Date
June 25, 2025, 8:08 a.m.
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 29.011059] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 28.974979] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[ 28.924565] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 28.917702] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0
Failure - log-parser-boot - internal-error-oops-oops-smp
[ 104.403295] Internal error: Oops: 0000000096000005 [#1] SMP [ 104.409191] Modules linked in: [ 104.409674] CPU: 0 UID: 0 PID: 544 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 104.410214] Tainted: [B]=BAD_PAGE, [N]=TEST [ 104.410478] Hardware name: linux,dummy-virt (DT) [ 104.410820] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 104.411247] pc : kunit_test_null_dereference+0x70/0x170 [ 104.411615] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 104.412070] sp : ffff800080ed7d30 [ 104.412619] x29: ffff800080ed7d90 x28: 0000000000000000 x27: 0000000000000000 [ 104.413164] x26: 1ffe0000187eeec1 x25: 0000000000000000 x24: 0000000000000004 [ 104.413612] x23: fff00000c3f7760c x22: ffff9ec8ad02ab20 x21: fff00000c139d288 [ 104.414062] x20: 1ffff000101dafa6 x19: ffff800080087990 x18: 0000000018174c71 [ 104.414516] x17: 0000000000000001 x16: fff00000da462d28 x15: fff00000ff616b08 [ 104.414926] x14: 00000000f1f1f1f1 x13: 1ffe00001b48c589 x12: fffd800019798b3c [ 104.415341] x11: 1ffe000019798b3b x10: fffd800019798b3b x9 : ffff9ec8ad0222b0 [ 104.415803] x8 : ffff800080ed7c18 x7 : 0000000000000001 x6 : 0000000041b58ab3 [ 104.416234] x5 : ffff7000101dafa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 104.416643] x2 : dfff800000000000 x1 : fff00000cbcc5100 x0 : ffff800080087990 [ 104.417070] Call trace: [ 104.417261] kunit_test_null_dereference+0x70/0x170 (P) [ 104.417708] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 104.418031] kthread+0x328/0x630 [ 104.418253] ret_from_fork+0x10/0x20 [ 104.418724] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 104.419283] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[ 61.353038] ================================================================== [ 61.353103] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 61.353103] [ 61.353195] Use-after-free read at 0x00000000fdc339b6 (in kfence-#163): [ 61.353248] test_krealloc+0x51c/0x830 [ 61.353293] kunit_try_run_case+0x170/0x3f0 [ 61.353339] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.353385] kthread+0x328/0x630 [ 61.353438] ret_from_fork+0x10/0x20 [ 61.353480] [ 61.353504] kfence-#163: 0x00000000fdc339b6-0x000000007a76df1a, size=32, cache=kmalloc-32 [ 61.353504] [ 61.353558] allocated by task 349 on cpu 0 at 61.352417s (0.001138s ago): [ 61.353627] test_alloc+0x29c/0x628 [ 61.353668] test_krealloc+0xc0/0x830 [ 61.353707] kunit_try_run_case+0x170/0x3f0 [ 61.353747] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.353791] kthread+0x328/0x630 [ 61.353827] ret_from_fork+0x10/0x20 [ 61.353866] [ 61.353889] freed by task 349 on cpu 0 at 61.352632s (0.001253s ago): [ 61.353951] krealloc_noprof+0x148/0x360 [ 61.353990] test_krealloc+0x1dc/0x830 [ 61.354038] kunit_try_run_case+0x170/0x3f0 [ 61.354077] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.354120] kthread+0x328/0x630 [ 61.354155] ret_from_fork+0x10/0x20 [ 61.354192] [ 61.354237] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 61.354315] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.354343] Hardware name: linux,dummy-virt (DT) [ 61.354378] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[ 61.268309] ================================================================== [ 61.268420] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 61.268420] [ 61.268518] Use-after-free read at 0x00000000a6f4c249 (in kfence-#162): [ 61.268572] test_memcache_typesafe_by_rcu+0x280/0x560 [ 61.268620] kunit_try_run_case+0x170/0x3f0 [ 61.268667] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.268710] kthread+0x328/0x630 [ 61.268751] ret_from_fork+0x10/0x20 [ 61.268791] [ 61.268815] kfence-#162: 0x00000000a6f4c249-0x00000000bbcf2cdf, size=32, cache=test [ 61.268815] [ 61.268867] allocated by task 347 on cpu 1 at 61.252292s (0.016570s ago): [ 61.268938] test_alloc+0x230/0x628 [ 61.268977] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 61.269021] kunit_try_run_case+0x170/0x3f0 [ 61.269059] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.269103] kthread+0x328/0x630 [ 61.269137] ret_from_fork+0x10/0x20 [ 61.269176] [ 61.269200] freed by task 347 on cpu 1 at 61.252423s (0.016773s ago): [ 61.269255] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 61.269299] kunit_try_run_case+0x170/0x3f0 [ 61.269338] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.269380] kthread+0x328/0x630 [ 61.269428] ret_from_fork+0x10/0x20 [ 61.269466] [ 61.269511] CPU: 1 UID: 0 PID: 347 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 61.269588] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.269618] Hardware name: linux,dummy-virt (DT) [ 61.269654] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[ 38.596017] ================================================================== [ 38.596166] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 38.596166] [ 38.596266] Invalid read at 0x00000000c57d7bfd: [ 38.596434] test_invalid_access+0xdc/0x1f0 [ 38.597624] kunit_try_run_case+0x170/0x3f0 [ 38.597697] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.597747] kthread+0x328/0x630 [ 38.597793] ret_from_fork+0x10/0x20 [ 38.598066] [ 38.598445] CPU: 0 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 38.599116] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.599287] Hardware name: linux,dummy-virt (DT) [ 38.599500] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[ 38.368544] ================================================================== [ 38.368636] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 38.368636] [ 38.368699] Corrupted memory at 0x00000000b0604dca [ ! . . . . . . . . . . . . . . . ] (in kfence-#158): [ 38.369011] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 38.369058] kunit_try_run_case+0x170/0x3f0 [ 38.369102] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.369146] kthread+0x328/0x630 [ 38.369184] ret_from_fork+0x10/0x20 [ 38.369224] [ 38.369249] kfence-#158: 0x000000008755540d-0x000000009152afee, size=73, cache=kmalloc-96 [ 38.369249] [ 38.369301] allocated by task 337 on cpu 0 at 38.368293s (0.001004s ago): [ 38.369363] test_alloc+0x29c/0x628 [ 38.369417] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 38.369462] kunit_try_run_case+0x170/0x3f0 [ 38.369502] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.369548] kthread+0x328/0x630 [ 38.369582] ret_from_fork+0x10/0x20 [ 38.369622] [ 38.369645] freed by task 337 on cpu 0 at 38.368449s (0.001193s ago): [ 38.369707] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 38.369751] kunit_try_run_case+0x170/0x3f0 [ 38.369792] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.369836] kthread+0x328/0x630 [ 38.369873] ret_from_fork+0x10/0x20 [ 38.369915] [ 38.369960] CPU: 0 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 38.370042] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.370071] Hardware name: linux,dummy-virt (DT) [ 38.370104] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[ 38.056819] ================================================================== [ 38.056881] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 38.056881] [ 38.056973] Out-of-bounds read at 0x00000000db2ea026 (105B right of kfence-#155): [ 38.057032] test_kmalloc_aligned_oob_read+0x238/0x468 [ 38.057081] kunit_try_run_case+0x170/0x3f0 [ 38.057126] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.057168] kthread+0x328/0x630 [ 38.057208] ret_from_fork+0x10/0x20 [ 38.057247] [ 38.057271] kfence-#155: 0x000000004dd8e523-0x00000000c30cfabc, size=73, cache=kmalloc-96 [ 38.057271] [ 38.057323] allocated by task 335 on cpu 0 at 38.056559s (0.000760s ago): [ 38.057392] test_alloc+0x29c/0x628 [ 38.057450] test_kmalloc_aligned_oob_read+0x100/0x468 [ 38.057494] kunit_try_run_case+0x170/0x3f0 [ 38.057534] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.057578] kthread+0x328/0x630 [ 38.057613] ret_from_fork+0x10/0x20 [ 38.057654] [ 38.057699] CPU: 0 UID: 0 PID: 335 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 38.057778] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.057807] Hardware name: linux,dummy-virt (DT) [ 38.057842] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[ 32.856587] ================================================================== [ 32.856680] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 32.856680] [ 32.856742] Corrupted memory at 0x00000000f5cc9388 [ ! ] (in kfence-#105): [ 32.856868] test_corruption+0x284/0x378 [ 32.856915] kunit_try_run_case+0x170/0x3f0 [ 32.856959] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.857004] kthread+0x328/0x630 [ 32.857043] ret_from_fork+0x10/0x20 [ 32.857082] [ 32.857106] kfence-#105: 0x00000000e4547633-0x0000000037d65880, size=32, cache=kmalloc-32 [ 32.857106] [ 32.857161] allocated by task 323 on cpu 1 at 32.856299s (0.000858s ago): [ 32.857221] test_alloc+0x29c/0x628 [ 32.857262] test_corruption+0x198/0x378 [ 32.857301] kunit_try_run_case+0x170/0x3f0 [ 32.857342] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.857385] kthread+0x328/0x630 [ 32.857434] ret_from_fork+0x10/0x20 [ 32.857473] [ 32.857498] freed by task 323 on cpu 1 at 32.856413s (0.001080s ago): [ 32.857556] test_corruption+0x284/0x378 [ 32.857595] kunit_try_run_case+0x170/0x3f0 [ 32.857635] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.857679] kthread+0x328/0x630 [ 32.857716] ret_from_fork+0x10/0x20 [ 32.857755] [ 32.857797] CPU: 1 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 32.857874] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.857905] Hardware name: linux,dummy-virt (DT) [ 32.857939] ================================================================== [ 33.584510] ================================================================== [ 33.584611] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 33.584611] [ 33.584677] Corrupted memory at 0x00000000e54e714b [ ! . . . . . . . . . . . . . . . ] (in kfence-#112): [ 33.584996] test_corruption+0x120/0x378 [ 33.585044] kunit_try_run_case+0x170/0x3f0 [ 33.585089] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.585135] kthread+0x328/0x630 [ 33.585175] ret_from_fork+0x10/0x20 [ 33.585214] [ 33.585238] kfence-#112: 0x000000000997f49e-0x000000003063e523, size=32, cache=test [ 33.585238] [ 33.585292] allocated by task 325 on cpu 1 at 33.584337s (0.000951s ago): [ 33.585350] test_alloc+0x230/0x628 [ 33.585392] test_corruption+0xdc/0x378 [ 33.585442] kunit_try_run_case+0x170/0x3f0 [ 33.585482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.585526] kthread+0x328/0x630 [ 33.585561] ret_from_fork+0x10/0x20 [ 33.585601] [ 33.585624] freed by task 325 on cpu 1 at 33.584413s (0.001207s ago): [ 33.585685] test_corruption+0x120/0x378 [ 33.585726] kunit_try_run_case+0x170/0x3f0 [ 33.585764] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.585808] kthread+0x328/0x630 [ 33.585842] ret_from_fork+0x10/0x20 [ 33.585883] [ 33.585927] CPU: 1 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 33.586003] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.586032] Hardware name: linux,dummy-virt (DT) [ 33.586066] ================================================================== [ 33.896523] ================================================================== [ 33.896623] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 33.896623] [ 33.896684] Corrupted memory at 0x000000003e0e21f4 [ ! ] (in kfence-#115): [ 33.896798] test_corruption+0x1d8/0x378 [ 33.896843] kunit_try_run_case+0x170/0x3f0 [ 33.896887] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.896930] kthread+0x328/0x630 [ 33.896970] ret_from_fork+0x10/0x20 [ 33.897009] [ 33.897033] kfence-#115: 0x000000008f8d303f-0x0000000012ccc1de, size=32, cache=test [ 33.897033] [ 33.897085] allocated by task 325 on cpu 1 at 33.896356s (0.000726s ago): [ 33.897146] test_alloc+0x230/0x628 [ 33.897187] test_corruption+0x198/0x378 [ 33.897228] kunit_try_run_case+0x170/0x3f0 [ 33.897268] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.897313] kthread+0x328/0x630 [ 33.897349] ret_from_fork+0x10/0x20 [ 33.897389] [ 33.897423] freed by task 325 on cpu 1 at 33.896432s (0.000988s ago): [ 33.897485] test_corruption+0x1d8/0x378 [ 33.897525] kunit_try_run_case+0x170/0x3f0 [ 33.897565] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.897609] kthread+0x328/0x630 [ 33.897645] ret_from_fork+0x10/0x20 [ 33.897685] [ 33.897728] CPU: 1 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 33.897804] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.897833] Hardware name: linux,dummy-virt (DT) [ 33.897866] ================================================================== [ 32.544545] ================================================================== [ 32.544637] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 32.544637] [ 32.544700] Corrupted memory at 0x00000000cc33f377 [ ! . . . . . . . . . . . . . . . ] (in kfence-#102): [ 32.545014] test_corruption+0x278/0x378 [ 32.545060] kunit_try_run_case+0x170/0x3f0 [ 32.545108] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.545157] kthread+0x328/0x630 [ 32.545197] ret_from_fork+0x10/0x20 [ 32.545239] [ 32.545265] kfence-#102: 0x000000006984e281-0x000000000a6482b1, size=32, cache=kmalloc-32 [ 32.545265] [ 32.545323] allocated by task 323 on cpu 1 at 32.544329s (0.000991s ago): [ 32.545385] test_alloc+0x29c/0x628 [ 32.545439] test_corruption+0xdc/0x378 [ 32.545480] kunit_try_run_case+0x170/0x3f0 [ 32.545520] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.545565] kthread+0x328/0x630 [ 32.545601] ret_from_fork+0x10/0x20 [ 32.545641] [ 32.545664] freed by task 323 on cpu 1 at 32.544448s (0.001212s ago): [ 32.545723] test_corruption+0x278/0x378 [ 32.545763] kunit_try_run_case+0x170/0x3f0 [ 32.545802] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.545844] kthread+0x328/0x630 [ 32.545880] ret_from_fork+0x10/0x20 [ 32.545918] [ 32.545967] CPU: 1 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 32.546042] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.546071] Hardware name: linux,dummy-virt (DT) [ 32.546105] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[ 32.128365] ================================================================== [ 32.128466] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 32.128466] [ 32.128528] Invalid free of 0x00000000d4f50f32 (in kfence-#98): [ 32.128580] test_invalid_addr_free+0xec/0x238 [ 32.128627] kunit_try_run_case+0x170/0x3f0 [ 32.128668] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.128712] kthread+0x328/0x630 [ 32.128749] ret_from_fork+0x10/0x20 [ 32.128789] [ 32.128812] kfence-#98: 0x00000000d380b172-0x00000000eebc3721, size=32, cache=test [ 32.128812] [ 32.128864] allocated by task 321 on cpu 0 at 32.128250s (0.000611s ago): [ 32.128924] test_alloc+0x230/0x628 [ 32.128965] test_invalid_addr_free+0xd4/0x238 [ 32.129007] kunit_try_run_case+0x170/0x3f0 [ 32.129046] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.129090] kthread+0x328/0x630 [ 32.129125] ret_from_fork+0x10/0x20 [ 32.129165] [ 32.129205] CPU: 0 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 32.129282] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.129310] Hardware name: linux,dummy-virt (DT) [ 32.129344] ================================================================== [ 32.024413] ================================================================== [ 32.024499] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 32.024499] [ 32.024560] Invalid free of 0x0000000070a563c6 (in kfence-#97): [ 32.024612] test_invalid_addr_free+0x1ac/0x238 [ 32.024658] kunit_try_run_case+0x170/0x3f0 [ 32.024703] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.024748] kthread+0x328/0x630 [ 32.024785] ret_from_fork+0x10/0x20 [ 32.024826] [ 32.024851] kfence-#97: 0x00000000aaa38ea0-0x00000000aafa96c1, size=32, cache=kmalloc-32 [ 32.024851] [ 32.024903] allocated by task 319 on cpu 0 at 32.024258s (0.000641s ago): [ 32.024965] test_alloc+0x29c/0x628 [ 32.025005] test_invalid_addr_free+0xd4/0x238 [ 32.025047] kunit_try_run_case+0x170/0x3f0 [ 32.025087] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.025134] kthread+0x328/0x630 [ 32.025168] ret_from_fork+0x10/0x20 [ 32.025207] [ 32.025252] CPU: 0 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 32.025329] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.025359] Hardware name: linux,dummy-virt (DT) [ 32.025404] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[ 31.920491] ================================================================== [ 31.920585] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 31.920585] [ 31.920645] Invalid free of 0x00000000081551ee (in kfence-#96): [ 31.920697] test_double_free+0x100/0x238 [ 31.920742] kunit_try_run_case+0x170/0x3f0 [ 31.920784] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.920830] kthread+0x328/0x630 [ 31.920869] ret_from_fork+0x10/0x20 [ 31.920907] [ 31.920931] kfence-#96: 0x00000000081551ee-0x00000000e37aef70, size=32, cache=test [ 31.920931] [ 31.920981] allocated by task 317 on cpu 1 at 31.920250s (0.000728s ago): [ 31.921043] test_alloc+0x230/0x628 [ 31.921084] test_double_free+0xd4/0x238 [ 31.921125] kunit_try_run_case+0x170/0x3f0 [ 31.921163] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.921207] kthread+0x328/0x630 [ 31.921242] ret_from_fork+0x10/0x20 [ 31.921282] [ 31.921304] freed by task 317 on cpu 1 at 31.920313s (0.000987s ago): [ 31.921366] test_double_free+0xf0/0x238 [ 31.921417] kunit_try_run_case+0x170/0x3f0 [ 31.921458] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.921501] kthread+0x328/0x630 [ 31.921536] ret_from_fork+0x10/0x20 [ 31.921576] [ 31.921621] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 31.921699] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.921728] Hardware name: linux,dummy-virt (DT) [ 31.921761] ================================================================== [ 31.816566] ================================================================== [ 31.816684] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 31.816684] [ 31.816757] Invalid free of 0x0000000094ee4f98 (in kfence-#95): [ 31.816822] test_double_free+0x1bc/0x238 [ 31.816868] kunit_try_run_case+0x170/0x3f0 [ 31.816914] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.816958] kthread+0x328/0x630 [ 31.816997] ret_from_fork+0x10/0x20 [ 31.817037] [ 31.817061] kfence-#95: 0x0000000094ee4f98-0x00000000590f49f0, size=32, cache=kmalloc-32 [ 31.817061] [ 31.817114] allocated by task 315 on cpu 1 at 31.816299s (0.000811s ago): [ 31.817176] test_alloc+0x29c/0x628 [ 31.817215] test_double_free+0xd4/0x238 [ 31.817256] kunit_try_run_case+0x170/0x3f0 [ 31.817297] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.817342] kthread+0x328/0x630 [ 31.817379] ret_from_fork+0x10/0x20 [ 31.817434] [ 31.817459] freed by task 315 on cpu 1 at 31.816377s (0.001078s ago): [ 31.817522] test_double_free+0x1ac/0x238 [ 31.817563] kunit_try_run_case+0x170/0x3f0 [ 31.817603] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.817647] kthread+0x328/0x630 [ 31.817683] ret_from_fork+0x10/0x20 [ 31.817723] [ 31.817768] CPU: 1 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 31.817846] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.817874] Hardware name: linux,dummy-virt (DT) [ 31.817908] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[ 31.504415] ================================================================== [ 31.504512] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 31.504512] [ 31.504603] Use-after-free read at 0x00000000844f01de (in kfence-#92): [ 31.504654] test_use_after_free_read+0x114/0x248 [ 31.504701] kunit_try_run_case+0x170/0x3f0 [ 31.504745] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.504791] kthread+0x328/0x630 [ 31.504829] ret_from_fork+0x10/0x20 [ 31.504870] [ 31.504894] kfence-#92: 0x00000000844f01de-0x00000000093164be, size=32, cache=test [ 31.504894] [ 31.504942] allocated by task 309 on cpu 1 at 31.504221s (0.000718s ago): [ 31.505012] test_alloc+0x230/0x628 [ 31.505051] test_use_after_free_read+0xd0/0x248 [ 31.505095] kunit_try_run_case+0x170/0x3f0 [ 31.505134] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.505178] kthread+0x328/0x630 [ 31.505213] ret_from_fork+0x10/0x20 [ 31.505252] [ 31.505275] freed by task 309 on cpu 1 at 31.504280s (0.000991s ago): [ 31.505375] test_use_after_free_read+0xf0/0x248 [ 31.505429] kunit_try_run_case+0x170/0x3f0 [ 31.505470] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.505513] kthread+0x328/0x630 [ 31.505549] ret_from_fork+0x10/0x20 [ 31.505589] [ 31.505633] CPU: 1 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 31.505708] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.505737] Hardware name: linux,dummy-virt (DT) [ 31.505771] ================================================================== [ 31.400641] ================================================================== [ 31.400754] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 31.400754] [ 31.400859] Use-after-free read at 0x00000000fade0144 (in kfence-#91): [ 31.400912] test_use_after_free_read+0x114/0x248 [ 31.400960] kunit_try_run_case+0x170/0x3f0 [ 31.401005] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.401049] kthread+0x328/0x630 [ 31.401087] ret_from_fork+0x10/0x20 [ 31.401128] [ 31.401152] kfence-#91: 0x00000000fade0144-0x0000000061ee8479, size=32, cache=kmalloc-32 [ 31.401152] [ 31.401204] allocated by task 307 on cpu 1 at 31.400318s (0.000882s ago): [ 31.401273] test_alloc+0x29c/0x628 [ 31.401314] test_use_after_free_read+0xd0/0x248 [ 31.401356] kunit_try_run_case+0x170/0x3f0 [ 31.401411] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.401456] kthread+0x328/0x630 [ 31.401491] ret_from_fork+0x10/0x20 [ 31.401531] [ 31.401554] freed by task 307 on cpu 1 at 31.400391s (0.001159s ago): [ 31.401617] test_use_after_free_read+0x1c0/0x248 [ 31.401658] kunit_try_run_case+0x170/0x3f0 [ 31.401697] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.401740] kthread+0x328/0x630 [ 31.401777] ret_from_fork+0x10/0x20 [ 31.401817] [ 31.401865] CPU: 1 UID: 0 PID: 307 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 31.401943] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.401973] Hardware name: linux,dummy-virt (DT) [ 31.402008] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[ 31.194096] ================================================================== [ 31.194421] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 31.194421] [ 31.194782] Out-of-bounds write at 0x0000000030931e37 (1B left of kfence-#89): [ 31.195303] test_out_of_bounds_write+0x100/0x240 [ 31.195418] kunit_try_run_case+0x170/0x3f0 [ 31.195471] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.195516] kthread+0x328/0x630 [ 31.195742] ret_from_fork+0x10/0x20 [ 31.195812] [ 31.195839] kfence-#89: 0x00000000cacf066f-0x00000000ec1e6156, size=32, cache=kmalloc-32 [ 31.195839] [ 31.196171] allocated by task 303 on cpu 0 at 31.193821s (0.002343s ago): [ 31.196307] test_alloc+0x29c/0x628 [ 31.196426] test_out_of_bounds_write+0xc8/0x240 [ 31.196479] kunit_try_run_case+0x170/0x3f0 [ 31.196520] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.196564] kthread+0x328/0x630 [ 31.197024] ret_from_fork+0x10/0x20 [ 31.197591] [ 31.197696] CPU: 0 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 31.197960] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.198288] Hardware name: linux,dummy-virt (DT) [ 31.198520] ================================================================== [ 31.296342] ================================================================== [ 31.296452] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 31.296452] [ 31.296537] Out-of-bounds write at 0x00000000626102a9 (1B left of kfence-#90): [ 31.296594] test_out_of_bounds_write+0x100/0x240 [ 31.296642] kunit_try_run_case+0x170/0x3f0 [ 31.296686] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.296731] kthread+0x328/0x630 [ 31.296772] ret_from_fork+0x10/0x20 [ 31.296817] [ 31.296842] kfence-#90: 0x00000000f2b75796-0x0000000043e8a102, size=32, cache=test [ 31.296842] [ 31.296892] allocated by task 305 on cpu 0 at 31.296265s (0.000623s ago): [ 31.296961] test_alloc+0x230/0x628 [ 31.297002] test_out_of_bounds_write+0xc8/0x240 [ 31.297046] kunit_try_run_case+0x170/0x3f0 [ 31.297086] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.297128] kthread+0x328/0x630 [ 31.297164] ret_from_fork+0x10/0x20 [ 31.297203] [ 31.297242] CPU: 0 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 31.297319] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.297348] Hardware name: linux,dummy-virt (DT) [ 31.297380] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[ 30.557601] ================================================================== [ 30.557681] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 30.557681] [ 30.557788] Out-of-bounds read at 0x000000004d9a2610 (1B left of kfence-#83): [ 30.558082] test_out_of_bounds_read+0x114/0x3e0 [ 30.558153] kunit_try_run_case+0x170/0x3f0 [ 30.558197] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.558381] kthread+0x328/0x630 [ 30.558533] ret_from_fork+0x10/0x20 [ 30.558819] [ 30.558863] kfence-#83: 0x000000005dabf49f-0x0000000069f86460, size=32, cache=test [ 30.558863] [ 30.558937] allocated by task 301 on cpu 0 at 30.557406s (0.001508s ago): [ 30.559152] test_alloc+0x230/0x628 [ 30.559249] test_out_of_bounds_read+0xdc/0x3e0 [ 30.559293] kunit_try_run_case+0x170/0x3f0 [ 30.559615] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.559734] kthread+0x328/0x630 [ 30.559853] ret_from_fork+0x10/0x20 [ 30.559912] [ 30.560104] CPU: 0 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 30.560306] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.560338] Hardware name: linux,dummy-virt (DT) [ 30.560372] ================================================================== [ 30.145028] ================================================================== [ 30.145244] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 30.145244] [ 30.145729] Out-of-bounds read at 0x0000000000e2b419 (32B right of kfence-#79): [ 30.145895] test_out_of_bounds_read+0x1c8/0x3e0 [ 30.145950] kunit_try_run_case+0x170/0x3f0 [ 30.145993] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.146089] kthread+0x328/0x630 [ 30.146138] ret_from_fork+0x10/0x20 [ 30.146179] [ 30.146329] kfence-#79: 0x000000005ae89ba9-0x000000007a582b29, size=32, cache=kmalloc-32 [ 30.146329] [ 30.146532] allocated by task 299 on cpu 0 at 30.144633s (0.001850s ago): [ 30.146612] test_alloc+0x29c/0x628 [ 30.146698] test_out_of_bounds_read+0x198/0x3e0 [ 30.146766] kunit_try_run_case+0x170/0x3f0 [ 30.147254] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.147372] kthread+0x328/0x630 [ 30.147422] ret_from_fork+0x10/0x20 [ 30.147591] [ 30.147727] CPU: 0 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 30.147815] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.147895] Hardware name: linux,dummy-virt (DT) [ 30.147970] ================================================================== [ 30.038339] ================================================================== [ 30.038737] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 30.038737] [ 30.039079] Out-of-bounds read at 0x000000008d22b23e (1B left of kfence-#78): [ 30.039471] test_out_of_bounds_read+0x114/0x3e0 [ 30.039570] kunit_try_run_case+0x170/0x3f0 [ 30.039621] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.039666] kthread+0x328/0x630 [ 30.039722] ret_from_fork+0x10/0x20 [ 30.039778] [ 30.039803] kfence-#78: 0x00000000ac6aad7c-0x000000000c04cf5a, size=32, cache=kmalloc-32 [ 30.039803] [ 30.039903] allocated by task 299 on cpu 0 at 30.037478s (0.002419s ago): [ 30.039972] test_alloc+0x29c/0x628 [ 30.040136] test_out_of_bounds_read+0xdc/0x3e0 [ 30.040182] kunit_try_run_case+0x170/0x3f0 [ 30.040515] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.040679] kthread+0x328/0x630 [ 30.040792] ret_from_fork+0x10/0x20 [ 30.040956] [ 30.041261] CPU: 0 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 30.041539] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.041589] Hardware name: linux,dummy-virt (DT) [ 30.041726] ================================================================== [ 30.870018] ================================================================== [ 30.870139] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 30.870139] [ 30.870339] Out-of-bounds read at 0x00000000fef85494 (32B right of kfence-#86): [ 30.870732] test_out_of_bounds_read+0x1c8/0x3e0 [ 30.870801] kunit_try_run_case+0x170/0x3f0 [ 30.870845] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.870888] kthread+0x328/0x630 [ 30.871029] ret_from_fork+0x10/0x20 [ 30.871075] [ 30.871100] kfence-#86: 0x000000008a395800-0x00000000a511a9cd, size=32, cache=test [ 30.871100] [ 30.871501] allocated by task 301 on cpu 0 at 30.869809s (0.001665s ago): [ 30.871750] test_alloc+0x230/0x628 [ 30.871800] test_out_of_bounds_read+0x198/0x3e0 [ 30.871843] kunit_try_run_case+0x170/0x3f0 [ 30.871917] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.872085] kthread+0x328/0x630 [ 30.872487] ret_from_fork+0x10/0x20 [ 30.872606] [ 30.872780] CPU: 0 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 30.872860] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.873220] Hardware name: linux,dummy-virt (DT) [ 30.873343] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-kfree_action_wrapper
[ 29.751661] ================================================================== [ 29.751766] BUG: KFENCE: memory corruption in kfree_action_wrapper+0x18/0x30 [ 29.751766] [ 29.751871] Corrupted memory at 0x000000009dcf67f0 [ ! . . . . . . . . . . . . . . . ] (in kfence-#75): [ 29.754999] kfree_action_wrapper+0x18/0x30 [ 29.755060] __kunit_action_free+0x58/0x80 [ 29.755101] kunit_remove_resource+0x14c/0x1f8 [ 29.755143] kunit_cleanup+0x6c/0x108 [ 29.755181] kunit_try_run_case_cleanup+0xa4/0xe0 [ 29.755223] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.755277] kthread+0x328/0x630 [ 29.755326] ret_from_fork+0x10/0x20 [ 29.755376] [ 29.755543] kfence-#75: 0x00000000bf323abe-0x00000000256a4ca1, size=120, cache=kmalloc-128 [ 29.755543] [ 29.756124] allocated by task 297 on cpu 0 at 29.710347s (0.045316s ago): [ 29.756550] kunit_kmalloc_array+0x34/0x88 [ 29.756822] copy_user_test_oob+0xac/0xec8 [ 29.756926] kunit_try_run_case+0x170/0x3f0 [ 29.756976] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.757138] kthread+0x328/0x630 [ 29.757210] ret_from_fork+0x10/0x20 [ 29.757646] [ 29.758011] freed by task 298 on cpu 0 at 29.750934s (0.006888s ago): [ 29.758336] kfree_action_wrapper+0x18/0x30 [ 29.758493] __kunit_action_free+0x58/0x80 [ 29.758589] kunit_remove_resource+0x14c/0x1f8 [ 29.758691] kunit_cleanup+0x6c/0x108 [ 29.758730] kunit_try_run_case_cleanup+0xa4/0xe0 [ 29.758772] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.759044] kthread+0x328/0x630 [ 29.759180] ret_from_fork+0x10/0x20 [ 29.759363] [ 29.759496] CPU: 0 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 29.759590] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.759709] Hardware name: linux,dummy-virt (DT) [ 29.759939] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[ 29.677657] ================================================================== [ 29.677727] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 29.677801] Read of size 8 at addr fff00000c786ac78 by task kunit_try_catch/293 [ 29.677853] [ 29.677893] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 29.677983] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.678013] Hardware name: linux,dummy-virt (DT) [ 29.678049] Call trace: [ 29.678074] show_stack+0x20/0x38 (C) [ 29.678128] dump_stack_lvl+0x8c/0xd0 [ 29.678176] print_report+0x118/0x608 [ 29.678226] kasan_report+0xdc/0x128 [ 29.678271] __asan_report_load8_noabort+0x20/0x30 [ 29.678321] copy_to_kernel_nofault+0x204/0x250 [ 29.678371] copy_to_kernel_nofault_oob+0x158/0x418 [ 29.678469] kunit_try_run_case+0x170/0x3f0 [ 29.678520] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.678594] kthread+0x328/0x630 [ 29.678658] ret_from_fork+0x10/0x20 [ 29.678737] [ 29.678759] Allocated by task 293: [ 29.678791] kasan_save_stack+0x3c/0x68 [ 29.678888] kasan_save_track+0x20/0x40 [ 29.678987] kasan_save_alloc_info+0x40/0x58 [ 29.679055] __kasan_kmalloc+0xd4/0xd8 [ 29.679158] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.679235] copy_to_kernel_nofault_oob+0xc8/0x418 [ 29.679680] kunit_try_run_case+0x170/0x3f0 [ 29.679820] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.679972] kthread+0x328/0x630 [ 29.680012] ret_from_fork+0x10/0x20 [ 29.680070] [ 29.680104] The buggy address belongs to the object at fff00000c786ac00 [ 29.680104] which belongs to the cache kmalloc-128 of size 128 [ 29.680167] The buggy address is located 0 bytes to the right of [ 29.680167] allocated 120-byte region [fff00000c786ac00, fff00000c786ac78) [ 29.680437] [ 29.680527] The buggy address belongs to the physical page: [ 29.680687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10786a [ 29.680785] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.681000] page_type: f5(slab) [ 29.681165] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.681288] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.681330] page dumped because: kasan: bad access detected [ 29.681578] [ 29.681606] Memory state around the buggy address: [ 29.681742] fff00000c786ab00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.681871] fff00000c786ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.682045] >fff00000c786ac00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.682118] ^ [ 29.682253] fff00000c786ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.682301] fff00000c786ad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.682608] ================================================================== [ 29.683795] ================================================================== [ 29.683856] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 29.684100] Write of size 8 at addr fff00000c786ac78 by task kunit_try_catch/293 [ 29.684312] [ 29.684444] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 29.684642] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.684723] Hardware name: linux,dummy-virt (DT) [ 29.684811] Call trace: [ 29.684900] show_stack+0x20/0x38 (C) [ 29.685055] dump_stack_lvl+0x8c/0xd0 [ 29.685271] print_report+0x118/0x608 [ 29.685360] kasan_report+0xdc/0x128 [ 29.685425] kasan_check_range+0x100/0x1a8 [ 29.685606] __kasan_check_write+0x20/0x30 [ 29.685775] copy_to_kernel_nofault+0x8c/0x250 [ 29.685936] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 29.686059] kunit_try_run_case+0x170/0x3f0 [ 29.686134] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.686453] kthread+0x328/0x630 [ 29.686655] ret_from_fork+0x10/0x20 [ 29.686745] [ 29.686775] Allocated by task 293: [ 29.686869] kasan_save_stack+0x3c/0x68 [ 29.687011] kasan_save_track+0x20/0x40 [ 29.687170] kasan_save_alloc_info+0x40/0x58 [ 29.687261] __kasan_kmalloc+0xd4/0xd8 [ 29.687352] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.687478] copy_to_kernel_nofault_oob+0xc8/0x418 [ 29.687524] kunit_try_run_case+0x170/0x3f0 [ 29.687965] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.688079] kthread+0x328/0x630 [ 29.688340] ret_from_fork+0x10/0x20 [ 29.688533] [ 29.688614] The buggy address belongs to the object at fff00000c786ac00 [ 29.688614] which belongs to the cache kmalloc-128 of size 128 [ 29.688827] The buggy address is located 0 bytes to the right of [ 29.688827] allocated 120-byte region [fff00000c786ac00, fff00000c786ac78) [ 29.688959] [ 29.689118] The buggy address belongs to the physical page: [ 29.689160] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10786a [ 29.689352] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.689532] page_type: f5(slab) [ 29.689775] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.689985] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.690127] page dumped because: kasan: bad access detected [ 29.690166] [ 29.690186] Memory state around the buggy address: [ 29.690433] fff00000c786ab00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.690487] fff00000c786ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.690592] >fff00000c786ac00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.690739] ^ [ 29.690902] fff00000c786ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.691101] fff00000c786ad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.691148] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 29.628500] ================================================================== [ 29.628591] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 29.628753] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/281 [ 29.628844] [ 29.628924] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 29.629163] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.629211] Hardware name: linux,dummy-virt (DT) [ 29.629246] Call trace: [ 29.629287] show_stack+0x20/0x38 (C) [ 29.629340] dump_stack_lvl+0x8c/0xd0 [ 29.629433] print_report+0x310/0x608 [ 29.629510] kasan_report+0xdc/0x128 [ 29.629566] __asan_report_load1_noabort+0x20/0x30 [ 29.629670] vmalloc_oob+0x578/0x5d0 [ 29.629745] kunit_try_run_case+0x170/0x3f0 [ 29.629825] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.629907] kthread+0x328/0x630 [ 29.629952] ret_from_fork+0x10/0x20 [ 29.630002] [ 29.630032] The buggy address belongs to the virtual mapping at [ 29.630032] [ffff8000800fe000, ffff800080100000) created by: [ 29.630032] vmalloc_oob+0x98/0x5d0 [ 29.630248] [ 29.630277] The buggy address belongs to the physical page: [ 29.630453] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10786e [ 29.630533] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.630641] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 29.630706] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 29.630965] page dumped because: kasan: bad access detected [ 29.631131] [ 29.631161] Memory state around the buggy address: [ 29.631198] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.631243] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.631569] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 29.631667] ^ [ 29.631711] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 29.631755] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 29.631813] ================================================================== [ 29.632920] ================================================================== [ 29.632976] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 29.633055] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/281 [ 29.633378] [ 29.633442] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 29.633530] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.633569] Hardware name: linux,dummy-virt (DT) [ 29.633648] Call trace: [ 29.633679] show_stack+0x20/0x38 (C) [ 29.633730] dump_stack_lvl+0x8c/0xd0 [ 29.633778] print_report+0x310/0x608 [ 29.633823] kasan_report+0xdc/0x128 [ 29.633870] __asan_report_load1_noabort+0x20/0x30 [ 29.633917] vmalloc_oob+0x51c/0x5d0 [ 29.633962] kunit_try_run_case+0x170/0x3f0 [ 29.634022] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.634076] kthread+0x328/0x630 [ 29.634121] ret_from_fork+0x10/0x20 [ 29.634183] [ 29.634210] The buggy address belongs to the virtual mapping at [ 29.634210] [ffff8000800fe000, ffff800080100000) created by: [ 29.634210] vmalloc_oob+0x98/0x5d0 [ 29.634283] [ 29.634314] The buggy address belongs to the physical page: [ 29.634346] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10786e [ 29.634407] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.634467] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 29.634517] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 29.634559] page dumped because: kasan: bad access detected [ 29.634596] [ 29.634642] Memory state around the buggy address: [ 29.634677] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.634893] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.635046] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 29.635090] ^ [ 29.635230] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 29.635284] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 29.635325] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 29.503847] ================================================================== [ 29.503943] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 29.504673] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277 [ 29.504730] [ 29.505097] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 29.505650] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.506507] Hardware name: linux,dummy-virt (DT) [ 29.506752] Call trace: [ 29.506781] show_stack+0x20/0x38 (C) [ 29.507223] dump_stack_lvl+0x8c/0xd0 [ 29.507356] print_report+0x118/0x608 [ 29.507529] kasan_report+0xdc/0x128 [ 29.508187] kasan_check_range+0x100/0x1a8 [ 29.508406] __kasan_check_write+0x20/0x30 [ 29.508453] kasan_atomics_helper+0x11f8/0x4858 [ 29.508503] kasan_atomics+0x198/0x2e0 [ 29.509721] kunit_try_run_case+0x170/0x3f0 [ 29.510029] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.510511] kthread+0x328/0x630 [ 29.510964] ret_from_fork+0x10/0x20 [ 29.511261] [ 29.511289] Allocated by task 277: [ 29.511322] kasan_save_stack+0x3c/0x68 [ 29.512221] kasan_save_track+0x20/0x40 [ 29.512381] kasan_save_alloc_info+0x40/0x58 [ 29.512989] __kasan_kmalloc+0xd4/0xd8 [ 29.513045] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.513089] kasan_atomics+0xb8/0x2e0 [ 29.513967] kunit_try_run_case+0x170/0x3f0 [ 29.514174] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.514568] kthread+0x328/0x630 [ 29.515138] ret_from_fork+0x10/0x20 [ 29.515191] [ 29.515214] The buggy address belongs to the object at fff00000c787d680 [ 29.515214] which belongs to the cache kmalloc-64 of size 64 [ 29.516358] The buggy address is located 0 bytes to the right of [ 29.516358] allocated 48-byte region [fff00000c787d680, fff00000c787d6b0) [ 29.516590] [ 29.516633] The buggy address belongs to the physical page: [ 29.516671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d [ 29.517250] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.517404] page_type: f5(slab) [ 29.517835] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.518708] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.518764] page dumped because: kasan: bad access detected [ 29.519515] [ 29.519566] Memory state around the buggy address: [ 29.520195] fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.520404] fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.520554] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.520886] ^ [ 29.520994] fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.521041] fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.521082] ================================================================== [ 29.314631] ================================================================== [ 29.314696] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 29.314814] Read of size 4 at addr fff00000c787d6b0 by task kunit_try_catch/277 [ 29.314866] [ 29.314937] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 29.315023] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.315050] Hardware name: linux,dummy-virt (DT) [ 29.315120] Call trace: [ 29.315169] show_stack+0x20/0x38 (C) [ 29.315248] dump_stack_lvl+0x8c/0xd0 [ 29.315323] print_report+0x118/0x608 [ 29.315411] kasan_report+0xdc/0x128 [ 29.315460] __asan_report_load4_noabort+0x20/0x30 [ 29.315617] kasan_atomics_helper+0x3dd8/0x4858 [ 29.315672] kasan_atomics+0x198/0x2e0 [ 29.315719] kunit_try_run_case+0x170/0x3f0 [ 29.316175] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.316324] kthread+0x328/0x630 [ 29.316454] ret_from_fork+0x10/0x20 [ 29.316581] [ 29.316807] Allocated by task 277: [ 29.316843] kasan_save_stack+0x3c/0x68 [ 29.317044] kasan_save_track+0x20/0x40 [ 29.317175] kasan_save_alloc_info+0x40/0x58 [ 29.317279] __kasan_kmalloc+0xd4/0xd8 [ 29.317367] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.317591] kasan_atomics+0xb8/0x2e0 [ 29.317751] kunit_try_run_case+0x170/0x3f0 [ 29.317798] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.318066] kthread+0x328/0x630 [ 29.318153] ret_from_fork+0x10/0x20 [ 29.318410] [ 29.318632] The buggy address belongs to the object at fff00000c787d680 [ 29.318632] which belongs to the cache kmalloc-64 of size 64 [ 29.318770] The buggy address is located 0 bytes to the right of [ 29.318770] allocated 48-byte region [fff00000c787d680, fff00000c787d6b0) [ 29.318912] [ 29.319005] The buggy address belongs to the physical page: [ 29.319037] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d [ 29.319091] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.319290] page_type: f5(slab) [ 29.319458] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.319517] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.319585] page dumped because: kasan: bad access detected [ 29.319698] [ 29.319892] Memory state around the buggy address: [ 29.320038] fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.320097] fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.320152] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.320194] ^ [ 29.320238] fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.320308] fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.320348] ================================================================== [ 29.213777] ================================================================== [ 29.213909] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 29.213993] Read of size 4 at addr fff00000c787d6b0 by task kunit_try_catch/277 [ 29.214046] [ 29.214110] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 29.214933] kasan_report+0xdc/0x128 [ 29.217467] kunit_try_run_case+0x170/0x3f0 [ 29.219586] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.221241] ^ [ 29.223564] Write of size 4 at addr fff00000c787d6b0 by task kunit_try_catch/277 [ 29.227213] __kasan_kmalloc+0xd4/0xd8 [ 29.227426] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.227605] kasan_atomics+0xb8/0x2e0 [ 29.227881] kunit_try_run_case+0x170/0x3f0 [ 29.227944] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.228329] kthread+0x328/0x630 [ 29.228372] ret_from_fork+0x10/0x20 [ 29.228423] [ 29.228486] The buggy address belongs to the object at fff00000c787d680 [ 29.228486] which belongs to the cache kmalloc-64 of size 64 [ 29.228582] The buggy address is located 0 bytes to the right of [ 29.228582] allocated 48-byte region [fff00000c787d680, fff00000c787d6b0) [ 29.228647] [ 29.228669] The buggy address belongs to the physical page: [ 29.228719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d [ 29.228787] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.228849] page_type: f5(slab) [ 29.228890] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.228941] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.228983] page dumped because: kasan: bad access detected [ 29.229026] [ 29.229062] Memory state around the buggy address: [ 29.229096] fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.229141] fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.229186] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.229234] ^ [ 29.229272] fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.229322] fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.229375] ================================================================== [ 29.594732] ================================================================== [ 29.594778] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 29.594827] Read of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277 [ 29.594878] [ 29.594917] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 29.595000] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.595027] Hardware name: linux,dummy-virt (DT) [ 29.595060] Call trace: [ 29.595083] show_stack+0x20/0x38 (C) [ 29.595141] dump_stack_lvl+0x8c/0xd0 [ 29.595197] print_report+0x118/0x608 [ 29.595253] kasan_report+0xdc/0x128 [ 29.595300] __asan_report_load8_noabort+0x20/0x30 [ 29.595359] kasan_atomics_helper+0x3e10/0x4858 [ 29.595420] kasan_atomics+0x198/0x2e0 [ 29.595465] kunit_try_run_case+0x170/0x3f0 [ 29.595514] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.595568] kthread+0x328/0x630 [ 29.595611] ret_from_fork+0x10/0x20 [ 29.595660] [ 29.595680] Allocated by task 277: [ 29.596224] kasan_save_stack+0x3c/0x68 [ 29.596433] kasan_save_track+0x20/0x40 [ 29.596532] kasan_save_alloc_info+0x40/0x58 [ 29.596786] __kasan_kmalloc+0xd4/0xd8 [ 29.596944] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.597021] kasan_atomics+0xb8/0x2e0 [ 29.597060] kunit_try_run_case+0x170/0x3f0 [ 29.597099] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.597145] kthread+0x328/0x630 [ 29.597179] ret_from_fork+0x10/0x20 [ 29.597217] [ 29.597239] The buggy address belongs to the object at fff00000c787d680 [ 29.597239] which belongs to the cache kmalloc-64 of size 64 [ 29.597299] The buggy address is located 0 bytes to the right of [ 29.597299] allocated 48-byte region [fff00000c787d680, fff00000c787d6b0) [ 29.597365] [ 29.597388] The buggy address belongs to the physical page: [ 29.597430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d [ 29.597483] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.597677] page_type: f5(slab) [ 29.597847] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.597960] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.598266] page dumped because: kasan: bad access detected [ 29.598632] [ 29.598721] Memory state around the buggy address: [ 29.598757] fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.598801] fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.599200] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.599324] ^ [ 29.599542] fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.599767] fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.600000] ================================================================== [ 29.336870] ================================================================== [ 29.336916] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 29.336966] Read of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277 [ 29.337328] [ 29.337373] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 29.337471] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.337519] Hardware name: linux,dummy-virt (DT) [ 29.337609] Call trace: [ 29.337669] show_stack+0x20/0x38 (C) [ 29.337989] dump_stack_lvl+0x8c/0xd0 [ 29.338054] print_report+0x118/0x608 [ 29.338161] kasan_report+0xdc/0x128 [ 29.338237] __asan_report_load8_noabort+0x20/0x30 [ 29.338304] kasan_atomics_helper+0x3f58/0x4858 [ 29.338548] kasan_atomics+0x198/0x2e0 [ 29.338619] kunit_try_run_case+0x170/0x3f0 [ 29.338808] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.338929] kthread+0x328/0x630 [ 29.339143] ret_from_fork+0x10/0x20 [ 29.339263] [ 29.339313] Allocated by task 277: [ 29.339385] kasan_save_stack+0x3c/0x68 [ 29.339488] kasan_save_track+0x20/0x40 [ 29.339537] kasan_save_alloc_info+0x40/0x58 [ 29.339603] __kasan_kmalloc+0xd4/0xd8 [ 29.339680] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.340075] kasan_atomics+0xb8/0x2e0 [ 29.340189] kunit_try_run_case+0x170/0x3f0 [ 29.340293] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.340340] kthread+0x328/0x630 [ 29.340386] ret_from_fork+0x10/0x20 [ 29.340434] [ 29.340456] The buggy address belongs to the object at fff00000c787d680 [ 29.340456] which belongs to the cache kmalloc-64 of size 64 [ 29.341019] The buggy address is located 0 bytes to the right of [ 29.341019] allocated 48-byte region [fff00000c787d680, fff00000c787d6b0) [ 29.341454] [ 29.341492] The buggy address belongs to the physical page: [ 29.341560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d [ 29.341673] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.341743] page_type: f5(slab) [ 29.341798] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.342152] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.342239] page dumped because: kasan: bad access detected [ 29.342343] [ 29.342739] Memory state around the buggy address: [ 29.342828] fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.342969] fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.343031] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.343106] ^ [ 29.343150] fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.343196] fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.343236] ================================================================== [ 29.576318] ================================================================== [ 29.576717] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 29.576786] Read of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277 [ 29.576879] [ 29.576949] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 29.577033] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.577061] Hardware name: linux,dummy-virt (DT) [ 29.577093] Call trace: [ 29.577116] show_stack+0x20/0x38 (C) [ 29.577174] dump_stack_lvl+0x8c/0xd0 [ 29.577223] print_report+0x118/0x608 [ 29.577272] kasan_report+0xdc/0x128 [ 29.577320] __asan_report_load8_noabort+0x20/0x30 [ 29.577377] kasan_atomics_helper+0x3db0/0x4858 [ 29.577438] kasan_atomics+0x198/0x2e0 [ 29.577484] kunit_try_run_case+0x170/0x3f0 [ 29.577533] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.577588] kthread+0x328/0x630 [ 29.577632] ret_from_fork+0x10/0x20 [ 29.577680] [ 29.577702] Allocated by task 277: [ 29.577731] kasan_save_stack+0x3c/0x68 [ 29.577771] kasan_save_track+0x20/0x40 [ 29.577811] kasan_save_alloc_info+0x40/0x58 [ 29.577858] __kasan_kmalloc+0xd4/0xd8 [ 29.577906] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.577948] kasan_atomics+0xb8/0x2e0 [ 29.577985] kunit_try_run_case+0x170/0x3f0 [ 29.578025] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.578079] kthread+0x328/0x630 [ 29.578124] ret_from_fork+0x10/0x20 [ 29.578162] [ 29.578183] The buggy address belongs to the object at fff00000c787d680 [ 29.578183] which belongs to the cache kmalloc-64 of size 64 [ 29.578241] The buggy address is located 0 bytes to the right of [ 29.578241] allocated 48-byte region [fff00000c787d680, fff00000c787d6b0) [ 29.578307] [ 29.578336] The buggy address belongs to the physical page: [ 29.578371] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d [ 29.578435] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.578483] page_type: f5(slab) [ 29.578520] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.578570] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.578616] page dumped because: kasan: bad access detected [ 29.578649] [ 29.578668] Memory state around the buggy address: [ 29.578967] fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.579026] fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.579072] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.579112] ^ [ 29.579148] fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.579325] fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.579453] ================================================================== [ 29.606945] ================================================================== [ 29.607114] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 29.607174] Read of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277 [ 29.607239] [ 29.607270] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 29.607353] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.607662] Hardware name: linux,dummy-virt (DT) [ 29.607721] Call trace: [ 29.607747] show_stack+0x20/0x38 (C) [ 29.607835] dump_stack_lvl+0x8c/0xd0 [ 29.608139] print_report+0x118/0x608 [ 29.608450] kasan_report+0xdc/0x128 [ 29.608626] __asan_report_load8_noabort+0x20/0x30 [ 29.608734] kasan_atomics_helper+0x3e20/0x4858 [ 29.608949] kasan_atomics+0x198/0x2e0 [ 29.609033] kunit_try_run_case+0x170/0x3f0 [ 29.609103] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.609162] kthread+0x328/0x630 [ 29.609226] ret_from_fork+0x10/0x20 [ 29.610219] [ 29.610317] Allocated by task 277: [ 29.610407] kasan_save_stack+0x3c/0x68 [ 29.610461] kasan_save_track+0x20/0x40 [ 29.610511] kasan_save_alloc_info+0x40/0x58 [ 29.610566] __kasan_kmalloc+0xd4/0xd8 [ 29.610633] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.610675] kasan_atomics+0xb8/0x2e0 [ 29.610711] kunit_try_run_case+0x170/0x3f0 [ 29.610753] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.610815] kthread+0x328/0x630 [ 29.610853] ret_from_fork+0x10/0x20 [ 29.610891] [ 29.610913] The buggy address belongs to the object at fff00000c787d680 [ 29.610913] which belongs to the cache kmalloc-64 of size 64 [ 29.610972] The buggy address is located 0 bytes to the right of [ 29.610972] allocated 48-byte region [fff00000c787d680, fff00000c787d6b0) [ 29.611037] [ 29.611061] The buggy address belongs to the physical page: [ 29.611108] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d [ 29.611173] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.611228] page_type: f5(slab) [ 29.611267] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.611317] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.611371] page dumped because: kasan: bad access detected [ 29.611412] [ 29.611432] Memory state around the buggy address: [ 29.611465] fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.611509] fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.611552] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.611593] ^ [ 29.611625] fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.611668] fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.612157] ================================================================== [ 29.587024] ================================================================== [ 29.587109] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 29.587164] Read of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277 [ 29.587216] [ 29.587281] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 29.587366] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.587407] Hardware name: linux,dummy-virt (DT) [ 29.587439] Call trace: [ 29.587715] show_stack+0x20/0x38 (C) [ 29.588081] dump_stack_lvl+0x8c/0xd0 [ 29.588146] print_report+0x118/0x608 [ 29.588194] kasan_report+0xdc/0x128 [ 29.588241] __asan_report_load8_noabort+0x20/0x30 [ 29.588290] kasan_atomics_helper+0x3df4/0x4858 [ 29.588340] kasan_atomics+0x198/0x2e0 [ 29.588388] kunit_try_run_case+0x170/0x3f0 [ 29.588448] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.588503] kthread+0x328/0x630 [ 29.588545] ret_from_fork+0x10/0x20 [ 29.588594] [ 29.588615] Allocated by task 277: [ 29.588645] kasan_save_stack+0x3c/0x68 [ 29.588688] kasan_save_track+0x20/0x40 [ 29.588726] kasan_save_alloc_info+0x40/0x58 [ 29.588764] __kasan_kmalloc+0xd4/0xd8 [ 29.588803] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.588844] kasan_atomics+0xb8/0x2e0 [ 29.588882] kunit_try_run_case+0x170/0x3f0 [ 29.588921] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.588966] kthread+0x328/0x630 [ 29.589000] ret_from_fork+0x10/0x20 [ 29.589038] [ 29.589058] The buggy address belongs to the object at fff00000c787d680 [ 29.589058] which belongs to the cache kmalloc-64 of size 64 [ 29.589116] The buggy address is located 0 bytes to the right of [ 29.589116] allocated 48-byte region [fff00000c787d680, fff00000c787d6b0) [ 29.589181] [ 29.589203] The buggy address belongs to the physical page: [ 29.589235] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d [ 29.589286] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.589335] page_type: f5(slab) [ 29.589371] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.589433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.589473] page dumped because: kasan: bad access detected [ 29.589507] [ 29.589526] Memory state around the buggy address: [ 29.589559] fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.589603] fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.589648] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.589687] ^ [ 29.589720] fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.589763] fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.589803] ================================================================== [ 29.542316] ================================================================== [ 29.542368] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 29.542436] Read of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277 [ 29.542494] [ 29.542525] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 29.542614] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.542641] Hardware name: linux,dummy-virt (DT) [ 29.542681] Call trace: [ 29.542704] show_stack+0x20/0x38 (C) [ 29.542753] dump_stack_lvl+0x8c/0xd0 [ 29.542801] print_report+0x118/0x608 [ 29.542855] kasan_report+0xdc/0x128 [ 29.542904] __asan_report_load8_noabort+0x20/0x30 [ 29.542952] kasan_atomics_helper+0x3f04/0x4858 [ 29.543003] kasan_atomics+0x198/0x2e0 [ 29.543048] kunit_try_run_case+0x170/0x3f0 [ 29.543106] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.543171] kthread+0x328/0x630 [ 29.543224] ret_from_fork+0x10/0x20 [ 29.543283] [ 29.543305] Allocated by task 277: [ 29.543334] kasan_save_stack+0x3c/0x68 [ 29.543376] kasan_save_track+0x20/0x40 [ 29.543425] kasan_save_alloc_info+0x40/0x58 [ 29.543465] __kasan_kmalloc+0xd4/0xd8 [ 29.543504] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.543544] kasan_atomics+0xb8/0x2e0 [ 29.543582] kunit_try_run_case+0x170/0x3f0 [ 29.543622] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.543677] kthread+0x328/0x630 [ 29.543713] ret_from_fork+0x10/0x20 [ 29.543751] [ 29.543771] The buggy address belongs to the object at fff00000c787d680 [ 29.543771] which belongs to the cache kmalloc-64 of size 64 [ 29.543830] The buggy address is located 0 bytes to the right of [ 29.543830] allocated 48-byte region [fff00000c787d680, fff00000c787d6b0) [ 29.543895] [ 29.543915] The buggy address belongs to the physical page: [ 29.543948] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d [ 29.544002] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.544048] page_type: f5(slab) [ 29.544085] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.544135] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.544457] page dumped because: kasan: bad access detected [ 29.544510] [ 29.544532] Memory state around the buggy address: [ 29.544565] fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.544611] fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.544655] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.544695] ^ [ 29.544992] fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.545058] fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.545098] ================================================================== [ 29.418851] ================================================================== [ 29.419502] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 29.419676] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277 [ 29.419729] [ 29.419768] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 29.420857] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.421206] Hardware name: linux,dummy-virt (DT) [ 29.421433] Call trace: [ 29.421489] show_stack+0x20/0x38 (C) [ 29.422126] dump_stack_lvl+0x8c/0xd0 [ 29.422795] print_report+0x118/0x608 [ 29.423131] kasan_report+0xdc/0x128 [ 29.423280] kasan_check_range+0x100/0x1a8 [ 29.423357] __kasan_check_write+0x20/0x30 [ 29.424166] kasan_atomics_helper+0xf88/0x4858 [ 29.424341] kasan_atomics+0x198/0x2e0 [ 29.424533] kunit_try_run_case+0x170/0x3f0 [ 29.425193] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.425732] kthread+0x328/0x630 [ 29.426131] ret_from_fork+0x10/0x20 [ 29.426302] [ 29.426907] Allocated by task 277: [ 29.427287] kasan_save_stack+0x3c/0x68 [ 29.427339] kasan_save_track+0x20/0x40 [ 29.427702] kasan_save_alloc_info+0x40/0x58 [ 29.428276] __kasan_kmalloc+0xd4/0xd8 [ 29.428685] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.428743] kasan_atomics+0xb8/0x2e0 [ 29.429741] kunit_try_run_case+0x170/0x3f0 [ 29.429823] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.430830] kthread+0x328/0x630 [ 29.430892] ret_from_fork+0x10/0x20 [ 29.431101] [ 29.431220] The buggy address belongs to the object at fff00000c787d680 [ 29.431220] which belongs to the cache kmalloc-64 of size 64 [ 29.431475] The buggy address is located 0 bytes to the right of [ 29.431475] allocated 48-byte region [fff00000c787d680, fff00000c787d6b0) [ 29.432040] [ 29.432088] The buggy address belongs to the physical page: [ 29.432126] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d [ 29.432746] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.433843] page_type: f5(slab) [ 29.434132] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.434423] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.434847] page dumped because: kasan: bad access detected [ 29.434891] [ 29.434939] Memory state around the buggy address: [ 29.434976] fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.435912] fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.436037] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.436078] ^ [ 29.436116] fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.436569] fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.436967] ================================================================== [ 29.545800] ================================================================== [ 29.545853] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 29.545950] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277 [ 29.546044] [ 29.546123] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 29.546292] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.546340] Hardware name: linux,dummy-virt (DT) [ 29.546387] Call trace: [ 29.546458] show_stack+0x20/0x38 (C) [ 29.546524] dump_stack_lvl+0x8c/0xd0 [ 29.546572] print_report+0x118/0x608 [ 29.546624] kasan_report+0xdc/0x128 [ 29.546670] kasan_check_range+0x100/0x1a8 [ 29.546720] __kasan_check_write+0x20/0x30 [ 29.546764] kasan_atomics_helper+0x1414/0x4858 [ 29.546945] kasan_atomics+0x198/0x2e0 [ 29.547007] kunit_try_run_case+0x170/0x3f0 [ 29.547085] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.547142] kthread+0x328/0x630 [ 29.547191] ret_from_fork+0x10/0x20 [ 29.547240] [ 29.547291] Allocated by task 277: [ 29.547322] kasan_save_stack+0x3c/0x68 [ 29.547363] kasan_save_track+0x20/0x40 [ 29.547414] kasan_save_alloc_info+0x40/0x58 [ 29.547630] __kasan_kmalloc+0xd4/0xd8 [ 29.547685] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.547728] kasan_atomics+0xb8/0x2e0 [ 29.547833] kunit_try_run_case+0x170/0x3f0 [ 29.547909] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.548053] kthread+0x328/0x630 [ 29.548105] ret_from_fork+0x10/0x20 [ 29.548145] [ 29.548166] The buggy address belongs to the object at fff00000c787d680 [ 29.548166] which belongs to the cache kmalloc-64 of size 64 [ 29.548225] The buggy address is located 0 bytes to the right of [ 29.548225] allocated 48-byte region [fff00000c787d680, fff00000c787d6b0) [ 29.548289] [ 29.548310] The buggy address belongs to the physical page: [ 29.548833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d [ 29.548967] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.549304] page_type: f5(slab) [ 29.549427] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.549542] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.549586] page dumped because: kasan: bad access detected [ 29.549619] [ 29.549721] Memory state around the buggy address: [ 29.550082] fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.550608] fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.550672] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.550785] ^ [ 29.550907] fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.550960] fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.551064] ================================================================== [ 29.551651] ================================================================== [ 29.551794] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 29.551891] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277 [ 29.552078] [ 29.552414] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 29.552677] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.552785] Hardware name: linux,dummy-virt (DT) [ 29.552891] Call trace: [ 29.553035] show_stack+0x20/0x38 (C) [ 29.553148] dump_stack_lvl+0x8c/0xd0 [ 29.553269] print_report+0x118/0x608 [ 29.553318] kasan_report+0xdc/0x128 [ 29.553365] kasan_check_range+0x100/0x1a8 [ 29.553422] __kasan_check_write+0x20/0x30 [ 29.553467] kasan_atomics_helper+0x147c/0x4858 [ 29.553817] kasan_atomics+0x198/0x2e0 [ 29.554027] kunit_try_run_case+0x170/0x3f0 [ 29.554102] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.554448] kthread+0x328/0x630 [ 29.554611] ret_from_fork+0x10/0x20 [ 29.554791] [ 29.554814] Allocated by task 277: [ 29.554844] kasan_save_stack+0x3c/0x68 [ 29.555139] kasan_save_track+0x20/0x40 [ 29.555329] kasan_save_alloc_info+0x40/0x58 [ 29.555706] __kasan_kmalloc+0xd4/0xd8 [ 29.555785] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.555968] kasan_atomics+0xb8/0x2e0 [ 29.556062] kunit_try_run_case+0x170/0x3f0 [ 29.556180] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.556229] kthread+0x328/0x630 [ 29.556288] ret_from_fork+0x10/0x20 [ 29.556327] [ 29.556348] The buggy address belongs to the object at fff00000c787d680 [ 29.556348] which belongs to the cache kmalloc-64 of size 64 [ 29.556567] The buggy address is located 0 bytes to the right of [ 29.556567] allocated 48-byte region [fff00000c787d680, fff00000c787d6b0) [ 29.556810] [ 29.556892] The buggy address belongs to the physical page: [ 29.556977] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d [ 29.557265] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.557475] page_type: f5(slab) [ 29.557639] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.557732] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.557775] page dumped because: kasan: bad access detected [ 29.557809] [ 29.558035] Memory state around the buggy address: [ 29.558279] fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.558404] fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.558479] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.558824] ^ [ 29.558995] fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.559070] fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.559195] ================================================================== [ 29.559732] ================================================================== [ 29.559895] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 29.560062] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277 [ 29.560151] [ 29.560604] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 29.560769] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.560863] Hardware name: linux,dummy-virt (DT) [ 29.561077] Call trace: [ 29.561175] show_stack+0x20/0x38 (C) [ 29.561289] dump_stack_lvl+0x8c/0xd0 [ 29.561359] print_report+0x118/0x608 [ 29.561459] kasan_report+0xdc/0x128 [ 29.561509] kasan_check_range+0x100/0x1a8 [ 29.561581] __kasan_check_write+0x20/0x30 [ 29.561726] kasan_atomics_helper+0x14e4/0x4858 [ 29.561854] kasan_atomics+0x198/0x2e0 [ 29.562001] kunit_try_run_case+0x170/0x3f0 [ 29.562112] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.562175] kthread+0x328/0x630 [ 29.562221] ret_from_fork+0x10/0x20 [ 29.562281] [ 29.562305] Allocated by task 277: [ 29.562334] kasan_save_stack+0x3c/0x68 [ 29.562377] kasan_save_track+0x20/0x40 [ 29.562429] kasan_save_alloc_info+0x40/0x58 [ 29.562469] __kasan_kmalloc+0xd4/0xd8 [ 29.562524] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.562566] kasan_atomics+0xb8/0x2e0 [ 29.562629] kunit_try_run_case+0x170/0x3f0 [ 29.562670] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.562716] kthread+0x328/0x630 [ 29.562765] ret_from_fork+0x10/0x20 [ 29.562809] [ 29.562844] The buggy address belongs to the object at fff00000c787d680 [ 29.562844] which belongs to the cache kmalloc-64 of size 64 [ 29.562903] The buggy address is located 0 bytes to the right of [ 29.562903] allocated 48-byte region [fff00000c787d680, fff00000c787d6b0) [ 29.562967] [ 29.562998] The buggy address belongs to the physical page: [ 29.563037] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d [ 29.563090] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.563136] page_type: f5(slab) [ 29.563186] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.563250] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.563295] page dumped because: kasan: bad access detected [ 29.563328] [ 29.563355] Memory state around the buggy address: [ 29.563388] fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.563443] fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.563487] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.563525] ^ [ 29.563559] fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.563603] fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.563642] ================================================================== [ 29.307211] ================================================================== [ 29.307255] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 29.307321] Write of size 4 at addr fff00000c787d6b0 by task kunit_try_catch/277 [ 29.307505] [ 29.307541] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 29.307626] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.307653] Hardware name: linux,dummy-virt (DT) [ 29.307684] Call trace: [ 29.307709] show_stack+0x20/0x38 (C) [ 29.307757] dump_stack_lvl+0x8c/0xd0 [ 29.307971] print_report+0x118/0x608 [ 29.308059] kasan_report+0xdc/0x128 [ 29.308182] kasan_check_range+0x100/0x1a8 [ 29.308300] __kasan_check_write+0x20/0x30 [ 29.308629] kasan_atomics_helper+0xca0/0x4858 [ 29.308719] kasan_atomics+0x198/0x2e0 [ 29.308767] kunit_try_run_case+0x170/0x3f0 [ 29.308840] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.308895] kthread+0x328/0x630 [ 29.308939] ret_from_fork+0x10/0x20 [ 29.309132] [ 29.309255] Allocated by task 277: [ 29.309350] kasan_save_stack+0x3c/0x68 [ 29.309652] kasan_save_track+0x20/0x40 [ 29.309812] kasan_save_alloc_info+0x40/0x58 [ 29.309894] __kasan_kmalloc+0xd4/0xd8 [ 29.309956] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.309997] kasan_atomics+0xb8/0x2e0 [ 29.310370] kunit_try_run_case+0x170/0x3f0 [ 29.310505] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.310786] kthread+0x328/0x630 [ 29.310890] ret_from_fork+0x10/0x20 [ 29.311058] [ 29.311125] The buggy address belongs to the object at fff00000c787d680 [ 29.311125] which belongs to the cache kmalloc-64 of size 64 [ 29.311257] The buggy address is located 0 bytes to the right of [ 29.311257] allocated 48-byte region [fff00000c787d680, fff00000c787d6b0) [ 29.311321] [ 29.311342] The buggy address belongs to the physical page: [ 29.311600] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d [ 29.311819] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.312183] page_type: f5(slab) [ 29.312237] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.312316] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.312358] page dumped because: kasan: bad access detected [ 29.312438] [ 29.312459] Memory state around the buggy address: [ 29.312695] fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.312813] fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.313166] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.313277] ^ [ 29.313358] fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.313474] fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.313619] ================================================================== [ 29.231448] ================================================================== [ 29.231510] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 29.231563] Write of size 4 at addr fff00000c787d6b0 by task kunit_try_catch/277 [ 29.231915] [ 29.232064] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 29.232482] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.232618] Hardware name: linux,dummy-virt (DT) [ 29.232697] Call trace: [ 29.232799] show_stack+0x20/0x38 (C) [ 29.232852] dump_stack_lvl+0x8c/0xd0 [ 29.233066] print_report+0x118/0x608 [ 29.233326] kasan_report+0xdc/0x128 [ 29.233579] kasan_check_range+0x100/0x1a8 [ 29.233702] __kasan_check_write+0x20/0x30 [ 29.233832] kasan_atomics_helper+0x99c/0x4858 [ 29.234038] kasan_atomics+0x198/0x2e0 [ 29.234233] kunit_try_run_case+0x170/0x3f0 [ 29.234321] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.234456] kthread+0x328/0x630 [ 29.234579] ret_from_fork+0x10/0x20 [ 29.234687] [ 29.235085] Allocated by task 277: [ 29.235138] kasan_save_stack+0x3c/0x68 [ 29.235289] kasan_save_track+0x20/0x40 [ 29.235548] kasan_save_alloc_info+0x40/0x58 [ 29.235713] __kasan_kmalloc+0xd4/0xd8 [ 29.235925] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.236131] kasan_atomics+0xb8/0x2e0 [ 29.236170] kunit_try_run_case+0x170/0x3f0 [ 29.236418] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.236476] kthread+0x328/0x630 [ 29.236628] ret_from_fork+0x10/0x20 [ 29.236853] [ 29.237033] The buggy address belongs to the object at fff00000c787d680 [ 29.237033] which belongs to the cache kmalloc-64 of size 64 [ 29.237137] The buggy address is located 0 bytes to the right of [ 29.237137] allocated 48-byte region [fff00000c787d680, fff00000c787d6b0) [ 29.237232] [ 29.237462] The buggy address belongs to the physical page: [ 29.237671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d [ 29.237784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.237973] page_type: f5(slab) [ 29.238114] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.238204] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.238463] page dumped because: kasan: bad access detected [ 29.239040] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.242936] Write of size 4 at addr fff00000c787d6b0 by task kunit_try_catch/277 [ 29.243456] kasan_check_range+0x100/0x1a8 [ 29.244600] kasan_save_stack+0x3c/0x68 [ 29.246147] The buggy address is located 0 bytes to the right of [ 29.246147] allocated 48-byte region [fff00000c787d680, fff00000c787d6b0) [ 29.246537] [ 29.246645] The buggy address belongs to the physical page: [ 29.246721] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d [ 29.246920] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.247027] page_type: f5(slab) [ 29.247169] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.247221] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.247269] page dumped because: kasan: bad access detected [ 29.247305] [ 29.247325] Memory state around the buggy address: [ 29.247357] fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.247412] fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.247624] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.248135] ^ [ 29.248213] fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.248320] fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.248506] ================================================================== [ 29.371231] ================================================================== [ 29.371296] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 29.372872] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277 [ 29.373138] [ 29.373277] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 29.373997] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.374483] Hardware name: linux,dummy-virt (DT) [ 29.374904] Call trace: [ 29.375084] show_stack+0x20/0x38 (C) [ 29.375941] dump_stack_lvl+0x8c/0xd0 [ 29.376065] print_report+0x118/0x608 [ 29.376358] kasan_report+0xdc/0x128 [ 29.376506] kasan_check_range+0x100/0x1a8 [ 29.377477] __kasan_check_write+0x20/0x30 [ 29.377625] kasan_atomics_helper+0xeb8/0x4858 [ 29.377676] kasan_atomics+0x198/0x2e0 [ 29.378291] kunit_try_run_case+0x170/0x3f0 [ 29.378359] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.378426] kthread+0x328/0x630 [ 29.378471] ret_from_fork+0x10/0x20 [ 29.378522] [ 29.380843] Allocated by task 277: [ 29.381090] kasan_save_stack+0x3c/0x68 [ 29.381359] kasan_save_track+0x20/0x40 [ 29.381471] kasan_save_alloc_info+0x40/0x58 [ 29.381622] __kasan_kmalloc+0xd4/0xd8 [ 29.382473] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.382580] kasan_atomics+0xb8/0x2e0 [ 29.382632] kunit_try_run_case+0x170/0x3f0 [ 29.382674] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.382720] kthread+0x328/0x630 [ 29.383548] ret_from_fork+0x10/0x20 [ 29.384062] [ 29.384187] The buggy address belongs to the object at fff00000c787d680 [ 29.384187] which belongs to the cache kmalloc-64 of size 64 [ 29.384740] The buggy address is located 0 bytes to the right of [ 29.384740] allocated 48-byte region [fff00000c787d680, fff00000c787d6b0) [ 29.385426] [ 29.386255] The buggy address belongs to the physical page: [ 29.386350] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d [ 29.386808] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.386978] page_type: f5(slab) [ 29.387324] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.388189] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.388969] page dumped because: kasan: bad access detected [ 29.389443] [ 29.389575] Memory state around the buggy address: [ 29.389622] fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.390387] fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.390968] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.391049] ^ [ 29.391555] fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.391699] fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.391741] ================================================================== [ 29.064364] ================================================================== [ 29.064778] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 29.064899] Read of size 4 at addr fff00000c787d6b0 by task kunit_try_catch/277 [ 29.065003] [ 29.065127] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 29.065264] Hardware name: linux,dummy-virt (DT) [ 29.065298] Call trace: [ 29.065339] show_stack+0x20/0x38 (C) [ 29.065515] dump_stack_lvl+0x8c/0xd0 [ 29.065754] print_report+0x118/0x608 [ 29.065829] kasan_report+0xdc/0x128 [ 29.065877] kasan_check_range+0x100/0x1a8 [ 29.065928] __kasan_check_read+0x20/0x30 [ 29.065975] kasan_atomics_helper+0x1ec/0x4858 [ 29.066023] kasan_atomics+0x198/0x2e0 [ 29.066070] kunit_try_run_case+0x170/0x3f0 [ 29.066121] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.066174] kthread+0x328/0x630 [ 29.066242] ret_from_fork+0x10/0x20 [ 29.066293] [ 29.066313] Allocated by task 277: [ 29.066341] kasan_save_stack+0x3c/0x68 [ 29.066406] kasan_save_track+0x20/0x40 [ 29.066448] kasan_save_alloc_info+0x40/0x58 [ 29.066544] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.066586] kasan_atomics+0xb8/0x2e0 [ 29.066762] ret_from_fork+0x10/0x20 [ 29.066897] The buggy address is located 0 bytes to the right of [ 29.066897] allocated 48-byte region [fff00000c787d680, fff00000c787d6b0) [ 29.066974] [ 29.067030] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d [ 29.067082] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.067129] page_type: f5(slab) [ 29.067244] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.068377] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.068872] ^ [ 29.069472] fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.070644] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 29.070926] Write of size 4 at addr fff00000c787d6b0 by task kunit_try_catch/277 [ 29.075504] [ 29.076729] [ 29.077415] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.079754] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.080677] __kasan_check_read+0x20/0x30 [ 29.082266] kasan_save_stack+0x3c/0x68 [ 29.083753] The buggy address is located 0 bytes to the right of [ 29.083753] allocated 48-byte region [fff00000c787d680, fff00000c787d6b0) [ 29.087568] [ 29.087724] Hardware name: linux,dummy-virt (DT) [ 29.088694] kasan_atomics_helper+0x40fc/0x4858 [ 29.091219] kthread+0x328/0x630 [ 29.092705] page dumped because: kasan: bad access detected [ 29.093437] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.096083] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.097514] kasan_atomics_helper+0x32c/0x4858 [ 29.099259] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.101207] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.103603] kthread+0x328/0x630 [ 29.104717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d [ 29.106015] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.108560] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.109588] __kasan_check_write+0x20/0x30 [ 29.112289] kasan_save_alloc_info+0x40/0x58 [ 29.115367] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.115842] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.119037] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.120743] kasan_atomics+0x198/0x2e0 [ 29.121729] kasan_atomics+0xb8/0x2e0 [ 29.122206] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.124691] kasan_atomics_helper+0x47c/0x4858 [ 29.125518] The buggy address is located 0 bytes to the right of [ 29.125518] allocated 48-byte region [fff00000c787d680, fff00000c787d6b0) [ 29.127710] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.129726] [ 29.131214] [ 29.131450] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d [ 29.131897] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.133198] Hardware name: linux,dummy-virt (DT) [ 29.134071] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.136463] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.138615] Hardware name: linux,dummy-virt (DT) [ 29.139845] kunit_try_run_case+0x170/0x3f0 [ 29.145732] The buggy address is located 0 bytes to the right of [ 29.145732] allocated 48-byte region [fff00000c787d680, fff00000c787d6b0) [ 29.153649] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 29.177973] __kasan_kmalloc+0xd4/0xd8 [ 29.179921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d [ 29.181272] ^ [ 29.183738] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.186765] kasan_atomics+0xb8/0x2e0 [ 29.187568] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.188488] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.190617] show_stack+0x20/0x38 (C) [ 29.191801] kasan_atomics+0x198/0x2e0 [ 29.194685] The buggy address is located 0 bytes to the right of [ 29.194685] allocated 48-byte region [fff00000c787d680, fff00000c787d6b0) [ 29.196894] ================================================================== [ 29.439276] ================================================================== [ 29.439335] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 29.439391] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277 [ 29.442417] [ 29.443090] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 29.443432] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.443516] Hardware name: linux,dummy-virt (DT) [ 29.443573] Call trace: [ 29.443637] show_stack+0x20/0x38 (C) [ 29.443693] dump_stack_lvl+0x8c/0xd0 [ 29.444018] print_report+0x118/0x608 [ 29.444077] kasan_report+0xdc/0x128 [ 29.444123] kasan_check_range+0x100/0x1a8 [ 29.444172] __kasan_check_write+0x20/0x30 [ 29.444218] kasan_atomics_helper+0xff0/0x4858 [ 29.444268] kasan_atomics+0x198/0x2e0 [ 29.446042] kunit_try_run_case+0x170/0x3f0 [ 29.446307] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.447078] kthread+0x328/0x630 [ 29.447367] ret_from_fork+0x10/0x20 [ 29.447480] [ 29.447901] Allocated by task 277: [ 29.448249] kasan_save_stack+0x3c/0x68 [ 29.448519] kasan_save_track+0x20/0x40 [ 29.448994] kasan_save_alloc_info+0x40/0x58 [ 29.449432] __kasan_kmalloc+0xd4/0xd8 [ 29.450329] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.450495] kasan_atomics+0xb8/0x2e0 [ 29.450714] kunit_try_run_case+0x170/0x3f0 [ 29.450804] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.450851] kthread+0x328/0x630 [ 29.451363] ret_from_fork+0x10/0x20 [ 29.451428] [ 29.451968] The buggy address belongs to the object at fff00000c787d680 [ 29.451968] which belongs to the cache kmalloc-64 of size 64 [ 29.452752] The buggy address is located 0 bytes to the right of [ 29.452752] allocated 48-byte region [fff00000c787d680, fff00000c787d6b0) [ 29.453244] [ 29.453275] The buggy address belongs to the physical page: [ 29.453826] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d [ 29.454265] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.454483] page_type: f5(slab) [ 29.454890] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.455633] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.455949] page dumped because: kasan: bad access detected [ 29.455987] [ 29.456460] Memory state around the buggy address: [ 29.456504] fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.457167] fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.457553] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.457912] ^ [ 29.458171] fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.458220] fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.458853] ================================================================== [ 29.527921] ================================================================== [ 29.527972] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 29.528021] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277 [ 29.528275] [ 29.528337] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 29.528741] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.528881] Hardware name: linux,dummy-virt (DT) [ 29.528990] Call trace: [ 29.529135] show_stack+0x20/0x38 (C) [ 29.529253] dump_stack_lvl+0x8c/0xd0 [ 29.529335] print_report+0x118/0x608 [ 29.529527] kasan_report+0xdc/0x128 [ 29.529577] kasan_check_range+0x100/0x1a8 [ 29.529632] __kasan_check_write+0x20/0x30 [ 29.529679] kasan_atomics_helper+0x12d8/0x4858 [ 29.530005] kasan_atomics+0x198/0x2e0 [ 29.530180] kunit_try_run_case+0x170/0x3f0 [ 29.530300] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.530690] kthread+0x328/0x630 [ 29.530884] ret_from_fork+0x10/0x20 [ 29.530979] [ 29.531002] Allocated by task 277: [ 29.531032] kasan_save_stack+0x3c/0x68 [ 29.531373] kasan_save_track+0x20/0x40 [ 29.531496] kasan_save_alloc_info+0x40/0x58 [ 29.531610] __kasan_kmalloc+0xd4/0xd8 [ 29.531968] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.532020] kasan_atomics+0xb8/0x2e0 [ 29.532091] kunit_try_run_case+0x170/0x3f0 [ 29.532139] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.532186] kthread+0x328/0x630 [ 29.532449] ret_from_fork+0x10/0x20 [ 29.532579] [ 29.532700] The buggy address belongs to the object at fff00000c787d680 [ 29.532700] which belongs to the cache kmalloc-64 of size 64 [ 29.532835] The buggy address is located 0 bytes to the right of [ 29.532835] allocated 48-byte region [fff00000c787d680, fff00000c787d6b0) [ 29.533032] [ 29.533373] The buggy address belongs to the physical page: [ 29.533438] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d [ 29.533536] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.533611] page_type: f5(slab) [ 29.533647] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.533895] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.534032] page dumped because: kasan: bad access detected [ 29.534159] [ 29.534237] Memory state around the buggy address: [ 29.534331] fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.534698] fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.534762] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.534814] ^ [ 29.534862] fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.534922] fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.534971] ================================================================== [ 29.461306] ================================================================== [ 29.461439] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 29.461917] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277 [ 29.461993] [ 29.462233] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 29.462851] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.462889] Hardware name: linux,dummy-virt (DT) [ 29.462924] Call trace: [ 29.462950] show_stack+0x20/0x38 (C) [ 29.463413] dump_stack_lvl+0x8c/0xd0 [ 29.463483] print_report+0x118/0x608 [ 29.463532] kasan_report+0xdc/0x128 [ 29.463659] kasan_check_range+0x100/0x1a8 [ 29.463720] __kasan_check_write+0x20/0x30 [ 29.464092] kasan_atomics_helper+0x1058/0x4858 [ 29.464147] kasan_atomics+0x198/0x2e0 [ 29.464917] kunit_try_run_case+0x170/0x3f0 [ 29.464987] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.465043] kthread+0x328/0x630 [ 29.465088] ret_from_fork+0x10/0x20 [ 29.465139] [ 29.465160] Allocated by task 277: [ 29.465190] kasan_save_stack+0x3c/0x68 [ 29.465734] kasan_save_track+0x20/0x40 [ 29.465786] kasan_save_alloc_info+0x40/0x58 [ 29.465826] __kasan_kmalloc+0xd4/0xd8 [ 29.465867] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.465910] kasan_atomics+0xb8/0x2e0 [ 29.465948] kunit_try_run_case+0x170/0x3f0 [ 29.465988] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.466035] kthread+0x328/0x630 [ 29.466916] ret_from_fork+0x10/0x20 [ 29.466968] [ 29.466990] The buggy address belongs to the object at fff00000c787d680 [ 29.466990] which belongs to the cache kmalloc-64 of size 64 [ 29.467247] The buggy address is located 0 bytes to the right of [ 29.467247] allocated 48-byte region [fff00000c787d680, fff00000c787d6b0) [ 29.467820] [ 29.467931] The buggy address belongs to the physical page: [ 29.467970] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d [ 29.468028] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.468079] page_type: f5(slab) [ 29.468119] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.468168] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.468212] page dumped because: kasan: bad access detected [ 29.469037] [ 29.469063] Memory state around the buggy address: [ 29.469108] fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.469383] fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.469443] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.469481] ^ [ 29.469517] fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.469561] fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.469601] ================================================================== [ 29.257249] ================================================================== [ 29.257697] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 29.257766] Write of size 4 at addr fff00000c787d6b0 by task kunit_try_catch/277 [ 29.257819] [ 29.258034] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 29.258133] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.258566] Hardware name: linux,dummy-virt (DT) [ 29.258739] Call trace: [ 29.258774] show_stack+0x20/0x38 (C) [ 29.258828] dump_stack_lvl+0x8c/0xd0 [ 29.258879] print_report+0x118/0x608 [ 29.259183] kasan_report+0xdc/0x128 [ 29.259618] kasan_check_range+0x100/0x1a8 [ 29.259693] __kasan_check_write+0x20/0x30 [ 29.259741] kasan_atomics_helper+0xad4/0x4858 [ 29.259899] kasan_atomics+0x198/0x2e0 [ 29.260217] kunit_try_run_case+0x170/0x3f0 [ 29.260630] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.260893] kthread+0x328/0x630 [ 29.261035] ret_from_fork+0x10/0x20 [ 29.261201] [ 29.261253] Allocated by task 277: [ 29.261285] kasan_save_stack+0x3c/0x68 [ 29.261762] kasan_save_track+0x20/0x40 [ 29.261829] kasan_save_alloc_info+0x40/0x58 [ 29.261894] __kasan_kmalloc+0xd4/0xd8 [ 29.262103] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.262481] kasan_atomics+0xb8/0x2e0 [ 29.262748] kunit_try_run_case+0x170/0x3f0 [ 29.263024] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.263083] kthread+0x328/0x630 [ 29.263475] ret_from_fork+0x10/0x20 [ 29.263557] [ 29.263752] The buggy address belongs to the object at fff00000c787d680 [ 29.263752] which belongs to the cache kmalloc-64 of size 64 [ 29.263987] The buggy address is located 0 bytes to the right of [ 29.263987] allocated 48-byte region [fff00000c787d680, fff00000c787d6b0) [ 29.264222] [ 29.264434] The buggy address belongs to the physical page: [ 29.264510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d [ 29.264678] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.264783] page_type: f5(slab) [ 29.264929] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.265004] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.265055] page dumped because: kasan: bad access detected [ 29.265088] [ 29.265109] Memory state around the buggy address: [ 29.265143] fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.265433] fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.265964] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.266027] ^ [ 29.266189] fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.266369] fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.266420] ================================================================== [ 29.277622] ================================================================== [ 29.277991] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 29.278099] Write of size 4 at addr fff00000c787d6b0 by task kunit_try_catch/277 [ 29.278367] [ 29.278420] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 29.278686] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.278730] Hardware name: linux,dummy-virt (DT) [ 29.278766] Call trace: [ 29.278929] show_stack+0x20/0x38 (C) [ 29.279073] dump_stack_lvl+0x8c/0xd0 [ 29.279126] print_report+0x118/0x608 [ 29.279211] kasan_report+0xdc/0x128 [ 29.279291] kasan_check_range+0x100/0x1a8 [ 29.279346] __kasan_check_write+0x20/0x30 [ 29.279467] kasan_atomics_helper+0xb70/0x4858 [ 29.279522] kasan_atomics+0x198/0x2e0 [ 29.279569] kunit_try_run_case+0x170/0x3f0 [ 29.279941] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.280054] kthread+0x328/0x630 [ 29.280391] ret_from_fork+0x10/0x20 [ 29.280586] [ 29.280613] Allocated by task 277: [ 29.280645] kasan_save_stack+0x3c/0x68 [ 29.280717] kasan_save_track+0x20/0x40 [ 29.280903] kasan_save_alloc_info+0x40/0x58 [ 29.281068] __kasan_kmalloc+0xd4/0xd8 [ 29.281289] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.281523] kasan_atomics+0xb8/0x2e0 [ 29.281583] kunit_try_run_case+0x170/0x3f0 [ 29.281625] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.281872] kthread+0x328/0x630 [ 29.282150] ret_from_fork+0x10/0x20 [ 29.282410] [ 29.282438] The buggy address belongs to the object at fff00000c787d680 [ 29.282438] which belongs to the cache kmalloc-64 of size 64 [ 29.282621] The buggy address is located 0 bytes to the right of [ 29.282621] allocated 48-byte region [fff00000c787d680, fff00000c787d6b0) [ 29.282913] [ 29.282965] The buggy address belongs to the physical page: [ 29.283348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d [ 29.283553] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.283631] page_type: f5(slab) [ 29.284014] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.284277] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.284512] page dumped because: kasan: bad access detected [ 29.284728] [ 29.284845] Memory state around the buggy address: [ 29.284922] fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.285208] fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.285433] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.285508] ^ [ 29.285864] fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.285981] fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.286182] ================================================================== [ 29.492408] ================================================================== [ 29.492608] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 29.492680] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277 [ 29.492746] [ 29.493094] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 29.493289] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.493317] Hardware name: linux,dummy-virt (DT) [ 29.493651] Call trace: [ 29.493688] show_stack+0x20/0x38 (C) [ 29.493757] dump_stack_lvl+0x8c/0xd0 [ 29.493871] print_report+0x118/0x608 [ 29.494296] kasan_report+0xdc/0x128 [ 29.494863] kasan_check_range+0x100/0x1a8 [ 29.494939] __kasan_check_write+0x20/0x30 [ 29.494987] kasan_atomics_helper+0x1190/0x4858 [ 29.495525] kasan_atomics+0x198/0x2e0 [ 29.495716] kunit_try_run_case+0x170/0x3f0 [ 29.495770] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.495825] kthread+0x328/0x630 [ 29.495876] ret_from_fork+0x10/0x20 [ 29.495927] [ 29.495949] Allocated by task 277: [ 29.495980] kasan_save_stack+0x3c/0x68 [ 29.496781] kasan_save_track+0x20/0x40 [ 29.496843] kasan_save_alloc_info+0x40/0x58 [ 29.496883] __kasan_kmalloc+0xd4/0xd8 [ 29.496923] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.496967] kasan_atomics+0xb8/0x2e0 [ 29.497190] kunit_try_run_case+0x170/0x3f0 [ 29.497450] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.497506] kthread+0x328/0x630 [ 29.497719] ret_from_fork+0x10/0x20 [ 29.497797] [ 29.497819] The buggy address belongs to the object at fff00000c787d680 [ 29.497819] which belongs to the cache kmalloc-64 of size 64 [ 29.498034] The buggy address is located 0 bytes to the right of [ 29.498034] allocated 48-byte region [fff00000c787d680, fff00000c787d6b0) [ 29.498470] [ 29.498594] The buggy address belongs to the physical page: [ 29.498769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d [ 29.498832] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.499201] page_type: f5(slab) [ 29.499367] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.499543] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.499593] page dumped because: kasan: bad access detected [ 29.499931] [ 29.499962] Memory state around the buggy address: [ 29.500294] fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.500940] fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.501163] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.501206] ^ [ 29.501243] fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.501289] fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.501724] ================================================================== [ 29.600587] ================================================================== [ 29.600634] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 29.600965] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277 [ 29.601031] [ 29.601081] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 29.601173] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.601218] Hardware name: linux,dummy-virt (DT) [ 29.601255] Call trace: [ 29.601281] show_stack+0x20/0x38 (C) [ 29.601329] dump_stack_lvl+0x8c/0xd0 [ 29.601719] print_report+0x118/0x608 [ 29.601783] kasan_report+0xdc/0x128 [ 29.601882] kasan_check_range+0x100/0x1a8 [ 29.602005] __kasan_check_write+0x20/0x30 [ 29.602053] kasan_atomics_helper+0x175c/0x4858 [ 29.602111] kasan_atomics+0x198/0x2e0 [ 29.602215] kunit_try_run_case+0x170/0x3f0 [ 29.602364] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.602431] kthread+0x328/0x630 [ 29.602474] ret_from_fork+0x10/0x20 [ 29.602871] [ 29.602961] Allocated by task 277: [ 29.602998] kasan_save_stack+0x3c/0x68 [ 29.603295] kasan_save_track+0x20/0x40 [ 29.603351] kasan_save_alloc_info+0x40/0x58 [ 29.603564] __kasan_kmalloc+0xd4/0xd8 [ 29.603680] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.603723] kasan_atomics+0xb8/0x2e0 [ 29.603781] kunit_try_run_case+0x170/0x3f0 [ 29.603823] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.604327] kthread+0x328/0x630 [ 29.604434] ret_from_fork+0x10/0x20 [ 29.604796] [ 29.604874] The buggy address belongs to the object at fff00000c787d680 [ 29.604874] which belongs to the cache kmalloc-64 of size 64 [ 29.604955] The buggy address is located 0 bytes to the right of [ 29.604955] allocated 48-byte region [fff00000c787d680, fff00000c787d6b0) [ 29.605044] [ 29.605067] The buggy address belongs to the physical page: [ 29.605102] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d [ 29.605154] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.605203] page_type: f5(slab) [ 29.605242] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.605615] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.605704] page dumped because: kasan: bad access detected [ 29.605778] [ 29.605801] Memory state around the buggy address: [ 29.605835] fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.605894] fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.605940] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.605989] ^ [ 29.606025] fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.606078] fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.606119] ================================================================== [ 29.330744] ================================================================== [ 29.331117] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 29.331178] Read of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277 [ 29.331229] [ 29.331259] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 29.331513] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.331556] Hardware name: linux,dummy-virt (DT) [ 29.331589] Call trace: [ 29.331612] show_stack+0x20/0x38 (C) [ 29.331690] dump_stack_lvl+0x8c/0xd0 [ 29.331755] print_report+0x118/0x608 [ 29.331810] kasan_report+0xdc/0x128 [ 29.331950] kasan_check_range+0x100/0x1a8 [ 29.332104] __kasan_check_read+0x20/0x30 [ 29.332212] kasan_atomics_helper+0xdd4/0x4858 [ 29.332282] kasan_atomics+0x198/0x2e0 [ 29.332330] kunit_try_run_case+0x170/0x3f0 [ 29.332378] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.332580] kthread+0x328/0x630 [ 29.332634] ret_from_fork+0x10/0x20 [ 29.332747] [ 29.332880] Allocated by task 277: [ 29.332988] kasan_save_stack+0x3c/0x68 [ 29.333106] kasan_save_track+0x20/0x40 [ 29.333203] kasan_save_alloc_info+0x40/0x58 [ 29.333545] __kasan_kmalloc+0xd4/0xd8 [ 29.333690] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.333797] kasan_atomics+0xb8/0x2e0 [ 29.333848] kunit_try_run_case+0x170/0x3f0 [ 29.333888] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.333934] kthread+0x328/0x630 [ 29.333970] ret_from_fork+0x10/0x20 [ 29.334009] [ 29.334144] The buggy address belongs to the object at fff00000c787d680 [ 29.334144] which belongs to the cache kmalloc-64 of size 64 [ 29.334278] The buggy address is located 0 bytes to the right of [ 29.334278] allocated 48-byte region [fff00000c787d680, fff00000c787d6b0) [ 29.334392] [ 29.334473] The buggy address belongs to the physical page: [ 29.334506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d [ 29.334692] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.334821] page_type: f5(slab) [ 29.334920] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.335050] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.335169] page dumped because: kasan: bad access detected [ 29.335284] [ 29.335351] Memory state around the buggy address: [ 29.335385] fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.335442] fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.335803] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.335908] ^ [ 29.335975] fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.336040] fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.336360] ================================================================== [ 29.349785] ================================================================== [ 29.349845] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 29.349896] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277 [ 29.349946] [ 29.349979] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 29.350097] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.350137] Hardware name: linux,dummy-virt (DT) [ 29.350181] Call trace: [ 29.350299] show_stack+0x20/0x38 (C) [ 29.350366] dump_stack_lvl+0x8c/0xd0 [ 29.350427] print_report+0x118/0x608 [ 29.350478] kasan_report+0xdc/0x128 [ 29.350526] __asan_report_store8_noabort+0x20/0x30 [ 29.350582] kasan_atomics_helper+0x3e5c/0x4858 [ 29.351981] kasan_atomics+0x198/0x2e0 [ 29.352311] kunit_try_run_case+0x170/0x3f0 [ 29.352984] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.353093] kthread+0x328/0x630 [ 29.353138] ret_from_fork+0x10/0x20 [ 29.353189] [ 29.353536] Allocated by task 277: [ 29.353634] kasan_save_stack+0x3c/0x68 [ 29.354331] kasan_save_track+0x20/0x40 [ 29.355205] kasan_save_alloc_info+0x40/0x58 [ 29.355420] __kasan_kmalloc+0xd4/0xd8 [ 29.355852] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.355959] kasan_atomics+0xb8/0x2e0 [ 29.356773] kunit_try_run_case+0x170/0x3f0 [ 29.357167] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.357842] kthread+0x328/0x630 [ 29.358117] ret_from_fork+0x10/0x20 [ 29.358159] [ 29.358182] The buggy address belongs to the object at fff00000c787d680 [ 29.358182] which belongs to the cache kmalloc-64 of size 64 [ 29.358949] The buggy address is located 0 bytes to the right of [ 29.358949] allocated 48-byte region [fff00000c787d680, fff00000c787d6b0) [ 29.359782] [ 29.359955] The buggy address belongs to the physical page: [ 29.360221] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d [ 29.360760] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.361094] page_type: f5(slab) [ 29.361142] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.362163] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.362419] page dumped because: kasan: bad access detected [ 29.362990] [ 29.363050] Memory state around the buggy address: [ 29.363089] fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.363365] fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.363995] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.364422] ^ [ 29.364666] fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.365098] fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.365699] ================================================================== [ 29.320744] ================================================================== [ 29.320818] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 29.321043] Write of size 4 at addr fff00000c787d6b0 by task kunit_try_catch/277 [ 29.321095] [ 29.321298] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 29.321508] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.321567] Hardware name: linux,dummy-virt (DT) [ 29.321600] Call trace: [ 29.321682] show_stack+0x20/0x38 (C) [ 29.321734] dump_stack_lvl+0x8c/0xd0 [ 29.321800] print_report+0x118/0x608 [ 29.321885] kasan_report+0xdc/0x128 [ 29.321957] kasan_check_range+0x100/0x1a8 [ 29.322009] __kasan_check_write+0x20/0x30 [ 29.322056] kasan_atomics_helper+0xd3c/0x4858 [ 29.322115] kasan_atomics+0x198/0x2e0 [ 29.322162] kunit_try_run_case+0x170/0x3f0 [ 29.322347] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.322626] kthread+0x328/0x630 [ 29.322689] ret_from_fork+0x10/0x20 [ 29.322739] [ 29.322844] Allocated by task 277: [ 29.323029] kasan_save_stack+0x3c/0x68 [ 29.323147] kasan_save_track+0x20/0x40 [ 29.323212] kasan_save_alloc_info+0x40/0x58 [ 29.323290] __kasan_kmalloc+0xd4/0xd8 [ 29.323357] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.323429] kasan_atomics+0xb8/0x2e0 [ 29.323506] kunit_try_run_case+0x170/0x3f0 [ 29.323548] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.323593] kthread+0x328/0x630 [ 29.323737] ret_from_fork+0x10/0x20 [ 29.323989] [ 29.324106] The buggy address belongs to the object at fff00000c787d680 [ 29.324106] which belongs to the cache kmalloc-64 of size 64 [ 29.324339] The buggy address is located 0 bytes to the right of [ 29.324339] allocated 48-byte region [fff00000c787d680, fff00000c787d6b0) [ 29.324520] [ 29.324590] The buggy address belongs to the physical page: [ 29.324668] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d [ 29.324731] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.324779] page_type: f5(slab) [ 29.324816] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.324868] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.324909] page dumped because: kasan: bad access detected [ 29.324942] [ 29.324984] Memory state around the buggy address: [ 29.325018] fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.325063] fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.325318] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.325477] ^ [ 29.325800] fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.325940] fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.326019] ================================================================== [ 29.589936] ================================================================== [ 29.589976] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 29.590020] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277 [ 29.590069] [ 29.590097] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 29.590180] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.590207] Hardware name: linux,dummy-virt (DT) [ 29.590238] Call trace: [ 29.590261] show_stack+0x20/0x38 (C) [ 29.590307] dump_stack_lvl+0x8c/0xd0 [ 29.590354] print_report+0x118/0x608 [ 29.590452] kasan_report+0xdc/0x128 [ 29.590551] kasan_check_range+0x100/0x1a8 [ 29.590641] __kasan_check_write+0x20/0x30 [ 29.590688] kasan_atomics_helper+0x16d0/0x4858 [ 29.590775] kasan_atomics+0x198/0x2e0 [ 29.590948] kunit_try_run_case+0x170/0x3f0 [ 29.591118] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.591240] kthread+0x328/0x630 [ 29.591316] ret_from_fork+0x10/0x20 [ 29.591551] [ 29.591594] Allocated by task 277: [ 29.591624] kasan_save_stack+0x3c/0x68 [ 29.591668] kasan_save_track+0x20/0x40 [ 29.591731] kasan_save_alloc_info+0x40/0x58 [ 29.591771] __kasan_kmalloc+0xd4/0xd8 [ 29.591810] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.591851] kasan_atomics+0xb8/0x2e0 [ 29.591907] kunit_try_run_case+0x170/0x3f0 [ 29.591960] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.592006] kthread+0x328/0x630 [ 29.592041] ret_from_fork+0x10/0x20 [ 29.592079] [ 29.592100] The buggy address belongs to the object at fff00000c787d680 [ 29.592100] which belongs to the cache kmalloc-64 of size 64 [ 29.592159] The buggy address is located 0 bytes to the right of [ 29.592159] allocated 48-byte region [fff00000c787d680, fff00000c787d6b0) [ 29.592429] [ 29.592566] The buggy address belongs to the physical page: [ 29.592663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d [ 29.592802] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.592939] page_type: f5(slab) [ 29.593055] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.593139] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.593592] page dumped because: kasan: bad access detected [ 29.593634] [ 29.593654] Memory state around the buggy address: [ 29.593699] fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.593774] fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.594161] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.594325] ^ [ 29.594418] fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.594463] fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.594504] ================================================================== [ 29.471440] ================================================================== [ 29.471494] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 29.471546] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277 [ 29.471597] [ 29.471628] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 29.471713] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.472910] Hardware name: linux,dummy-virt (DT) [ 29.472987] Call trace: [ 29.473013] show_stack+0x20/0x38 (C) [ 29.473457] dump_stack_lvl+0x8c/0xd0 [ 29.473523] print_report+0x118/0x608 [ 29.473902] kasan_report+0xdc/0x128 [ 29.474175] kasan_check_range+0x100/0x1a8 [ 29.474226] __kasan_check_write+0x20/0x30 [ 29.474306] kasan_atomics_helper+0x10c0/0x4858 [ 29.474358] kasan_atomics+0x198/0x2e0 [ 29.474417] kunit_try_run_case+0x170/0x3f0 [ 29.474467] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.474961] kthread+0x328/0x630 [ 29.475018] ret_from_fork+0x10/0x20 [ 29.475336] [ 29.475366] Allocated by task 277: [ 29.475501] kasan_save_stack+0x3c/0x68 [ 29.475954] kasan_save_track+0x20/0x40 [ 29.476003] kasan_save_alloc_info+0x40/0x58 [ 29.476044] __kasan_kmalloc+0xd4/0xd8 [ 29.476212] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.476304] kasan_atomics+0xb8/0x2e0 [ 29.476723] kunit_try_run_case+0x170/0x3f0 [ 29.476769] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.476818] kthread+0x328/0x630 [ 29.476861] ret_from_fork+0x10/0x20 [ 29.476901] [ 29.477375] The buggy address belongs to the object at fff00000c787d680 [ 29.477375] which belongs to the cache kmalloc-64 of size 64 [ 29.477514] The buggy address is located 0 bytes to the right of [ 29.477514] allocated 48-byte region [fff00000c787d680, fff00000c787d6b0) [ 29.477724] [ 29.477747] The buggy address belongs to the physical page: [ 29.477874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d [ 29.477992] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.478314] page_type: f5(slab) [ 29.478359] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.478684] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.478961] page dumped because: kasan: bad access detected [ 29.479001] [ 29.479022] Memory state around the buggy address: [ 29.479058] fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.479536] fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.479670] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.479759] ^ [ 29.479796] fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.480116] fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.480164] ================================================================== [ 29.397948] ================================================================== [ 29.398011] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 29.398076] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277 [ 29.399046] [ 29.399263] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 29.399355] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.399383] Hardware name: linux,dummy-virt (DT) [ 29.399430] Call trace: [ 29.400728] show_stack+0x20/0x38 (C) [ 29.400853] dump_stack_lvl+0x8c/0xd0 [ 29.400938] print_report+0x118/0x608 [ 29.401355] kasan_report+0xdc/0x128 [ 29.401795] kasan_check_range+0x100/0x1a8 [ 29.402761] __kasan_check_write+0x20/0x30 [ 29.403157] kasan_atomics_helper+0xf20/0x4858 [ 29.403494] kasan_atomics+0x198/0x2e0 [ 29.403544] kunit_try_run_case+0x170/0x3f0 [ 29.403603] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.403659] kthread+0x328/0x630 [ 29.405744] ret_from_fork+0x10/0x20 [ 29.406130] [ 29.406211] Allocated by task 277: [ 29.406286] kasan_save_stack+0x3c/0x68 [ 29.406336] kasan_save_track+0x20/0x40 [ 29.406378] kasan_save_alloc_info+0x40/0x58 [ 29.406428] __kasan_kmalloc+0xd4/0xd8 [ 29.407105] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.407467] kasan_atomics+0xb8/0x2e0 [ 29.407721] kunit_try_run_case+0x170/0x3f0 [ 29.407764] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.407810] kthread+0x328/0x630 [ 29.407846] ret_from_fork+0x10/0x20 [ 29.408493] [ 29.408518] The buggy address belongs to the object at fff00000c787d680 [ 29.408518] which belongs to the cache kmalloc-64 of size 64 [ 29.409377] The buggy address is located 0 bytes to the right of [ 29.409377] allocated 48-byte region [fff00000c787d680, fff00000c787d6b0) [ 29.409918] [ 29.410359] The buggy address belongs to the physical page: [ 29.410836] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d [ 29.411013] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.412049] page_type: f5(slab) [ 29.412174] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.412242] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.412767] page dumped because: kasan: bad access detected [ 29.412942] [ 29.413300] Memory state around the buggy address: [ 29.413600] fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.414127] fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.414180] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.414220] ^ [ 29.414257] fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.414303] fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.415655] ================================================================== [ 29.535228] ================================================================== [ 29.535416] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 29.535568] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277 [ 29.535621] [ 29.535678] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 29.535793] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.535840] Hardware name: linux,dummy-virt (DT) [ 29.536082] Call trace: [ 29.536133] show_stack+0x20/0x38 (C) [ 29.536191] dump_stack_lvl+0x8c/0xd0 [ 29.536241] print_report+0x118/0x608 [ 29.536288] kasan_report+0xdc/0x128 [ 29.536419] kasan_check_range+0x100/0x1a8 [ 29.536599] __kasan_check_write+0x20/0x30 [ 29.536942] kasan_atomics_helper+0x1384/0x4858 [ 29.537091] kasan_atomics+0x198/0x2e0 [ 29.537572] kunit_try_run_case+0x170/0x3f0 [ 29.537705] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.538027] kthread+0x328/0x630 [ 29.538096] ret_from_fork+0x10/0x20 [ 29.538164] [ 29.538208] Allocated by task 277: [ 29.538238] kasan_save_stack+0x3c/0x68 [ 29.538280] kasan_save_track+0x20/0x40 [ 29.538320] kasan_save_alloc_info+0x40/0x58 [ 29.538374] __kasan_kmalloc+0xd4/0xd8 [ 29.538425] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.538466] kasan_atomics+0xb8/0x2e0 [ 29.538505] kunit_try_run_case+0x170/0x3f0 [ 29.538884] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.538943] kthread+0x328/0x630 [ 29.539082] ret_from_fork+0x10/0x20 [ 29.539264] [ 29.539409] The buggy address belongs to the object at fff00000c787d680 [ 29.539409] which belongs to the cache kmalloc-64 of size 64 [ 29.539510] The buggy address is located 0 bytes to the right of [ 29.539510] allocated 48-byte region [fff00000c787d680, fff00000c787d6b0) [ 29.539579] [ 29.539611] The buggy address belongs to the physical page: [ 29.539931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d [ 29.540086] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.540198] page_type: f5(slab) [ 29.540298] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.540631] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.540696] page dumped because: kasan: bad access detected [ 29.540730] [ 29.540751] Memory state around the buggy address: [ 29.540942] fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.540989] fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.541033] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.541259] ^ [ 29.541337] fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.541455] fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.541842] ================================================================== [ 29.297232] ================================================================== [ 29.297302] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 29.297354] Write of size 4 at addr fff00000c787d6b0 by task kunit_try_catch/277 [ 29.297812] [ 29.297862] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 29.297958] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.298500] Hardware name: linux,dummy-virt (DT) [ 29.298600] Call trace: [ 29.298628] show_stack+0x20/0x38 (C) [ 29.298692] dump_stack_lvl+0x8c/0xd0 [ 29.298950] print_report+0x118/0x608 [ 29.299031] kasan_report+0xdc/0x128 [ 29.299082] kasan_check_range+0x100/0x1a8 [ 29.299525] __kasan_check_write+0x20/0x30 [ 29.299687] kasan_atomics_helper+0xc08/0x4858 [ 29.299747] kasan_atomics+0x198/0x2e0 [ 29.299804] kunit_try_run_case+0x170/0x3f0 [ 29.300202] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.300282] kthread+0x328/0x630 [ 29.300327] ret_from_fork+0x10/0x20 [ 29.300378] [ 29.300413] Allocated by task 277: [ 29.300668] kasan_save_stack+0x3c/0x68 [ 29.300947] kasan_save_track+0x20/0x40 [ 29.300993] kasan_save_alloc_info+0x40/0x58 [ 29.301407] __kasan_kmalloc+0xd4/0xd8 [ 29.301517] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.301631] kasan_atomics+0xb8/0x2e0 [ 29.301939] kunit_try_run_case+0x170/0x3f0 [ 29.302054] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.302330] kthread+0x328/0x630 [ 29.302485] ret_from_fork+0x10/0x20 [ 29.302591] [ 29.302616] The buggy address belongs to the object at fff00000c787d680 [ 29.302616] which belongs to the cache kmalloc-64 of size 64 [ 29.302691] The buggy address is located 0 bytes to the right of [ 29.302691] allocated 48-byte region [fff00000c787d680, fff00000c787d6b0) [ 29.302760] [ 29.302784] The buggy address belongs to the physical page: [ 29.302833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d [ 29.302885] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.302933] page_type: f5(slab) [ 29.302972] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.303022] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.303063] page dumped because: kasan: bad access detected [ 29.303096] [ 29.303146] Memory state around the buggy address: [ 29.303195] fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.303253] fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.303297] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.303348] ^ [ 29.303384] fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.303439] fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.303493] ================================================================== [ 29.343765] ================================================================== [ 29.343815] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 29.343903] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277 [ 29.343956] [ 29.343988] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 29.344119] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.344149] Hardware name: linux,dummy-virt (DT) [ 29.344183] Call trace: [ 29.344209] show_stack+0x20/0x38 (C) [ 29.344257] dump_stack_lvl+0x8c/0xd0 [ 29.344303] print_report+0x118/0x608 [ 29.344352] kasan_report+0xdc/0x128 [ 29.344686] kasan_check_range+0x100/0x1a8 [ 29.344819] __kasan_check_write+0x20/0x30 [ 29.344927] kasan_atomics_helper+0xe44/0x4858 [ 29.344980] kasan_atomics+0x198/0x2e0 [ 29.345185] kunit_try_run_case+0x170/0x3f0 [ 29.345290] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.345456] kthread+0x328/0x630 [ 29.345530] ret_from_fork+0x10/0x20 [ 29.345581] [ 29.345731] Allocated by task 277: [ 29.345795] kasan_save_stack+0x3c/0x68 [ 29.345931] kasan_save_track+0x20/0x40 [ 29.346011] kasan_save_alloc_info+0x40/0x58 [ 29.346208] __kasan_kmalloc+0xd4/0xd8 [ 29.346448] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.346518] kasan_atomics+0xb8/0x2e0 [ 29.346607] kunit_try_run_case+0x170/0x3f0 [ 29.346709] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.346827] kthread+0x328/0x630 [ 29.346865] ret_from_fork+0x10/0x20 [ 29.346902] [ 29.346925] The buggy address belongs to the object at fff00000c787d680 [ 29.346925] which belongs to the cache kmalloc-64 of size 64 [ 29.346984] The buggy address is located 0 bytes to the right of [ 29.346984] allocated 48-byte region [fff00000c787d680, fff00000c787d6b0) [ 29.347231] [ 29.347281] The buggy address belongs to the physical page: [ 29.347350] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d [ 29.347446] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.347733] page_type: f5(slab) [ 29.347825] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.348017] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.348061] page dumped because: kasan: bad access detected [ 29.348116] [ 29.348137] Memory state around the buggy address: [ 29.348172] fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.348215] fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.348260] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.348301] ^ [ 29.348335] fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.348380] fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.348540] ================================================================== [ 29.287023] ================================================================== [ 29.287080] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 29.287136] Read of size 4 at addr fff00000c787d6b0 by task kunit_try_catch/277 [ 29.287196] [ 29.287228] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 29.287318] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.287355] Hardware name: linux,dummy-virt (DT) [ 29.287389] Call trace: [ 29.287426] show_stack+0x20/0x38 (C) [ 29.287476] dump_stack_lvl+0x8c/0xd0 [ 29.287534] print_report+0x118/0x608 [ 29.287584] kasan_report+0xdc/0x128 [ 29.287633] __asan_report_load4_noabort+0x20/0x30 [ 29.287682] kasan_atomics_helper+0x3dbc/0x4858 [ 29.287732] kasan_atomics+0x198/0x2e0 [ 29.287779] kunit_try_run_case+0x170/0x3f0 [ 29.287828] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.288559] kthread+0x328/0x630 [ 29.288643] ret_from_fork+0x10/0x20 [ 29.288748] [ 29.289203] Allocated by task 277: [ 29.289242] kasan_save_stack+0x3c/0x68 [ 29.289626] kasan_save_track+0x20/0x40 [ 29.290034] kasan_save_alloc_info+0x40/0x58 [ 29.290094] __kasan_kmalloc+0xd4/0xd8 [ 29.290453] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.290531] kasan_atomics+0xb8/0x2e0 [ 29.290744] kunit_try_run_case+0x170/0x3f0 [ 29.290900] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.290962] kthread+0x328/0x630 [ 29.291332] ret_from_fork+0x10/0x20 [ 29.291427] [ 29.291616] The buggy address belongs to the object at fff00000c787d680 [ 29.291616] which belongs to the cache kmalloc-64 of size 64 [ 29.291836] The buggy address is located 0 bytes to the right of [ 29.291836] allocated 48-byte region [fff00000c787d680, fff00000c787d6b0) [ 29.292281] [ 29.292433] The buggy address belongs to the physical page: [ 29.292635] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d [ 29.292793] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.292918] page_type: f5(slab) [ 29.293205] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.293320] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.293616] page dumped because: kasan: bad access detected [ 29.293671] [ 29.293691] Memory state around the buggy address: [ 29.293878] fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.294118] fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.294364] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.294607] ^ [ 29.294735] fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.294896] fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.295045] ================================================================== [ 29.249101] ================================================================== [ 29.249382] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 29.249608] Write of size 4 at addr fff00000c787d6b0 by task kunit_try_catch/277 [ 29.249683] [ 29.249717] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 29.249802] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.250020] Hardware name: linux,dummy-virt (DT) [ 29.250353] Call trace: [ 29.250499] show_stack+0x20/0x38 (C) [ 29.250589] dump_stack_lvl+0x8c/0xd0 [ 29.250640] print_report+0x118/0x608 [ 29.251108] kasan_report+0xdc/0x128 [ 29.251281] kasan_check_range+0x100/0x1a8 [ 29.251507] __kasan_check_write+0x20/0x30 [ 29.251568] kasan_atomics_helper+0xa6c/0x4858 [ 29.251736] kasan_atomics+0x198/0x2e0 [ 29.251798] kunit_try_run_case+0x170/0x3f0 [ 29.252222] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.252301] kthread+0x328/0x630 [ 29.252551] ret_from_fork+0x10/0x20 [ 29.252869] [ 29.252992] Allocated by task 277: [ 29.253092] kasan_save_stack+0x3c/0x68 [ 29.253417] kasan_save_track+0x20/0x40 [ 29.253623] kasan_save_alloc_info+0x40/0x58 [ 29.253693] __kasan_kmalloc+0xd4/0xd8 [ 29.254037] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.254146] kasan_atomics+0xb8/0x2e0 [ 29.254391] kunit_try_run_case+0x170/0x3f0 [ 29.254498] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.254680] kthread+0x328/0x630 [ 29.254748] ret_from_fork+0x10/0x20 [ 29.254879] [ 29.254904] The buggy address belongs to the object at fff00000c787d680 [ 29.254904] which belongs to the cache kmalloc-64 of size 64 [ 29.254973] The buggy address is located 0 bytes to the right of [ 29.254973] allocated 48-byte region [fff00000c787d680, fff00000c787d6b0) [ 29.255038] [ 29.255069] The buggy address belongs to the physical page: [ 29.255123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d [ 29.255190] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.255239] page_type: f5(slab) [ 29.255291] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.255352] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.255410] page dumped because: kasan: bad access detected [ 29.255460] [ 29.255489] Memory state around the buggy address: [ 29.255523] fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.255567] fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.255611] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.255651] ^ [ 29.255694] fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.255736] fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.255784] ================================================================== [ 29.569927] ================================================================== [ 29.570003] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 29.570056] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277 [ 29.570152] [ 29.570262] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 29.570349] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.570377] Hardware name: linux,dummy-virt (DT) [ 29.570422] Call trace: [ 29.570445] show_stack+0x20/0x38 (C) [ 29.570493] dump_stack_lvl+0x8c/0xd0 [ 29.570539] print_report+0x118/0x608 [ 29.570586] kasan_report+0xdc/0x128 [ 29.570637] kasan_check_range+0x100/0x1a8 [ 29.570684] __kasan_check_write+0x20/0x30 [ 29.570728] kasan_atomics_helper+0x15b4/0x4858 [ 29.570778] kasan_atomics+0x198/0x2e0 [ 29.570970] kunit_try_run_case+0x170/0x3f0 [ 29.571069] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.571183] kthread+0x328/0x630 [ 29.571234] ret_from_fork+0x10/0x20 [ 29.571299] [ 29.571474] Allocated by task 277: [ 29.571586] kasan_save_stack+0x3c/0x68 [ 29.571692] kasan_save_track+0x20/0x40 [ 29.571845] kasan_save_alloc_info+0x40/0x58 [ 29.571945] __kasan_kmalloc+0xd4/0xd8 [ 29.572066] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.572128] kasan_atomics+0xb8/0x2e0 [ 29.572201] kunit_try_run_case+0x170/0x3f0 [ 29.572242] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.572463] kthread+0x328/0x630 [ 29.572712] ret_from_fork+0x10/0x20 [ 29.572855] [ 29.573004] The buggy address belongs to the object at fff00000c787d680 [ 29.573004] which belongs to the cache kmalloc-64 of size 64 [ 29.573114] The buggy address is located 0 bytes to the right of [ 29.573114] allocated 48-byte region [fff00000c787d680, fff00000c787d6b0) [ 29.573190] [ 29.573211] The buggy address belongs to the physical page: [ 29.573245] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d [ 29.573631] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.573781] page_type: f5(slab) [ 29.573874] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.574117] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.574238] page dumped because: kasan: bad access detected [ 29.574369] [ 29.574738] Memory state around the buggy address: [ 29.574837] fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.575289] fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.575518] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.575586] ^ [ 29.575736] fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.575879] fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.576124] ================================================================== [ 29.267557] ================================================================== [ 29.267811] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 29.267965] Read of size 4 at addr fff00000c787d6b0 by task kunit_try_catch/277 [ 29.268019] [ 29.268115] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 29.268254] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.268354] Hardware name: linux,dummy-virt (DT) [ 29.268389] Call trace: [ 29.268720] show_stack+0x20/0x38 (C) [ 29.268947] dump_stack_lvl+0x8c/0xd0 [ 29.269292] print_report+0x118/0x608 [ 29.269522] kasan_report+0xdc/0x128 [ 29.269780] __asan_report_load4_noabort+0x20/0x30 [ 29.269980] kasan_atomics_helper+0x3dcc/0x4858 [ 29.270087] kasan_atomics+0x198/0x2e0 [ 29.270354] kunit_try_run_case+0x170/0x3f0 [ 29.270611] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.270699] kthread+0x328/0x630 [ 29.271089] ret_from_fork+0x10/0x20 [ 29.271157] [ 29.271180] Allocated by task 277: [ 29.271432] kasan_save_stack+0x3c/0x68 [ 29.271594] kasan_save_track+0x20/0x40 [ 29.271882] kasan_save_alloc_info+0x40/0x58 [ 29.272149] __kasan_kmalloc+0xd4/0xd8 [ 29.272322] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.272468] kasan_atomics+0xb8/0x2e0 [ 29.272851] kunit_try_run_case+0x170/0x3f0 [ 29.272924] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.272987] kthread+0x328/0x630 [ 29.273180] ret_from_fork+0x10/0x20 [ 29.273415] [ 29.273453] The buggy address belongs to the object at fff00000c787d680 [ 29.273453] which belongs to the cache kmalloc-64 of size 64 [ 29.273514] The buggy address is located 0 bytes to the right of [ 29.273514] allocated 48-byte region [fff00000c787d680, fff00000c787d6b0) [ 29.273657] [ 29.273691] The buggy address belongs to the physical page: [ 29.273726] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d [ 29.273799] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.273850] page_type: f5(slab) [ 29.273903] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.273964] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.274014] page dumped because: kasan: bad access detected [ 29.274048] [ 29.274070] Memory state around the buggy address: [ 29.274103] fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.274157] fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.274202] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.274251] ^ [ 29.274287] fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.274330] fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.274369] ================================================================== [ 29.612753] ================================================================== [ 29.612804] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 29.612853] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277 [ 29.612948] [ 29.613105] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 29.613247] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.613315] Hardware name: linux,dummy-virt (DT) [ 29.613348] Call trace: [ 29.613429] show_stack+0x20/0x38 (C) [ 29.613482] dump_stack_lvl+0x8c/0xd0 [ 29.613557] print_report+0x118/0x608 [ 29.613611] kasan_report+0xdc/0x128 [ 29.613694] kasan_check_range+0x100/0x1a8 [ 29.613745] __kasan_check_write+0x20/0x30 [ 29.613789] kasan_atomics_helper+0x17ec/0x4858 [ 29.613892] kasan_atomics+0x198/0x2e0 [ 29.614078] kunit_try_run_case+0x170/0x3f0 [ 29.614152] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.614227] kthread+0x328/0x630 [ 29.614272] ret_from_fork+0x10/0x20 [ 29.614337] [ 29.614366] Allocated by task 277: [ 29.614418] kasan_save_stack+0x3c/0x68 [ 29.614463] kasan_save_track+0x20/0x40 [ 29.614509] kasan_save_alloc_info+0x40/0x58 [ 29.614557] __kasan_kmalloc+0xd4/0xd8 [ 29.614603] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.614763] kasan_atomics+0xb8/0x2e0 [ 29.614812] kunit_try_run_case+0x170/0x3f0 [ 29.614909] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.614964] kthread+0x328/0x630 [ 29.614999] ret_from_fork+0x10/0x20 [ 29.615038] [ 29.615062] The buggy address belongs to the object at fff00000c787d680 [ 29.615062] which belongs to the cache kmalloc-64 of size 64 [ 29.615121] The buggy address is located 0 bytes to the right of [ 29.615121] allocated 48-byte region [fff00000c787d680, fff00000c787d6b0) [ 29.615246] [ 29.615272] The buggy address belongs to the physical page: [ 29.615408] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d [ 29.615549] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.615608] page_type: f5(slab) [ 29.615848] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.616064] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.616129] page dumped because: kasan: bad access detected [ 29.616206] [ 29.616235] Memory state around the buggy address: [ 29.616272] fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.616333] fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.616377] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.616810] ^ [ 29.616884] fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.617265] fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.617413] ================================================================== [ 29.326574] ================================================================== [ 29.326716] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 29.326775] Read of size 4 at addr fff00000c787d6b0 by task kunit_try_catch/277 [ 29.326841] [ 29.326963] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 29.327198] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.327233] Hardware name: linux,dummy-virt (DT) [ 29.327294] Call trace: [ 29.327320] show_stack+0x20/0x38 (C) [ 29.327455] dump_stack_lvl+0x8c/0xd0 [ 29.327508] print_report+0x118/0x608 [ 29.327605] kasan_report+0xdc/0x128 [ 29.327723] __asan_report_load4_noabort+0x20/0x30 [ 29.327839] kasan_atomics_helper+0x3e04/0x4858 [ 29.328014] kasan_atomics+0x198/0x2e0 [ 29.328066] kunit_try_run_case+0x170/0x3f0 [ 29.328131] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.328186] kthread+0x328/0x630 [ 29.328520] ret_from_fork+0x10/0x20 [ 29.328637] [ 29.328658] Allocated by task 277: [ 29.328729] kasan_save_stack+0x3c/0x68 [ 29.328829] kasan_save_track+0x20/0x40 [ 29.328874] kasan_save_alloc_info+0x40/0x58 [ 29.329057] __kasan_kmalloc+0xd4/0xd8 [ 29.329104] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.329173] kasan_atomics+0xb8/0x2e0 [ 29.329212] kunit_try_run_case+0x170/0x3f0 [ 29.329252] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.329298] kthread+0x328/0x630 [ 29.329342] ret_from_fork+0x10/0x20 [ 29.329379] [ 29.329431] The buggy address belongs to the object at fff00000c787d680 [ 29.329431] which belongs to the cache kmalloc-64 of size 64 [ 29.329499] The buggy address is located 0 bytes to the right of [ 29.329499] allocated 48-byte region [fff00000c787d680, fff00000c787d6b0) [ 29.329564] [ 29.329594] The buggy address belongs to the physical page: [ 29.329635] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d [ 29.329684] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.329742] page_type: f5(slab) [ 29.329781] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.329847] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.329890] page dumped because: kasan: bad access detected [ 29.329921] [ 29.329940] Memory state around the buggy address: [ 29.329983] fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.330034] fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.330080] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.330129] ^ [ 29.330178] fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.330237] fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.330287] ================================================================== [ 29.304570] ================================================================== [ 29.304620] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 29.304669] Read of size 4 at addr fff00000c787d6b0 by task kunit_try_catch/277 [ 29.304719] [ 29.304752] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 29.304834] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.304863] Hardware name: linux,dummy-virt (DT) [ 29.304896] Call trace: [ 29.304919] show_stack+0x20/0x38 (C) [ 29.304970] dump_stack_lvl+0x8c/0xd0 [ 29.305019] print_report+0x118/0x608 [ 29.305068] kasan_report+0xdc/0x128 [ 29.305116] __asan_report_load4_noabort+0x20/0x30 [ 29.305166] kasan_atomics_helper+0x3de4/0x4858 [ 29.305216] kasan_atomics+0x198/0x2e0 [ 29.305263] kunit_try_run_case+0x170/0x3f0 [ 29.305313] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.305367] kthread+0x328/0x630 [ 29.305423] ret_from_fork+0x10/0x20 [ 29.305472] [ 29.305493] Allocated by task 277: [ 29.305522] kasan_save_stack+0x3c/0x68 [ 29.305565] kasan_save_track+0x20/0x40 [ 29.305606] kasan_save_alloc_info+0x40/0x58 [ 29.305650] __kasan_kmalloc+0xd4/0xd8 [ 29.305691] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.305734] kasan_atomics+0xb8/0x2e0 [ 29.305773] kunit_try_run_case+0x170/0x3f0 [ 29.305812] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.305859] kthread+0x328/0x630 [ 29.305893] ret_from_fork+0x10/0x20 [ 29.305928] [ 29.305950] The buggy address belongs to the object at fff00000c787d680 [ 29.305950] which belongs to the cache kmalloc-64 of size 64 [ 29.306009] The buggy address is located 0 bytes to the right of [ 29.306009] allocated 48-byte region [fff00000c787d680, fff00000c787d6b0) [ 29.306072] [ 29.306092] The buggy address belongs to the physical page: [ 29.306124] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d [ 29.306176] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.306224] page_type: f5(slab) [ 29.306264] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.306314] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.306355] page dumped because: kasan: bad access detected [ 29.306386] [ 29.306441] Memory state around the buggy address: [ 29.306474] fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.306618] fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.306728] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.306844] ^ [ 29.306902] fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.306978] fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.307024] ================================================================== [ 29.522444] ================================================================== [ 29.522497] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 29.522549] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277 [ 29.522608] [ 29.522641] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 29.522725] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.524429] Hardware name: linux,dummy-virt (DT) [ 29.524789] Call trace: [ 29.524819] show_stack+0x20/0x38 (C) [ 29.524870] dump_stack_lvl+0x8c/0xd0 [ 29.524953] print_report+0x118/0x608 [ 29.525000] kasan_report+0xdc/0x128 [ 29.525047] kasan_check_range+0x100/0x1a8 [ 29.525546] __kasan_check_write+0x20/0x30 [ 29.525592] kasan_atomics_helper+0x126c/0x4858 [ 29.525641] kasan_atomics+0x198/0x2e0 [ 29.525687] kunit_try_run_case+0x170/0x3f0 [ 29.525735] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.525789] kthread+0x328/0x630 [ 29.525832] ret_from_fork+0x10/0x20 [ 29.525881] [ 29.525903] Allocated by task 277: [ 29.525933] kasan_save_stack+0x3c/0x68 [ 29.525975] kasan_save_track+0x20/0x40 [ 29.526014] kasan_save_alloc_info+0x40/0x58 [ 29.526053] __kasan_kmalloc+0xd4/0xd8 [ 29.526092] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.526134] kasan_atomics+0xb8/0x2e0 [ 29.526172] kunit_try_run_case+0x170/0x3f0 [ 29.526212] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.526258] kthread+0x328/0x630 [ 29.526293] ret_from_fork+0x10/0x20 [ 29.526331] [ 29.526352] The buggy address belongs to the object at fff00000c787d680 [ 29.526352] which belongs to the cache kmalloc-64 of size 64 [ 29.526424] The buggy address is located 0 bytes to the right of [ 29.526424] allocated 48-byte region [fff00000c787d680, fff00000c787d6b0) [ 29.526510] [ 29.526532] The buggy address belongs to the physical page: [ 29.526566] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d [ 29.526625] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.526671] page_type: f5(slab) [ 29.526709] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.526759] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.526822] page dumped because: kasan: bad access detected [ 29.526861] [ 29.526890] Memory state around the buggy address: [ 29.526929] fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.526991] fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.527040] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.527079] ^ [ 29.527113] fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.527157] fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.527207] ================================================================== [ 29.579596] ================================================================== [ 29.579638] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 29.579686] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277 [ 29.579782] [ 29.579987] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 29.580358] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.580388] Hardware name: linux,dummy-virt (DT) [ 29.580428] Call trace: [ 29.580529] show_stack+0x20/0x38 (C) [ 29.580601] dump_stack_lvl+0x8c/0xd0 [ 29.580649] print_report+0x118/0x608 [ 29.580752] kasan_report+0xdc/0x128 [ 29.580960] kasan_check_range+0x100/0x1a8 [ 29.581051] __kasan_check_write+0x20/0x30 [ 29.581304] kasan_atomics_helper+0x1644/0x4858 [ 29.581357] kasan_atomics+0x198/0x2e0 [ 29.581509] kunit_try_run_case+0x170/0x3f0 [ 29.581741] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.581816] kthread+0x328/0x630 [ 29.581927] ret_from_fork+0x10/0x20 [ 29.582166] [ 29.582259] Allocated by task 277: [ 29.582571] kasan_save_stack+0x3c/0x68 [ 29.582689] kasan_save_track+0x20/0x40 [ 29.582768] kasan_save_alloc_info+0x40/0x58 [ 29.582809] __kasan_kmalloc+0xd4/0xd8 [ 29.582849] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.583166] kasan_atomics+0xb8/0x2e0 [ 29.583265] kunit_try_run_case+0x170/0x3f0 [ 29.583429] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.583509] kthread+0x328/0x630 [ 29.583946] ret_from_fork+0x10/0x20 [ 29.584179] [ 29.584257] The buggy address belongs to the object at fff00000c787d680 [ 29.584257] which belongs to the cache kmalloc-64 of size 64 [ 29.584432] The buggy address is located 0 bytes to the right of [ 29.584432] allocated 48-byte region [fff00000c787d680, fff00000c787d6b0) [ 29.584499] [ 29.584520] The buggy address belongs to the physical page: [ 29.584554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d [ 29.584608] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.584676] page_type: f5(slab) [ 29.584716] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.584768] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.584809] page dumped because: kasan: bad access detected [ 29.585022] [ 29.585087] Memory state around the buggy address: [ 29.585265] fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.585386] fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.585676] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.585879] ^ [ 29.586002] fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.586077] fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.586199] ================================================================== [ 29.481836] ================================================================== [ 29.482309] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 29.482382] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277 [ 29.482445] [ 29.482481] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 29.482566] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.483343] Hardware name: linux,dummy-virt (DT) [ 29.483389] Call trace: [ 29.483485] show_stack+0x20/0x38 (C) [ 29.483537] dump_stack_lvl+0x8c/0xd0 [ 29.483585] print_report+0x118/0x608 [ 29.483631] kasan_report+0xdc/0x128 [ 29.484126] kasan_check_range+0x100/0x1a8 [ 29.484196] __kasan_check_write+0x20/0x30 [ 29.484246] kasan_atomics_helper+0x1128/0x4858 [ 29.484598] kasan_atomics+0x198/0x2e0 [ 29.484648] kunit_try_run_case+0x170/0x3f0 [ 29.485073] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.485588] kthread+0x328/0x630 [ 29.485644] ret_from_fork+0x10/0x20 [ 29.485833] [ 29.485857] Allocated by task 277: [ 29.486299] kasan_save_stack+0x3c/0x68 [ 29.486381] kasan_save_track+0x20/0x40 [ 29.486560] kasan_save_alloc_info+0x40/0x58 [ 29.487026] __kasan_kmalloc+0xd4/0xd8 [ 29.487161] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.487204] kasan_atomics+0xb8/0x2e0 [ 29.487242] kunit_try_run_case+0x170/0x3f0 [ 29.487282] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.487328] kthread+0x328/0x630 [ 29.487848] ret_from_fork+0x10/0x20 [ 29.487930] [ 29.487952] The buggy address belongs to the object at fff00000c787d680 [ 29.487952] which belongs to the cache kmalloc-64 of size 64 [ 29.488367] The buggy address is located 0 bytes to the right of [ 29.488367] allocated 48-byte region [fff00000c787d680, fff00000c787d6b0) [ 29.488586] [ 29.488610] The buggy address belongs to the physical page: [ 29.488758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d [ 29.488830] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.488889] page_type: f5(slab) [ 29.489038] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.489614] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.489673] page dumped because: kasan: bad access detected [ 29.489958] [ 29.489982] Memory state around the buggy address: [ 29.490218] fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.490383] fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.490453] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.490675] ^ [ 29.490941] fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.490990] fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.491320] ================================================================== [ 29.564708] ================================================================== [ 29.564760] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 29.564812] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277 [ 29.564900] [ 29.564937] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 29.565035] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.565063] Hardware name: linux,dummy-virt (DT) [ 29.565131] Call trace: [ 29.565156] show_stack+0x20/0x38 (C) [ 29.565205] dump_stack_lvl+0x8c/0xd0 [ 29.565279] print_report+0x118/0x608 [ 29.565335] kasan_report+0xdc/0x128 [ 29.565383] kasan_check_range+0x100/0x1a8 [ 29.565442] __kasan_check_write+0x20/0x30 [ 29.565487] kasan_atomics_helper+0x154c/0x4858 [ 29.565536] kasan_atomics+0x198/0x2e0 [ 29.565582] kunit_try_run_case+0x170/0x3f0 [ 29.565631] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.565684] kthread+0x328/0x630 [ 29.565726] ret_from_fork+0x10/0x20 [ 29.565774] [ 29.565796] Allocated by task 277: [ 29.565824] kasan_save_stack+0x3c/0x68 [ 29.565866] kasan_save_track+0x20/0x40 [ 29.566097] kasan_save_alloc_info+0x40/0x58 [ 29.566216] __kasan_kmalloc+0xd4/0xd8 [ 29.566315] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.566412] kasan_atomics+0xb8/0x2e0 [ 29.566455] kunit_try_run_case+0x170/0x3f0 [ 29.566617] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.566831] kthread+0x328/0x630 [ 29.566907] ret_from_fork+0x10/0x20 [ 29.566947] [ 29.567032] The buggy address belongs to the object at fff00000c787d680 [ 29.567032] which belongs to the cache kmalloc-64 of size 64 [ 29.567148] The buggy address is located 0 bytes to the right of [ 29.567148] allocated 48-byte region [fff00000c787d680, fff00000c787d6b0) [ 29.567215] [ 29.567339] The buggy address belongs to the physical page: [ 29.567374] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d [ 29.567435] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.567481] page_type: f5(slab) [ 29.567549] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.567713] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.567941] page dumped because: kasan: bad access detected [ 29.568005] [ 29.568130] Memory state around the buggy address: [ 29.568338] fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.568487] fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.568721] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.568838] ^ [ 29.568918] fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.569065] fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.569170] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 29.018346] ================================================================== [ 29.021001] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 29.021261] Hardware name: linux,dummy-virt (DT) [ 29.021496] kasan_report+0xdc/0x128 [ 29.021710] kunit_try_run_case+0x170/0x3f0 [ 29.022034] kasan_save_track+0x20/0x40 [ 29.022194] kasan_bitops_generic+0xa0/0x1c8 [ 29.023218] [ 29.023407] page_type: f5(slab) [ 29.024151] [ 29.024760] >fff00000c454c800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.024855] ^ [ 29.024961] fff00000c454c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.041626] ok 64 kasan_bitops_tags # SKIP Test requires CONFIG_KASAN_GENERIC=n [ 29.044386] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 29.045534] Hardware name: linux,dummy-virt (DT) [ 29.045690] show_stack+0x20/0x38 (C) [ 29.046433] __asan_report_load4_noabort+0x20/0x30 [ 29.047089] kunit_try_run_case+0x170/0x3f0 [ 29.048571] __kasan_kmalloc+0xd4/0xd8 [ 29.049874] The buggy address is located 0 bytes to the right of [ 29.049874] allocated 48-byte region [fff00000c787d680, fff00000c787d6b0) [ 29.050544] page_type: f5(slab) [ 29.051016] [ 29.051416] fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.052554] fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.054513] Write of size 4 at addr fff00000c787d6b0 by task kunit_try_catch/277 [ 29.054572] [ 29.054870] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.055073] Hardware name: linux,dummy-virt (DT) [ 29.055586] print_report+0x118/0x608 [ 29.056902] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.057734] kasan_save_track+0x20/0x40 [ 29.059224] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.060310] [ 29.060748] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.061455] [ 29.061931] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.061976] ^ [ 29.062038] fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.062138] fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.062180] ================================================================== [ 28.989162] ================================================================== [ 28.989333] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 28.989485] Read of size 8 at addr fff00000c454c808 by task kunit_try_catch/273 [ 28.989539] [ 28.989587] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 28.989729] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.989786] Hardware name: linux,dummy-virt (DT) [ 28.989820] Call trace: [ 28.989871] show_stack+0x20/0x38 (C) [ 28.989931] dump_stack_lvl+0x8c/0xd0 [ 28.990005] print_report+0x118/0x608 [ 28.990120] kasan_report+0xdc/0x128 [ 28.990215] __asan_report_load8_noabort+0x20/0x30 [ 28.990318] kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 28.990377] kasan_bitops_generic+0x11c/0x1c8 [ 28.990437] kunit_try_run_case+0x170/0x3f0 [ 28.990606] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.990773] kthread+0x328/0x630 [ 28.990899] ret_from_fork+0x10/0x20 [ 28.990989] [ 28.991087] Allocated by task 273: [ 28.991118] kasan_save_stack+0x3c/0x68 [ 28.991231] kasan_save_track+0x20/0x40 [ 28.991279] kasan_save_alloc_info+0x40/0x58 [ 28.991325] __kasan_kmalloc+0xd4/0xd8 [ 28.991484] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.991580] kasan_bitops_generic+0xa0/0x1c8 [ 28.991624] kunit_try_run_case+0x170/0x3f0 [ 28.991664] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.991710] kthread+0x328/0x630 [ 28.991881] ret_from_fork+0x10/0x20 [ 28.992386] [ 28.992773] The buggy address belongs to the object at fff00000c454c800 [ 28.992773] which belongs to the cache kmalloc-16 of size 16 [ 28.992859] The buggy address is located 8 bytes inside of [ 28.992859] allocated 9-byte region [fff00000c454c800, fff00000c454c809) [ 28.992925] [ 28.992948] The buggy address belongs to the physical page: [ 28.992982] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10454c [ 28.993257] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.993439] page_type: f5(slab) [ 28.993549] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 28.993676] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 28.993779] page dumped because: kasan: bad access detected [ 28.993847] [ 28.993931] Memory state around the buggy address: [ 28.994008] fff00000c454c700: fa fb fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 28.994107] fff00000c454c780: fa fb fc fc 00 01 fc fc fa fb fc fc 00 04 fc fc [ 28.994168] >fff00000c454c800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.994209] ^ [ 28.994274] fff00000c454c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.994640] fff00000c454c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.994748] ================================================================== [ 29.005354] ================================================================== [ 29.005422] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 29.005479] Write of size 8 at addr fff00000c454c808 by task kunit_try_catch/273 [ 29.005530] [ 29.005560] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 29.005649] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.005727] Hardware name: linux,dummy-virt (DT) [ 29.005769] Call trace: [ 29.005795] show_stack+0x20/0x38 (C) [ 29.005845] dump_stack_lvl+0x8c/0xd0 [ 29.005894] print_report+0x118/0x608 [ 29.005941] kasan_report+0xdc/0x128 [ 29.005993] kasan_check_range+0x100/0x1a8 [ 29.006044] __kasan_check_write+0x20/0x30 [ 29.006090] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 29.006147] kasan_bitops_generic+0x11c/0x1c8 [ 29.006196] kunit_try_run_case+0x170/0x3f0 [ 29.006246] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.006309] kthread+0x328/0x630 [ 29.006351] ret_from_fork+0x10/0x20 [ 29.006842] [ 29.006876] Allocated by task 273: [ 29.006909] kasan_save_stack+0x3c/0x68 [ 29.006963] kasan_save_track+0x20/0x40 [ 29.007126] kasan_save_alloc_info+0x40/0x58 [ 29.007240] __kasan_kmalloc+0xd4/0xd8 [ 29.007330] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.007374] kasan_bitops_generic+0xa0/0x1c8 [ 29.007587] kunit_try_run_case+0x170/0x3f0 [ 29.007702] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.007777] kthread+0x328/0x630 [ 29.007813] ret_from_fork+0x10/0x20 [ 29.007857] [ 29.008047] The buggy address belongs to the object at fff00000c454c800 [ 29.008047] which belongs to the cache kmalloc-16 of size 16 [ 29.008153] The buggy address is located 8 bytes inside of [ 29.008153] allocated 9-byte region [fff00000c454c800, fff00000c454c809) [ 29.008246] [ 29.008370] The buggy address belongs to the physical page: [ 29.008431] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10454c [ 29.008612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.008824] page_type: f5(slab) [ 29.008925] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 29.009037] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 29.009146] page dumped because: kasan: bad access detected [ 29.009509] [ 29.009607] Memory state around the buggy address: [ 29.009761] fff00000c454c700: fa fb fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 29.009846] fff00000c454c780: fa fb fc fc 00 01 fc fc fa fb fc fc 00 04 fc fc [ 29.009951] >fff00000c454c800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.010139] ^ [ 29.010240] fff00000c454c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.010353] fff00000c454c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.010542] ================================================================== [ 29.000305] ================================================================== [ 29.000352] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 29.000447] Read of size 8 at addr fff00000c454c808 by task kunit_try_catch/273 [ 29.000500] [ 29.000590] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 29.000674] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.000703] Hardware name: linux,dummy-virt (DT) [ 29.000735] Call trace: [ 29.000776] show_stack+0x20/0x38 (C) [ 29.000827] dump_stack_lvl+0x8c/0xd0 [ 29.000970] print_report+0x118/0x608 [ 29.001022] kasan_report+0xdc/0x128 [ 29.001068] __asan_report_load8_noabort+0x20/0x30 [ 29.001118] kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 29.001175] kasan_bitops_generic+0x11c/0x1c8 [ 29.001234] kunit_try_run_case+0x170/0x3f0 [ 29.001285] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.001340] kthread+0x328/0x630 [ 29.001381] ret_from_fork+0x10/0x20 [ 29.001442] [ 29.001511] Allocated by task 273: [ 29.001554] kasan_save_stack+0x3c/0x68 [ 29.001598] kasan_save_track+0x20/0x40 [ 29.001637] kasan_save_alloc_info+0x40/0x58 [ 29.001676] __kasan_kmalloc+0xd4/0xd8 [ 29.001712] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.001754] kasan_bitops_generic+0xa0/0x1c8 [ 29.001839] kunit_try_run_case+0x170/0x3f0 [ 29.001880] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.001927] kthread+0x328/0x630 [ 29.002518] ret_from_fork+0x10/0x20 [ 29.002600] [ 29.002716] The buggy address belongs to the object at fff00000c454c800 [ 29.002716] which belongs to the cache kmalloc-16 of size 16 [ 29.003172] The buggy address is located 8 bytes inside of [ 29.003172] allocated 9-byte region [fff00000c454c800, fff00000c454c809) [ 29.003413] [ 29.003439] The buggy address belongs to the physical page: [ 29.003693] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10454c [ 29.003758] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.003869] page_type: f5(slab) [ 29.003982] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 29.004110] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 29.004155] page dumped because: kasan: bad access detected [ 29.004221] [ 29.004242] Memory state around the buggy address: [ 29.004277] fff00000c454c700: fa fb fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 29.004343] fff00000c454c780: fa fb fc fc 00 01 fc fc fa fb fc fc 00 04 fc fc [ 29.004415] >fff00000c454c800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.004606] ^ [ 29.004653] fff00000c454c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.004701] fff00000c454c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.004820] ================================================================== [ 28.995167] ================================================================== [ 28.995414] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 28.995478] Write of size 8 at addr fff00000c454c808 by task kunit_try_catch/273 [ 28.995529] [ 28.995561] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 28.995682] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.995847] Hardware name: linux,dummy-virt (DT) [ 28.995893] Call trace: [ 28.995925] show_stack+0x20/0x38 (C) [ 28.995977] dump_stack_lvl+0x8c/0xd0 [ 28.996024] print_report+0x118/0x608 [ 28.996336] kasan_report+0xdc/0x128 [ 28.996451] kasan_check_range+0x100/0x1a8 [ 28.996538] __kasan_check_write+0x20/0x30 [ 28.996654] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 28.996715] kasan_bitops_generic+0x11c/0x1c8 [ 28.996789] kunit_try_run_case+0x170/0x3f0 [ 28.996840] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.997031] kthread+0x328/0x630 [ 28.997078] ret_from_fork+0x10/0x20 [ 28.997139] [ 28.997160] Allocated by task 273: [ 28.997190] kasan_save_stack+0x3c/0x68 [ 28.997274] kasan_save_track+0x20/0x40 [ 28.997457] kasan_save_alloc_info+0x40/0x58 [ 28.997514] __kasan_kmalloc+0xd4/0xd8 [ 28.997557] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.997745] kasan_bitops_generic+0xa0/0x1c8 [ 28.997789] kunit_try_run_case+0x170/0x3f0 [ 28.997829] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.997989] kthread+0x328/0x630 [ 28.998079] ret_from_fork+0x10/0x20 [ 28.998193] [ 28.998300] The buggy address belongs to the object at fff00000c454c800 [ 28.998300] which belongs to the cache kmalloc-16 of size 16 [ 28.998391] The buggy address is located 8 bytes inside of [ 28.998391] allocated 9-byte region [fff00000c454c800, fff00000c454c809) [ 28.998552] [ 28.998630] The buggy address belongs to the physical page: [ 28.998702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10454c [ 28.998790] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.998881] page_type: f5(slab) [ 28.998936] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 28.999058] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 28.999144] page dumped because: kasan: bad access detected [ 28.999247] [ 28.999315] Memory state around the buggy address: [ 28.999348] fff00000c454c700: fa fb fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 28.999515] fff00000c454c780: fa fb fc fc 00 01 fc fc fa fb fc fc 00 04 fc fc [ 28.999563] >fff00000c454c800: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.999603] ^ [ 28.999889] fff00000c454c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.999938] fff00000c454c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.999980] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[ 28.929148] ================================================================== [ 28.929196] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 28.929353] [ 28.929712] Hardware name: linux,dummy-virt (DT) [ 28.929912] print_report+0x118/0x608 [ 28.930315] kasan_bitops_generic+0x110/0x1c8 [ 28.930801] kasan_save_stack+0x3c/0x68 [ 28.931513] kasan_bitops_generic+0xa0/0x1c8 [ 28.931931] ret_from_fork+0x10/0x20 [ 28.932990] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 28.934768] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 28.941543] Call trace: [ 28.943514] kthread+0x328/0x630 [ 28.944375] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.945262] [ 28.945850] page dumped because: kasan: bad access detected [ 28.946826] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[ 28.888803] ================================================================== [ 28.888857] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00 [ 28.889050] Read of size 1 at addr fff00000c785da90 by task kunit_try_catch/271 [ 28.889375] [ 28.889544] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 28.889634] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.889691] Hardware name: linux,dummy-virt (DT) [ 28.889759] Call trace: [ 28.889849] show_stack+0x20/0x38 (C) [ 28.889903] dump_stack_lvl+0x8c/0xd0 [ 28.889950] print_report+0x118/0x608 [ 28.890193] kasan_report+0xdc/0x128 [ 28.890265] __asan_report_load1_noabort+0x20/0x30 [ 28.890541] kasan_strings+0x95c/0xb00 [ 28.890655] kunit_try_run_case+0x170/0x3f0 [ 28.890710] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.890794] kthread+0x328/0x630 [ 28.890857] ret_from_fork+0x10/0x20 [ 28.890953] [ 28.890978] Allocated by task 271: [ 28.891015] kasan_save_stack+0x3c/0x68 [ 28.891069] kasan_save_track+0x20/0x40 [ 28.891145] kasan_save_alloc_info+0x40/0x58 [ 28.891198] __kasan_kmalloc+0xd4/0xd8 [ 28.891254] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.891297] kasan_strings+0xc8/0xb00 [ 28.891334] kunit_try_run_case+0x170/0x3f0 [ 28.891382] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.891458] kthread+0x328/0x630 [ 28.891493] ret_from_fork+0x10/0x20 [ 28.891569] [ 28.891590] Freed by task 271: [ 28.891618] kasan_save_stack+0x3c/0x68 [ 28.891694] kasan_save_track+0x20/0x40 [ 28.891741] kasan_save_free_info+0x4c/0x78 [ 28.891781] __kasan_slab_free+0x6c/0x98 [ 28.891828] kfree+0x214/0x3c8 [ 28.891865] kasan_strings+0x24c/0xb00 [ 28.891925] kunit_try_run_case+0x170/0x3f0 [ 28.892215] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.892409] kthread+0x328/0x630 [ 28.892506] ret_from_fork+0x10/0x20 [ 28.892596] [ 28.892620] The buggy address belongs to the object at fff00000c785da80 [ 28.892620] which belongs to the cache kmalloc-32 of size 32 [ 28.892691] The buggy address is located 16 bytes inside of [ 28.892691] freed 32-byte region [fff00000c785da80, fff00000c785daa0) [ 28.892758] [ 28.892923] The buggy address belongs to the physical page: [ 28.893151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10785d [ 28.893349] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.893464] page_type: f5(slab) [ 28.893527] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 28.893679] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 28.893934] page dumped because: kasan: bad access detected [ 28.893996] [ 28.894018] Memory state around the buggy address: [ 28.894054] fff00000c785d980: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 28.894291] fff00000c785da00: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 28.894503] >fff00000c785da80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 28.894597] ^ [ 28.894688] fff00000c785db00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 28.894733] fff00000c785db80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 28.896561] Read of size 1 at addr fff00000c785da90 by task kunit_try_catch/271 [ 28.897512] kthread+0x328/0x630 [ 28.897888] __kasan_kmalloc+0xd4/0xd8 [ 28.898410] kthread+0x328/0x630 [ 28.898752] kasan_save_free_info+0x4c/0x78 [ 28.899133] kthread+0x328/0x630 [ 28.899516] The buggy address is located 16 bytes inside of [ 28.899516] freed 32-byte region [fff00000c785da80, fff00000c785daa0) [ 28.899973] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 28.901477] [ 28.901752] show_stack+0x20/0x38 (C) [ 28.901820] dump_stack_lvl+0x8c/0xd0 [ 28.901867] print_report+0x118/0x608 [ 28.902272] kunit_try_run_case+0x170/0x3f0 [ 28.902849] kasan_save_track+0x20/0x40 [ 28.903156] kasan_strings+0xc8/0xb00 [ 28.903661] [ 28.903803] kasan_save_free_info+0x4c/0x78 [ 28.904055] kthread+0x328/0x630 [ 28.904209] The buggy address is located 16 bytes inside of [ 28.904209] freed 32-byte region [fff00000c785da80, fff00000c785daa0) [ 28.905814] >fff00000c785da80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 28.912071] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 28.912220] Write of size 8 at addr fff00000c454c808 by task kunit_try_catch/273 [ 28.912651] show_stack+0x20/0x38 (C) [ 28.913278] kasan_check_range+0x100/0x1a8 [ 28.913831] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.914199] kasan_save_stack+0x3c/0x68 [ 28.915034] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.915256] ret_from_fork+0x10/0x20 [ 28.915674] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.916709] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
[ 28.882155] ================================================================== [ 28.882207] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 [ 28.882263] Read of size 1 at addr fff00000c785da90 by task kunit_try_catch/271 [ 28.882314] [ 28.882351] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 28.882460] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.882490] Hardware name: linux,dummy-virt (DT) [ 28.882524] Call trace: [ 28.882905] show_stack+0x20/0x38 (C) [ 28.883008] dump_stack_lvl+0x8c/0xd0 [ 28.883103] print_report+0x118/0x608 [ 28.883156] kasan_report+0xdc/0x128 [ 28.883223] __asan_report_load1_noabort+0x20/0x30 [ 28.883307] strcmp+0xc0/0xc8 [ 28.883350] kasan_strings+0x340/0xb00 [ 28.883415] kunit_try_run_case+0x170/0x3f0 [ 28.883465] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.883519] kthread+0x328/0x630 [ 28.883562] ret_from_fork+0x10/0x20 [ 28.883791] [ 28.883846] Allocated by task 271: [ 28.883912] kasan_save_stack+0x3c/0x68 [ 28.883960] kasan_save_track+0x20/0x40 [ 28.884033] kasan_save_alloc_info+0x40/0x58 [ 28.884252] __kasan_kmalloc+0xd4/0xd8 [ 28.884341] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.884383] kasan_strings+0xc8/0xb00 [ 28.884471] kunit_try_run_case+0x170/0x3f0 [ 28.884558] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.884604] kthread+0x328/0x630 [ 28.884664] ret_from_fork+0x10/0x20 [ 28.884759] [ 28.884782] Freed by task 271: [ 28.884811] kasan_save_stack+0x3c/0x68 [ 28.884859] kasan_save_track+0x20/0x40 [ 28.884899] kasan_save_free_info+0x4c/0x78 [ 28.884956] __kasan_slab_free+0x6c/0x98 [ 28.884996] kfree+0x214/0x3c8 [ 28.885030] kasan_strings+0x24c/0xb00 [ 28.885068] kunit_try_run_case+0x170/0x3f0 [ 28.885268] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.885325] kthread+0x328/0x630 [ 28.885359] ret_from_fork+0x10/0x20 [ 28.885408] [ 28.885866] The buggy address belongs to the object at fff00000c785da80 [ 28.885866] which belongs to the cache kmalloc-32 of size 32 [ 28.885934] The buggy address is located 16 bytes inside of [ 28.885934] freed 32-byte region [fff00000c785da80, fff00000c785daa0) [ 28.886020] [ 28.886079] The buggy address belongs to the physical page: [ 28.886183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10785d [ 28.886252] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.886493] page_type: f5(slab) [ 28.886676] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 28.886776] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 28.886849] page dumped because: kasan: bad access detected [ 28.886929] [ 28.887002] Memory state around the buggy address: [ 28.887094] fff00000c785d980: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 28.887158] fff00000c785da00: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 28.887242] >fff00000c785da80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 28.887333] ^ [ 28.887368] fff00000c785db00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 28.887423] fff00000c785db80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 28.887465] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[ 28.867271] ================================================================== [ 28.867334] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 28.867682] Read of size 1 at addr fff00000c785d8d8 by task kunit_try_catch/269 [ 28.867759] [ 28.867802] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 28.867908] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.868050] Hardware name: linux,dummy-virt (DT) [ 28.868097] Call trace: [ 28.868133] show_stack+0x20/0x38 (C) [ 28.868209] dump_stack_lvl+0x8c/0xd0 [ 28.868259] print_report+0x118/0x608 [ 28.868308] kasan_report+0xdc/0x128 [ 28.868357] __asan_report_load1_noabort+0x20/0x30 [ 28.868419] memcmp+0x198/0x1d8 [ 28.868463] kasan_memcmp+0x16c/0x300 [ 28.868512] kunit_try_run_case+0x170/0x3f0 [ 28.868562] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.868616] kthread+0x328/0x630 [ 28.868819] ret_from_fork+0x10/0x20 [ 28.869032] [ 28.869054] Allocated by task 269: [ 28.869112] kasan_save_stack+0x3c/0x68 [ 28.869265] kasan_save_track+0x20/0x40 [ 28.869332] kasan_save_alloc_info+0x40/0x58 [ 28.869512] __kasan_kmalloc+0xd4/0xd8 [ 28.869590] __kmalloc_cache_noprof+0x16c/0x3c0 [ 28.870067] kasan_memcmp+0xbc/0x300 [ 28.870183] kunit_try_run_case+0x170/0x3f0 [ 28.870263] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.870440] kthread+0x328/0x630 [ 28.870517] ret_from_fork+0x10/0x20 [ 28.870555] [ 28.870597] The buggy address belongs to the object at fff00000c785d8c0 [ 28.870597] which belongs to the cache kmalloc-32 of size 32 [ 28.870688] The buggy address is located 0 bytes to the right of [ 28.870688] allocated 24-byte region [fff00000c785d8c0, fff00000c785d8d8) [ 28.870754] [ 28.870790] The buggy address belongs to the physical page: [ 28.870834] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10785d [ 28.870905] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.870966] page_type: f5(slab) [ 28.871020] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 28.871091] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 28.871135] page dumped because: kasan: bad access detected [ 28.871166] [ 28.871197] Memory state around the buggy address: [ 28.871250] fff00000c785d780: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 28.871301] fff00000c785d800: 00 00 00 fc fc fc fc fc 00 00 00 04 fc fc fc fc [ 28.871353] >fff00000c785d880: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 28.871392] ^ [ 28.871448] fff00000c785d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.871501] fff00000c785d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.871552] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[ 28.852607] ================================================================== [ 28.852821] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340 [ 28.852888] Read of size 1 at addr ffff800080ab7b4a by task kunit_try_catch/265 [ 28.852940] [ 28.853022] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 28.853112] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.853176] Hardware name: linux,dummy-virt (DT) [ 28.853411] Call trace: [ 28.853600] show_stack+0x20/0x38 (C) [ 28.853685] dump_stack_lvl+0x8c/0xd0 [ 28.853737] print_report+0x310/0x608 [ 28.853817] kasan_report+0xdc/0x128 [ 28.853872] __asan_report_load1_noabort+0x20/0x30 [ 28.853921] kasan_alloca_oob_right+0x2dc/0x340 [ 28.853980] kunit_try_run_case+0x170/0x3f0 [ 28.854030] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.854084] kthread+0x328/0x630 [ 28.854127] ret_from_fork+0x10/0x20 [ 28.854180] [ 28.854205] The buggy address belongs to stack of task kunit_try_catch/265 [ 28.854260] [ 28.854289] The buggy address belongs to the virtual mapping at [ 28.854289] [ffff800080ab0000, ffff800080ab9000) created by: [ 28.854289] kernel_clone+0x150/0x7a8 [ 28.854368] [ 28.854392] The buggy address belongs to the physical page: [ 28.854445] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10785e [ 28.854498] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.854581] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 28.854632] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 28.854674] page dumped because: kasan: bad access detected [ 28.854708] [ 28.854728] Memory state around the buggy address: [ 28.855032] ffff800080ab7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.855095] ffff800080ab7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.855150] >ffff800080ab7b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 28.855249] ^ [ 28.855292] ffff800080ab7b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 28.855535] ffff800080ab7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 28.855584] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[ 28.841118] ================================================================== [ 28.841215] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 28.841284] Read of size 1 at addr ffff800080ab7b5f by task kunit_try_catch/263 [ 28.841494] [ 28.841576] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 28.841693] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.841751] Hardware name: linux,dummy-virt (DT) [ 28.841807] Call trace: [ 28.841832] show_stack+0x20/0x38 (C) [ 28.841906] dump_stack_lvl+0x8c/0xd0 [ 28.841961] print_report+0x310/0x608 [ 28.842011] kasan_report+0xdc/0x128 [ 28.842057] __asan_report_load1_noabort+0x20/0x30 [ 28.842278] kasan_alloca_oob_left+0x2b8/0x310 [ 28.842336] kunit_try_run_case+0x170/0x3f0 [ 28.842389] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.842480] kthread+0x328/0x630 [ 28.842585] ret_from_fork+0x10/0x20 [ 28.842638] [ 28.842667] The buggy address belongs to stack of task kunit_try_catch/263 [ 28.842795] [ 28.842826] The buggy address belongs to the virtual mapping at [ 28.842826] [ffff800080ab0000, ffff800080ab9000) created by: [ 28.842826] kernel_clone+0x150/0x7a8 [ 28.842914] [ 28.843119] The buggy address belongs to the physical page: [ 28.843250] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10785e [ 28.843329] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.843409] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 28.843500] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 28.843544] page dumped because: kasan: bad access detected [ 28.843579] [ 28.843599] Memory state around the buggy address: [ 28.843634] ffff800080ab7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.843680] ffff800080ab7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.843761] >ffff800080ab7b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 28.843804] ^ [ 28.843972] ffff800080ab7b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 28.844071] ffff800080ab7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 28.844178] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 28.830155] ================================================================== [ 28.830259] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 28.830364] Read of size 1 at addr ffff800080a07c2a by task kunit_try_catch/261 [ 28.830466] [ 28.830508] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 28.830625] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.830662] Hardware name: linux,dummy-virt (DT) [ 28.830720] Call trace: [ 28.830747] show_stack+0x20/0x38 (C) [ 28.830799] dump_stack_lvl+0x8c/0xd0 [ 28.830881] print_report+0x310/0x608 [ 28.830943] kasan_report+0xdc/0x128 [ 28.831016] __asan_report_load1_noabort+0x20/0x30 [ 28.831067] kasan_stack_oob+0x238/0x270 [ 28.831274] kunit_try_run_case+0x170/0x3f0 [ 28.831499] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.831573] kthread+0x328/0x630 [ 28.831620] ret_from_fork+0x10/0x20 [ 28.831672] [ 28.831741] The buggy address belongs to stack of task kunit_try_catch/261 [ 28.831929] and is located at offset 138 in frame: [ 28.832089] kasan_stack_oob+0x0/0x270 [ 28.832358] [ 28.832426] This frame has 4 objects: [ 28.832772] [48, 49) '__assertion' [ 28.832819] [64, 72) 'array' [ 28.832851] [96, 112) '__assertion' [ 28.832894] [128, 138) 'stack_array' [ 28.832940] [ 28.833279] The buggy address belongs to the virtual mapping at [ 28.833279] [ffff800080a00000, ffff800080a09000) created by: [ 28.833279] kernel_clone+0x150/0x7a8 [ 28.833450] [ 28.833476] The buggy address belongs to the physical page: [ 28.833510] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078e7 [ 28.833573] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.833807] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 28.834083] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 28.834236] page dumped because: kasan: bad access detected [ 28.834304] [ 28.834326] Memory state around the buggy address: [ 28.834427] ffff800080a07b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.834491] ffff800080a07b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 28.834630] >ffff800080a07c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 28.834672] ^ [ 28.834707] ffff800080a07c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 [ 28.834918] ffff800080a07d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 28.834960] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 28.814688] ================================================================== [ 28.814745] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 28.814955] Read of size 1 at addr ffff9ec8b38c668d by task kunit_try_catch/257 [ 28.815006] [ 28.815042] CPU: 0 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 28.815123] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.815280] Hardware name: linux,dummy-virt (DT) [ 28.815322] Call trace: [ 28.815408] show_stack+0x20/0x38 (C) [ 28.815487] dump_stack_lvl+0x8c/0xd0 [ 28.815537] print_report+0x310/0x608 [ 28.815831] kasan_report+0xdc/0x128 [ 28.815928] __asan_report_load1_noabort+0x20/0x30 [ 28.816077] kasan_global_oob_right+0x230/0x270 [ 28.816158] kunit_try_run_case+0x170/0x3f0 [ 28.816210] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.816265] kthread+0x328/0x630 [ 28.816308] ret_from_fork+0x10/0x20 [ 28.816369] [ 28.816840] The buggy address belongs to the variable: [ 28.816880] global_array+0xd/0x40 [ 28.816938] [ 28.817013] The buggy address belongs to the virtual mapping at [ 28.817013] [ffff9ec8b1a60000, ffff9ec8b3981000) created by: [ 28.817013] paging_init+0x66c/0x7d0 [ 28.817262] [ 28.817637] The buggy address belongs to the physical page: [ 28.817724] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47cc6 [ 28.817839] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 28.817938] raw: 03fffe0000002000 ffffc1ffc01f3188 ffffc1ffc01f3188 0000000000000000 [ 28.818122] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 28.818382] page dumped because: kasan: bad access detected [ 28.818496] [ 28.818574] Memory state around the buggy address: [ 28.818676] ffff9ec8b38c6580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.818742] ffff9ec8b38c6600: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9 [ 28.818889] >ffff9ec8b38c6680: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 [ 28.818969] ^ [ 28.819035] ffff9ec8b38c6700: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 [ 28.819129] ffff9ec8b38c6780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.819197] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 28.809079] ================================================================== [ 28.809132] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 28.809188] Free of addr fff00000c79f4001 by task kunit_try_catch/255 [ 28.809367] [ 28.809548] CPU: 0 UID: 0 PID: 255 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 28.809690] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.809767] Hardware name: linux,dummy-virt (DT) [ 28.809799] Call trace: [ 28.809829] show_stack+0x20/0x38 (C) [ 28.809879] dump_stack_lvl+0x8c/0xd0 [ 28.809926] print_report+0x118/0x608 [ 28.809970] kasan_report_invalid_free+0xc0/0xe8 [ 28.810028] __kasan_mempool_poison_object+0xfc/0x150 [ 28.810080] mempool_free+0x28c/0x328 [ 28.810122] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 28.810173] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 28.810243] kunit_try_run_case+0x170/0x3f0 [ 28.810290] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.810342] kthread+0x328/0x630 [ 28.810387] ret_from_fork+0x10/0x20 [ 28.810443] [ 28.810462] The buggy address belongs to the physical page: [ 28.810493] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f4 [ 28.810544] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 28.810590] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 28.810641] page_type: f8(unknown) [ 28.810679] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.810726] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 28.810774] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.810820] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 28.810868] head: 0bfffe0000000002 ffffc1ffc31e7d01 00000000ffffffff 00000000ffffffff [ 28.810914] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 28.810954] page dumped because: kasan: bad access detected [ 28.810983] [ 28.811008] Memory state around the buggy address: [ 28.811039] fff00000c79f3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.811082] fff00000c79f3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.811131] >fff00000c79f4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.811175] ^ [ 28.811202] fff00000c79f4080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.811246] fff00000c79f4100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.811292] ================================================================== [ 28.794087] ================================================================== [ 28.794146] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 28.794203] Free of addr fff00000c786a801 by task kunit_try_catch/253 [ 28.794245] [ 28.794717] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 28.795277] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.795447] Hardware name: linux,dummy-virt (DT) [ 28.795606] Call trace: [ 28.795628] show_stack+0x20/0x38 (C) [ 28.795682] dump_stack_lvl+0x8c/0xd0 [ 28.796074] print_report+0x118/0x608 [ 28.796706] kasan_report_invalid_free+0xc0/0xe8 [ 28.797173] check_slab_allocation+0xfc/0x108 [ 28.797623] __kasan_mempool_poison_object+0x78/0x150 [ 28.797687] mempool_free+0x28c/0x328 [ 28.797736] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 28.797792] mempool_kmalloc_invalid_free+0xc0/0x118 [ 28.797844] kunit_try_run_case+0x170/0x3f0 [ 28.797891] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.797945] kthread+0x328/0x630 [ 28.799670] ret_from_fork+0x10/0x20 [ 28.799734] [ 28.799753] Allocated by task 253: [ 28.799791] kasan_save_stack+0x3c/0x68 [ 28.799833] kasan_save_track+0x20/0x40 [ 28.799878] kasan_save_alloc_info+0x40/0x58 [ 28.799914] __kasan_mempool_unpoison_object+0x11c/0x180 [ 28.800836] remove_element+0x130/0x1f8 [ 28.800888] mempool_alloc_preallocated+0x58/0xc0 [ 28.800929] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 28.800974] mempool_kmalloc_invalid_free+0xc0/0x118 [ 28.801014] kunit_try_run_case+0x170/0x3f0 [ 28.801053] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.801096] kthread+0x328/0x630 [ 28.801127] ret_from_fork+0x10/0x20 [ 28.801161] [ 28.801183] The buggy address belongs to the object at fff00000c786a800 [ 28.801183] which belongs to the cache kmalloc-128 of size 128 [ 28.803412] The buggy address is located 1 bytes inside of [ 28.803412] 128-byte region [fff00000c786a800, fff00000c786a880) [ 28.803482] [ 28.803501] The buggy address belongs to the physical page: [ 28.803533] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10786a [ 28.803584] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.803633] page_type: f5(slab) [ 28.803670] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 28.803719] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 28.803759] page dumped because: kasan: bad access detected [ 28.803788] [ 28.803807] Memory state around the buggy address: [ 28.803836] fff00000c786a700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.803889] fff00000c786a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.803932] >fff00000c786a800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.803968] ^ [ 28.803996] fff00000c786a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.804038] fff00000c786a900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.804076] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 28.753371] ================================================================== [ 28.753458] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 28.753528] Free of addr fff00000c79f0000 by task kunit_try_catch/249 [ 28.753610] [ 28.753647] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 28.753733] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.753758] Hardware name: linux,dummy-virt (DT) [ 28.753791] Call trace: [ 28.753813] show_stack+0x20/0x38 (C) [ 28.753864] dump_stack_lvl+0x8c/0xd0 [ 28.753910] print_report+0x118/0x608 [ 28.753957] kasan_report_invalid_free+0xc0/0xe8 [ 28.754009] __kasan_mempool_poison_object+0x14c/0x150 [ 28.755332] mempool_free+0x28c/0x328 [ 28.755545] mempool_double_free_helper+0x150/0x2e8 [ 28.755708] mempool_kmalloc_large_double_free+0xc0/0x118 [ 28.756213] kunit_try_run_case+0x170/0x3f0 [ 28.756293] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.756660] kthread+0x328/0x630 [ 28.756713] ret_from_fork+0x10/0x20 [ 28.757318] [ 28.757346] The buggy address belongs to the physical page: [ 28.757492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f0 [ 28.757876] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 28.758160] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 28.758249] page_type: f8(unknown) [ 28.758591] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.758930] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 28.759185] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.759261] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 28.759620] head: 0bfffe0000000002 ffffc1ffc31e7c01 00000000ffffffff 00000000ffffffff [ 28.759909] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 28.759954] page dumped because: kasan: bad access detected [ 28.759986] [ 28.760529] Memory state around the buggy address: [ 28.760576] fff00000c79eff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.760875] fff00000c79eff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.761087] >fff00000c79f0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.761170] ^ [ 28.761326] fff00000c79f0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.761423] fff00000c79f0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.761463] ================================================================== [ 28.776641] ================================================================== [ 28.778139] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 28.778444] Free of addr fff00000c79f4000 by task kunit_try_catch/251 [ 28.778488] [ 28.778526] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 28.778610] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.778637] Hardware name: linux,dummy-virt (DT) [ 28.778987] Call trace: [ 28.779013] show_stack+0x20/0x38 (C) [ 28.779088] dump_stack_lvl+0x8c/0xd0 [ 28.779356] print_report+0x118/0x608 [ 28.779417] kasan_report_invalid_free+0xc0/0xe8 [ 28.779465] __kasan_mempool_poison_pages+0xe0/0xe8 [ 28.779518] mempool_free+0x24c/0x328 [ 28.779564] mempool_double_free_helper+0x150/0x2e8 [ 28.779615] mempool_page_alloc_double_free+0xbc/0x118 [ 28.780279] kunit_try_run_case+0x170/0x3f0 [ 28.780484] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.780596] kthread+0x328/0x630 [ 28.780828] ret_from_fork+0x10/0x20 [ 28.781010] [ 28.781036] The buggy address belongs to the physical page: [ 28.781067] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f4 [ 28.781365] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.781443] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 28.781493] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 28.781534] page dumped because: kasan: bad access detected [ 28.781564] [ 28.781585] Memory state around the buggy address: [ 28.782109] fff00000c79f3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.782190] fff00000c79f3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.782234] >fff00000c79f4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.782389] ^ [ 28.782488] fff00000c79f4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.782642] fff00000c79f4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.782853] ================================================================== [ 28.722931] ================================================================== [ 28.722996] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 28.723053] Free of addr fff00000c786a400 by task kunit_try_catch/247 [ 28.723094] [ 28.723126] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 28.723460] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.723552] Hardware name: linux,dummy-virt (DT) [ 28.723583] Call trace: [ 28.723606] show_stack+0x20/0x38 (C) [ 28.723910] dump_stack_lvl+0x8c/0xd0 [ 28.724134] print_report+0x118/0x608 [ 28.724241] kasan_report_invalid_free+0xc0/0xe8 [ 28.724295] check_slab_allocation+0xd4/0x108 [ 28.724343] __kasan_mempool_poison_object+0x78/0x150 [ 28.724407] mempool_free+0x28c/0x328 [ 28.724798] mempool_double_free_helper+0x150/0x2e8 [ 28.724915] mempool_kmalloc_double_free+0xc0/0x118 [ 28.725386] kunit_try_run_case+0x170/0x3f0 [ 28.725597] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.726095] kthread+0x328/0x630 [ 28.726720] ret_from_fork+0x10/0x20 [ 28.727044] [ 28.727123] Allocated by task 247: [ 28.727425] kasan_save_stack+0x3c/0x68 [ 28.727472] kasan_save_track+0x20/0x40 [ 28.727937] kasan_save_alloc_info+0x40/0x58 [ 28.727986] __kasan_mempool_unpoison_object+0x11c/0x180 [ 28.728352] remove_element+0x130/0x1f8 [ 28.728428] mempool_alloc_preallocated+0x58/0xc0 [ 28.728467] mempool_double_free_helper+0x94/0x2e8 [ 28.728659] mempool_kmalloc_double_free+0xc0/0x118 [ 28.728886] kunit_try_run_case+0x170/0x3f0 [ 28.728923] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.728967] kthread+0x328/0x630 [ 28.728998] ret_from_fork+0x10/0x20 [ 28.729034] [ 28.729053] Freed by task 247: [ 28.729079] kasan_save_stack+0x3c/0x68 [ 28.729121] kasan_save_track+0x20/0x40 [ 28.729951] kasan_save_free_info+0x4c/0x78 [ 28.730000] __kasan_mempool_poison_object+0xc0/0x150 [ 28.730041] mempool_free+0x28c/0x328 [ 28.730746] mempool_double_free_helper+0x100/0x2e8 [ 28.730908] mempool_kmalloc_double_free+0xc0/0x118 [ 28.731046] kunit_try_run_case+0x170/0x3f0 [ 28.731082] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.731127] kthread+0x328/0x630 [ 28.731511] ret_from_fork+0x10/0x20 [ 28.731548] [ 28.732052] The buggy address belongs to the object at fff00000c786a400 [ 28.732052] which belongs to the cache kmalloc-128 of size 128 [ 28.732129] The buggy address is located 0 bytes inside of [ 28.732129] 128-byte region [fff00000c786a400, fff00000c786a480) [ 28.732638] [ 28.732664] The buggy address belongs to the physical page: [ 28.732699] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10786a [ 28.732991] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.733047] page_type: f5(slab) [ 28.733088] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 28.733452] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 28.733690] page dumped because: kasan: bad access detected [ 28.733869] [ 28.733923] Memory state around the buggy address: [ 28.734130] fff00000c786a300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.734283] fff00000c786a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.734468] >fff00000c786a400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.734782] ^ [ 28.734835] fff00000c786a480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.735187] fff00000c786a500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.735230] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 28.707995] ================================================================== [ 28.708223] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 28.708489] Read of size 1 at addr fff00000c79f0000 by task kunit_try_catch/245 [ 28.708540] [ 28.708677] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 28.708764] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.708792] Hardware name: linux,dummy-virt (DT) [ 28.708825] Call trace: [ 28.708851] show_stack+0x20/0x38 (C) [ 28.708902] dump_stack_lvl+0x8c/0xd0 [ 28.708990] print_report+0x118/0x608 [ 28.709120] kasan_report+0xdc/0x128 [ 28.709170] __asan_report_load1_noabort+0x20/0x30 [ 28.709217] mempool_uaf_helper+0x314/0x340 [ 28.709265] mempool_page_alloc_uaf+0xc0/0x118 [ 28.709634] kunit_try_run_case+0x170/0x3f0 [ 28.709872] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.709983] kthread+0x328/0x630 [ 28.710045] ret_from_fork+0x10/0x20 [ 28.710093] [ 28.710117] The buggy address belongs to the physical page: [ 28.710151] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f0 [ 28.710215] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.710340] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 28.710726] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 28.710966] page dumped because: kasan: bad access detected [ 28.710999] [ 28.711019] Memory state around the buggy address: [ 28.711201] fff00000c79eff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.711248] fff00000c79eff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.711290] >fff00000c79f0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.711327] ^ [ 28.711354] fff00000c79f0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.711406] fff00000c79f0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.711444] ================================================================== [ 28.667507] ================================================================== [ 28.667569] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 28.667708] Read of size 1 at addr fff00000c79f0000 by task kunit_try_catch/241 [ 28.667898] [ 28.668062] CPU: 0 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 28.668332] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.668359] Hardware name: linux,dummy-virt (DT) [ 28.668418] Call trace: [ 28.668441] show_stack+0x20/0x38 (C) [ 28.668490] dump_stack_lvl+0x8c/0xd0 [ 28.668537] print_report+0x118/0x608 [ 28.668583] kasan_report+0xdc/0x128 [ 28.668627] __asan_report_load1_noabort+0x20/0x30 [ 28.668674] mempool_uaf_helper+0x314/0x340 [ 28.668720] mempool_kmalloc_large_uaf+0xc4/0x120 [ 28.668768] kunit_try_run_case+0x170/0x3f0 [ 28.668817] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.668923] kthread+0x328/0x630 [ 28.669155] ret_from_fork+0x10/0x20 [ 28.669388] [ 28.669423] The buggy address belongs to the physical page: [ 28.669494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079f0 [ 28.669621] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 28.669754] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 28.669847] page_type: f8(unknown) [ 28.669886] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.669940] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 28.670068] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.670266] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 28.670429] head: 0bfffe0000000002 ffffc1ffc31e7c01 00000000ffffffff 00000000ffffffff [ 28.670476] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 28.670517] page dumped because: kasan: bad access detected [ 28.670549] [ 28.670566] Memory state around the buggy address: [ 28.670600] fff00000c79eff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.670642] fff00000c79eff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.670684] >fff00000c79f0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.670721] ^ [ 28.670750] fff00000c79f0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.670791] fff00000c79f0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.670829] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 28.678545] ================================================================== [ 28.678616] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 28.678671] Read of size 1 at addr fff00000c7868240 by task kunit_try_catch/243 [ 28.678720] [ 28.678751] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 28.678835] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.678860] Hardware name: linux,dummy-virt (DT) [ 28.678891] Call trace: [ 28.678911] show_stack+0x20/0x38 (C) [ 28.678959] dump_stack_lvl+0x8c/0xd0 [ 28.679005] print_report+0x118/0x608 [ 28.679050] kasan_report+0xdc/0x128 [ 28.679096] __asan_report_load1_noabort+0x20/0x30 [ 28.679144] mempool_uaf_helper+0x314/0x340 [ 28.679189] mempool_slab_uaf+0xc0/0x118 [ 28.679232] kunit_try_run_case+0x170/0x3f0 [ 28.679279] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.679331] kthread+0x328/0x630 [ 28.679370] ret_from_fork+0x10/0x20 [ 28.679500] [ 28.679617] Allocated by task 243: [ 28.679663] kasan_save_stack+0x3c/0x68 [ 28.679705] kasan_save_track+0x20/0x40 [ 28.679761] kasan_save_alloc_info+0x40/0x58 [ 28.679798] __kasan_mempool_unpoison_object+0xbc/0x180 [ 28.679842] remove_element+0x16c/0x1f8 [ 28.679908] mempool_alloc_preallocated+0x58/0xc0 [ 28.680017] mempool_uaf_helper+0xa4/0x340 [ 28.680055] mempool_slab_uaf+0xc0/0x118 [ 28.680092] kunit_try_run_case+0x170/0x3f0 [ 28.680167] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.680211] kthread+0x328/0x630 [ 28.680243] ret_from_fork+0x10/0x20 [ 28.680279] [ 28.680299] Freed by task 243: [ 28.680349] kasan_save_stack+0x3c/0x68 [ 28.680388] kasan_save_track+0x20/0x40 [ 28.680576] kasan_save_free_info+0x4c/0x78 [ 28.680751] __kasan_mempool_poison_object+0xc0/0x150 [ 28.680794] mempool_free+0x28c/0x328 [ 28.680827] mempool_uaf_helper+0x104/0x340 [ 28.680863] mempool_slab_uaf+0xc0/0x118 [ 28.680901] kunit_try_run_case+0x170/0x3f0 [ 28.680985] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.681167] kthread+0x328/0x630 [ 28.681200] ret_from_fork+0x10/0x20 [ 28.681356] [ 28.682052] The buggy address belongs to the object at fff00000c7868240 [ 28.682052] which belongs to the cache test_cache of size 123 [ 28.682390] The buggy address is located 0 bytes inside of [ 28.682390] freed 123-byte region [fff00000c7868240, fff00000c78682bb) [ 28.682518] [ 28.682580] The buggy address belongs to the physical page: [ 28.682613] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107868 [ 28.682713] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.682759] page_type: f5(slab) [ 28.682911] raw: 0bfffe0000000000 fff00000c790a3c0 dead000000000122 0000000000000000 [ 28.683072] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 28.683116] page dumped because: kasan: bad access detected [ 28.683149] [ 28.683166] Memory state around the buggy address: [ 28.683198] fff00000c7868100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.683356] fff00000c7868180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.683577] >fff00000c7868200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 28.683648] ^ [ 28.683724] fff00000c7868280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.683768] fff00000c7868300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.683942] ================================================================== [ 28.657220] ================================================================== [ 28.657342] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 28.657422] Read of size 1 at addr fff00000c786a000 by task kunit_try_catch/239 [ 28.657499] [ 28.657538] CPU: 0 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 28.657637] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.657719] Hardware name: linux,dummy-virt (DT) [ 28.657853] Call trace: [ 28.657887] show_stack+0x20/0x38 (C) [ 28.658025] dump_stack_lvl+0x8c/0xd0 [ 28.658171] print_report+0x118/0x608 [ 28.658217] kasan_report+0xdc/0x128 [ 28.658262] __asan_report_load1_noabort+0x20/0x30 [ 28.658313] mempool_uaf_helper+0x314/0x340 [ 28.658359] mempool_kmalloc_uaf+0xc4/0x120 [ 28.658414] kunit_try_run_case+0x170/0x3f0 [ 28.658464] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.658517] kthread+0x328/0x630 [ 28.658559] ret_from_fork+0x10/0x20 [ 28.658670] [ 28.658689] Allocated by task 239: [ 28.658717] kasan_save_stack+0x3c/0x68 [ 28.658763] kasan_save_track+0x20/0x40 [ 28.658927] kasan_save_alloc_info+0x40/0x58 [ 28.658963] __kasan_mempool_unpoison_object+0x11c/0x180 [ 28.659110] remove_element+0x130/0x1f8 [ 28.659155] mempool_alloc_preallocated+0x58/0xc0 [ 28.659320] mempool_uaf_helper+0xa4/0x340 [ 28.659356] mempool_kmalloc_uaf+0xc4/0x120 [ 28.659403] kunit_try_run_case+0x170/0x3f0 [ 28.659440] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.659484] kthread+0x328/0x630 [ 28.659539] ret_from_fork+0x10/0x20 [ 28.659592] [ 28.659612] Freed by task 239: [ 28.659638] kasan_save_stack+0x3c/0x68 [ 28.659675] kasan_save_track+0x20/0x40 [ 28.659713] kasan_save_free_info+0x4c/0x78 [ 28.659747] __kasan_mempool_poison_object+0xc0/0x150 [ 28.659790] mempool_free+0x28c/0x328 [ 28.659853] mempool_uaf_helper+0x104/0x340 [ 28.660050] mempool_kmalloc_uaf+0xc4/0x120 [ 28.660089] kunit_try_run_case+0x170/0x3f0 [ 28.660125] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.660192] kthread+0x328/0x630 [ 28.660223] ret_from_fork+0x10/0x20 [ 28.660259] [ 28.660302] The buggy address belongs to the object at fff00000c786a000 [ 28.660302] which belongs to the cache kmalloc-128 of size 128 [ 28.660364] The buggy address is located 0 bytes inside of [ 28.660364] freed 128-byte region [fff00000c786a000, fff00000c786a080) [ 28.660434] [ 28.660456] The buggy address belongs to the physical page: [ 28.660490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10786a [ 28.660621] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.660807] page_type: f5(slab) [ 28.660996] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 28.661073] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 28.661113] page dumped because: kasan: bad access detected [ 28.661144] [ 28.661162] Memory state around the buggy address: [ 28.661203] fff00000c7869f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.661303] fff00000c7869f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.661500] >fff00000c786a000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.661540] ^ [ 28.661568] fff00000c786a080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.661612] fff00000c786a100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.661650] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 28.610964] ================================================================== [ 28.611081] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 28.611141] Read of size 1 at addr fff00000c79ee001 by task kunit_try_catch/235 [ 28.611703] [ 28.611797] CPU: 0 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 28.612108] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.612154] Hardware name: linux,dummy-virt (DT) [ 28.612227] Call trace: [ 28.612335] show_stack+0x20/0x38 (C) [ 28.612526] dump_stack_lvl+0x8c/0xd0 [ 28.612681] print_report+0x118/0x608 [ 28.612862] kasan_report+0xdc/0x128 [ 28.612951] __asan_report_load1_noabort+0x20/0x30 [ 28.613184] mempool_oob_right_helper+0x2ac/0x2f0 [ 28.613239] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 28.613321] kunit_try_run_case+0x170/0x3f0 [ 28.614238] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.614323] kthread+0x328/0x630 [ 28.614504] ret_from_fork+0x10/0x20 [ 28.614779] [ 28.614905] The buggy address belongs to the physical page: [ 28.614941] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1079ec [ 28.615035] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 28.615081] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 28.615487] page_type: f8(unknown) [ 28.615530] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.615752] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 28.615916] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.616018] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 28.616068] head: 0bfffe0000000002 ffffc1ffc31e7b01 00000000ffffffff 00000000ffffffff [ 28.616179] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 28.616243] page dumped because: kasan: bad access detected [ 28.616275] [ 28.616294] Memory state around the buggy address: [ 28.616329] fff00000c79edf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.616671] fff00000c79edf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.616822] >fff00000c79ee000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 28.616868] ^ [ 28.616898] fff00000c79ee080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 28.616940] fff00000c79ee100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 28.616978] ================================================================== [ 28.627370] ================================================================== [ 28.627457] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 28.627743] Read of size 1 at addr fff00000c786a2bb by task kunit_try_catch/237 [ 28.627920] [ 28.627954] CPU: 0 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 28.628326] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.628488] Hardware name: linux,dummy-virt (DT) [ 28.628585] Call trace: [ 28.628610] show_stack+0x20/0x38 (C) [ 28.628662] dump_stack_lvl+0x8c/0xd0 [ 28.628709] print_report+0x118/0x608 [ 28.628766] kasan_report+0xdc/0x128 [ 28.628927] __asan_report_load1_noabort+0x20/0x30 [ 28.628989] mempool_oob_right_helper+0x2ac/0x2f0 [ 28.629038] mempool_slab_oob_right+0xc0/0x118 [ 28.629107] kunit_try_run_case+0x170/0x3f0 [ 28.629314] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.629431] kthread+0x328/0x630 [ 28.629607] ret_from_fork+0x10/0x20 [ 28.629662] [ 28.629680] Allocated by task 237: [ 28.629870] kasan_save_stack+0x3c/0x68 [ 28.629917] kasan_save_track+0x20/0x40 [ 28.629954] kasan_save_alloc_info+0x40/0x58 [ 28.629994] __kasan_mempool_unpoison_object+0xbc/0x180 [ 28.630258] remove_element+0x16c/0x1f8 [ 28.630325] mempool_alloc_preallocated+0x58/0xc0 [ 28.630383] mempool_oob_right_helper+0x98/0x2f0 [ 28.630462] mempool_slab_oob_right+0xc0/0x118 [ 28.630500] kunit_try_run_case+0x170/0x3f0 [ 28.630538] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.630582] kthread+0x328/0x630 [ 28.630679] ret_from_fork+0x10/0x20 [ 28.630716] [ 28.630771] The buggy address belongs to the object at fff00000c786a240 [ 28.630771] which belongs to the cache test_cache of size 123 [ 28.630916] The buggy address is located 0 bytes to the right of [ 28.630916] allocated 123-byte region [fff00000c786a240, fff00000c786a2bb) [ 28.630980] [ 28.631000] The buggy address belongs to the physical page: [ 28.631077] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10786a [ 28.631143] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.631374] page_type: f5(slab) [ 28.631510] raw: 0bfffe0000000000 fff00000c790a280 dead000000000122 0000000000000000 [ 28.631594] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 28.631633] page dumped because: kasan: bad access detected [ 28.631664] [ 28.631682] Memory state around the buggy address: [ 28.631741] fff00000c786a180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.631791] fff00000c786a200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 28.631933] >fff00000c786a280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 28.631971] ^ [ 28.632006] fff00000c786a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.632607] fff00000c786a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.632655] ================================================================== [ 28.601929] ================================================================== [ 28.602010] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 28.602086] Read of size 1 at addr fff00000c5906c73 by task kunit_try_catch/233 [ 28.602134] [ 28.602178] CPU: 0 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 28.602265] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.602301] Hardware name: linux,dummy-virt (DT) [ 28.602333] Call trace: [ 28.602357] show_stack+0x20/0x38 (C) [ 28.602423] dump_stack_lvl+0x8c/0xd0 [ 28.602473] print_report+0x118/0x608 [ 28.602524] kasan_report+0xdc/0x128 [ 28.602570] __asan_report_load1_noabort+0x20/0x30 [ 28.602617] mempool_oob_right_helper+0x2ac/0x2f0 [ 28.602668] mempool_kmalloc_oob_right+0xc4/0x120 [ 28.602718] kunit_try_run_case+0x170/0x3f0 [ 28.602767] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.602819] kthread+0x328/0x630 [ 28.602863] ret_from_fork+0x10/0x20 [ 28.602913] [ 28.602932] Allocated by task 233: [ 28.602962] kasan_save_stack+0x3c/0x68 [ 28.603001] kasan_save_track+0x20/0x40 [ 28.603040] kasan_save_alloc_info+0x40/0x58 [ 28.603075] __kasan_mempool_unpoison_object+0x11c/0x180 [ 28.603119] remove_element+0x130/0x1f8 [ 28.603155] mempool_alloc_preallocated+0x58/0xc0 [ 28.603195] mempool_oob_right_helper+0x98/0x2f0 [ 28.603235] mempool_kmalloc_oob_right+0xc4/0x120 [ 28.603275] kunit_try_run_case+0x170/0x3f0 [ 28.603311] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.603355] kthread+0x328/0x630 [ 28.603386] ret_from_fork+0x10/0x20 [ 28.603433] [ 28.603453] The buggy address belongs to the object at fff00000c5906c00 [ 28.603453] which belongs to the cache kmalloc-128 of size 128 [ 28.603512] The buggy address is located 0 bytes to the right of [ 28.603512] allocated 115-byte region [fff00000c5906c00, fff00000c5906c73) [ 28.603575] [ 28.603597] The buggy address belongs to the physical page: [ 28.603633] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105906 [ 28.603689] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.603742] page_type: f5(slab) [ 28.603783] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 28.603833] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 28.603899] page dumped because: kasan: bad access detected [ 28.603932] [ 28.603950] Memory state around the buggy address: [ 28.603985] fff00000c5906b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.604028] fff00000c5906b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.604070] >fff00000c5906c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 28.604109] ^ [ 28.604149] fff00000c5906c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.604191] fff00000c5906d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 28.604229] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 28.046805] ================================================================== [ 28.046891] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300 [ 28.046965] Read of size 1 at addr fff00000c3ef9dc0 by task kunit_try_catch/227 [ 28.047017] [ 28.047060] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 28.047147] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.047174] Hardware name: linux,dummy-virt (DT) [ 28.047206] Call trace: [ 28.047233] show_stack+0x20/0x38 (C) [ 28.047285] dump_stack_lvl+0x8c/0xd0 [ 28.047337] print_report+0x118/0x608 [ 28.047407] kasan_report+0xdc/0x128 [ 28.047455] __kasan_check_byte+0x54/0x70 [ 28.047502] kmem_cache_destroy+0x34/0x218 [ 28.047549] kmem_cache_double_destroy+0x174/0x300 [ 28.047599] kunit_try_run_case+0x170/0x3f0 [ 28.047648] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.047700] kthread+0x328/0x630 [ 28.047742] ret_from_fork+0x10/0x20 [ 28.047791] [ 28.047810] Allocated by task 227: [ 28.047839] kasan_save_stack+0x3c/0x68 [ 28.047911] kasan_save_track+0x20/0x40 [ 28.047950] kasan_save_alloc_info+0x40/0x58 [ 28.047988] __kasan_slab_alloc+0xa8/0xb0 [ 28.048026] kmem_cache_alloc_noprof+0x10c/0x398 [ 28.048067] __kmem_cache_create_args+0x178/0x280 [ 28.048107] kmem_cache_double_destroy+0xc0/0x300 [ 28.048147] kunit_try_run_case+0x170/0x3f0 [ 28.048184] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.048228] kthread+0x328/0x630 [ 28.048259] ret_from_fork+0x10/0x20 [ 28.048298] [ 28.048316] Freed by task 227: [ 28.048344] kasan_save_stack+0x3c/0x68 [ 28.048383] kasan_save_track+0x20/0x40 [ 28.048431] kasan_save_free_info+0x4c/0x78 [ 28.048466] __kasan_slab_free+0x6c/0x98 [ 28.048504] kmem_cache_free+0x260/0x468 [ 28.048540] slab_kmem_cache_release+0x38/0x50 [ 28.048580] kmem_cache_release+0x1c/0x30 [ 28.048615] kobject_put+0x17c/0x420 [ 28.048653] sysfs_slab_release+0x1c/0x30 [ 28.048690] kmem_cache_destroy+0x118/0x218 [ 28.048730] kmem_cache_double_destroy+0x128/0x300 [ 28.048768] kunit_try_run_case+0x170/0x3f0 [ 28.048804] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.048848] kthread+0x328/0x630 [ 28.048881] ret_from_fork+0x10/0x20 [ 28.048917] [ 28.048936] The buggy address belongs to the object at fff00000c3ef9dc0 [ 28.048936] which belongs to the cache kmem_cache of size 208 [ 28.048995] The buggy address is located 0 bytes inside of [ 28.048995] freed 208-byte region [fff00000c3ef9dc0, fff00000c3ef9e90) [ 28.049055] [ 28.049078] The buggy address belongs to the physical page: [ 28.049114] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103ef9 [ 28.049168] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.049222] page_type: f5(slab) [ 28.049264] raw: 0bfffe0000000000 fff00000c0001000 dead000000000100 dead000000000122 [ 28.049314] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000 [ 28.049355] page dumped because: kasan: bad access detected [ 28.049386] [ 28.049415] Memory state around the buggy address: [ 28.049448] fff00000c3ef9c80: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.049491] fff00000c3ef9d00: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 28.049534] >fff00000c3ef9d80: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 28.049573] ^ [ 28.049606] fff00000c3ef9e00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.049647] fff00000c3ef9e80: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.049683] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 27.968410] ================================================================== [ 27.968505] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468 [ 27.968585] Read of size 1 at addr fff00000c78ed000 by task kunit_try_catch/225 [ 27.968637] [ 27.968678] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 27.968763] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.968790] Hardware name: linux,dummy-virt (DT) [ 27.968824] Call trace: [ 27.968848] show_stack+0x20/0x38 (C) [ 27.968902] dump_stack_lvl+0x8c/0xd0 [ 27.968959] print_report+0x118/0x608 [ 27.969006] kasan_report+0xdc/0x128 [ 27.969052] __asan_report_load1_noabort+0x20/0x30 [ 27.969100] kmem_cache_rcu_uaf+0x388/0x468 [ 27.969146] kunit_try_run_case+0x170/0x3f0 [ 27.969197] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.969251] kthread+0x328/0x630 [ 27.969294] ret_from_fork+0x10/0x20 [ 27.969345] [ 27.969363] Allocated by task 225: [ 27.969392] kasan_save_stack+0x3c/0x68 [ 27.969444] kasan_save_track+0x20/0x40 [ 27.969482] kasan_save_alloc_info+0x40/0x58 [ 27.969518] __kasan_slab_alloc+0xa8/0xb0 [ 27.969556] kmem_cache_alloc_noprof+0x10c/0x398 [ 27.969598] kmem_cache_rcu_uaf+0x12c/0x468 [ 27.969636] kunit_try_run_case+0x170/0x3f0 [ 27.969672] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.969716] kthread+0x328/0x630 [ 27.969746] ret_from_fork+0x10/0x20 [ 27.969784] [ 27.969802] Freed by task 0: [ 27.969829] kasan_save_stack+0x3c/0x68 [ 27.969865] kasan_save_track+0x20/0x40 [ 27.969902] kasan_save_free_info+0x4c/0x78 [ 27.969936] __kasan_slab_free+0x6c/0x98 [ 27.969974] slab_free_after_rcu_debug+0xd4/0x2f8 [ 27.970013] rcu_core+0x9f4/0x1e20 [ 27.970051] rcu_core_si+0x18/0x30 [ 27.970096] handle_softirqs+0x374/0xb28 [ 27.970132] __do_softirq+0x1c/0x28 [ 27.970166] [ 27.970185] Last potentially related work creation: [ 27.970211] kasan_save_stack+0x3c/0x68 [ 27.970248] kasan_record_aux_stack+0xb4/0xc8 [ 27.970285] kmem_cache_free+0x120/0x468 [ 27.970322] kmem_cache_rcu_uaf+0x16c/0x468 [ 27.970358] kunit_try_run_case+0x170/0x3f0 [ 27.970405] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.970447] kthread+0x328/0x630 [ 27.970482] ret_from_fork+0x10/0x20 [ 27.970516] [ 27.970535] The buggy address belongs to the object at fff00000c78ed000 [ 27.970535] which belongs to the cache test_cache of size 200 [ 27.970591] The buggy address is located 0 bytes inside of [ 27.970591] freed 200-byte region [fff00000c78ed000, fff00000c78ed0c8) [ 27.970653] [ 27.970676] The buggy address belongs to the physical page: [ 27.970710] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ed [ 27.970765] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.970818] page_type: f5(slab) [ 27.970859] raw: 0bfffe0000000000 fff00000c790a140 dead000000000122 0000000000000000 [ 27.970909] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 27.970951] page dumped because: kasan: bad access detected [ 27.970984] [ 27.971003] Memory state around the buggy address: [ 27.971036] fff00000c78ecf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.971080] fff00000c78ecf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.971123] >fff00000c78ed000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.971161] ^ [ 27.971188] fff00000c78ed080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 27.971230] fff00000c78ed100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.971269] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 27.572991] ================================================================== [ 27.573063] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 27.573134] Free of addr fff00000c78ef001 by task kunit_try_catch/223 [ 27.573176] [ 27.573216] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 27.573302] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.573330] Hardware name: linux,dummy-virt (DT) [ 27.573363] Call trace: [ 27.573386] show_stack+0x20/0x38 (C) [ 27.573451] dump_stack_lvl+0x8c/0xd0 [ 27.573513] print_report+0x118/0x608 [ 27.573562] kasan_report_invalid_free+0xc0/0xe8 [ 27.573612] check_slab_allocation+0xfc/0x108 [ 27.573672] __kasan_slab_pre_free+0x2c/0x48 [ 27.573722] kmem_cache_free+0xf0/0x468 [ 27.573780] kmem_cache_invalid_free+0x184/0x3c8 [ 27.573829] kunit_try_run_case+0x170/0x3f0 [ 27.573882] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.573937] kthread+0x328/0x630 [ 27.573981] ret_from_fork+0x10/0x20 [ 27.574031] [ 27.574049] Allocated by task 223: [ 27.574084] kasan_save_stack+0x3c/0x68 [ 27.574133] kasan_save_track+0x20/0x40 [ 27.574172] kasan_save_alloc_info+0x40/0x58 [ 27.574218] __kasan_slab_alloc+0xa8/0xb0 [ 27.574265] kmem_cache_alloc_noprof+0x10c/0x398 [ 27.574305] kmem_cache_invalid_free+0x12c/0x3c8 [ 27.574347] kunit_try_run_case+0x170/0x3f0 [ 27.574385] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.575167] kthread+0x328/0x630 [ 27.575222] ret_from_fork+0x10/0x20 [ 27.575456] [ 27.575489] The buggy address belongs to the object at fff00000c78ef000 [ 27.575489] which belongs to the cache test_cache of size 200 [ 27.575559] The buggy address is located 1 bytes inside of [ 27.575559] 200-byte region [fff00000c78ef000, fff00000c78ef0c8) [ 27.575618] [ 27.575927] The buggy address belongs to the physical page: [ 27.576020] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078ef [ 27.576195] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.576344] page_type: f5(slab) [ 27.576595] raw: 0bfffe0000000000 fff00000c790a000 dead000000000122 0000000000000000 [ 27.576698] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 27.576742] page dumped because: kasan: bad access detected [ 27.576972] [ 27.577098] Memory state around the buggy address: [ 27.577154] fff00000c78eef00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 27.577244] fff00000c78eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 27.577382] >fff00000c78ef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.577468] ^ [ 27.577628] fff00000c78ef080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 27.577739] fff00000c78ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.577853] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 27.538025] ================================================================== [ 27.538102] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 27.538178] Free of addr fff00000c790b000 by task kunit_try_catch/221 [ 27.538221] [ 27.538264] CPU: 0 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 27.538352] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.538379] Hardware name: linux,dummy-virt (DT) [ 27.538424] Call trace: [ 27.538449] show_stack+0x20/0x38 (C) [ 27.538503] dump_stack_lvl+0x8c/0xd0 [ 27.538554] print_report+0x118/0x608 [ 27.538601] kasan_report_invalid_free+0xc0/0xe8 [ 27.538694] check_slab_allocation+0xd4/0x108 [ 27.538747] __kasan_slab_pre_free+0x2c/0x48 [ 27.538794] kmem_cache_free+0xf0/0x468 [ 27.538843] kmem_cache_double_free+0x190/0x3c8 [ 27.538889] kunit_try_run_case+0x170/0x3f0 [ 27.538940] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.538993] kthread+0x328/0x630 [ 27.539045] ret_from_fork+0x10/0x20 [ 27.539094] [ 27.539113] Allocated by task 221: [ 27.539154] kasan_save_stack+0x3c/0x68 [ 27.539195] kasan_save_track+0x20/0x40 [ 27.539233] kasan_save_alloc_info+0x40/0x58 [ 27.539284] __kasan_slab_alloc+0xa8/0xb0 [ 27.539338] kmem_cache_alloc_noprof+0x10c/0x398 [ 27.539378] kmem_cache_double_free+0x12c/0x3c8 [ 27.540338] kunit_try_run_case+0x170/0x3f0 [ 27.540383] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.541274] kthread+0x328/0x630 [ 27.541336] ret_from_fork+0x10/0x20 [ 27.541420] [ 27.541469] Freed by task 221: [ 27.541576] kasan_save_stack+0x3c/0x68 [ 27.541662] kasan_save_track+0x20/0x40 [ 27.542064] kasan_save_free_info+0x4c/0x78 [ 27.542134] __kasan_slab_free+0x6c/0x98 [ 27.542227] kmem_cache_free+0x260/0x468 [ 27.542264] kmem_cache_double_free+0x140/0x3c8 [ 27.542334] kunit_try_run_case+0x170/0x3f0 [ 27.542418] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.542500] kthread+0x328/0x630 [ 27.542802] ret_from_fork+0x10/0x20 [ 27.542851] [ 27.542872] The buggy address belongs to the object at fff00000c790b000 [ 27.542872] which belongs to the cache test_cache of size 200 [ 27.543309] The buggy address is located 0 bytes inside of [ 27.543309] 200-byte region [fff00000c790b000, fff00000c790b0c8) [ 27.543438] [ 27.543514] The buggy address belongs to the physical page: [ 27.543581] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10790b [ 27.543689] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.544075] page_type: f5(slab) [ 27.544135] raw: 0bfffe0000000000 fff00000c1b99dc0 dead000000000122 0000000000000000 [ 27.544186] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 27.544227] page dumped because: kasan: bad access detected [ 27.544259] [ 27.544277] Memory state around the buggy address: [ 27.544312] fff00000c790af00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 27.544670] fff00000c790af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 27.544769] >fff00000c790b000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.544850] ^ [ 27.544878] fff00000c790b080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 27.545125] fff00000c790b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.545274] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 27.254693] ================================================================== [ 27.254922] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430 [ 27.254995] Read of size 1 at addr fff00000c78160c8 by task kunit_try_catch/219 [ 27.255045] [ 27.255149] CPU: 1 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 27.255385] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.255421] Hardware name: linux,dummy-virt (DT) [ 27.255454] Call trace: [ 27.255477] show_stack+0x20/0x38 (C) [ 27.255599] dump_stack_lvl+0x8c/0xd0 [ 27.255705] print_report+0x118/0x608 [ 27.255754] kasan_report+0xdc/0x128 [ 27.255829] __asan_report_load1_noabort+0x20/0x30 [ 27.255908] kmem_cache_oob+0x344/0x430 [ 27.255958] kunit_try_run_case+0x170/0x3f0 [ 27.256060] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.256126] kthread+0x328/0x630 [ 27.256170] ret_from_fork+0x10/0x20 [ 27.256234] [ 27.256252] Allocated by task 219: [ 27.256283] kasan_save_stack+0x3c/0x68 [ 27.256325] kasan_save_track+0x20/0x40 [ 27.256364] kasan_save_alloc_info+0x40/0x58 [ 27.256483] __kasan_slab_alloc+0xa8/0xb0 [ 27.256555] kmem_cache_alloc_noprof+0x10c/0x398 [ 27.256633] kmem_cache_oob+0x12c/0x430 [ 27.256717] kunit_try_run_case+0x170/0x3f0 [ 27.256900] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.256943] kthread+0x328/0x630 [ 27.256975] ret_from_fork+0x10/0x20 [ 27.257010] [ 27.257029] The buggy address belongs to the object at fff00000c7816000 [ 27.257029] which belongs to the cache test_cache of size 200 [ 27.257142] The buggy address is located 0 bytes to the right of [ 27.257142] allocated 200-byte region [fff00000c7816000, fff00000c78160c8) [ 27.257493] [ 27.257619] The buggy address belongs to the physical page: [ 27.257705] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107816 [ 27.257789] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.257858] page_type: f5(slab) [ 27.257899] raw: 0bfffe0000000000 fff00000c3ef9c80 dead000000000122 0000000000000000 [ 27.258217] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 27.258540] page dumped because: kasan: bad access detected [ 27.258576] [ 27.258655] Memory state around the buggy address: [ 27.258700] fff00000c7815f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 27.258763] fff00000c7816000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.258807] >fff00000c7816080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 27.258848] ^ [ 27.258885] fff00000c7816100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.259290] fff00000c7816180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.259403] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 27.220860] ================================================================== [ 27.220940] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 27.221008] Read of size 8 at addr fff00000c7894ec0 by task kunit_try_catch/212 [ 27.221059] [ 27.221097] CPU: 1 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 27.221185] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.221212] Hardware name: linux,dummy-virt (DT) [ 27.221245] Call trace: [ 27.221268] show_stack+0x20/0x38 (C) [ 27.221320] dump_stack_lvl+0x8c/0xd0 [ 27.221369] print_report+0x118/0x608 [ 27.221431] kasan_report+0xdc/0x128 [ 27.221491] __asan_report_load8_noabort+0x20/0x30 [ 27.221539] workqueue_uaf+0x480/0x4a8 [ 27.221582] kunit_try_run_case+0x170/0x3f0 [ 27.221631] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.222059] kthread+0x328/0x630 [ 27.222578] ret_from_fork+0x10/0x20 [ 27.222985] [ 27.223232] Allocated by task 212: [ 27.223328] kasan_save_stack+0x3c/0x68 [ 27.223402] kasan_save_track+0x20/0x40 [ 27.223440] kasan_save_alloc_info+0x40/0x58 [ 27.223702] __kasan_kmalloc+0xd4/0xd8 [ 27.223805] __kmalloc_cache_noprof+0x16c/0x3c0 [ 27.224252] workqueue_uaf+0x13c/0x4a8 [ 27.224311] kunit_try_run_case+0x170/0x3f0 [ 27.224348] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.224392] kthread+0x328/0x630 [ 27.224436] ret_from_fork+0x10/0x20 [ 27.224474] [ 27.224495] Freed by task 48: [ 27.224520] kasan_save_stack+0x3c/0x68 [ 27.224557] kasan_save_track+0x20/0x40 [ 27.224595] kasan_save_free_info+0x4c/0x78 [ 27.224630] __kasan_slab_free+0x6c/0x98 [ 27.224707] kfree+0x214/0x3c8 [ 27.224741] workqueue_uaf_work+0x18/0x30 [ 27.224778] process_one_work+0x530/0xf98 [ 27.225090] worker_thread+0x618/0xf38 [ 27.225132] kthread+0x328/0x630 [ 27.225166] ret_from_fork+0x10/0x20 [ 27.225203] [ 27.225225] Last potentially related work creation: [ 27.225253] kasan_save_stack+0x3c/0x68 [ 27.225290] kasan_record_aux_stack+0xb4/0xc8 [ 27.225369] __queue_work+0x65c/0xfe0 [ 27.225829] queue_work_on+0xbc/0xf8 [ 27.225871] workqueue_uaf+0x210/0x4a8 [ 27.225934] kunit_try_run_case+0x170/0x3f0 [ 27.225971] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.226015] kthread+0x328/0x630 [ 27.226047] ret_from_fork+0x10/0x20 [ 27.226086] [ 27.226106] The buggy address belongs to the object at fff00000c7894ec0 [ 27.226106] which belongs to the cache kmalloc-32 of size 32 [ 27.226670] The buggy address is located 0 bytes inside of [ 27.226670] freed 32-byte region [fff00000c7894ec0, fff00000c7894ee0) [ 27.226769] [ 27.226844] The buggy address belongs to the physical page: [ 27.226906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107894 [ 27.226960] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.227011] page_type: f5(slab) [ 27.227060] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 27.227240] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 27.227341] page dumped because: kasan: bad access detected [ 27.227374] [ 27.227392] Memory state around the buggy address: [ 27.227436] fff00000c7894d80: 00 00 00 fc fc fc fc fc 00 00 03 fc fc fc fc fc [ 27.227478] fff00000c7894e00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 27.227725] >fff00000c7894e80: 00 00 00 07 fc fc fc fc fa fb fb fb fc fc fc fc [ 27.227769] ^ [ 27.227805] fff00000c7894f00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.227847] fff00000c7894f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.228104] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[ 27.198597] ================================================================== [ 27.198746] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 27.198818] Read of size 4 at addr fff00000c7894c80 by task swapper/1/0 [ 27.198865] [ 27.198906] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 27.198992] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.199018] Hardware name: linux,dummy-virt (DT) [ 27.199052] Call trace: [ 27.199074] show_stack+0x20/0x38 (C) [ 27.199124] dump_stack_lvl+0x8c/0xd0 [ 27.199172] print_report+0x118/0x608 [ 27.199218] kasan_report+0xdc/0x128 [ 27.199261] __asan_report_load4_noabort+0x20/0x30 [ 27.199308] rcu_uaf_reclaim+0x64/0x70 [ 27.199351] rcu_core+0x9f4/0x1e20 [ 27.199405] rcu_core_si+0x18/0x30 [ 27.199449] handle_softirqs+0x374/0xb28 [ 27.199495] __do_softirq+0x1c/0x28 [ 27.199537] ____do_softirq+0x18/0x30 [ 27.199579] call_on_irq_stack+0x24/0x30 [ 27.199624] do_softirq_own_stack+0x24/0x38 [ 27.199668] __irq_exit_rcu+0x1fc/0x318 [ 27.199711] irq_exit_rcu+0x1c/0x80 [ 27.199754] el1_interrupt+0x38/0x58 [ 27.199800] el1h_64_irq_handler+0x18/0x28 [ 27.199883] el1h_64_irq+0x6c/0x70 [ 27.200570] arch_local_irq_enable+0x4/0x8 (P) [ 27.200664] do_idle+0x384/0x4e8 [ 27.200913] cpu_startup_entry+0x68/0x80 [ 27.201097] secondary_start_kernel+0x288/0x340 [ 27.201208] __secondary_switched+0xc0/0xc8 [ 27.201473] [ 27.201689] Allocated by task 210: [ 27.201771] kasan_save_stack+0x3c/0x68 [ 27.201911] kasan_save_track+0x20/0x40 [ 27.201994] kasan_save_alloc_info+0x40/0x58 [ 27.202091] __kasan_kmalloc+0xd4/0xd8 [ 27.202184] __kmalloc_cache_noprof+0x16c/0x3c0 [ 27.202467] rcu_uaf+0xb0/0x2d8 [ 27.202652] kunit_try_run_case+0x170/0x3f0 [ 27.202744] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.202790] kthread+0x328/0x630 [ 27.203019] ret_from_fork+0x10/0x20 [ 27.203163] [ 27.203239] Freed by task 0: [ 27.203276] kasan_save_stack+0x3c/0x68 [ 27.203327] kasan_save_track+0x20/0x40 [ 27.203363] kasan_save_free_info+0x4c/0x78 [ 27.203412] __kasan_slab_free+0x6c/0x98 [ 27.203460] kfree+0x214/0x3c8 [ 27.203509] rcu_uaf_reclaim+0x28/0x70 [ 27.203546] rcu_core+0x9f4/0x1e20 [ 27.203589] rcu_core_si+0x18/0x30 [ 27.203632] handle_softirqs+0x374/0xb28 [ 27.203673] __do_softirq+0x1c/0x28 [ 27.203713] [ 27.203745] Last potentially related work creation: [ 27.203796] kasan_save_stack+0x3c/0x68 [ 27.203837] kasan_record_aux_stack+0xb4/0xc8 [ 27.203902] __call_rcu_common.constprop.0+0x74/0x8c8 [ 27.203945] call_rcu+0x18/0x30 [ 27.203977] rcu_uaf+0x14c/0x2d8 [ 27.204012] kunit_try_run_case+0x170/0x3f0 [ 27.204185] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.204239] kthread+0x328/0x630 [ 27.204270] ret_from_fork+0x10/0x20 [ 27.204315] [ 27.204345] The buggy address belongs to the object at fff00000c7894c80 [ 27.204345] which belongs to the cache kmalloc-32 of size 32 [ 27.204416] The buggy address is located 0 bytes inside of [ 27.204416] freed 32-byte region [fff00000c7894c80, fff00000c7894ca0) [ 27.204478] [ 27.204848] The buggy address belongs to the physical page: [ 27.204932] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107894 [ 27.205042] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.205095] page_type: f5(slab) [ 27.205160] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 27.205503] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 27.205580] page dumped because: kasan: bad access detected [ 27.205823] [ 27.206013] Memory state around the buggy address: [ 27.206052] fff00000c7894b80: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 27.206405] fff00000c7894c00: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 27.206656] >fff00000c7894c80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 27.206720] ^ [ 27.206750] fff00000c7894d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.206979] fff00000c7894d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.207217] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 26.945044] ================================================================== [ 26.945139] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 26.945206] Read of size 1 at addr fff00000c7895300 by task kunit_try_catch/208 [ 26.945316] [ 26.945358] CPU: 1 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 26.945453] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.945480] Hardware name: linux,dummy-virt (DT) [ 26.945512] Call trace: [ 26.945535] show_stack+0x20/0x38 (C) [ 26.945593] dump_stack_lvl+0x8c/0xd0 [ 26.945643] print_report+0x118/0x608 [ 26.945690] kasan_report+0xdc/0x128 [ 26.945743] __asan_report_load1_noabort+0x20/0x30 [ 26.945791] ksize_uaf+0x598/0x5f8 [ 26.945831] kunit_try_run_case+0x170/0x3f0 [ 26.945878] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.945930] kthread+0x328/0x630 [ 26.945972] ret_from_fork+0x10/0x20 [ 26.946018] [ 26.946037] Allocated by task 208: [ 26.946064] kasan_save_stack+0x3c/0x68 [ 26.946108] kasan_save_track+0x20/0x40 [ 26.946146] kasan_save_alloc_info+0x40/0x58 [ 26.946183] __kasan_kmalloc+0xd4/0xd8 [ 26.946220] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.946260] ksize_uaf+0xb8/0x5f8 [ 26.946294] kunit_try_run_case+0x170/0x3f0 [ 26.946332] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.946376] kthread+0x328/0x630 [ 26.946708] ret_from_fork+0x10/0x20 [ 26.946763] [ 26.947037] Freed by task 208: [ 26.947072] kasan_save_stack+0x3c/0x68 [ 26.947137] kasan_save_track+0x20/0x40 [ 26.947297] kasan_save_free_info+0x4c/0x78 [ 26.947443] __kasan_slab_free+0x6c/0x98 [ 26.947496] kfree+0x214/0x3c8 [ 26.947531] ksize_uaf+0x11c/0x5f8 [ 26.947567] kunit_try_run_case+0x170/0x3f0 [ 26.947742] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.947820] kthread+0x328/0x630 [ 26.947855] ret_from_fork+0x10/0x20 [ 26.948035] [ 26.948057] The buggy address belongs to the object at fff00000c7895300 [ 26.948057] which belongs to the cache kmalloc-128 of size 128 [ 26.948117] The buggy address is located 0 bytes inside of [ 26.948117] freed 128-byte region [fff00000c7895300, fff00000c7895380) [ 26.948543] [ 26.948639] The buggy address belongs to the physical page: [ 26.948708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107895 [ 26.948827] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.948994] page_type: f5(slab) [ 26.949304] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 26.949486] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.949663] page dumped because: kasan: bad access detected [ 26.949772] [ 26.949936] Memory state around the buggy address: [ 26.949987] fff00000c7895200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.950418] fff00000c7895280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.950530] >fff00000c7895300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.950649] ^ [ 26.950795] fff00000c7895380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.951014] fff00000c7895400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.951307] ================================================================== [ 26.952751] ================================================================== [ 26.953063] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 26.953230] Read of size 1 at addr fff00000c7895378 by task kunit_try_catch/208 [ 26.953415] [ 26.953633] CPU: 1 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 26.953846] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.954024] Hardware name: linux,dummy-virt (DT) [ 26.954609] Call trace: [ 26.954723] show_stack+0x20/0x38 (C) [ 26.954985] dump_stack_lvl+0x8c/0xd0 [ 26.955066] print_report+0x118/0x608 [ 26.955433] kasan_report+0xdc/0x128 [ 26.956017] __asan_report_load1_noabort+0x20/0x30 [ 26.956098] ksize_uaf+0x544/0x5f8 [ 26.956233] kunit_try_run_case+0x170/0x3f0 [ 26.956383] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.956519] kthread+0x328/0x630 [ 26.956571] ret_from_fork+0x10/0x20 [ 26.956625] [ 26.956856] Allocated by task 208: [ 26.957187] kasan_save_stack+0x3c/0x68 [ 26.957411] kasan_save_track+0x20/0x40 [ 26.957619] kasan_save_alloc_info+0x40/0x58 [ 26.957764] __kasan_kmalloc+0xd4/0xd8 [ 26.957886] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.958002] ksize_uaf+0xb8/0x5f8 [ 26.958095] kunit_try_run_case+0x170/0x3f0 [ 26.958200] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.958412] kthread+0x328/0x630 [ 26.958519] ret_from_fork+0x10/0x20 [ 26.958666] [ 26.958714] Freed by task 208: [ 26.958778] kasan_save_stack+0x3c/0x68 [ 26.958846] kasan_save_track+0x20/0x40 [ 26.958883] kasan_save_free_info+0x4c/0x78 [ 26.958920] __kasan_slab_free+0x6c/0x98 [ 26.958963] kfree+0x214/0x3c8 [ 26.959016] ksize_uaf+0x11c/0x5f8 [ 26.959060] kunit_try_run_case+0x170/0x3f0 [ 26.959104] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.959149] kthread+0x328/0x630 [ 26.959182] ret_from_fork+0x10/0x20 [ 26.959217] [ 26.959237] The buggy address belongs to the object at fff00000c7895300 [ 26.959237] which belongs to the cache kmalloc-128 of size 128 [ 26.959294] The buggy address is located 120 bytes inside of [ 26.959294] freed 128-byte region [fff00000c7895300, fff00000c7895380) [ 26.959361] [ 26.959382] The buggy address belongs to the physical page: [ 26.959853] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107895 [ 26.959915] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.959962] page_type: f5(slab) [ 26.959998] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 26.960721] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.960929] page dumped because: kasan: bad access detected [ 26.960981] [ 26.961124] Memory state around the buggy address: [ 26.961288] fff00000c7895200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.961557] fff00000c7895280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.961608] >fff00000c7895300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.961771] ^ [ 26.961863] fff00000c7895380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.962044] fff00000c7895400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.962138] ================================================================== [ 26.931716] ================================================================== [ 26.931961] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 26.932197] Read of size 1 at addr fff00000c7895300 by task kunit_try_catch/208 [ 26.932670] [ 26.932774] CPU: 1 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 26.933128] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.933367] Hardware name: linux,dummy-virt (DT) [ 26.933449] Call trace: [ 26.933621] show_stack+0x20/0x38 (C) [ 26.933869] dump_stack_lvl+0x8c/0xd0 [ 26.933955] print_report+0x118/0x608 [ 26.934012] kasan_report+0xdc/0x128 [ 26.934071] __kasan_check_byte+0x54/0x70 [ 26.934120] ksize+0x30/0x88 [ 26.934164] ksize_uaf+0x168/0x5f8 [ 26.934218] kunit_try_run_case+0x170/0x3f0 [ 26.934268] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.934321] kthread+0x328/0x630 [ 26.934373] ret_from_fork+0x10/0x20 [ 26.934448] [ 26.934469] Allocated by task 208: [ 26.934513] kasan_save_stack+0x3c/0x68 [ 26.935152] kasan_save_track+0x20/0x40 [ 26.935229] kasan_save_alloc_info+0x40/0x58 [ 26.935443] __kasan_kmalloc+0xd4/0xd8 [ 26.935599] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.935829] ksize_uaf+0xb8/0x5f8 [ 26.936157] kunit_try_run_case+0x170/0x3f0 [ 26.936381] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.936770] kthread+0x328/0x630 [ 26.936871] ret_from_fork+0x10/0x20 [ 26.936976] [ 26.937066] Freed by task 208: [ 26.937097] kasan_save_stack+0x3c/0x68 [ 26.937391] kasan_save_track+0x20/0x40 [ 26.937688] kasan_save_free_info+0x4c/0x78 [ 26.937843] __kasan_slab_free+0x6c/0x98 [ 26.938006] kfree+0x214/0x3c8 [ 26.938103] ksize_uaf+0x11c/0x5f8 [ 26.938311] kunit_try_run_case+0x170/0x3f0 [ 26.938553] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.938790] kthread+0x328/0x630 [ 26.938959] ret_from_fork+0x10/0x20 [ 26.939058] [ 26.939079] The buggy address belongs to the object at fff00000c7895300 [ 26.939079] which belongs to the cache kmalloc-128 of size 128 [ 26.939326] The buggy address is located 0 bytes inside of [ 26.939326] freed 128-byte region [fff00000c7895300, fff00000c7895380) [ 26.939642] [ 26.939730] The buggy address belongs to the physical page: [ 26.939899] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107895 [ 26.939955] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.940013] page_type: f5(slab) [ 26.940053] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 26.940418] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.940495] page dumped because: kasan: bad access detected [ 26.940673] [ 26.940919] Memory state around the buggy address: [ 26.941107] fff00000c7895200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.941292] fff00000c7895280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.941366] >fff00000c7895300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.941623] ^ [ 26.941823] fff00000c7895380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.941983] fff00000c7895400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.942089] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 26.911648] ================================================================== [ 26.911708] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 26.911761] Read of size 1 at addr fff00000c789527f by task kunit_try_catch/206 [ 26.911836] [ 26.911869] CPU: 1 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 26.912064] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.912153] Hardware name: linux,dummy-virt (DT) [ 26.912335] Call trace: [ 26.912358] show_stack+0x20/0x38 (C) [ 26.912422] dump_stack_lvl+0x8c/0xd0 [ 26.912631] print_report+0x118/0x608 [ 26.912907] kasan_report+0xdc/0x128 [ 26.913012] __asan_report_load1_noabort+0x20/0x30 [ 26.913092] ksize_unpoisons_memory+0x690/0x740 [ 26.913255] kunit_try_run_case+0x170/0x3f0 [ 26.913640] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.913767] kthread+0x328/0x630 [ 26.913873] ret_from_fork+0x10/0x20 [ 26.914046] [ 26.914180] Allocated by task 206: [ 26.914353] kasan_save_stack+0x3c/0x68 [ 26.914640] kasan_save_track+0x20/0x40 [ 26.914715] kasan_save_alloc_info+0x40/0x58 [ 26.914925] __kasan_kmalloc+0xd4/0xd8 [ 26.915052] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.915199] ksize_unpoisons_memory+0xc0/0x740 [ 26.915306] kunit_try_run_case+0x170/0x3f0 [ 26.915359] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.915786] kthread+0x328/0x630 [ 26.915915] ret_from_fork+0x10/0x20 [ 26.916044] [ 26.916125] The buggy address belongs to the object at fff00000c7895200 [ 26.916125] which belongs to the cache kmalloc-128 of size 128 [ 26.916299] The buggy address is located 12 bytes to the right of [ 26.916299] allocated 115-byte region [fff00000c7895200, fff00000c7895273) [ 26.916491] [ 26.916561] The buggy address belongs to the physical page: [ 26.916691] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107895 [ 26.916916] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.917028] page_type: f5(slab) [ 26.917150] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 26.917268] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.917537] page dumped because: kasan: bad access detected [ 26.917669] [ 26.917893] Memory state around the buggy address: [ 26.918101] fff00000c7895100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.918169] fff00000c7895180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.918531] >fff00000c7895200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 26.918603] ^ [ 26.918809] fff00000c7895280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.918886] fff00000c7895300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.919146] ================================================================== [ 26.903871] ================================================================== [ 26.904074] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 26.904369] Read of size 1 at addr fff00000c7895278 by task kunit_try_catch/206 [ 26.904541] [ 26.904656] CPU: 1 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 26.905003] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.905177] Hardware name: linux,dummy-virt (DT) [ 26.905230] Call trace: [ 26.905255] show_stack+0x20/0x38 (C) [ 26.905324] dump_stack_lvl+0x8c/0xd0 [ 26.905385] print_report+0x118/0x608 [ 26.905443] kasan_report+0xdc/0x128 [ 26.905500] __asan_report_load1_noabort+0x20/0x30 [ 26.905549] ksize_unpoisons_memory+0x618/0x740 [ 26.905605] kunit_try_run_case+0x170/0x3f0 [ 26.905655] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.905717] kthread+0x328/0x630 [ 26.905769] ret_from_fork+0x10/0x20 [ 26.905825] [ 26.905844] Allocated by task 206: [ 26.905872] kasan_save_stack+0x3c/0x68 [ 26.905912] kasan_save_track+0x20/0x40 [ 26.905950] kasan_save_alloc_info+0x40/0x58 [ 26.905998] __kasan_kmalloc+0xd4/0xd8 [ 26.906036] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.906076] ksize_unpoisons_memory+0xc0/0x740 [ 26.906121] kunit_try_run_case+0x170/0x3f0 [ 26.906169] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.906234] kthread+0x328/0x630 [ 26.906266] ret_from_fork+0x10/0x20 [ 26.906311] [ 26.906331] The buggy address belongs to the object at fff00000c7895200 [ 26.906331] which belongs to the cache kmalloc-128 of size 128 [ 26.906688] The buggy address is located 5 bytes to the right of [ 26.906688] allocated 115-byte region [fff00000c7895200, fff00000c7895273) [ 26.906939] [ 26.907316] The buggy address belongs to the physical page: [ 26.907354] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107895 [ 26.907678] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.907781] page_type: f5(slab) [ 26.908148] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 26.908304] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.908479] page dumped because: kasan: bad access detected [ 26.908650] [ 26.908780] Memory state around the buggy address: [ 26.909071] fff00000c7895100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.909151] fff00000c7895180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.909331] >fff00000c7895200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 26.909449] ^ [ 26.909516] fff00000c7895280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.909652] fff00000c7895300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.909818] ================================================================== [ 26.891768] ================================================================== [ 26.891833] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 26.892434] Read of size 1 at addr fff00000c7895273 by task kunit_try_catch/206 [ 26.892960] [ 26.893081] CPU: 1 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 26.893538] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.893707] Hardware name: linux,dummy-virt (DT) [ 26.893973] Call trace: [ 26.894047] show_stack+0x20/0x38 (C) [ 26.894256] dump_stack_lvl+0x8c/0xd0 [ 26.894470] print_report+0x118/0x608 [ 26.894835] kasan_report+0xdc/0x128 [ 26.895094] __asan_report_load1_noabort+0x20/0x30 [ 26.895458] ksize_unpoisons_memory+0x628/0x740 [ 26.895570] kunit_try_run_case+0x170/0x3f0 [ 26.895825] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.896094] kthread+0x328/0x630 [ 26.896252] ret_from_fork+0x10/0x20 [ 26.896307] [ 26.896328] Allocated by task 206: [ 26.896359] kasan_save_stack+0x3c/0x68 [ 26.896566] kasan_save_track+0x20/0x40 [ 26.896727] kasan_save_alloc_info+0x40/0x58 [ 26.897188] __kasan_kmalloc+0xd4/0xd8 [ 26.897296] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.897609] ksize_unpoisons_memory+0xc0/0x740 [ 26.897653] kunit_try_run_case+0x170/0x3f0 [ 26.897919] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.898147] kthread+0x328/0x630 [ 26.898218] ret_from_fork+0x10/0x20 [ 26.898536] [ 26.898569] The buggy address belongs to the object at fff00000c7895200 [ 26.898569] which belongs to the cache kmalloc-128 of size 128 [ 26.899051] The buggy address is located 0 bytes to the right of [ 26.899051] allocated 115-byte region [fff00000c7895200, fff00000c7895273) [ 26.899221] [ 26.899622] The buggy address belongs to the physical page: [ 26.899695] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107895 [ 26.899943] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.900206] page_type: f5(slab) [ 26.900251] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 26.900309] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.900353] page dumped because: kasan: bad access detected [ 26.900902] [ 26.900932] Memory state around the buggy address: [ 26.901125] fff00000c7895100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.901270] fff00000c7895180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.901600] >fff00000c7895200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 26.901795] ^ [ 26.901978] fff00000c7895280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.902382] fff00000c7895300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.902534] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
[ 26.865036] ================================================================== [ 26.865107] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 26.865313] Free of addr fff00000c3f9db40 by task kunit_try_catch/204 [ 26.865739] [ 26.865799] CPU: 1 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 26.865886] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.865913] Hardware name: linux,dummy-virt (DT) [ 26.866556] Call trace: [ 26.866611] show_stack+0x20/0x38 (C) [ 26.866664] dump_stack_lvl+0x8c/0xd0 [ 26.866914] print_report+0x118/0x608 [ 26.867064] kasan_report_invalid_free+0xc0/0xe8 [ 26.867433] check_slab_allocation+0xd4/0x108 [ 26.867515] __kasan_slab_pre_free+0x2c/0x48 [ 26.867567] kfree+0xe8/0x3c8 [ 26.867845] kfree_sensitive+0x3c/0xb0 [ 26.867978] kmalloc_double_kzfree+0x168/0x308 [ 26.868046] kunit_try_run_case+0x170/0x3f0 [ 26.868101] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.868598] kthread+0x328/0x630 [ 26.868801] ret_from_fork+0x10/0x20 [ 26.869083] [ 26.869285] Allocated by task 204: [ 26.869384] kasan_save_stack+0x3c/0x68 [ 26.869568] kasan_save_track+0x20/0x40 [ 26.869814] kasan_save_alloc_info+0x40/0x58 [ 26.869914] __kasan_kmalloc+0xd4/0xd8 [ 26.870159] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.870448] kmalloc_double_kzfree+0xb8/0x308 [ 26.870653] kunit_try_run_case+0x170/0x3f0 [ 26.870752] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.871101] kthread+0x328/0x630 [ 26.871383] ret_from_fork+0x10/0x20 [ 26.871525] [ 26.871615] Freed by task 204: [ 26.871671] kasan_save_stack+0x3c/0x68 [ 26.872178] kasan_save_track+0x20/0x40 [ 26.872493] kasan_save_free_info+0x4c/0x78 [ 26.872714] __kasan_slab_free+0x6c/0x98 [ 26.872840] kfree+0x214/0x3c8 [ 26.872986] kfree_sensitive+0x80/0xb0 [ 26.873064] kmalloc_double_kzfree+0x11c/0x308 [ 26.873185] kunit_try_run_case+0x170/0x3f0 [ 26.873405] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.873815] kthread+0x328/0x630 [ 26.874356] ret_from_fork+0x10/0x20 [ 26.874567] [ 26.874682] The buggy address belongs to the object at fff00000c3f9db40 [ 26.874682] which belongs to the cache kmalloc-16 of size 16 [ 26.874844] The buggy address is located 0 bytes inside of [ 26.874844] 16-byte region [fff00000c3f9db40, fff00000c3f9db50) [ 26.875205] [ 26.875352] The buggy address belongs to the physical page: [ 26.875659] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f9d [ 26.875870] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.876128] page_type: f5(slab) [ 26.876362] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 26.876532] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.876840] page dumped because: kasan: bad access detected [ 26.876989] [ 26.877053] Memory state around the buggy address: [ 26.877087] fff00000c3f9da00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.877500] fff00000c3f9da80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.877694] >fff00000c3f9db00: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc [ 26.877819] ^ [ 26.877971] fff00000c3f9db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.878340] fff00000c3f9dc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.878510] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[ 26.855838] ================================================================== [ 26.855911] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 26.855982] Read of size 1 at addr fff00000c3f9db40 by task kunit_try_catch/204 [ 26.856609] [ 26.856735] CPU: 1 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 26.856930] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.857183] Hardware name: linux,dummy-virt (DT) [ 26.857319] Call trace: [ 26.857735] show_stack+0x20/0x38 (C) [ 26.857877] dump_stack_lvl+0x8c/0xd0 [ 26.858082] print_report+0x118/0x608 [ 26.858523] kasan_report+0xdc/0x128 [ 26.858689] __kasan_check_byte+0x54/0x70 [ 26.859075] kfree_sensitive+0x30/0xb0 [ 26.859212] kmalloc_double_kzfree+0x168/0x308 [ 26.859611] kunit_try_run_case+0x170/0x3f0 [ 26.859737] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.859841] kthread+0x328/0x630 [ 26.859889] ret_from_fork+0x10/0x20 [ 26.860299] [ 26.860337] Allocated by task 204: [ 26.860540] kasan_save_stack+0x3c/0x68 [ 26.860639] kasan_save_track+0x20/0x40 [ 26.860768] kasan_save_alloc_info+0x40/0x58 [ 26.860810] __kasan_kmalloc+0xd4/0xd8 [ 26.860849] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.860888] kmalloc_double_kzfree+0xb8/0x308 [ 26.860926] kunit_try_run_case+0x170/0x3f0 [ 26.860993] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.861038] kthread+0x328/0x630 [ 26.861069] ret_from_fork+0x10/0x20 [ 26.861107] [ 26.861126] Freed by task 204: [ 26.861152] kasan_save_stack+0x3c/0x68 [ 26.861191] kasan_save_track+0x20/0x40 [ 26.861228] kasan_save_free_info+0x4c/0x78 [ 26.861272] __kasan_slab_free+0x6c/0x98 [ 26.861320] kfree+0x214/0x3c8 [ 26.861352] kfree_sensitive+0x80/0xb0 [ 26.861389] kmalloc_double_kzfree+0x11c/0x308 [ 26.861441] kunit_try_run_case+0x170/0x3f0 [ 26.861479] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.861526] kthread+0x328/0x630 [ 26.861558] ret_from_fork+0x10/0x20 [ 26.861594] [ 26.861614] The buggy address belongs to the object at fff00000c3f9db40 [ 26.861614] which belongs to the cache kmalloc-16 of size 16 [ 26.861685] The buggy address is located 0 bytes inside of [ 26.861685] freed 16-byte region [fff00000c3f9db40, fff00000c3f9db50) [ 26.861745] [ 26.861779] The buggy address belongs to the physical page: [ 26.861813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f9d [ 26.861874] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.861934] page_type: f5(slab) [ 26.861975] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 26.862034] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.862082] page dumped because: kasan: bad access detected [ 26.862118] [ 26.862136] Memory state around the buggy address: [ 26.862178] fff00000c3f9da00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.862220] fff00000c3f9da80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.862271] >fff00000c3f9db00: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc [ 26.862318] ^ [ 26.862379] fff00000c3f9db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.863338] fff00000c3f9dc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.863442] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[ 26.811743] ================================================================== [ 26.811814] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 26.812051] Read of size 1 at addr fff00000c78b0ea8 by task kunit_try_catch/200 [ 26.813018] [ 26.813062] CPU: 1 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 26.813158] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.813358] Hardware name: linux,dummy-virt (DT) [ 26.813590] Call trace: [ 26.814332] show_stack+0x20/0x38 (C) [ 26.814429] dump_stack_lvl+0x8c/0xd0 [ 26.814746] print_report+0x118/0x608 [ 26.814882] kasan_report+0xdc/0x128 [ 26.815011] __asan_report_load1_noabort+0x20/0x30 [ 26.815596] kmalloc_uaf2+0x3f4/0x468 [ 26.815835] kunit_try_run_case+0x170/0x3f0 [ 26.815956] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.816135] kthread+0x328/0x630 [ 26.816340] ret_from_fork+0x10/0x20 [ 26.816474] [ 26.816494] Allocated by task 200: [ 26.816534] kasan_save_stack+0x3c/0x68 [ 26.816575] kasan_save_track+0x20/0x40 [ 26.816613] kasan_save_alloc_info+0x40/0x58 [ 26.816651] __kasan_kmalloc+0xd4/0xd8 [ 26.816688] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.816729] kmalloc_uaf2+0xc4/0x468 [ 26.816797] kunit_try_run_case+0x170/0x3f0 [ 26.816840] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.816885] kthread+0x328/0x630 [ 26.816917] ret_from_fork+0x10/0x20 [ 26.816963] [ 26.816997] Freed by task 200: [ 26.817031] kasan_save_stack+0x3c/0x68 [ 26.817078] kasan_save_track+0x20/0x40 [ 26.817116] kasan_save_free_info+0x4c/0x78 [ 26.817150] __kasan_slab_free+0x6c/0x98 [ 26.817188] kfree+0x214/0x3c8 [ 26.817219] kmalloc_uaf2+0x134/0x468 [ 26.817264] kunit_try_run_case+0x170/0x3f0 [ 26.817315] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.817359] kthread+0x328/0x630 [ 26.817785] ret_from_fork+0x10/0x20 [ 26.817840] [ 26.817890] The buggy address belongs to the object at fff00000c78b0e80 [ 26.817890] which belongs to the cache kmalloc-64 of size 64 [ 26.818477] The buggy address is located 40 bytes inside of [ 26.818477] freed 64-byte region [fff00000c78b0e80, fff00000c78b0ec0) [ 26.818630] [ 26.818817] The buggy address belongs to the physical page: [ 26.819003] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078b0 [ 26.819287] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.819728] page_type: f5(slab) [ 26.820034] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.820433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.820561] page dumped because: kasan: bad access detected [ 26.820660] [ 26.820679] Memory state around the buggy address: [ 26.820885] fff00000c78b0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.821139] fff00000c78b0e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.821503] >fff00000c78b0e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.821575] ^ [ 26.821719] fff00000c78b0f00: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 26.821767] fff00000c78b0f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.821996] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 26.786144] ================================================================== [ 26.786208] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 26.786270] Write of size 33 at addr fff00000c78b0d00 by task kunit_try_catch/198 [ 26.786321] [ 26.786359] CPU: 1 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 26.786457] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.786484] Hardware name: linux,dummy-virt (DT) [ 26.786517] Call trace: [ 26.786540] show_stack+0x20/0x38 (C) [ 26.786592] dump_stack_lvl+0x8c/0xd0 [ 26.786643] print_report+0x118/0x608 [ 26.786689] kasan_report+0xdc/0x128 [ 26.786734] kasan_check_range+0x100/0x1a8 [ 26.786781] __asan_memset+0x34/0x78 [ 26.786825] kmalloc_uaf_memset+0x170/0x310 [ 26.786871] kunit_try_run_case+0x170/0x3f0 [ 26.786919] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.786972] kthread+0x328/0x630 [ 26.787012] ret_from_fork+0x10/0x20 [ 26.787060] [ 26.787080] Allocated by task 198: [ 26.787107] kasan_save_stack+0x3c/0x68 [ 26.787157] kasan_save_track+0x20/0x40 [ 26.787194] kasan_save_alloc_info+0x40/0x58 [ 26.787231] __kasan_kmalloc+0xd4/0xd8 [ 26.787266] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.787307] kmalloc_uaf_memset+0xb8/0x310 [ 26.787342] kunit_try_run_case+0x170/0x3f0 [ 26.787381] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.787435] kthread+0x328/0x630 [ 26.787639] ret_from_fork+0x10/0x20 [ 26.787980] [ 26.788107] Freed by task 198: [ 26.788256] kasan_save_stack+0x3c/0x68 [ 26.788354] kasan_save_track+0x20/0x40 [ 26.788880] kasan_save_free_info+0x4c/0x78 [ 26.789323] __kasan_slab_free+0x6c/0x98 [ 26.789872] kfree+0x214/0x3c8 [ 26.790018] kmalloc_uaf_memset+0x11c/0x310 [ 26.790113] kunit_try_run_case+0x170/0x3f0 [ 26.790533] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.790852] kthread+0x328/0x630 [ 26.791000] ret_from_fork+0x10/0x20 [ 26.791321] [ 26.791735] The buggy address belongs to the object at fff00000c78b0d00 [ 26.791735] which belongs to the cache kmalloc-64 of size 64 [ 26.791898] The buggy address is located 0 bytes inside of [ 26.791898] freed 64-byte region [fff00000c78b0d00, fff00000c78b0d40) [ 26.792497] [ 26.792742] The buggy address belongs to the physical page: [ 26.792814] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078b0 [ 26.793010] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.793391] page_type: f5(slab) [ 26.793694] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.794043] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.794151] page dumped because: kasan: bad access detected [ 26.794360] [ 26.794491] Memory state around the buggy address: [ 26.794528] fff00000c78b0c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.794597] fff00000c78b0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.795193] >fff00000c78b0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.795346] ^ [ 26.795453] fff00000c78b0d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.795723] fff00000c78b0e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.795959] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[ 26.766490] ================================================================== [ 26.766579] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 26.766652] Read of size 1 at addr fff00000c3f9db28 by task kunit_try_catch/196 [ 26.766703] [ 26.766752] CPU: 1 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 26.766840] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.766866] Hardware name: linux,dummy-virt (DT) [ 26.766909] Call trace: [ 26.766945] show_stack+0x20/0x38 (C) [ 26.767002] dump_stack_lvl+0x8c/0xd0 [ 26.767058] print_report+0x118/0x608 [ 26.767106] kasan_report+0xdc/0x128 [ 26.767164] __asan_report_load1_noabort+0x20/0x30 [ 26.767212] kmalloc_uaf+0x300/0x338 [ 26.767255] kunit_try_run_case+0x170/0x3f0 [ 26.767309] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.767360] kthread+0x328/0x630 [ 26.767414] ret_from_fork+0x10/0x20 [ 26.767463] [ 26.767481] Allocated by task 196: [ 26.767508] kasan_save_stack+0x3c/0x68 [ 26.767551] kasan_save_track+0x20/0x40 [ 26.767587] kasan_save_alloc_info+0x40/0x58 [ 26.767624] __kasan_kmalloc+0xd4/0xd8 [ 26.767662] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.767701] kmalloc_uaf+0xb8/0x338 [ 26.767736] kunit_try_run_case+0x170/0x3f0 [ 26.767785] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.767830] kthread+0x328/0x630 [ 26.767860] ret_from_fork+0x10/0x20 [ 26.768531] [ 26.768593] Freed by task 196: [ 26.768644] kasan_save_stack+0x3c/0x68 [ 26.768716] kasan_save_track+0x20/0x40 [ 26.768832] kasan_save_free_info+0x4c/0x78 [ 26.768929] __kasan_slab_free+0x6c/0x98 [ 26.768970] kfree+0x214/0x3c8 [ 26.769195] kmalloc_uaf+0x11c/0x338 [ 26.769354] kunit_try_run_case+0x170/0x3f0 [ 26.769492] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.769863] kthread+0x328/0x630 [ 26.769968] ret_from_fork+0x10/0x20 [ 26.770342] [ 26.770387] The buggy address belongs to the object at fff00000c3f9db20 [ 26.770387] which belongs to the cache kmalloc-16 of size 16 [ 26.770519] The buggy address is located 8 bytes inside of [ 26.770519] freed 16-byte region [fff00000c3f9db20, fff00000c3f9db30) [ 26.770645] [ 26.770758] The buggy address belongs to the physical page: [ 26.771031] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f9d [ 26.771223] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.771366] page_type: f5(slab) [ 26.771447] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 26.771689] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.772167] page dumped because: kasan: bad access detected [ 26.772274] [ 26.772688] Memory state around the buggy address: [ 26.772804] fff00000c3f9da00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.772911] fff00000c3f9da80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.772983] >fff00000c3f9db00: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 26.773147] ^ [ 26.773486] fff00000c3f9db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.773661] fff00000c3f9dc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.773884] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 26.745831] ================================================================== [ 26.745902] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0 [ 26.745971] Read of size 64 at addr fff00000c78b0a04 by task kunit_try_catch/194 [ 26.746425] [ 26.746603] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 26.746699] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.746734] Hardware name: linux,dummy-virt (DT) [ 26.746877] Call trace: [ 26.747107] show_stack+0x20/0x38 (C) [ 26.747337] dump_stack_lvl+0x8c/0xd0 [ 26.747537] print_report+0x118/0x608 [ 26.747591] kasan_report+0xdc/0x128 [ 26.747707] kasan_check_range+0x100/0x1a8 [ 26.747759] __asan_memmove+0x3c/0x98 [ 26.747802] kmalloc_memmove_invalid_size+0x154/0x2e0 [ 26.747977] kunit_try_run_case+0x170/0x3f0 [ 26.748075] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.748250] kthread+0x328/0x630 [ 26.748300] ret_from_fork+0x10/0x20 [ 26.748524] [ 26.748664] Allocated by task 194: [ 26.748719] kasan_save_stack+0x3c/0x68 [ 26.748836] kasan_save_track+0x20/0x40 [ 26.748878] kasan_save_alloc_info+0x40/0x58 [ 26.748914] __kasan_kmalloc+0xd4/0xd8 [ 26.748951] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.748991] kmalloc_memmove_invalid_size+0xb0/0x2e0 [ 26.749033] kunit_try_run_case+0x170/0x3f0 [ 26.749079] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.749124] kthread+0x328/0x630 [ 26.749158] ret_from_fork+0x10/0x20 [ 26.749193] [ 26.749213] The buggy address belongs to the object at fff00000c78b0a00 [ 26.749213] which belongs to the cache kmalloc-64 of size 64 [ 26.749282] The buggy address is located 4 bytes inside of [ 26.749282] allocated 64-byte region [fff00000c78b0a00, fff00000c78b0a40) [ 26.749348] [ 26.749368] The buggy address belongs to the physical page: [ 26.749418] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078b0 [ 26.749480] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.749532] page_type: f5(slab) [ 26.749573] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.749621] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.749670] page dumped because: kasan: bad access detected [ 26.749701] [ 26.749719] Memory state around the buggy address: [ 26.749766] fff00000c78b0900: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc [ 26.749826] fff00000c78b0980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.749878] >fff00000c78b0a00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 26.749916] ^ [ 26.749950] fff00000c78b0a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.749990] fff00000c78b0b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.750029] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 26.726830] ================================================================== [ 26.727045] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 26.727122] Read of size 18446744073709551614 at addr fff00000c78b0804 by task kunit_try_catch/192 [ 26.727500] [ 26.727562] CPU: 1 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 26.727715] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.727820] Hardware name: linux,dummy-virt (DT) [ 26.727855] Call trace: [ 26.728068] show_stack+0x20/0x38 (C) [ 26.728403] dump_stack_lvl+0x8c/0xd0 [ 26.728619] print_report+0x118/0x608 [ 26.728826] kasan_report+0xdc/0x128 [ 26.729101] kasan_check_range+0x100/0x1a8 [ 26.729155] __asan_memmove+0x3c/0x98 [ 26.729243] kmalloc_memmove_negative_size+0x154/0x2e0 [ 26.729537] kunit_try_run_case+0x170/0x3f0 [ 26.729628] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.729853] kthread+0x328/0x630 [ 26.729906] ret_from_fork+0x10/0x20 [ 26.729956] [ 26.730044] Allocated by task 192: [ 26.730109] kasan_save_stack+0x3c/0x68 [ 26.730162] kasan_save_track+0x20/0x40 [ 26.730209] kasan_save_alloc_info+0x40/0x58 [ 26.730250] __kasan_kmalloc+0xd4/0xd8 [ 26.730302] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.730343] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 26.730419] kunit_try_run_case+0x170/0x3f0 [ 26.730469] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.730512] kthread+0x328/0x630 [ 26.730545] ret_from_fork+0x10/0x20 [ 26.730582] [ 26.730607] The buggy address belongs to the object at fff00000c78b0800 [ 26.730607] which belongs to the cache kmalloc-64 of size 64 [ 26.730679] The buggy address is located 4 bytes inside of [ 26.730679] 64-byte region [fff00000c78b0800, fff00000c78b0840) [ 26.730738] [ 26.730767] The buggy address belongs to the physical page: [ 26.730800] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1078b0 [ 26.730866] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.730940] page_type: f5(slab) [ 26.730987] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.731052] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.731101] page dumped because: kasan: bad access detected [ 26.731134] [ 26.731152] Memory state around the buggy address: [ 26.731214] fff00000c78b0700: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc [ 26.731274] fff00000c78b0780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.731316] >fff00000c78b0800: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 26.731360] ^ [ 26.731434] fff00000c78b0880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.731862] fff00000c78b0900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.731924] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[ 26.704273] ================================================================== [ 26.704475] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 26.704545] Write of size 16 at addr fff00000c7895169 by task kunit_try_catch/190 [ 26.704594] [ 26.704960] CPU: 1 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 26.705437] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.705536] Hardware name: linux,dummy-virt (DT) [ 26.705776] Call trace: [ 26.705915] show_stack+0x20/0x38 (C) [ 26.706310] dump_stack_lvl+0x8c/0xd0 [ 26.706424] print_report+0x118/0x608 [ 26.706768] kasan_report+0xdc/0x128 [ 26.706899] kasan_check_range+0x100/0x1a8 [ 26.707100] __asan_memset+0x34/0x78 [ 26.707368] kmalloc_oob_memset_16+0x150/0x2f8 [ 26.707629] kunit_try_run_case+0x170/0x3f0 [ 26.707863] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.708095] kthread+0x328/0x630 [ 26.708199] ret_from_fork+0x10/0x20 [ 26.708249] [ 26.708267] Allocated by task 190: [ 26.708780] kasan_save_stack+0x3c/0x68 [ 26.709011] kasan_save_track+0x20/0x40 [ 26.709332] kasan_save_alloc_info+0x40/0x58 [ 26.709556] __kasan_kmalloc+0xd4/0xd8 [ 26.709688] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.710103] kmalloc_oob_memset_16+0xb0/0x2f8 [ 26.710195] kunit_try_run_case+0x170/0x3f0 [ 26.710464] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.710768] kthread+0x328/0x630 [ 26.710959] ret_from_fork+0x10/0x20 [ 26.711073] [ 26.711267] The buggy address belongs to the object at fff00000c7895100 [ 26.711267] which belongs to the cache kmalloc-128 of size 128 [ 26.711601] The buggy address is located 105 bytes inside of [ 26.711601] allocated 120-byte region [fff00000c7895100, fff00000c7895178) [ 26.711809] [ 26.711948] The buggy address belongs to the physical page: [ 26.712127] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107895 [ 26.712204] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.712257] page_type: f5(slab) [ 26.712561] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 26.712787] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.713266] page dumped because: kasan: bad access detected [ 26.713449] [ 26.713597] Memory state around the buggy address: [ 26.713727] fff00000c7895000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.713838] fff00000c7895080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.713881] >fff00000c7895100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 26.714062] ^ [ 26.714425] fff00000c7895180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.715036] fff00000c7895200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.715252] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[ 26.679905] ================================================================== [ 26.681051] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 26.681144] Write of size 8 at addr fff00000c7895071 by task kunit_try_catch/188 [ 26.681578] [ 26.681676] CPU: 1 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 26.682000] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.682287] Hardware name: linux,dummy-virt (DT) [ 26.682571] Call trace: [ 26.682655] show_stack+0x20/0x38 (C) [ 26.682795] dump_stack_lvl+0x8c/0xd0 [ 26.682919] print_report+0x118/0x608 [ 26.683229] kasan_report+0xdc/0x128 [ 26.683545] kasan_check_range+0x100/0x1a8 [ 26.683964] __asan_memset+0x34/0x78 [ 26.684151] kmalloc_oob_memset_8+0x150/0x2f8 [ 26.684349] kunit_try_run_case+0x170/0x3f0 [ 26.684615] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.684819] kthread+0x328/0x630 [ 26.684861] ret_from_fork+0x10/0x20 [ 26.684911] [ 26.684929] Allocated by task 188: [ 26.685479] kasan_save_stack+0x3c/0x68 [ 26.685606] kasan_save_track+0x20/0x40 [ 26.685715] kasan_save_alloc_info+0x40/0x58 [ 26.685832] __kasan_kmalloc+0xd4/0xd8 [ 26.685896] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.686066] kmalloc_oob_memset_8+0xb0/0x2f8 [ 26.686506] kunit_try_run_case+0x170/0x3f0 [ 26.686618] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.686729] kthread+0x328/0x630 [ 26.686948] ret_from_fork+0x10/0x20 [ 26.687166] [ 26.687349] The buggy address belongs to the object at fff00000c7895000 [ 26.687349] which belongs to the cache kmalloc-128 of size 128 [ 26.687604] The buggy address is located 113 bytes inside of [ 26.687604] allocated 120-byte region [fff00000c7895000, fff00000c7895078) [ 26.687737] [ 26.687931] The buggy address belongs to the physical page: [ 26.688115] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107895 [ 26.688168] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.688217] page_type: f5(slab) [ 26.688559] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 26.688915] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.689075] page dumped because: kasan: bad access detected [ 26.689143] [ 26.689162] Memory state around the buggy address: [ 26.689563] fff00000c7894f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.689632] fff00000c7894f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.689921] >fff00000c7895000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 26.689973] ^ [ 26.690113] fff00000c7895080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.690155] fff00000c7895100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.690490] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[ 26.651293] ================================================================== [ 26.651370] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 26.651878] Write of size 4 at addr fff00000c3fadf75 by task kunit_try_catch/186 [ 26.652797] [ 26.652931] CPU: 1 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 26.653026] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.653364] Hardware name: linux,dummy-virt (DT) [ 26.653417] Call trace: [ 26.653490] show_stack+0x20/0x38 (C) [ 26.653665] dump_stack_lvl+0x8c/0xd0 [ 26.653885] print_report+0x118/0x608 [ 26.654282] kasan_report+0xdc/0x128 [ 26.654361] kasan_check_range+0x100/0x1a8 [ 26.654608] __asan_memset+0x34/0x78 [ 26.654852] kmalloc_oob_memset_4+0x150/0x300 [ 26.654902] kunit_try_run_case+0x170/0x3f0 [ 26.655305] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.655514] kthread+0x328/0x630 [ 26.655571] ret_from_fork+0x10/0x20 [ 26.655773] [ 26.655799] Allocated by task 186: [ 26.656009] kasan_save_stack+0x3c/0x68 [ 26.656079] kasan_save_track+0x20/0x40 [ 26.656430] kasan_save_alloc_info+0x40/0x58 [ 26.656477] __kasan_kmalloc+0xd4/0xd8 [ 26.656595] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.657034] kmalloc_oob_memset_4+0xb0/0x300 [ 26.657238] kunit_try_run_case+0x170/0x3f0 [ 26.657487] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.657662] kthread+0x328/0x630 [ 26.657893] ret_from_fork+0x10/0x20 [ 26.657949] [ 26.658140] The buggy address belongs to the object at fff00000c3fadf00 [ 26.658140] which belongs to the cache kmalloc-128 of size 128 [ 26.658376] The buggy address is located 117 bytes inside of [ 26.658376] allocated 120-byte region [fff00000c3fadf00, fff00000c3fadf78) [ 26.658594] [ 26.658685] The buggy address belongs to the physical page: [ 26.658896] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fad [ 26.659035] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.659248] page_type: f5(slab) [ 26.659323] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 26.659553] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.659738] page dumped because: kasan: bad access detected [ 26.659897] [ 26.659979] Memory state around the buggy address: [ 26.660139] fff00000c3fade00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.660361] fff00000c3fade80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.660602] >fff00000c3fadf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 26.660679] ^ [ 26.660720] fff00000c3fadf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.660765] fff00000c3fae000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.660802] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 26.419344] ================================================================== [ 26.419448] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 26.419529] Read of size 1 at addr fff00000c7960000 by task kunit_try_catch/166 [ 26.419605] [ 26.419651] CPU: 1 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 26.419736] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.419763] Hardware name: linux,dummy-virt (DT) [ 26.419806] Call trace: [ 26.419829] show_stack+0x20/0x38 (C) [ 26.419879] dump_stack_lvl+0x8c/0xd0 [ 26.419936] print_report+0x118/0x608 [ 26.419982] kasan_report+0xdc/0x128 [ 26.420036] __asan_report_load1_noabort+0x20/0x30 [ 26.420083] page_alloc_uaf+0x328/0x350 [ 26.420129] kunit_try_run_case+0x170/0x3f0 [ 26.420178] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.420229] kthread+0x328/0x630 [ 26.420270] ret_from_fork+0x10/0x20 [ 26.420323] [ 26.420345] The buggy address belongs to the physical page: [ 26.420377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107960 [ 26.420439] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.420490] page_type: f0(buddy) [ 26.420583] raw: 0bfffe0000000000 fff00000ff616108 fff00000ff616108 0000000000000000 [ 26.420689] raw: 0000000000000000 0000000000000005 00000000f0000000 0000000000000000 [ 26.420858] page dumped because: kasan: bad access detected [ 26.420891] [ 26.420955] Memory state around the buggy address: [ 26.421017] fff00000c795ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.421172] fff00000c795ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.421262] >fff00000c7960000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.421440] ^ [ 26.421577] fff00000c7960080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.421709] fff00000c7960100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.421774] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[ 26.634046] ================================================================== [ 26.634120] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 26.634267] Write of size 2 at addr fff00000c3fade77 by task kunit_try_catch/184 [ 26.634319] [ 26.634354] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 26.634493] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.634552] Hardware name: linux,dummy-virt (DT) [ 26.634618] Call trace: [ 26.634895] show_stack+0x20/0x38 (C) [ 26.635086] dump_stack_lvl+0x8c/0xd0 [ 26.635148] print_report+0x118/0x608 [ 26.635193] kasan_report+0xdc/0x128 [ 26.635296] kasan_check_range+0x100/0x1a8 [ 26.635460] __asan_memset+0x34/0x78 [ 26.635506] kmalloc_oob_memset_2+0x150/0x2f8 [ 26.635720] kunit_try_run_case+0x170/0x3f0 [ 26.635872] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.635936] kthread+0x328/0x630 [ 26.635976] ret_from_fork+0x10/0x20 [ 26.636029] [ 26.636048] Allocated by task 184: [ 26.636077] kasan_save_stack+0x3c/0x68 [ 26.636511] kasan_save_track+0x20/0x40 [ 26.636767] kasan_save_alloc_info+0x40/0x58 [ 26.636902] __kasan_kmalloc+0xd4/0xd8 [ 26.636942] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.637387] kmalloc_oob_memset_2+0xb0/0x2f8 [ 26.637626] kunit_try_run_case+0x170/0x3f0 [ 26.637752] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.637809] kthread+0x328/0x630 [ 26.637841] ret_from_fork+0x10/0x20 [ 26.638012] [ 26.638258] The buggy address belongs to the object at fff00000c3fade00 [ 26.638258] which belongs to the cache kmalloc-128 of size 128 [ 26.638654] The buggy address is located 119 bytes inside of [ 26.638654] allocated 120-byte region [fff00000c3fade00, fff00000c3fade78) [ 26.638893] [ 26.639154] The buggy address belongs to the physical page: [ 26.639615] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fad [ 26.639998] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.640083] page_type: f5(slab) [ 26.640156] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 26.640225] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.640265] page dumped because: kasan: bad access detected [ 26.640311] [ 26.640336] Memory state around the buggy address: [ 26.640368] fff00000c3fadd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.640902] fff00000c3fadd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.641072] >fff00000c3fade00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 26.641258] ^ [ 26.641300] fff00000c3fade80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.641616] fff00000c3fadf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.641707] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 26.616273] ================================================================== [ 26.616601] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 26.617050] Write of size 128 at addr fff00000c3fadd00 by task kunit_try_catch/182 [ 26.617413] [ 26.617464] CPU: 1 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 26.617648] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.617682] Hardware name: linux,dummy-virt (DT) [ 26.618049] Call trace: [ 26.618195] show_stack+0x20/0x38 (C) [ 26.618259] dump_stack_lvl+0x8c/0xd0 [ 26.618307] print_report+0x118/0x608 [ 26.618352] kasan_report+0xdc/0x128 [ 26.618770] kasan_check_range+0x100/0x1a8 [ 26.619176] __asan_memset+0x34/0x78 [ 26.619488] kmalloc_oob_in_memset+0x144/0x2d0 [ 26.619626] kunit_try_run_case+0x170/0x3f0 [ 26.619680] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.619767] kthread+0x328/0x630 [ 26.619971] ret_from_fork+0x10/0x20 [ 26.620129] [ 26.620251] Allocated by task 182: [ 26.620406] kasan_save_stack+0x3c/0x68 [ 26.620467] kasan_save_track+0x20/0x40 [ 26.620511] kasan_save_alloc_info+0x40/0x58 [ 26.620992] __kasan_kmalloc+0xd4/0xd8 [ 26.621133] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.621310] kmalloc_oob_in_memset+0xb0/0x2d0 [ 26.621509] kunit_try_run_case+0x170/0x3f0 [ 26.621658] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.621826] kthread+0x328/0x630 [ 26.622054] ret_from_fork+0x10/0x20 [ 26.622228] [ 26.622461] The buggy address belongs to the object at fff00000c3fadd00 [ 26.622461] which belongs to the cache kmalloc-128 of size 128 [ 26.622665] The buggy address is located 0 bytes inside of [ 26.622665] allocated 120-byte region [fff00000c3fadd00, fff00000c3fadd78) [ 26.622980] [ 26.623074] The buggy address belongs to the physical page: [ 26.623254] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fad [ 26.623415] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.623538] page_type: f5(slab) [ 26.623602] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 26.623650] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.623696] page dumped because: kasan: bad access detected [ 26.623741] [ 26.623760] Memory state around the buggy address: [ 26.623799] fff00000c3fadc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.623841] fff00000c3fadc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.623900] >fff00000c3fadd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 26.623953] ^ [ 26.624130] fff00000c3fadd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.624356] fff00000c3fade00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.624521] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[ 26.594657] ================================================================== [ 26.594715] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 26.594775] Read of size 16 at addr fff00000c3f9db00 by task kunit_try_catch/180 [ 26.594893] [ 26.594934] CPU: 1 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 26.595019] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.595044] Hardware name: linux,dummy-virt (DT) [ 26.595075] Call trace: [ 26.595097] show_stack+0x20/0x38 (C) [ 26.595148] dump_stack_lvl+0x8c/0xd0 [ 26.595197] print_report+0x118/0x608 [ 26.595243] kasan_report+0xdc/0x128 [ 26.595298] __asan_report_load16_noabort+0x20/0x30 [ 26.595346] kmalloc_uaf_16+0x3bc/0x438 [ 26.595389] kunit_try_run_case+0x170/0x3f0 [ 26.595484] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.595538] kthread+0x328/0x630 [ 26.595839] ret_from_fork+0x10/0x20 [ 26.596240] [ 26.596764] Allocated by task 180: [ 26.596916] kasan_save_stack+0x3c/0x68 [ 26.597179] kasan_save_track+0x20/0x40 [ 26.597223] kasan_save_alloc_info+0x40/0x58 [ 26.597662] __kasan_kmalloc+0xd4/0xd8 [ 26.597758] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.598100] kmalloc_uaf_16+0x140/0x438 [ 26.598184] kunit_try_run_case+0x170/0x3f0 [ 26.598447] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.598618] kthread+0x328/0x630 [ 26.599107] ret_from_fork+0x10/0x20 [ 26.599188] [ 26.599380] Freed by task 180: [ 26.599542] kasan_save_stack+0x3c/0x68 [ 26.599824] kasan_save_track+0x20/0x40 [ 26.600020] kasan_save_free_info+0x4c/0x78 [ 26.600129] __kasan_slab_free+0x6c/0x98 [ 26.600168] kfree+0x214/0x3c8 [ 26.600200] kmalloc_uaf_16+0x190/0x438 [ 26.600235] kunit_try_run_case+0x170/0x3f0 [ 26.600272] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.600631] kthread+0x328/0x630 [ 26.600786] ret_from_fork+0x10/0x20 [ 26.600956] [ 26.601054] The buggy address belongs to the object at fff00000c3f9db00 [ 26.601054] which belongs to the cache kmalloc-16 of size 16 [ 26.601132] The buggy address is located 0 bytes inside of [ 26.601132] freed 16-byte region [fff00000c3f9db00, fff00000c3f9db10) [ 26.601360] [ 26.601597] The buggy address belongs to the physical page: [ 26.601672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f9d [ 26.601920] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.602642] page_type: f5(slab) [ 26.602826] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 26.602997] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.603037] page dumped because: kasan: bad access detected [ 26.603320] [ 26.603477] Memory state around the buggy address: [ 26.603554] fff00000c3f9da00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.603712] fff00000c3f9da80: fa fb fc fc fa fb fc fc fa fb fc fc 00 00 fc fc [ 26.603914] >fff00000c3f9db00: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.603985] ^ [ 26.604016] fff00000c3f9db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.604056] fff00000c3f9dc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.604526] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[ 26.574693] ================================================================== [ 26.574769] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 26.574836] Write of size 16 at addr fff00000c3f9daa0 by task kunit_try_catch/178 [ 26.574886] [ 26.574936] CPU: 1 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 26.575021] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.575046] Hardware name: linux,dummy-virt (DT) [ 26.575078] Call trace: [ 26.575101] show_stack+0x20/0x38 (C) [ 26.575163] dump_stack_lvl+0x8c/0xd0 [ 26.575221] print_report+0x118/0x608 [ 26.575268] kasan_report+0xdc/0x128 [ 26.575326] __asan_report_store16_noabort+0x20/0x30 [ 26.575374] kmalloc_oob_16+0x3a0/0x3f8 [ 26.575439] kunit_try_run_case+0x170/0x3f0 [ 26.575488] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.575539] kthread+0x328/0x630 [ 26.575579] ret_from_fork+0x10/0x20 [ 26.575626] [ 26.575651] Allocated by task 178: [ 26.575680] kasan_save_stack+0x3c/0x68 [ 26.575718] kasan_save_track+0x20/0x40 [ 26.575754] kasan_save_alloc_info+0x40/0x58 [ 26.575788] __kasan_kmalloc+0xd4/0xd8 [ 26.575831] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.576637] kmalloc_oob_16+0xb4/0x3f8 [ 26.576788] kunit_try_run_case+0x170/0x3f0 [ 26.576937] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.577085] kthread+0x328/0x630 [ 26.577118] ret_from_fork+0x10/0x20 [ 26.577332] [ 26.577494] The buggy address belongs to the object at fff00000c3f9daa0 [ 26.577494] which belongs to the cache kmalloc-16 of size 16 [ 26.577625] The buggy address is located 0 bytes inside of [ 26.577625] allocated 13-byte region [fff00000c3f9daa0, fff00000c3f9daad) [ 26.577787] [ 26.577997] The buggy address belongs to the physical page: [ 26.578105] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f9d [ 26.578546] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.578668] page_type: f5(slab) [ 26.578753] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 26.578856] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.578996] page dumped because: kasan: bad access detected [ 26.579064] [ 26.579082] Memory state around the buggy address: [ 26.579285] fff00000c3f9d980: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 26.579591] fff00000c3f9da00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.579727] >fff00000c3f9da80: fa fb fc fc 00 05 fc fc 00 00 fc fc fc fc fc fc [ 26.579971] ^ [ 26.580044] fff00000c3f9db00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.580085] fff00000c3f9db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.580130] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 26.550391] ================================================================== [ 26.550462] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 26.550578] Read of size 1 at addr fff00000c470f800 by task kunit_try_catch/176 [ 26.550775] [ 26.550874] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 26.551241] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.551276] Hardware name: linux,dummy-virt (DT) [ 26.551345] Call trace: [ 26.551384] show_stack+0x20/0x38 (C) [ 26.551499] dump_stack_lvl+0x8c/0xd0 [ 26.551575] print_report+0x118/0x608 [ 26.551815] kasan_report+0xdc/0x128 [ 26.552001] __asan_report_load1_noabort+0x20/0x30 [ 26.552199] krealloc_uaf+0x4c8/0x520 [ 26.552315] kunit_try_run_case+0x170/0x3f0 [ 26.552417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.552601] kthread+0x328/0x630 [ 26.552689] ret_from_fork+0x10/0x20 [ 26.552744] [ 26.553047] Allocated by task 176: [ 26.553320] kasan_save_stack+0x3c/0x68 [ 26.553439] kasan_save_track+0x20/0x40 [ 26.553583] kasan_save_alloc_info+0x40/0x58 [ 26.553629] __kasan_kmalloc+0xd4/0xd8 [ 26.553665] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.553703] krealloc_uaf+0xc8/0x520 [ 26.553736] kunit_try_run_case+0x170/0x3f0 [ 26.553823] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.553882] kthread+0x328/0x630 [ 26.553921] ret_from_fork+0x10/0x20 [ 26.553961] [ 26.553981] Freed by task 176: [ 26.554007] kasan_save_stack+0x3c/0x68 [ 26.554044] kasan_save_track+0x20/0x40 [ 26.554079] kasan_save_free_info+0x4c/0x78 [ 26.554121] __kasan_slab_free+0x6c/0x98 [ 26.554165] kfree+0x214/0x3c8 [ 26.554197] krealloc_uaf+0x12c/0x520 [ 26.554230] kunit_try_run_case+0x170/0x3f0 [ 26.554272] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.554323] kthread+0x328/0x630 [ 26.554362] ret_from_fork+0x10/0x20 [ 26.554406] [ 26.554424] The buggy address belongs to the object at fff00000c470f800 [ 26.554424] which belongs to the cache kmalloc-256 of size 256 [ 26.554479] The buggy address is located 0 bytes inside of [ 26.554479] freed 256-byte region [fff00000c470f800, fff00000c470f900) [ 26.554536] [ 26.554555] The buggy address belongs to the physical page: [ 26.554586] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10470e [ 26.554644] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.554689] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.554746] page_type: f5(slab) [ 26.554783] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 26.554830] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.554877] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 26.554923] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.554979] head: 0bfffe0000000001 ffffc1ffc311c381 00000000ffffffff 00000000ffffffff [ 26.555025] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 26.555063] page dumped because: kasan: bad access detected [ 26.555098] [ 26.555115] Memory state around the buggy address: [ 26.555144] fff00000c470f700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.555185] fff00000c470f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.555234] >fff00000c470f800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.555279] ^ [ 26.555313] fff00000c470f880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.555363] fff00000c470f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.556142] ================================================================== [ 26.537629] ================================================================== [ 26.538014] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 26.538085] Read of size 1 at addr fff00000c470f800 by task kunit_try_catch/176 [ 26.538149] [ 26.538184] CPU: 1 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 26.538652] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.538707] Hardware name: linux,dummy-virt (DT) [ 26.538742] Call trace: [ 26.538930] show_stack+0x20/0x38 (C) [ 26.539169] dump_stack_lvl+0x8c/0xd0 [ 26.539260] print_report+0x118/0x608 [ 26.539309] kasan_report+0xdc/0x128 [ 26.539353] __kasan_check_byte+0x54/0x70 [ 26.539565] krealloc_noprof+0x44/0x360 [ 26.539625] krealloc_uaf+0x180/0x520 [ 26.539895] kunit_try_run_case+0x170/0x3f0 [ 26.540155] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.540216] kthread+0x328/0x630 [ 26.540257] ret_from_fork+0x10/0x20 [ 26.540303] [ 26.540321] Allocated by task 176: [ 26.540351] kasan_save_stack+0x3c/0x68 [ 26.540390] kasan_save_track+0x20/0x40 [ 26.540440] kasan_save_alloc_info+0x40/0x58 [ 26.540476] __kasan_kmalloc+0xd4/0xd8 [ 26.540512] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.540552] krealloc_uaf+0xc8/0x520 [ 26.540989] kunit_try_run_case+0x170/0x3f0 [ 26.541294] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.541485] kthread+0x328/0x630 [ 26.541871] ret_from_fork+0x10/0x20 [ 26.541993] [ 26.542119] Freed by task 176: [ 26.542321] kasan_save_stack+0x3c/0x68 [ 26.542367] kasan_save_track+0x20/0x40 [ 26.542788] kasan_save_free_info+0x4c/0x78 [ 26.542929] __kasan_slab_free+0x6c/0x98 [ 26.543073] kfree+0x214/0x3c8 [ 26.543308] krealloc_uaf+0x12c/0x520 [ 26.543540] kunit_try_run_case+0x170/0x3f0 [ 26.543665] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.543805] kthread+0x328/0x630 [ 26.544041] ret_from_fork+0x10/0x20 [ 26.544092] [ 26.544114] The buggy address belongs to the object at fff00000c470f800 [ 26.544114] which belongs to the cache kmalloc-256 of size 256 [ 26.544676] The buggy address is located 0 bytes inside of [ 26.544676] freed 256-byte region [fff00000c470f800, fff00000c470f900) [ 26.544930] [ 26.544977] The buggy address belongs to the physical page: [ 26.545072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10470e [ 26.545126] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.545370] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.545725] page_type: f5(slab) [ 26.546079] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 26.546139] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.546352] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 26.546622] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.546760] head: 0bfffe0000000001 ffffc1ffc311c381 00000000ffffffff 00000000ffffffff [ 26.546871] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 26.546912] page dumped because: kasan: bad access detected [ 26.546944] [ 26.546963] Memory state around the buggy address: [ 26.547002] fff00000c470f700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.547058] fff00000c470f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.547106] >fff00000c470f800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.547151] ^ [ 26.547177] fff00000c470f880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.547225] fff00000c470f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.547271] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 26.455606] ================================================================== [ 26.455658] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 26.455709] Write of size 1 at addr fff00000c470f6d0 by task kunit_try_catch/170 [ 26.455768] [ 26.455803] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 26.455883] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.455909] Hardware name: linux,dummy-virt (DT) [ 26.455938] Call trace: [ 26.455958] show_stack+0x20/0x38 (C) [ 26.456254] dump_stack_lvl+0x8c/0xd0 [ 26.456371] print_report+0x118/0x608 [ 26.456496] kasan_report+0xdc/0x128 [ 26.456601] __asan_report_store1_noabort+0x20/0x30 [ 26.456692] krealloc_less_oob_helper+0xb9c/0xc50 [ 26.456782] krealloc_less_oob+0x20/0x38 [ 26.456834] kunit_try_run_case+0x170/0x3f0 [ 26.456882] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.456933] kthread+0x328/0x630 [ 26.457161] ret_from_fork+0x10/0x20 [ 26.457358] [ 26.457503] Allocated by task 170: [ 26.457603] kasan_save_stack+0x3c/0x68 [ 26.457679] kasan_save_track+0x20/0x40 [ 26.457716] kasan_save_alloc_info+0x40/0x58 [ 26.457816] __kasan_krealloc+0x118/0x178 [ 26.458119] krealloc_noprof+0x128/0x360 [ 26.458266] krealloc_less_oob_helper+0x168/0xc50 [ 26.458390] krealloc_less_oob+0x20/0x38 [ 26.458537] kunit_try_run_case+0x170/0x3f0 [ 26.458596] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.458638] kthread+0x328/0x630 [ 26.459042] ret_from_fork+0x10/0x20 [ 26.459125] [ 26.459163] The buggy address belongs to the object at fff00000c470f600 [ 26.459163] which belongs to the cache kmalloc-256 of size 256 [ 26.459250] The buggy address is located 7 bytes to the right of [ 26.459250] allocated 201-byte region [fff00000c470f600, fff00000c470f6c9) [ 26.459575] [ 26.459677] The buggy address belongs to the physical page: [ 26.459773] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10470e [ 26.459825] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.459891] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.459941] page_type: f5(slab) [ 26.459978] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 26.460035] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.460083] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 26.460145] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.460192] head: 0bfffe0000000001 ffffc1ffc311c381 00000000ffffffff 00000000ffffffff [ 26.460252] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 26.460306] page dumped because: kasan: bad access detected [ 26.460345] [ 26.460362] Memory state around the buggy address: [ 26.460391] fff00000c470f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.460442] fff00000c470f600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.460483] >fff00000c470f680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 26.460519] ^ [ 26.460563] fff00000c470f700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.460614] fff00000c470f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.460650] ================================================================== [ 26.511476] ================================================================== [ 26.511519] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 26.511561] Write of size 1 at addr fff00000c78260ea by task kunit_try_catch/174 [ 26.511606] [ 26.511632] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 26.511709] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.511740] Hardware name: linux,dummy-virt (DT) [ 26.511778] Call trace: [ 26.511804] show_stack+0x20/0x38 (C) [ 26.511848] dump_stack_lvl+0x8c/0xd0 [ 26.511902] print_report+0x118/0x608 [ 26.512851] kasan_report+0xdc/0x128 [ 26.512937] __asan_report_store1_noabort+0x20/0x30 [ 26.513031] krealloc_less_oob_helper+0xae4/0xc50 [ 26.513119] krealloc_large_less_oob+0x20/0x38 [ 26.513223] kunit_try_run_case+0x170/0x3f0 [ 26.513459] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.513596] kthread+0x328/0x630 [ 26.513640] ret_from_fork+0x10/0x20 [ 26.513999] [ 26.514183] The buggy address belongs to the physical page: [ 26.514263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107824 [ 26.514511] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.514577] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.514760] page_type: f8(unknown) [ 26.514860] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.515015] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.515195] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.515370] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.515503] head: 0bfffe0000000002 ffffc1ffc31e0901 00000000ffffffff 00000000ffffffff [ 26.515944] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 26.516017] page dumped because: kasan: bad access detected [ 26.516113] [ 26.516167] Memory state around the buggy address: [ 26.516220] fff00000c7825f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.516262] fff00000c7826000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.516302] >fff00000c7826080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 26.516552] ^ [ 26.516732] fff00000c7826100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.517183] fff00000c7826180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.517503] ================================================================== [ 26.518984] ================================================================== [ 26.519028] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 26.519227] Write of size 1 at addr fff00000c78260eb by task kunit_try_catch/174 [ 26.519288] [ 26.519370] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 26.519640] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.519736] Hardware name: linux,dummy-virt (DT) [ 26.519814] Call trace: [ 26.519874] show_stack+0x20/0x38 (C) [ 26.519981] dump_stack_lvl+0x8c/0xd0 [ 26.520028] print_report+0x118/0x608 [ 26.520453] kasan_report+0xdc/0x128 [ 26.520678] __asan_report_store1_noabort+0x20/0x30 [ 26.520906] krealloc_less_oob_helper+0xa58/0xc50 [ 26.520980] krealloc_large_less_oob+0x20/0x38 [ 26.521299] kunit_try_run_case+0x170/0x3f0 [ 26.521542] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.521801] kthread+0x328/0x630 [ 26.521857] ret_from_fork+0x10/0x20 [ 26.522125] [ 26.522295] The buggy address belongs to the physical page: [ 26.522452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107824 [ 26.522555] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.522628] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.522863] page_type: f8(unknown) [ 26.523024] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.523145] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.523273] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.523462] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.523632] head: 0bfffe0000000002 ffffc1ffc31e0901 00000000ffffffff 00000000ffffffff [ 26.523713] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 26.523930] page dumped because: kasan: bad access detected [ 26.524177] [ 26.524231] Memory state around the buggy address: [ 26.524276] fff00000c7825f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.524827] fff00000c7826000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.525270] >fff00000c7826080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 26.525316] ^ [ 26.525741] fff00000c7826100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.525895] fff00000c7826180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.526167] ================================================================== [ 26.502134] ================================================================== [ 26.502176] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 26.502330] Write of size 1 at addr fff00000c78260d0 by task kunit_try_catch/174 [ 26.502603] [ 26.502700] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 26.502783] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.502907] Hardware name: linux,dummy-virt (DT) [ 26.502969] Call trace: [ 26.503007] show_stack+0x20/0x38 (C) [ 26.503155] dump_stack_lvl+0x8c/0xd0 [ 26.503209] print_report+0x118/0x608 [ 26.503352] kasan_report+0xdc/0x128 [ 26.503414] __asan_report_store1_noabort+0x20/0x30 [ 26.503461] krealloc_less_oob_helper+0xb9c/0xc50 [ 26.503769] krealloc_large_less_oob+0x20/0x38 [ 26.503866] kunit_try_run_case+0x170/0x3f0 [ 26.503975] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.504097] kthread+0x328/0x630 [ 26.504220] ret_from_fork+0x10/0x20 [ 26.504265] [ 26.504310] The buggy address belongs to the physical page: [ 26.504342] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107824 [ 26.504635] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.504852] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.504983] page_type: f8(unknown) [ 26.505020] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.505348] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.505442] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.505563] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.505689] head: 0bfffe0000000002 ffffc1ffc31e0901 00000000ffffffff 00000000ffffffff [ 26.505865] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 26.505922] page dumped because: kasan: bad access detected [ 26.506052] [ 26.506168] Memory state around the buggy address: [ 26.506204] fff00000c7825f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.506249] fff00000c7826000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.506366] >fff00000c7826080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 26.506425] ^ [ 26.506459] fff00000c7826100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.506499] fff00000c7826180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.506536] ================================================================== [ 26.508666] ================================================================== [ 26.508844] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 26.508904] Write of size 1 at addr fff00000c78260da by task kunit_try_catch/174 [ 26.508951] [ 26.508980] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 26.509069] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.509094] Hardware name: linux,dummy-virt (DT) [ 26.509122] Call trace: [ 26.509491] show_stack+0x20/0x38 (C) [ 26.509614] dump_stack_lvl+0x8c/0xd0 [ 26.509673] print_report+0x118/0x608 [ 26.509913] kasan_report+0xdc/0x128 [ 26.510087] __asan_report_store1_noabort+0x20/0x30 [ 26.510224] krealloc_less_oob_helper+0xa80/0xc50 [ 26.510276] krealloc_large_less_oob+0x20/0x38 [ 26.510331] kunit_try_run_case+0x170/0x3f0 [ 26.510424] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.510479] kthread+0x328/0x630 [ 26.510520] ret_from_fork+0x10/0x20 [ 26.510574] [ 26.510593] The buggy address belongs to the physical page: [ 26.510624] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107824 [ 26.510673] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.510716] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.510769] page_type: f8(unknown) [ 26.510806] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.510863] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.510919] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.510967] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.511013] head: 0bfffe0000000002 ffffc1ffc31e0901 00000000ffffffff 00000000ffffffff [ 26.511059] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 26.511097] page dumped because: kasan: bad access detected [ 26.511125] [ 26.511143] Memory state around the buggy address: [ 26.511171] fff00000c7825f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.511211] fff00000c7826000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.511259] >fff00000c7826080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 26.511295] ^ [ 26.511329] fff00000c7826100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.511368] fff00000c7826180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.511424] ================================================================== [ 26.497726] ================================================================== [ 26.497822] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 26.497922] Write of size 1 at addr fff00000c78260c9 by task kunit_try_catch/174 [ 26.498037] [ 26.498069] CPU: 1 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 26.498154] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.498351] Hardware name: linux,dummy-virt (DT) [ 26.498406] Call trace: [ 26.498456] show_stack+0x20/0x38 (C) [ 26.498532] dump_stack_lvl+0x8c/0xd0 [ 26.498645] print_report+0x118/0x608 [ 26.498701] kasan_report+0xdc/0x128 [ 26.498746] __asan_report_store1_noabort+0x20/0x30 [ 26.498809] krealloc_less_oob_helper+0xa48/0xc50 [ 26.498856] krealloc_large_less_oob+0x20/0x38 [ 26.498905] kunit_try_run_case+0x170/0x3f0 [ 26.499080] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.499168] kthread+0x328/0x630 [ 26.499228] ret_from_fork+0x10/0x20 [ 26.499300] [ 26.499339] The buggy address belongs to the physical page: [ 26.499407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107824 [ 26.499466] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.499570] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.499647] page_type: f8(unknown) [ 26.499701] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.499749] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.499907] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.499974] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.500258] head: 0bfffe0000000002 ffffc1ffc31e0901 00000000ffffffff 00000000ffffffff [ 26.500339] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 26.500377] page dumped because: kasan: bad access detected [ 26.500564] [ 26.500583] Memory state around the buggy address: [ 26.500828] fff00000c7825f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.500901] fff00000c7826000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.500987] >fff00000c7826080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 26.501104] ^ [ 26.501138] fff00000c7826100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.501324] fff00000c7826180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.501470] ================================================================== [ 26.466552] ================================================================== [ 26.466640] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 26.466690] Write of size 1 at addr fff00000c470f6ea by task kunit_try_catch/170 [ 26.466737] [ 26.466765] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 26.466843] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.466868] Hardware name: linux,dummy-virt (DT) [ 26.466917] Call trace: [ 26.467051] show_stack+0x20/0x38 (C) [ 26.467133] dump_stack_lvl+0x8c/0xd0 [ 26.467266] print_report+0x118/0x608 [ 26.467354] kasan_report+0xdc/0x128 [ 26.467413] __asan_report_store1_noabort+0x20/0x30 [ 26.467730] krealloc_less_oob_helper+0xae4/0xc50 [ 26.467790] krealloc_less_oob+0x20/0x38 [ 26.467944] kunit_try_run_case+0x170/0x3f0 [ 26.468228] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.468380] kthread+0x328/0x630 [ 26.468562] ret_from_fork+0x10/0x20 [ 26.468681] [ 26.468749] Allocated by task 170: [ 26.468865] kasan_save_stack+0x3c/0x68 [ 26.468934] kasan_save_track+0x20/0x40 [ 26.469092] kasan_save_alloc_info+0x40/0x58 [ 26.469186] __kasan_krealloc+0x118/0x178 [ 26.469226] krealloc_noprof+0x128/0x360 [ 26.469261] krealloc_less_oob_helper+0x168/0xc50 [ 26.469299] krealloc_less_oob+0x20/0x38 [ 26.469438] kunit_try_run_case+0x170/0x3f0 [ 26.469593] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.469638] kthread+0x328/0x630 [ 26.469886] ret_from_fork+0x10/0x20 [ 26.469935] [ 26.470022] The buggy address belongs to the object at fff00000c470f600 [ 26.470022] which belongs to the cache kmalloc-256 of size 256 [ 26.470149] The buggy address is located 33 bytes to the right of [ 26.470149] allocated 201-byte region [fff00000c470f600, fff00000c470f6c9) [ 26.470232] [ 26.470259] The buggy address belongs to the physical page: [ 26.470356] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10470e [ 26.470481] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.470863] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.471026] page_type: f5(slab) [ 26.471111] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 26.471220] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.471317] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 26.471470] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.471584] head: 0bfffe0000000001 ffffc1ffc311c381 00000000ffffffff 00000000ffffffff [ 26.471634] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 26.471847] page dumped because: kasan: bad access detected [ 26.471893] [ 26.471910] Memory state around the buggy address: [ 26.472030] fff00000c470f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.472072] fff00000c470f600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.472113] >fff00000c470f680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 26.472148] ^ [ 26.472420] fff00000c470f700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.472648] fff00000c470f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.472792] ================================================================== [ 26.461556] ================================================================== [ 26.461628] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 26.461706] Write of size 1 at addr fff00000c470f6da by task kunit_try_catch/170 [ 26.461780] [ 26.461827] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 26.461907] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.461977] Hardware name: linux,dummy-virt (DT) [ 26.462123] Call trace: [ 26.462151] show_stack+0x20/0x38 (C) [ 26.462247] dump_stack_lvl+0x8c/0xd0 [ 26.462314] print_report+0x118/0x608 [ 26.462360] kasan_report+0xdc/0x128 [ 26.462436] __asan_report_store1_noabort+0x20/0x30 [ 26.462496] krealloc_less_oob_helper+0xa80/0xc50 [ 26.462560] krealloc_less_oob+0x20/0x38 [ 26.462605] kunit_try_run_case+0x170/0x3f0 [ 26.462651] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.462701] kthread+0x328/0x630 [ 26.462909] ret_from_fork+0x10/0x20 [ 26.462961] [ 26.462979] Allocated by task 170: [ 26.463038] kasan_save_stack+0x3c/0x68 [ 26.463114] kasan_save_track+0x20/0x40 [ 26.463161] kasan_save_alloc_info+0x40/0x58 [ 26.463237] __kasan_krealloc+0x118/0x178 [ 26.463284] krealloc_noprof+0x128/0x360 [ 26.463320] krealloc_less_oob_helper+0x168/0xc50 [ 26.463376] krealloc_less_oob+0x20/0x38 [ 26.463425] kunit_try_run_case+0x170/0x3f0 [ 26.463460] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.463713] kthread+0x328/0x630 [ 26.463804] ret_from_fork+0x10/0x20 [ 26.463862] [ 26.463963] The buggy address belongs to the object at fff00000c470f600 [ 26.463963] which belongs to the cache kmalloc-256 of size 256 [ 26.464071] The buggy address is located 17 bytes to the right of [ 26.464071] allocated 201-byte region [fff00000c470f600, fff00000c470f6c9) [ 26.464170] [ 26.464197] The buggy address belongs to the physical page: [ 26.464255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10470e [ 26.464305] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.464349] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.464407] page_type: f5(slab) [ 26.464443] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 26.464490] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.464538] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 26.464725] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.464832] head: 0bfffe0000000001 ffffc1ffc311c381 00000000ffffffff 00000000ffffffff [ 26.464925] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 26.465022] page dumped because: kasan: bad access detected [ 26.465074] [ 26.465156] Memory state around the buggy address: [ 26.465205] fff00000c470f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.465246] fff00000c470f600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.465503] >fff00000c470f680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 26.465623] ^ [ 26.465708] fff00000c470f700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.465766] fff00000c470f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.465810] ================================================================== [ 26.447407] ================================================================== [ 26.447819] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 26.447903] Write of size 1 at addr fff00000c470f6c9 by task kunit_try_catch/170 [ 26.448008] [ 26.448088] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 26.448191] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.448216] Hardware name: linux,dummy-virt (DT) [ 26.448249] Call trace: [ 26.448272] show_stack+0x20/0x38 (C) [ 26.448375] dump_stack_lvl+0x8c/0xd0 [ 26.448580] print_report+0x118/0x608 [ 26.448684] kasan_report+0xdc/0x128 [ 26.448730] __asan_report_store1_noabort+0x20/0x30 [ 26.448923] krealloc_less_oob_helper+0xa48/0xc50 [ 26.449068] krealloc_less_oob+0x20/0x38 [ 26.449209] kunit_try_run_case+0x170/0x3f0 [ 26.449329] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.449464] kthread+0x328/0x630 [ 26.449613] ret_from_fork+0x10/0x20 [ 26.449700] [ 26.449782] Allocated by task 170: [ 26.449869] kasan_save_stack+0x3c/0x68 [ 26.449999] kasan_save_track+0x20/0x40 [ 26.450092] kasan_save_alloc_info+0x40/0x58 [ 26.450179] __kasan_krealloc+0x118/0x178 [ 26.450301] krealloc_noprof+0x128/0x360 [ 26.450340] krealloc_less_oob_helper+0x168/0xc50 [ 26.450411] krealloc_less_oob+0x20/0x38 [ 26.450446] kunit_try_run_case+0x170/0x3f0 [ 26.450495] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.450747] kthread+0x328/0x630 [ 26.450845] ret_from_fork+0x10/0x20 [ 26.450970] [ 26.451030] The buggy address belongs to the object at fff00000c470f600 [ 26.451030] which belongs to the cache kmalloc-256 of size 256 [ 26.451104] The buggy address is located 0 bytes to the right of [ 26.451104] allocated 201-byte region [fff00000c470f600, fff00000c470f6c9) [ 26.451327] [ 26.451602] The buggy address belongs to the physical page: [ 26.451723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10470e [ 26.451797] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.451843] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.452218] page_type: f5(slab) [ 26.452322] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 26.452371] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.452578] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 26.452798] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.452915] head: 0bfffe0000000001 ffffc1ffc311c381 00000000ffffffff 00000000ffffffff [ 26.453076] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 26.453135] page dumped because: kasan: bad access detected [ 26.453427] [ 26.453521] Memory state around the buggy address: [ 26.453581] fff00000c470f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.453656] fff00000c470f600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.453762] >fff00000c470f680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 26.453799] ^ [ 26.453878] fff00000c470f700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.454164] fff00000c470f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.454325] ================================================================== [ 26.473634] ================================================================== [ 26.473729] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 26.473799] Write of size 1 at addr fff00000c470f6eb by task kunit_try_catch/170 [ 26.473873] [ 26.473902] CPU: 1 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 26.473981] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.474012] Hardware name: linux,dummy-virt (DT) [ 26.474042] Call trace: [ 26.474062] show_stack+0x20/0x38 (C) [ 26.474117] dump_stack_lvl+0x8c/0xd0 [ 26.474173] print_report+0x118/0x608 [ 26.474219] kasan_report+0xdc/0x128 [ 26.474262] __asan_report_store1_noabort+0x20/0x30 [ 26.474308] krealloc_less_oob_helper+0xa58/0xc50 [ 26.474355] krealloc_less_oob+0x20/0x38 [ 26.474410] kunit_try_run_case+0x170/0x3f0 [ 26.474457] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.474507] kthread+0x328/0x630 [ 26.474549] ret_from_fork+0x10/0x20 [ 26.474595] [ 26.474618] Allocated by task 170: [ 26.474645] kasan_save_stack+0x3c/0x68 [ 26.474693] kasan_save_track+0x20/0x40 [ 26.474730] kasan_save_alloc_info+0x40/0x58 [ 26.474771] __kasan_krealloc+0x118/0x178 [ 26.474808] krealloc_noprof+0x128/0x360 [ 26.474844] krealloc_less_oob_helper+0x168/0xc50 [ 26.474882] krealloc_less_oob+0x20/0x38 [ 26.474917] kunit_try_run_case+0x170/0x3f0 [ 26.474961] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.475004] kthread+0x328/0x630 [ 26.475035] ret_from_fork+0x10/0x20 [ 26.475069] [ 26.475087] The buggy address belongs to the object at fff00000c470f600 [ 26.475087] which belongs to the cache kmalloc-256 of size 256 [ 26.475146] The buggy address is located 34 bytes to the right of [ 26.475146] allocated 201-byte region [fff00000c470f600, fff00000c470f6c9) [ 26.475207] [ 26.475225] The buggy address belongs to the physical page: [ 26.475254] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10470e [ 26.475310] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.475363] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.475422] page_type: f5(slab) [ 26.475461] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 26.475640] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.475695] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 26.475741] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.476028] head: 0bfffe0000000001 ffffc1ffc311c381 00000000ffffffff 00000000ffffffff [ 26.476130] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 26.476169] page dumped because: kasan: bad access detected [ 26.476199] [ 26.476284] Memory state around the buggy address: [ 26.476333] fff00000c470f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.476375] fff00000c470f600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.476425] >fff00000c470f680: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 26.476461] ^ [ 26.476496] fff00000c470f700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.476536] fff00000c470f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.476574] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 26.428875] ================================================================== [ 26.428937] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 26.429004] Write of size 1 at addr fff00000c470f4eb by task kunit_try_catch/168 [ 26.429052] [ 26.429085] CPU: 1 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 26.429166] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.429191] Hardware name: linux,dummy-virt (DT) [ 26.429221] Call trace: [ 26.429270] show_stack+0x20/0x38 (C) [ 26.429320] dump_stack_lvl+0x8c/0xd0 [ 26.429366] print_report+0x118/0x608 [ 26.429426] kasan_report+0xdc/0x128 [ 26.429481] __asan_report_store1_noabort+0x20/0x30 [ 26.429528] krealloc_more_oob_helper+0x60c/0x678 [ 26.429575] krealloc_more_oob+0x20/0x38 [ 26.429618] kunit_try_run_case+0x170/0x3f0 [ 26.429666] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.429716] kthread+0x328/0x630 [ 26.429757] ret_from_fork+0x10/0x20 [ 26.429804] [ 26.429827] Allocated by task 168: [ 26.429855] kasan_save_stack+0x3c/0x68 [ 26.429894] kasan_save_track+0x20/0x40 [ 26.429931] kasan_save_alloc_info+0x40/0x58 [ 26.429966] __kasan_krealloc+0x118/0x178 [ 26.430002] krealloc_noprof+0x128/0x360 [ 26.430039] krealloc_more_oob_helper+0x168/0x678 [ 26.430076] krealloc_more_oob+0x20/0x38 [ 26.430120] kunit_try_run_case+0x170/0x3f0 [ 26.430172] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.430214] kthread+0x328/0x630 [ 26.430250] ret_from_fork+0x10/0x20 [ 26.430293] [ 26.430322] The buggy address belongs to the object at fff00000c470f400 [ 26.430322] which belongs to the cache kmalloc-256 of size 256 [ 26.430379] The buggy address is located 0 bytes to the right of [ 26.430379] allocated 235-byte region [fff00000c470f400, fff00000c470f4eb) [ 26.430449] [ 26.430468] The buggy address belongs to the physical page: [ 26.430500] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10470e [ 26.430550] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.430595] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.430645] page_type: f5(slab) [ 26.430681] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 26.431117] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.431178] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 26.431225] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.431271] head: 0bfffe0000000001 ffffc1ffc311c381 00000000ffffffff 00000000ffffffff [ 26.431317] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 26.431356] page dumped because: kasan: bad access detected [ 26.431658] [ 26.431687] Memory state around the buggy address: [ 26.431769] fff00000c470f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.431813] fff00000c470f400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.431890] >fff00000c470f480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 26.431928] ^ [ 26.431972] fff00000c470f500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.432081] fff00000c470f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.432245] ================================================================== [ 26.488923] ================================================================== [ 26.489076] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 26.489134] Write of size 1 at addr fff00000c78260f0 by task kunit_try_catch/172 [ 26.489180] [ 26.489207] CPU: 1 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 26.489289] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.489484] Hardware name: linux,dummy-virt (DT) [ 26.489554] Call trace: [ 26.489614] show_stack+0x20/0x38 (C) [ 26.489676] dump_stack_lvl+0x8c/0xd0 [ 26.489760] print_report+0x118/0x608 [ 26.489836] kasan_report+0xdc/0x128 [ 26.489890] __asan_report_store1_noabort+0x20/0x30 [ 26.489937] krealloc_more_oob_helper+0x5c0/0x678 [ 26.489984] krealloc_large_more_oob+0x20/0x38 [ 26.490030] kunit_try_run_case+0x170/0x3f0 [ 26.490078] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.490145] kthread+0x328/0x630 [ 26.490185] ret_from_fork+0x10/0x20 [ 26.490239] [ 26.490259] The buggy address belongs to the physical page: [ 26.490290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107824 [ 26.490338] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.490390] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.490644] page_type: f8(unknown) [ 26.490826] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.490930] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.490980] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.491075] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.491136] head: 0bfffe0000000002 ffffc1ffc31e0901 00000000ffffffff 00000000ffffffff [ 26.491182] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 26.491219] page dumped because: kasan: bad access detected [ 26.491321] [ 26.491343] Memory state around the buggy address: [ 26.491626] fff00000c7825f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.491720] fff00000c7826000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.491789] >fff00000c7826080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 26.491825] ^ [ 26.491893] fff00000c7826100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.492032] fff00000c7826180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.492152] ================================================================== [ 26.432955] ================================================================== [ 26.433001] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 26.433051] Write of size 1 at addr fff00000c470f4f0 by task kunit_try_catch/168 [ 26.433099] [ 26.433127] CPU: 1 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 26.433207] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.433232] Hardware name: linux,dummy-virt (DT) [ 26.433261] Call trace: [ 26.433282] show_stack+0x20/0x38 (C) [ 26.433327] dump_stack_lvl+0x8c/0xd0 [ 26.433436] print_report+0x118/0x608 [ 26.433609] kasan_report+0xdc/0x128 [ 26.433771] __asan_report_store1_noabort+0x20/0x30 [ 26.433906] krealloc_more_oob_helper+0x5c0/0x678 [ 26.433993] krealloc_more_oob+0x20/0x38 [ 26.434061] kunit_try_run_case+0x170/0x3f0 [ 26.434137] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.434256] kthread+0x328/0x630 [ 26.434458] ret_from_fork+0x10/0x20 [ 26.434611] [ 26.434629] Allocated by task 168: [ 26.434654] kasan_save_stack+0x3c/0x68 [ 26.434936] kasan_save_track+0x20/0x40 [ 26.435104] kasan_save_alloc_info+0x40/0x58 [ 26.435283] __kasan_krealloc+0x118/0x178 [ 26.435497] krealloc_noprof+0x128/0x360 [ 26.435655] krealloc_more_oob_helper+0x168/0x678 [ 26.435693] krealloc_more_oob+0x20/0x38 [ 26.435762] kunit_try_run_case+0x170/0x3f0 [ 26.435800] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.435842] kthread+0x328/0x630 [ 26.436112] ret_from_fork+0x10/0x20 [ 26.436157] [ 26.436188] The buggy address belongs to the object at fff00000c470f400 [ 26.436188] which belongs to the cache kmalloc-256 of size 256 [ 26.436249] The buggy address is located 5 bytes to the right of [ 26.436249] allocated 235-byte region [fff00000c470f400, fff00000c470f4eb) [ 26.436308] [ 26.436327] The buggy address belongs to the physical page: [ 26.436588] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10470e [ 26.436672] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.436781] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.436946] page_type: f5(slab) [ 26.437048] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 26.437189] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.437274] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 26.437676] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.437859] head: 0bfffe0000000001 ffffc1ffc311c381 00000000ffffffff 00000000ffffffff [ 26.437982] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 26.438083] page dumped because: kasan: bad access detected [ 26.438211] [ 26.438251] Memory state around the buggy address: [ 26.438354] fff00000c470f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.438416] fff00000c470f400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.438455] >fff00000c470f480: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 26.438491] ^ [ 26.438883] fff00000c470f500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.438975] fff00000c470f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.439035] ================================================================== [ 26.483275] ================================================================== [ 26.483331] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 26.483421] Write of size 1 at addr fff00000c78260eb by task kunit_try_catch/172 [ 26.483572] [ 26.483662] CPU: 1 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 26.483744] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.484080] Hardware name: linux,dummy-virt (DT) [ 26.484186] Call trace: [ 26.484335] show_stack+0x20/0x38 (C) [ 26.484455] dump_stack_lvl+0x8c/0xd0 [ 26.484595] print_report+0x118/0x608 [ 26.484749] kasan_report+0xdc/0x128 [ 26.484827] __asan_report_store1_noabort+0x20/0x30 [ 26.484913] krealloc_more_oob_helper+0x60c/0x678 [ 26.484961] krealloc_large_more_oob+0x20/0x38 [ 26.485151] kunit_try_run_case+0x170/0x3f0 [ 26.485202] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.485254] kthread+0x328/0x630 [ 26.485294] ret_from_fork+0x10/0x20 [ 26.485512] [ 26.485618] The buggy address belongs to the physical page: [ 26.485760] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107824 [ 26.485843] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.485987] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.486138] page_type: f8(unknown) [ 26.486290] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.486388] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.486679] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.486919] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.487066] head: 0bfffe0000000002 ffffc1ffc31e0901 00000000ffffffff 00000000ffffffff [ 26.487216] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 26.487340] page dumped because: kasan: bad access detected [ 26.487509] [ 26.487579] Memory state around the buggy address: [ 26.487611] fff00000c7825f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.487870] fff00000c7826000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.487915] >fff00000c7826080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 26.487951] ^ [ 26.487988] fff00000c7826100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.488027] fff00000c7826180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.488063] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 26.281560] ================================================================== [ 26.281661] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 26.281726] Read of size 1 at addr fff00000c3f9da7f by task kunit_try_catch/150 [ 26.281777] [ 26.281814] CPU: 1 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 26.281908] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.282047] Hardware name: linux,dummy-virt (DT) [ 26.282214] Call trace: [ 26.282259] show_stack+0x20/0x38 (C) [ 26.282365] dump_stack_lvl+0x8c/0xd0 [ 26.282447] print_report+0x118/0x608 [ 26.282492] kasan_report+0xdc/0x128 [ 26.282536] __asan_report_load1_noabort+0x20/0x30 [ 26.282582] kmalloc_oob_left+0x2ec/0x320 [ 26.282625] kunit_try_run_case+0x170/0x3f0 [ 26.282673] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.282724] kthread+0x328/0x630 [ 26.282764] ret_from_fork+0x10/0x20 [ 26.282812] [ 26.282829] Allocated by task 21: [ 26.282857] kasan_save_stack+0x3c/0x68 [ 26.282896] kasan_save_track+0x20/0x40 [ 26.282932] kasan_save_alloc_info+0x40/0x58 [ 26.282966] __kasan_kmalloc+0xd4/0xd8 [ 26.283001] __kmalloc_cache_node_noprof+0x178/0x3d0 [ 26.283042] build_sched_domains+0x32c/0x3768 [ 26.283095] partition_sched_domains+0x79c/0x1098 [ 26.283250] rebuild_sched_domains_locked+0x494/0xde0 [ 26.283326] cpuset_handle_hotplug+0xab0/0x1480 [ 26.283426] cpuset_update_active_cpus+0x18/0x30 [ 26.283561] sched_cpu_activate+0x2d0/0x388 [ 26.283616] cpuhp_invoke_callback+0x5b8/0x1620 [ 26.283657] cpuhp_thread_fun+0x230/0x5d8 [ 26.283693] smpboot_thread_fn+0x2e8/0x760 [ 26.283730] kthread+0x328/0x630 [ 26.283760] ret_from_fork+0x10/0x20 [ 26.283794] [ 26.283823] Freed by task 21: [ 26.283858] kasan_save_stack+0x3c/0x68 [ 26.283926] kasan_save_track+0x20/0x40 [ 26.284030] kasan_save_free_info+0x4c/0x78 [ 26.284084] __kasan_slab_free+0x6c/0x98 [ 26.284129] kfree+0x214/0x3c8 [ 26.284217] build_sched_domains+0x1c64/0x3768 [ 26.284331] partition_sched_domains+0x79c/0x1098 [ 26.284374] rebuild_sched_domains_locked+0x494/0xde0 [ 26.284425] cpuset_handle_hotplug+0xab0/0x1480 [ 26.284460] cpuset_update_active_cpus+0x18/0x30 [ 26.284505] sched_cpu_activate+0x2d0/0x388 [ 26.284588] cpuhp_invoke_callback+0x5b8/0x1620 [ 26.284627] cpuhp_thread_fun+0x230/0x5d8 [ 26.284815] smpboot_thread_fn+0x2e8/0x760 [ 26.284856] kthread+0x328/0x630 [ 26.284886] ret_from_fork+0x10/0x20 [ 26.284930] [ 26.284952] The buggy address belongs to the object at fff00000c3f9da60 [ 26.284952] which belongs to the cache kmalloc-16 of size 16 [ 26.285008] The buggy address is located 15 bytes to the right of [ 26.285008] allocated 16-byte region [fff00000c3f9da60, fff00000c3f9da70) [ 26.285068] [ 26.285088] The buggy address belongs to the physical page: [ 26.285119] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f9d [ 26.285186] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.285341] page_type: f5(slab) [ 26.285380] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 26.285439] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 26.285477] page dumped because: kasan: bad access detected [ 26.285506] [ 26.285524] Memory state around the buggy address: [ 26.285650] fff00000c3f9d900: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 26.285949] fff00000c3f9d980: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 26.286004] >fff00000c3f9da00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.286041] ^ [ 26.286089] fff00000c3f9da80: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.286156] fff00000c3f9db00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.286223] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 26.261594] ================================================================== [ 26.261631] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 26.261671] Read of size 1 at addr fff00000c3fada80 by task kunit_try_catch/148 [ 26.261717] [ 26.261744] CPU: 1 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 26.261822] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.261847] Hardware name: linux,dummy-virt (DT) [ 26.261876] Call trace: [ 26.261896] show_stack+0x20/0x38 (C) [ 26.261940] dump_stack_lvl+0x8c/0xd0 [ 26.261984] print_report+0x118/0x608 [ 26.262029] kasan_report+0xdc/0x128 [ 26.262073] __asan_report_load1_noabort+0x20/0x30 [ 26.262127] kmalloc_oob_right+0x5d0/0x660 [ 26.262172] kunit_try_run_case+0x170/0x3f0 [ 26.262217] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.262268] kthread+0x328/0x630 [ 26.262309] ret_from_fork+0x10/0x20 [ 26.262353] [ 26.262370] Allocated by task 148: [ 26.262498] kasan_save_stack+0x3c/0x68 [ 26.262585] kasan_save_track+0x20/0x40 [ 26.262711] kasan_save_alloc_info+0x40/0x58 [ 26.262768] __kasan_kmalloc+0xd4/0xd8 [ 26.262804] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.262863] kmalloc_oob_right+0xb0/0x660 [ 26.262899] kunit_try_run_case+0x170/0x3f0 [ 26.262938] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.262980] kthread+0x328/0x630 [ 26.263011] ret_from_fork+0x10/0x20 [ 26.263045] [ 26.263119] The buggy address belongs to the object at fff00000c3fada00 [ 26.263119] which belongs to the cache kmalloc-128 of size 128 [ 26.263229] The buggy address is located 13 bytes to the right of [ 26.263229] allocated 115-byte region [fff00000c3fada00, fff00000c3fada73) [ 26.263310] [ 26.263340] The buggy address belongs to the physical page: [ 26.263386] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fad [ 26.263470] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.263538] page_type: f5(slab) [ 26.263575] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 26.263731] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.263911] page dumped because: kasan: bad access detected [ 26.263967] [ 26.263994] Memory state around the buggy address: [ 26.264024] fff00000c3fad980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.264080] fff00000c3fada00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 26.264344] >fff00000c3fada80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.264451] ^ [ 26.264483] fff00000c3fadb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.264820] fff00000c3fadb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.264975] ================================================================== [ 26.258157] ================================================================== [ 26.258298] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 26.258374] Write of size 1 at addr fff00000c3fada78 by task kunit_try_catch/148 [ 26.258464] [ 26.258539] CPU: 1 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 26.258837] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.258864] Hardware name: linux,dummy-virt (DT) [ 26.258961] Call trace: [ 26.258995] show_stack+0x20/0x38 (C) [ 26.259042] dump_stack_lvl+0x8c/0xd0 [ 26.259262] print_report+0x118/0x608 [ 26.259482] kasan_report+0xdc/0x128 [ 26.259542] __asan_report_store1_noabort+0x20/0x30 [ 26.259592] kmalloc_oob_right+0x538/0x660 [ 26.259639] kunit_try_run_case+0x170/0x3f0 [ 26.259727] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.259780] kthread+0x328/0x630 [ 26.260248] ret_from_fork+0x10/0x20 [ 26.260315] [ 26.260334] Allocated by task 148: [ 26.260361] kasan_save_stack+0x3c/0x68 [ 26.260412] kasan_save_track+0x20/0x40 [ 26.260448] kasan_save_alloc_info+0x40/0x58 [ 26.260483] __kasan_kmalloc+0xd4/0xd8 [ 26.260519] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.260558] kmalloc_oob_right+0xb0/0x660 [ 26.260594] kunit_try_run_case+0x170/0x3f0 [ 26.260631] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.260674] kthread+0x328/0x630 [ 26.260706] ret_from_fork+0x10/0x20 [ 26.260744] [ 26.260763] The buggy address belongs to the object at fff00000c3fada00 [ 26.260763] which belongs to the cache kmalloc-128 of size 128 [ 26.260818] The buggy address is located 5 bytes to the right of [ 26.260818] allocated 115-byte region [fff00000c3fada00, fff00000c3fada73) [ 26.260879] [ 26.260899] The buggy address belongs to the physical page: [ 26.260928] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fad [ 26.260977] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.261023] page_type: f5(slab) [ 26.261059] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 26.261106] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.261145] page dumped because: kasan: bad access detected [ 26.261174] [ 26.261190] Memory state around the buggy address: [ 26.261219] fff00000c3fad900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.261260] fff00000c3fad980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.261300] >fff00000c3fada00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 26.261335] ^ [ 26.261372] fff00000c3fada80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.261422] fff00000c3fadb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.261457] ================================================================== [ 26.251341] ================================================================== [ 26.251702] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 26.252609] Write of size 1 at addr fff00000c3fada73 by task kunit_try_catch/148 [ 26.252716] [ 26.253475] CPU: 1 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 26.253621] Tainted: [N]=TEST [ 26.253655] Hardware name: linux,dummy-virt (DT) [ 26.253870] Call trace: [ 26.254043] show_stack+0x20/0x38 (C) [ 26.254184] dump_stack_lvl+0x8c/0xd0 [ 26.254238] print_report+0x118/0x608 [ 26.254286] kasan_report+0xdc/0x128 [ 26.254331] __asan_report_store1_noabort+0x20/0x30 [ 26.254378] kmalloc_oob_right+0x5a4/0x660 [ 26.254436] kunit_try_run_case+0x170/0x3f0 [ 26.254487] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.254539] kthread+0x328/0x630 [ 26.254582] ret_from_fork+0x10/0x20 [ 26.254741] [ 26.254779] Allocated by task 148: [ 26.254892] kasan_save_stack+0x3c/0x68 [ 26.254948] kasan_save_track+0x20/0x40 [ 26.254986] kasan_save_alloc_info+0x40/0x58 [ 26.255022] __kasan_kmalloc+0xd4/0xd8 [ 26.255058] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.255098] kmalloc_oob_right+0xb0/0x660 [ 26.255134] kunit_try_run_case+0x170/0x3f0 [ 26.255170] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.255213] kthread+0x328/0x630 [ 26.255243] ret_from_fork+0x10/0x20 [ 26.255295] [ 26.255352] The buggy address belongs to the object at fff00000c3fada00 [ 26.255352] which belongs to the cache kmalloc-128 of size 128 [ 26.255453] The buggy address is located 0 bytes to the right of [ 26.255453] allocated 115-byte region [fff00000c3fada00, fff00000c3fada73) [ 26.255518] [ 26.255597] The buggy address belongs to the physical page: [ 26.255793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fad [ 26.256116] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.256421] page_type: f5(slab) [ 26.256708] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 26.256770] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.256873] page dumped because: kasan: bad access detected [ 26.256912] [ 26.256938] Memory state around the buggy address: [ 26.257149] fff00000c3fad900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.257211] fff00000c3fad980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.257263] >fff00000c3fada00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 26.257315] ^ [ 26.257407] fff00000c3fada80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.257448] fff00000c3fadb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.257509] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[ 26.381502] ================================================================== [ 26.381588] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 26.381654] Free of addr fff00000c7820001 by task kunit_try_catch/162 [ 26.381934] [ 26.382038] CPU: 1 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 26.382636] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.382780] Hardware name: linux,dummy-virt (DT) [ 26.382878] Call trace: [ 26.382902] show_stack+0x20/0x38 (C) [ 26.383145] dump_stack_lvl+0x8c/0xd0 [ 26.383209] print_report+0x118/0x608 [ 26.383312] kasan_report_invalid_free+0xc0/0xe8 [ 26.383361] __kasan_kfree_large+0x5c/0xa8 [ 26.383711] free_large_kmalloc+0x68/0x150 [ 26.383796] kfree+0x270/0x3c8 [ 26.383882] kmalloc_large_invalid_free+0x108/0x270 [ 26.384027] kunit_try_run_case+0x170/0x3f0 [ 26.384093] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.384306] kthread+0x328/0x630 [ 26.384377] ret_from_fork+0x10/0x20 [ 26.384543] [ 26.384638] The buggy address belongs to the physical page: [ 26.384671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107820 [ 26.384723] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.384799] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.384966] page_type: f8(unknown) [ 26.385038] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.385559] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.385803] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.385945] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.386045] head: 0bfffe0000000002 ffffc1ffc31e0801 00000000ffffffff 00000000ffffffff [ 26.386715] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 26.387054] page dumped because: kasan: bad access detected [ 26.387119] [ 26.387138] Memory state around the buggy address: [ 26.387173] fff00000c781ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.387216] fff00000c781ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.387258] >fff00000c7820000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.387294] ^ [ 26.387322] fff00000c7820080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.388517] fff00000c7820100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.389083] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 26.367225] ================================================================== [ 26.367357] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 26.367647] Read of size 1 at addr fff00000c7820000 by task kunit_try_catch/160 [ 26.367854] [ 26.367948] CPU: 1 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 26.368182] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.368214] Hardware name: linux,dummy-virt (DT) [ 26.368246] Call trace: [ 26.368563] show_stack+0x20/0x38 (C) [ 26.368620] dump_stack_lvl+0x8c/0xd0 [ 26.368867] print_report+0x118/0x608 [ 26.368927] kasan_report+0xdc/0x128 [ 26.369097] __asan_report_load1_noabort+0x20/0x30 [ 26.369147] kmalloc_large_uaf+0x2cc/0x2f8 [ 26.369191] kunit_try_run_case+0x170/0x3f0 [ 26.369241] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.369293] kthread+0x328/0x630 [ 26.369334] ret_from_fork+0x10/0x20 [ 26.369380] [ 26.369422] The buggy address belongs to the physical page: [ 26.369453] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107820 [ 26.369678] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.370033] raw: 0bfffe0000000000 ffffc1ffc31e0908 fff00000da488c80 0000000000000000 [ 26.370087] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 26.370130] page dumped because: kasan: bad access detected [ 26.370160] [ 26.370179] Memory state around the buggy address: [ 26.370573] fff00000c781ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.370618] fff00000c781ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.370659] >fff00000c7820000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.370695] ^ [ 26.370997] fff00000c7820080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.371109] fff00000c7820100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.371146] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 26.353754] ================================================================== [ 26.353945] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 26.354119] Write of size 1 at addr fff00000c667600a by task kunit_try_catch/158 [ 26.354186] [ 26.354248] CPU: 1 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 26.354334] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.354666] Hardware name: linux,dummy-virt (DT) [ 26.354708] Call trace: [ 26.354802] show_stack+0x20/0x38 (C) [ 26.354852] dump_stack_lvl+0x8c/0xd0 [ 26.354899] print_report+0x118/0x608 [ 26.354945] kasan_report+0xdc/0x128 [ 26.354989] __asan_report_store1_noabort+0x20/0x30 [ 26.355035] kmalloc_large_oob_right+0x278/0x2b8 [ 26.355080] kunit_try_run_case+0x170/0x3f0 [ 26.355129] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.355180] kthread+0x328/0x630 [ 26.355220] ret_from_fork+0x10/0x20 [ 26.355273] [ 26.355480] The buggy address belongs to the physical page: [ 26.355655] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106674 [ 26.355733] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.355956] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.356017] page_type: f8(unknown) [ 26.356484] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.356733] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.356786] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.356832] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.356878] head: 0bfffe0000000002 ffffc1ffc3199d01 00000000ffffffff 00000000ffffffff [ 26.356925] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 26.356963] page dumped because: kasan: bad access detected [ 26.356993] [ 26.357411] Memory state around the buggy address: [ 26.357538] fff00000c6675f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.357646] fff00000c6675f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.357716] >fff00000c6676000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.357752] ^ [ 26.357780] fff00000c6676080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.357821] fff00000c6676100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.358012] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 26.335272] ================================================================== [ 26.335583] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 26.335755] Write of size 1 at addr fff00000c7931f00 by task kunit_try_catch/156 [ 26.335805] [ 26.335839] CPU: 1 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 26.335932] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.336009] Hardware name: linux,dummy-virt (DT) [ 26.336247] Call trace: [ 26.336274] show_stack+0x20/0x38 (C) [ 26.336354] dump_stack_lvl+0x8c/0xd0 [ 26.336414] print_report+0x118/0x608 [ 26.336602] kasan_report+0xdc/0x128 [ 26.336827] __asan_report_store1_noabort+0x20/0x30 [ 26.336882] kmalloc_big_oob_right+0x2a4/0x2f0 [ 26.337040] kunit_try_run_case+0x170/0x3f0 [ 26.337087] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.337172] kthread+0x328/0x630 [ 26.337246] ret_from_fork+0x10/0x20 [ 26.337307] [ 26.337392] Allocated by task 156: [ 26.337429] kasan_save_stack+0x3c/0x68 [ 26.337469] kasan_save_track+0x20/0x40 [ 26.337657] kasan_save_alloc_info+0x40/0x58 [ 26.337931] __kasan_kmalloc+0xd4/0xd8 [ 26.337977] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.338019] kmalloc_big_oob_right+0xb8/0x2f0 [ 26.338070] kunit_try_run_case+0x170/0x3f0 [ 26.338113] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.338157] kthread+0x328/0x630 [ 26.338480] ret_from_fork+0x10/0x20 [ 26.338622] [ 26.338668] The buggy address belongs to the object at fff00000c7930000 [ 26.338668] which belongs to the cache kmalloc-8k of size 8192 [ 26.338725] The buggy address is located 0 bytes to the right of [ 26.338725] allocated 7936-byte region [fff00000c7930000, fff00000c7931f00) [ 26.338985] [ 26.339097] The buggy address belongs to the physical page: [ 26.339137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107930 [ 26.339199] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.339388] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.339631] page_type: f5(slab) [ 26.339753] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 26.340019] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 26.340232] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 26.340286] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 26.340332] head: 0bfffe0000000003 ffffc1ffc31e4c01 00000000ffffffff 00000000ffffffff [ 26.340378] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 26.340427] page dumped because: kasan: bad access detected [ 26.340458] [ 26.340477] Memory state around the buggy address: [ 26.340509] fff00000c7931e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.340571] fff00000c7931e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.340613] >fff00000c7931f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.340649] ^ [ 26.340814] fff00000c7931f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.341108] fff00000c7932000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.341148] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[ 26.322123] ================================================================== [ 26.322503] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488 [ 26.322791] Write of size 1 at addr fff00000c3fadc78 by task kunit_try_catch/154 [ 26.322985] [ 26.323015] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 26.323326] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.323416] Hardware name: linux,dummy-virt (DT) [ 26.323445] Call trace: [ 26.323466] show_stack+0x20/0x38 (C) [ 26.323706] dump_stack_lvl+0x8c/0xd0 [ 26.323982] print_report+0x118/0x608 [ 26.324041] kasan_report+0xdc/0x128 [ 26.324086] __asan_report_store1_noabort+0x20/0x30 [ 26.324133] kmalloc_track_caller_oob_right+0x418/0x488 [ 26.324182] kunit_try_run_case+0x170/0x3f0 [ 26.324231] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.324282] kthread+0x328/0x630 [ 26.324323] ret_from_fork+0x10/0x20 [ 26.324369] [ 26.324422] Allocated by task 154: [ 26.324451] kasan_save_stack+0x3c/0x68 [ 26.324758] kasan_save_track+0x20/0x40 [ 26.324824] kasan_save_alloc_info+0x40/0x58 [ 26.324860] __kasan_kmalloc+0xd4/0xd8 [ 26.324895] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 26.325108] kmalloc_track_caller_oob_right+0x184/0x488 [ 26.325209] kunit_try_run_case+0x170/0x3f0 [ 26.325253] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.325295] kthread+0x328/0x630 [ 26.325325] ret_from_fork+0x10/0x20 [ 26.325370] [ 26.325470] The buggy address belongs to the object at fff00000c3fadc00 [ 26.325470] which belongs to the cache kmalloc-128 of size 128 [ 26.325527] The buggy address is located 0 bytes to the right of [ 26.325527] allocated 120-byte region [fff00000c3fadc00, fff00000c3fadc78) [ 26.325587] [ 26.325607] The buggy address belongs to the physical page: [ 26.325698] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fad [ 26.325749] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.325794] page_type: f5(slab) [ 26.325830] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 26.325878] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.325917] page dumped because: kasan: bad access detected [ 26.325955] [ 26.325972] Memory state around the buggy address: [ 26.326001] fff00000c3fadb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.326441] fff00000c3fadb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.326558] >fff00000c3fadc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 26.326594] ^ [ 26.326632] fff00000c3fadc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.326852] fff00000c3fadd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.326929] ================================================================== [ 26.314764] ================================================================== [ 26.314940] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 26.315215] Write of size 1 at addr fff00000c3fadb78 by task kunit_try_catch/154 [ 26.315297] [ 26.315334] CPU: 1 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 26.315910] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.316119] Hardware name: linux,dummy-virt (DT) [ 26.316368] Call trace: [ 26.316405] show_stack+0x20/0x38 (C) [ 26.316460] dump_stack_lvl+0x8c/0xd0 [ 26.316674] print_report+0x118/0x608 [ 26.316781] kasan_report+0xdc/0x128 [ 26.316827] __asan_report_store1_noabort+0x20/0x30 [ 26.316940] kmalloc_track_caller_oob_right+0x40c/0x488 [ 26.317089] kunit_try_run_case+0x170/0x3f0 [ 26.317586] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.317676] kthread+0x328/0x630 [ 26.317746] ret_from_fork+0x10/0x20 [ 26.317944] [ 26.317963] Allocated by task 154: [ 26.317993] kasan_save_stack+0x3c/0x68 [ 26.318033] kasan_save_track+0x20/0x40 [ 26.318069] kasan_save_alloc_info+0x40/0x58 [ 26.318114] __kasan_kmalloc+0xd4/0xd8 [ 26.318160] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 26.318204] kmalloc_track_caller_oob_right+0xa8/0x488 [ 26.318602] kunit_try_run_case+0x170/0x3f0 [ 26.318737] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.318837] kthread+0x328/0x630 [ 26.318878] ret_from_fork+0x10/0x20 [ 26.318988] [ 26.319007] The buggy address belongs to the object at fff00000c3fadb00 [ 26.319007] which belongs to the cache kmalloc-128 of size 128 [ 26.319064] The buggy address is located 0 bytes to the right of [ 26.319064] allocated 120-byte region [fff00000c3fadb00, fff00000c3fadb78) [ 26.319124] [ 26.319144] The buggy address belongs to the physical page: [ 26.319175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103fad [ 26.319235] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.319282] page_type: f5(slab) [ 26.319574] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 26.319837] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.320014] page dumped because: kasan: bad access detected [ 26.320045] [ 26.320101] Memory state around the buggy address: [ 26.320161] fff00000c3fada00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.320202] fff00000c3fada80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.320243] >fff00000c3fadb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 26.320278] ^ [ 26.320500] fff00000c3fadb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.320565] fff00000c3fadc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.320601] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 26.295751] ================================================================== [ 26.295823] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 26.296241] Read of size 1 at addr fff00000c7901000 by task kunit_try_catch/152 [ 26.296550] [ 26.296611] CPU: 1 UID: 0 PID: 152 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 26.296730] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.296758] Hardware name: linux,dummy-virt (DT) [ 26.296788] Call trace: [ 26.296811] show_stack+0x20/0x38 (C) [ 26.296862] dump_stack_lvl+0x8c/0xd0 [ 26.297479] print_report+0x118/0x608 [ 26.297560] kasan_report+0xdc/0x128 [ 26.297794] __asan_report_load1_noabort+0x20/0x30 [ 26.297976] kmalloc_node_oob_right+0x2f4/0x330 [ 26.298108] kunit_try_run_case+0x170/0x3f0 [ 26.298160] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.298239] kthread+0x328/0x630 [ 26.298281] ret_from_fork+0x10/0x20 [ 26.298629] [ 26.299165] Allocated by task 152: [ 26.299411] kasan_save_stack+0x3c/0x68 [ 26.299627] kasan_save_track+0x20/0x40 [ 26.299704] kasan_save_alloc_info+0x40/0x58 [ 26.299775] __kasan_kmalloc+0xd4/0xd8 [ 26.299811] __kmalloc_cache_node_noprof+0x178/0x3d0 [ 26.299853] kmalloc_node_oob_right+0xbc/0x330 [ 26.299953] kunit_try_run_case+0x170/0x3f0 [ 26.300239] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.300283] kthread+0x328/0x630 [ 26.300313] ret_from_fork+0x10/0x20 [ 26.300464] [ 26.300641] The buggy address belongs to the object at fff00000c7900000 [ 26.300641] which belongs to the cache kmalloc-4k of size 4096 [ 26.300729] The buggy address is located 0 bytes to the right of [ 26.300729] allocated 4096-byte region [fff00000c7900000, fff00000c7901000) [ 26.300904] [ 26.300932] The buggy address belongs to the physical page: [ 26.301005] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107900 [ 26.301254] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.301528] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.301630] page_type: f5(slab) [ 26.301670] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 26.301717] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 26.301772] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 26.301818] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 26.301865] head: 0bfffe0000000003 ffffc1ffc31e4001 00000000ffffffff 00000000ffffffff [ 26.301911] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 26.301997] page dumped because: kasan: bad access detected [ 26.302027] [ 26.302045] Memory state around the buggy address: [ 26.302082] fff00000c7900f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.302240] fff00000c7900f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.302320] >fff00000c7901000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.302368] ^ [ 26.302403] fff00000c7901080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.302443] fff00000c7901100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.302479] ==================================================================
Failure - log-parser-boot - exception-warning-libmathint_log-at-intlog10
------------[ cut here ]------------ [ 105.306310] WARNING: lib/math/int_log.c:120 at intlog10+0x38/0x48, CPU#0: kunit_try_catch/670 [ 105.307251] Modules linked in: [ 105.307499] CPU: 0 UID: 0 PID: 670 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 105.308649] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 105.308962] Hardware name: linux,dummy-virt (DT) [ 105.309712] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 105.310465] pc : intlog10+0x38/0x48 [ 105.310809] lr : intlog10_test+0xe4/0x200 [ 105.311013] sp : ffff8000824c7c10 [ 105.311171] x29: ffff8000824c7c90 x28: 0000000000000000 x27: 0000000000000000 [ 105.311544] x26: 1ffe000018c3ad21 x25: 0000000000000000 x24: ffff8000824c7ce0 [ 105.312409] x23: ffff8000824c7d00 x22: 0000000000000000 x21: 1ffff00010498f82 [ 105.312970] x20: ffff9ec8af9fcae0 x19: ffff800080087990 x18: 000000003af64f93 [ 105.313411] x17: 00000000cc1cefff x16: 0000000074f35340 x15: 00000000bc0dbbac [ 105.313851] x14: 0000000090b3b1a1 x13: 00000000c4a44370 x12: ffff73d916712189 [ 105.314216] x11: 1ffff3d916712188 x10: ffff73d916712188 x9 : ffff9ec8ad03e094 [ 105.314673] x8 : ffff9ec8b3890c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 105.315091] x5 : ffff700010498f82 x4 : 1ffff00010010f3b x3 : 1ffff3d915f3f95c [ 105.315508] x2 : 1ffff3d915f3f95c x1 : 0000000000000003 x0 : 0000000000000000 [ 105.315923] Call trace: [ 105.316273] intlog10+0x38/0x48 (P) [ 105.316500] kunit_try_run_case+0x170/0x3f0 [ 105.316763] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 105.317067] kthread+0x328/0x630 [ 105.317262] ret_from_fork+0x10/0x20 [ 105.317506] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-libmathint_log-at-intlog2
------------[ cut here ]------------ [ 105.257924] WARNING: lib/math/int_log.c:63 at intlog2+0xd8/0xf8, CPU#1: kunit_try_catch/652 [ 105.263113] Modules linked in: [ 105.263903] CPU: 1 UID: 0 PID: 652 Comm: kunit_try_catch Tainted: G B D N 6.16.0-rc3-next-20250625 #1 PREEMPT [ 105.264850] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 105.265179] Hardware name: linux,dummy-virt (DT) [ 105.265612] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 105.266204] pc : intlog2+0xd8/0xf8 [ 105.266622] lr : intlog2_test+0xe4/0x200 [ 105.267006] sp : ffff8000824b7c10 [ 105.267332] x29: ffff8000824b7c90 x28: 0000000000000000 x27: 0000000000000000 [ 105.268137] x26: 1ffe0000187e6d41 x25: 0000000000000000 x24: ffff8000824b7ce0 [ 105.268850] x23: ffff8000824b7d00 x22: 0000000000000000 x21: 1ffff00010496f82 [ 105.269445] x20: ffff9ec8af9fc9e0 x19: ffff800080087990 x18: 000000002ed1ac3e [ 105.269837] x17: 000000009bf7ebab x16: fff00000c613143c x15: fff00000ff616b08 [ 105.270320] x14: 0000000000018fff x13: 1ffe00001b48c5cd x12: ffff73d916712189 [ 105.270772] x11: 1ffff3d916712188 x10: ffff73d916712188 x9 : ffff9ec8ad03e294 [ 105.271227] x8 : ffff9ec8b3890c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 105.271679] x5 : ffff700010496f82 x4 : 1ffff00010010f3b x3 : 1ffff3d915f3f93c [ 105.272228] x2 : 1ffff3d915f3f93c x1 : 0000000000000003 x0 : 0000000000000000 [ 105.272788] Call trace: [ 105.272968] intlog2+0xd8/0xf8 (P) [ 105.273224] kunit_try_run_case+0x170/0x3f0 [ 105.273501] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 105.273818] kthread+0x328/0x630 [ 105.274053] ret_from_fork+0x10/0x20 [ 105.274336] ---[ end trace 0000000000000000 ]---