67.367832] kasan_save_stack+0x3c/0x68 [ 67.371731] kasan_save_track+0x20/0x40 [ 67.375627] kasan_save_alloc_info+0x40/0x58 [ 67.379965] __kasan_kmalloc+0xd4/0xd8 [ 67.383776] __kmalloc_cache_noprof+0x16c/0x3c0 [ 67.388378] kasan_atomics+0xb8/0x2e0 [ 67.392101] kunit_try_run_case+0x170/0x3f0 [ 67.396355] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.401922] kthread+0x328/0x630 [ 67.405208] ret_from_fork+0x10/0x20 [ 67.408842] [ 67.410365] The buggy address belongs to the object at ffff000080acff00 [ 67.410365] which belongs to the cache kmalloc-64 of size 64 [ 67.422843] The buggy address is located 0 bytes to the right of [ 67.422843] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 67.435844] [ 67.437367] The buggy address belongs to the physical page: [ 67.443014] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 67.451121] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 67.457728] page_type: f5(slab) [ 67.460928] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 67.468763] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 67.476595] page dumped because: kasan: bad access detected [ 67.482240] [ 67.483763] Memory state around the buggy address: [ 67.488619] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.495930] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.503242] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 67.510552] ^ [ 67.515407] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.522718] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 67.530028] ================================================================== [ 58.651577] ================================================================== [ 58.658885] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 58.666285] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363 [ 58.673770] [ 58.675296] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 58.675324] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.675333] Hardware name: Thundercomm Dragonboard 845c (DT) [ 58.675343] Call trace: [ 58.675349] show_stack+0x20/0x38 (C) [ 58.675368] dump_stack_lvl+0x8c/0xd0 [ 58.675385] print_report+0x118/0x608 [ 58.675403] kasan_report+0xdc/0x128 [ 58.675422] kasan_check_range+0x100/0x1a8 [ 58.675444] __kasan_check_write+0x20/0x30 [ 58.675460] kasan_atomics_helper+0x32c/0x4858 [ 58.675479] kasan_atomics+0x198/0x2e0 [ 58.675495] kunit_try_run_case+0x170/0x3f0 [ 58.675513] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.675533] kthread+0x328/0x630 [ 58.675547] ret_from_fork+0x10/0x20 [ 58.675564] [ 58.748728] Allocated by task 363: [ 58.752184] kasan_save_stack+0x3c/0x68 [ 58.756082] kasan_save_track+0x20/0x40 [ 58.759979] kasan_save_alloc_info+0x40/0x58 [ 58.764319] __kasan_kmalloc+0xd4/0xd8 [ 58.768128] __kmalloc_cache_noprof+0x16c/0x3c0 [ 58.772729] kasan_atomics+0xb8/0x2e0 [ 58.776450] kunit_try_run_case+0x170/0x3f0 [ 58.780703] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.786272] kthread+0x328/0x630 [ 58.789557] ret_from_fork+0x10/0x20 [ 58.793193] [ 58.794717] The buggy address belongs to the object at ffff000080acff00 [ 58.794717] which belongs to the cache kmalloc-64 of size 64 [ 58.807196] The buggy address is located 0 bytes to the right of [ 58.807196] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 58.820197] [ 58.821722] The buggy address belongs to the physical page: [ 58.827367] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 58.835475] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.842081] page_type: f5(slab) [ 58.845280] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 58.853117] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 58.860948] page dumped because: kasan: bad access detected [ 58.866593] [ 58.868116] Memory state around the buggy address: [ 58.872971] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.880282] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 58.887595] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 58.894906] ^ [ 58.899763] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.907073] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 58.914383] ================================================================== [ 67.537390] ================================================================== [ 67.544700] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 67.552103] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363 [ 67.559592] [ 67.561117] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 67.561145] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.561153] Hardware name: Thundercomm Dragonboard 845c (DT) [ 67.561164] Call trace: [ 67.561170] show_stack+0x20/0x38 (C) [ 67.561187] dump_stack_lvl+0x8c/0xd0 [ 67.561204] print_report+0x118/0x608 [ 67.561223] kasan_report+0xdc/0x128 [ 67.561241] kasan_check_range+0x100/0x1a8 [ 67.561261] __kasan_check_write+0x20/0x30 [ 67.561277] kasan_atomics_helper+0xeb8/0x4858 [ 67.561295] kasan_atomics+0x198/0x2e0 [ 67.561311] kunit_try_run_case+0x170/0x3f0 [ 67.561328] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.561348] kthread+0x328/0x630 [ 67.561363] ret_from_fork+0x10/0x20 [ 67.561379] [ 67.634542] Allocated by task 363: [ 67.637998] kasan_save_stack+0x3c/0x68 [ 67.641895] kasan_save_track+0x20/0x40 [ 67.645792] kasan_save_alloc_info+0x40/0x58 [ 67.650130] __kasan_kmalloc+0xd4/0xd8 [ 67.653938] __kmalloc_cache_noprof+0x16c/0x3c0 [ 67.658540] kasan_atomics+0xb8/0x2e0 [ 67.662261] kunit_try_run_case+0x170/0x3f0 [ 67.666514] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.672083] kthread+0x328/0x630 [ 67.675369] ret_from_fork+0x10/0x20 [ 67.679003] [ 67.680526] The buggy address belongs to the object at ffff000080acff00 [ 67.680526] which belongs to the cache kmalloc-64 of size 64 [ 67.693003] The buggy address is located 0 bytes to the right of [ 67.693003] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 67.706003] [ 67.707526] The buggy address belongs to the physical page: [ 67.713171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 67.721280] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 67.727886] page_type: f5(slab) [ 67.731085] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 67.738921] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 67.746754] page dumped because: kasan: bad access detected [ 67.752400] [ 67.753933] Memory state around the buggy address: [ 67.758788] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.766099] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.773411] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 67.780721] ^ [ 67.785576] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.792887] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 67.800197] ================================================================== [ 65.389512] ================================================================== [ 65.396822] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 65.404226] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363 [ 65.411716] [ 65.413242] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 65.413271] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.413278] Hardware name: Thundercomm Dragonboard 845c (DT) [ 65.413290] Call trace: [ 65.413296] show_stack+0x20/0x38 (C) [ 65.413313] dump_stack_lvl+0x8c/0xd0 [ 65.413330] print_report+0x118/0x608 [ 65.413348] kasan_report+0xdc/0x128 [ 65.413366] kasan_check_range+0x100/0x1a8 [ 65.413386] __kasan_check_write+0x20/0x30 [ 65.413401] kasan_atomics_helper+0xca0/0x4858 [ 65.413419] kasan_atomics+0x198/0x2e0 [ 65.413435] kunit_try_run_case+0x170/0x3f0 [ 65.413453] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.413475] kthread+0x328/0x630 [ 65.413489] ret_from_fork+0x10/0x20 [ 65.413505] [ 65.486668] Allocated by task 363: [ 65.490123] kasan_save_stack+0x3c/0x68 [ 65.494021] kasan_save_track+0x20/0x40 [ 65.497918] kasan_save_alloc_info+0x40/0x58 [ 65.502256] __kasan_kmalloc+0xd4/0xd8 [ 65.506065] __kmalloc_cache_noprof+0x16c/0x3c0 [ 65.510667] kasan_atomics+0xb8/0x2e0 [ 65.514388] kunit_try_run_case+0x170/0x3f0 [ 65.518640] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.524209] kthread+0x328/0x630 [ 65.527495] ret_from_fork+0x10/0x20 [ 65.531129] [ 65.532652] The buggy address belongs to the object at ffff000080acff00 [ 65.532652] which belongs to the cache kmalloc-64 of size 64 [ 65.545128] The buggy address is located 0 bytes to the right of [ 65.545128] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 65.558129] [ 65.559652] The buggy address belongs to the physical page: [ 65.565297] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 65.573403] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 65.580013] page_type: f5(slab) [ 65.583211] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 65.591047] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.598878] page dumped because: kasan: bad access detected [ 65.604523] [ 65.606045] Memory state around the buggy address: [ 65.610901] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.618211] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.625522] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 65.632831] ^ [ 65.637687] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.644999] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 65.652308] ================================================================== [ 69.969911] ================================================================== [ 69.977222] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 69.984713] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363 [ 69.992200] [ 69.993725] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 69.993754] Tainted: [B]=BAD_PAGE, [N]=TEST [ 69.993761] Hardware name: Thundercomm Dragonboard 845c (DT) [ 69.993772] Call trace: [ 69.993779] show_stack+0x20/0x38 (C) [ 69.993796] dump_stack_lvl+0x8c/0xd0 [ 69.993814] print_report+0x118/0x608 [ 69.993832] kasan_report+0xdc/0x128 [ 69.993850] kasan_check_range+0x100/0x1a8 [ 69.993870] __kasan_check_write+0x20/0x30 [ 69.993886] kasan_atomics_helper+0x126c/0x4858 [ 69.993904] kasan_atomics+0x198/0x2e0 [ 69.993920] kunit_try_run_case+0x170/0x3f0 [ 69.993938] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.993958] kthread+0x328/0x630 [ 69.993971] ret_from_fork+0x10/0x20 [ 69.993988] [ 70.067238] Allocated by task 363: [ 70.070693] kasan_save_stack+0x3c/0x68 [ 70.074593] kasan_save_track+0x20/0x40 [ 70.078490] kasan_save_alloc_info+0x40/0x58 [ 70.082830] __kasan_kmalloc+0xd4/0xd8 [ 70.086641] __kmalloc_cache_noprof+0x16c/0x3c0 [ 70.091242] kasan_atomics+0xb8/0x2e0 [ 70.094964] kunit_try_run_case+0x170/0x3f0 [ 70.099218] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.104787] kthread+0x328/0x630 [ 70.108074] ret_from_fork+0x10/0x20 [ 70.111709] [ 70.113232] The buggy address belongs to the object at ffff000080acff00 [ 70.113232] which belongs to the cache kmalloc-64 of size 64 [ 70.125708] The buggy address is located 0 bytes to the right of [ 70.125708] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 70.138708] [ 70.140231] The buggy address belongs to the physical page: [ 70.145877] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 70.153984] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 70.160590] page_type: f5(slab) [ 70.163788] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 70.171623] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 70.179456] page dumped because: kasan: bad access detected [ 70.185103] [ 70.186626] Memory state around the buggy address: [ 70.191480] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.198791] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.206102] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 70.213411] ^ [ 70.218267] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.225577] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 70.232887] ================================================================== [ 70.510623] ================================================================== [ 70.517935] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 70.525432] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363 [ 70.532925] [ 70.534450] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 70.534479] Tainted: [B]=BAD_PAGE, [N]=TEST [ 70.534488] Hardware name: Thundercomm Dragonboard 845c (DT) [ 70.534498] Call trace: [ 70.534504] show_stack+0x20/0x38 (C) [ 70.534521] dump_stack_lvl+0x8c/0xd0 [ 70.534539] print_report+0x118/0x608 [ 70.534557] kasan_report+0xdc/0x128 [ 70.534575] kasan_check_range+0x100/0x1a8 [ 70.534595] __kasan_check_write+0x20/0x30 [ 70.534610] kasan_atomics_helper+0x1384/0x4858 [ 70.534629] kasan_atomics+0x198/0x2e0 [ 70.534646] kunit_try_run_case+0x170/0x3f0 [ 70.534664] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.534685] kthread+0x328/0x630 [ 70.534698] ret_from_fork+0x10/0x20 [ 70.534715] [ 70.607950] Allocated by task 363: [ 70.611406] kasan_save_stack+0x3c/0x68 [ 70.615306] kasan_save_track+0x20/0x40 [ 70.619203] kasan_save_alloc_info+0x40/0x58 [ 70.623541] __kasan_kmalloc+0xd4/0xd8 [ 70.627350] __kmalloc_cache_noprof+0x16c/0x3c0 [ 70.631953] kasan_atomics+0xb8/0x2e0 [ 70.635675] kunit_try_run_case+0x170/0x3f0 [ 70.639929] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.645497] kthread+0x328/0x630 [ 70.648783] ret_from_fork+0x10/0x20 [ 70.652418] [ 70.653940] The buggy address belongs to the object at ffff000080acff00 [ 70.653940] which belongs to the cache kmalloc-64 of size 64 [ 70.666420] The buggy address is located 0 bytes to the right of [ 70.666420] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 70.679419] [ 70.680942] The buggy address belongs to the physical page: [ 70.686589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 70.694696] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 70.701305] page_type: f5(slab) [ 70.704504] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 70.712340] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 70.720171] page dumped because: kasan: bad access detected [ 70.725817] [ 70.727340] Memory state around the buggy address: [ 70.732196] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.739508] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.746820] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 70.754130] ^ [ 70.758986] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.766297] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 70.773607] ================================================================== [ 61.079930] ================================================================== [ 61.087240] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 61.094642] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363 [ 61.102131] [ 61.103657] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 61.103687] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.103695] Hardware name: Thundercomm Dragonboard 845c (DT) [ 61.103705] Call trace: [ 61.103712] show_stack+0x20/0x38 (C) [ 61.103730] dump_stack_lvl+0x8c/0xd0 [ 61.103748] print_report+0x118/0x608 [ 61.103766] kasan_report+0xdc/0x128 [ 61.103784] kasan_check_range+0x100/0x1a8 [ 61.103803] __kasan_check_write+0x20/0x30 [ 61.103818] kasan_atomics_helper+0x684/0x4858 [ 61.103837] kasan_atomics+0x198/0x2e0 [ 61.103853] kunit_try_run_case+0x170/0x3f0 [ 61.103873] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.103893] kthread+0x328/0x630 [ 61.103906] ret_from_fork+0x10/0x20 [ 61.103922] [ 61.177086] Allocated by task 363: [ 61.180543] kasan_save_stack+0x3c/0x68 [ 61.184443] kasan_save_track+0x20/0x40 [ 61.188341] kasan_save_alloc_info+0x40/0x58 [ 61.192680] __kasan_kmalloc+0xd4/0xd8 [ 61.196489] __kmalloc_cache_noprof+0x16c/0x3c0 [ 61.201092] kasan_atomics+0xb8/0x2e0 [ 61.204813] kunit_try_run_case+0x170/0x3f0 [ 61.209067] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.214637] kthread+0x328/0x630 [ 61.217923] ret_from_fork+0x10/0x20 [ 61.221558] [ 61.223081] The buggy address belongs to the object at ffff000080acff00 [ 61.223081] which belongs to the cache kmalloc-64 of size 64 [ 61.235559] The buggy address is located 0 bytes to the right of [ 61.235559] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 61.248559] [ 61.250083] The buggy address belongs to the physical page: [ 61.255729] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 61.263836] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.270444] page_type: f5(slab) [ 61.273643] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 61.281479] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.289311] page dumped because: kasan: bad access detected [ 61.294957] [ 61.296479] Memory state around the buggy address: [ 61.301335] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.308647] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.315959] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.323268] ^ [ 61.328124] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.335434] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 61.342744] ================================================================== [ 62.430930] ================================================================== [ 62.438241] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 62.445733] Read of size 4 at addr ffff000080acff30 by task kunit_try_catch/363 [ 62.453133] [ 62.454659] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 62.454688] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.454696] Hardware name: Thundercomm Dragonboard 845c (DT) [ 62.454707] Call trace: [ 62.454714] show_stack+0x20/0x38 (C) [ 62.454731] dump_stack_lvl+0x8c/0xd0 [ 62.454749] print_report+0x118/0x608 [ 62.454767] kasan_report+0xdc/0x128 [ 62.454786] __asan_report_load4_noabort+0x20/0x30 [ 62.454804] kasan_atomics_helper+0x42d8/0x4858 [ 62.454822] kasan_atomics+0x198/0x2e0 [ 62.454838] kunit_try_run_case+0x170/0x3f0 [ 62.454858] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.454879] kthread+0x328/0x630 [ 62.454893] ret_from_fork+0x10/0x20 [ 62.454911] [ 62.524708] Allocated by task 363: [ 62.528165] kasan_save_stack+0x3c/0x68 [ 62.532063] kasan_save_track+0x20/0x40 [ 62.535960] kasan_save_alloc_info+0x40/0x58 [ 62.540297] __kasan_kmalloc+0xd4/0xd8 [ 62.544106] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.548708] kasan_atomics+0xb8/0x2e0 [ 62.552429] kunit_try_run_case+0x170/0x3f0 [ 62.556682] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.562251] kthread+0x328/0x630 [ 62.565537] ret_from_fork+0x10/0x20 [ 62.569172] [ 62.570696] The buggy address belongs to the object at ffff000080acff00 [ 62.570696] which belongs to the cache kmalloc-64 of size 64 [ 62.583172] The buggy address is located 0 bytes to the right of [ 62.583172] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 62.596174] [ 62.597698] The buggy address belongs to the physical page: [ 62.603343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 62.611449] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.618056] page_type: f5(slab) [ 62.621254] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 62.629090] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.636921] page dumped because: kasan: bad access detected [ 62.642568] [ 62.644091] Memory state around the buggy address: [ 62.648945] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.656257] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.663568] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.670877] ^ [ 62.675732] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.683043] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 62.690351] ================================================================== [ 65.659681] ================================================================== [ 65.666990] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 65.674481] Read of size 4 at addr ffff000080acff30 by task kunit_try_catch/363 [ 65.681882] [ 65.683407] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 65.683436] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.683444] Hardware name: Thundercomm Dragonboard 845c (DT) [ 65.683454] Call trace: [ 65.683461] show_stack+0x20/0x38 (C) [ 65.683479] dump_stack_lvl+0x8c/0xd0 [ 65.683497] print_report+0x118/0x608 [ 65.683515] kasan_report+0xdc/0x128 [ 65.683534] __asan_report_load4_noabort+0x20/0x30 [ 65.683552] kasan_atomics_helper+0x3dd8/0x4858 [ 65.683570] kasan_atomics+0x198/0x2e0 [ 65.683586] kunit_try_run_case+0x170/0x3f0 [ 65.683604] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.683624] kthread+0x328/0x630 [ 65.683637] ret_from_fork+0x10/0x20 [ 65.683654] [ 65.753451] Allocated by task 363: [ 65.756907] kasan_save_stack+0x3c/0x68 [ 65.760807] kasan_save_track+0x20/0x40 [ 65.764703] kasan_save_alloc_info+0x40/0x58 [ 65.769042] __kasan_kmalloc+0xd4/0xd8 [ 65.772851] __kmalloc_cache_noprof+0x16c/0x3c0 [ 65.777453] kasan_atomics+0xb8/0x2e0 [ 65.781174] kunit_try_run_case+0x170/0x3f0 [ 65.785428] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.790995] kthread+0x328/0x630 [ 65.794282] ret_from_fork+0x10/0x20 [ 65.797917] [ 65.799440] The buggy address belongs to the object at ffff000080acff00 [ 65.799440] which belongs to the cache kmalloc-64 of size 64 [ 65.811920] The buggy address is located 0 bytes to the right of [ 65.811920] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 65.824922] [ 65.826455] The buggy address belongs to the physical page: [ 65.832101] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 65.840209] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 65.846816] page_type: f5(slab) [ 65.850016] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 65.857852] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.865684] page dumped because: kasan: bad access detected [ 65.871330] [ 65.872853] Memory state around the buggy address: [ 65.877708] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.885020] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.892332] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 65.899641] ^ [ 65.904497] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.911808] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 65.919119] ================================================================== [ 71.588496] ================================================================== [ 71.595807] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 71.603298] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363 [ 71.610787] [ 71.612312] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 71.612341] Tainted: [B]=BAD_PAGE, [N]=TEST [ 71.612350] Hardware name: Thundercomm Dragonboard 845c (DT) [ 71.612361] Call trace: [ 71.612367] show_stack+0x20/0x38 (C) [ 71.612384] dump_stack_lvl+0x8c/0xd0 [ 71.612401] print_report+0x118/0x608 [ 71.612421] kasan_report+0xdc/0x128 [ 71.612439] kasan_check_range+0x100/0x1a8 [ 71.612459] __kasan_check_write+0x20/0x30 [ 71.612474] kasan_atomics_helper+0x14e4/0x4858 [ 71.612492] kasan_atomics+0x198/0x2e0 [ 71.612510] kunit_try_run_case+0x170/0x3f0 [ 71.612528] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.612548] kthread+0x328/0x630 [ 71.612561] ret_from_fork+0x10/0x20 [ 71.612577] [ 71.685829] Allocated by task 363: [ 71.689285] kasan_save_stack+0x3c/0x68 [ 71.693184] kasan_save_track+0x20/0x40 [ 71.697082] kasan_save_alloc_info+0x40/0x58 [ 71.701419] __kasan_kmalloc+0xd4/0xd8 [ 71.705227] __kmalloc_cache_noprof+0x16c/0x3c0 [ 71.709829] kasan_atomics+0xb8/0x2e0 [ 71.713550] kunit_try_run_case+0x170/0x3f0 [ 71.717803] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.723372] kthread+0x328/0x630 [ 71.726657] ret_from_fork+0x10/0x20 [ 71.730292] [ 71.731814] The buggy address belongs to the object at ffff000080acff00 [ 71.731814] which belongs to the cache kmalloc-64 of size 64 [ 71.744292] The buggy address is located 0 bytes to the right of [ 71.744292] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 71.757293] [ 71.758815] The buggy address belongs to the physical page: [ 71.764461] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 71.772567] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 71.779173] page_type: f5(slab) [ 71.782375] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 71.790212] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 71.798043] page dumped because: kasan: bad access detected [ 71.803690] [ 71.805213] Memory state around the buggy address: [ 71.810068] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.817382] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.824693] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 71.832002] ^ [ 71.836859] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.844170] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 71.851479] ================================================================== [ 71.318140] ================================================================== [ 71.325452] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 71.332944] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363 [ 71.340432] [ 71.341957] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 71.341986] Tainted: [B]=BAD_PAGE, [N]=TEST [ 71.341994] Hardware name: Thundercomm Dragonboard 845c (DT) [ 71.342005] Call trace: [ 71.342011] show_stack+0x20/0x38 (C) [ 71.342027] dump_stack_lvl+0x8c/0xd0 [ 71.342046] print_report+0x118/0x608 [ 71.342066] kasan_report+0xdc/0x128 [ 71.342085] kasan_check_range+0x100/0x1a8 [ 71.342104] __kasan_check_write+0x20/0x30 [ 71.342119] kasan_atomics_helper+0x147c/0x4858 [ 71.342138] kasan_atomics+0x198/0x2e0 [ 71.342154] kunit_try_run_case+0x170/0x3f0 [ 71.342172] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.342192] kthread+0x328/0x630 [ 71.342207] ret_from_fork+0x10/0x20 [ 71.342223] [ 71.415474] Allocated by task 363: [ 71.418930] kasan_save_stack+0x3c/0x68 [ 71.422830] kasan_save_track+0x20/0x40 [ 71.426727] kasan_save_alloc_info+0x40/0x58 [ 71.431065] __kasan_kmalloc+0xd4/0xd8 [ 71.434873] __kmalloc_cache_noprof+0x16c/0x3c0 [ 71.439474] kasan_atomics+0xb8/0x2e0 [ 71.443196] kunit_try_run_case+0x170/0x3f0 [ 71.447449] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.453018] kthread+0x328/0x630 [ 71.456305] ret_from_fork+0x10/0x20 [ 71.459939] [ 71.461462] The buggy address belongs to the object at ffff000080acff00 [ 71.461462] which belongs to the cache kmalloc-64 of size 64 [ 71.473942] The buggy address is located 0 bytes to the right of [ 71.473942] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 71.486941] [ 71.488464] The buggy address belongs to the physical page: [ 71.494109] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 71.502214] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 71.508822] page_type: f5(slab) [ 71.512021] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 71.519858] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 71.527690] page dumped because: kasan: bad access detected [ 71.533335] [ 71.534857] Memory state around the buggy address: [ 71.539712] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.547024] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.554335] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 71.561644] ^ [ 71.566500] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.573811] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 71.581121] ================================================================== [ 69.158763] ================================================================== [ 69.166074] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 69.173566] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363 [ 69.181055] [ 69.182580] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 69.182609] Tainted: [B]=BAD_PAGE, [N]=TEST [ 69.182616] Hardware name: Thundercomm Dragonboard 845c (DT) [ 69.182627] Call trace: [ 69.182633] show_stack+0x20/0x38 (C) [ 69.182650] dump_stack_lvl+0x8c/0xd0 [ 69.182667] print_report+0x118/0x608 [ 69.182685] kasan_report+0xdc/0x128 [ 69.182703] kasan_check_range+0x100/0x1a8 [ 69.182724] __kasan_check_write+0x20/0x30 [ 69.182739] kasan_atomics_helper+0x1128/0x4858 [ 69.182759] kasan_atomics+0x198/0x2e0 [ 69.182776] kunit_try_run_case+0x170/0x3f0 [ 69.182793] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.182814] kthread+0x328/0x630 [ 69.182829] ret_from_fork+0x10/0x20 [ 69.182845] [ 69.256097] Allocated by task 363: [ 69.259553] kasan_save_stack+0x3c/0x68 [ 69.263451] kasan_save_track+0x20/0x40 [ 69.267350] kasan_save_alloc_info+0x40/0x58 [ 69.271689] __kasan_kmalloc+0xd4/0xd8 [ 69.275498] __kmalloc_cache_noprof+0x16c/0x3c0 [ 69.280098] kasan_atomics+0xb8/0x2e0 [ 69.283820] kunit_try_run_case+0x170/0x3f0 [ 69.288074] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.293642] kthread+0x328/0x630 [ 69.296928] ret_from_fork+0x10/0x20 [ 69.300562] [ 69.302085] The buggy address belongs to the object at ffff000080acff00 [ 69.302085] which belongs to the cache kmalloc-64 of size 64 [ 69.314568] The buggy address is located 0 bytes to the right of [ 69.314568] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 69.327577] [ 69.329103] The buggy address belongs to the physical page: [ 69.334750] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 69.342860] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 69.349469] page_type: f5(slab) [ 69.352669] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 69.360508] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 69.368341] page dumped because: kasan: bad access detected [ 69.373987] [ 69.375511] Memory state around the buggy address: [ 69.380367] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.387678] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.394989] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 69.402298] ^ [ 69.407155] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.414466] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 69.421776] ================================================================== [ 59.188727] ================================================================== [ 59.196037] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858 [ 59.203440] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363 [ 59.210929] [ 59.212454] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 59.212484] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.212491] Hardware name: Thundercomm Dragonboard 845c (DT) [ 59.212501] Call trace: [ 59.212506] show_stack+0x20/0x38 (C) [ 59.212523] dump_stack_lvl+0x8c/0xd0 [ 59.212541] print_report+0x118/0x608 [ 59.212559] kasan_report+0xdc/0x128 [ 59.212577] kasan_check_range+0x100/0x1a8 [ 59.212596] __kasan_check_write+0x20/0x30 [ 59.212613] kasan_atomics_helper+0x3ac/0x4858 [ 59.212633] kasan_atomics+0x198/0x2e0 [ 59.212650] kunit_try_run_case+0x170/0x3f0 [ 59.212667] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.212688] kthread+0x328/0x630 [ 59.212701] ret_from_fork+0x10/0x20 [ 59.212719] [ 59.285883] Allocated by task 363: [ 59.289338] kasan_save_stack+0x3c/0x68 [ 59.293237] kasan_save_track+0x20/0x40 [ 59.297135] kasan_save_alloc_info+0x40/0x58 [ 59.301473] __kasan_kmalloc+0xd4/0xd8 [ 59.305283] __kmalloc_cache_noprof+0x16c/0x3c0 [ 59.309884] kasan_atomics+0xb8/0x2e0 [ 59.313605] kunit_try_run_case+0x170/0x3f0 [ 59.317859] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.323428] kthread+0x328/0x630 [ 59.326713] ret_from_fork+0x10/0x20 [ 59.330348] [ 59.331870] The buggy address belongs to the object at ffff000080acff00 [ 59.331870] which belongs to the cache kmalloc-64 of size 64 [ 59.344345] The buggy address is located 0 bytes to the right of [ 59.344345] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 59.357353] [ 59.358876] The buggy address belongs to the physical page: [ 59.364522] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 59.372629] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.379236] page_type: f5(slab) [ 59.382434] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 59.390271] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.398103] page dumped because: kasan: bad access detected [ 59.403749] [ 59.405272] Memory state around the buggy address: [ 59.410127] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.417440] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.424751] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.432060] ^ [ 59.436916] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.444226] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 59.451535] ================================================================== [ 73.740641] ================================================================== [ 73.747952] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 73.755441] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363 [ 73.762929] [ 73.764453] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 73.764481] Tainted: [B]=BAD_PAGE, [N]=TEST [ 73.764489] Hardware name: Thundercomm Dragonboard 845c (DT) [ 73.764498] Call trace: [ 73.764504] show_stack+0x20/0x38 (C) [ 73.764521] dump_stack_lvl+0x8c/0xd0 [ 73.764538] print_report+0x118/0x608 [ 73.764556] kasan_report+0xdc/0x128 [ 73.764574] kasan_check_range+0x100/0x1a8 [ 73.764593] __kasan_check_write+0x20/0x30 [ 73.764608] kasan_atomics_helper+0x175c/0x4858 [ 73.764626] kasan_atomics+0x198/0x2e0 [ 73.764643] kunit_try_run_case+0x170/0x3f0 [ 73.764661] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.764681] kthread+0x328/0x630 [ 73.764694] ret_from_fork+0x10/0x20 [ 73.764710] [ 73.837961] Allocated by task 363: [ 73.841416] kasan_save_stack+0x3c/0x68 [ 73.845314] kasan_save_track+0x20/0x40 [ 73.849211] kasan_save_alloc_info+0x40/0x58 [ 73.853549] __kasan_kmalloc+0xd4/0xd8 [ 73.857358] __kmalloc_cache_noprof+0x16c/0x3c0 [ 73.861959] kasan_atomics+0xb8/0x2e0 [ 73.865680] kunit_try_run_case+0x170/0x3f0 [ 73.869932] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.875499] kthread+0x328/0x630 [ 73.878785] ret_from_fork+0x10/0x20 [ 73.882419] [ 73.883941] The buggy address belongs to the object at ffff000080acff00 [ 73.883941] which belongs to the cache kmalloc-64 of size 64 [ 73.896418] The buggy address is located 0 bytes to the right of [ 73.896418] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 73.909417] [ 73.910941] The buggy address belongs to the physical page: [ 73.916587] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 73.924692] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 73.931299] page_type: f5(slab) [ 73.934498] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 73.942333] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 73.950163] page dumped because: kasan: bad access detected [ 73.955808] [ 73.957331] Memory state around the buggy address: [ 73.962184] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.969495] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.976806] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.984115] ^ [ 73.988970] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.996280] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 74.003589] ================================================================== [ 59.729090] ================================================================== [ 59.736400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 59.743805] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363 [ 59.751293] [ 59.752818] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 59.752847] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.752854] Hardware name: Thundercomm Dragonboard 845c (DT) [ 59.752866] Call trace: [ 59.752872] show_stack+0x20/0x38 (C) [ 59.752889] dump_stack_lvl+0x8c/0xd0 [ 59.752908] print_report+0x118/0x608 [ 59.752925] kasan_report+0xdc/0x128 [ 59.752944] kasan_check_range+0x100/0x1a8 [ 59.752962] __kasan_check_write+0x20/0x30 [ 59.752977] kasan_atomics_helper+0x47c/0x4858 [ 59.752997] kasan_atomics+0x198/0x2e0 [ 59.753014] kunit_try_run_case+0x170/0x3f0 [ 59.753031] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.753051] kthread+0x328/0x630 [ 59.753065] ret_from_fork+0x10/0x20 [ 59.753081] [ 59.826236] Allocated by task 363: [ 59.829692] kasan_save_stack+0x3c/0x68 [ 59.833589] kasan_save_track+0x20/0x40 [ 59.837486] kasan_save_alloc_info+0x40/0x58 [ 59.841823] __kasan_kmalloc+0xd4/0xd8 [ 59.845632] __kmalloc_cache_noprof+0x16c/0x3c0 [ 59.850235] kasan_atomics+0xb8/0x2e0 [ 59.853957] kunit_try_run_case+0x170/0x3f0 [ 59.858210] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.863778] kthread+0x328/0x630 [ 59.867064] ret_from_fork+0x10/0x20 [ 59.870699] [ 59.872222] The buggy address belongs to the object at ffff000080acff00 [ 59.872222] which belongs to the cache kmalloc-64 of size 64 [ 59.884698] The buggy address is located 0 bytes to the right of [ 59.884698] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 59.897699] [ 59.899223] The buggy address belongs to the physical page: [ 59.904869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 59.912975] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.919582] page_type: f5(slab) [ 59.922780] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 59.930616] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.938449] page dumped because: kasan: bad access detected [ 59.944094] [ 59.945618] Memory state around the buggy address: [ 59.950473] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.957784] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.965095] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.972404] ^ [ 59.977259] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.984572] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 59.991882] ================================================================== [ 57.306328] ================================================================== [ 57.313644] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 57.321138] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363 [ 57.328637] [ 57.330171] CPU: 3 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 57.330201] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.330212] Hardware name: Thundercomm Dragonboard 845c (DT) [ 57.330224] Call trace: [ 57.330231] show_stack+0x20/0x38 (C) [ 57.330251] dump_stack_lvl+0x8c/0xd0 [ 57.330272] print_report+0x118/0x608 [ 57.330293] kasan_report+0xdc/0x128 [ 57.330313] __asan_report_store4_noabort+0x20/0x30 [ 57.330333] kasan_atomics_helper+0x3f7c/0x4858 [ 57.330355] kasan_atomics+0x198/0x2e0 [ 57.330375] kunit_try_run_case+0x170/0x3f0 [ 57.330396] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.330419] kthread+0x328/0x630 [ 57.330435] ret_from_fork+0x10/0x20 [ 57.330454] [ 57.400377] Allocated by task 363: [ 57.403838] kasan_save_stack+0x3c/0x68 [ 57.407752] kasan_save_track+0x20/0x40 [ 57.411654] kasan_save_alloc_info+0x40/0x58 [ 57.415993] __kasan_kmalloc+0xd4/0xd8 [ 57.419807] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.424410] kasan_atomics+0xb8/0x2e0 [ 57.428145] kunit_try_run_case+0x170/0x3f0 [ 57.432400] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.437976] kthread+0x328/0x630 [ 57.441269] ret_from_fork+0x10/0x20 [ 57.444910] [ 57.446441] The buggy address belongs to the object at ffff000080acff00 [ 57.446441] which belongs to the cache kmalloc-64 of size 64 [ 57.458926] The buggy address is located 0 bytes to the right of [ 57.458926] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 57.471938] [ 57.473470] The buggy address belongs to the physical page: [ 57.479120] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 57.487227] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.493844] page_type: f5(slab) [ 57.497049] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 57.504899] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 57.512745] page dumped because: kasan: bad access detected [ 57.518396] [ 57.519933] Memory state around the buggy address: [ 57.524797] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.532122] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 57.539442] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 57.546757] ^ [ 57.551621] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.558938] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 57.566254] ================================================================== [ 70.240251] ================================================================== [ 70.247562] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 70.255056] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363 [ 70.262545] [ 70.264071] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 70.264101] Tainted: [B]=BAD_PAGE, [N]=TEST [ 70.264110] Hardware name: Thundercomm Dragonboard 845c (DT) [ 70.264121] Call trace: [ 70.264128] show_stack+0x20/0x38 (C) [ 70.264145] dump_stack_lvl+0x8c/0xd0 [ 70.264162] print_report+0x118/0x608 [ 70.264180] kasan_report+0xdc/0x128 [ 70.264198] kasan_check_range+0x100/0x1a8 [ 70.264217] __kasan_check_write+0x20/0x30 [ 70.264233] kasan_atomics_helper+0x12d8/0x4858 [ 70.264253] kasan_atomics+0x198/0x2e0 [ 70.264269] kunit_try_run_case+0x170/0x3f0 [ 70.264287] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.264307] kthread+0x328/0x630 [ 70.264321] ret_from_fork+0x10/0x20 [ 70.264339] [ 70.337592] Allocated by task 363: [ 70.341048] kasan_save_stack+0x3c/0x68 [ 70.344946] kasan_save_track+0x20/0x40 [ 70.348845] kasan_save_alloc_info+0x40/0x58 [ 70.353182] __kasan_kmalloc+0xd4/0xd8 [ 70.356992] __kmalloc_cache_noprof+0x16c/0x3c0 [ 70.361594] kasan_atomics+0xb8/0x2e0 [ 70.365315] kunit_try_run_case+0x170/0x3f0 [ 70.369568] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.375138] kthread+0x328/0x630 [ 70.378423] ret_from_fork+0x10/0x20 [ 70.382058] [ 70.383581] The buggy address belongs to the object at ffff000080acff00 [ 70.383581] which belongs to the cache kmalloc-64 of size 64 [ 70.396058] The buggy address is located 0 bytes to the right of [ 70.396058] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 70.409060] [ 70.410584] The buggy address belongs to the physical page: [ 70.416230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 70.424338] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 70.430944] page_type: f5(slab) [ 70.434144] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 70.441980] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 70.449812] page dumped because: kasan: bad access detected [ 70.455459] [ 70.456981] Memory state around the buggy address: [ 70.461836] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.469148] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.476462] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 70.483771] ^ [ 70.488628] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.495938] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 70.503249] ================================================================== [ 62.967904] ================================================================== [ 62.975214] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 62.982618] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363 [ 62.990106] [ 62.991631] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 62.991661] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.991669] Hardware name: Thundercomm Dragonboard 845c (DT) [ 62.991678] Call trace: [ 62.991684] show_stack+0x20/0x38 (C) [ 62.991701] dump_stack_lvl+0x8c/0xd0 [ 62.991718] print_report+0x118/0x608 [ 62.991736] kasan_report+0xdc/0x128 [ 62.991754] kasan_check_range+0x100/0x1a8 [ 62.991774] __kasan_check_write+0x20/0x30 [ 62.991789] kasan_atomics_helper+0x99c/0x4858 [ 62.991808] kasan_atomics+0x198/0x2e0 [ 62.991824] kunit_try_run_case+0x170/0x3f0 [ 62.991842] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.991863] kthread+0x328/0x630 [ 62.991876] ret_from_fork+0x10/0x20 [ 62.991892] [ 63.065055] Allocated by task 363: [ 63.068510] kasan_save_stack+0x3c/0x68 [ 63.072408] kasan_save_track+0x20/0x40 [ 63.076305] kasan_save_alloc_info+0x40/0x58 [ 63.080642] __kasan_kmalloc+0xd4/0xd8 [ 63.084453] __kmalloc_cache_noprof+0x16c/0x3c0 [ 63.089055] kasan_atomics+0xb8/0x2e0 [ 63.092776] kunit_try_run_case+0x170/0x3f0 [ 63.097029] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.102600] kthread+0x328/0x630 [ 63.105885] ret_from_fork+0x10/0x20 [ 63.109522] [ 63.111045] The buggy address belongs to the object at ffff000080acff00 [ 63.111045] which belongs to the cache kmalloc-64 of size 64 [ 63.123524] The buggy address is located 0 bytes to the right of [ 63.123524] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 63.136527] [ 63.138050] The buggy address belongs to the physical page: [ 63.143697] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 63.151804] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.158411] page_type: f5(slab) [ 63.161611] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 63.169446] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.177279] page dumped because: kasan: bad access detected [ 63.182926] [ 63.184450] Memory state around the buggy address: [ 63.189306] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.196617] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.203929] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 63.211239] ^ [ 63.216094] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.223407] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 63.230717] ================================================================== [ 67.807572] ================================================================== [ 67.814880] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 67.822284] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363 [ 67.829771] [ 67.831296] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 67.831324] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.831332] Hardware name: Thundercomm Dragonboard 845c (DT) [ 67.831342] Call trace: [ 67.831349] show_stack+0x20/0x38 (C) [ 67.831366] dump_stack_lvl+0x8c/0xd0 [ 67.831383] print_report+0x118/0x608 [ 67.831402] kasan_report+0xdc/0x128 [ 67.831419] kasan_check_range+0x100/0x1a8 [ 67.831439] __kasan_check_write+0x20/0x30 [ 67.831454] kasan_atomics_helper+0xf20/0x4858 [ 67.831472] kasan_atomics+0x198/0x2e0 [ 67.831489] kunit_try_run_case+0x170/0x3f0 [ 67.831507] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.831527] kthread+0x328/0x630 [ 67.831540] ret_from_fork+0x10/0x20 [ 67.831557] [ 67.904722] Allocated by task 363: [ 67.908177] kasan_save_stack+0x3c/0x68 [ 67.912076] kasan_save_track+0x20/0x40 [ 67.915974] kasan_save_alloc_info+0x40/0x58 [ 67.920311] __kasan_kmalloc+0xd4/0xd8 [ 67.924120] __kmalloc_cache_noprof+0x16c/0x3c0 [ 67.928722] kasan_atomics+0xb8/0x2e0 [ 67.932443] kunit_try_run_case+0x170/0x3f0 [ 67.936695] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.942263] kthread+0x328/0x630 [ 67.945548] ret_from_fork+0x10/0x20 [ 67.949184] [ 67.950706] The buggy address belongs to the object at ffff000080acff00 [ 67.950706] which belongs to the cache kmalloc-64 of size 64 [ 67.963183] The buggy address is located 0 bytes to the right of [ 67.963183] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 67.976183] [ 67.977705] The buggy address belongs to the physical page: [ 67.983350] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 67.991456] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 67.998063] page_type: f5(slab) [ 68.001263] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 68.009098] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 68.016930] page dumped because: kasan: bad access detected [ 68.022577] [ 68.024098] Memory state around the buggy address: [ 68.028953] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.036265] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.043575] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 68.050884] ^ [ 68.055740] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.063051] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 68.070361] ================================================================== [ 66.733431] ================================================================== [ 66.740740] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 66.748230] Read of size 8 at addr ffff000080acff30 by task kunit_try_catch/363 [ 66.755632] [ 66.757157] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 66.757186] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.757194] Hardware name: Thundercomm Dragonboard 845c (DT) [ 66.757207] Call trace: [ 66.757214] show_stack+0x20/0x38 (C) [ 66.757231] dump_stack_lvl+0x8c/0xd0 [ 66.757249] print_report+0x118/0x608 [ 66.757268] kasan_report+0xdc/0x128 [ 66.757286] __asan_report_load8_noabort+0x20/0x30 [ 66.757304] kasan_atomics_helper+0x3f58/0x4858 [ 66.757323] kasan_atomics+0x198/0x2e0 [ 66.757339] kunit_try_run_case+0x170/0x3f0 [ 66.757357] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.757377] kthread+0x328/0x630 [ 66.757390] ret_from_fork+0x10/0x20 [ 66.757408] [ 66.827207] Allocated by task 363: [ 66.830662] kasan_save_stack+0x3c/0x68 [ 66.834560] kasan_save_track+0x20/0x40 [ 66.838458] kasan_save_alloc_info+0x40/0x58 [ 66.842798] __kasan_kmalloc+0xd4/0xd8 [ 66.846608] __kmalloc_cache_noprof+0x16c/0x3c0 [ 66.851209] kasan_atomics+0xb8/0x2e0 [ 66.854931] kunit_try_run_case+0x170/0x3f0 [ 66.859184] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.864753] kthread+0x328/0x630 [ 66.868038] ret_from_fork+0x10/0x20 [ 66.871674] [ 66.873197] The buggy address belongs to the object at ffff000080acff00 [ 66.873197] which belongs to the cache kmalloc-64 of size 64 [ 66.885676] The buggy address is located 0 bytes to the right of [ 66.885676] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 66.898677] [ 66.900201] The buggy address belongs to the physical page: [ 66.905846] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 66.913954] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 66.920562] page_type: f5(slab) [ 66.923762] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 66.931599] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.939432] page dumped because: kasan: bad access detected [ 66.945079] [ 66.946603] Memory state around the buggy address: [ 66.951458] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.958770] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.966083] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 66.973392] ^ [ 66.978249] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.985560] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 66.992870] ================================================================== [ 64.585765] ================================================================== [ 64.593075] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 64.600566] Read of size 4 at addr ffff000080acff30 by task kunit_try_catch/363 [ 64.607968] [ 64.609494] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 64.609523] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.609532] Hardware name: Thundercomm Dragonboard 845c (DT) [ 64.609542] Call trace: [ 64.609548] show_stack+0x20/0x38 (C) [ 64.609565] dump_stack_lvl+0x8c/0xd0 [ 64.609583] print_report+0x118/0x608 [ 64.609602] kasan_report+0xdc/0x128 [ 64.609621] __asan_report_load4_noabort+0x20/0x30 [ 64.609637] kasan_atomics_helper+0x3dbc/0x4858 [ 64.609655] kasan_atomics+0x198/0x2e0 [ 64.609672] kunit_try_run_case+0x170/0x3f0 [ 64.609689] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.609710] kthread+0x328/0x630 [ 64.609724] ret_from_fork+0x10/0x20 [ 64.609742] [ 64.679539] Allocated by task 363: [ 64.682995] kasan_save_stack+0x3c/0x68 [ 64.686894] kasan_save_track+0x20/0x40 [ 64.690792] kasan_save_alloc_info+0x40/0x58 [ 64.695130] __kasan_kmalloc+0xd4/0xd8 [ 64.698941] __kmalloc_cache_noprof+0x16c/0x3c0 [ 64.703542] kasan_atomics+0xb8/0x2e0 [ 64.707264] kunit_try_run_case+0x170/0x3f0 [ 64.711517] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.717086] kthread+0x328/0x630 [ 64.720373] ret_from_fork+0x10/0x20 [ 64.724008] [ 64.725531] The buggy address belongs to the object at ffff000080acff00 [ 64.725531] which belongs to the cache kmalloc-64 of size 64 [ 64.738008] The buggy address is located 0 bytes to the right of [ 64.738008] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 64.751012] [ 64.752535] The buggy address belongs to the physical page: [ 64.758180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 64.766287] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 64.772894] page_type: f5(slab) [ 64.776093] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 64.783928] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.791760] page dumped because: kasan: bad access detected [ 64.797406] [ 64.798929] Memory state around the buggy address: [ 64.803785] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.811097] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.818409] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 64.825720] ^ [ 64.830577] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.837890] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 64.845200] ================================================================== [ 61.890507] ================================================================== [ 61.897816] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 61.905220] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363 [ 61.912708] [ 61.914233] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 61.914262] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.914271] Hardware name: Thundercomm Dragonboard 845c (DT) [ 61.914283] Call trace: [ 61.914290] show_stack+0x20/0x38 (C) [ 61.914307] dump_stack_lvl+0x8c/0xd0 [ 61.914325] print_report+0x118/0x608 [ 61.914344] kasan_report+0xdc/0x128 [ 61.914363] kasan_check_range+0x100/0x1a8 [ 61.914383] __kasan_check_write+0x20/0x30 [ 61.914400] kasan_atomics_helper+0x7cc/0x4858 [ 61.914419] kasan_atomics+0x198/0x2e0 [ 61.914435] kunit_try_run_case+0x170/0x3f0 [ 61.914453] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.914476] kthread+0x328/0x630 [ 61.914489] ret_from_fork+0x10/0x20 [ 61.914506] [ 61.987669] Allocated by task 363: [ 61.991125] kasan_save_stack+0x3c/0x68 [ 61.995024] kasan_save_track+0x20/0x40 [ 61.998922] kasan_save_alloc_info+0x40/0x58 [ 62.003261] __kasan_kmalloc+0xd4/0xd8 [ 62.007072] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.011673] kasan_atomics+0xb8/0x2e0 [ 62.015395] kunit_try_run_case+0x170/0x3f0 [ 62.019650] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.025219] kthread+0x328/0x630 [ 62.028505] ret_from_fork+0x10/0x20 [ 62.032139] [ 62.033662] The buggy address belongs to the object at ffff000080acff00 [ 62.033662] which belongs to the cache kmalloc-64 of size 64 [ 62.046142] The buggy address is located 0 bytes to the right of [ 62.046142] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 62.059144] [ 62.060668] The buggy address belongs to the physical page: [ 62.066315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 62.074421] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.081029] page_type: f5(slab) [ 62.084228] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 62.092065] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.099898] page dumped because: kasan: bad access detected [ 62.105544] [ 62.107066] Memory state around the buggy address: [ 62.111922] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.119234] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.126546] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.133857] ^ [ 62.138712] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.146024] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 62.153334] ================================================================== [ 60.269425] ================================================================== [ 60.276734] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 60.284139] Write of size 4 at addr ffff000080acff30 by task kunit_try_catch/363 [ 60.291627] [ 60.293153] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 60.293180] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.293188] Hardware name: Thundercomm Dragonboard 845c (DT) [ 60.293197] Call trace: [ 60.293203] show_stack+0x20/0x38 (C) [ 60.293220] dump_stack_lvl+0x8c/0xd0 [ 60.293237] print_report+0x118/0x608 [ 60.293256] kasan_report+0xdc/0x128 [ 60.293273] kasan_check_range+0x100/0x1a8 [ 60.293293] __kasan_check_write+0x20/0x30 [ 60.293308] kasan_atomics_helper+0x54c/0x4858 [ 60.293327] kasan_atomics+0x198/0x2e0 [ 60.293344] kunit_try_run_case+0x170/0x3f0 [ 60.293361] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.293382] kthread+0x328/0x630 [ 60.293396] ret_from_fork+0x10/0x20 [ 60.293412] [ 60.366577] Allocated by task 363: [ 60.370033] kasan_save_stack+0x3c/0x68 [ 60.373931] kasan_save_track+0x20/0x40 [ 60.377829] kasan_save_alloc_info+0x40/0x58 [ 60.382166] __kasan_kmalloc+0xd4/0xd8 [ 60.385974] __kmalloc_cache_noprof+0x16c/0x3c0 [ 60.390575] kasan_atomics+0xb8/0x2e0 [ 60.394297] kunit_try_run_case+0x170/0x3f0 [ 60.398550] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.404119] kthread+0x328/0x630 [ 60.407405] ret_from_fork+0x10/0x20 [ 60.411039] [ 60.412563] The buggy address belongs to the object at ffff000080acff00 [ 60.412563] which belongs to the cache kmalloc-64 of size 64 [ 60.425041] The buggy address is located 0 bytes to the right of [ 60.425041] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 60.438041] [ 60.439564] The buggy address belongs to the physical page: [ 60.445210] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 60.453316] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.459923] page_type: f5(slab) [ 60.463122] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 60.470959] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.478792] page dumped because: kasan: bad access detected [ 60.484438] [ 60.485960] Memory state around the buggy address: [ 60.490816] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.498126] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.505436] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.512745] ^ [ 60.517601] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.524912] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 60.532222] ================================================================== [ 69.429164] ================================================================== [ 69.436475] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 69.443968] Write of size 8 at addr ffff000080acff30 by task kunit_try_catch/363 [ 69.451459] [ 69.452984] CPU: 5 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 69.453015] Tainted: [B]=BAD_PAGE, [N]=TEST [ 69.453023] Hardware name: Thundercomm Dragonboard 845c (DT) [ 69.453036] Call trace: [ 69.453043] show_stack+0x20/0x38 (C) [ 69.453061] dump_stack_lvl+0x8c/0xd0 [ 69.453080] print_report+0x118/0x608 [ 69.453099] kasan_report+0xdc/0x128 [ 69.453118] kasan_check_range+0x100/0x1a8 [ 69.453139] __kasan_check_write+0x20/0x30 [ 69.453155] kasan_atomics_helper+0x1190/0x4858 [ 69.453173] kasan_atomics+0x198/0x2e0 [ 69.453190] kunit_try_run_case+0x170/0x3f0 [ 69.453209] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.453232] kthread+0x328/0x630 [ 69.453245] ret_from_fork+0x10/0x20 [ 69.453263] [ 69.526506] Allocated by task 363: [ 69.529963] kasan_save_stack+0x3c/0x68 [ 69.533865] kasan_save_track+0x20/0x40 [ 69.537763] kasan_save_alloc_info+0x40/0x58 [ 69.542103] __kasan_kmalloc+0xd4/0xd8 [ 69.545913] __kmalloc_cache_noprof+0x16c/0x3c0 [ 69.550515] kasan_atomics+0xb8/0x2e0 [ 69.554237] kunit_try_run_case+0x170/0x3f0 [ 69.558490] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.564059] kthread+0x328/0x630 [ 69.567345] ret_from_fork+0x10/0x20 [ 69.570980] [ 69.572504] The buggy address belongs to the object at ffff000080acff00 [ 69.572504] which belongs to the cache kmalloc-64 of size 64 [ 69.584983] The buggy address is located 0 bytes to the right of [ 69.584983] allocated 48-byte region [ffff000080acff00, ffff000080acff30) [ 69.597985] [ 69.599508] The buggy address belongs to the physical page: [ 69.605155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 69.613263] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 69.619871] page_type: f5(slab) [ 69.623070] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 69.630906] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 69.638739] page dumped because: kasan: bad access detected [ 69.644385] [ 69.645909] Memory state around the buggy address: [ 69.650764] ffff000080acfe00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.658076] ffff000080acfe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.665389] >ffff000080acff00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 69.672698] ^ [ 69.677554] ffff000080acff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.684865] ffff000080ad0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 69.692175] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 56.742582] ================================================================== [ 56.749893] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 56.758958] Read of size 8 at addr ffff000080b08108 by task kunit_try_catch/359 [ 56.766361] [ 56.767887] CPU: 4 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 56.767917] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.767924] Hardware name: Thundercomm Dragonboard 845c (DT) [ 56.767936] Call trace: [ 56.767943] show_stack+0x20/0x38 (C) [ 56.767961] dump_stack_lvl+0x8c/0xd0 [ 56.767978] print_report+0x118/0x608 [ 56.767997] kasan_report+0xdc/0x128 [ 56.768016] __asan_report_load8_noabort+0x20/0x30 [ 56.768032] kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 56.768053] kasan_bitops_generic+0x11c/0x1c8 [ 56.768072] kunit_try_run_case+0x170/0x3f0 [ 56.768090] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.768113] kthread+0x328/0x630 [ 56.768127] ret_from_fork+0x10/0x20 [ 56.768144] [ 56.840129] Allocated by task 359: [ 56.843585] kasan_save_stack+0x3c/0x68 [ 56.847483] kasan_save_track+0x20/0x40 [ 56.851379] kasan_save_alloc_info+0x40/0x58 [ 56.855718] __kasan_kmalloc+0xd4/0xd8 [ 56.859527] __kmalloc_cache_noprof+0x16c/0x3c0 [ 56.864128] kasan_bitops_generic+0xa0/0x1c8 [ 56.868469] kunit_try_run_case+0x170/0x3f0 [ 56.872724] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.878292] kthread+0x328/0x630 [ 56.881577] ret_from_fork+0x10/0x20 [ 56.885211] [ 56.886735] The buggy address belongs to the object at ffff000080b08100 [ 56.886735] which belongs to the cache kmalloc-16 of size 16 [ 56.899213] The buggy address is located 8 bytes inside of [ 56.899213] allocated 9-byte region [ffff000080b08100, ffff000080b08109) [ 56.911607] [ 56.913131] The buggy address belongs to the physical page: [ 56.918776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08 [ 56.926881] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.933489] page_type: f5(slab) [ 56.936688] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 56.944523] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 56.952356] page dumped because: kasan: bad access detected [ 56.958001] [ 56.959525] Memory state around the buggy address: [ 56.964381] ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc [ 56.971692] ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 56.979004] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.986313] ^ [ 56.989855] ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.997167] ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.004477] ================================================================== [ 54.847139] ================================================================== [ 54.854449] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 54.863514] Read of size 8 at addr ffff000080b08108 by task kunit_try_catch/359 [ 54.870915] [ 54.872440] CPU: 4 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 54.872468] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.872476] Hardware name: Thundercomm Dragonboard 845c (DT) [ 54.872485] Call trace: [ 54.872491] show_stack+0x20/0x38 (C) [ 54.872508] dump_stack_lvl+0x8c/0xd0 [ 54.872525] print_report+0x118/0x608 [ 54.872543] kasan_report+0xdc/0x128 [ 54.872561] __asan_report_load8_noabort+0x20/0x30 [ 54.872578] kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 54.872599] kasan_bitops_generic+0x11c/0x1c8 [ 54.872616] kunit_try_run_case+0x170/0x3f0 [ 54.872634] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.872653] kthread+0x328/0x630 [ 54.872667] ret_from_fork+0x10/0x20 [ 54.872684] [ 54.944671] Allocated by task 359: [ 54.948126] kasan_save_stack+0x3c/0x68 [ 54.952025] kasan_save_track+0x20/0x40 [ 54.955922] kasan_save_alloc_info+0x40/0x58 [ 54.960260] __kasan_kmalloc+0xd4/0xd8 [ 54.964068] __kmalloc_cache_noprof+0x16c/0x3c0 [ 54.968671] kasan_bitops_generic+0xa0/0x1c8 [ 54.973011] kunit_try_run_case+0x170/0x3f0 [ 54.977263] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.982833] kthread+0x328/0x630 [ 54.986118] ret_from_fork+0x10/0x20 [ 54.989754] [ 54.991277] The buggy address belongs to the object at ffff000080b08100 [ 54.991277] which belongs to the cache kmalloc-16 of size 16 [ 55.003754] The buggy address is located 8 bytes inside of [ 55.003754] allocated 9-byte region [ffff000080b08100, ffff000080b08109) [ 55.016149] [ 55.017672] The buggy address belongs to the physical page: [ 55.023317] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08 [ 55.031422] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.038029] page_type: f5(slab) [ 55.041228] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 55.049065] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 55.056896] page dumped because: kasan: bad access detected [ 55.062542] [ 55.064066] Memory state around the buggy address: [ 55.068921] ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc [ 55.076232] ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 55.083545] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.090855] ^ [ 55.094398] ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.101710] ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.109018] ================================================================== [ 55.116380] ================================================================== [ 55.123692] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 55.132758] Write of size 8 at addr ffff000080b08108 by task kunit_try_catch/359 [ 55.140249] [ 55.141775] CPU: 4 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 55.141804] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.141813] Hardware name: Thundercomm Dragonboard 845c (DT) [ 55.141822] Call trace: [ 55.141829] show_stack+0x20/0x38 (C) [ 55.141846] dump_stack_lvl+0x8c/0xd0 [ 55.141863] print_report+0x118/0x608 [ 55.141882] kasan_report+0xdc/0x128 [ 55.141900] kasan_check_range+0x100/0x1a8 [ 55.141919] __kasan_check_write+0x20/0x30 [ 55.141934] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 55.141956] kasan_bitops_generic+0x11c/0x1c8 [ 55.141973] kunit_try_run_case+0x170/0x3f0 [ 55.141990] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.142011] kthread+0x328/0x630 [ 55.142024] ret_from_fork+0x10/0x20 [ 55.142041] [ 55.217482] Allocated by task 359: [ 55.220938] kasan_save_stack+0x3c/0x68 [ 55.224838] kasan_save_track+0x20/0x40 [ 55.228734] kasan_save_alloc_info+0x40/0x58 [ 55.233074] __kasan_kmalloc+0xd4/0xd8 [ 55.236882] __kmalloc_cache_noprof+0x16c/0x3c0 [ 55.241484] kasan_bitops_generic+0xa0/0x1c8 [ 55.245824] kunit_try_run_case+0x170/0x3f0 [ 55.250077] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.255646] kthread+0x328/0x630 [ 55.258932] ret_from_fork+0x10/0x20 [ 55.262566] [ 55.264089] The buggy address belongs to the object at ffff000080b08100 [ 55.264089] which belongs to the cache kmalloc-16 of size 16 [ 55.276566] The buggy address is located 8 bytes inside of [ 55.276566] allocated 9-byte region [ffff000080b08100, ffff000080b08109) [ 55.288959] [ 55.290483] The buggy address belongs to the physical page: [ 55.296128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08 [ 55.304235] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.310841] page_type: f5(slab) [ 55.314040] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 55.321875] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 55.329706] page dumped because: kasan: bad access detected [ 55.335352] [ 55.336875] Memory state around the buggy address: [ 55.341731] ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc [ 55.349042] ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 55.356353] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.363662] ^ [ 55.367205] ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.374515] ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.381824] ================================================================== [ 55.389199] ================================================================== [ 55.396508] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 55.405573] Read of size 8 at addr ffff000080b08108 by task kunit_try_catch/359 [ 55.412973] [ 55.414500] CPU: 4 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 55.414530] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.414537] Hardware name: Thundercomm Dragonboard 845c (DT) [ 55.414548] Call trace: [ 55.414554] show_stack+0x20/0x38 (C) [ 55.414572] dump_stack_lvl+0x8c/0xd0 [ 55.414591] print_report+0x118/0x608 [ 55.414609] kasan_report+0xdc/0x128 [ 55.414627] __asan_report_load8_noabort+0x20/0x30 [ 55.414644] kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 55.414665] kasan_bitops_generic+0x11c/0x1c8 [ 55.414683] kunit_try_run_case+0x170/0x3f0 [ 55.414702] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.414724] kthread+0x328/0x630 [ 55.414737] ret_from_fork+0x10/0x20 [ 55.414754] [ 55.486741] Allocated by task 359: [ 55.490197] kasan_save_stack+0x3c/0x68 [ 55.494096] kasan_save_track+0x20/0x40 [ 55.497993] kasan_save_alloc_info+0x40/0x58 [ 55.502331] __kasan_kmalloc+0xd4/0xd8 [ 55.506139] __kmalloc_cache_noprof+0x16c/0x3c0 [ 55.510739] kasan_bitops_generic+0xa0/0x1c8 [ 55.515081] kunit_try_run_case+0x170/0x3f0 [ 55.519334] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.524902] kthread+0x328/0x630 [ 55.528188] ret_from_fork+0x10/0x20 [ 55.531822] [ 55.533346] The buggy address belongs to the object at ffff000080b08100 [ 55.533346] which belongs to the cache kmalloc-16 of size 16 [ 55.545824] The buggy address is located 8 bytes inside of [ 55.545824] allocated 9-byte region [ffff000080b08100, ffff000080b08109) [ 55.558218] [ 55.559741] The buggy address belongs to the physical page: [ 55.565386] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08 [ 55.573491] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.580099] page_type: f5(slab) [ 55.583298] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 55.591135] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 55.598966] page dumped because: kasan: bad access detected [ 55.604612] [ 55.606135] Memory state around the buggy address: [ 55.610990] ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc [ 55.618303] ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 55.625615] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.632924] ^ [ 55.636468] ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.643779] ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.651089] ================================================================== [ 55.658452] ================================================================== [ 55.665763] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 55.674829] Write of size 8 at addr ffff000080b08108 by task kunit_try_catch/359 [ 55.682316] [ 55.683842] CPU: 4 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 55.683871] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.683879] Hardware name: Thundercomm Dragonboard 845c (DT) [ 55.683891] Call trace: [ 55.683897] show_stack+0x20/0x38 (C) [ 55.683915] dump_stack_lvl+0x8c/0xd0 [ 55.683934] print_report+0x118/0x608 [ 55.683952] kasan_report+0xdc/0x128 [ 55.683970] kasan_check_range+0x100/0x1a8 [ 55.683990] __kasan_check_write+0x20/0x30 [ 55.684006] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 55.684028] kasan_bitops_generic+0x11c/0x1c8 [ 55.684047] kunit_try_run_case+0x170/0x3f0 [ 55.684064] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.684086] kthread+0x328/0x630 [ 55.684100] ret_from_fork+0x10/0x20 [ 55.684117] [ 55.759555] Allocated by task 359: [ 55.763011] kasan_save_stack+0x3c/0x68 [ 55.766910] kasan_save_track+0x20/0x40 [ 55.770809] kasan_save_alloc_info+0x40/0x58 [ 55.775147] __kasan_kmalloc+0xd4/0xd8 [ 55.778956] __kmalloc_cache_noprof+0x16c/0x3c0 [ 55.783557] kasan_bitops_generic+0xa0/0x1c8 [ 55.787897] kunit_try_run_case+0x170/0x3f0 [ 55.792150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.797719] kthread+0x328/0x630 [ 55.801004] ret_from_fork+0x10/0x20 [ 55.804638] [ 55.806161] The buggy address belongs to the object at ffff000080b08100 [ 55.806161] which belongs to the cache kmalloc-16 of size 16 [ 55.818639] The buggy address is located 8 bytes inside of [ 55.818639] allocated 9-byte region [ffff000080b08100, ffff000080b08109) [ 55.831032] [ 55.832555] The buggy address belongs to the physical page: [ 55.838200] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08 [ 55.846305] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.852911] page_type: f5(slab) [ 55.856110] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 55.863945] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 55.871776] page dumped because: kasan: bad access detected [ 55.877421] [ 55.878943] Memory state around the buggy address: [ 55.883796] ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc [ 55.891108] ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 55.898420] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.905729] ^ [ 55.909272] ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.916583] ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.923892] ================================================================== [ 56.200509] ================================================================== [ 56.207821] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 56.216885] Write of size 8 at addr ffff000080b08108 by task kunit_try_catch/359 [ 56.224374] [ 56.225898] CPU: 4 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 56.225927] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.225936] Hardware name: Thundercomm Dragonboard 845c (DT) [ 56.225945] Call trace: [ 56.225953] show_stack+0x20/0x38 (C) [ 56.225970] dump_stack_lvl+0x8c/0xd0 [ 56.225988] print_report+0x118/0x608 [ 56.226006] kasan_report+0xdc/0x128 [ 56.226024] kasan_check_range+0x100/0x1a8 [ 56.226043] __kasan_check_write+0x20/0x30 [ 56.226060] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 56.226080] kasan_bitops_generic+0x11c/0x1c8 [ 56.226099] kunit_try_run_case+0x170/0x3f0 [ 56.226116] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.226136] kthread+0x328/0x630 [ 56.226150] ret_from_fork+0x10/0x20 [ 56.226166] [ 56.301605] Allocated by task 359: [ 56.305061] kasan_save_stack+0x3c/0x68 [ 56.308961] kasan_save_track+0x20/0x40 [ 56.312859] kasan_save_alloc_info+0x40/0x58 [ 56.317196] __kasan_kmalloc+0xd4/0xd8 [ 56.321005] __kmalloc_cache_noprof+0x16c/0x3c0 [ 56.325605] kasan_bitops_generic+0xa0/0x1c8 [ 56.329947] kunit_try_run_case+0x170/0x3f0 [ 56.334200] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.339770] kthread+0x328/0x630 [ 56.343055] ret_from_fork+0x10/0x20 [ 56.346690] [ 56.348212] The buggy address belongs to the object at ffff000080b08100 [ 56.348212] which belongs to the cache kmalloc-16 of size 16 [ 56.360689] The buggy address is located 8 bytes inside of [ 56.360689] allocated 9-byte region [ffff000080b08100, ffff000080b08109) [ 56.373084] [ 56.374607] The buggy address belongs to the physical page: [ 56.380251] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08 [ 56.388359] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.394966] page_type: f5(slab) [ 56.398166] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 56.406002] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 56.413834] page dumped because: kasan: bad access detected [ 56.419481] [ 56.421003] Memory state around the buggy address: [ 56.425858] ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc [ 56.433171] ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 56.440482] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.447793] ^ [ 56.451335] ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.458645] ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.465956] ================================================================== [ 56.473329] ================================================================== [ 56.480638] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 56.489704] Read of size 8 at addr ffff000080b08108 by task kunit_try_catch/359 [ 56.497104] [ 56.498629] CPU: 4 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 56.498657] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.498666] Hardware name: Thundercomm Dragonboard 845c (DT) [ 56.498677] Call trace: [ 56.498684] show_stack+0x20/0x38 (C) [ 56.498700] dump_stack_lvl+0x8c/0xd0 [ 56.498719] print_report+0x118/0x608 [ 56.498737] kasan_report+0xdc/0x128 [ 56.498755] __asan_report_load8_noabort+0x20/0x30 [ 56.498771] kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 56.498793] kasan_bitops_generic+0x11c/0x1c8 [ 56.498811] kunit_try_run_case+0x170/0x3f0 [ 56.498829] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.498849] kthread+0x328/0x630 [ 56.498863] ret_from_fork+0x10/0x20 [ 56.498880] [ 56.570868] Allocated by task 359: [ 56.574323] kasan_save_stack+0x3c/0x68 [ 56.578221] kasan_save_track+0x20/0x40 [ 56.582120] kasan_save_alloc_info+0x40/0x58 [ 56.586459] __kasan_kmalloc+0xd4/0xd8 [ 56.590268] __kmalloc_cache_noprof+0x16c/0x3c0 [ 56.594870] kasan_bitops_generic+0xa0/0x1c8 [ 56.599210] kunit_try_run_case+0x170/0x3f0 [ 56.603463] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.609032] kthread+0x328/0x630 [ 56.612317] ret_from_fork+0x10/0x20 [ 56.615952] [ 56.617475] The buggy address belongs to the object at ffff000080b08100 [ 56.617475] which belongs to the cache kmalloc-16 of size 16 [ 56.629953] The buggy address is located 8 bytes inside of [ 56.629953] allocated 9-byte region [ffff000080b08100, ffff000080b08109) [ 56.642347] [ 56.643870] The buggy address belongs to the physical page: [ 56.649516] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08 [ 56.657623] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.664230] page_type: f5(slab) [ 56.667428] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 56.675265] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 56.683096] page dumped because: kasan: bad access detected [ 56.688742] [ 56.690265] Memory state around the buggy address: [ 56.695122] ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc [ 56.702434] ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 56.709747] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.717057] ^ [ 56.720600] ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.727912] ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.735221] ================================================================== [ 54.574492] ================================================================== [ 54.581803] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 54.590783] Write of size 8 at addr ffff000080b08108 by task kunit_try_catch/359 [ 54.598270] [ 54.599796] CPU: 4 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 54.599826] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.599833] Hardware name: Thundercomm Dragonboard 845c (DT) [ 54.599843] Call trace: [ 54.599850] show_stack+0x20/0x38 (C) [ 54.599866] dump_stack_lvl+0x8c/0xd0 [ 54.599884] print_report+0x118/0x608 [ 54.599902] kasan_report+0xdc/0x128 [ 54.599921] kasan_check_range+0x100/0x1a8 [ 54.599942] __kasan_check_write+0x20/0x30 [ 54.599958] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 54.599979] kasan_bitops_generic+0x11c/0x1c8 [ 54.599998] kunit_try_run_case+0x170/0x3f0 [ 54.600016] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.600037] kthread+0x328/0x630 [ 54.600051] ret_from_fork+0x10/0x20 [ 54.600069] [ 54.675422] Allocated by task 359: [ 54.678877] kasan_save_stack+0x3c/0x68 [ 54.682776] kasan_save_track+0x20/0x40 [ 54.686674] kasan_save_alloc_info+0x40/0x58 [ 54.691012] __kasan_kmalloc+0xd4/0xd8 [ 54.694822] __kmalloc_cache_noprof+0x16c/0x3c0 [ 54.699424] kasan_bitops_generic+0xa0/0x1c8 [ 54.703764] kunit_try_run_case+0x170/0x3f0 [ 54.708016] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.713585] kthread+0x328/0x630 [ 54.716871] ret_from_fork+0x10/0x20 [ 54.720506] [ 54.722029] The buggy address belongs to the object at ffff000080b08100 [ 54.722029] which belongs to the cache kmalloc-16 of size 16 [ 54.734506] The buggy address is located 8 bytes inside of [ 54.734506] allocated 9-byte region [ffff000080b08100, ffff000080b08109) [ 54.746900] [ 54.748423] The buggy address belongs to the physical page: [ 54.754068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08 [ 54.762173] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.768780] page_type: f5(slab) [ 54.771979] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 54.779814] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 54.787645] page dumped because: kasan: bad access detected [ 54.793292] [ 54.794814] Memory state around the buggy address: [ 54.799669] ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc [ 54.806980] ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 54.814292] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.821602] ^ [ 54.825147] ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.832457] ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.839765] ================================================================== [ 55.931265] ================================================================== [ 55.938574] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 55.947638] Read of size 8 at addr ffff000080b08108 by task kunit_try_catch/359 [ 55.955040] [ 55.956565] CPU: 4 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 55.956594] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.956602] Hardware name: Thundercomm Dragonboard 845c (DT) [ 55.956612] Call trace: [ 55.956618] show_stack+0x20/0x38 (C) [ 55.956635] dump_stack_lvl+0x8c/0xd0 [ 55.956652] print_report+0x118/0x608 [ 55.956670] kasan_report+0xdc/0x128 [ 55.956688] __asan_report_load8_noabort+0x20/0x30 [ 55.956704] kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 55.956725] kasan_bitops_generic+0x11c/0x1c8 [ 55.956743] kunit_try_run_case+0x170/0x3f0 [ 55.956761] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.956781] kthread+0x328/0x630 [ 55.956796] ret_from_fork+0x10/0x20 [ 55.956812] [ 56.028796] Allocated by task 359: [ 56.032252] kasan_save_stack+0x3c/0x68 [ 56.036150] kasan_save_track+0x20/0x40 [ 56.040047] kasan_save_alloc_info+0x40/0x58 [ 56.044386] __kasan_kmalloc+0xd4/0xd8 [ 56.048195] __kmalloc_cache_noprof+0x16c/0x3c0 [ 56.052796] kasan_bitops_generic+0xa0/0x1c8 [ 56.057137] kunit_try_run_case+0x170/0x3f0 [ 56.061390] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.066960] kthread+0x328/0x630 [ 56.070247] ret_from_fork+0x10/0x20 [ 56.073881] [ 56.075404] The buggy address belongs to the object at ffff000080b08100 [ 56.075404] which belongs to the cache kmalloc-16 of size 16 [ 56.087884] The buggy address is located 8 bytes inside of [ 56.087884] allocated 9-byte region [ffff000080b08100, ffff000080b08109) [ 56.100278] [ 56.101802] The buggy address belongs to the physical page: [ 56.107447] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08 [ 56.115553] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.122162] page_type: f5(slab) [ 56.125362] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 56.133198] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 56.141031] page dumped because: kasan: bad access detected [ 56.146677] [ 56.148199] Memory state around the buggy address: [ 56.153054] ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc [ 56.160365] ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 56.167675] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.174984] ^ [ 56.178527] ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.185840] ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.193149] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[ 53.764262] ================================================================== [ 53.771573] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 53.779857] Write of size 8 at addr ffff000080b08108 by task kunit_try_catch/359 [ 53.787345] [ 53.788870] CPU: 4 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 53.788899] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.788908] Hardware name: Thundercomm Dragonboard 845c (DT) [ 53.788918] Call trace: [ 53.788924] show_stack+0x20/0x38 (C) [ 53.788941] dump_stack_lvl+0x8c/0xd0 [ 53.788958] print_report+0x118/0x608 [ 53.788977] kasan_report+0xdc/0x128 [ 53.788995] kasan_check_range+0x100/0x1a8 [ 53.789015] __kasan_check_write+0x20/0x30 [ 53.789032] kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 53.789052] kasan_bitops_generic+0x110/0x1c8 [ 53.789071] kunit_try_run_case+0x170/0x3f0 [ 53.789090] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.789110] kthread+0x328/0x630 [ 53.789125] ret_from_fork+0x10/0x20 [ 53.789142] [ 53.863792] Allocated by task 359: [ 53.867250] kasan_save_stack+0x3c/0x68 [ 53.871148] kasan_save_track+0x20/0x40 [ 53.875046] kasan_save_alloc_info+0x40/0x58 [ 53.879384] __kasan_kmalloc+0xd4/0xd8 [ 53.883193] __kmalloc_cache_noprof+0x16c/0x3c0 [ 53.887795] kasan_bitops_generic+0xa0/0x1c8 [ 53.892136] kunit_try_run_case+0x170/0x3f0 [ 53.896389] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.901957] kthread+0x328/0x630 [ 53.905243] ret_from_fork+0x10/0x20 [ 53.908877] [ 53.910400] The buggy address belongs to the object at ffff000080b08100 [ 53.910400] which belongs to the cache kmalloc-16 of size 16 [ 53.922877] The buggy address is located 8 bytes inside of [ 53.922877] allocated 9-byte region [ffff000080b08100, ffff000080b08109) [ 53.935272] [ 53.936795] The buggy address belongs to the physical page: [ 53.942440] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08 [ 53.950546] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.957154] page_type: f5(slab) [ 53.960353] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 53.968189] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 53.976020] page dumped because: kasan: bad access detected [ 53.981667] [ 53.983190] Memory state around the buggy address: [ 53.988047] ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc [ 53.995359] ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 54.002671] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.009981] ^ [ 54.013524] ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.020837] ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.028147] ================================================================== [ 52.415034] ================================================================== [ 52.422365] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 52.430648] Write of size 8 at addr ffff000080b08108 by task kunit_try_catch/359 [ 52.438143] [ 52.439679] CPU: 4 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 52.439711] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.439720] Hardware name: Thundercomm Dragonboard 845c (DT) [ 52.439732] Call trace: [ 52.439739] show_stack+0x20/0x38 (C) [ 52.439758] dump_stack_lvl+0x8c/0xd0 [ 52.439779] print_report+0x118/0x608 [ 52.439800] kasan_report+0xdc/0x128 [ 52.439819] kasan_check_range+0x100/0x1a8 [ 52.439840] __kasan_check_write+0x20/0x30 [ 52.439856] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 52.439877] kasan_bitops_generic+0x110/0x1c8 [ 52.439896] kunit_try_run_case+0x170/0x3f0 [ 52.439914] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.439935] kthread+0x328/0x630 [ 52.439949] ret_from_fork+0x10/0x20 [ 52.439966] [ 52.514598] Allocated by task 359: [ 52.518052] kasan_save_stack+0x3c/0x68 [ 52.521959] kasan_save_track+0x20/0x40 [ 52.525864] kasan_save_alloc_info+0x40/0x58 [ 52.530198] __kasan_kmalloc+0xd4/0xd8 [ 52.534014] __kmalloc_cache_noprof+0x16c/0x3c0 [ 52.538613] kasan_bitops_generic+0xa0/0x1c8 [ 52.542948] kunit_try_run_case+0x170/0x3f0 [ 52.547196] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.552758] kthread+0x328/0x630 [ 52.556038] ret_from_fork+0x10/0x20 [ 52.559670] [ 52.561194] The buggy address belongs to the object at ffff000080b08100 [ 52.561194] which belongs to the cache kmalloc-16 of size 16 [ 52.573670] The buggy address is located 8 bytes inside of [ 52.573670] allocated 9-byte region [ffff000080b08100, ffff000080b08109) [ 52.586062] [ 52.587592] The buggy address belongs to the physical page: [ 52.593236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08 [ 52.601335] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.607945] page_type: f5(slab) [ 52.611145] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 52.618985] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 52.626819] page dumped because: kasan: bad access detected [ 52.632458] [ 52.633980] Memory state around the buggy address: [ 52.638843] ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc [ 52.646157] ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 52.653472] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.660784] ^ [ 52.664325] ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.671638] ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.678943] ================================================================== [ 52.686360] ================================================================== [ 52.693678] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 52.701957] Read of size 8 at addr ffff000080b08108 by task kunit_try_catch/359 [ 52.709362] [ 52.710890] CPU: 4 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 52.710920] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.710929] Hardware name: Thundercomm Dragonboard 845c (DT) [ 52.710939] Call trace: [ 52.710945] show_stack+0x20/0x38 (C) [ 52.710962] dump_stack_lvl+0x8c/0xd0 [ 52.710980] print_report+0x118/0x608 [ 52.710999] kasan_report+0xdc/0x128 [ 52.711017] __asan_report_load8_noabort+0x20/0x30 [ 52.711034] kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 52.711055] kasan_bitops_generic+0x110/0x1c8 [ 52.711073] kunit_try_run_case+0x170/0x3f0 [ 52.711090] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.711111] kthread+0x328/0x630 [ 52.711125] ret_from_fork+0x10/0x20 [ 52.711141] [ 52.782337] Allocated by task 359: [ 52.785791] kasan_save_stack+0x3c/0x68 [ 52.789697] kasan_save_track+0x20/0x40 [ 52.793602] kasan_save_alloc_info+0x40/0x58 [ 52.797935] __kasan_kmalloc+0xd4/0xd8 [ 52.801750] __kmalloc_cache_noprof+0x16c/0x3c0 [ 52.806347] kasan_bitops_generic+0xa0/0x1c8 [ 52.810684] kunit_try_run_case+0x170/0x3f0 [ 52.814933] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.820492] kthread+0x328/0x630 [ 52.823775] ret_from_fork+0x10/0x20 [ 52.827406] [ 52.828928] The buggy address belongs to the object at ffff000080b08100 [ 52.828928] which belongs to the cache kmalloc-16 of size 16 [ 52.841407] The buggy address is located 8 bytes inside of [ 52.841407] allocated 9-byte region [ffff000080b08100, ffff000080b08109) [ 52.853799] [ 52.855331] The buggy address belongs to the physical page: [ 52.860970] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08 [ 52.869067] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.875675] page_type: f5(slab) [ 52.878874] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 52.886714] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 52.894545] page dumped because: kasan: bad access detected [ 52.900183] [ 52.901706] Memory state around the buggy address: [ 52.906557] ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc [ 52.913871] ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 52.921184] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.928496] ^ [ 52.932044] ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.939360] ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.946665] ================================================================== [ 51.870733] ================================================================== [ 51.881940] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 51.890224] Write of size 8 at addr ffff000080b08108 by task kunit_try_catch/359 [ 51.897725] [ 51.899263] CPU: 3 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 51.899293] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.899305] Hardware name: Thundercomm Dragonboard 845c (DT) [ 51.899317] Call trace: [ 51.899324] show_stack+0x20/0x38 (C) [ 51.899343] dump_stack_lvl+0x8c/0xd0 [ 51.899364] print_report+0x118/0x608 [ 51.899385] kasan_report+0xdc/0x128 [ 51.899406] kasan_check_range+0x100/0x1a8 [ 51.899427] __kasan_check_write+0x20/0x30 [ 51.899444] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 51.899465] kasan_bitops_generic+0x110/0x1c8 [ 51.899485] kunit_try_run_case+0x170/0x3f0 [ 51.899505] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.899529] kthread+0x328/0x630 [ 51.899546] ret_from_fork+0x10/0x20 [ 51.899565] [ 51.974250] Allocated by task 359: [ 51.977716] kasan_save_stack+0x3c/0x68 [ 51.981625] kasan_save_track+0x20/0x40 [ 51.985531] kasan_save_alloc_info+0x40/0x58 [ 51.989878] __kasan_kmalloc+0xd4/0xd8 [ 51.993696] __kmalloc_cache_noprof+0x16c/0x3c0 [ 51.998306] kasan_bitops_generic+0xa0/0x1c8 [ 52.002654] kunit_try_run_case+0x170/0x3f0 [ 52.006915] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.012485] kthread+0x328/0x630 [ 52.015773] ret_from_fork+0x10/0x20 [ 52.019417] [ 52.020948] The buggy address belongs to the object at ffff000080b08100 [ 52.020948] which belongs to the cache kmalloc-16 of size 16 [ 52.033439] The buggy address is located 8 bytes inside of [ 52.033439] allocated 9-byte region [ffff000080b08100, ffff000080b08109) [ 52.045844] [ 52.047377] The buggy address belongs to the physical page: [ 52.053022] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08 [ 52.061126] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.067742] page_type: f5(slab) [ 52.070944] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 52.078792] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 52.086634] page dumped because: kasan: bad access detected [ 52.092281] [ 52.093812] Memory state around the buggy address: [ 52.098672] ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc [ 52.105986] ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 52.113303] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.120616] ^ [ 52.124169] ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.131487] ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.138801] ================================================================== [ 52.146197] ================================================================== [ 52.153518] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 52.161812] Read of size 8 at addr ffff000080b08108 by task kunit_try_catch/359 [ 52.169225] [ 52.170760] CPU: 3 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 52.170792] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.170802] Hardware name: Thundercomm Dragonboard 845c (DT) [ 52.170815] Call trace: [ 52.170823] show_stack+0x20/0x38 (C) [ 52.170841] dump_stack_lvl+0x8c/0xd0 [ 52.170862] print_report+0x118/0x608 [ 52.170882] kasan_report+0xdc/0x128 [ 52.170901] __asan_report_load8_noabort+0x20/0x30 [ 52.170922] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 52.170943] kasan_bitops_generic+0x110/0x1c8 [ 52.170963] kunit_try_run_case+0x170/0x3f0 [ 52.170982] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.171005] kthread+0x328/0x630 [ 52.171021] ret_from_fork+0x10/0x20 [ 52.171039] [ 52.242280] Allocated by task 359: [ 52.245742] kasan_save_stack+0x3c/0x68 [ 52.249657] kasan_save_track+0x20/0x40 [ 52.253568] kasan_save_alloc_info+0x40/0x58 [ 52.257910] __kasan_kmalloc+0xd4/0xd8 [ 52.261733] __kmalloc_cache_noprof+0x16c/0x3c0 [ 52.266335] kasan_bitops_generic+0xa0/0x1c8 [ 52.270676] kunit_try_run_case+0x170/0x3f0 [ 52.274933] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.280503] kthread+0x328/0x630 [ 52.283797] ret_from_fork+0x10/0x20 [ 52.287438] [ 52.288967] The buggy address belongs to the object at ffff000080b08100 [ 52.288967] which belongs to the cache kmalloc-16 of size 16 [ 52.301459] The buggy address is located 8 bytes inside of [ 52.301459] allocated 9-byte region [ffff000080b08100, ffff000080b08109) [ 52.313858] [ 52.315389] The buggy address belongs to the physical page: [ 52.321036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08 [ 52.329152] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.335776] page_type: f5(slab) [ 52.338973] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 52.346821] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 52.354663] page dumped because: kasan: bad access detected [ 52.360317] [ 52.361847] Memory state around the buggy address: [ 52.366709] ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc [ 52.374027] ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 52.381343] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.388656] ^ [ 52.392205] ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.399523] ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.406836] ================================================================== [ 52.954032] ================================================================== [ 52.961346] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 52.969624] Write of size 8 at addr ffff000080b08108 by task kunit_try_catch/359 [ 52.977111] [ 52.978647] CPU: 4 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 52.978676] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.978685] Hardware name: Thundercomm Dragonboard 845c (DT) [ 52.978696] Call trace: [ 52.978702] show_stack+0x20/0x38 (C) [ 52.978720] dump_stack_lvl+0x8c/0xd0 [ 52.978737] print_report+0x118/0x608 [ 52.978756] kasan_report+0xdc/0x128 [ 52.978774] kasan_check_range+0x100/0x1a8 [ 52.978793] __kasan_check_write+0x20/0x30 [ 52.978810] kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 52.978830] kasan_bitops_generic+0x110/0x1c8 [ 52.978849] kunit_try_run_case+0x170/0x3f0 [ 52.978866] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.978887] kthread+0x328/0x630 [ 52.978901] ret_from_fork+0x10/0x20 [ 52.978918] [ 53.053565] Allocated by task 359: [ 53.057022] kasan_save_stack+0x3c/0x68 [ 53.060922] kasan_save_track+0x20/0x40 [ 53.064820] kasan_save_alloc_info+0x40/0x58 [ 53.069159] __kasan_kmalloc+0xd4/0xd8 [ 53.072968] __kmalloc_cache_noprof+0x16c/0x3c0 [ 53.077570] kasan_bitops_generic+0xa0/0x1c8 [ 53.081910] kunit_try_run_case+0x170/0x3f0 [ 53.086162] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.091733] kthread+0x328/0x630 [ 53.095019] ret_from_fork+0x10/0x20 [ 53.098655] [ 53.100179] The buggy address belongs to the object at ffff000080b08100 [ 53.100179] which belongs to the cache kmalloc-16 of size 16 [ 53.112657] The buggy address is located 8 bytes inside of [ 53.112657] allocated 9-byte region [ffff000080b08100, ffff000080b08109) [ 53.125052] [ 53.126575] The buggy address belongs to the physical page: [ 53.132222] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08 [ 53.140329] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.146937] page_type: f5(slab) [ 53.150136] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 53.157973] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 53.165805] page dumped because: kasan: bad access detected [ 53.171453] [ 53.172986] Memory state around the buggy address: [ 53.177841] ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc [ 53.185155] ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 53.192467] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.199776] ^ [ 53.203319] ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.210630] ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.217940] ================================================================== [ 54.306819] ================================================================== [ 54.314129] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 54.322414] Read of size 8 at addr ffff000080b08108 by task kunit_try_catch/359 [ 54.329815] [ 54.331341] CPU: 4 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 54.331369] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.331377] Hardware name: Thundercomm Dragonboard 845c (DT) [ 54.331388] Call trace: [ 54.331393] show_stack+0x20/0x38 (C) [ 54.331410] dump_stack_lvl+0x8c/0xd0 [ 54.331428] print_report+0x118/0x608 [ 54.331446] kasan_report+0xdc/0x128 [ 54.331465] __asan_report_load8_noabort+0x20/0x30 [ 54.331482] kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 54.331500] kasan_bitops_generic+0x110/0x1c8 [ 54.331518] kunit_try_run_case+0x170/0x3f0 [ 54.331535] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.331555] kthread+0x328/0x630 [ 54.331569] ret_from_fork+0x10/0x20 [ 54.331585] [ 54.402780] Allocated by task 359: [ 54.406236] kasan_save_stack+0x3c/0x68 [ 54.410135] kasan_save_track+0x20/0x40 [ 54.414034] kasan_save_alloc_info+0x40/0x58 [ 54.418374] __kasan_kmalloc+0xd4/0xd8 [ 54.422184] __kmalloc_cache_noprof+0x16c/0x3c0 [ 54.426785] kasan_bitops_generic+0xa0/0x1c8 [ 54.431126] kunit_try_run_case+0x170/0x3f0 [ 54.435379] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.440947] kthread+0x328/0x630 [ 54.444233] ret_from_fork+0x10/0x20 [ 54.447869] [ 54.449392] The buggy address belongs to the object at ffff000080b08100 [ 54.449392] which belongs to the cache kmalloc-16 of size 16 [ 54.461869] The buggy address is located 8 bytes inside of [ 54.461869] allocated 9-byte region [ffff000080b08100, ffff000080b08109) [ 54.474262] [ 54.475785] The buggy address belongs to the physical page: [ 54.481430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08 [ 54.489535] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.496142] page_type: f5(slab) [ 54.499341] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 54.507177] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 54.515008] page dumped because: kasan: bad access detected [ 54.520653] [ 54.522175] Memory state around the buggy address: [ 54.527031] ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc [ 54.534343] ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 54.541654] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.548964] ^ [ 54.552508] ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.559820] ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.567129] ================================================================== [ 54.035551] ================================================================== [ 54.042865] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 54.051151] Write of size 8 at addr ffff000080b08108 by task kunit_try_catch/359 [ 54.058640] [ 54.060166] CPU: 4 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 54.060195] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.060205] Hardware name: Thundercomm Dragonboard 845c (DT) [ 54.060216] Call trace: [ 54.060223] show_stack+0x20/0x38 (C) [ 54.060239] dump_stack_lvl+0x8c/0xd0 [ 54.060257] print_report+0x118/0x608 [ 54.060276] kasan_report+0xdc/0x128 [ 54.060295] kasan_check_range+0x100/0x1a8 [ 54.060315] __kasan_check_write+0x20/0x30 [ 54.060332] kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 54.060351] kasan_bitops_generic+0x110/0x1c8 [ 54.060369] kunit_try_run_case+0x170/0x3f0 [ 54.060388] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.060410] kthread+0x328/0x630 [ 54.060424] ret_from_fork+0x10/0x20 [ 54.060441] [ 54.135089] Allocated by task 359: [ 54.138545] kasan_save_stack+0x3c/0x68 [ 54.142444] kasan_save_track+0x20/0x40 [ 54.146342] kasan_save_alloc_info+0x40/0x58 [ 54.150680] __kasan_kmalloc+0xd4/0xd8 [ 54.154490] __kmalloc_cache_noprof+0x16c/0x3c0 [ 54.159091] kasan_bitops_generic+0xa0/0x1c8 [ 54.163433] kunit_try_run_case+0x170/0x3f0 [ 54.167687] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.173255] kthread+0x328/0x630 [ 54.176541] ret_from_fork+0x10/0x20 [ 54.180176] [ 54.181698] The buggy address belongs to the object at ffff000080b08100 [ 54.181698] which belongs to the cache kmalloc-16 of size 16 [ 54.194177] The buggy address is located 8 bytes inside of [ 54.194177] allocated 9-byte region [ffff000080b08100, ffff000080b08109) [ 54.206572] [ 54.208096] The buggy address belongs to the physical page: [ 54.213741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08 [ 54.221846] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.228453] page_type: f5(slab) [ 54.231651] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 54.239488] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 54.247320] page dumped because: kasan: bad access detected [ 54.252965] [ 54.254487] Memory state around the buggy address: [ 54.259341] ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc [ 54.266654] ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 54.273966] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.281276] ^ [ 54.284818] ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.292129] ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.299438] ================================================================== [ 53.225326] ================================================================== [ 53.232638] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 53.240924] Write of size 8 at addr ffff000080b08108 by task kunit_try_catch/359 [ 53.248413] [ 53.249940] CPU: 4 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 53.249971] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.249980] Hardware name: Thundercomm Dragonboard 845c (DT) [ 53.249989] Call trace: [ 53.249995] show_stack+0x20/0x38 (C) [ 53.250013] dump_stack_lvl+0x8c/0xd0 [ 53.250032] print_report+0x118/0x608 [ 53.250051] kasan_report+0xdc/0x128 [ 53.250070] kasan_check_range+0x100/0x1a8 [ 53.250090] __kasan_check_write+0x20/0x30 [ 53.250106] kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 53.250125] kasan_bitops_generic+0x110/0x1c8 [ 53.250143] kunit_try_run_case+0x170/0x3f0 [ 53.250160] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.250182] kthread+0x328/0x630 [ 53.250195] ret_from_fork+0x10/0x20 [ 53.250212] [ 53.324862] Allocated by task 359: [ 53.328318] kasan_save_stack+0x3c/0x68 [ 53.332218] kasan_save_track+0x20/0x40 [ 53.336115] kasan_save_alloc_info+0x40/0x58 [ 53.340452] __kasan_kmalloc+0xd4/0xd8 [ 53.344262] __kmalloc_cache_noprof+0x16c/0x3c0 [ 53.348863] kasan_bitops_generic+0xa0/0x1c8 [ 53.353204] kunit_try_run_case+0x170/0x3f0 [ 53.357458] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.363026] kthread+0x328/0x630 [ 53.366313] ret_from_fork+0x10/0x20 [ 53.369947] [ 53.371470] The buggy address belongs to the object at ffff000080b08100 [ 53.371470] which belongs to the cache kmalloc-16 of size 16 [ 53.383948] The buggy address is located 8 bytes inside of [ 53.383948] allocated 9-byte region [ffff000080b08100, ffff000080b08109) [ 53.396336] [ 53.397858] The buggy address belongs to the physical page: [ 53.403504] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08 [ 53.411610] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.418220] page_type: f5(slab) [ 53.421418] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 53.429254] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 53.437087] page dumped because: kasan: bad access detected [ 53.442733] [ 53.444256] Memory state around the buggy address: [ 53.449111] ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc [ 53.456422] ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 53.463736] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.471045] ^ [ 53.474589] ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.481902] ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.489213] ================================================================== [ 53.496579] ================================================================== [ 53.503889] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 53.512175] Read of size 8 at addr ffff000080b08108 by task kunit_try_catch/359 [ 53.519576] [ 53.521102] CPU: 4 UID: 0 PID: 359 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 53.521131] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.521140] Hardware name: Thundercomm Dragonboard 845c (DT) [ 53.521150] Call trace: [ 53.521156] show_stack+0x20/0x38 (C) [ 53.521174] dump_stack_lvl+0x8c/0xd0 [ 53.521192] print_report+0x118/0x608 [ 53.521212] kasan_report+0xdc/0x128 [ 53.521230] __asan_report_load8_noabort+0x20/0x30 [ 53.521248] kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 53.521267] kasan_bitops_generic+0x110/0x1c8 [ 53.521286] kunit_try_run_case+0x170/0x3f0 [ 53.521303] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.521326] kthread+0x328/0x630 [ 53.521339] ret_from_fork+0x10/0x20 [ 53.521356] [ 53.592551] Allocated by task 359: [ 53.596006] kasan_save_stack+0x3c/0x68 [ 53.599905] kasan_save_track+0x20/0x40 [ 53.603801] kasan_save_alloc_info+0x40/0x58 [ 53.608139] __kasan_kmalloc+0xd4/0xd8 [ 53.611948] __kmalloc_cache_noprof+0x16c/0x3c0 [ 53.616549] kasan_bitops_generic+0xa0/0x1c8 [ 53.620890] kunit_try_run_case+0x170/0x3f0 [ 53.625142] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.630710] kthread+0x328/0x630 [ 53.633995] ret_from_fork+0x10/0x20 [ 53.637629] [ 53.639151] The buggy address belongs to the object at ffff000080b08100 [ 53.639151] which belongs to the cache kmalloc-16 of size 16 [ 53.651627] The buggy address is located 8 bytes inside of [ 53.651627] allocated 9-byte region [ffff000080b08100, ffff000080b08109) [ 53.664020] [ 53.665544] The buggy address belongs to the physical page: [ 53.671189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100b08 [ 53.679296] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.685903] page_type: f5(slab) [ 53.689101] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 53.696939] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 53.704771] page dumped because: kasan: bad access detected [ 53.710416] [ 53.711939] Memory state around the buggy address: [ 53.716793] ffff000080b08000: 00 06 fc fc 00 06 fc fc 00 04 fc fc fa fb fc fc [ 53.724104] ffff000080b08080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 53.731415] >ffff000080b08100: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.738725] ^ [ 53.742268] ffff000080b08180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.749579] ffff000080b08200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.756888] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen
[ 51.560534] ================================================================== [ 51.567852] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88 [ 51.573936] Read of size 1 at addr ffff000093781910 by task kunit_try_catch/357 [ 51.581341] [ 51.582866] CPU: 6 UID: 0 PID: 357 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 51.582895] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.582903] Hardware name: Thundercomm Dragonboard 845c (DT) [ 51.582914] Call trace: [ 51.582920] show_stack+0x20/0x38 (C) [ 51.582937] dump_stack_lvl+0x8c/0xd0 [ 51.582955] print_report+0x118/0x608 [ 51.582973] kasan_report+0xdc/0x128 [ 51.582991] __asan_report_load1_noabort+0x20/0x30 [ 51.583008] strnlen+0x80/0x88 [ 51.583021] kasan_strings+0x478/0xb00 [ 51.583036] kunit_try_run_case+0x170/0x3f0 [ 51.583054] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.583074] kthread+0x328/0x630 [ 51.583088] ret_from_fork+0x10/0x20 [ 51.583104] [ 51.651415] Allocated by task 357: [ 51.654870] kasan_save_stack+0x3c/0x68 [ 51.658778] kasan_save_track+0x20/0x40 [ 51.662683] kasan_save_alloc_info+0x40/0x58 [ 51.667019] __kasan_kmalloc+0xd4/0xd8 [ 51.670836] __kmalloc_cache_noprof+0x16c/0x3c0 [ 51.675430] kasan_strings+0xc8/0xb00 [ 51.679148] kunit_try_run_case+0x170/0x3f0 [ 51.683396] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.688962] kthread+0x328/0x630 [ 51.692243] ret_from_fork+0x10/0x20 [ 51.695874] [ 51.697396] Freed by task 357: [ 51.700500] kasan_save_stack+0x3c/0x68 [ 51.704395] kasan_save_track+0x20/0x40 [ 51.708300] kasan_save_free_info+0x4c/0x78 [ 51.712548] __kasan_slab_free+0x6c/0x98 [ 51.716538] kfree+0x214/0x3c8 [ 51.719647] kasan_strings+0x24c/0xb00 [ 51.723460] kunit_try_run_case+0x170/0x3f0 [ 51.727710] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.733285] kthread+0x328/0x630 [ 51.736579] ret_from_fork+0x10/0x20 [ 51.740215] [ 51.741741] The buggy address belongs to the object at ffff000093781900 [ 51.741741] which belongs to the cache kmalloc-32 of size 32 [ 51.754222] The buggy address is located 16 bytes inside of [ 51.754222] freed 32-byte region [ffff000093781900, ffff000093781920) [ 51.766441] [ 51.767974] The buggy address belongs to the physical page: [ 51.773616] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x113781 [ 51.781716] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.788329] page_type: f5(slab) [ 51.791527] raw: 0bfffe0000000000 ffff000080002780 dead000000000122 0000000000000000 [ 51.799369] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 51.807204] page dumped because: kasan: bad access detected [ 51.812846] [ 51.814368] Memory state around the buggy address: [ 51.819229] ffff000093781800: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 51.826534] ffff000093781880: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 51.833852] >ffff000093781900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 51.841164] ^ [ 51.844976] ffff000093781980: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 51.852291] ffff000093781a00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 51.859604] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen
[ 51.254304] ================================================================== [ 51.261617] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0 [ 51.267622] Read of size 1 at addr ffff000093781910 by task kunit_try_catch/357 [ 51.275020] [ 51.276552] CPU: 6 UID: 0 PID: 357 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 51.276583] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.276592] Hardware name: Thundercomm Dragonboard 845c (DT) [ 51.276603] Call trace: [ 51.276610] show_stack+0x20/0x38 (C) [ 51.276627] dump_stack_lvl+0x8c/0xd0 [ 51.276645] print_report+0x118/0x608 [ 51.276666] kasan_report+0xdc/0x128 [ 51.276684] __asan_report_load1_noabort+0x20/0x30 [ 51.276701] strlen+0xa8/0xb0 [ 51.276716] kasan_strings+0x418/0xb00 [ 51.276732] kunit_try_run_case+0x170/0x3f0 [ 51.276750] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.276770] kthread+0x328/0x630 [ 51.276783] ret_from_fork+0x10/0x20 [ 51.276800] [ 51.345009] Allocated by task 357: [ 51.348461] kasan_save_stack+0x3c/0x68 [ 51.352358] kasan_save_track+0x20/0x40 [ 51.356262] kasan_save_alloc_info+0x40/0x58 [ 51.360598] __kasan_kmalloc+0xd4/0xd8 [ 51.364413] __kmalloc_cache_noprof+0x16c/0x3c0 [ 51.369014] kasan_strings+0xc8/0xb00 [ 51.372741] kunit_try_run_case+0x170/0x3f0 [ 51.376992] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.382556] kthread+0x328/0x630 [ 51.385840] ret_from_fork+0x10/0x20 [ 51.389480] [ 51.391014] Freed by task 357: [ 51.394120] kasan_save_stack+0x3c/0x68 [ 51.398024] kasan_save_track+0x20/0x40 [ 51.401921] kasan_save_free_info+0x4c/0x78 [ 51.406165] __kasan_slab_free+0x6c/0x98 [ 51.410155] kfree+0x214/0x3c8 [ 51.413265] kasan_strings+0x24c/0xb00 [ 51.417080] kunit_try_run_case+0x170/0x3f0 [ 51.421331] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.426897] kthread+0x328/0x630 [ 51.430179] ret_from_fork+0x10/0x20 [ 51.433810] [ 51.435340] The buggy address belongs to the object at ffff000093781900 [ 51.435340] which belongs to the cache kmalloc-32 of size 32 [ 51.447820] The buggy address is located 16 bytes inside of [ 51.447820] freed 32-byte region [ffff000093781900, ffff000093781920) [ 51.460042] [ 51.461566] The buggy address belongs to the physical page: [ 51.467208] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x113781 [ 51.475307] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.481920] page_type: f5(slab) [ 51.485116] raw: 0bfffe0000000000 ffff000080002780 dead000000000122 0000000000000000 [ 51.492957] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 51.500794] page dumped because: kasan: bad access detected [ 51.506437] [ 51.507964] Memory state around the buggy address: [ 51.512818] ffff000093781800: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 51.520132] ffff000093781880: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 51.527448] >ffff000093781900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 51.534756] ^ [ 51.538568] ffff000093781980: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 51.545873] ffff000093781a00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 51.553187] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[ 49.847874] ================================================================== [ 49.858909] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 49.866496] Read of size 1 at addr ffff8000842a7b5f by task kunit_try_catch/349 [ 49.873906] [ 49.875443] CPU: 4 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 49.875473] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.875482] Hardware name: Thundercomm Dragonboard 845c (DT) [ 49.875496] Call trace: [ 49.875503] show_stack+0x20/0x38 (C) [ 49.875522] dump_stack_lvl+0x8c/0xd0 [ 49.875541] print_report+0x310/0x608 [ 49.875561] kasan_report+0xdc/0x128 [ 49.875580] __asan_report_load1_noabort+0x20/0x30 [ 49.875596] kasan_alloca_oob_left+0x2b8/0x310 [ 49.875614] kunit_try_run_case+0x170/0x3f0 [ 49.875635] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.875655] kthread+0x328/0x630 [ 49.875669] ret_from_fork+0x10/0x20 [ 49.875687] [ 49.941591] The buggy address belongs to stack of task kunit_try_catch/349 [ 49.948562] [ 49.950089] The buggy address belongs to the virtual mapping at [ 49.950089] [ffff8000842a0000, ffff8000842a9000) created by: [ 49.950089] kernel_clone+0x150/0x7a8 [ 49.965557] [ 49.967092] The buggy address belongs to the physical page: [ 49.972732] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11684a [ 49.980834] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 49.987453] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 49.995295] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 50.003132] page dumped because: kasan: bad access detected [ 50.008772] [ 50.010295] Memory state around the buggy address: [ 50.015158] ffff8000842a7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 50.022465] ffff8000842a7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 50.029781] >ffff8000842a7b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 50.037095] ^ [ 50.043269] ffff8000842a7b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 50.050578] ffff8000842a7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 50.057890] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[ 50.950266] ================================================================== [ 50.957585] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00 [ 50.964370] Read of size 1 at addr ffff000093781910 by task kunit_try_catch/357 [ 50.971776] [ 50.973302] CPU: 6 UID: 0 PID: 357 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 50.973333] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.973342] Hardware name: Thundercomm Dragonboard 845c (DT) [ 50.973352] Call trace: [ 50.973360] show_stack+0x20/0x38 (C) [ 50.973378] dump_stack_lvl+0x8c/0xd0 [ 50.973396] print_report+0x118/0x608 [ 50.973415] kasan_report+0xdc/0x128 [ 50.973434] __asan_report_load1_noabort+0x20/0x30 [ 50.973450] kasan_strings+0x95c/0xb00 [ 50.973466] kunit_try_run_case+0x170/0x3f0 [ 50.973485] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.973506] kthread+0x328/0x630 [ 50.973520] ret_from_fork+0x10/0x20 [ 50.973536] [ 51.038768] Allocated by task 357: [ 51.042222] kasan_save_stack+0x3c/0x68 [ 51.046127] kasan_save_track+0x20/0x40 [ 51.050032] kasan_save_alloc_info+0x40/0x58 [ 51.054365] __kasan_kmalloc+0xd4/0xd8 [ 51.058180] __kmalloc_cache_noprof+0x16c/0x3c0 [ 51.062778] kasan_strings+0xc8/0xb00 [ 51.066505] kunit_try_run_case+0x170/0x3f0 [ 51.070753] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.076321] kthread+0x328/0x630 [ 51.079603] ret_from_fork+0x10/0x20 [ 51.083234] [ 51.084766] Freed by task 357: [ 51.087869] kasan_save_stack+0x3c/0x68 [ 51.091772] kasan_save_track+0x20/0x40 [ 51.095675] kasan_save_free_info+0x4c/0x78 [ 51.099920] __kasan_slab_free+0x6c/0x98 [ 51.103912] kfree+0x214/0x3c8 [ 51.107024] kasan_strings+0x24c/0xb00 [ 51.110838] kunit_try_run_case+0x170/0x3f0 [ 51.115085] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.120646] kthread+0x328/0x630 [ 51.123927] ret_from_fork+0x10/0x20 [ 51.127558] [ 51.129081] The buggy address belongs to the object at ffff000093781900 [ 51.129081] which belongs to the cache kmalloc-32 of size 32 [ 51.141558] The buggy address is located 16 bytes inside of [ 51.141558] freed 32-byte region [ffff000093781900, ffff000093781920) [ 51.153779] [ 51.155309] The buggy address belongs to the physical page: [ 51.160949] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x113781 [ 51.169048] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.175659] page_type: f5(slab) [ 51.178859] raw: 0bfffe0000000000 ffff000080002780 dead000000000122 0000000000000000 [ 51.186696] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 51.194532] page dumped because: kasan: bad access detected [ 51.200179] [ 51.201713] Memory state around the buggy address: [ 51.206564] ffff000093781800: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 51.213878] ffff000093781880: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 51.221193] >ffff000093781900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 51.228507] ^ [ 51.232317] ffff000093781980: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 51.239631] ffff000093781a00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 51.246937] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
[ 50.627121] ================================================================== [ 50.651273] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 [ 50.657272] Read of size 1 at addr ffff000093781910 by task kunit_try_catch/357 [ 50.664676] [ 50.666206] CPU: 6 UID: 0 PID: 357 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 50.666237] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.666246] Hardware name: Thundercomm Dragonboard 845c (DT) [ 50.666260] Call trace: [ 50.666268] show_stack+0x20/0x38 (C) [ 50.666287] dump_stack_lvl+0x8c/0xd0 [ 50.666306] print_report+0x118/0x608 [ 50.666325] kasan_report+0xdc/0x128 [ 50.666344] __asan_report_load1_noabort+0x20/0x30 [ 50.666362] strcmp+0xc0/0xc8 [ 50.666376] kasan_strings+0x340/0xb00 [ 50.666392] kunit_try_run_case+0x170/0x3f0 [ 50.666412] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.666432] kthread+0x328/0x630 [ 50.666446] ret_from_fork+0x10/0x20 [ 50.666465] [ 50.734709] Allocated by task 357: [ 50.738164] kasan_save_stack+0x3c/0x68 [ 50.742071] kasan_save_track+0x20/0x40 [ 50.745976] kasan_save_alloc_info+0x40/0x58 [ 50.750309] __kasan_kmalloc+0xd4/0xd8 [ 50.754123] __kmalloc_cache_noprof+0x16c/0x3c0 [ 50.758724] kasan_strings+0xc8/0xb00 [ 50.762451] kunit_try_run_case+0x170/0x3f0 [ 50.766699] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.772260] kthread+0x328/0x630 [ 50.775542] ret_from_fork+0x10/0x20 [ 50.779175] [ 50.780705] Freed by task 357: [ 50.783813] kasan_save_stack+0x3c/0x68 [ 50.787716] kasan_save_track+0x20/0x40 [ 50.791619] kasan_save_free_info+0x4c/0x78 [ 50.795865] __kasan_slab_free+0x6c/0x98 [ 50.799856] kfree+0x214/0x3c8 [ 50.802968] kasan_strings+0x24c/0xb00 [ 50.806781] kunit_try_run_case+0x170/0x3f0 [ 50.811030] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.816589] kthread+0x328/0x630 [ 50.819871] ret_from_fork+0x10/0x20 [ 50.823502] [ 50.825025] The buggy address belongs to the object at ffff000093781900 [ 50.825025] which belongs to the cache kmalloc-32 of size 32 [ 50.837503] The buggy address is located 16 bytes inside of [ 50.837503] freed 32-byte region [ffff000093781900, ffff000093781920) [ 50.849722] [ 50.851253] The buggy address belongs to the physical page: [ 50.856894] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x113781 [ 50.864994] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.871604] page_type: f5(slab) [ 50.874806] raw: 0bfffe0000000000 ffff000080002780 dead000000000122 0000000000000000 [ 50.882647] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 50.890483] page dumped because: kasan: bad access detected [ 50.896120] [ 50.897643] Memory state around the buggy address: [ 50.902494] ffff000093781800: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 50.909809] ffff000093781880: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 50.917123] >ffff000093781900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 50.924435] ^ [ 50.928244] ffff000093781980: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 50.935561] ffff000093781a00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 50.942866] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[ 50.315944] ================================================================== [ 50.327074] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 50.333171] Read of size 1 at addr ffff0000829a87d8 by task kunit_try_catch/355 [ 50.340584] [ 50.342121] CPU: 3 UID: 0 PID: 355 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 50.342153] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.342164] Hardware name: Thundercomm Dragonboard 845c (DT) [ 50.342178] Call trace: [ 50.342185] show_stack+0x20/0x38 (C) [ 50.342204] dump_stack_lvl+0x8c/0xd0 [ 50.342226] print_report+0x118/0x608 [ 50.342246] kasan_report+0xdc/0x128 [ 50.342266] __asan_report_load1_noabort+0x20/0x30 [ 50.342287] memcmp+0x198/0x1d8 [ 50.342304] kasan_memcmp+0x16c/0x300 [ 50.342323] kunit_try_run_case+0x170/0x3f0 [ 50.342344] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.342368] kthread+0x328/0x630 [ 50.342383] ret_from_fork+0x10/0x20 [ 50.342401] [ 50.410771] Allocated by task 355: [ 50.414239] kasan_save_stack+0x3c/0x68 [ 50.418150] kasan_save_track+0x20/0x40 [ 50.422065] kasan_save_alloc_info+0x40/0x58 [ 50.426402] __kasan_kmalloc+0xd4/0xd8 [ 50.430217] __kmalloc_cache_noprof+0x16c/0x3c0 [ 50.434832] kasan_memcmp+0xbc/0x300 [ 50.438472] kunit_try_run_case+0x170/0x3f0 [ 50.442727] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.448297] kthread+0x328/0x630 [ 50.451582] ret_from_fork+0x10/0x20 [ 50.455224] [ 50.456758] The buggy address belongs to the object at ffff0000829a87c0 [ 50.456758] which belongs to the cache kmalloc-32 of size 32 [ 50.469253] The buggy address is located 0 bytes to the right of [ 50.469253] allocated 24-byte region [ffff0000829a87c0, ffff0000829a87d8) [ 50.482265] [ 50.483804] The buggy address belongs to the physical page: [ 50.489452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029a8 [ 50.497557] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.504182] page_type: f5(slab) [ 50.507383] raw: 0bfffe0000000000 ffff000080002780 dead000000000122 0000000000000000 [ 50.515231] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 50.523074] page dumped because: kasan: bad access detected [ 50.528720] [ 50.530250] Memory state around the buggy address: [ 50.535117] ffff0000829a8680: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 50.542432] ffff0000829a8700: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 50.549758] >ffff0000829a8780: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 50.557071] ^ [ 50.563253] ffff0000829a8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.570567] ffff0000829a8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.577888] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[ 50.069082] ================================================================== [ 50.080645] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340 [ 50.088320] Read of size 1 at addr ffff8000842c7b4a by task kunit_try_catch/351 [ 50.095735] [ 50.097266] CPU: 3 UID: 0 PID: 351 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 50.097297] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.097307] Hardware name: Thundercomm Dragonboard 845c (DT) [ 50.097320] Call trace: [ 50.097327] show_stack+0x20/0x38 (C) [ 50.097346] dump_stack_lvl+0x8c/0xd0 [ 50.097368] print_report+0x310/0x608 [ 50.097389] kasan_report+0xdc/0x128 [ 50.097409] __asan_report_load1_noabort+0x20/0x30 [ 50.097427] kasan_alloca_oob_right+0x2dc/0x340 [ 50.097447] kunit_try_run_case+0x170/0x3f0 [ 50.097467] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.097492] kthread+0x328/0x630 [ 50.097507] ret_from_fork+0x10/0x20 [ 50.097526] [ 50.163593] The buggy address belongs to stack of task kunit_try_catch/351 [ 50.170570] [ 50.172108] The buggy address belongs to the virtual mapping at [ 50.172108] [ffff8000842c0000, ffff8000842c9000) created by: [ 50.172108] kernel_clone+0x150/0x7a8 [ 50.187585] [ 50.189113] The buggy address belongs to the physical page: [ 50.194760] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11685e [ 50.202870] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.209496] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 50.217339] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 50.225180] page dumped because: kasan: bad access detected [ 50.230831] [ 50.232363] Memory state around the buggy address: [ 50.237226] ffff8000842c7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 50.244549] ffff8000842c7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 50.251873] >ffff8000842c7b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 50.259187] ^ [ 50.264838] ffff8000842c7b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 50.272163] ffff8000842c7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 50.279479] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 49.597726] ================================================================== [ 49.612970] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 49.619945] Read of size 1 at addr ffff800084287c2a by task kunit_try_catch/347 [ 49.627361] [ 49.628896] CPU: 3 UID: 0 PID: 347 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 49.628928] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.628938] Hardware name: Thundercomm Dragonboard 845c (DT) [ 49.628950] Call trace: [ 49.628959] show_stack+0x20/0x38 (C) [ 49.628980] dump_stack_lvl+0x8c/0xd0 [ 49.629002] print_report+0x310/0x608 [ 49.629022] kasan_report+0xdc/0x128 [ 49.629042] __asan_report_load1_noabort+0x20/0x30 [ 49.629062] kasan_stack_oob+0x238/0x270 [ 49.629081] kunit_try_run_case+0x170/0x3f0 [ 49.629101] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.629126] kthread+0x328/0x630 [ 49.629142] ret_from_fork+0x10/0x20 [ 49.629160] [ 49.694597] The buggy address belongs to stack of task kunit_try_catch/347 [ 49.701566] and is located at offset 138 in frame: [ 49.706510] kasan_stack_oob+0x0/0x270 [ 49.710332] [ 49.711862] This frame has 4 objects: [ 49.715592] [48, 49) '__assertion' [ 49.715607] [64, 72) 'array' [ 49.719160] [96, 112) '__assertion' [ 49.722188] [128, 138) 'stack_array' [ 49.725827] [ 49.731070] The buggy address belongs to the virtual mapping at [ 49.731070] [ffff800084280000, ffff800084289000) created by: [ 49.731070] kernel_clone+0x150/0x7a8 [ 49.746553] [ 49.748087] The buggy address belongs to the physical page: [ 49.753733] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x116835 [ 49.761841] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 49.768472] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 49.776321] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 49.784165] page dumped because: kasan: bad access detected [ 49.789811] [ 49.791341] Memory state around the buggy address: [ 49.796201] ffff800084287b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 49.803516] ffff800084287b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 49.810832] >ffff800084287c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 49.818145] ^ [ 49.822746] ffff800084287c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 [ 49.830063] ffff800084287d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 49.837377] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 49.367750] ================================================================== [ 49.380462] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 49.388141] Read of size 1 at addr ffffae1d640c668d by task kunit_try_catch/343 [ 49.395553] [ 49.397087] CPU: 3 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 49.397120] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.397130] Hardware name: Thundercomm Dragonboard 845c (DT) [ 49.397148] Call trace: [ 49.397156] show_stack+0x20/0x38 (C) [ 49.397176] dump_stack_lvl+0x8c/0xd0 [ 49.397198] print_report+0x310/0x608 [ 49.397219] kasan_report+0xdc/0x128 [ 49.397240] __asan_report_load1_noabort+0x20/0x30 [ 49.397259] kasan_global_oob_right+0x230/0x270 [ 49.397279] kunit_try_run_case+0x170/0x3f0 [ 49.397302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.397326] kthread+0x328/0x630 [ 49.397345] ret_from_fork+0x10/0x20 [ 49.397366] [ 49.463436] The buggy address belongs to the variable: [ 49.468651] global_array+0xd/0x40 [ 49.472125] [ 49.473673] The buggy address belongs to the virtual mapping at [ 49.473673] [ffffae1d62260000, ffffae1d64181000) created by: [ 49.473673] paging_init+0x66c/0x7d0 [ 49.489068] [ 49.490604] The buggy address belongs to the physical page: [ 49.496260] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa7ac6 [ 49.504281] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 49.511696] raw: 03fffe0000002000 fffffdffc09eb188 fffffdffc09eb188 0000000000000000 [ 49.519545] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 49.527385] page dumped because: kasan: bad access detected [ 49.533032] [ 49.534562] Memory state around the buggy address: [ 49.539425] ffffae1d640c6580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 49.546739] ffffae1d640c6600: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9 [ 49.554066] >ffffae1d640c6680: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 [ 49.561389] ^ [ 49.564934] ffffae1d640c6700: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 [ 49.572257] ffffae1d640c6780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 49.579572] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 48.780915] ================================================================== [ 48.793265] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 48.801380] Free of addr ffff000080df5e01 by task kunit_try_catch/339 [ 48.807906] [ 48.809447] CPU: 2 UID: 0 PID: 339 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 48.809482] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.809493] Hardware name: Thundercomm Dragonboard 845c (DT) [ 48.809509] Call trace: [ 48.809518] show_stack+0x20/0x38 (C) [ 48.809540] dump_stack_lvl+0x8c/0xd0 [ 48.809561] print_report+0x118/0x608 [ 48.809582] kasan_report_invalid_free+0xc0/0xe8 [ 48.809606] check_slab_allocation+0xfc/0x108 [ 48.809627] __kasan_mempool_poison_object+0x78/0x150 [ 48.809650] mempool_free+0x28c/0x328 [ 48.809671] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 48.809692] mempool_kmalloc_invalid_free+0xc0/0x118 [ 48.809712] kunit_try_run_case+0x170/0x3f0 [ 48.809734] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.809756] kthread+0x328/0x630 [ 48.809774] ret_from_fork+0x10/0x20 [ 48.809795] [ 48.891443] Allocated by task 339: [ 48.894913] kasan_save_stack+0x3c/0x68 [ 48.898821] kasan_save_track+0x20/0x40 [ 48.902727] kasan_save_alloc_info+0x40/0x58 [ 48.907073] __kasan_mempool_unpoison_object+0x11c/0x180 [ 48.912472] remove_element+0x130/0x1f8 [ 48.916376] mempool_alloc_preallocated+0x58/0xc0 [ 48.921155] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 48.926810] mempool_kmalloc_invalid_free+0xc0/0x118 [ 48.931862] kunit_try_run_case+0x170/0x3f0 [ 48.936123] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.941694] kthread+0x328/0x630 [ 48.944981] ret_from_fork+0x10/0x20 [ 48.948626] [ 48.950158] The buggy address belongs to the object at ffff000080df5e00 [ 48.950158] which belongs to the cache kmalloc-128 of size 128 [ 48.962824] The buggy address is located 1 bytes inside of [ 48.962824] 128-byte region [ffff000080df5e00, ffff000080df5e80) [ 48.974528] [ 48.976062] The buggy address belongs to the physical page: [ 48.981710] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100df4 [ 48.989818] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 48.997579] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 49.004639] page_type: f5(slab) [ 49.007844] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 49.015692] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.023543] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 49.031478] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.039413] head: 0bfffe0000000001 fffffdffc2037d01 00000000ffffffff 00000000ffffffff [ 49.047347] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 49.055277] page dumped because: kasan: bad access detected [ 49.060925] [ 49.062456] Memory state around the buggy address: [ 49.067317] ffff000080df5d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 49.074633] ffff000080df5d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.081951] >ffff000080df5e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 49.089265] ^ [ 49.092550] ffff000080df5e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.099867] ffff000080df5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 49.107182] ================================================================== [ 49.118583] ================================================================== [ 49.130764] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 49.138872] Free of addr ffff000095610001 by task kunit_try_catch/341 [ 49.145397] [ 49.146931] CPU: 4 UID: 0 PID: 341 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 49.146962] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.146971] Hardware name: Thundercomm Dragonboard 845c (DT) [ 49.146982] Call trace: [ 49.146989] show_stack+0x20/0x38 (C) [ 49.147008] dump_stack_lvl+0x8c/0xd0 [ 49.147028] print_report+0x118/0x608 [ 49.147046] kasan_report_invalid_free+0xc0/0xe8 [ 49.147067] __kasan_mempool_poison_object+0xfc/0x150 [ 49.147088] mempool_free+0x28c/0x328 [ 49.147103] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 49.147123] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 49.147141] kunit_try_run_case+0x170/0x3f0 [ 49.147159] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.147180] kthread+0x328/0x630 [ 49.147193] ret_from_fork+0x10/0x20 [ 49.147212] [ 49.224937] The buggy address belongs to the physical page: [ 49.230578] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x115610 [ 49.238689] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 49.246437] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 49.253493] page_type: f8(unknown) [ 49.256961] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 49.264798] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 49.272634] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 49.280555] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 49.288487] head: 0bfffe0000000002 fffffdffc2558401 00000000ffffffff 00000000ffffffff [ 49.296410] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 49.304326] page dumped because: kasan: bad access detected [ 49.309967] [ 49.311495] Memory state around the buggy address: [ 49.316357] ffff00009560ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.323667] ffff00009560ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.330973] >ffff000095610000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 49.338283] ^ [ 49.341561] ffff000095610080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 49.348873] ffff000095610100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 49.356181] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 48.576619] ================================================================== [ 48.589243] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 48.596482] Free of addr ffff000095610000 by task kunit_try_catch/337 [ 48.603010] [ 48.604551] CPU: 4 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 48.604586] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.604596] Hardware name: Thundercomm Dragonboard 845c (DT) [ 48.604612] Call trace: [ 48.604620] show_stack+0x20/0x38 (C) [ 48.604640] dump_stack_lvl+0x8c/0xd0 [ 48.604661] print_report+0x118/0x608 [ 48.604681] kasan_report_invalid_free+0xc0/0xe8 [ 48.604703] __kasan_mempool_poison_pages+0xe0/0xe8 [ 48.604723] mempool_free+0x24c/0x328 [ 48.604741] mempool_double_free_helper+0x150/0x2e8 [ 48.604759] mempool_page_alloc_double_free+0xbc/0x118 [ 48.604779] kunit_try_run_case+0x170/0x3f0 [ 48.604798] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.604819] kthread+0x328/0x630 [ 48.604833] ret_from_fork+0x10/0x20 [ 48.604853] [ 48.681270] The buggy address belongs to the physical page: [ 48.686916] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x115610 [ 48.695019] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.701640] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 48.709481] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 48.717317] page dumped because: kasan: bad access detected [ 48.722958] [ 48.724488] Memory state around the buggy address: [ 48.729342] ffff00009560ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.736657] ffff00009560ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.743973] >ffff000095610000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 48.751286] ^ [ 48.754566] ffff000095610080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 48.761880] ffff000095610100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 48.769193] ================================================================== [ 47.942736] ================================================================== [ 47.954401] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 47.961645] Free of addr ffff000080f19400 by task kunit_try_catch/333 [ 47.968170] [ 47.969715] CPU: 4 UID: 0 PID: 333 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 47.969750] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.969761] Hardware name: Thundercomm Dragonboard 845c (DT) [ 47.969776] Call trace: [ 47.969784] show_stack+0x20/0x38 (C) [ 47.969805] dump_stack_lvl+0x8c/0xd0 [ 47.969828] print_report+0x118/0x608 [ 47.969850] kasan_report_invalid_free+0xc0/0xe8 [ 47.969872] check_slab_allocation+0xd4/0x108 [ 47.969891] __kasan_mempool_poison_object+0x78/0x150 [ 47.969913] mempool_free+0x28c/0x328 [ 47.969931] mempool_double_free_helper+0x150/0x2e8 [ 47.969949] mempool_kmalloc_double_free+0xc0/0x118 [ 47.969969] kunit_try_run_case+0x170/0x3f0 [ 47.969989] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.970011] kthread+0x328/0x630 [ 47.970026] ret_from_fork+0x10/0x20 [ 47.970045] [ 48.050749] Allocated by task 333: [ 48.054213] kasan_save_stack+0x3c/0x68 [ 48.058118] kasan_save_track+0x20/0x40 [ 48.062024] kasan_save_alloc_info+0x40/0x58 [ 48.066358] __kasan_mempool_unpoison_object+0x11c/0x180 [ 48.071744] remove_element+0x130/0x1f8 [ 48.075645] mempool_alloc_preallocated+0x58/0xc0 [ 48.080414] mempool_double_free_helper+0x94/0x2e8 [ 48.085272] mempool_kmalloc_double_free+0xc0/0x118 [ 48.090224] kunit_try_run_case+0x170/0x3f0 [ 48.094471] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.100042] kthread+0x328/0x630 [ 48.103324] ret_from_fork+0x10/0x20 [ 48.106957] [ 48.108486] Freed by task 333: [ 48.111591] kasan_save_stack+0x3c/0x68 [ 48.115495] kasan_save_track+0x20/0x40 [ 48.119398] kasan_save_free_info+0x4c/0x78 [ 48.123642] __kasan_mempool_poison_object+0xc0/0x150 [ 48.128775] mempool_free+0x28c/0x328 [ 48.132501] mempool_double_free_helper+0x100/0x2e8 [ 48.137454] mempool_kmalloc_double_free+0xc0/0x118 [ 48.142408] kunit_try_run_case+0x170/0x3f0 [ 48.146656] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.152224] kthread+0x328/0x630 [ 48.155505] ret_from_fork+0x10/0x20 [ 48.159138] [ 48.160670] The buggy address belongs to the object at ffff000080f19400 [ 48.160670] which belongs to the cache kmalloc-128 of size 128 [ 48.173330] The buggy address is located 0 bytes inside of [ 48.173330] 128-byte region [ffff000080f19400, ffff000080f19480) [ 48.185025] [ 48.186551] The buggy address belongs to the physical page: [ 48.192200] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100f18 [ 48.200300] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 48.208050] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 48.215101] page_type: f5(slab) [ 48.218303] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 48.226141] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.233979] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 48.241903] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.249825] head: 0bfffe0000000001 fffffdffc203c601 00000000ffffffff 00000000ffffffff [ 48.257747] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 48.265666] page dumped because: kasan: bad access detected [ 48.271315] [ 48.272847] Memory state around the buggy address: [ 48.277710] ffff000080f19300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 48.285022] ffff000080f19380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.292335] >ffff000080f19400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 48.299645] ^ [ 48.302930] ffff000080f19480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.310241] ffff000080f19500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 48.317552] ================================================================== [ 48.328933] ================================================================== [ 48.341027] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 48.348267] Free of addr ffff000095654000 by task kunit_try_catch/335 [ 48.354795] [ 48.356333] CPU: 6 UID: 0 PID: 335 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 48.356367] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.356376] Hardware name: Thundercomm Dragonboard 845c (DT) [ 48.356393] Call trace: [ 48.356401] show_stack+0x20/0x38 (C) [ 48.356422] dump_stack_lvl+0x8c/0xd0 [ 48.356444] print_report+0x118/0x608 [ 48.356462] kasan_report_invalid_free+0xc0/0xe8 [ 48.356484] __kasan_mempool_poison_object+0x14c/0x150 [ 48.356504] mempool_free+0x28c/0x328 [ 48.356522] mempool_double_free_helper+0x150/0x2e8 [ 48.356540] mempool_kmalloc_large_double_free+0xc0/0x118 [ 48.356559] kunit_try_run_case+0x170/0x3f0 [ 48.356579] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.356600] kthread+0x328/0x630 [ 48.356615] ret_from_fork+0x10/0x20 [ 48.356635] [ 48.433563] The buggy address belongs to the physical page: [ 48.439204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x115654 [ 48.447313] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 48.455062] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 48.462110] page_type: f8(unknown) [ 48.465579] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 48.473413] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 48.481256] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 48.489186] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 48.497117] head: 0bfffe0000000002 fffffdffc2559501 00000000ffffffff 00000000ffffffff [ 48.505047] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 48.512964] page dumped because: kasan: bad access detected [ 48.518604] [ 48.520130] Memory state around the buggy address: [ 48.524994] ffff000095653f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 48.532304] ffff000095653f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 48.539614] >ffff000095654000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 48.546929] ^ [ 48.550208] ffff000095654080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 48.557519] ffff000095654100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 48.564827] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 47.159853] ================================================================== [ 47.171259] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 47.178065] Read of size 1 at addr ffff0000967e8000 by task kunit_try_catch/327 [ 47.185476] [ 47.187015] CPU: 1 UID: 0 PID: 327 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 47.187051] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.187060] Hardware name: Thundercomm Dragonboard 845c (DT) [ 47.187073] Call trace: [ 47.187081] show_stack+0x20/0x38 (C) [ 47.187104] dump_stack_lvl+0x8c/0xd0 [ 47.187128] print_report+0x118/0x608 [ 47.187149] kasan_report+0xdc/0x128 [ 47.187169] __asan_report_load1_noabort+0x20/0x30 [ 47.187191] mempool_uaf_helper+0x314/0x340 [ 47.187211] mempool_kmalloc_large_uaf+0xc4/0x120 [ 47.187231] kunit_try_run_case+0x170/0x3f0 [ 47.187254] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.187277] kthread+0x328/0x630 [ 47.187295] ret_from_fork+0x10/0x20 [ 47.187319] [ 47.257772] The buggy address belongs to the physical page: [ 47.263423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1167e8 [ 47.271538] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 47.279294] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 47.286356] page_type: f8(unknown) [ 47.289824] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 47.297669] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 47.305514] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 47.313444] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 47.321374] head: 0bfffe0000000002 fffffdffc259fa01 00000000ffffffff 00000000ffffffff [ 47.329305] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 47.337230] page dumped because: kasan: bad access detected [ 47.342880] [ 47.344412] Memory state around the buggy address: [ 47.349281] ffff0000967e7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 47.356603] ffff0000967e7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 47.363926] >ffff0000967e8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 47.371239] ^ [ 47.374531] ffff0000967e8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 47.381852] ffff0000967e8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 47.389173] ================================================================== [ 47.746102] ================================================================== [ 47.757255] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 47.764069] Read of size 1 at addr ffff000095654000 by task kunit_try_catch/331 [ 47.771475] [ 47.773018] CPU: 6 UID: 0 PID: 331 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 47.773056] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.773067] Hardware name: Thundercomm Dragonboard 845c (DT) [ 47.773081] Call trace: [ 47.773091] show_stack+0x20/0x38 (C) [ 47.773113] dump_stack_lvl+0x8c/0xd0 [ 47.773136] print_report+0x118/0x608 [ 47.773157] kasan_report+0xdc/0x128 [ 47.773175] __asan_report_load1_noabort+0x20/0x30 [ 47.773193] mempool_uaf_helper+0x314/0x340 [ 47.773210] mempool_page_alloc_uaf+0xc0/0x118 [ 47.773231] kunit_try_run_case+0x170/0x3f0 [ 47.773251] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.773273] kthread+0x328/0x630 [ 47.773288] ret_from_fork+0x10/0x20 [ 47.773308] [ 47.843473] The buggy address belongs to the physical page: [ 47.849116] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x115654 [ 47.857227] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.863852] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 47.871697] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 47.879530] page dumped because: kasan: bad access detected [ 47.885170] [ 47.886693] Memory state around the buggy address: [ 47.891550] ffff000095653f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 47.898857] ffff000095653f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 47.906169] >ffff000095654000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 47.913476] ^ [ 47.916755] ffff000095654080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 47.924062] ffff000095654100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 47.931373] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 47.401141] ================================================================== [ 47.413056] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 47.420294] Read of size 1 at addr ffff0000875de240 by task kunit_try_catch/329 [ 47.427699] [ 47.429233] CPU: 4 UID: 0 PID: 329 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 47.429271] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.429279] Hardware name: Thundercomm Dragonboard 845c (DT) [ 47.429294] Call trace: [ 47.429304] show_stack+0x20/0x38 (C) [ 47.429324] dump_stack_lvl+0x8c/0xd0 [ 47.429347] print_report+0x118/0x608 [ 47.429367] kasan_report+0xdc/0x128 [ 47.429384] __asan_report_load1_noabort+0x20/0x30 [ 47.429402] mempool_uaf_helper+0x314/0x340 [ 47.429418] mempool_slab_uaf+0xc0/0x118 [ 47.429437] kunit_try_run_case+0x170/0x3f0 [ 47.429458] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.429479] kthread+0x328/0x630 [ 47.429495] ret_from_fork+0x10/0x20 [ 47.429514] [ 47.499155] Allocated by task 329: [ 47.502610] kasan_save_stack+0x3c/0x68 [ 47.506517] kasan_save_track+0x20/0x40 [ 47.510421] kasan_save_alloc_info+0x40/0x58 [ 47.514754] __kasan_mempool_unpoison_object+0xbc/0x180 [ 47.520053] remove_element+0x16c/0x1f8 [ 47.523956] mempool_alloc_preallocated+0x58/0xc0 [ 47.528736] mempool_uaf_helper+0xa4/0x340 [ 47.532896] mempool_slab_uaf+0xc0/0x118 [ 47.536884] kunit_try_run_case+0x170/0x3f0 [ 47.541132] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.546694] kthread+0x328/0x630 [ 47.549975] ret_from_fork+0x10/0x20 [ 47.553615] [ 47.555148] Freed by task 329: [ 47.558253] kasan_save_stack+0x3c/0x68 [ 47.562156] kasan_save_track+0x20/0x40 [ 47.566058] kasan_save_free_info+0x4c/0x78 [ 47.570304] __kasan_mempool_poison_object+0xc0/0x150 [ 47.575430] mempool_free+0x28c/0x328 [ 47.579148] mempool_uaf_helper+0x104/0x340 [ 47.583392] mempool_slab_uaf+0xc0/0x118 [ 47.587380] kunit_try_run_case+0x170/0x3f0 [ 47.591626] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.597189] kthread+0x328/0x630 [ 47.600471] ret_from_fork+0x10/0x20 [ 47.604111] [ 47.605634] The buggy address belongs to the object at ffff0000875de240 [ 47.605634] which belongs to the cache test_cache of size 123 [ 47.618198] The buggy address is located 0 bytes inside of [ 47.618198] freed 123-byte region [ffff0000875de240, ffff0000875de2bb) [ 47.630417] [ 47.631947] The buggy address belongs to the physical page: [ 47.637591] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1075de [ 47.645700] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.652311] page_type: f5(slab) [ 47.655509] raw: 0bfffe0000000000 ffff000083322000 dead000000000122 0000000000000000 [ 47.663349] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 47.671183] page dumped because: kasan: bad access detected [ 47.676821] [ 47.678344] Memory state around the buggy address: [ 47.683204] ffff0000875de100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.690518] ffff0000875de180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 47.697830] >ffff0000875de200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 47.705140] ^ [ 47.710522] ffff0000875de280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.717836] ffff0000875de300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.725146] ================================================================== [ 46.784775] ================================================================== [ 46.796457] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 46.803707] Read of size 1 at addr ffff000080dc0700 by task kunit_try_catch/325 [ 46.811118] [ 46.812658] CPU: 1 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 46.812698] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.812710] Hardware name: Thundercomm Dragonboard 845c (DT) [ 46.812726] Call trace: [ 46.812735] show_stack+0x20/0x38 (C) [ 46.812760] dump_stack_lvl+0x8c/0xd0 [ 46.812784] print_report+0x118/0x608 [ 46.812806] kasan_report+0xdc/0x128 [ 46.812826] __asan_report_load1_noabort+0x20/0x30 [ 46.812848] mempool_uaf_helper+0x314/0x340 [ 46.812868] mempool_kmalloc_uaf+0xc4/0x120 [ 46.812886] kunit_try_run_case+0x170/0x3f0 [ 46.812911] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.812937] kthread+0x328/0x630 [ 46.812957] ret_from_fork+0x10/0x20 [ 46.812979] [ 46.882910] Allocated by task 325: [ 46.886373] kasan_save_stack+0x3c/0x68 [ 46.890283] kasan_save_track+0x20/0x40 [ 46.894191] kasan_save_alloc_info+0x40/0x58 [ 46.898528] __kasan_mempool_unpoison_object+0x11c/0x180 [ 46.903923] remove_element+0x130/0x1f8 [ 46.907837] mempool_alloc_preallocated+0x58/0xc0 [ 46.912616] mempool_uaf_helper+0xa4/0x340 [ 46.916785] mempool_kmalloc_uaf+0xc4/0x120 [ 46.921039] kunit_try_run_case+0x170/0x3f0 [ 46.925294] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.930867] kthread+0x328/0x630 [ 46.934158] ret_from_fork+0x10/0x20 [ 46.937807] [ 46.939334] Freed by task 325: [ 46.942449] kasan_save_stack+0x3c/0x68 [ 46.946357] kasan_save_track+0x20/0x40 [ 46.950268] kasan_save_free_info+0x4c/0x78 [ 46.954520] __kasan_mempool_poison_object+0xc0/0x150 [ 46.959659] mempool_free+0x28c/0x328 [ 46.963382] mempool_uaf_helper+0x104/0x340 [ 46.967632] mempool_kmalloc_uaf+0xc4/0x120 [ 46.971884] kunit_try_run_case+0x170/0x3f0 [ 46.976135] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.981709] kthread+0x328/0x630 [ 46.984999] ret_from_fork+0x10/0x20 [ 46.988637] [ 46.990168] The buggy address belongs to the object at ffff000080dc0700 [ 46.990168] which belongs to the cache kmalloc-128 of size 128 [ 47.002830] The buggy address is located 0 bytes inside of [ 47.002830] freed 128-byte region [ffff000080dc0700, ffff000080dc0780) [ 47.015050] [ 47.016589] The buggy address belongs to the physical page: [ 47.022242] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100dc0 [ 47.030358] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 47.038117] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 47.045179] page_type: f5(slab) [ 47.048389] raw: 0bfffe0000000040 ffff000080002a00 dead000000000100 dead000000000122 [ 47.056234] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.064079] head: 0bfffe0000000040 ffff000080002a00 dead000000000100 dead000000000122 [ 47.072011] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.079939] head: 0bfffe0000000001 fffffdffc2037001 00000000ffffffff 00000000ffffffff [ 47.087869] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 47.095795] page dumped because: kasan: bad access detected [ 47.101443] [ 47.102972] Memory state around the buggy address: [ 47.107831] ffff000080dc0600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 47.115146] ffff000080dc0680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.122471] >ffff000080dc0700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 47.129791] ^ [ 47.133079] ffff000080dc0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.140403] ffff000080dc0800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 47.147715] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 46.485348] ================================================================== [ 46.497787] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 46.505466] Read of size 1 at addr ffff0000875a32bb by task kunit_try_catch/323 [ 46.512880] [ 46.514419] CPU: 2 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 46.514450] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.514459] Hardware name: Thundercomm Dragonboard 845c (DT) [ 46.514470] Call trace: [ 46.514478] show_stack+0x20/0x38 (C) [ 46.514498] dump_stack_lvl+0x8c/0xd0 [ 46.514521] print_report+0x118/0x608 [ 46.514542] kasan_report+0xdc/0x128 [ 46.514562] __asan_report_load1_noabort+0x20/0x30 [ 46.514579] mempool_oob_right_helper+0x2ac/0x2f0 [ 46.514599] mempool_slab_oob_right+0xc0/0x118 [ 46.514620] kunit_try_run_case+0x170/0x3f0 [ 46.514642] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.514665] kthread+0x328/0x630 [ 46.514680] ret_from_fork+0x10/0x20 [ 46.514700] [ 46.585419] Allocated by task 323: [ 46.588888] kasan_save_stack+0x3c/0x68 [ 46.592794] kasan_save_track+0x20/0x40 [ 46.596700] kasan_save_alloc_info+0x40/0x58 [ 46.601045] __kasan_mempool_unpoison_object+0xbc/0x180 [ 46.606357] remove_element+0x16c/0x1f8 [ 46.610264] mempool_alloc_preallocated+0x58/0xc0 [ 46.615044] mempool_oob_right_helper+0x98/0x2f0 [ 46.619738] mempool_slab_oob_right+0xc0/0x118 [ 46.624259] kunit_try_run_case+0x170/0x3f0 [ 46.628519] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.634088] kthread+0x328/0x630 [ 46.637375] ret_from_fork+0x10/0x20 [ 46.641019] [ 46.642551] The buggy address belongs to the object at ffff0000875a3240 [ 46.642551] which belongs to the cache test_cache of size 123 [ 46.655129] The buggy address is located 0 bytes to the right of [ 46.655129] allocated 123-byte region [ffff0000875a3240, ffff0000875a32bb) [ 46.668235] [ 46.669766] The buggy address belongs to the physical page: [ 46.675412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1075a3 [ 46.683517] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.690134] page_type: f5(slab) [ 46.693336] raw: 0bfffe0000000000 ffff000080e24280 dead000000000122 0000000000000000 [ 46.701184] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 46.709027] page dumped because: kasan: bad access detected [ 46.714673] [ 46.716204] Memory state around the buggy address: [ 46.721064] ffff0000875a3180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 46.728379] ffff0000875a3200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 46.735694] >ffff0000875a3280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 46.743005] ^ [ 46.748136] ffff0000875a3300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.755452] ffff0000875a3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.762766] ================================================================== [ 46.241737] ================================================================== [ 46.253661] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 46.261341] Read of size 1 at addr ffff0000967ea001 by task kunit_try_catch/321 [ 46.268753] [ 46.270292] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 46.270325] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.270335] Hardware name: Thundercomm Dragonboard 845c (DT) [ 46.270350] Call trace: [ 46.270359] show_stack+0x20/0x38 (C) [ 46.270380] dump_stack_lvl+0x8c/0xd0 [ 46.270401] print_report+0x118/0x608 [ 46.270422] kasan_report+0xdc/0x128 [ 46.270442] __asan_report_load1_noabort+0x20/0x30 [ 46.270461] mempool_oob_right_helper+0x2ac/0x2f0 [ 46.270481] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 46.270501] kunit_try_run_case+0x170/0x3f0 [ 46.270523] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.270547] kthread+0x328/0x630 [ 46.270565] ret_from_fork+0x10/0x20 [ 46.270584] [ 46.342104] The buggy address belongs to the physical page: [ 46.347752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1167e8 [ 46.355866] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 46.363625] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 46.370687] page_type: f8(unknown) [ 46.374155] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 46.382002] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 46.389847] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 46.397780] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 46.405713] head: 0bfffe0000000002 fffffdffc259fa01 00000000ffffffff 00000000ffffffff [ 46.413644] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 46.421570] page dumped because: kasan: bad access detected [ 46.427217] [ 46.428745] Memory state around the buggy address: [ 46.433611] ffff0000967e9f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 46.440934] ffff0000967e9f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 46.448248] >ffff0000967ea000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 46.455562] ^ [ 46.458842] ffff0000967ea080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 46.466166] ffff0000967ea100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 46.473488] ================================================================== [ 45.912743] ================================================================== [ 45.923800] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 45.931486] Read of size 1 at addr ffff000094709b73 by task kunit_try_catch/319 [ 45.938887] [ 45.940428] CPU: 5 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 45.940464] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.940472] Hardware name: Thundercomm Dragonboard 845c (DT) [ 45.940489] Call trace: [ 45.940497] show_stack+0x20/0x38 (C) [ 45.940520] dump_stack_lvl+0x8c/0xd0 [ 45.940541] print_report+0x118/0x608 [ 45.940562] kasan_report+0xdc/0x128 [ 45.940580] __asan_report_load1_noabort+0x20/0x30 [ 45.940598] mempool_oob_right_helper+0x2ac/0x2f0 [ 45.940615] mempool_kmalloc_oob_right+0xc4/0x120 [ 45.940633] kunit_try_run_case+0x170/0x3f0 [ 45.940705] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.940726] kthread+0x328/0x630 [ 45.940741] ret_from_fork+0x10/0x20 [ 45.940759] [ 46.011698] Allocated by task 319: [ 46.015156] kasan_save_stack+0x3c/0x68 [ 46.019053] kasan_save_track+0x20/0x40 [ 46.022958] kasan_save_alloc_info+0x40/0x58 [ 46.027291] __kasan_mempool_unpoison_object+0x11c/0x180 [ 46.032683] remove_element+0x130/0x1f8 [ 46.036586] mempool_alloc_preallocated+0x58/0xc0 [ 46.041358] mempool_oob_right_helper+0x98/0x2f0 [ 46.046043] mempool_kmalloc_oob_right+0xc4/0x120 [ 46.050816] kunit_try_run_case+0x170/0x3f0 [ 46.055063] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.060624] kthread+0x328/0x630 [ 46.063907] ret_from_fork+0x10/0x20 [ 46.067549] [ 46.069074] The buggy address belongs to the object at ffff000094709b00 [ 46.069074] which belongs to the cache kmalloc-128 of size 128 [ 46.081728] The buggy address is located 0 bytes to the right of [ 46.081728] allocated 115-byte region [ffff000094709b00, ffff000094709b73) [ 46.094818] [ 46.096352] The buggy address belongs to the physical page: [ 46.101994] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x114708 [ 46.110097] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 46.117850] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 46.124903] page_type: f5(slab) [ 46.128106] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 46.135947] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 46.143786] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 46.151710] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 46.159632] head: 0bfffe0000000001 fffffdffc251c201 00000000ffffffff 00000000ffffffff [ 46.167556] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 46.175478] page dumped because: kasan: bad access detected [ 46.181120] [ 46.182643] Memory state around the buggy address: [ 46.187503] ffff000094709a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 46.194812] ffff000094709a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.202127] >ffff000094709b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 46.209438] ^ [ 46.216393] ffff000094709b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.223707] ffff000094709c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 46.231012] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 44.966390] ================================================================== [ 44.977755] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300 [ 44.985620] Read of size 1 at addr ffff000083320280 by task kunit_try_catch/313 [ 44.993026] [ 44.994568] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 44.994605] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.994614] Hardware name: Thundercomm Dragonboard 845c (DT) [ 44.994631] Call trace: [ 44.994639] show_stack+0x20/0x38 (C) [ 44.994662] dump_stack_lvl+0x8c/0xd0 [ 44.994686] print_report+0x118/0x608 [ 44.994709] kasan_report+0xdc/0x128 [ 44.994728] __kasan_check_byte+0x54/0x70 [ 44.994750] kmem_cache_destroy+0x34/0x218 [ 44.994773] kmem_cache_double_destroy+0x174/0x300 [ 44.994791] kunit_try_run_case+0x170/0x3f0 [ 44.994815] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.994838] kthread+0x328/0x630 [ 44.994858] ret_from_fork+0x10/0x20 [ 44.994879] [ 45.064534] Allocated by task 313: [ 45.067998] kasan_save_stack+0x3c/0x68 [ 45.071912] kasan_save_track+0x20/0x40 [ 45.075824] kasan_save_alloc_info+0x40/0x58 [ 45.080164] __kasan_slab_alloc+0xa8/0xb0 [ 45.084247] kmem_cache_alloc_noprof+0x10c/0x398 [ 45.088952] __kmem_cache_create_args+0x178/0x280 [ 45.093737] kmem_cache_double_destroy+0xc0/0x300 [ 45.098522] kunit_try_run_case+0x170/0x3f0 [ 45.102780] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.108348] kthread+0x328/0x630 [ 45.111643] ret_from_fork+0x10/0x20 [ 45.115281] [ 45.116809] Freed by task 313: [ 45.119925] kasan_save_stack+0x3c/0x68 [ 45.123836] kasan_save_track+0x20/0x40 [ 45.127747] kasan_save_free_info+0x4c/0x78 [ 45.132001] __kasan_slab_free+0x6c/0x98 [ 45.136000] kmem_cache_free+0x260/0x468 [ 45.139995] slab_kmem_cache_release+0x38/0x50 [ 45.144512] kmem_cache_release+0x1c/0x30 [ 45.148594] kobject_put+0x17c/0x420 [ 45.152236] sysfs_slab_release+0x1c/0x30 [ 45.156317] kmem_cache_destroy+0x118/0x218 [ 45.160572] kmem_cache_double_destroy+0x128/0x300 [ 45.165443] kunit_try_run_case+0x170/0x3f0 [ 45.169698] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.175269] kthread+0x328/0x630 [ 45.178564] ret_from_fork+0x10/0x20 [ 45.182203] [ 45.183739] The buggy address belongs to the object at ffff000083320280 [ 45.183739] which belongs to the cache kmem_cache of size 208 [ 45.196312] The buggy address is located 0 bytes inside of [ 45.196312] freed 208-byte region [ffff000083320280, ffff000083320350) [ 45.208541] [ 45.210075] The buggy address belongs to the physical page: [ 45.215724] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103320 [ 45.223832] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 45.231596] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 45.238662] page_type: f5(slab) [ 45.241874] raw: 0bfffe0000000040 ffff000080002000 dead000000000122 0000000000000000 [ 45.249721] raw: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000 [ 45.257572] head: 0bfffe0000000040 ffff000080002000 dead000000000122 0000000000000000 [ 45.265505] head: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000 [ 45.273437] head: 0bfffe0000000001 fffffdffc20cc801 00000000ffffffff 00000000ffffffff [ 45.281372] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 45.289300] page dumped because: kasan: bad access detected [ 45.294952] [ 45.296487] Memory state around the buggy address: [ 45.301355] ffff000083320180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 45.308671] ffff000083320200: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.315987] >ffff000083320280: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 45.323302] ^ [ 45.326594] ffff000083320300: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 45.333909] ffff000083320380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.341222] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 44.523252] ================================================================== [ 44.535033] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468 [ 44.542284] Read of size 1 at addr ffff000083324000 by task kunit_try_catch/311 [ 44.549699] [ 44.551238] CPU: 1 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 44.551275] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.551284] Hardware name: Thundercomm Dragonboard 845c (DT) [ 44.551301] Call trace: [ 44.551309] show_stack+0x20/0x38 (C) [ 44.551335] dump_stack_lvl+0x8c/0xd0 [ 44.551359] print_report+0x118/0x608 [ 44.551382] kasan_report+0xdc/0x128 [ 44.551401] __asan_report_load1_noabort+0x20/0x30 [ 44.551421] kmem_cache_rcu_uaf+0x388/0x468 [ 44.551440] kunit_try_run_case+0x170/0x3f0 [ 44.551465] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.551490] kthread+0x328/0x630 [ 44.551509] ret_from_fork+0x10/0x20 [ 44.551531] [ 44.617225] Allocated by task 311: [ 44.620691] kasan_save_stack+0x3c/0x68 [ 44.624601] kasan_save_track+0x20/0x40 [ 44.628512] kasan_save_alloc_info+0x40/0x58 [ 44.632851] __kasan_slab_alloc+0xa8/0xb0 [ 44.636936] kmem_cache_alloc_noprof+0x10c/0x398 [ 44.641639] kmem_cache_rcu_uaf+0x12c/0x468 [ 44.645896] kunit_try_run_case+0x170/0x3f0 [ 44.650150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.655719] kthread+0x328/0x630 [ 44.659005] ret_from_fork+0x10/0x20 [ 44.662644] [ 44.664179] Freed by task 0: [ 44.667114] kasan_save_stack+0x3c/0x68 [ 44.671014] kasan_save_track+0x20/0x40 [ 44.674924] kasan_save_free_info+0x4c/0x78 [ 44.679176] __kasan_slab_free+0x6c/0x98 [ 44.683172] slab_free_after_rcu_debug+0xd4/0x2f8 [ 44.687954] rcu_core+0x9f4/0x1e20 [ 44.691429] rcu_core_si+0x18/0x30 [ 44.694896] handle_softirqs+0x374/0xb28 [ 44.698895] __do_softirq+0x1c/0x28 [ 44.702446] [ 44.703983] Last potentially related work creation: [ 44.708932] kasan_save_stack+0x3c/0x68 [ 44.712842] kasan_record_aux_stack+0xb4/0xc8 [ 44.717270] kmem_cache_free+0x120/0x468 [ 44.721265] kmem_cache_rcu_uaf+0x16c/0x468 [ 44.725521] kunit_try_run_case+0x170/0x3f0 [ 44.729777] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.735348] kthread+0x328/0x630 [ 44.738644] ret_from_fork+0x10/0x20 [ 44.742283] [ 44.743817] The buggy address belongs to the object at ffff000083324000 [ 44.743817] which belongs to the cache test_cache of size 200 [ 44.756392] The buggy address is located 0 bytes inside of [ 44.756392] freed 200-byte region [ffff000083324000, ffff0000833240c8) [ 44.768619] [ 44.770153] The buggy address belongs to the physical page: [ 44.775800] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103324 [ 44.783909] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 44.791674] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 44.798743] page_type: f5(slab) [ 44.801954] raw: 0bfffe0000000040 ffff000083320140 dead000000000122 0000000000000000 [ 44.809803] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 44.817651] head: 0bfffe0000000040 ffff000083320140 dead000000000122 0000000000000000 [ 44.825586] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 44.833518] head: 0bfffe0000000001 fffffdffc20cc901 00000000ffffffff 00000000ffffffff [ 44.841451] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 44.849381] page dumped because: kasan: bad access detected [ 44.855034] [ 44.856568] Memory state around the buggy address: [ 44.861435] ffff000083323f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 44.868751] ffff000083323f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 44.876068] >ffff000083324000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 44.883381] ^ [ 44.886673] ffff000083324080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 44.893988] ffff000083324100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.901301] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 38.747182] ================================================================== [ 38.759443] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0 [ 38.767464] Read of size 64 at addr ffff000080acfd04 by task kunit_try_catch/280 [ 38.774956] [ 38.776496] CPU: 3 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 38.776527] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.776538] Hardware name: Thundercomm Dragonboard 845c (DT) [ 38.776549] Call trace: [ 38.776556] show_stack+0x20/0x38 (C) [ 38.776575] dump_stack_lvl+0x8c/0xd0 [ 38.776598] print_report+0x118/0x608 [ 38.776618] kasan_report+0xdc/0x128 [ 38.776640] kasan_check_range+0x100/0x1a8 [ 38.776661] __asan_memmove+0x3c/0x98 [ 38.776677] kmalloc_memmove_invalid_size+0x154/0x2e0 [ 38.776696] kunit_try_run_case+0x170/0x3f0 [ 38.776716] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.776738] kthread+0x328/0x630 [ 38.776753] ret_from_fork+0x10/0x20 [ 38.776770] [ 38.846346] Allocated by task 280: [ 38.849805] kasan_save_stack+0x3c/0x68 [ 38.853716] kasan_save_track+0x20/0x40 [ 38.857627] kasan_save_alloc_info+0x40/0x58 [ 38.861968] __kasan_kmalloc+0xd4/0xd8 [ 38.865789] __kmalloc_cache_noprof+0x16c/0x3c0 [ 38.870393] kmalloc_memmove_invalid_size+0xb0/0x2e0 [ 38.875433] kunit_try_run_case+0x170/0x3f0 [ 38.879685] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.885260] kthread+0x328/0x630 [ 38.888551] ret_from_fork+0x10/0x20 [ 38.892189] [ 38.893720] The buggy address belongs to the object at ffff000080acfd00 [ 38.893720] which belongs to the cache kmalloc-64 of size 64 [ 38.906212] The buggy address is located 4 bytes inside of [ 38.906212] allocated 64-byte region [ffff000080acfd00, ffff000080acfd40) [ 38.918697] [ 38.920233] The buggy address belongs to the physical page: [ 38.925885] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 38.933990] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.940614] page_type: f5(slab) [ 38.943818] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 38.951667] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.959508] page dumped because: kasan: bad access detected [ 38.965158] [ 38.966687] Memory state around the buggy address: [ 38.971549] ffff000080acfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.978866] ffff000080acfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.986179] >ffff000080acfd00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 38.993501] ^ [ 38.998887] ffff000080acfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.006202] ffff000080acfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.013515] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 44.107018] ================================================================== [ 44.118706] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 44.125779] Free of addr ffff000083322001 by task kunit_try_catch/309 [ 44.132304] [ 44.133846] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 44.133886] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.133896] Hardware name: Thundercomm Dragonboard 845c (DT) [ 44.133911] Call trace: [ 44.133920] show_stack+0x20/0x38 (C) [ 44.133945] dump_stack_lvl+0x8c/0xd0 [ 44.133969] print_report+0x118/0x608 [ 44.133991] kasan_report_invalid_free+0xc0/0xe8 [ 44.134013] check_slab_allocation+0xfc/0x108 [ 44.134034] __kasan_slab_pre_free+0x2c/0x48 [ 44.134055] kmem_cache_free+0xf0/0x468 [ 44.134078] kmem_cache_invalid_free+0x184/0x3c8 [ 44.134097] kunit_try_run_case+0x170/0x3f0 [ 44.134121] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.134147] kthread+0x328/0x630 [ 44.134166] ret_from_fork+0x10/0x20 [ 44.134192] [ 44.209162] Allocated by task 309: [ 44.212626] kasan_save_stack+0x3c/0x68 [ 44.216538] kasan_save_track+0x20/0x40 [ 44.220447] kasan_save_alloc_info+0x40/0x58 [ 44.224786] __kasan_slab_alloc+0xa8/0xb0 [ 44.228870] kmem_cache_alloc_noprof+0x10c/0x398 [ 44.233570] kmem_cache_invalid_free+0x12c/0x3c8 [ 44.238267] kunit_try_run_case+0x170/0x3f0 [ 44.242519] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.248090] kthread+0x328/0x630 [ 44.251382] ret_from_fork+0x10/0x20 [ 44.255021] [ 44.256557] The buggy address belongs to the object at ffff000083322000 [ 44.256557] which belongs to the cache test_cache of size 200 [ 44.269134] The buggy address is located 1 bytes inside of [ 44.269134] 200-byte region [ffff000083322000, ffff0000833220c8) [ 44.280838] [ 44.282371] The buggy address belongs to the physical page: [ 44.288017] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103322 [ 44.296138] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 44.303899] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 44.310967] page_type: f5(slab) [ 44.314177] raw: 0bfffe0000000040 ffff000083320000 dead000000000122 0000000000000000 [ 44.322024] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 44.329871] head: 0bfffe0000000040 ffff000083320000 dead000000000122 0000000000000000 [ 44.337807] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 44.345738] head: 0bfffe0000000001 fffffdffc20cc881 00000000ffffffff 00000000ffffffff [ 44.353669] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 44.361597] page dumped because: kasan: bad access detected [ 44.367247] [ 44.368784] Memory state around the buggy address: [ 44.373652] ffff000083321f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.380977] ffff000083321f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.388304] >ffff000083322000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 44.395619] ^ [ 44.398909] ffff000083322080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 44.406223] ffff000083322100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.413534] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 43.732226] ================================================================== [ 43.743204] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 43.750114] Free of addr ffff000080e26000 by task kunit_try_catch/307 [ 43.756642] [ 43.758182] CPU: 2 UID: 0 PID: 307 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 43.758219] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.758229] Hardware name: Thundercomm Dragonboard 845c (DT) [ 43.758247] Call trace: [ 43.758256] show_stack+0x20/0x38 (C) [ 43.758280] dump_stack_lvl+0x8c/0xd0 [ 43.758304] print_report+0x118/0x608 [ 43.758327] kasan_report_invalid_free+0xc0/0xe8 [ 43.758348] check_slab_allocation+0xd4/0x108 [ 43.758370] __kasan_slab_pre_free+0x2c/0x48 [ 43.758391] kmem_cache_free+0xf0/0x468 [ 43.758414] kmem_cache_double_free+0x190/0x3c8 [ 43.758433] kunit_try_run_case+0x170/0x3f0 [ 43.758457] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.758481] kthread+0x328/0x630 [ 43.758501] ret_from_fork+0x10/0x20 [ 43.758526] [ 43.833383] Allocated by task 307: [ 43.836847] kasan_save_stack+0x3c/0x68 [ 43.840760] kasan_save_track+0x20/0x40 [ 43.844670] kasan_save_alloc_info+0x40/0x58 [ 43.849010] __kasan_slab_alloc+0xa8/0xb0 [ 43.853094] kmem_cache_alloc_noprof+0x10c/0x398 [ 43.857794] kmem_cache_double_free+0x12c/0x3c8 [ 43.862404] kunit_try_run_case+0x170/0x3f0 [ 43.866658] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.872226] kthread+0x328/0x630 [ 43.875510] ret_from_fork+0x10/0x20 [ 43.879149] [ 43.880685] Freed by task 307: [ 43.883798] kasan_save_stack+0x3c/0x68 [ 43.887710] kasan_save_track+0x20/0x40 [ 43.891620] kasan_save_free_info+0x4c/0x78 [ 43.895869] __kasan_slab_free+0x6c/0x98 [ 43.899865] kmem_cache_free+0x260/0x468 [ 43.903861] kmem_cache_double_free+0x140/0x3c8 [ 43.908470] kunit_try_run_case+0x170/0x3f0 [ 43.912723] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.918299] kthread+0x328/0x630 [ 43.921589] ret_from_fork+0x10/0x20 [ 43.925228] [ 43.926760] The buggy address belongs to the object at ffff000080e26000 [ 43.926760] which belongs to the cache test_cache of size 200 [ 43.939340] The buggy address is located 0 bytes inside of [ 43.939340] 200-byte region [ffff000080e26000, ffff000080e260c8) [ 43.951038] [ 43.952577] The buggy address belongs to the physical page: [ 43.958228] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100e26 [ 43.966347] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 43.974110] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 43.981173] page_type: f5(slab) [ 43.984383] raw: 0bfffe0000000040 ffff000080e24000 dead000000000122 0000000000000000 [ 43.992230] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 44.000079] head: 0bfffe0000000040 ffff000080e24000 dead000000000122 0000000000000000 [ 44.008010] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 44.015942] head: 0bfffe0000000001 fffffdffc2038981 00000000ffffffff 00000000ffffffff [ 44.023874] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 44.031801] page dumped because: kasan: bad access detected [ 44.037449] [ 44.038979] Memory state around the buggy address: [ 44.043840] ffff000080e25f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.051157] ffff000080e25f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.058472] >ffff000080e26000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 44.065795] ^ [ 44.069084] ffff000080e26080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 44.076399] ffff000080e26100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.083713] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 43.398781] ================================================================== [ 43.409740] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430 [ 43.416539] Read of size 1 at addr ffff0000803c60c8 by task kunit_try_catch/305 [ 43.423955] [ 43.425490] CPU: 0 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 43.425520] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.425528] Hardware name: Thundercomm Dragonboard 845c (DT) [ 43.425542] Call trace: [ 43.425548] show_stack+0x20/0x38 (C) [ 43.425567] dump_stack_lvl+0x8c/0xd0 [ 43.425587] print_report+0x118/0x608 [ 43.425606] kasan_report+0xdc/0x128 [ 43.425626] __asan_report_load1_noabort+0x20/0x30 [ 43.425645] kmem_cache_oob+0x344/0x430 [ 43.425662] kunit_try_run_case+0x170/0x3f0 [ 43.425684] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.425706] kthread+0x328/0x630 [ 43.425721] ret_from_fork+0x10/0x20 [ 43.425740] [ 43.491088] Allocated by task 305: [ 43.494555] kasan_save_stack+0x3c/0x68 [ 43.498460] kasan_save_track+0x20/0x40 [ 43.502366] kasan_save_alloc_info+0x40/0x58 [ 43.506711] __kasan_slab_alloc+0xa8/0xb0 [ 43.510788] kmem_cache_alloc_noprof+0x10c/0x398 [ 43.515482] kmem_cache_oob+0x12c/0x430 [ 43.519387] kunit_try_run_case+0x170/0x3f0 [ 43.523648] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.529216] kthread+0x328/0x630 [ 43.532503] ret_from_fork+0x10/0x20 [ 43.536148] [ 43.537678] The buggy address belongs to the object at ffff0000803c6000 [ 43.537678] which belongs to the cache test_cache of size 200 [ 43.550255] The buggy address is located 0 bytes to the right of [ 43.550255] allocated 200-byte region [ffff0000803c6000, ffff0000803c60c8) [ 43.563363] [ 43.564894] The buggy address belongs to the physical page: [ 43.570539] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1003c6 [ 43.578645] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 43.586404] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 43.593461] page_type: f5(slab) [ 43.596661] raw: 0bfffe0000000040 ffff0000803c4000 dead000000000122 0000000000000000 [ 43.604508] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 43.612357] head: 0bfffe0000000040 ffff0000803c4000 dead000000000122 0000000000000000 [ 43.620291] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 43.628225] head: 0bfffe0000000001 fffffdffc200f181 00000000ffffffff 00000000ffffffff [ 43.636157] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 43.644086] page dumped because: kasan: bad access detected [ 43.649731] [ 43.651262] Memory state around the buggy address: [ 43.656120] ffff0000803c5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.663435] ffff0000803c6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 43.670751] >ffff0000803c6080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 43.678063] ^ [ 43.683711] ffff0000803c6100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.691027] ffff0000803c6180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.698340] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 43.035976] ================================================================== [ 43.046314] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 43.053115] Read of size 8 at addr ffff000088dd2480 by task kunit_try_catch/298 [ 43.060520] [ 43.062055] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 43.062085] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.062095] Hardware name: Thundercomm Dragonboard 845c (DT) [ 43.062108] Call trace: [ 43.062116] show_stack+0x20/0x38 (C) [ 43.062135] dump_stack_lvl+0x8c/0xd0 [ 43.062156] print_report+0x118/0x608 [ 43.062177] kasan_report+0xdc/0x128 [ 43.062196] __asan_report_load8_noabort+0x20/0x30 [ 43.062216] workqueue_uaf+0x480/0x4a8 [ 43.062234] kunit_try_run_case+0x170/0x3f0 [ 43.062256] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.062278] kthread+0x328/0x630 [ 43.062293] ret_from_fork+0x10/0x20 [ 43.062311] [ 43.127591] Allocated by task 298: [ 43.131054] kasan_save_stack+0x3c/0x68 [ 43.134964] kasan_save_track+0x20/0x40 [ 43.138874] kasan_save_alloc_info+0x40/0x58 [ 43.143219] __kasan_kmalloc+0xd4/0xd8 [ 43.147033] __kmalloc_cache_noprof+0x16c/0x3c0 [ 43.151639] workqueue_uaf+0x13c/0x4a8 [ 43.155450] kunit_try_run_case+0x170/0x3f0 [ 43.159702] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.165277] kthread+0x328/0x630 [ 43.168568] ret_from_fork+0x10/0x20 [ 43.172207] [ 43.173737] Freed by task 63: [ 43.176764] kasan_save_stack+0x3c/0x68 [ 43.180673] kasan_save_track+0x20/0x40 [ 43.184583] kasan_save_free_info+0x4c/0x78 [ 43.188833] __kasan_slab_free+0x6c/0x98 [ 43.192831] kfree+0x214/0x3c8 [ 43.195949] workqueue_uaf_work+0x18/0x30 [ 43.200031] process_one_work+0x530/0xf98 [ 43.204116] worker_thread+0x618/0xf38 [ 43.207936] kthread+0x328/0x630 [ 43.211230] ret_from_fork+0x10/0x20 [ 43.214871] [ 43.216406] Last potentially related work creation: [ 43.221353] kasan_save_stack+0x3c/0x68 [ 43.225265] kasan_record_aux_stack+0xb4/0xc8 [ 43.229691] __queue_work+0x65c/0xfe0 [ 43.233415] queue_work_on+0xbc/0xf8 [ 43.237054] workqueue_uaf+0x210/0x4a8 [ 43.240875] kunit_try_run_case+0x170/0x3f0 [ 43.245130] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.250705] kthread+0x328/0x630 [ 43.253995] ret_from_fork+0x10/0x20 [ 43.257635] [ 43.259163] The buggy address belongs to the object at ffff000088dd2480 [ 43.259163] which belongs to the cache kmalloc-32 of size 32 [ 43.271653] The buggy address is located 0 bytes inside of [ 43.271653] freed 32-byte region [ffff000088dd2480, ffff000088dd24a0) [ 43.283791] [ 43.285320] The buggy address belongs to the physical page: [ 43.290971] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108dd2 [ 43.299085] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.305698] page_type: f5(slab) [ 43.308902] raw: 0bfffe0000000000 ffff000080002780 dead000000000100 dead000000000122 [ 43.316747] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 43.324589] page dumped because: kasan: bad access detected [ 43.330240] [ 43.331776] Memory state around the buggy address: [ 43.336640] ffff000088dd2380: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 43.343954] ffff000088dd2400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 43.351271] >ffff000088dd2480: fa fb fb fb fc fc fc fc 00 00 00 07 fc fc fc fc [ 43.358587] ^ [ 43.361876] ffff000088dd2500: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 43.369191] ffff000088dd2580: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 43.376512] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[ 42.627232] ================================================================== [ 42.637742] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 42.644542] Read of size 4 at addr ffff0000829a85c0 by task swapper/3/0 [ 42.651244] [ 42.652777] CPU: 3 UID: 0 PID: 0 Comm: swapper/3 Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 42.652807] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.652817] Hardware name: Thundercomm Dragonboard 845c (DT) [ 42.652830] Call trace: [ 42.652837] show_stack+0x20/0x38 (C) [ 42.652855] dump_stack_lvl+0x8c/0xd0 [ 42.652875] print_report+0x118/0x608 [ 42.652895] kasan_report+0xdc/0x128 [ 42.652913] __asan_report_load4_noabort+0x20/0x30 [ 42.652932] rcu_uaf_reclaim+0x64/0x70 [ 42.652949] rcu_core+0x9f4/0x1e20 [ 42.652971] rcu_core_si+0x18/0x30 [ 42.652989] handle_softirqs+0x374/0xb28 [ 42.653011] __do_softirq+0x1c/0x28 [ 42.653027] ____do_softirq+0x18/0x30 [ 42.653044] call_on_irq_stack+0x24/0x30 [ 42.653063] do_softirq_own_stack+0x24/0x38 [ 42.653082] __irq_exit_rcu+0x1fc/0x318 [ 42.653099] irq_exit_rcu+0x1c/0x80 [ 42.653116] el1_interrupt+0x38/0x58 [ 42.653138] el1h_64_irq_handler+0x18/0x28 [ 42.653160] el1h_64_irq+0x6c/0x70 [ 42.653176] arch_local_irq_enable+0x4/0x8 (P) [ 42.653199] cpuidle_enter+0x60/0xb8 [ 42.653217] do_idle+0x36c/0x4e8 [ 42.653238] cpu_startup_entry+0x64/0x80 [ 42.653260] secondary_start_kernel+0x288/0x340 [ 42.653281] __secondary_switched+0xc0/0xc8 [ 42.653306] [ 42.770292] Allocated by task 296: [ 42.773751] kasan_save_stack+0x3c/0x68 [ 42.777662] kasan_save_track+0x20/0x40 [ 42.781563] kasan_save_alloc_info+0x40/0x58 [ 42.785901] __kasan_kmalloc+0xd4/0xd8 [ 42.789725] __kmalloc_cache_noprof+0x16c/0x3c0 [ 42.794337] rcu_uaf+0xb0/0x2d8 [ 42.797542] kunit_try_run_case+0x170/0x3f0 [ 42.801798] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.807370] kthread+0x328/0x630 [ 42.810665] ret_from_fork+0x10/0x20 [ 42.814305] [ 42.815838] Freed by task 0: [ 42.818775] kasan_save_stack+0x3c/0x68 [ 42.822687] kasan_save_track+0x20/0x40 [ 42.826597] kasan_save_free_info+0x4c/0x78 [ 42.830850] __kasan_slab_free+0x6c/0x98 [ 42.834846] kfree+0x214/0x3c8 [ 42.837965] rcu_uaf_reclaim+0x28/0x70 [ 42.841784] rcu_core+0x9f4/0x1e20 [ 42.845252] rcu_core_si+0x18/0x30 [ 42.848718] handle_softirqs+0x374/0xb28 [ 42.852715] __do_softirq+0x1c/0x28 [ 42.856265] [ 42.857795] Last potentially related work creation: [ 42.862743] kasan_save_stack+0x3c/0x68 [ 42.866652] kasan_record_aux_stack+0xb4/0xc8 [ 42.871077] __call_rcu_common.constprop.0+0x74/0x8c8 [ 42.876212] call_rcu+0x18/0x30 [ 42.879421] rcu_uaf+0x14c/0x2d8 [ 42.882716] kunit_try_run_case+0x170/0x3f0 [ 42.886970] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.892540] kthread+0x328/0x630 [ 42.895832] ret_from_fork+0x10/0x20 [ 42.899475] [ 42.901002] The buggy address belongs to the object at ffff0000829a85c0 [ 42.901002] which belongs to the cache kmalloc-32 of size 32 [ 42.913483] The buggy address is located 0 bytes inside of [ 42.913483] freed 32-byte region [ffff0000829a85c0, ffff0000829a85e0) [ 42.925624] [ 42.927152] The buggy address belongs to the physical page: [ 42.932800] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029a8 [ 42.940905] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.947520] page_type: f5(slab) [ 42.950728] raw: 0bfffe0000000000 ffff000080002780 dead000000000122 0000000000000000 [ 42.958575] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 42.966417] page dumped because: kasan: bad access detected [ 42.972061] [ 42.973592] Memory state around the buggy address: [ 42.978454] ffff0000829a8480: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 42.985768] ffff0000829a8500: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 42.993082] >ffff0000829a8580: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 43.000397] ^ [ 43.005790] ffff0000829a8600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.013105] ffff0000829a8680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.020418] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 41.553421] ================================================================== [ 41.565067] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 41.571514] Read of size 1 at addr ffff0000822c2a00 by task kunit_try_catch/294 [ 41.578926] [ 41.580463] CPU: 3 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 41.580493] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.580502] Hardware name: Thundercomm Dragonboard 845c (DT) [ 41.580514] Call trace: [ 41.580522] show_stack+0x20/0x38 (C) [ 41.580541] dump_stack_lvl+0x8c/0xd0 [ 41.580560] print_report+0x118/0x608 [ 41.580579] kasan_report+0xdc/0x128 [ 41.580599] __kasan_check_byte+0x54/0x70 [ 41.580619] ksize+0x30/0x88 [ 41.580639] ksize_uaf+0x168/0x5f8 [ 41.580655] kunit_try_run_case+0x170/0x3f0 [ 41.580675] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.580698] kthread+0x328/0x630 [ 41.580714] ret_from_fork+0x10/0x20 [ 41.580732] [ 41.647781] Allocated by task 294: [ 41.651245] kasan_save_stack+0x3c/0x68 [ 41.655148] kasan_save_track+0x20/0x40 [ 41.659058] kasan_save_alloc_info+0x40/0x58 [ 41.663396] __kasan_kmalloc+0xd4/0xd8 [ 41.667219] __kmalloc_cache_noprof+0x16c/0x3c0 [ 41.671828] ksize_uaf+0xb8/0x5f8 [ 41.675211] kunit_try_run_case+0x170/0x3f0 [ 41.679467] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.685038] kthread+0x328/0x630 [ 41.688331] ret_from_fork+0x10/0x20 [ 41.691971] [ 41.693500] Freed by task 294: [ 41.696613] kasan_save_stack+0x3c/0x68 [ 41.700525] kasan_save_track+0x20/0x40 [ 41.704434] kasan_save_free_info+0x4c/0x78 [ 41.708689] __kasan_slab_free+0x6c/0x98 [ 41.712686] kfree+0x214/0x3c8 [ 41.715806] ksize_uaf+0x11c/0x5f8 [ 41.719272] kunit_try_run_case+0x170/0x3f0 [ 41.723526] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.729097] kthread+0x328/0x630 [ 41.732389] ret_from_fork+0x10/0x20 [ 41.736029] [ 41.737558] The buggy address belongs to the object at ffff0000822c2a00 [ 41.737558] which belongs to the cache kmalloc-128 of size 128 [ 41.750214] The buggy address is located 0 bytes inside of [ 41.750214] freed 128-byte region [ffff0000822c2a00, ffff0000822c2a80) [ 41.762440] [ 41.763977] The buggy address belongs to the physical page: [ 41.769629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022c2 [ 41.777735] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 41.785494] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 41.792550] page_type: f5(slab) [ 41.795755] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 41.803601] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 41.811449] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 41.819382] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 41.827315] head: 0bfffe0000000001 fffffdffc208b081 00000000ffffffff 00000000ffffffff [ 41.835248] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 41.843173] page dumped because: kasan: bad access detected [ 41.848821] [ 41.850350] Memory state around the buggy address: [ 41.855211] ffff0000822c2900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 41.862527] ffff0000822c2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.869843] >ffff0000822c2a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 41.877157] ^ [ 41.880446] ffff0000822c2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.887760] ffff0000822c2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.895075] ================================================================== [ 41.902448] ================================================================== [ 41.909763] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 41.916203] Read of size 1 at addr ffff0000822c2a00 by task kunit_try_catch/294 [ 41.923618] [ 41.925149] CPU: 3 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 41.925179] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.925189] Hardware name: Thundercomm Dragonboard 845c (DT) [ 41.925200] Call trace: [ 41.925207] show_stack+0x20/0x38 (C) [ 41.925225] dump_stack_lvl+0x8c/0xd0 [ 41.925246] print_report+0x118/0x608 [ 41.925265] kasan_report+0xdc/0x128 [ 41.925286] __asan_report_load1_noabort+0x20/0x30 [ 41.925305] ksize_uaf+0x598/0x5f8 [ 41.925323] kunit_try_run_case+0x170/0x3f0 [ 41.925341] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.925365] kthread+0x328/0x630 [ 41.925380] ret_from_fork+0x10/0x20 [ 41.925399] [ 41.990316] Allocated by task 294: [ 41.993778] kasan_save_stack+0x3c/0x68 [ 41.997689] kasan_save_track+0x20/0x40 [ 42.001599] kasan_save_alloc_info+0x40/0x58 [ 42.005939] __kasan_kmalloc+0xd4/0xd8 [ 42.009762] __kmalloc_cache_noprof+0x16c/0x3c0 [ 42.014363] ksize_uaf+0xb8/0x5f8 [ 42.017743] kunit_try_run_case+0x170/0x3f0 [ 42.021999] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.027569] kthread+0x328/0x630 [ 42.030854] ret_from_fork+0x10/0x20 [ 42.034492] [ 42.036026] Freed by task 294: [ 42.039132] kasan_save_stack+0x3c/0x68 [ 42.043042] kasan_save_track+0x20/0x40 [ 42.046952] kasan_save_free_info+0x4c/0x78 [ 42.051201] __kasan_slab_free+0x6c/0x98 [ 42.055197] kfree+0x214/0x3c8 [ 42.058309] ksize_uaf+0x11c/0x5f8 [ 42.061776] kunit_try_run_case+0x170/0x3f0 [ 42.066031] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.071601] kthread+0x328/0x630 [ 42.074885] ret_from_fork+0x10/0x20 [ 42.078523] [ 42.080056] The buggy address belongs to the object at ffff0000822c2a00 [ 42.080056] which belongs to the cache kmalloc-128 of size 128 [ 42.092723] The buggy address is located 0 bytes inside of [ 42.092723] freed 128-byte region [ffff0000822c2a00, ffff0000822c2a80) [ 42.104949] [ 42.106479] The buggy address belongs to the physical page: [ 42.112122] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022c2 [ 42.120227] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 42.127984] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 42.135045] page_type: f5(slab) [ 42.138248] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 42.146096] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 42.153940] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 42.161874] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 42.169807] head: 0bfffe0000000001 fffffdffc208b081 00000000ffffffff 00000000ffffffff [ 42.177740] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 42.185668] page dumped because: kasan: bad access detected [ 42.191317] [ 42.192844] Memory state around the buggy address: [ 42.197708] ffff0000822c2900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 42.205022] ffff0000822c2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.212338] >ffff0000822c2a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 42.219650] ^ [ 42.222930] ffff0000822c2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.230244] ffff0000822c2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.237556] ================================================================== [ 42.245727] ================================================================== [ 42.253057] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 42.259504] Read of size 1 at addr ffff0000822c2a78 by task kunit_try_catch/294 [ 42.266907] [ 42.268442] CPU: 4 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 42.268472] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.268482] Hardware name: Thundercomm Dragonboard 845c (DT) [ 42.268493] Call trace: [ 42.268499] show_stack+0x20/0x38 (C) [ 42.268517] dump_stack_lvl+0x8c/0xd0 [ 42.268537] print_report+0x118/0x608 [ 42.268555] kasan_report+0xdc/0x128 [ 42.268574] __asan_report_load1_noabort+0x20/0x30 [ 42.268590] ksize_uaf+0x544/0x5f8 [ 42.268606] kunit_try_run_case+0x170/0x3f0 [ 42.268624] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.268644] kthread+0x328/0x630 [ 42.268658] ret_from_fork+0x10/0x20 [ 42.268675] [ 42.333535] Allocated by task 294: [ 42.336989] kasan_save_stack+0x3c/0x68 [ 42.340895] kasan_save_track+0x20/0x40 [ 42.344800] kasan_save_alloc_info+0x40/0x58 [ 42.349135] __kasan_kmalloc+0xd4/0xd8 [ 42.352950] __kmalloc_cache_noprof+0x16c/0x3c0 [ 42.357547] ksize_uaf+0xb8/0x5f8 [ 42.360919] kunit_try_run_case+0x170/0x3f0 [ 42.365168] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.370735] kthread+0x328/0x630 [ 42.374018] ret_from_fork+0x10/0x20 [ 42.377649] [ 42.379181] Freed by task 294: [ 42.382287] kasan_save_stack+0x3c/0x68 [ 42.386192] kasan_save_track+0x20/0x40 [ 42.390096] kasan_save_free_info+0x4c/0x78 [ 42.394344] __kasan_slab_free+0x6c/0x98 [ 42.398335] kfree+0x214/0x3c8 [ 42.401444] ksize_uaf+0x11c/0x5f8 [ 42.404901] kunit_try_run_case+0x170/0x3f0 [ 42.409151] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.414716] kthread+0x328/0x630 [ 42.417998] ret_from_fork+0x10/0x20 [ 42.421629] [ 42.423161] The buggy address belongs to the object at ffff0000822c2a00 [ 42.423161] which belongs to the cache kmalloc-128 of size 128 [ 42.435811] The buggy address is located 120 bytes inside of [ 42.435811] freed 128-byte region [ffff0000822c2a00, ffff0000822c2a80) [ 42.448207] [ 42.449731] The buggy address belongs to the physical page: [ 42.455372] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022c2 [ 42.463471] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 42.471225] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 42.478275] page_type: f5(slab) [ 42.481471] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 42.489314] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 42.497155] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 42.505083] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 42.513010] head: 0bfffe0000000001 fffffdffc208b081 00000000ffffffff 00000000ffffffff [ 42.520936] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 42.528859] page dumped because: kasan: bad access detected [ 42.534503] [ 42.536032] Memory state around the buggy address: [ 42.540883] ffff0000822c2900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 42.548199] ffff0000822c2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.555514] >ffff0000822c2a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 42.562821] ^ [ 42.570038] ffff0000822c2a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.577343] ffff0000822c2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.584657] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 40.935436] ================================================================== [ 40.942752] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 40.950250] Read of size 1 at addr ffff0000822c2978 by task kunit_try_catch/292 [ 40.957663] [ 40.959195] CPU: 3 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 40.959227] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.959235] Hardware name: Thundercomm Dragonboard 845c (DT) [ 40.959246] Call trace: [ 40.959254] show_stack+0x20/0x38 (C) [ 40.959272] dump_stack_lvl+0x8c/0xd0 [ 40.959291] print_report+0x118/0x608 [ 40.959310] kasan_report+0xdc/0x128 [ 40.959330] __asan_report_load1_noabort+0x20/0x30 [ 40.959350] ksize_unpoisons_memory+0x618/0x740 [ 40.959369] kunit_try_run_case+0x170/0x3f0 [ 40.959389] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.959413] kthread+0x328/0x630 [ 40.959428] ret_from_fork+0x10/0x20 [ 40.959445] [ 41.025494] Allocated by task 292: [ 41.028954] kasan_save_stack+0x3c/0x68 [ 41.032865] kasan_save_track+0x20/0x40 [ 41.036775] kasan_save_alloc_info+0x40/0x58 [ 41.041114] __kasan_kmalloc+0xd4/0xd8 [ 41.044938] __kmalloc_cache_noprof+0x16c/0x3c0 [ 41.049550] ksize_unpoisons_memory+0xc0/0x740 [ 41.054074] kunit_try_run_case+0x170/0x3f0 [ 41.058330] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.063899] kthread+0x328/0x630 [ 41.067183] ret_from_fork+0x10/0x20 [ 41.070824] [ 41.072358] The buggy address belongs to the object at ffff0000822c2900 [ 41.072358] which belongs to the cache kmalloc-128 of size 128 [ 41.085025] The buggy address is located 5 bytes to the right of [ 41.085025] allocated 115-byte region [ffff0000822c2900, ffff0000822c2973) [ 41.098122] [ 41.099659] The buggy address belongs to the physical page: [ 41.105307] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022c2 [ 41.113421] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 41.121179] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 41.128236] page_type: f5(slab) [ 41.131443] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 41.139291] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 41.147138] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 41.155070] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 41.163003] head: 0bfffe0000000001 fffffdffc208b081 00000000ffffffff 00000000ffffffff [ 41.170936] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 41.178864] page dumped because: kasan: bad access detected [ 41.184508] [ 41.186037] Memory state around the buggy address: [ 41.190901] ffff0000822c2800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 41.198215] ffff0000822c2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.205530] >ffff0000822c2900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 41.212852] ^ [ 41.220078] ffff0000822c2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.227395] ffff0000822c2a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.234710] ================================================================== [ 41.242897] ================================================================== [ 41.250217] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 41.257718] Read of size 1 at addr ffff0000822c297f by task kunit_try_catch/292 [ 41.265119] [ 41.266648] CPU: 5 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 41.266679] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.266688] Hardware name: Thundercomm Dragonboard 845c (DT) [ 41.266698] Call trace: [ 41.266703] show_stack+0x20/0x38 (C) [ 41.266723] dump_stack_lvl+0x8c/0xd0 [ 41.266741] print_report+0x118/0x608 [ 41.266758] kasan_report+0xdc/0x128 [ 41.266776] __asan_report_load1_noabort+0x20/0x30 [ 41.266792] ksize_unpoisons_memory+0x690/0x740 [ 41.266810] kunit_try_run_case+0x170/0x3f0 [ 41.266828] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.266848] kthread+0x328/0x630 [ 41.266862] ret_from_fork+0x10/0x20 [ 41.266879] [ 41.332875] Allocated by task 292: [ 41.336331] kasan_save_stack+0x3c/0x68 [ 41.340229] kasan_save_track+0x20/0x40 [ 41.344126] kasan_save_alloc_info+0x40/0x58 [ 41.348462] __kasan_kmalloc+0xd4/0xd8 [ 41.352269] __kmalloc_cache_noprof+0x16c/0x3c0 [ 41.356868] ksize_unpoisons_memory+0xc0/0x740 [ 41.361383] kunit_try_run_case+0x170/0x3f0 [ 41.365633] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.371199] kthread+0x328/0x630 [ 41.374484] ret_from_fork+0x10/0x20 [ 41.378117] [ 41.379648] The buggy address belongs to the object at ffff0000822c2900 [ 41.379648] which belongs to the cache kmalloc-128 of size 128 [ 41.392295] The buggy address is located 12 bytes to the right of [ 41.392295] allocated 115-byte region [ffff0000822c2900, ffff0000822c2973) [ 41.405477] [ 41.407001] The buggy address belongs to the physical page: [ 41.412643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022c2 [ 41.420746] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 41.428491] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 41.435541] page_type: f5(slab) [ 41.438741] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 41.446586] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 41.454431] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 41.462360] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 41.470289] head: 0bfffe0000000001 fffffdffc208b081 00000000ffffffff 00000000ffffffff [ 41.478218] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 41.486143] page dumped because: kasan: bad access detected [ 41.491785] [ 41.493306] Memory state around the buggy address: [ 41.498160] ffff0000822c2800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 41.505470] ffff0000822c2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.512778] >ffff0000822c2900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 41.520085] ^ [ 41.527304] ffff0000822c2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.534616] ffff0000822c2a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.541921] ================================================================== [ 40.624767] ================================================================== [ 40.636332] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 40.643835] Read of size 1 at addr ffff0000822c2973 by task kunit_try_catch/292 [ 40.651246] [ 40.652788] CPU: 3 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 40.652819] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.652828] Hardware name: Thundercomm Dragonboard 845c (DT) [ 40.652840] Call trace: [ 40.652848] show_stack+0x20/0x38 (C) [ 40.652866] dump_stack_lvl+0x8c/0xd0 [ 40.652886] print_report+0x118/0x608 [ 40.652906] kasan_report+0xdc/0x128 [ 40.652926] __asan_report_load1_noabort+0x20/0x30 [ 40.652944] ksize_unpoisons_memory+0x628/0x740 [ 40.652963] kunit_try_run_case+0x170/0x3f0 [ 40.652984] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.653006] kthread+0x328/0x630 [ 40.653022] ret_from_fork+0x10/0x20 [ 40.653039] [ 40.719100] Allocated by task 292: [ 40.722560] kasan_save_stack+0x3c/0x68 [ 40.726470] kasan_save_track+0x20/0x40 [ 40.730380] kasan_save_alloc_info+0x40/0x58 [ 40.734720] __kasan_kmalloc+0xd4/0xd8 [ 40.738542] __kmalloc_cache_noprof+0x16c/0x3c0 [ 40.743151] ksize_unpoisons_memory+0xc0/0x740 [ 40.747675] kunit_try_run_case+0x170/0x3f0 [ 40.751934] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.757508] kthread+0x328/0x630 [ 40.760797] ret_from_fork+0x10/0x20 [ 40.764435] [ 40.765965] The buggy address belongs to the object at ffff0000822c2900 [ 40.765965] which belongs to the cache kmalloc-128 of size 128 [ 40.778627] The buggy address is located 0 bytes to the right of [ 40.778627] allocated 115-byte region [ffff0000822c2900, ffff0000822c2973) [ 40.791729] [ 40.793256] The buggy address belongs to the physical page: [ 40.798905] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022c2 [ 40.807016] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 40.814772] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 40.821829] page_type: f5(slab) [ 40.825033] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 40.832877] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 40.840721] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 40.848652] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 40.856582] head: 0bfffe0000000001 fffffdffc208b081 00000000ffffffff 00000000ffffffff [ 40.864513] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 40.872439] page dumped because: kasan: bad access detected [ 40.878088] [ 40.879624] Memory state around the buggy address: [ 40.884483] ffff0000822c2800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 40.891807] ffff0000822c2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.899121] >ffff0000822c2900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 40.906444] ^ [ 40.913408] ffff0000822c2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.920733] ffff0000822c2a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.928053] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
[ 40.298266] ================================================================== [ 40.305578] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 40.311670] Free of addr ffff0000946612e0 by task kunit_try_catch/290 [ 40.318195] [ 40.319725] CPU: 5 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 40.319753] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.319761] Hardware name: Thundercomm Dragonboard 845c (DT) [ 40.319771] Call trace: [ 40.319776] show_stack+0x20/0x38 (C) [ 40.319793] dump_stack_lvl+0x8c/0xd0 [ 40.319812] print_report+0x118/0x608 [ 40.319830] kasan_report_invalid_free+0xc0/0xe8 [ 40.319849] check_slab_allocation+0xd4/0x108 [ 40.319867] __kasan_slab_pre_free+0x2c/0x48 [ 40.319885] kfree+0xe8/0x3c8 [ 40.319899] kfree_sensitive+0x3c/0xb0 [ 40.319915] kmalloc_double_kzfree+0x168/0x308 [ 40.319932] kunit_try_run_case+0x170/0x3f0 [ 40.319950] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.319970] kthread+0x328/0x630 [ 40.319983] ret_from_fork+0x10/0x20 [ 40.319999] [ 40.397639] Allocated by task 290: [ 40.401089] kasan_save_stack+0x3c/0x68 [ 40.404993] kasan_save_track+0x20/0x40 [ 40.408898] kasan_save_alloc_info+0x40/0x58 [ 40.413230] __kasan_kmalloc+0xd4/0xd8 [ 40.417043] __kmalloc_cache_noprof+0x16c/0x3c0 [ 40.421640] kmalloc_double_kzfree+0xb8/0x308 [ 40.426060] kunit_try_run_case+0x170/0x3f0 [ 40.430306] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.435875] kthread+0x328/0x630 [ 40.439158] ret_from_fork+0x10/0x20 [ 40.442790] [ 40.444319] Freed by task 290: [ 40.447421] kasan_save_stack+0x3c/0x68 [ 40.451322] kasan_save_track+0x20/0x40 [ 40.455225] kasan_save_free_info+0x4c/0x78 [ 40.459467] __kasan_slab_free+0x6c/0x98 [ 40.463455] kfree+0x214/0x3c8 [ 40.466567] kfree_sensitive+0x80/0xb0 [ 40.470380] kmalloc_double_kzfree+0x11c/0x308 [ 40.474888] kunit_try_run_case+0x170/0x3f0 [ 40.479134] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.484693] kthread+0x328/0x630 [ 40.487973] ret_from_fork+0x10/0x20 [ 40.491613] [ 40.493135] The buggy address belongs to the object at ffff0000946612e0 [ 40.493135] which belongs to the cache kmalloc-16 of size 16 [ 40.505616] The buggy address is located 0 bytes inside of [ 40.505616] 16-byte region [ffff0000946612e0, ffff0000946612f0) [ 40.517223] [ 40.518747] The buggy address belongs to the physical page: [ 40.524391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x114661 [ 40.532498] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.539107] page_type: f5(slab) [ 40.542302] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 40.550139] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 40.557968] page dumped because: kasan: bad access detected [ 40.563613] [ 40.565136] Memory state around the buggy address: [ 40.569995] ffff000094661180: fa fb fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 40.577306] ffff000094661200: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.584615] >ffff000094661280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.591927] ^ [ 40.598364] ffff000094661300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.605675] ffff000094661380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.612985] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 31.517559] ================================================================== [ 31.532795] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 31.539242] Read of size 1 at addr ffff000095140000 by task kunit_try_catch/252 [ 31.546646] [ 31.548186] CPU: 3 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 31.548215] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.548224] Hardware name: Thundercomm Dragonboard 845c (DT) [ 31.548235] Call trace: [ 31.548242] show_stack+0x20/0x38 (C) [ 31.548261] dump_stack_lvl+0x8c/0xd0 [ 31.548282] print_report+0x118/0x608 [ 31.548302] kasan_report+0xdc/0x128 [ 31.548321] __asan_report_load1_noabort+0x20/0x30 [ 31.548338] page_alloc_uaf+0x328/0x350 [ 31.548357] kunit_try_run_case+0x170/0x3f0 [ 31.548376] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.548399] kthread+0x328/0x630 [ 31.548414] ret_from_fork+0x10/0x20 [ 31.548431] [ 31.613780] The buggy address belongs to the physical page: [ 31.619426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x115140 [ 31.627538] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.634154] page_type: f0(buddy) [ 31.637447] raw: 0bfffe0000000000 ffff0000fd587e70 ffff0000fd587e70 0000000000000000 [ 31.645293] raw: 0000000000000000 0000000000000006 00000000f0000000 0000000000000000 [ 31.653134] page dumped because: kasan: bad access detected [ 31.658784] [ 31.660321] Memory state around the buggy address: [ 31.665186] ffff00009513ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.672499] ffff00009513ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.679814] >ffff000095140000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.687126] ^ [ 31.690417] ffff000095140080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.697730] ffff000095140100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.705050] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[ 39.974708] ================================================================== [ 39.989344] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 39.996846] Read of size 1 at addr ffff0000946612e0 by task kunit_try_catch/290 [ 40.004255] [ 40.005784] CPU: 5 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 40.005814] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.005823] Hardware name: Thundercomm Dragonboard 845c (DT) [ 40.005835] Call trace: [ 40.005841] show_stack+0x20/0x38 (C) [ 40.005859] dump_stack_lvl+0x8c/0xd0 [ 40.005878] print_report+0x118/0x608 [ 40.005898] kasan_report+0xdc/0x128 [ 40.005915] __kasan_check_byte+0x54/0x70 [ 40.005934] kfree_sensitive+0x30/0xb0 [ 40.005954] kmalloc_double_kzfree+0x168/0x308 [ 40.005973] kunit_try_run_case+0x170/0x3f0 [ 40.005993] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.006013] kthread+0x328/0x630 [ 40.006028] ret_from_fork+0x10/0x20 [ 40.006045] [ 40.074972] Allocated by task 290: [ 40.078427] kasan_save_stack+0x3c/0x68 [ 40.082335] kasan_save_track+0x20/0x40 [ 40.086239] kasan_save_alloc_info+0x40/0x58 [ 40.090574] __kasan_kmalloc+0xd4/0xd8 [ 40.094389] __kmalloc_cache_noprof+0x16c/0x3c0 [ 40.098987] kmalloc_double_kzfree+0xb8/0x308 [ 40.103406] kunit_try_run_case+0x170/0x3f0 [ 40.107655] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.113220] kthread+0x328/0x630 [ 40.116500] ret_from_fork+0x10/0x20 [ 40.120131] [ 40.121654] Freed by task 290: [ 40.124757] kasan_save_stack+0x3c/0x68 [ 40.128662] kasan_save_track+0x20/0x40 [ 40.132565] kasan_save_free_info+0x4c/0x78 [ 40.136813] __kasan_slab_free+0x6c/0x98 [ 40.140803] kfree+0x214/0x3c8 [ 40.143912] kfree_sensitive+0x80/0xb0 [ 40.147725] kmalloc_double_kzfree+0x11c/0x308 [ 40.152236] kunit_try_run_case+0x170/0x3f0 [ 40.156485] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.162050] kthread+0x328/0x630 [ 40.165331] ret_from_fork+0x10/0x20 [ 40.168970] [ 40.170494] The buggy address belongs to the object at ffff0000946612e0 [ 40.170494] which belongs to the cache kmalloc-16 of size 16 [ 40.182974] The buggy address is located 0 bytes inside of [ 40.182974] freed 16-byte region [ffff0000946612e0, ffff0000946612f0) [ 40.195106] [ 40.196637] The buggy address belongs to the physical page: [ 40.202279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x114661 [ 40.210379] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.216990] page_type: f5(slab) [ 40.220187] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 40.228028] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 40.235863] page dumped because: kasan: bad access detected [ 40.241505] [ 40.243037] Memory state around the buggy address: [ 40.247897] ffff000094661180: fa fb fc fc 00 00 fc fc 00 00 fc fc 00 00 fc fc [ 40.255206] ffff000094661200: 00 00 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.262511] >ffff000094661280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 40.269823] ^ [ 40.276258] ffff000094661300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.283572] ffff000094661380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.290878] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[ 39.654659] ================================================================== [ 39.665960] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 39.672668] Read of size 1 at addr ffff0000948a0f28 by task kunit_try_catch/286 [ 39.680078] [ 39.681612] CPU: 2 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 39.681641] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.681650] Hardware name: Thundercomm Dragonboard 845c (DT) [ 39.681662] Call trace: [ 39.681669] show_stack+0x20/0x38 (C) [ 39.681688] dump_stack_lvl+0x8c/0xd0 [ 39.681708] print_report+0x118/0x608 [ 39.681728] kasan_report+0xdc/0x128 [ 39.681746] __asan_report_load1_noabort+0x20/0x30 [ 39.681766] kmalloc_uaf2+0x3f4/0x468 [ 39.681782] kunit_try_run_case+0x170/0x3f0 [ 39.681802] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.681823] kthread+0x328/0x630 [ 39.681840] ret_from_fork+0x10/0x20 [ 39.681858] [ 39.747036] Allocated by task 286: [ 39.750500] kasan_save_stack+0x3c/0x68 [ 39.754403] kasan_save_track+0x20/0x40 [ 39.758306] kasan_save_alloc_info+0x40/0x58 [ 39.762649] __kasan_kmalloc+0xd4/0xd8 [ 39.766464] __kmalloc_cache_noprof+0x16c/0x3c0 [ 39.771067] kmalloc_uaf2+0xc4/0x468 [ 39.774710] kunit_try_run_case+0x170/0x3f0 [ 39.778967] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.784542] kthread+0x328/0x630 [ 39.787836] ret_from_fork+0x10/0x20 [ 39.791476] [ 39.793007] Freed by task 286: [ 39.796111] kasan_save_stack+0x3c/0x68 [ 39.800013] kasan_save_track+0x20/0x40 [ 39.803916] kasan_save_free_info+0x4c/0x78 [ 39.808171] __kasan_slab_free+0x6c/0x98 [ 39.812160] kfree+0x214/0x3c8 [ 39.815272] kmalloc_uaf2+0x134/0x468 [ 39.819000] kunit_try_run_case+0x170/0x3f0 [ 39.823256] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.828822] kthread+0x328/0x630 [ 39.832118] ret_from_fork+0x10/0x20 [ 39.835760] [ 39.837290] The buggy address belongs to the object at ffff0000948a0f00 [ 39.837290] which belongs to the cache kmalloc-64 of size 64 [ 39.849779] The buggy address is located 40 bytes inside of [ 39.849779] freed 64-byte region [ffff0000948a0f00, ffff0000948a0f40) [ 39.862004] [ 39.863531] The buggy address belongs to the physical page: [ 39.869185] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1148a0 [ 39.877295] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.883914] page_type: f5(slab) [ 39.887123] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 39.894964] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.902802] page dumped because: kasan: bad access detected [ 39.908451] [ 39.909982] Memory state around the buggy address: [ 39.914848] ffff0000948a0e00: 00 00 00 00 00 00 05 fc fc fc fc fc fc fc fc fc [ 39.922167] ffff0000948a0e80: 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc [ 39.929488] >ffff0000948a0f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.936807] ^ [ 39.941405] ffff0000948a0f80: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 39.948727] ffff0000948a1000: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 39.956046] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 39.338174] ================================================================== [ 39.348865] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 39.356101] Write of size 33 at addr ffff000080acfd80 by task kunit_try_catch/284 [ 39.363684] [ 39.365218] CPU: 3 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 39.365249] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.365259] Hardware name: Thundercomm Dragonboard 845c (DT) [ 39.365273] Call trace: [ 39.365280] show_stack+0x20/0x38 (C) [ 39.365299] dump_stack_lvl+0x8c/0xd0 [ 39.365320] print_report+0x118/0x608 [ 39.365339] kasan_report+0xdc/0x128 [ 39.365359] kasan_check_range+0x100/0x1a8 [ 39.365380] __asan_memset+0x34/0x78 [ 39.365396] kmalloc_uaf_memset+0x170/0x310 [ 39.365416] kunit_try_run_case+0x170/0x3f0 [ 39.365435] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.365457] kthread+0x328/0x630 [ 39.365472] ret_from_fork+0x10/0x20 [ 39.365490] [ 39.434114] Allocated by task 284: [ 39.437575] kasan_save_stack+0x3c/0x68 [ 39.441487] kasan_save_track+0x20/0x40 [ 39.445389] kasan_save_alloc_info+0x40/0x58 [ 39.449730] __kasan_kmalloc+0xd4/0xd8 [ 39.453545] __kmalloc_cache_noprof+0x16c/0x3c0 [ 39.458149] kmalloc_uaf_memset+0xb8/0x310 [ 39.462319] kunit_try_run_case+0x170/0x3f0 [ 39.466573] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.472145] kthread+0x328/0x630 [ 39.475439] ret_from_fork+0x10/0x20 [ 39.479084] [ 39.480611] Freed by task 284: [ 39.483716] kasan_save_stack+0x3c/0x68 [ 39.487618] kasan_save_track+0x20/0x40 [ 39.491520] kasan_save_free_info+0x4c/0x78 [ 39.495774] __kasan_slab_free+0x6c/0x98 [ 39.499764] kfree+0x214/0x3c8 [ 39.502878] kmalloc_uaf_memset+0x11c/0x310 [ 39.507138] kunit_try_run_case+0x170/0x3f0 [ 39.511392] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.516960] kthread+0x328/0x630 [ 39.520254] ret_from_fork+0x10/0x20 [ 39.523898] [ 39.525428] The buggy address belongs to the object at ffff000080acfd80 [ 39.525428] which belongs to the cache kmalloc-64 of size 64 [ 39.537916] The buggy address is located 0 bytes inside of [ 39.537916] freed 64-byte region [ffff000080acfd80, ffff000080acfdc0) [ 39.550058] [ 39.551587] The buggy address belongs to the physical page: [ 39.557240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 39.565348] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.571967] page_type: f5(slab) [ 39.575175] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 39.583026] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.590863] page dumped because: kasan: bad access detected [ 39.596511] [ 39.598041] Memory state around the buggy address: [ 39.602906] ffff000080acfc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.610225] ffff000080acfd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.617543] >ffff000080acfd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.624861] ^ [ 39.628152] ffff000080acfe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.635470] ffff000080acfe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.642791] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[ 39.025442] ================================================================== [ 39.037615] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 39.044241] Read of size 1 at addr ffff000080a55188 by task kunit_try_catch/282 [ 39.051653] [ 39.053185] CPU: 2 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 39.053215] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.053226] Hardware name: Thundercomm Dragonboard 845c (DT) [ 39.053238] Call trace: [ 39.053246] show_stack+0x20/0x38 (C) [ 39.053265] dump_stack_lvl+0x8c/0xd0 [ 39.053285] print_report+0x118/0x608 [ 39.053305] kasan_report+0xdc/0x128 [ 39.053325] __asan_report_load1_noabort+0x20/0x30 [ 39.053344] kmalloc_uaf+0x300/0x338 [ 39.053360] kunit_try_run_case+0x170/0x3f0 [ 39.053380] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.053401] kthread+0x328/0x630 [ 39.053418] ret_from_fork+0x10/0x20 [ 39.053437] [ 39.118539] Allocated by task 282: [ 39.122002] kasan_save_stack+0x3c/0x68 [ 39.125904] kasan_save_track+0x20/0x40 [ 39.129809] kasan_save_alloc_info+0x40/0x58 [ 39.134151] __kasan_kmalloc+0xd4/0xd8 [ 39.137966] __kmalloc_cache_noprof+0x16c/0x3c0 [ 39.142571] kmalloc_uaf+0xb8/0x338 [ 39.146126] kunit_try_run_case+0x170/0x3f0 [ 39.150383] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.155957] kthread+0x328/0x630 [ 39.159251] ret_from_fork+0x10/0x20 [ 39.162896] [ 39.164423] Freed by task 282: [ 39.167527] kasan_save_stack+0x3c/0x68 [ 39.171430] kasan_save_track+0x20/0x40 [ 39.175331] kasan_save_free_info+0x4c/0x78 [ 39.179588] __kasan_slab_free+0x6c/0x98 [ 39.183576] kfree+0x214/0x3c8 [ 39.186690] kmalloc_uaf+0x11c/0x338 [ 39.190331] kunit_try_run_case+0x170/0x3f0 [ 39.194589] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.200163] kthread+0x328/0x630 [ 39.203460] ret_from_fork+0x10/0x20 [ 39.207101] [ 39.208630] The buggy address belongs to the object at ffff000080a55180 [ 39.208630] which belongs to the cache kmalloc-16 of size 16 [ 39.221120] The buggy address is located 8 bytes inside of [ 39.221120] freed 16-byte region [ffff000080a55180, ffff000080a55190) [ 39.233257] [ 39.234788] The buggy address belongs to the physical page: [ 39.240440] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a55 [ 39.248550] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.255169] page_type: f5(slab) [ 39.258369] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 39.266220] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 39.274057] page dumped because: kasan: bad access detected [ 39.279709] [ 39.281239] Memory state around the buggy address: [ 39.286105] ffff000080a55080: 00 06 fc fc 00 05 fc fc 00 05 fc fc 00 05 fc fc [ 39.293425] ffff000080a55100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 39.300745] >ffff000080a55180: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.308062] ^ [ 39.311613] ffff000080a55200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.318936] ffff000080a55280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.326254] ==================================================================
Failure - lava - auto-login-action
(no logs available)
Failure - lava - login-action
(no logs available)
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 38.473791] ================================================================== [ 38.485364] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 38.493043] Read of size 18446744073709551614 at addr ffff000080acfc84 by task kunit_try_catch/278 [ 38.502124] [ 38.503658] CPU: 3 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 38.503688] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.503698] Hardware name: Thundercomm Dragonboard 845c (DT) [ 38.503710] Call trace: [ 38.503718] show_stack+0x20/0x38 (C) [ 38.503736] dump_stack_lvl+0x8c/0xd0 [ 38.503756] print_report+0x118/0x608 [ 38.503776] kasan_report+0xdc/0x128 [ 38.503795] kasan_check_range+0x100/0x1a8 [ 38.503815] __asan_memmove+0x3c/0x98 [ 38.503832] kmalloc_memmove_negative_size+0x154/0x2e0 [ 38.503852] kunit_try_run_case+0x170/0x3f0 [ 38.503873] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.503896] kthread+0x328/0x630 [ 38.503911] ret_from_fork+0x10/0x20 [ 38.503928] [ 38.573600] Allocated by task 278: [ 38.577066] kasan_save_stack+0x3c/0x68 [ 38.580973] kasan_save_track+0x20/0x40 [ 38.584879] kasan_save_alloc_info+0x40/0x58 [ 38.589225] __kasan_kmalloc+0xd4/0xd8 [ 38.593043] __kmalloc_cache_noprof+0x16c/0x3c0 [ 38.597651] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 38.602787] kunit_try_run_case+0x170/0x3f0 [ 38.607048] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.612618] kthread+0x328/0x630 [ 38.615906] ret_from_fork+0x10/0x20 [ 38.619549] [ 38.621081] The buggy address belongs to the object at ffff000080acfc80 [ 38.621081] which belongs to the cache kmalloc-64 of size 64 [ 38.633570] The buggy address is located 4 bytes inside of [ 38.633570] 64-byte region [ffff000080acfc80, ffff000080acfcc0) [ 38.645187] [ 38.646718] The buggy address belongs to the physical page: [ 38.652365] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100acf [ 38.660470] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.667085] page_type: f5(slab) [ 38.670285] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 38.678133] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.685976] page dumped because: kasan: bad access detected [ 38.691621] [ 38.693151] Memory state around the buggy address: [ 38.698010] ffff000080acfb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.705325] ffff000080acfc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.712641] >ffff000080acfc80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 38.719953] ^ [ 38.723236] ffff000080acfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.730552] ffff000080acfd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.737866] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[ 38.156845] ================================================================== [ 38.168313] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 38.175731] Write of size 16 at addr ffff000080df5b69 by task kunit_try_catch/276 [ 38.183319] [ 38.184854] CPU: 2 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 38.184882] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.184892] Hardware name: Thundercomm Dragonboard 845c (DT) [ 38.184902] Call trace: [ 38.184908] show_stack+0x20/0x38 (C) [ 38.184927] dump_stack_lvl+0x8c/0xd0 [ 38.184949] print_report+0x118/0x608 [ 38.184968] kasan_report+0xdc/0x128 [ 38.184986] kasan_check_range+0x100/0x1a8 [ 38.185007] __asan_memset+0x34/0x78 [ 38.185022] kmalloc_oob_memset_16+0x150/0x2f8 [ 38.185042] kunit_try_run_case+0x170/0x3f0 [ 38.185063] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.185084] kthread+0x328/0x630 [ 38.185100] ret_from_fork+0x10/0x20 [ 38.185119] [ 38.254013] Allocated by task 276: [ 38.257478] kasan_save_stack+0x3c/0x68 [ 38.261385] kasan_save_track+0x20/0x40 [ 38.265291] kasan_save_alloc_info+0x40/0x58 [ 38.269635] __kasan_kmalloc+0xd4/0xd8 [ 38.273453] __kmalloc_cache_noprof+0x16c/0x3c0 [ 38.278061] kmalloc_oob_memset_16+0xb0/0x2f8 [ 38.282493] kunit_try_run_case+0x170/0x3f0 [ 38.286754] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.292324] kthread+0x328/0x630 [ 38.295610] ret_from_fork+0x10/0x20 [ 38.299254] [ 38.300784] The buggy address belongs to the object at ffff000080df5b00 [ 38.300784] which belongs to the cache kmalloc-128 of size 128 [ 38.313445] The buggy address is located 105 bytes inside of [ 38.313445] allocated 120-byte region [ffff000080df5b00, ffff000080df5b78) [ 38.326195] [ 38.327726] The buggy address belongs to the physical page: [ 38.333373] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100df4 [ 38.341478] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 38.349235] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 38.356295] page_type: f5(slab) [ 38.359495] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 38.367343] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.375190] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 38.383125] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.391057] head: 0bfffe0000000001 fffffdffc2037d01 00000000ffffffff 00000000ffffffff [ 38.398991] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 38.406919] page dumped because: kasan: bad access detected [ 38.412565] [ 38.414094] Memory state around the buggy address: [ 38.418953] ffff000080df5a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.426268] ffff000080df5a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.433583] >ffff000080df5b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 38.440896] ^ [ 38.448122] ffff000080df5b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.455437] ffff000080df5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.462750] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[ 37.839843] ================================================================== [ 37.851323] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 37.858642] Write of size 8 at addr ffff000080f19171 by task kunit_try_catch/274 [ 37.866140] [ 37.867676] CPU: 4 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 37.867707] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.867716] Hardware name: Thundercomm Dragonboard 845c (DT) [ 37.867726] Call trace: [ 37.867732] show_stack+0x20/0x38 (C) [ 37.867750] dump_stack_lvl+0x8c/0xd0 [ 37.867769] print_report+0x118/0x608 [ 37.867788] kasan_report+0xdc/0x128 [ 37.867806] kasan_check_range+0x100/0x1a8 [ 37.867825] __asan_memset+0x34/0x78 [ 37.867840] kmalloc_oob_memset_8+0x150/0x2f8 [ 37.867857] kunit_try_run_case+0x170/0x3f0 [ 37.867876] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.867897] kthread+0x328/0x630 [ 37.867910] ret_from_fork+0x10/0x20 [ 37.867927] [ 37.936672] Allocated by task 274: [ 37.940126] kasan_save_stack+0x3c/0x68 [ 37.944033] kasan_save_track+0x20/0x40 [ 37.947938] kasan_save_alloc_info+0x40/0x58 [ 37.952273] __kasan_kmalloc+0xd4/0xd8 [ 37.956088] __kmalloc_cache_noprof+0x16c/0x3c0 [ 37.960686] kmalloc_oob_memset_8+0xb0/0x2f8 [ 37.965023] kunit_try_run_case+0x170/0x3f0 [ 37.969272] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.974836] kthread+0x328/0x630 [ 37.978118] ret_from_fork+0x10/0x20 [ 37.981747] [ 37.983278] The buggy address belongs to the object at ffff000080f19100 [ 37.983278] which belongs to the cache kmalloc-128 of size 128 [ 37.995930] The buggy address is located 113 bytes inside of [ 37.995930] allocated 120-byte region [ffff000080f19100, ffff000080f19178) [ 38.008672] [ 38.010197] The buggy address belongs to the physical page: [ 38.015837] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100f18 [ 38.023937] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 38.031687] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 38.038738] page_type: f5(slab) [ 38.041935] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 38.049775] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.057616] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 38.065542] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.073469] head: 0bfffe0000000001 fffffdffc203c601 00000000ffffffff 00000000ffffffff [ 38.081393] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 38.089313] page dumped because: kasan: bad access detected [ 38.094956] [ 38.096484] Memory state around the buggy address: [ 38.101337] ffff000080f19000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.108652] ffff000080f19080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.115967] >ffff000080f19100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 38.123270] ^ [ 38.130488] ffff000080f19180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.137805] ffff000080f19200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.145115] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[ 37.522388] ================================================================== [ 37.533861] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 37.541190] Write of size 4 at addr ffff0000822c2875 by task kunit_try_catch/272 [ 37.548688] [ 37.550222] CPU: 3 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 37.550252] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.550261] Hardware name: Thundercomm Dragonboard 845c (DT) [ 37.550273] Call trace: [ 37.550281] show_stack+0x20/0x38 (C) [ 37.550300] dump_stack_lvl+0x8c/0xd0 [ 37.550318] print_report+0x118/0x608 [ 37.550338] kasan_report+0xdc/0x128 [ 37.550358] kasan_check_range+0x100/0x1a8 [ 37.550378] __asan_memset+0x34/0x78 [ 37.550394] kmalloc_oob_memset_4+0x150/0x300 [ 37.550413] kunit_try_run_case+0x170/0x3f0 [ 37.550432] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.550454] kthread+0x328/0x630 [ 37.550469] ret_from_fork+0x10/0x20 [ 37.550487] [ 37.619269] Allocated by task 272: [ 37.622729] kasan_save_stack+0x3c/0x68 [ 37.626639] kasan_save_track+0x20/0x40 [ 37.630547] kasan_save_alloc_info+0x40/0x58 [ 37.634885] __kasan_kmalloc+0xd4/0xd8 [ 37.638704] __kmalloc_cache_noprof+0x16c/0x3c0 [ 37.643314] kmalloc_oob_memset_4+0xb0/0x300 [ 37.647652] kunit_try_run_case+0x170/0x3f0 [ 37.651902] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.657474] kthread+0x328/0x630 [ 37.660762] ret_from_fork+0x10/0x20 [ 37.664400] [ 37.665931] The buggy address belongs to the object at ffff0000822c2800 [ 37.665931] which belongs to the cache kmalloc-128 of size 128 [ 37.678593] The buggy address is located 117 bytes inside of [ 37.678593] allocated 120-byte region [ffff0000822c2800, ffff0000822c2878) [ 37.691342] [ 37.692879] The buggy address belongs to the physical page: [ 37.698530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022c2 [ 37.706643] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 37.714402] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 37.721458] page_type: f5(slab) [ 37.724659] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 37.732504] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.740348] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 37.748279] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.756210] head: 0bfffe0000000001 fffffdffc208b081 00000000ffffffff 00000000ffffffff [ 37.764141] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 37.772065] page dumped because: kasan: bad access detected [ 37.777714] [ 37.779241] Memory state around the buggy address: [ 37.784099] ffff0000822c2700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.791415] ffff0000822c2780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.798729] >ffff0000822c2800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.806049] ^ [ 37.813283] ffff0000822c2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.820606] ffff0000822c2900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.827926] ==================================================================
Failure - boot - gcc-13-lkftconfig-kunit
(no logs available)
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[ 37.204557] ================================================================== [ 37.216118] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 37.223436] Write of size 2 at addr ffff0000822c2777 by task kunit_try_catch/270 [ 37.230939] [ 37.232473] CPU: 3 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 37.232504] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.232512] Hardware name: Thundercomm Dragonboard 845c (DT) [ 37.232523] Call trace: [ 37.232530] show_stack+0x20/0x38 (C) [ 37.232548] dump_stack_lvl+0x8c/0xd0 [ 37.232566] print_report+0x118/0x608 [ 37.232585] kasan_report+0xdc/0x128 [ 37.232605] kasan_check_range+0x100/0x1a8 [ 37.232626] __asan_memset+0x34/0x78 [ 37.232642] kmalloc_oob_memset_2+0x150/0x2f8 [ 37.232661] kunit_try_run_case+0x170/0x3f0 [ 37.232679] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.232701] kthread+0x328/0x630 [ 37.232716] ret_from_fork+0x10/0x20 [ 37.232733] [ 37.301530] Allocated by task 270: [ 37.304996] kasan_save_stack+0x3c/0x68 [ 37.308904] kasan_save_track+0x20/0x40 [ 37.312808] kasan_save_alloc_info+0x40/0x58 [ 37.317154] __kasan_kmalloc+0xd4/0xd8 [ 37.320971] __kmalloc_cache_noprof+0x16c/0x3c0 [ 37.325578] kmalloc_oob_memset_2+0xb0/0x2f8 [ 37.329925] kunit_try_run_case+0x170/0x3f0 [ 37.334185] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.339756] kthread+0x328/0x630 [ 37.343042] ret_from_fork+0x10/0x20 [ 37.346686] [ 37.348216] The buggy address belongs to the object at ffff0000822c2700 [ 37.348216] which belongs to the cache kmalloc-128 of size 128 [ 37.360877] The buggy address is located 119 bytes inside of [ 37.360877] allocated 120-byte region [ffff0000822c2700, ffff0000822c2778) [ 37.373626] [ 37.375157] The buggy address belongs to the physical page: [ 37.380803] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022c2 [ 37.388907] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 37.396664] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 37.403722] page_type: f5(slab) [ 37.406923] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 37.414770] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.422618] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 37.430551] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.438485] head: 0bfffe0000000001 fffffdffc208b081 00000000ffffffff 00000000ffffffff [ 37.446418] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 37.454347] page dumped because: kasan: bad access detected [ 37.459993] [ 37.461523] Memory state around the buggy address: [ 37.466380] ffff0000822c2600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.473696] ffff0000822c2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.481010] >ffff0000822c2700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.488325] ^ [ 37.495552] ffff0000822c2780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.502868] ffff0000822c2800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.510179] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 36.886759] ================================================================== [ 36.897705] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 36.905111] Write of size 128 at addr ffff0000822c2600 by task kunit_try_catch/268 [ 36.912787] [ 36.914322] CPU: 3 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 36.914353] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.914363] Hardware name: Thundercomm Dragonboard 845c (DT) [ 36.914374] Call trace: [ 36.914382] show_stack+0x20/0x38 (C) [ 36.914400] dump_stack_lvl+0x8c/0xd0 [ 36.914419] print_report+0x118/0x608 [ 36.914440] kasan_report+0xdc/0x128 [ 36.914459] kasan_check_range+0x100/0x1a8 [ 36.914481] __asan_memset+0x34/0x78 [ 36.914497] kmalloc_oob_in_memset+0x144/0x2d0 [ 36.914515] kunit_try_run_case+0x170/0x3f0 [ 36.914535] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.914557] kthread+0x328/0x630 [ 36.914572] ret_from_fork+0x10/0x20 [ 36.914590] [ 36.983472] Allocated by task 268: [ 36.986937] kasan_save_stack+0x3c/0x68 [ 36.990845] kasan_save_track+0x20/0x40 [ 36.994752] kasan_save_alloc_info+0x40/0x58 [ 36.999096] __kasan_kmalloc+0xd4/0xd8 [ 37.002914] __kmalloc_cache_noprof+0x16c/0x3c0 [ 37.007521] kmalloc_oob_in_memset+0xb0/0x2d0 [ 37.011954] kunit_try_run_case+0x170/0x3f0 [ 37.016214] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.021785] kthread+0x328/0x630 [ 37.025071] ret_from_fork+0x10/0x20 [ 37.028716] [ 37.030247] The buggy address belongs to the object at ffff0000822c2600 [ 37.030247] which belongs to the cache kmalloc-128 of size 128 [ 37.042908] The buggy address is located 0 bytes inside of [ 37.042908] allocated 120-byte region [ffff0000822c2600, ffff0000822c2678) [ 37.055487] [ 37.057018] The buggy address belongs to the physical page: [ 37.062664] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022c2 [ 37.070768] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 37.078527] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 37.085585] page_type: f5(slab) [ 37.088784] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 37.096632] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.104479] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 37.112413] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.120346] head: 0bfffe0000000001 fffffdffc208b081 00000000ffffffff 00000000ffffffff [ 37.128280] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 37.136210] page dumped because: kasan: bad access detected [ 37.141856] [ 37.143386] Memory state around the buggy address: [ 37.148245] ffff0000822c2500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.155559] ffff0000822c2580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.162875] >ffff0000822c2600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.170188] ^ [ 37.177414] ffff0000822c2680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.184730] ffff0000822c2700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.192042] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[ 36.575182] ================================================================== [ 36.586123] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 36.593000] Read of size 16 at addr ffff0000958f6180 by task kunit_try_catch/266 [ 36.600487] [ 36.602018] CPU: 4 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 36.602049] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.602057] Hardware name: Thundercomm Dragonboard 845c (DT) [ 36.602068] Call trace: [ 36.602074] show_stack+0x20/0x38 (C) [ 36.602092] dump_stack_lvl+0x8c/0xd0 [ 36.602110] print_report+0x118/0x608 [ 36.602129] kasan_report+0xdc/0x128 [ 36.602147] __asan_report_load16_noabort+0x20/0x30 [ 36.602164] kmalloc_uaf_16+0x3bc/0x438 [ 36.602179] kunit_try_run_case+0x170/0x3f0 [ 36.602198] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.602220] kthread+0x328/0x630 [ 36.602232] ret_from_fork+0x10/0x20 [ 36.602248] [ 36.667641] Allocated by task 266: [ 36.671097] kasan_save_stack+0x3c/0x68 [ 36.674996] kasan_save_track+0x20/0x40 [ 36.678902] kasan_save_alloc_info+0x40/0x58 [ 36.683234] __kasan_kmalloc+0xd4/0xd8 [ 36.687041] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.691639] kmalloc_uaf_16+0x140/0x438 [ 36.695541] kunit_try_run_case+0x170/0x3f0 [ 36.699791] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.705357] kthread+0x328/0x630 [ 36.708639] ret_from_fork+0x10/0x20 [ 36.712271] [ 36.713795] Freed by task 266: [ 36.716900] kasan_save_stack+0x3c/0x68 [ 36.720795] kasan_save_track+0x20/0x40 [ 36.724700] kasan_save_free_info+0x4c/0x78 [ 36.728948] __kasan_slab_free+0x6c/0x98 [ 36.732939] kfree+0x214/0x3c8 [ 36.736050] kmalloc_uaf_16+0x190/0x438 [ 36.739952] kunit_try_run_case+0x170/0x3f0 [ 36.744203] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.749768] kthread+0x328/0x630 [ 36.753052] ret_from_fork+0x10/0x20 [ 36.756683] [ 36.758207] The buggy address belongs to the object at ffff0000958f6180 [ 36.758207] which belongs to the cache kmalloc-16 of size 16 [ 36.770690] The buggy address is located 0 bytes inside of [ 36.770690] freed 16-byte region [ffff0000958f6180, ffff0000958f6190) [ 36.782817] [ 36.784348] The buggy address belongs to the physical page: [ 36.789990] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1158f6 [ 36.798093] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.804705] page_type: f5(slab) [ 36.807902] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 36.815754] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 36.823598] page dumped because: kasan: bad access detected [ 36.829245] [ 36.830770] Memory state around the buggy address: [ 36.835632] ffff0000958f6080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 36.842945] ffff0000958f6100: fa fb fc fc fa fb fc fc fa fb fc fc 00 00 fc fc [ 36.850252] >ffff0000958f6180: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.857568] ^ [ 36.860850] ffff0000958f6200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.868157] ffff0000958f6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.875462] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[ 36.305296] ================================================================== [ 36.316074] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 36.322873] Write of size 16 at addr ffff000080a55140 by task kunit_try_catch/264 [ 36.330463] [ 36.331998] CPU: 2 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 36.332028] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.332037] Hardware name: Thundercomm Dragonboard 845c (DT) [ 36.332049] Call trace: [ 36.332058] show_stack+0x20/0x38 (C) [ 36.332076] dump_stack_lvl+0x8c/0xd0 [ 36.332095] print_report+0x118/0x608 [ 36.332115] kasan_report+0xdc/0x128 [ 36.332134] __asan_report_store16_noabort+0x20/0x30 [ 36.332153] kmalloc_oob_16+0x3a0/0x3f8 [ 36.332171] kunit_try_run_case+0x170/0x3f0 [ 36.332190] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.332212] kthread+0x328/0x630 [ 36.332229] ret_from_fork+0x10/0x20 [ 36.332246] [ 36.397775] Allocated by task 264: [ 36.401240] kasan_save_stack+0x3c/0x68 [ 36.405147] kasan_save_track+0x20/0x40 [ 36.409052] kasan_save_alloc_info+0x40/0x58 [ 36.413396] __kasan_kmalloc+0xd4/0xd8 [ 36.417213] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.421821] kmalloc_oob_16+0xb4/0x3f8 [ 36.425638] kunit_try_run_case+0x170/0x3f0 [ 36.429896] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.435466] kthread+0x328/0x630 [ 36.438752] ret_from_fork+0x10/0x20 [ 36.442396] [ 36.443926] The buggy address belongs to the object at ffff000080a55140 [ 36.443926] which belongs to the cache kmalloc-16 of size 16 [ 36.456415] The buggy address is located 0 bytes inside of [ 36.456415] allocated 13-byte region [ffff000080a55140, ffff000080a5514d) [ 36.468906] [ 36.470435] The buggy address belongs to the physical page: [ 36.476082] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a55 [ 36.484187] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.490810] page_type: f5(slab) [ 36.494011] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 36.501859] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 36.509702] page dumped because: kasan: bad access detected [ 36.515347] [ 36.516876] Memory state around the buggy address: [ 36.521735] ffff000080a55000: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 36.529050] ffff000080a55080: 00 06 fc fc 00 05 fc fc 00 05 fc fc 00 05 fc fc [ 36.536366] >ffff000080a55100: fa fb fc fc fa fb fc fc 00 05 fc fc 00 00 fc fc [ 36.543678] ^ [ 36.549326] ffff000080a55180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.556642] ffff000080a55200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.563956] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 35.956371] ================================================================== [ 35.963690] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 35.970396] Read of size 1 at addr ffff000086408c00 by task kunit_try_catch/262 [ 35.977811] [ 35.979342] CPU: 3 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 35.979372] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.979381] Hardware name: Thundercomm Dragonboard 845c (DT) [ 35.979394] Call trace: [ 35.979400] show_stack+0x20/0x38 (C) [ 35.979418] dump_stack_lvl+0x8c/0xd0 [ 35.979437] print_report+0x118/0x608 [ 35.979457] kasan_report+0xdc/0x128 [ 35.979477] __asan_report_load1_noabort+0x20/0x30 [ 35.979495] krealloc_uaf+0x4c8/0x520 [ 35.979511] kunit_try_run_case+0x170/0x3f0 [ 35.979531] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.979552] kthread+0x328/0x630 [ 35.979567] ret_from_fork+0x10/0x20 [ 35.979585] [ 36.044749] Allocated by task 262: [ 36.048209] kasan_save_stack+0x3c/0x68 [ 36.052119] kasan_save_track+0x20/0x40 [ 36.056030] kasan_save_alloc_info+0x40/0x58 [ 36.060369] __kasan_kmalloc+0xd4/0xd8 [ 36.064192] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.068805] krealloc_uaf+0xc8/0x520 [ 36.072444] kunit_try_run_case+0x170/0x3f0 [ 36.076698] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.082274] kthread+0x328/0x630 [ 36.085564] ret_from_fork+0x10/0x20 [ 36.089205] [ 36.090735] Freed by task 262: [ 36.093846] kasan_save_stack+0x3c/0x68 [ 36.097758] kasan_save_track+0x20/0x40 [ 36.101667] kasan_save_free_info+0x4c/0x78 [ 36.105920] __kasan_slab_free+0x6c/0x98 [ 36.109917] kfree+0x214/0x3c8 [ 36.113037] krealloc_uaf+0x12c/0x520 [ 36.116771] kunit_try_run_case+0x170/0x3f0 [ 36.121027] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.126598] kthread+0x328/0x630 [ 36.129891] ret_from_fork+0x10/0x20 [ 36.133528] [ 36.135056] The buggy address belongs to the object at ffff000086408c00 [ 36.135056] which belongs to the cache kmalloc-256 of size 256 [ 36.147717] The buggy address is located 0 bytes inside of [ 36.147717] freed 256-byte region [ffff000086408c00, ffff000086408d00) [ 36.159942] [ 36.161473] The buggy address belongs to the physical page: [ 36.167121] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106408 [ 36.175225] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.182985] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.190042] page_type: f5(slab) [ 36.193248] raw: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 36.201095] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.208943] head: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 36.216875] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.224808] head: 0bfffe0000000002 fffffdffc2190201 00000000ffffffff 00000000ffffffff [ 36.232739] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 36.240668] page dumped because: kasan: bad access detected [ 36.246318] [ 36.247853] Memory state around the buggy address: [ 36.252716] ffff000086408b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.260041] ffff000086408b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.267358] >ffff000086408c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.274674] ^ [ 36.277961] ffff000086408c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.285277] ffff000086408d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.292588] ================================================================== [ 35.605223] ================================================================== [ 35.616954] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 35.623666] Read of size 1 at addr ffff000086408c00 by task kunit_try_catch/262 [ 35.631070] [ 35.632608] CPU: 3 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 35.632636] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.632644] Hardware name: Thundercomm Dragonboard 845c (DT) [ 35.632655] Call trace: [ 35.632662] show_stack+0x20/0x38 (C) [ 35.632681] dump_stack_lvl+0x8c/0xd0 [ 35.632700] print_report+0x118/0x608 [ 35.632719] kasan_report+0xdc/0x128 [ 35.632737] __kasan_check_byte+0x54/0x70 [ 35.632757] krealloc_noprof+0x44/0x360 [ 35.632779] krealloc_uaf+0x180/0x520 [ 35.632796] kunit_try_run_case+0x170/0x3f0 [ 35.632815] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.632838] kthread+0x328/0x630 [ 35.632854] ret_from_fork+0x10/0x20 [ 35.632871] [ 35.701135] Allocated by task 262: [ 35.704596] kasan_save_stack+0x3c/0x68 [ 35.708505] kasan_save_track+0x20/0x40 [ 35.712415] kasan_save_alloc_info+0x40/0x58 [ 35.716755] __kasan_kmalloc+0xd4/0xd8 [ 35.720577] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.725188] krealloc_uaf+0xc8/0x520 [ 35.728827] kunit_try_run_case+0x170/0x3f0 [ 35.733080] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.738653] kthread+0x328/0x630 [ 35.741943] ret_from_fork+0x10/0x20 [ 35.745582] [ 35.747109] Freed by task 262: [ 35.750222] kasan_save_stack+0x3c/0x68 [ 35.754133] kasan_save_track+0x20/0x40 [ 35.758042] kasan_save_free_info+0x4c/0x78 [ 35.762295] __kasan_slab_free+0x6c/0x98 [ 35.766290] kfree+0x214/0x3c8 [ 35.769411] krealloc_uaf+0x12c/0x520 [ 35.773145] kunit_try_run_case+0x170/0x3f0 [ 35.777400] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.782971] kthread+0x328/0x630 [ 35.786263] ret_from_fork+0x10/0x20 [ 35.789900] [ 35.791426] The buggy address belongs to the object at ffff000086408c00 [ 35.791426] which belongs to the cache kmalloc-256 of size 256 [ 35.804087] The buggy address is located 0 bytes inside of [ 35.804087] freed 256-byte region [ffff000086408c00, ffff000086408d00) [ 35.816309] [ 35.817839] The buggy address belongs to the physical page: [ 35.823487] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106408 [ 35.831588] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 35.839344] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 35.846405] page_type: f5(slab) [ 35.849613] raw: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 35.857458] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.865305] head: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 35.873237] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.881169] head: 0bfffe0000000002 fffffdffc2190201 00000000ffffffff 00000000ffffffff [ 35.889102] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 35.897029] page dumped because: kasan: bad access detected [ 35.902680] [ 35.904215] Memory state around the buggy address: [ 35.909077] ffff000086408b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.916401] ffff000086408b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.923717] >ffff000086408c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.931032] ^ [ 35.934321] ffff000086408c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.941635] ffff000086408d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.948948] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 34.891734] ================================================================== [ 34.899052] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 34.906727] Write of size 1 at addr ffff0000864220da by task kunit_try_catch/260 [ 34.914222] [ 34.915759] CPU: 4 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 34.915788] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.915796] Hardware name: Thundercomm Dragonboard 845c (DT) [ 34.915808] Call trace: [ 34.915813] show_stack+0x20/0x38 (C) [ 34.915831] dump_stack_lvl+0x8c/0xd0 [ 34.915850] print_report+0x118/0x608 [ 34.915869] kasan_report+0xdc/0x128 [ 34.915887] __asan_report_store1_noabort+0x20/0x30 [ 34.915904] krealloc_less_oob_helper+0xa80/0xc50 [ 34.915922] krealloc_large_less_oob+0x20/0x38 [ 34.915939] kunit_try_run_case+0x170/0x3f0 [ 34.915956] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.915975] kthread+0x328/0x630 [ 34.915989] ret_from_fork+0x10/0x20 [ 34.916005] [ 34.986751] The buggy address belongs to the physical page: [ 34.992391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106420 [ 35.000492] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 35.008244] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 35.015291] page_type: f8(unknown) [ 35.018751] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 35.026591] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 35.034431] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 35.042358] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 35.050282] head: 0bfffe0000000002 fffffdffc2190801 00000000ffffffff 00000000ffffffff [ 35.058207] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 35.066127] page dumped because: kasan: bad access detected [ 35.071766] [ 35.073289] Memory state around the buggy address: [ 35.078140] ffff000086421f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.085454] ffff000086422000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.092759] >ffff000086422080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 35.100072] ^ [ 35.106239] ffff000086422100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 35.113553] ffff000086422180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 35.120865] ================================================================== [ 33.614804] ================================================================== [ 33.622122] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 33.629787] Write of size 1 at addr ffff000086408aeb by task kunit_try_catch/256 [ 33.637280] [ 33.638805] CPU: 5 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 33.638832] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.638839] Hardware name: Thundercomm Dragonboard 845c (DT) [ 33.638848] Call trace: [ 33.638853] show_stack+0x20/0x38 (C) [ 33.638869] dump_stack_lvl+0x8c/0xd0 [ 33.638886] print_report+0x118/0x608 [ 33.638904] kasan_report+0xdc/0x128 [ 33.638921] __asan_report_store1_noabort+0x20/0x30 [ 33.638936] krealloc_less_oob_helper+0xa58/0xc50 [ 33.638953] krealloc_less_oob+0x20/0x38 [ 33.638968] kunit_try_run_case+0x170/0x3f0 [ 33.638985] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.639004] kthread+0x328/0x630 [ 33.639017] ret_from_fork+0x10/0x20 [ 33.639033] [ 33.709274] Allocated by task 256: [ 33.712726] kasan_save_stack+0x3c/0x68 [ 33.716630] kasan_save_track+0x20/0x40 [ 33.720535] kasan_save_alloc_info+0x40/0x58 [ 33.724867] __kasan_krealloc+0x118/0x178 [ 33.728944] krealloc_noprof+0x128/0x360 [ 33.732931] krealloc_less_oob_helper+0x168/0xc50 [ 33.737702] krealloc_less_oob+0x20/0x38 [ 33.741691] kunit_try_run_case+0x170/0x3f0 [ 33.745940] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.751500] kthread+0x328/0x630 [ 33.754786] ret_from_fork+0x10/0x20 [ 33.758425] [ 33.759954] The buggy address belongs to the object at ffff000086408a00 [ 33.759954] which belongs to the cache kmalloc-256 of size 256 [ 33.772605] The buggy address is located 34 bytes to the right of [ 33.772605] allocated 201-byte region [ffff000086408a00, ffff000086408ac9) [ 33.785781] [ 33.787310] The buggy address belongs to the physical page: [ 33.792951] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106408 [ 33.801050] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.808799] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.815844] page_type: f5(slab) [ 33.819041] raw: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 33.826880] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.834719] head: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 33.842641] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.850565] head: 0bfffe0000000002 fffffdffc2190201 00000000ffffffff 00000000ffffffff [ 33.858490] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 33.866409] page dumped because: kasan: bad access detected [ 33.872047] [ 33.873569] Memory state around the buggy address: [ 33.878420] ffff000086408980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.885734] ffff000086408a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.893048] >ffff000086408a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 33.900359] ^ [ 33.907052] ffff000086408b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.914357] ffff000086408b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.921669] ================================================================== [ 32.986878] ================================================================== [ 32.994196] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 33.001870] Write of size 1 at addr ffff000086408ada by task kunit_try_catch/256 [ 33.009362] [ 33.010891] CPU: 5 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 33.010921] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.010928] Hardware name: Thundercomm Dragonboard 845c (DT) [ 33.010939] Call trace: [ 33.010944] show_stack+0x20/0x38 (C) [ 33.010962] dump_stack_lvl+0x8c/0xd0 [ 33.010979] print_report+0x118/0x608 [ 33.010998] kasan_report+0xdc/0x128 [ 33.011015] __asan_report_store1_noabort+0x20/0x30 [ 33.011031] krealloc_less_oob_helper+0xa80/0xc50 [ 33.011049] krealloc_less_oob+0x20/0x38 [ 33.011065] kunit_try_run_case+0x170/0x3f0 [ 33.011082] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.011101] kthread+0x328/0x630 [ 33.011114] ret_from_fork+0x10/0x20 [ 33.011130] [ 33.081345] Allocated by task 256: [ 33.084798] kasan_save_stack+0x3c/0x68 [ 33.088696] kasan_save_track+0x20/0x40 [ 33.092600] kasan_save_alloc_info+0x40/0x58 [ 33.096935] __kasan_krealloc+0x118/0x178 [ 33.101013] krealloc_noprof+0x128/0x360 [ 33.105004] krealloc_less_oob_helper+0x168/0xc50 [ 33.109775] krealloc_less_oob+0x20/0x38 [ 33.113765] kunit_try_run_case+0x170/0x3f0 [ 33.118015] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.123578] kthread+0x328/0x630 [ 33.126863] ret_from_fork+0x10/0x20 [ 33.130495] [ 33.132025] The buggy address belongs to the object at ffff000086408a00 [ 33.132025] which belongs to the cache kmalloc-256 of size 256 [ 33.144674] The buggy address is located 17 bytes to the right of [ 33.144674] allocated 201-byte region [ffff000086408a00, ffff000086408ac9) [ 33.157851] [ 33.159382] The buggy address belongs to the physical page: [ 33.165025] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106408 [ 33.173126] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.180878] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.187925] page_type: f5(slab) [ 33.191124] raw: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 33.198966] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.206807] head: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 33.214731] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.222657] head: 0bfffe0000000002 fffffdffc2190201 00000000ffffffff 00000000ffffffff [ 33.230582] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 33.238504] page dumped because: kasan: bad access detected [ 33.244143] [ 33.245664] Memory state around the buggy address: [ 33.250516] ffff000086408980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.257822] ffff000086408a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.265127] >ffff000086408a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 33.272430] ^ [ 33.278598] ffff000086408b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.285903] ffff000086408b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.293205] ================================================================== [ 32.672387] ================================================================== [ 32.679705] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 32.687382] Write of size 1 at addr ffff000086408ad0 by task kunit_try_catch/256 [ 32.694873] [ 32.696412] CPU: 3 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 32.696441] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.696452] Hardware name: Thundercomm Dragonboard 845c (DT) [ 32.696463] Call trace: [ 32.696469] show_stack+0x20/0x38 (C) [ 32.696487] dump_stack_lvl+0x8c/0xd0 [ 32.696505] print_report+0x118/0x608 [ 32.696524] kasan_report+0xdc/0x128 [ 32.696542] __asan_report_store1_noabort+0x20/0x30 [ 32.696559] krealloc_less_oob_helper+0xb9c/0xc50 [ 32.696579] krealloc_less_oob+0x20/0x38 [ 32.696597] kunit_try_run_case+0x170/0x3f0 [ 32.696615] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.696638] kthread+0x328/0x630 [ 32.696653] ret_from_fork+0x10/0x20 [ 32.696671] [ 32.766953] Allocated by task 256: [ 32.770412] kasan_save_stack+0x3c/0x68 [ 32.774325] kasan_save_track+0x20/0x40 [ 32.778235] kasan_save_alloc_info+0x40/0x58 [ 32.782575] __kasan_krealloc+0x118/0x178 [ 32.786657] krealloc_noprof+0x128/0x360 [ 32.790656] krealloc_less_oob_helper+0x168/0xc50 [ 32.795438] krealloc_less_oob+0x20/0x38 [ 32.799434] kunit_try_run_case+0x170/0x3f0 [ 32.803688] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.809261] kthread+0x328/0x630 [ 32.812554] ret_from_fork+0x10/0x20 [ 32.816192] [ 32.817722] The buggy address belongs to the object at ffff000086408a00 [ 32.817722] which belongs to the cache kmalloc-256 of size 256 [ 32.830377] The buggy address is located 7 bytes to the right of [ 32.830377] allocated 201-byte region [ffff000086408a00, ffff000086408ac9) [ 32.843476] [ 32.845002] The buggy address belongs to the physical page: [ 32.850651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106408 [ 32.858757] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.866514] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.873572] page_type: f5(slab) [ 32.876776] raw: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 32.884622] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.892468] head: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 32.900400] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.908334] head: 0bfffe0000000002 fffffdffc2190201 00000000ffffffff 00000000ffffffff [ 32.916268] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.924196] page dumped because: kasan: bad access detected [ 32.929846] [ 32.931374] Memory state around the buggy address: [ 32.936233] ffff000086408980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.943551] ffff000086408a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.950868] >ffff000086408a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 32.958179] ^ [ 32.964098] ffff000086408b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.971416] ffff000086408b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.978730] ================================================================== [ 32.355014] ================================================================== [ 32.366226] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 32.373905] Write of size 1 at addr ffff000086408ac9 by task kunit_try_catch/256 [ 32.381405] [ 32.382939] CPU: 3 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 32.382967] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.382976] Hardware name: Thundercomm Dragonboard 845c (DT) [ 32.382988] Call trace: [ 32.382994] show_stack+0x20/0x38 (C) [ 32.383013] dump_stack_lvl+0x8c/0xd0 [ 32.383032] print_report+0x118/0x608 [ 32.383050] kasan_report+0xdc/0x128 [ 32.383069] __asan_report_store1_noabort+0x20/0x30 [ 32.383086] krealloc_less_oob_helper+0xa48/0xc50 [ 32.383105] krealloc_less_oob+0x20/0x38 [ 32.383125] kunit_try_run_case+0x170/0x3f0 [ 32.383144] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.383166] kthread+0x328/0x630 [ 32.383181] ret_from_fork+0x10/0x20 [ 32.383198] [ 32.453466] Allocated by task 256: [ 32.456927] kasan_save_stack+0x3c/0x68 [ 32.460840] kasan_save_track+0x20/0x40 [ 32.464753] kasan_save_alloc_info+0x40/0x58 [ 32.469093] __kasan_krealloc+0x118/0x178 [ 32.473177] krealloc_noprof+0x128/0x360 [ 32.477175] krealloc_less_oob_helper+0x168/0xc50 [ 32.481960] krealloc_less_oob+0x20/0x38 [ 32.485956] kunit_try_run_case+0x170/0x3f0 [ 32.490211] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.495781] kthread+0x328/0x630 [ 32.499075] ret_from_fork+0x10/0x20 [ 32.502715] [ 32.504252] The buggy address belongs to the object at ffff000086408a00 [ 32.504252] which belongs to the cache kmalloc-256 of size 256 [ 32.516907] The buggy address is located 0 bytes to the right of [ 32.516907] allocated 201-byte region [ffff000086408a00, ffff000086408ac9) [ 32.530008] [ 32.531537] The buggy address belongs to the physical page: [ 32.537187] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106408 [ 32.545292] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.553052] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.560108] page_type: f5(slab) [ 32.563315] raw: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 32.571163] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.579010] head: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 32.586943] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.594876] head: 0bfffe0000000002 fffffdffc2190201 00000000ffffffff 00000000ffffffff [ 32.602807] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.610737] page dumped because: kasan: bad access detected [ 32.616383] [ 32.617914] Memory state around the buggy address: [ 32.622778] ffff000086408980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.630094] ffff000086408a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.637409] >ffff000086408a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 32.644721] ^ [ 32.650374] ffff000086408b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.657691] ffff000086408b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.665004] ================================================================== [ 35.128228] ================================================================== [ 35.135545] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 35.143216] Write of size 1 at addr ffff0000864220ea by task kunit_try_catch/260 [ 35.150701] [ 35.152234] CPU: 4 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 35.152260] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.152267] Hardware name: Thundercomm Dragonboard 845c (DT) [ 35.152276] Call trace: [ 35.152282] show_stack+0x20/0x38 (C) [ 35.152299] dump_stack_lvl+0x8c/0xd0 [ 35.152315] print_report+0x118/0x608 [ 35.152334] kasan_report+0xdc/0x128 [ 35.152351] __asan_report_store1_noabort+0x20/0x30 [ 35.152368] krealloc_less_oob_helper+0xae4/0xc50 [ 35.152385] krealloc_large_less_oob+0x20/0x38 [ 35.152402] kunit_try_run_case+0x170/0x3f0 [ 35.152418] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.152437] kthread+0x328/0x630 [ 35.152450] ret_from_fork+0x10/0x20 [ 35.152466] [ 35.223229] The buggy address belongs to the physical page: [ 35.228870] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106420 [ 35.236968] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 35.244718] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 35.251763] page_type: f8(unknown) [ 35.255220] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 35.263060] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 35.270899] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 35.278824] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 35.286749] head: 0bfffe0000000002 fffffdffc2190801 00000000ffffffff 00000000ffffffff [ 35.294672] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 35.302593] page dumped because: kasan: bad access detected [ 35.308231] [ 35.309753] Memory state around the buggy address: [ 35.314604] ffff000086421f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.321920] ffff000086422000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.329224] >ffff000086422080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 35.336536] ^ [ 35.343231] ffff000086422100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 35.350536] ffff000086422180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 35.357838] ================================================================== [ 33.300563] ================================================================== [ 33.307880] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 33.315550] Write of size 1 at addr ffff000086408aea by task kunit_try_catch/256 [ 33.323034] [ 33.324569] CPU: 5 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 33.324596] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.324603] Hardware name: Thundercomm Dragonboard 845c (DT) [ 33.324612] Call trace: [ 33.324618] show_stack+0x20/0x38 (C) [ 33.324635] dump_stack_lvl+0x8c/0xd0 [ 33.324651] print_report+0x118/0x608 [ 33.324669] kasan_report+0xdc/0x128 [ 33.324689] __asan_report_store1_noabort+0x20/0x30 [ 33.324705] krealloc_less_oob_helper+0xae4/0xc50 [ 33.324723] krealloc_less_oob+0x20/0x38 [ 33.324739] kunit_try_run_case+0x170/0x3f0 [ 33.324756] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.324776] kthread+0x328/0x630 [ 33.324790] ret_from_fork+0x10/0x20 [ 33.324807] [ 33.395032] Allocated by task 256: [ 33.398485] kasan_save_stack+0x3c/0x68 [ 33.402389] kasan_save_track+0x20/0x40 [ 33.406293] kasan_save_alloc_info+0x40/0x58 [ 33.410627] __kasan_krealloc+0x118/0x178 [ 33.414706] krealloc_noprof+0x128/0x360 [ 33.418697] krealloc_less_oob_helper+0x168/0xc50 [ 33.423473] krealloc_less_oob+0x20/0x38 [ 33.427463] kunit_try_run_case+0x170/0x3f0 [ 33.431713] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.437278] kthread+0x328/0x630 [ 33.440561] ret_from_fork+0x10/0x20 [ 33.444191] [ 33.445714] The buggy address belongs to the object at ffff000086408a00 [ 33.445714] which belongs to the cache kmalloc-256 of size 256 [ 33.458368] The buggy address is located 33 bytes to the right of [ 33.458368] allocated 201-byte region [ffff000086408a00, ffff000086408ac9) [ 33.471542] [ 33.473066] The buggy address belongs to the physical page: [ 33.478709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106408 [ 33.486809] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.494561] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.501609] page_type: f5(slab) [ 33.504804] raw: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 33.512645] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.520485] head: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 33.528412] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.536338] head: 0bfffe0000000002 fffffdffc2190201 00000000ffffffff 00000000ffffffff [ 33.544264] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 33.552186] page dumped because: kasan: bad access detected [ 33.557828] [ 33.559357] Memory state around the buggy address: [ 33.564209] ffff000086408980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.571514] ffff000086408a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.578823] >ffff000086408a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 33.586135] ^ [ 33.592830] ffff000086408b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.600146] ffff000086408b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.607450] ================================================================== [ 34.655132] ================================================================== [ 34.662446] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 34.670116] Write of size 1 at addr ffff0000864220d0 by task kunit_try_catch/260 [ 34.677612] [ 34.679145] CPU: 3 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 34.679174] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.679183] Hardware name: Thundercomm Dragonboard 845c (DT) [ 34.679194] Call trace: [ 34.679200] show_stack+0x20/0x38 (C) [ 34.679218] dump_stack_lvl+0x8c/0xd0 [ 34.679236] print_report+0x118/0x608 [ 34.679255] kasan_report+0xdc/0x128 [ 34.679273] __asan_report_store1_noabort+0x20/0x30 [ 34.679292] krealloc_less_oob_helper+0xb9c/0xc50 [ 34.679311] krealloc_large_less_oob+0x20/0x38 [ 34.679331] kunit_try_run_case+0x170/0x3f0 [ 34.679349] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.679371] kthread+0x328/0x630 [ 34.679387] ret_from_fork+0x10/0x20 [ 34.679405] [ 34.750213] The buggy address belongs to the physical page: [ 34.755867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106420 [ 34.763978] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.771732] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 34.778789] page_type: f8(unknown) [ 34.782253] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.790095] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 34.797938] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.805866] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 34.813797] head: 0bfffe0000000002 fffffdffc2190801 00000000ffffffff 00000000ffffffff [ 34.821726] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 34.829650] page dumped because: kasan: bad access detected [ 34.835296] [ 34.836831] Memory state around the buggy address: [ 34.841692] ffff000086421f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.849014] ffff000086422000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.856337] >ffff000086422080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 34.863649] ^ [ 34.869557] ffff000086422100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 34.876878] ffff000086422180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 34.884197] ================================================================== [ 35.365188] ================================================================== [ 35.372503] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 35.380171] Write of size 1 at addr ffff0000864220eb by task kunit_try_catch/260 [ 35.387664] [ 35.389189] CPU: 4 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 35.389215] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.389222] Hardware name: Thundercomm Dragonboard 845c (DT) [ 35.389232] Call trace: [ 35.389237] show_stack+0x20/0x38 (C) [ 35.389253] dump_stack_lvl+0x8c/0xd0 [ 35.389270] print_report+0x118/0x608 [ 35.389287] kasan_report+0xdc/0x128 [ 35.389305] __asan_report_store1_noabort+0x20/0x30 [ 35.389320] krealloc_less_oob_helper+0xa58/0xc50 [ 35.389337] krealloc_large_less_oob+0x20/0x38 [ 35.389354] kunit_try_run_case+0x170/0x3f0 [ 35.389370] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.389390] kthread+0x328/0x630 [ 35.389403] ret_from_fork+0x10/0x20 [ 35.389419] [ 35.460172] The buggy address belongs to the physical page: [ 35.465816] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106420 [ 35.473917] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 35.481671] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 35.488720] page_type: f8(unknown) [ 35.492176] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 35.500016] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 35.507857] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 35.515785] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 35.523713] head: 0bfffe0000000002 fffffdffc2190801 00000000ffffffff 00000000ffffffff [ 35.531641] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 35.539564] page dumped because: kasan: bad access detected [ 35.545206] [ 35.546728] Memory state around the buggy address: [ 35.551578] ffff000086421f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.558887] ffff000086422000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.566195] >ffff000086422080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 35.573501] ^ [ 35.580198] ffff000086422100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 35.587505] ffff000086422180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 35.594813] ================================================================== [ 34.414507] ================================================================== [ 34.426252] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 34.433926] Write of size 1 at addr ffff0000864220c9 by task kunit_try_catch/260 [ 34.441424] [ 34.442959] CPU: 3 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 34.442988] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.442996] Hardware name: Thundercomm Dragonboard 845c (DT) [ 34.443006] Call trace: [ 34.443013] show_stack+0x20/0x38 (C) [ 34.443031] dump_stack_lvl+0x8c/0xd0 [ 34.443050] print_report+0x118/0x608 [ 34.443069] kasan_report+0xdc/0x128 [ 34.443087] __asan_report_store1_noabort+0x20/0x30 [ 34.443106] krealloc_less_oob_helper+0xa48/0xc50 [ 34.443126] krealloc_large_less_oob+0x20/0x38 [ 34.443145] kunit_try_run_case+0x170/0x3f0 [ 34.443164] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.443185] kthread+0x328/0x630 [ 34.443201] ret_from_fork+0x10/0x20 [ 34.443219] [ 34.514036] The buggy address belongs to the physical page: [ 34.519680] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106420 [ 34.527790] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.535546] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 34.542602] page_type: f8(unknown) [ 34.546065] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.553907] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 34.561751] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.569689] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 34.577618] head: 0bfffe0000000002 fffffdffc2190801 00000000ffffffff 00000000ffffffff [ 34.585548] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 34.593475] page dumped because: kasan: bad access detected [ 34.599123] [ 34.600657] Memory state around the buggy address: [ 34.605519] ffff000086421f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.612839] ffff000086422000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.620161] >ffff000086422080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 34.627475] ^ [ 34.633120] ffff000086422100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 34.640443] ffff000086422180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 34.647754] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 33.931667] ================================================================== [ 33.942877] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 33.950548] Write of size 1 at addr ffff00008641a0eb by task kunit_try_catch/258 [ 33.958046] [ 33.959575] CPU: 3 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 33.959603] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.959611] Hardware name: Thundercomm Dragonboard 845c (DT) [ 33.959621] Call trace: [ 33.959627] show_stack+0x20/0x38 (C) [ 33.959646] dump_stack_lvl+0x8c/0xd0 [ 33.959664] print_report+0x118/0x608 [ 33.959683] kasan_report+0xdc/0x128 [ 33.959702] __asan_report_store1_noabort+0x20/0x30 [ 33.959719] krealloc_more_oob_helper+0x60c/0x678 [ 33.959738] krealloc_large_more_oob+0x20/0x38 [ 33.959757] kunit_try_run_case+0x170/0x3f0 [ 33.959776] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.959798] kthread+0x328/0x630 [ 33.959812] ret_from_fork+0x10/0x20 [ 33.959829] [ 34.030622] The buggy address belongs to the physical page: [ 34.036267] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106418 [ 34.044381] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.052137] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 34.059196] page_type: f8(unknown) [ 34.062662] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.070508] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 34.078355] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.086287] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 34.094218] head: 0bfffe0000000002 fffffdffc2190601 00000000ffffffff 00000000ffffffff [ 34.102149] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 34.110076] page dumped because: kasan: bad access detected [ 34.115722] [ 34.117251] Memory state around the buggy address: [ 34.122114] ffff000086419f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.129428] ffff00008641a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.136742] >ffff00008641a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 34.144053] ^ [ 34.150753] ffff00008641a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 34.158066] ffff00008641a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 34.165378] ================================================================== [ 32.035808] ================================================================== [ 32.043130] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 32.050799] Write of size 1 at addr ffff000080e358f0 by task kunit_try_catch/254 [ 32.058300] [ 32.059841] CPU: 2 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 32.059869] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.059878] Hardware name: Thundercomm Dragonboard 845c (DT) [ 32.059888] Call trace: [ 32.059895] show_stack+0x20/0x38 (C) [ 32.059914] dump_stack_lvl+0x8c/0xd0 [ 32.059934] print_report+0x118/0x608 [ 32.059953] kasan_report+0xdc/0x128 [ 32.059972] __asan_report_store1_noabort+0x20/0x30 [ 32.059990] krealloc_more_oob_helper+0x5c0/0x678 [ 32.060010] krealloc_more_oob+0x20/0x38 [ 32.060027] kunit_try_run_case+0x170/0x3f0 [ 32.060046] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.060068] kthread+0x328/0x630 [ 32.060083] ret_from_fork+0x10/0x20 [ 32.060100] [ 32.130377] Allocated by task 254: [ 32.133838] kasan_save_stack+0x3c/0x68 [ 32.137749] kasan_save_track+0x20/0x40 [ 32.141661] kasan_save_alloc_info+0x40/0x58 [ 32.146000] __kasan_krealloc+0x118/0x178 [ 32.150084] krealloc_noprof+0x128/0x360 [ 32.154083] krealloc_more_oob_helper+0x168/0x678 [ 32.158867] krealloc_more_oob+0x20/0x38 [ 32.162862] kunit_try_run_case+0x170/0x3f0 [ 32.167114] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.172686] kthread+0x328/0x630 [ 32.175979] ret_from_fork+0x10/0x20 [ 32.179619] [ 32.181149] The buggy address belongs to the object at ffff000080e35800 [ 32.181149] which belongs to the cache kmalloc-256 of size 256 [ 32.193805] The buggy address is located 5 bytes to the right of [ 32.193805] allocated 235-byte region [ffff000080e35800, ffff000080e358eb) [ 32.206905] [ 32.208441] The buggy address belongs to the physical page: [ 32.214092] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100e34 [ 32.222197] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.229957] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.237014] page_type: f5(slab) [ 32.240220] raw: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 32.248067] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.255914] head: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 32.263847] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.271781] head: 0bfffe0000000002 fffffdffc2038d01 00000000ffffffff 00000000ffffffff [ 32.279714] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.287644] page dumped because: kasan: bad access detected [ 32.293292] [ 32.294822] Memory state around the buggy address: [ 32.299682] ffff000080e35780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.307000] ffff000080e35800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.314317] >ffff000080e35880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 32.321630] ^ [ 32.328597] ffff000080e35900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.335913] ffff000080e35980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.343229] ================================================================== [ 31.717342] ================================================================== [ 31.728285] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 31.735963] Write of size 1 at addr ffff000080e358eb by task kunit_try_catch/254 [ 31.743457] [ 31.744989] CPU: 2 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 31.745017] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.745027] Hardware name: Thundercomm Dragonboard 845c (DT) [ 31.745039] Call trace: [ 31.745046] show_stack+0x20/0x38 (C) [ 31.745066] dump_stack_lvl+0x8c/0xd0 [ 31.745088] print_report+0x118/0x608 [ 31.745108] kasan_report+0xdc/0x128 [ 31.745126] __asan_report_store1_noabort+0x20/0x30 [ 31.745144] krealloc_more_oob_helper+0x60c/0x678 [ 31.745164] krealloc_more_oob+0x20/0x38 [ 31.745181] kunit_try_run_case+0x170/0x3f0 [ 31.745200] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.745221] kthread+0x328/0x630 [ 31.745238] ret_from_fork+0x10/0x20 [ 31.745256] [ 31.815540] Allocated by task 254: [ 31.819002] kasan_save_stack+0x3c/0x68 [ 31.822903] kasan_save_track+0x20/0x40 [ 31.826803] kasan_save_alloc_info+0x40/0x58 [ 31.831141] __kasan_krealloc+0x118/0x178 [ 31.835225] krealloc_noprof+0x128/0x360 [ 31.839225] krealloc_more_oob_helper+0x168/0x678 [ 31.844007] krealloc_more_oob+0x20/0x38 [ 31.848004] kunit_try_run_case+0x170/0x3f0 [ 31.852259] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.857834] kthread+0x328/0x630 [ 31.861126] ret_from_fork+0x10/0x20 [ 31.864766] [ 31.866297] The buggy address belongs to the object at ffff000080e35800 [ 31.866297] which belongs to the cache kmalloc-256 of size 256 [ 31.878954] The buggy address is located 0 bytes to the right of [ 31.878954] allocated 235-byte region [ffff000080e35800, ffff000080e358eb) [ 31.892052] [ 31.893583] The buggy address belongs to the physical page: [ 31.899232] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100e34 [ 31.907339] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.915098] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.922158] page_type: f5(slab) [ 31.925364] raw: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 31.933212] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.941059] head: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 31.948992] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.956925] head: 0bfffe0000000002 fffffdffc2038d01 00000000ffffffff 00000000ffffffff [ 31.964858] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 31.972788] page dumped because: kasan: bad access detected [ 31.978438] [ 31.979974] Memory state around the buggy address: [ 31.984840] ffff000080e35780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.992156] ffff000080e35800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.999474] >ffff000080e35880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 32.006788] ^ [ 32.013495] ffff000080e35900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.020811] ffff000080e35980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.028124] ================================================================== [ 34.172752] ================================================================== [ 34.180075] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 34.187750] Write of size 1 at addr ffff00008641a0f0 by task kunit_try_catch/258 [ 34.195241] [ 34.196769] CPU: 3 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 34.196798] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.196806] Hardware name: Thundercomm Dragonboard 845c (DT) [ 34.196818] Call trace: [ 34.196825] show_stack+0x20/0x38 (C) [ 34.196844] dump_stack_lvl+0x8c/0xd0 [ 34.196862] print_report+0x118/0x608 [ 34.196881] kasan_report+0xdc/0x128 [ 34.196900] __asan_report_store1_noabort+0x20/0x30 [ 34.196918] krealloc_more_oob_helper+0x5c0/0x678 [ 34.196938] krealloc_large_more_oob+0x20/0x38 [ 34.196957] kunit_try_run_case+0x170/0x3f0 [ 34.196977] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.196999] kthread+0x328/0x630 [ 34.197014] ret_from_fork+0x10/0x20 [ 34.197032] [ 34.267835] The buggy address belongs to the physical page: [ 34.273486] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106418 [ 34.281600] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.289355] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 34.296412] page_type: f8(unknown) [ 34.299875] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.307721] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 34.315568] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 34.323499] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 34.331430] head: 0bfffe0000000002 fffffdffc2190601 00000000ffffffff 00000000ffffffff [ 34.339362] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 34.347290] page dumped because: kasan: bad access detected [ 34.352938] [ 34.354468] Memory state around the buggy address: [ 34.359327] ffff000086419f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.366640] ffff00008641a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.373955] >ffff00008641a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 34.381266] ^ [ 34.388231] ffff00008641a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 34.395547] ffff00008641a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 34.402862] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[ 31.269289] ================================================================== [ 31.280409] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 31.285892] Free of addr ffff000086418001 by task kunit_try_catch/248 [ 31.292418] [ 31.293952] CPU: 3 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 31.293981] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.293990] Hardware name: Thundercomm Dragonboard 845c (DT) [ 31.294002] Call trace: [ 31.294009] show_stack+0x20/0x38 (C) [ 31.294028] dump_stack_lvl+0x8c/0xd0 [ 31.294050] print_report+0x118/0x608 [ 31.294069] kasan_report_invalid_free+0xc0/0xe8 [ 31.294091] __kasan_kfree_large+0x5c/0xa8 [ 31.294111] free_large_kmalloc+0x68/0x150 [ 31.294129] kfree+0x270/0x3c8 [ 31.294145] kmalloc_large_invalid_free+0x108/0x270 [ 31.294163] kunit_try_run_case+0x170/0x3f0 [ 31.294182] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.294205] kthread+0x328/0x630 [ 31.294220] ret_from_fork+0x10/0x20 [ 31.294237] [ 31.368222] The buggy address belongs to the physical page: [ 31.373868] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106418 [ 31.381973] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.389731] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.396788] page_type: f8(unknown) [ 31.400258] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.408105] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.415951] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.423883] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.431815] head: 0bfffe0000000002 fffffdffc2190601 00000000ffffffff 00000000ffffffff [ 31.439748] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 31.447675] page dumped because: kasan: bad access detected [ 31.453320] [ 31.454850] Memory state around the buggy address: [ 31.459709] ffff000086417f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.467023] ffff000086417f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.474338] >ffff000086418000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.481650] ^ [ 31.484933] ffff000086418080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.492247] ffff000086418100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.499559] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 31.076215] ================================================================== [ 31.087866] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 31.094570] Read of size 1 at addr ffff000086418000 by task kunit_try_catch/246 [ 31.101977] [ 31.103509] CPU: 3 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 31.103538] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.103546] Hardware name: Thundercomm Dragonboard 845c (DT) [ 31.103556] Call trace: [ 31.103562] show_stack+0x20/0x38 (C) [ 31.103580] dump_stack_lvl+0x8c/0xd0 [ 31.103602] print_report+0x118/0x608 [ 31.103621] kasan_report+0xdc/0x128 [ 31.103640] __asan_report_load1_noabort+0x20/0x30 [ 31.103658] kmalloc_large_uaf+0x2cc/0x2f8 [ 31.103675] kunit_try_run_case+0x170/0x3f0 [ 31.103693] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.103714] kthread+0x328/0x630 [ 31.103728] ret_from_fork+0x10/0x20 [ 31.103747] [ 31.169347] The buggy address belongs to the physical page: [ 31.174996] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106418 [ 31.183108] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.189736] raw: 0bfffe0000000000 fffffdffc2190808 ffff0000dae08c40 0000000000000000 [ 31.197579] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 31.205417] page dumped because: kasan: bad access detected [ 31.211062] [ 31.212598] Memory state around the buggy address: [ 31.217459] ffff000086417f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.224781] ffff000086417f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.232103] >ffff000086418000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.239416] ^ [ 31.242705] ffff000086418080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.250027] ffff000086418100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.257344] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 30.838558] ================================================================== [ 30.850029] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 30.857613] Write of size 1 at addr ffff00009561200a by task kunit_try_catch/244 [ 30.865104] [ 30.866634] CPU: 4 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 30.866664] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.866672] Hardware name: Thundercomm Dragonboard 845c (DT) [ 30.866683] Call trace: [ 30.866688] show_stack+0x20/0x38 (C) [ 30.866706] dump_stack_lvl+0x8c/0xd0 [ 30.866725] print_report+0x118/0x608 [ 30.866744] kasan_report+0xdc/0x128 [ 30.866762] __asan_report_store1_noabort+0x20/0x30 [ 30.866779] kmalloc_large_oob_right+0x278/0x2b8 [ 30.866797] kunit_try_run_case+0x170/0x3f0 [ 30.866814] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.866833] kthread+0x328/0x630 [ 30.866846] ret_from_fork+0x10/0x20 [ 30.866863] [ 30.933050] The buggy address belongs to the physical page: [ 30.938693] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x115610 [ 30.946794] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.954556] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.961607] page_type: f8(unknown) [ 30.965068] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.972908] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.980746] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.988669] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.996591] head: 0bfffe0000000002 fffffdffc2558401 00000000ffffffff 00000000ffffffff [ 31.004514] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 31.012434] page dumped because: kasan: bad access detected [ 31.018075] [ 31.019605] Memory state around the buggy address: [ 31.024458] ffff000095611f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.031771] ffff000095611f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.039076] >ffff000095612000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.046387] ^ [ 31.049926] ffff000095612080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.057240] ffff000095612100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.064550] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 30.526229] ================================================================== [ 30.538850] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 30.546259] Write of size 1 at addr ffff0000956ddf00 by task kunit_try_catch/242 [ 30.553754] [ 30.555286] CPU: 3 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 30.555315] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.555325] Hardware name: Thundercomm Dragonboard 845c (DT) [ 30.555337] Call trace: [ 30.555344] show_stack+0x20/0x38 (C) [ 30.555362] dump_stack_lvl+0x8c/0xd0 [ 30.555383] print_report+0x118/0x608 [ 30.555404] kasan_report+0xdc/0x128 [ 30.555423] __asan_report_store1_noabort+0x20/0x30 [ 30.555441] kmalloc_big_oob_right+0x2a4/0x2f0 [ 30.555459] kunit_try_run_case+0x170/0x3f0 [ 30.555478] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.555498] kthread+0x328/0x630 [ 30.555514] ret_from_fork+0x10/0x20 [ 30.555532] [ 30.621591] Allocated by task 242: [ 30.625047] kasan_save_stack+0x3c/0x68 [ 30.628955] kasan_save_track+0x20/0x40 [ 30.632864] kasan_save_alloc_info+0x40/0x58 [ 30.637201] __kasan_kmalloc+0xd4/0xd8 [ 30.641022] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.645632] kmalloc_big_oob_right+0xb8/0x2f0 [ 30.650067] kunit_try_run_case+0x170/0x3f0 [ 30.654318] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.659894] kthread+0x328/0x630 [ 30.663188] ret_from_fork+0x10/0x20 [ 30.666827] [ 30.668359] The buggy address belongs to the object at ffff0000956dc000 [ 30.668359] which belongs to the cache kmalloc-8k of size 8192 [ 30.681017] The buggy address is located 0 bytes to the right of [ 30.681017] allocated 7936-byte region [ffff0000956dc000, ffff0000956ddf00) [ 30.694206] [ 30.695742] The buggy address belongs to the physical page: [ 30.701386] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1156d8 [ 30.709498] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.717251] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.724314] page_type: f5(slab) [ 30.727522] raw: 0bfffe0000000040 ffff000080003180 dead000000000122 0000000000000000 [ 30.735364] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 30.743206] head: 0bfffe0000000040 ffff000080003180 dead000000000122 0000000000000000 [ 30.751143] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 30.759081] head: 0bfffe0000000003 fffffdffc255b601 00000000ffffffff 00000000ffffffff [ 30.767020] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 30.774942] page dumped because: kasan: bad access detected [ 30.780594] [ 30.782123] Memory state around the buggy address: [ 30.786983] ffff0000956dde00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.794304] ffff0000956dde80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.801622] >ffff0000956ddf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.808941] ^ [ 30.812226] ffff0000956ddf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.819540] ffff0000956de000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.826860] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[ 30.042783] ================================================================== [ 30.054353] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 30.062554] Write of size 1 at addr ffff0000822c2478 by task kunit_try_catch/240 [ 30.070048] [ 30.071591] CPU: 3 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 30.071621] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.071629] Hardware name: Thundercomm Dragonboard 845c (DT) [ 30.071639] Call trace: [ 30.071645] show_stack+0x20/0x38 (C) [ 30.071663] dump_stack_lvl+0x8c/0xd0 [ 30.071683] print_report+0x118/0x608 [ 30.071702] kasan_report+0xdc/0x128 [ 30.071720] __asan_report_store1_noabort+0x20/0x30 [ 30.071737] kmalloc_track_caller_oob_right+0x40c/0x488 [ 30.071756] kunit_try_run_case+0x170/0x3f0 [ 30.071775] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.071796] kthread+0x328/0x630 [ 30.071810] ret_from_fork+0x10/0x20 [ 30.071828] [ 30.138667] Allocated by task 240: [ 30.142126] kasan_save_stack+0x3c/0x68 [ 30.146036] kasan_save_track+0x20/0x40 [ 30.149945] kasan_save_alloc_info+0x40/0x58 [ 30.154283] __kasan_kmalloc+0xd4/0xd8 [ 30.158103] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 30.163760] kmalloc_track_caller_oob_right+0xa8/0x488 [ 30.168983] kunit_try_run_case+0x170/0x3f0 [ 30.173236] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.178809] kthread+0x328/0x630 [ 30.182094] ret_from_fork+0x10/0x20 [ 30.185731] [ 30.187260] The buggy address belongs to the object at ffff0000822c2400 [ 30.187260] which belongs to the cache kmalloc-128 of size 128 [ 30.199916] The buggy address is located 0 bytes to the right of [ 30.199916] allocated 120-byte region [ffff0000822c2400, ffff0000822c2478) [ 30.213019] [ 30.214549] The buggy address belongs to the physical page: [ 30.220202] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022c2 [ 30.228316] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.236071] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.243132] page_type: f5(slab) [ 30.246334] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 30.254178] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.262021] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 30.269959] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.277889] head: 0bfffe0000000001 fffffdffc208b081 00000000ffffffff 00000000ffffffff [ 30.285828] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.293752] page dumped because: kasan: bad access detected [ 30.299400] [ 30.300933] Memory state around the buggy address: [ 30.305795] ffff0000822c2300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.313116] ffff0000822c2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.320437] >ffff0000822c2400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.327751] ^ [ 30.334977] ffff0000822c2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.342299] ffff0000822c2500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.349619] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 29.731623] ================================================================== [ 29.742663] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 29.750163] Read of size 1 at addr ffff0000956f9000 by task kunit_try_catch/238 [ 29.757576] [ 29.759113] CPU: 3 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 29.759144] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.759152] Hardware name: Thundercomm Dragonboard 845c (DT) [ 29.759164] Call trace: [ 29.759172] show_stack+0x20/0x38 (C) [ 29.759190] dump_stack_lvl+0x8c/0xd0 [ 29.759211] print_report+0x118/0x608 [ 29.759231] kasan_report+0xdc/0x128 [ 29.759250] __asan_report_load1_noabort+0x20/0x30 [ 29.759268] kmalloc_node_oob_right+0x2f4/0x330 [ 29.759289] kunit_try_run_case+0x170/0x3f0 [ 29.759309] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.759331] kthread+0x328/0x630 [ 29.759347] ret_from_fork+0x10/0x20 [ 29.759365] [ 29.825388] Allocated by task 238: [ 29.828847] kasan_save_stack+0x3c/0x68 [ 29.832757] kasan_save_track+0x20/0x40 [ 29.836667] kasan_save_alloc_info+0x40/0x58 [ 29.841005] __kasan_kmalloc+0xd4/0xd8 [ 29.844828] __kmalloc_cache_node_noprof+0x178/0x3d0 [ 29.849872] kmalloc_node_oob_right+0xbc/0x330 [ 29.854388] kunit_try_run_case+0x170/0x3f0 [ 29.858642] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.864209] kthread+0x328/0x630 [ 29.867494] ret_from_fork+0x10/0x20 [ 29.871140] [ 29.872674] The buggy address belongs to the object at ffff0000956f8000 [ 29.872674] which belongs to the cache kmalloc-4k of size 4096 [ 29.885338] The buggy address is located 0 bytes to the right of [ 29.885338] allocated 4096-byte region [ffff0000956f8000, ffff0000956f9000) [ 29.898521] [ 29.900058] The buggy address belongs to the physical page: [ 29.905707] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1156f8 [ 29.913822] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.921579] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.928634] page_type: f5(slab) [ 29.931840] raw: 0bfffe0000000040 ffff000080003040 dead000000000122 0000000000000000 [ 29.939686] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 29.947530] head: 0bfffe0000000040 ffff000080003040 dead000000000122 0000000000000000 [ 29.955462] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 29.963393] head: 0bfffe0000000003 fffffdffc255be01 00000000ffffffff 00000000ffffffff [ 29.971323] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 29.979255] page dumped because: kasan: bad access detected [ 29.984909] [ 29.986439] Memory state around the buggy address: [ 29.991302] ffff0000956f8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.998625] ffff0000956f8f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.005947] >ffff0000956f9000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.013269] ^ [ 30.016556] ffff0000956f9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.023870] ffff0000956f9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.031185] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 29.307632] ================================================================== [ 29.318756] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 29.325727] Read of size 1 at addr ffff000080a5511f by task kunit_try_catch/236 [ 29.333137] [ 29.334674] CPU: 2 UID: 0 PID: 236 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 29.334706] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.334715] Hardware name: Thundercomm Dragonboard 845c (DT) [ 29.334728] Call trace: [ 29.334735] show_stack+0x20/0x38 (C) [ 29.334754] dump_stack_lvl+0x8c/0xd0 [ 29.334775] print_report+0x118/0x608 [ 29.334796] kasan_report+0xdc/0x128 [ 29.334814] __asan_report_load1_noabort+0x20/0x30 [ 29.334831] kmalloc_oob_left+0x2ec/0x320 [ 29.334849] kunit_try_run_case+0x170/0x3f0 [ 29.334869] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.334890] kthread+0x328/0x630 [ 29.334905] ret_from_fork+0x10/0x20 [ 29.334922] [ 29.400476] Allocated by task 67: [ 29.403850] kasan_save_stack+0x3c/0x68 [ 29.407760] kasan_save_track+0x20/0x40 [ 29.411670] kasan_save_alloc_info+0x40/0x58 [ 29.416005] __kasan_kmalloc+0xd4/0xd8 [ 29.419826] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 29.425484] kvasprintf+0xe0/0x180 [ 29.428951] kasprintf+0xd0/0x110 [ 29.432327] pinctrl_dt_to_map+0x118/0x778 [ 29.436499] create_pinctrl+0x120/0xb60 [ 29.440408] pinctrl_get+0xf4/0x1d0 [ 29.443957] devm_pinctrl_get+0x54/0xc8 [ 29.447865] pinctrl_bind_pins+0xa4/0x6e0 [ 29.451951] really_probe+0x94/0x7f0 [ 29.455590] __driver_probe_device+0x164/0x378 [ 29.460110] driver_probe_device+0x64/0x180 [ 29.464360] __device_attach_driver+0x174/0x280 [ 29.468969] bus_for_each_drv+0x118/0x1b0 [ 29.473054] __device_attach+0x174/0x378 [ 29.477047] device_initial_probe+0x1c/0x30 [ 29.481297] bus_probe_device+0x12c/0x170 [ 29.485381] deferred_probe_work_func+0x140/0x208 [ 29.490161] process_one_work+0x530/0xf98 [ 29.494245] worker_thread+0x618/0xf38 [ 29.498064] kthread+0x328/0x630 [ 29.501354] ret_from_fork+0x10/0x20 [ 29.504991] [ 29.506521] Freed by task 67: [ 29.509547] kasan_save_stack+0x3c/0x68 [ 29.513455] kasan_save_track+0x20/0x40 [ 29.517365] kasan_save_free_info+0x4c/0x78 [ 29.521615] __kasan_slab_free+0x6c/0x98 [ 29.525612] kfree+0x214/0x3c8 [ 29.528729] pinctrl_dt_to_map+0x144/0x778 [ 29.532898] create_pinctrl+0x120/0xb60 [ 29.536805] pinctrl_get+0xf4/0x1d0 [ 29.540356] devm_pinctrl_get+0x54/0xc8 [ 29.544262] pinctrl_bind_pins+0xa4/0x6e0 [ 29.548346] really_probe+0x94/0x7f0 [ 29.551982] __driver_probe_device+0x164/0x378 [ 29.556501] driver_probe_device+0x64/0x180 [ 29.560752] __device_attach_driver+0x174/0x280 [ 29.565361] bus_for_each_drv+0x118/0x1b0 [ 29.569444] __device_attach+0x174/0x378 [ 29.573439] device_initial_probe+0x1c/0x30 [ 29.577690] bus_probe_device+0x12c/0x170 [ 29.581772] deferred_probe_work_func+0x140/0x208 [ 29.586553] process_one_work+0x530/0xf98 [ 29.590633] worker_thread+0x618/0xf38 [ 29.594451] kthread+0x328/0x630 [ 29.597741] ret_from_fork+0x10/0x20 [ 29.601378] [ 29.602908] The buggy address belongs to the object at ffff000080a55100 [ 29.602908] which belongs to the cache kmalloc-16 of size 16 [ 29.615393] The buggy address is located 15 bytes to the right of [ 29.615393] allocated 16-byte region [ffff000080a55100, ffff000080a55110) [ 29.628495] [ 29.630026] The buggy address belongs to the physical page: [ 29.635670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100a55 [ 29.643780] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.650396] page_type: f5(slab) [ 29.653600] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 29.661451] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 29.669290] page dumped because: kasan: bad access detected [ 29.674938] [ 29.676472] Memory state around the buggy address: [ 29.681333] ffff000080a55000: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 29.688654] ffff000080a55080: 00 06 fc fc 00 05 fc fc 00 05 fc fc 00 05 fc fc [ 29.695976] >ffff000080a55100: fa fb fc fc 00 07 fc fc fc fc fc fc fc fc fc fc [ 29.703288] ^ [ 29.707363] ffff000080a55180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.714679] ffff000080a55200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.721998] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 28.697928] ================================================================== [ 28.705250] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 28.712318] Write of size 1 at addr ffff0000822c2378 by task kunit_try_catch/234 [ 28.719812] [ 28.721350] CPU: 3 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 28.721386] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.721396] Hardware name: Thundercomm Dragonboard 845c (DT) [ 28.721409] Call trace: [ 28.721417] show_stack+0x20/0x38 (C) [ 28.721440] dump_stack_lvl+0x8c/0xd0 [ 28.721462] print_report+0x118/0x608 [ 28.721484] kasan_report+0xdc/0x128 [ 28.721504] __asan_report_store1_noabort+0x20/0x30 [ 28.721523] kmalloc_oob_right+0x538/0x660 [ 28.721541] kunit_try_run_case+0x170/0x3f0 [ 28.721563] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.721585] kthread+0x328/0x630 [ 28.721602] ret_from_fork+0x10/0x20 [ 28.721622] [ 28.787320] Allocated by task 234: [ 28.790777] kasan_save_stack+0x3c/0x68 [ 28.794687] kasan_save_track+0x20/0x40 [ 28.798593] kasan_save_alloc_info+0x40/0x58 [ 28.802941] __kasan_kmalloc+0xd4/0xd8 [ 28.806760] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.811370] kmalloc_oob_right+0xb0/0x660 [ 28.815445] kunit_try_run_case+0x170/0x3f0 [ 28.819705] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.825280] kthread+0x328/0x630 [ 28.828567] ret_from_fork+0x10/0x20 [ 28.832213] [ 28.833744] The buggy address belongs to the object at ffff0000822c2300 [ 28.833744] which belongs to the cache kmalloc-128 of size 128 [ 28.846409] The buggy address is located 5 bytes to the right of [ 28.846409] allocated 115-byte region [ffff0000822c2300, ffff0000822c2373) [ 28.859507] [ 28.861042] The buggy address belongs to the physical page: [ 28.866691] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022c2 [ 28.874802] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 28.882565] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 28.889631] page_type: f5(slab) [ 28.892834] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 28.900685] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.908533] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 28.916469] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.924403] head: 0bfffe0000000001 fffffdffc208b081 00000000ffffffff 00000000ffffffff [ 28.932339] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 28.940272] page dumped because: kasan: bad access detected [ 28.945920] [ 28.947457] Memory state around the buggy address: [ 28.952323] ffff0000822c2200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.959643] ffff0000822c2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.966963] >ffff0000822c2300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 28.974279] ^ [ 28.981507] ffff0000822c2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.988825] ffff0000822c2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.996142] ================================================================== [ 29.003798] ================================================================== [ 29.011125] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 29.018178] Read of size 1 at addr ffff0000822c2380 by task kunit_try_catch/234 [ 29.025584] [ 29.027124] CPU: 5 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 29.027155] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.027163] Hardware name: Thundercomm Dragonboard 845c (DT) [ 29.027174] Call trace: [ 29.027180] show_stack+0x20/0x38 (C) [ 29.027198] dump_stack_lvl+0x8c/0xd0 [ 29.027216] print_report+0x118/0x608 [ 29.027234] kasan_report+0xdc/0x128 [ 29.027251] __asan_report_load1_noabort+0x20/0x30 [ 29.027267] kmalloc_oob_right+0x5d0/0x660 [ 29.027282] kunit_try_run_case+0x170/0x3f0 [ 29.027300] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.027319] kthread+0x328/0x630 [ 29.027332] ret_from_fork+0x10/0x20 [ 29.027349] [ 29.092922] Allocated by task 234: [ 29.096375] kasan_save_stack+0x3c/0x68 [ 29.100280] kasan_save_track+0x20/0x40 [ 29.104185] kasan_save_alloc_info+0x40/0x58 [ 29.108518] __kasan_kmalloc+0xd4/0xd8 [ 29.112333] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.116931] kmalloc_oob_right+0xb0/0x660 [ 29.121005] kunit_try_run_case+0x170/0x3f0 [ 29.125252] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.130817] kthread+0x328/0x630 [ 29.134097] ret_from_fork+0x10/0x20 [ 29.137739] [ 29.139269] The buggy address belongs to the object at ffff0000822c2300 [ 29.139269] which belongs to the cache kmalloc-128 of size 128 [ 29.151917] The buggy address is located 13 bytes to the right of [ 29.151917] allocated 115-byte region [ffff0000822c2300, ffff0000822c2373) [ 29.165101] [ 29.166624] The buggy address belongs to the physical page: [ 29.172274] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022c2 [ 29.180375] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.188126] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.195177] page_type: f5(slab) [ 29.198375] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 29.206214] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.214052] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 29.221975] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.229898] head: 0bfffe0000000001 fffffdffc208b081 00000000ffffffff 00000000ffffffff [ 29.237820] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 29.245741] page dumped because: kasan: bad access detected [ 29.251378] [ 29.252909] Memory state around the buggy address: [ 29.257760] ffff0000822c2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.265073] ffff0000822c2300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.272386] >ffff0000822c2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.279697] ^ [ 29.282980] ffff0000822c2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.290292] ffff0000822c2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.297603] ================================================================== [ 28.388246] ================================================================== [ 28.395592] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 28.402664] Write of size 1 at addr ffff0000822c2373 by task kunit_try_catch/234 [ 28.410164] [ 28.411709] CPU: 3 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 28.411746] Tainted: [N]=TEST [ 28.411753] Hardware name: Thundercomm Dragonboard 845c (DT) [ 28.411770] Call trace: [ 28.411779] show_stack+0x20/0x38 (C) [ 28.411804] dump_stack_lvl+0x8c/0xd0 [ 28.411828] print_report+0x118/0x608 [ 28.411851] kasan_report+0xdc/0x128 [ 28.411870] __asan_report_store1_noabort+0x20/0x30 [ 28.411890] kmalloc_oob_right+0x5a4/0x660 [ 28.411907] kunit_try_run_case+0x170/0x3f0 [ 28.411931] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.411956] kthread+0x328/0x630 [ 28.411976] ret_from_fork+0x10/0x20 [ 28.411999] [ 28.476483] Allocated by task 234: [ 28.479952] kasan_save_stack+0x3c/0x68 [ 28.483859] kasan_save_track+0x20/0x40 [ 28.487763] kasan_save_alloc_info+0x40/0x58 [ 28.492107] __kasan_kmalloc+0xd4/0xd8 [ 28.495925] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.500536] kmalloc_oob_right+0xb0/0x660 [ 28.504612] kunit_try_run_case+0x170/0x3f0 [ 28.508871] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.514439] kthread+0x328/0x630 [ 28.517726] ret_from_fork+0x10/0x20 [ 28.521370] [ 28.522901] The buggy address belongs to the object at ffff0000822c2300 [ 28.522901] which belongs to the cache kmalloc-128 of size 128 [ 28.535564] The buggy address is located 0 bytes to the right of [ 28.535564] allocated 115-byte region [ffff0000822c2300, ffff0000822c2373) [ 28.548670] [ 28.550202] The buggy address belongs to the physical page: [ 28.555850] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1022c2 [ 28.563957] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 28.571718] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 28.578783] page_type: f5(slab) [ 28.581987] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 28.589834] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.597681] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 28.605614] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.613546] head: 0bfffe0000000001 fffffdffc208b081 00000000ffffffff 00000000ffffffff [ 28.621479] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 28.629408] page dumped because: kasan: bad access detected [ 28.635054] [ 28.636583] Memory state around the buggy address: [ 28.641445] ffff0000822c2200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.648759] ffff0000822c2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.656073] >ffff0000822c2300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 28.663385] ^ [ 28.670351] ffff0000822c2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.677667] ffff0000822c2400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.684979] ==================================================================
Failure - log-parser-boot - exception-warning-libmathint_log-at-intlog10
------------[ cut here ]------------ [ 124.670015] WARNING: lib/math/int_log.c:120 at intlog10+0x38/0x48, CPU#3: kunit_try_catch/757 [ 124.678665] Modules linked in: [ 124.681796] CPU: 3 UID: 0 PID: 757 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 124.693073] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 124.698990] Hardware name: Thundercomm Dragonboard 845c (DT) [ 124.704729] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 124.711782] pc : intlog10+0x38/0x48 [ 124.715333] lr : intlog10_test+0xe4/0x200 [ 124.719411] sp : ffff800086797c10 [ 124.722783] x29: ffff800086797c90 x28: 0000000000000000 x27: 0000000000000000 [ 124.730038] x26: 1fffe00011060a61 x25: 0000000000000000 x24: ffff800086797ce0 [ 124.737289] x23: ffff800086797d00 x22: 0000000000000000 x21: 1ffff00010cf2f82 [ 124.744539] x20: ffffae1d601fcae0 x19: ffff8000800a7990 x18: 000000003fb74825 [ 124.751782] x17: 000000040044ffff x16: 005000f2b5503510 x15: 0000000000000000 [ 124.759026] x14: ffff0000808ebcc0 x13: 1fffe0001b5c0989 x12: ffff75c3ac812189 [ 124.766277] x11: 1ffff5c3ac812188 x10: ffff75c3ac812188 x9 : ffffae1d5d83dbe4 [ 124.773530] x8 : ffffae1d64090c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 124.780780] x5 : ffff700010cf2f82 x4 : 1ffff00010014f3a x3 : 1ffff5c3ac03f95c [ 124.788031] x2 : 1ffff5c3ac03f95c x1 : 0000000000000003 x0 : 0000000000000000 [ 124.795275] Call trace: [ 124.797776] intlog10+0x38/0x48 (P) [ 124.801340] kunit_try_run_case+0x170/0x3f0 [ 124.805598] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 124.811170] kthread+0x328/0x630 [ 124.814469] ret_from_fork+0x10/0x20 [ 124.818125] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-libmathint_log-at-intlog2
------------[ cut here ]------------ [ 124.443281] WARNING: lib/math/int_log.c:63 at intlog2+0xd8/0xf8, CPU#5: kunit_try_catch/739 [ 124.451749] Modules linked in: [ 124.454878] CPU: 5 UID: 0 PID: 739 Comm: kunit_try_catch Tainted: G B D N 6.16.0-rc3-next-20250624 #1 PREEMPT [ 124.466147] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 124.471177] Hardware name: Thundercomm Dragonboard 845c (DT) [ 124.476904] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 124.483955] pc : intlog2+0xd8/0xf8 [ 124.487412] lr : intlog2_test+0xe4/0x200 [ 124.491398] sp : ffff800086677c10 [ 124.494765] x29: ffff800086677c90 x28: 0000000000000000 x27: 0000000000000000 [ 124.502007] x26: 1fffe0001105fd21 x25: 0000000000000000 x24: ffff800086677ce0 [ 124.509246] x23: ffff800086677d00 x22: 0000000000000000 x21: 1ffff00010ccef82 [ 124.516483] x20: ffffae1d601fc9e0 x19: ffff8000800a7990 x18: 00000000458fdea4 [ 124.523721] x17: 000000040044ffff x16: 005000f4b5503510 x15: 0000000000000000 [ 124.530965] x14: ffff0000808ee540 x13: 1fffe0001b5c9189 x12: ffff75c3ac812189 [ 124.538202] x11: 1ffff5c3ac812188 x10: ffff75c3ac812188 x9 : ffffae1d5d83dde4 [ 124.545440] x8 : ffffae1d64090c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 124.552677] x5 : ffff700010ccef82 x4 : 1ffff00010014f3a x3 : 1ffff5c3ac03f93c [ 124.559913] x2 : 1ffff5c3ac03f93c x1 : 0000000000000003 x0 : 0000000000000000 [ 124.567152] Call trace: [ 124.569648] intlog2+0xd8/0xf8 (P) [ 124.573117] kunit_try_run_case+0x170/0x3f0 [ 124.577370] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 124.582934] kthread+0x328/0x630 [ 124.586219] ret_from_fork+0x10/0x20 [ 124.589864] ---[ end trace 0000000000000000 ]---
Failure - lava - job
(no logs available)
Failure - lava - fastboot-boot
(no logs available)