Date
June 26, 2025, 9:10 a.m.
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 29.389999] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 29.579256] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 29.567637] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 29.401323] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 29.473754] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 29.309249] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 29.481941] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 29.587365] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 29.463394] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 29.247757] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 29.272834] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
Failure - log-parser-boot - bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[ 29.204662] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_krealloc
[ 61.740813] ================================================================== [ 61.740868] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 61.740868] [ 61.740945] Use-after-free read at 0x00000000175f0895 (in kfence-#164): [ 61.740997] test_krealloc+0x51c/0x830 [ 61.741040] kunit_try_run_case+0x170/0x3f0 [ 61.741101] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.741147] kthread+0x328/0x630 [ 61.741184] ret_from_fork+0x10/0x20 [ 61.741225] [ 61.741247] kfence-#164: 0x00000000175f0895-0x000000008358d7e8, size=32, cache=kmalloc-32 [ 61.741247] [ 61.741302] allocated by task 349 on cpu 1 at 61.740240s (0.001059s ago): [ 61.741372] test_alloc+0x29c/0x628 [ 61.741413] test_krealloc+0xc0/0x830 [ 61.741453] kunit_try_run_case+0x170/0x3f0 [ 61.741493] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.741537] kthread+0x328/0x630 [ 61.741572] ret_from_fork+0x10/0x20 [ 61.741611] [ 61.741634] freed by task 349 on cpu 1 at 61.740441s (0.001190s ago): [ 61.741696] krealloc_noprof+0x148/0x360 [ 61.741736] test_krealloc+0x1dc/0x830 [ 61.741775] kunit_try_run_case+0x170/0x3f0 [ 61.741815] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.741857] kthread+0x328/0x630 [ 61.741893] ret_from_fork+0x10/0x20 [ 61.741930] [ 61.741970] CPU: 1 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 61.742049] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.742090] Hardware name: linux,dummy-virt (DT) [ 61.742124] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_double_free
[ 32.712472] ================================================================== [ 32.712564] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 32.712564] [ 32.712623] Invalid free of 0x0000000005fd3809 (in kfence-#102): [ 32.712676] test_double_free+0x100/0x238 [ 32.712723] kunit_try_run_case+0x170/0x3f0 [ 32.712768] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.712810] kthread+0x328/0x630 [ 32.712850] ret_from_fork+0x10/0x20 [ 32.712888] [ 32.712911] kfence-#102: 0x0000000005fd3809-0x00000000aa42abcf, size=32, cache=test [ 32.712911] [ 32.712964] allocated by task 317 on cpu 1 at 32.712246s (0.000714s ago): [ 32.713026] test_alloc+0x230/0x628 [ 32.713082] test_double_free+0xd4/0x238 [ 32.713123] kunit_try_run_case+0x170/0x3f0 [ 32.713162] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.713206] kthread+0x328/0x630 [ 32.713241] ret_from_fork+0x10/0x20 [ 32.713285] [ 32.713309] freed by task 317 on cpu 1 at 32.712310s (0.000996s ago): [ 32.713373] test_double_free+0xf0/0x238 [ 32.713415] kunit_try_run_case+0x170/0x3f0 [ 32.713454] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.713501] kthread+0x328/0x630 [ 32.713537] ret_from_fork+0x10/0x20 [ 32.713575] [ 32.713617] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 32.713702] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.713731] Hardware name: linux,dummy-virt (DT) [ 32.713764] ================================================================== [ 32.608523] ================================================================== [ 32.608638] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 32.608638] [ 32.608707] Invalid free of 0x000000005a8da5eb (in kfence-#101): [ 32.608772] test_double_free+0x1bc/0x238 [ 32.608819] kunit_try_run_case+0x170/0x3f0 [ 32.608864] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.608908] kthread+0x328/0x630 [ 32.608948] ret_from_fork+0x10/0x20 [ 32.608988] [ 32.609011] kfence-#101: 0x000000005a8da5eb-0x000000008d5feff4, size=32, cache=kmalloc-32 [ 32.609011] [ 32.609083] allocated by task 315 on cpu 0 at 32.608208s (0.000871s ago): [ 32.609147] test_alloc+0x29c/0x628 [ 32.609190] test_double_free+0xd4/0x238 [ 32.609232] kunit_try_run_case+0x170/0x3f0 [ 32.609273] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.609318] kthread+0x328/0x630 [ 32.609352] ret_from_fork+0x10/0x20 [ 32.609392] [ 32.609417] freed by task 315 on cpu 0 at 32.608285s (0.001128s ago): [ 32.609478] test_double_free+0x1ac/0x238 [ 32.609521] kunit_try_run_case+0x170/0x3f0 [ 32.609562] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.609605] kthread+0x328/0x630 [ 32.609642] ret_from_fork+0x10/0x20 [ 32.609682] [ 32.609726] CPU: 0 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 32.609809] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.609837] Hardware name: linux,dummy-virt (DT) [ 32.609869] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[ 61.668224] ================================================================== [ 61.668323] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 61.668323] [ 61.668423] Use-after-free read at 0x0000000018296a5c (in kfence-#163): [ 61.668477] test_memcache_typesafe_by_rcu+0x280/0x560 [ 61.668527] kunit_try_run_case+0x170/0x3f0 [ 61.668574] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.668619] kthread+0x328/0x630 [ 61.668659] ret_from_fork+0x10/0x20 [ 61.668700] [ 61.668724] kfence-#163: 0x0000000018296a5c-0x00000000e4053b35, size=32, cache=test [ 61.668724] [ 61.668777] allocated by task 347 on cpu 0 at 61.636300s (0.032473s ago): [ 61.668849] test_alloc+0x230/0x628 [ 61.668891] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 61.668936] kunit_try_run_case+0x170/0x3f0 [ 61.668975] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.669019] kthread+0x328/0x630 [ 61.669067] ret_from_fork+0x10/0x20 [ 61.669108] [ 61.669131] freed by task 347 on cpu 0 at 61.636412s (0.032715s ago): [ 61.669189] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 61.669234] kunit_try_run_case+0x170/0x3f0 [ 61.669274] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.669317] kthread+0x328/0x630 [ 61.669353] ret_from_fork+0x10/0x20 [ 61.669392] [ 61.669438] CPU: 0 UID: 0 PID: 347 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 61.669523] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.669554] Hardware name: linux,dummy-virt (DT) [ 61.669588] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-read-in-test_invalid_access
[ 38.663691] ================================================================== [ 38.665274] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 38.665274] [ 38.665401] Invalid read at 0x00000000a9a798b9: [ 38.665467] test_invalid_access+0xdc/0x1f0 [ 38.665522] kunit_try_run_case+0x170/0x3f0 [ 38.665575] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.665626] kthread+0x328/0x630 [ 38.665670] ret_from_fork+0x10/0x20 [ 38.665741] [ 38.665793] CPU: 1 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 38.665884] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.665919] Hardware name: linux,dummy-virt (DT) [ 38.665958] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[ 38.432392] ================================================================== [ 38.432481] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 38.432481] [ 38.432543] Corrupted memory at 0x00000000d786a0e4 [ ! . . . . . . . . . . . . . . . ] (in kfence-#157): [ 38.432851] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 38.432899] kunit_try_run_case+0x170/0x3f0 [ 38.432943] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.432990] kthread+0x328/0x630 [ 38.433028] ret_from_fork+0x10/0x20 [ 38.433083] [ 38.433106] kfence-#157: 0x000000008b039654-0x0000000001a1429f, size=73, cache=kmalloc-96 [ 38.433106] [ 38.433162] allocated by task 337 on cpu 1 at 38.432163s (0.000996s ago): [ 38.433224] test_alloc+0x29c/0x628 [ 38.433264] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 38.433309] kunit_try_run_case+0x170/0x3f0 [ 38.433350] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.433394] kthread+0x328/0x630 [ 38.433431] ret_from_fork+0x10/0x20 [ 38.433470] [ 38.433495] freed by task 337 on cpu 1 at 38.432305s (0.001186s ago): [ 38.433559] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 38.433603] kunit_try_run_case+0x170/0x3f0 [ 38.433643] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.433688] kthread+0x328/0x630 [ 38.433723] ret_from_fork+0x10/0x20 [ 38.433762] [ 38.433803] CPU: 1 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 38.433891] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.433921] Hardware name: linux,dummy-virt (DT) [ 38.433955] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[ 38.328359] ================================================================== [ 38.328424] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 38.328424] [ 38.328514] Out-of-bounds read at 0x000000004f555c9f (105B right of kfence-#156): [ 38.328572] test_kmalloc_aligned_oob_read+0x238/0x468 [ 38.328624] kunit_try_run_case+0x170/0x3f0 [ 38.328671] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.328718] kthread+0x328/0x630 [ 38.328756] ret_from_fork+0x10/0x20 [ 38.328795] [ 38.328819] kfence-#156: 0x000000008bee5ba7-0x00000000e3476c33, size=73, cache=kmalloc-96 [ 38.328819] [ 38.328871] allocated by task 335 on cpu 1 at 38.328131s (0.000736s ago): [ 38.328942] test_alloc+0x29c/0x628 [ 38.328981] test_kmalloc_aligned_oob_read+0x100/0x468 [ 38.329025] kunit_try_run_case+0x170/0x3f0 [ 38.329078] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.329123] kthread+0x328/0x630 [ 38.329159] ret_from_fork+0x10/0x20 [ 38.329199] [ 38.329243] CPU: 1 UID: 0 PID: 335 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 38.329326] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.329355] Hardware name: linux,dummy-virt (DT) [ 38.329391] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-memory-corruption-in-test_corruption
[ 33.752378] ================================================================== [ 33.752471] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 33.752471] [ 33.752533] Corrupted memory at 0x000000008b925bc2 [ ! ] (in kfence-#112): [ 33.752645] test_corruption+0x1d8/0x378 [ 33.752691] kunit_try_run_case+0x170/0x3f0 [ 33.752732] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.752779] kthread+0x328/0x630 [ 33.752815] ret_from_fork+0x10/0x20 [ 33.752855] [ 33.752878] kfence-#112: 0x000000009f6a8af5-0x000000003ddd049e, size=32, cache=test [ 33.752878] [ 33.752932] allocated by task 325 on cpu 1 at 33.752231s (0.000697s ago): [ 33.752994] test_alloc+0x230/0x628 [ 33.753035] test_corruption+0x198/0x378 [ 33.753088] kunit_try_run_case+0x170/0x3f0 [ 33.753129] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.753173] kthread+0x328/0x630 [ 33.753209] ret_from_fork+0x10/0x20 [ 33.753248] [ 33.753271] freed by task 325 on cpu 1 at 33.752290s (0.000977s ago): [ 33.753333] test_corruption+0x1d8/0x378 [ 33.753373] kunit_try_run_case+0x170/0x3f0 [ 33.753411] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.753456] kthread+0x328/0x630 [ 33.753492] ret_from_fork+0x10/0x20 [ 33.753531] [ 33.753572] CPU: 1 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 33.753653] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.753682] Hardware name: linux,dummy-virt (DT) [ 33.753716] ================================================================== [ 33.232505] ================================================================== [ 33.232597] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 33.232597] [ 33.232657] Corrupted memory at 0x00000000749fc7dc [ ! ] (in kfence-#107): [ 33.232783] test_corruption+0x284/0x378 [ 33.232829] kunit_try_run_case+0x170/0x3f0 [ 33.232875] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.232921] kthread+0x328/0x630 [ 33.232959] ret_from_fork+0x10/0x20 [ 33.232998] [ 33.233022] kfence-#107: 0x00000000b325253e-0x00000000f4551a42, size=32, cache=kmalloc-32 [ 33.233022] [ 33.233093] allocated by task 323 on cpu 1 at 33.232232s (0.000858s ago): [ 33.233154] test_alloc+0x29c/0x628 [ 33.233195] test_corruption+0x198/0x378 [ 33.233234] kunit_try_run_case+0x170/0x3f0 [ 33.233274] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.233319] kthread+0x328/0x630 [ 33.233354] ret_from_fork+0x10/0x20 [ 33.233392] [ 33.233415] freed by task 323 on cpu 1 at 33.232336s (0.001075s ago): [ 33.233477] test_corruption+0x284/0x378 [ 33.233517] kunit_try_run_case+0x170/0x3f0 [ 33.233558] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.233603] kthread+0x328/0x630 [ 33.233640] ret_from_fork+0x10/0x20 [ 33.233678] [ 33.233719] CPU: 1 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 33.233800] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.233830] Hardware name: linux,dummy-virt (DT) [ 33.233863] ================================================================== [ 33.544361] ================================================================== [ 33.544452] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 33.544452] [ 33.544514] Corrupted memory at 0x00000000ec56ab1d [ ! . . . . . . . . . . . . . . . ] (in kfence-#110): [ 33.544822] test_corruption+0x120/0x378 [ 33.544868] kunit_try_run_case+0x170/0x3f0 [ 33.544912] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.544957] kthread+0x328/0x630 [ 33.544994] ret_from_fork+0x10/0x20 [ 33.545033] [ 33.545070] kfence-#110: 0x000000003bea5582-0x00000000329a65a1, size=32, cache=test [ 33.545070] [ 33.545124] allocated by task 325 on cpu 1 at 33.544217s (0.000903s ago): [ 33.545186] test_alloc+0x230/0x628 [ 33.545225] test_corruption+0xdc/0x378 [ 33.545265] kunit_try_run_case+0x170/0x3f0 [ 33.545304] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.545348] kthread+0x328/0x630 [ 33.545384] ret_from_fork+0x10/0x20 [ 33.545424] [ 33.545447] freed by task 325 on cpu 1 at 33.544275s (0.001168s ago): [ 33.545508] test_corruption+0x120/0x378 [ 33.545546] kunit_try_run_case+0x170/0x3f0 [ 33.545586] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.545630] kthread+0x328/0x630 [ 33.545667] ret_from_fork+0x10/0x20 [ 33.545706] [ 33.545747] CPU: 1 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 33.545828] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.545863] Hardware name: linux,dummy-virt (DT) [ 33.545897] ================================================================== [ 33.024485] ================================================================== [ 33.024593] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 33.024593] [ 33.024660] Corrupted memory at 0x00000000eeff6def [ ! . . . . . . . . . . . . . . . ] (in kfence-#105): [ 33.025768] test_corruption+0x278/0x378 [ 33.025820] kunit_try_run_case+0x170/0x3f0 [ 33.025866] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.025912] kthread+0x328/0x630 [ 33.025951] ret_from_fork+0x10/0x20 [ 33.025990] [ 33.026015] kfence-#105: 0x000000009e13af56-0x00000000556e2783, size=32, cache=kmalloc-32 [ 33.026015] [ 33.026084] allocated by task 323 on cpu 1 at 33.024207s (0.001873s ago): [ 33.026148] test_alloc+0x29c/0x628 [ 33.026194] test_corruption+0xdc/0x378 [ 33.026236] kunit_try_run_case+0x170/0x3f0 [ 33.026276] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.026321] kthread+0x328/0x630 [ 33.026355] ret_from_fork+0x10/0x20 [ 33.026393] [ 33.026416] freed by task 323 on cpu 1 at 33.024310s (0.002102s ago): [ 33.026476] test_corruption+0x278/0x378 [ 33.026515] kunit_try_run_case+0x170/0x3f0 [ 33.026556] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.026600] kthread+0x328/0x630 [ 33.026634] ret_from_fork+0x10/0x20 [ 33.026671] [ 33.026716] CPU: 1 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 33.026796] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.026825] Hardware name: linux,dummy-virt (DT) [ 33.026858] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[ 32.920288] ================================================================== [ 32.920380] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 32.920380] [ 32.920440] Invalid free of 0x0000000064b0d3d9 (in kfence-#104): [ 32.920493] test_invalid_addr_free+0xec/0x238 [ 32.920538] kunit_try_run_case+0x170/0x3f0 [ 32.920582] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.920627] kthread+0x328/0x630 [ 32.920666] ret_from_fork+0x10/0x20 [ 32.920707] [ 32.920730] kfence-#104: 0x000000009ab57773-0x000000008a2d4367, size=32, cache=test [ 32.920730] [ 32.920784] allocated by task 321 on cpu 0 at 32.920164s (0.000617s ago): [ 32.920846] test_alloc+0x230/0x628 [ 32.920888] test_invalid_addr_free+0xd4/0x238 [ 32.920930] kunit_try_run_case+0x170/0x3f0 [ 32.920971] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.921014] kthread+0x328/0x630 [ 32.921051] ret_from_fork+0x10/0x20 [ 32.921102] [ 32.921144] CPU: 0 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 32.921226] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.921256] Hardware name: linux,dummy-virt (DT) [ 32.921290] ================================================================== [ 32.816320] ================================================================== [ 32.816410] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 32.816410] [ 32.816471] Invalid free of 0x00000000ad389971 (in kfence-#103): [ 32.816525] test_invalid_addr_free+0x1ac/0x238 [ 32.816573] kunit_try_run_case+0x170/0x3f0 [ 32.816618] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.816664] kthread+0x328/0x630 [ 32.816702] ret_from_fork+0x10/0x20 [ 32.816743] [ 32.816768] kfence-#103: 0x00000000453b4d46-0x00000000c193db95, size=32, cache=kmalloc-32 [ 32.816768] [ 32.816823] allocated by task 319 on cpu 0 at 32.816182s (0.000637s ago): [ 32.816886] test_alloc+0x29c/0x628 [ 32.816927] test_invalid_addr_free+0xd4/0x238 [ 32.816969] kunit_try_run_case+0x170/0x3f0 [ 32.817011] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.817067] kthread+0x328/0x630 [ 32.817103] ret_from_fork+0x10/0x20 [ 32.817143] [ 32.817185] CPU: 0 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 32.817267] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.817297] Hardware name: linux,dummy-virt (DT) [ 32.817330] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[ 32.296335] ================================================================== [ 32.296434] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 32.296434] [ 32.296527] Use-after-free read at 0x000000005ec7a20b (in kfence-#98): [ 32.296578] test_use_after_free_read+0x114/0x248 [ 32.296626] kunit_try_run_case+0x170/0x3f0 [ 32.296670] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.296716] kthread+0x328/0x630 [ 32.296756] ret_from_fork+0x10/0x20 [ 32.296795] [ 32.296819] kfence-#98: 0x000000005ec7a20b-0x0000000003bf2e4f, size=32, cache=test [ 32.296819] [ 32.296869] allocated by task 309 on cpu 0 at 32.296148s (0.000718s ago): [ 32.296939] test_alloc+0x230/0x628 [ 32.296981] test_use_after_free_read+0xd0/0x248 [ 32.297022] kunit_try_run_case+0x170/0x3f0 [ 32.297077] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.297121] kthread+0x328/0x630 [ 32.297156] ret_from_fork+0x10/0x20 [ 32.297196] [ 32.297219] freed by task 309 on cpu 0 at 32.296210s (0.001005s ago): [ 32.297322] test_use_after_free_read+0xf0/0x248 [ 32.297366] kunit_try_run_case+0x170/0x3f0 [ 32.297405] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.297449] kthread+0x328/0x630 [ 32.297486] ret_from_fork+0x10/0x20 [ 32.297526] [ 32.297567] CPU: 0 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 32.297650] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.297679] Hardware name: linux,dummy-virt (DT) [ 32.297712] ================================================================== [ 32.192482] ================================================================== [ 32.192578] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 32.192578] [ 32.192675] Use-after-free read at 0x00000000a7b6b200 (in kfence-#97): [ 32.192726] test_use_after_free_read+0x114/0x248 [ 32.192774] kunit_try_run_case+0x170/0x3f0 [ 32.192817] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.192861] kthread+0x328/0x630 [ 32.192900] ret_from_fork+0x10/0x20 [ 32.192939] [ 32.192964] kfence-#97: 0x00000000a7b6b200-0x000000001cb8b366, size=32, cache=kmalloc-32 [ 32.192964] [ 32.193016] allocated by task 307 on cpu 0 at 32.192219s (0.000794s ago): [ 32.193105] test_alloc+0x29c/0x628 [ 32.193145] test_use_after_free_read+0xd0/0x248 [ 32.193188] kunit_try_run_case+0x170/0x3f0 [ 32.193227] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.193271] kthread+0x328/0x630 [ 32.193307] ret_from_fork+0x10/0x20 [ 32.193348] [ 32.193373] freed by task 307 on cpu 0 at 32.192296s (0.001073s ago): [ 32.193434] test_use_after_free_read+0x1c0/0x248 [ 32.193477] kunit_try_run_case+0x170/0x3f0 [ 32.193517] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.193562] kthread+0x328/0x630 [ 32.193598] ret_from_fork+0x10/0x20 [ 32.193639] [ 32.193686] CPU: 0 UID: 0 PID: 307 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 32.193771] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.193800] Hardware name: linux,dummy-virt (DT) [ 32.193834] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[ 31.776488] ================================================================== [ 31.776598] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 31.776598] [ 31.776698] Out-of-bounds write at 0x00000000fdaf747a (1B left of kfence-#93): [ 31.776756] test_out_of_bounds_write+0x100/0x240 [ 31.776805] kunit_try_run_case+0x170/0x3f0 [ 31.776850] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.776896] kthread+0x328/0x630 [ 31.776936] ret_from_fork+0x10/0x20 [ 31.776978] [ 31.777002] kfence-#93: 0x00000000d7853093-0x00000000cb85a1e6, size=32, cache=kmalloc-32 [ 31.777002] [ 31.777069] allocated by task 303 on cpu 1 at 31.776317s (0.000734s ago): [ 31.777143] test_alloc+0x29c/0x628 [ 31.777183] test_out_of_bounds_write+0xc8/0x240 [ 31.777226] kunit_try_run_case+0x170/0x3f0 [ 31.777268] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.777311] kthread+0x328/0x630 [ 31.777347] ret_from_fork+0x10/0x20 [ 31.777388] [ 31.777433] CPU: 1 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 31.777516] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.777546] Hardware name: linux,dummy-virt (DT) [ 31.777581] ================================================================== [ 32.088299] ================================================================== [ 32.088398] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 32.088398] [ 32.088489] Out-of-bounds write at 0x000000001f397e69 (1B left of kfence-#96): [ 32.088546] test_out_of_bounds_write+0x100/0x240 [ 32.088595] kunit_try_run_case+0x170/0x3f0 [ 32.088638] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.088683] kthread+0x328/0x630 [ 32.088722] ret_from_fork+0x10/0x20 [ 32.088762] [ 32.088787] kfence-#96: 0x0000000070491222-0x000000000b4d4949, size=32, cache=test [ 32.088787] [ 32.088838] allocated by task 305 on cpu 1 at 32.088218s (0.000616s ago): [ 32.088910] test_alloc+0x230/0x628 [ 32.088950] test_out_of_bounds_write+0xc8/0x240 [ 32.088991] kunit_try_run_case+0x170/0x3f0 [ 32.089032] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.089087] kthread+0x328/0x630 [ 32.089122] ret_from_fork+0x10/0x20 [ 32.089162] [ 32.089204] CPU: 1 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 32.089287] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.089316] Hardware name: linux,dummy-virt (DT) [ 32.089350] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[ 31.361256] ================================================================== [ 31.361467] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 31.361467] [ 31.361559] Out-of-bounds read at 0x0000000044a8d6d1 (1B left of kfence-#89): [ 31.361794] test_out_of_bounds_read+0x114/0x3e0 [ 31.361857] kunit_try_run_case+0x170/0x3f0 [ 31.361900] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.362222] kthread+0x328/0x630 [ 31.362354] ret_from_fork+0x10/0x20 [ 31.362397] [ 31.362460] kfence-#89: 0x00000000b19f61c8-0x0000000097623cb4, size=32, cache=test [ 31.362460] [ 31.362642] allocated by task 301 on cpu 0 at 31.361019s (0.001615s ago): [ 31.362915] test_alloc+0x230/0x628 [ 31.363225] test_out_of_bounds_read+0xdc/0x3e0 [ 31.363285] kunit_try_run_case+0x170/0x3f0 [ 31.363440] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.363554] kthread+0x328/0x630 [ 31.363716] ret_from_fork+0x10/0x20 [ 31.363772] [ 31.364040] CPU: 0 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 31.364147] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.364542] Hardware name: linux,dummy-virt (DT) [ 31.364680] ================================================================== [ 31.464974] ================================================================== [ 31.465599] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 31.465599] [ 31.465753] Out-of-bounds read at 0x00000000363d35d5 (32B right of kfence-#90): [ 31.465846] test_out_of_bounds_read+0x1c8/0x3e0 [ 31.465950] kunit_try_run_case+0x170/0x3f0 [ 31.465997] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.466148] kthread+0x328/0x630 [ 31.466624] ret_from_fork+0x10/0x20 [ 31.466692] [ 31.466718] kfence-#90: 0x000000006426b791-0x00000000ae1296bb, size=32, cache=test [ 31.466718] [ 31.466782] allocated by task 301 on cpu 0 at 31.464875s (0.001903s ago): [ 31.466896] test_alloc+0x230/0x628 [ 31.466948] test_out_of_bounds_read+0x198/0x3e0 [ 31.466989] kunit_try_run_case+0x170/0x3f0 [ 31.467029] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.467093] kthread+0x328/0x630 [ 31.467128] ret_from_fork+0x10/0x20 [ 31.467174] [ 31.467215] CPU: 0 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 31.467297] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.467324] Hardware name: linux,dummy-virt (DT) [ 31.467359] ================================================================== [ 30.217685] ================================================================== [ 30.217791] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 30.217791] [ 30.217960] Out-of-bounds read at 0x00000000cd83b21f (1B left of kfence-#78): [ 30.218270] test_out_of_bounds_read+0x114/0x3e0 [ 30.218372] kunit_try_run_case+0x170/0x3f0 [ 30.218419] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.218464] kthread+0x328/0x630 [ 30.218512] ret_from_fork+0x10/0x20 [ 30.218554] [ 30.218578] kfence-#78: 0x00000000759e344e-0x00000000f3b8c259, size=32, cache=kmalloc-32 [ 30.218578] [ 30.218641] allocated by task 299 on cpu 0 at 30.217151s (0.001475s ago): [ 30.218714] test_alloc+0x29c/0x628 [ 30.218758] test_out_of_bounds_read+0xdc/0x3e0 [ 30.218799] kunit_try_run_case+0x170/0x3f0 [ 30.218847] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.218898] kthread+0x328/0x630 [ 30.218934] ret_from_fork+0x10/0x20 [ 30.218990] [ 30.219039] CPU: 0 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 30.219137] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.219166] Hardware name: linux,dummy-virt (DT) [ 30.219201] ================================================================== [ 30.737741] ================================================================== [ 30.737828] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 30.737828] [ 30.738172] Out-of-bounds read at 0x00000000c7368ccb (32B right of kfence-#83): [ 30.738296] test_out_of_bounds_read+0x1c8/0x3e0 [ 30.738476] kunit_try_run_case+0x170/0x3f0 [ 30.738522] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.738566] kthread+0x328/0x630 [ 30.738603] ret_from_fork+0x10/0x20 [ 30.738688] [ 30.738714] kfence-#83: 0x00000000a0315d10-0x0000000033a9e7f9, size=32, cache=kmalloc-32 [ 30.738714] [ 30.738830] allocated by task 299 on cpu 0 at 30.737324s (0.001485s ago): [ 30.738937] test_alloc+0x29c/0x628 [ 30.739160] test_out_of_bounds_read+0x198/0x3e0 [ 30.739225] kunit_try_run_case+0x170/0x3f0 [ 30.739268] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.739320] kthread+0x328/0x630 [ 30.739357] ret_from_fork+0x10/0x20 [ 30.739520] [ 30.739573] CPU: 0 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 30.739773] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.740082] Hardware name: linux,dummy-virt (DT) [ 30.740158] ==================================================================
Failure - log-parser-boot - kfence-bug-kfence-use-after-free-read-in-kmalloc_uaf2
[ 26.968567] ================================================================== [ 26.968657] BUG: KFENCE: use-after-free read in kmalloc_uaf2+0x1dc/0x468 [ 26.968657] [ 26.968970] Use-after-free read at 0x00000000953835b2 (in kfence-#57): [ 26.969456] kmalloc_uaf2+0x1dc/0x468 [ 26.969594] kunit_try_run_case+0x170/0x3f0 [ 26.969768] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.969872] kthread+0x328/0x630 [ 26.969917] ret_from_fork+0x10/0x20 [ 26.970141] [ 26.970378] kfence-#57: 0x000000007e8cec2b-0x00000000582a89c3, size=43, cache=kmalloc-64 [ 26.970378] [ 26.970823] allocated by task 200 on cpu 0 at 26.962661s (0.008092s ago): [ 26.971708] kmalloc_uaf2+0xc4/0x468 [ 26.971960] kunit_try_run_case+0x170/0x3f0 [ 26.972206] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.972263] kthread+0x328/0x630 [ 26.972297] ret_from_fork+0x10/0x20 [ 26.972384] [ 26.972900] freed by task 200 on cpu 0 at 26.962728s (0.009696s ago): [ 26.973468] kmalloc_uaf2+0x134/0x468 [ 26.973517] kunit_try_run_case+0x170/0x3f0 [ 26.973555] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.973853] kthread+0x328/0x630 [ 26.973912] ret_from_fork+0x10/0x20 [ 26.974007] [ 26.974385] CPU: 0 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 26.974484] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.974512] Hardware name: linux,dummy-virt (DT) [ 26.975071] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[ 30.089091] ================================================================== [ 30.089283] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 30.089463] Write of size 121 at addr fff00000c5773e00 by task kunit_try_catch/297 [ 30.089621] [ 30.089661] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 30.089751] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.089780] Hardware name: linux,dummy-virt (DT) [ 30.089841] Call trace: [ 30.089867] show_stack+0x20/0x38 (C) [ 30.089918] dump_stack_lvl+0x8c/0xd0 [ 30.089995] print_report+0x118/0x608 [ 30.090046] kasan_report+0xdc/0x128 [ 30.090105] kasan_check_range+0x100/0x1a8 [ 30.090163] __kasan_check_write+0x20/0x30 [ 30.090210] strncpy_from_user+0x3c/0x2a0 [ 30.090258] copy_user_test_oob+0x5c0/0xec8 [ 30.090309] kunit_try_run_case+0x170/0x3f0 [ 30.090361] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.090425] kthread+0x328/0x630 [ 30.090471] ret_from_fork+0x10/0x20 [ 30.090530] [ 30.090550] Allocated by task 297: [ 30.090579] kasan_save_stack+0x3c/0x68 [ 30.090632] kasan_save_track+0x20/0x40 [ 30.090679] kasan_save_alloc_info+0x40/0x58 [ 30.090716] __kasan_kmalloc+0xd4/0xd8 [ 30.090762] __kmalloc_noprof+0x198/0x4c8 [ 30.090810] kunit_kmalloc_array+0x34/0x88 [ 30.090859] copy_user_test_oob+0xac/0xec8 [ 30.090899] kunit_try_run_case+0x170/0x3f0 [ 30.090938] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.090984] kthread+0x328/0x630 [ 30.091017] ret_from_fork+0x10/0x20 [ 30.091366] [ 30.091424] The buggy address belongs to the object at fff00000c5773e00 [ 30.091424] which belongs to the cache kmalloc-128 of size 128 [ 30.091756] The buggy address is located 0 bytes inside of [ 30.091756] allocated 120-byte region [fff00000c5773e00, fff00000c5773e78) [ 30.091864] [ 30.091914] The buggy address belongs to the physical page: [ 30.092164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105773 [ 30.092240] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.092549] page_type: f5(slab) [ 30.092676] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.093017] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.093695] page dumped because: kasan: bad access detected [ 30.094150] [ 30.094218] Memory state around the buggy address: [ 30.094255] fff00000c5773d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.094309] fff00000c5773d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.094512] >fff00000c5773e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.094845] ^ [ 30.095159] fff00000c5773e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.095499] fff00000c5773f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.095585] ================================================================== [ 30.096977] ================================================================== [ 30.097155] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 30.097217] Write of size 1 at addr fff00000c5773e78 by task kunit_try_catch/297 [ 30.097270] [ 30.097334] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 30.097454] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.097482] Hardware name: linux,dummy-virt (DT) [ 30.097514] Call trace: [ 30.097538] show_stack+0x20/0x38 (C) [ 30.097588] dump_stack_lvl+0x8c/0xd0 [ 30.097635] print_report+0x118/0x608 [ 30.097684] kasan_report+0xdc/0x128 [ 30.097754] __asan_report_store1_noabort+0x20/0x30 [ 30.097814] strncpy_from_user+0x270/0x2a0 [ 30.097863] copy_user_test_oob+0x5c0/0xec8 [ 30.097920] kunit_try_run_case+0x170/0x3f0 [ 30.097970] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.098025] kthread+0x328/0x630 [ 30.098526] ret_from_fork+0x10/0x20 [ 30.098888] [ 30.098925] Allocated by task 297: [ 30.098956] kasan_save_stack+0x3c/0x68 [ 30.099009] kasan_save_track+0x20/0x40 [ 30.099546] kasan_save_alloc_info+0x40/0x58 [ 30.099612] __kasan_kmalloc+0xd4/0xd8 [ 30.099844] __kmalloc_noprof+0x198/0x4c8 [ 30.099928] kunit_kmalloc_array+0x34/0x88 [ 30.099981] copy_user_test_oob+0xac/0xec8 [ 30.100034] kunit_try_run_case+0x170/0x3f0 [ 30.100246] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.100382] kthread+0x328/0x630 [ 30.100587] ret_from_fork+0x10/0x20 [ 30.100779] [ 30.100969] The buggy address belongs to the object at fff00000c5773e00 [ 30.100969] which belongs to the cache kmalloc-128 of size 128 [ 30.101094] The buggy address is located 0 bytes to the right of [ 30.101094] allocated 120-byte region [fff00000c5773e00, fff00000c5773e78) [ 30.101344] [ 30.101776] The buggy address belongs to the physical page: [ 30.101814] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105773 [ 30.102209] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.102390] page_type: f5(slab) [ 30.102501] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.102653] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.102883] page dumped because: kasan: bad access detected [ 30.102990] [ 30.103410] Memory state around the buggy address: [ 30.103812] fff00000c5773d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.104031] fff00000c5773d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.104183] >fff00000c5773e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.104352] ^ [ 30.104443] fff00000c5773e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.104577] fff00000c5773f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.104781] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[ 30.070853] ================================================================== [ 30.071014] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 30.071080] Write of size 121 at addr fff00000c5773e00 by task kunit_try_catch/297 [ 30.071362] [ 30.071428] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 30.071523] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.071553] Hardware name: linux,dummy-virt (DT) [ 30.071841] Call trace: [ 30.071904] show_stack+0x20/0x38 (C) [ 30.072064] dump_stack_lvl+0x8c/0xd0 [ 30.072138] print_report+0x118/0x608 [ 30.072278] kasan_report+0xdc/0x128 [ 30.072373] kasan_check_range+0x100/0x1a8 [ 30.072442] __kasan_check_write+0x20/0x30 [ 30.072489] copy_user_test_oob+0x434/0xec8 [ 30.072542] kunit_try_run_case+0x170/0x3f0 [ 30.072902] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.073017] kthread+0x328/0x630 [ 30.073352] ret_from_fork+0x10/0x20 [ 30.073525] [ 30.073605] Allocated by task 297: [ 30.073729] kasan_save_stack+0x3c/0x68 [ 30.073818] kasan_save_track+0x20/0x40 [ 30.074161] kasan_save_alloc_info+0x40/0x58 [ 30.074283] __kasan_kmalloc+0xd4/0xd8 [ 30.074654] __kmalloc_noprof+0x198/0x4c8 [ 30.074981] kunit_kmalloc_array+0x34/0x88 [ 30.075102] copy_user_test_oob+0xac/0xec8 [ 30.075492] kunit_try_run_case+0x170/0x3f0 [ 30.075591] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.075667] kthread+0x328/0x630 [ 30.075964] ret_from_fork+0x10/0x20 [ 30.076303] [ 30.076447] The buggy address belongs to the object at fff00000c5773e00 [ 30.076447] which belongs to the cache kmalloc-128 of size 128 [ 30.076611] The buggy address is located 0 bytes inside of [ 30.076611] allocated 120-byte region [fff00000c5773e00, fff00000c5773e78) [ 30.076680] [ 30.076727] The buggy address belongs to the physical page: [ 30.076768] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105773 [ 30.077112] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.077173] page_type: f5(slab) [ 30.077265] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.077338] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.077381] page dumped because: kasan: bad access detected [ 30.077421] [ 30.077448] Memory state around the buggy address: [ 30.077491] fff00000c5773d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.077538] fff00000c5773d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.077580] >fff00000c5773e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.077629] ^ [ 30.077681] fff00000c5773e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.077726] fff00000c5773f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.077767] ================================================================== [ 30.037884] ================================================================== [ 30.037990] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 30.038381] Read of size 121 at addr fff00000c5773e00 by task kunit_try_catch/297 [ 30.038451] [ 30.038594] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 30.038699] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.038934] Hardware name: linux,dummy-virt (DT) [ 30.039070] Call trace: [ 30.039096] show_stack+0x20/0x38 (C) [ 30.039151] dump_stack_lvl+0x8c/0xd0 [ 30.039216] print_report+0x118/0x608 [ 30.039320] kasan_report+0xdc/0x128 [ 30.039670] kasan_check_range+0x100/0x1a8 [ 30.039745] __kasan_check_read+0x20/0x30 [ 30.040127] copy_user_test_oob+0x728/0xec8 [ 30.040278] kunit_try_run_case+0x170/0x3f0 [ 30.040351] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.040562] kthread+0x328/0x630 [ 30.040714] ret_from_fork+0x10/0x20 [ 30.040915] [ 30.041201] Allocated by task 297: [ 30.041389] kasan_save_stack+0x3c/0x68 [ 30.041497] kasan_save_track+0x20/0x40 [ 30.041570] kasan_save_alloc_info+0x40/0x58 [ 30.041607] __kasan_kmalloc+0xd4/0xd8 [ 30.041888] __kmalloc_noprof+0x198/0x4c8 [ 30.042025] kunit_kmalloc_array+0x34/0x88 [ 30.042114] copy_user_test_oob+0xac/0xec8 [ 30.042413] kunit_try_run_case+0x170/0x3f0 [ 30.042486] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.042633] kthread+0x328/0x630 [ 30.042683] ret_from_fork+0x10/0x20 [ 30.042733] [ 30.042763] The buggy address belongs to the object at fff00000c5773e00 [ 30.042763] which belongs to the cache kmalloc-128 of size 128 [ 30.043086] The buggy address is located 0 bytes inside of [ 30.043086] allocated 120-byte region [fff00000c5773e00, fff00000c5773e78) [ 30.043246] [ 30.043315] The buggy address belongs to the physical page: [ 30.043369] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105773 [ 30.043599] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.043751] page_type: f5(slab) [ 30.044088] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.044211] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.044285] page dumped because: kasan: bad access detected [ 30.044360] [ 30.044383] Memory state around the buggy address: [ 30.044418] fff00000c5773d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.044466] fff00000c5773d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.044519] >fff00000c5773e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.044697] ^ [ 30.044888] fff00000c5773e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.045207] fff00000c5773f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.045275] ================================================================== [ 30.021808] ================================================================== [ 30.021927] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 30.022271] Write of size 121 at addr fff00000c5773e00 by task kunit_try_catch/297 [ 30.022396] [ 30.022548] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 30.022710] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.022779] Hardware name: linux,dummy-virt (DT) [ 30.022843] Call trace: [ 30.023136] show_stack+0x20/0x38 (C) [ 30.023207] dump_stack_lvl+0x8c/0xd0 [ 30.023356] print_report+0x118/0x608 [ 30.023418] kasan_report+0xdc/0x128 [ 30.023493] kasan_check_range+0x100/0x1a8 [ 30.023638] __kasan_check_write+0x20/0x30 [ 30.023701] copy_user_test_oob+0x234/0xec8 [ 30.023985] kunit_try_run_case+0x170/0x3f0 [ 30.024267] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.024340] kthread+0x328/0x630 [ 30.024650] ret_from_fork+0x10/0x20 [ 30.024808] [ 30.024899] Allocated by task 297: [ 30.024978] kasan_save_stack+0x3c/0x68 [ 30.025123] kasan_save_track+0x20/0x40 [ 30.025221] kasan_save_alloc_info+0x40/0x58 [ 30.025411] __kasan_kmalloc+0xd4/0xd8 [ 30.025450] __kmalloc_noprof+0x198/0x4c8 [ 30.025516] kunit_kmalloc_array+0x34/0x88 [ 30.025839] copy_user_test_oob+0xac/0xec8 [ 30.025923] kunit_try_run_case+0x170/0x3f0 [ 30.026099] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.026255] kthread+0x328/0x630 [ 30.026355] ret_from_fork+0x10/0x20 [ 30.026747] [ 30.026797] The buggy address belongs to the object at fff00000c5773e00 [ 30.026797] which belongs to the cache kmalloc-128 of size 128 [ 30.026940] The buggy address is located 0 bytes inside of [ 30.026940] allocated 120-byte region [fff00000c5773e00, fff00000c5773e78) [ 30.027044] [ 30.027164] The buggy address belongs to the physical page: [ 30.027224] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105773 [ 30.027309] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.027773] page_type: f5(slab) [ 30.027852] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.028135] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.028402] page dumped because: kasan: bad access detected [ 30.028474] [ 30.028623] Memory state around the buggy address: [ 30.028709] fff00000c5773d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.028809] fff00000c5773d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.028961] >fff00000c5773e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.029144] ^ [ 30.029243] fff00000c5773e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.029303] fff00000c5773f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.029631] ================================================================== [ 30.063113] ================================================================== [ 30.063176] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 30.063229] Read of size 121 at addr fff00000c5773e00 by task kunit_try_catch/297 [ 30.063549] [ 30.063601] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 30.063774] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.063846] Hardware name: linux,dummy-virt (DT) [ 30.063904] Call trace: [ 30.064025] show_stack+0x20/0x38 (C) [ 30.064141] dump_stack_lvl+0x8c/0xd0 [ 30.064361] print_report+0x118/0x608 [ 30.064544] kasan_report+0xdc/0x128 [ 30.064676] kasan_check_range+0x100/0x1a8 [ 30.064793] __kasan_check_read+0x20/0x30 [ 30.065038] copy_user_test_oob+0x3c8/0xec8 [ 30.065193] kunit_try_run_case+0x170/0x3f0 [ 30.065341] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.065411] kthread+0x328/0x630 [ 30.065746] ret_from_fork+0x10/0x20 [ 30.066076] [ 30.066128] Allocated by task 297: [ 30.066208] kasan_save_stack+0x3c/0x68 [ 30.066359] kasan_save_track+0x20/0x40 [ 30.066530] kasan_save_alloc_info+0x40/0x58 [ 30.066746] __kasan_kmalloc+0xd4/0xd8 [ 30.066812] __kmalloc_noprof+0x198/0x4c8 [ 30.067108] kunit_kmalloc_array+0x34/0x88 [ 30.067209] copy_user_test_oob+0xac/0xec8 [ 30.067635] kunit_try_run_case+0x170/0x3f0 [ 30.067738] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.067794] kthread+0x328/0x630 [ 30.067829] ret_from_fork+0x10/0x20 [ 30.068165] [ 30.068255] The buggy address belongs to the object at fff00000c5773e00 [ 30.068255] which belongs to the cache kmalloc-128 of size 128 [ 30.068409] The buggy address is located 0 bytes inside of [ 30.068409] allocated 120-byte region [fff00000c5773e00, fff00000c5773e78) [ 30.068634] [ 30.068663] The buggy address belongs to the physical page: [ 30.068709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105773 [ 30.068766] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.068827] page_type: f5(slab) [ 30.068898] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.068953] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.069012] page dumped because: kasan: bad access detected [ 30.069069] [ 30.069098] Memory state around the buggy address: [ 30.069143] fff00000c5773d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.069188] fff00000c5773d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.069233] >fff00000c5773e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.069271] ^ [ 30.069312] fff00000c5773e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.069365] fff00000c5773f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.069416] ================================================================== [ 30.078605] ================================================================== [ 30.078659] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 30.079033] Read of size 121 at addr fff00000c5773e00 by task kunit_try_catch/297 [ 30.079112] [ 30.079167] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 30.079286] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.079331] Hardware name: linux,dummy-virt (DT) [ 30.079363] Call trace: [ 30.079388] show_stack+0x20/0x38 (C) [ 30.079644] dump_stack_lvl+0x8c/0xd0 [ 30.079727] print_report+0x118/0x608 [ 30.079782] kasan_report+0xdc/0x128 [ 30.080048] kasan_check_range+0x100/0x1a8 [ 30.080241] __kasan_check_read+0x20/0x30 [ 30.080394] copy_user_test_oob+0x4a0/0xec8 [ 30.080513] kunit_try_run_case+0x170/0x3f0 [ 30.080726] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.080787] kthread+0x328/0x630 [ 30.080835] ret_from_fork+0x10/0x20 [ 30.081220] [ 30.081260] Allocated by task 297: [ 30.081336] kasan_save_stack+0x3c/0x68 [ 30.081429] kasan_save_track+0x20/0x40 [ 30.081608] kasan_save_alloc_info+0x40/0x58 [ 30.081789] __kasan_kmalloc+0xd4/0xd8 [ 30.081859] __kmalloc_noprof+0x198/0x4c8 [ 30.082317] kunit_kmalloc_array+0x34/0x88 [ 30.082374] copy_user_test_oob+0xac/0xec8 [ 30.082761] kunit_try_run_case+0x170/0x3f0 [ 30.082887] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.083123] kthread+0x328/0x630 [ 30.083334] ret_from_fork+0x10/0x20 [ 30.083392] [ 30.083746] The buggy address belongs to the object at fff00000c5773e00 [ 30.083746] which belongs to the cache kmalloc-128 of size 128 [ 30.083826] The buggy address is located 0 bytes inside of [ 30.083826] allocated 120-byte region [fff00000c5773e00, fff00000c5773e78) [ 30.084160] [ 30.084365] The buggy address belongs to the physical page: [ 30.084413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105773 [ 30.084630] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.084931] page_type: f5(slab) [ 30.084983] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.085258] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.085304] page dumped because: kasan: bad access detected [ 30.085520] [ 30.085598] Memory state around the buggy address: [ 30.085700] fff00000c5773d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.086070] fff00000c5773d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.086313] >fff00000c5773e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.086414] ^ [ 30.086568] fff00000c5773e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.086772] fff00000c5773f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.087089] ================================================================== [ 30.055186] ================================================================== [ 30.055291] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 30.055366] Write of size 121 at addr fff00000c5773e00 by task kunit_try_catch/297 [ 30.055715] [ 30.055773] CPU: 0 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 30.055998] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.056142] Hardware name: linux,dummy-virt (DT) [ 30.056243] Call trace: [ 30.056341] show_stack+0x20/0x38 (C) [ 30.056436] dump_stack_lvl+0x8c/0xd0 [ 30.056493] print_report+0x118/0x608 [ 30.056541] kasan_report+0xdc/0x128 [ 30.056588] kasan_check_range+0x100/0x1a8 [ 30.056639] __kasan_check_write+0x20/0x30 [ 30.056886] copy_user_test_oob+0x35c/0xec8 [ 30.057139] kunit_try_run_case+0x170/0x3f0 [ 30.057259] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.057426] kthread+0x328/0x630 [ 30.057519] ret_from_fork+0x10/0x20 [ 30.058173] [ 30.058487] Allocated by task 297: [ 30.058561] kasan_save_stack+0x3c/0x68 [ 30.058664] kasan_save_track+0x20/0x40 [ 30.058705] kasan_save_alloc_info+0x40/0x58 [ 30.058777] __kasan_kmalloc+0xd4/0xd8 [ 30.058858] __kmalloc_noprof+0x198/0x4c8 [ 30.058933] kunit_kmalloc_array+0x34/0x88 [ 30.059282] copy_user_test_oob+0xac/0xec8 [ 30.059378] kunit_try_run_case+0x170/0x3f0 [ 30.059485] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.059602] kthread+0x328/0x630 [ 30.059764] ret_from_fork+0x10/0x20 [ 30.059900] [ 30.059952] The buggy address belongs to the object at fff00000c5773e00 [ 30.059952] which belongs to the cache kmalloc-128 of size 128 [ 30.060037] The buggy address is located 0 bytes inside of [ 30.060037] allocated 120-byte region [fff00000c5773e00, fff00000c5773e78) [ 30.060393] [ 30.060435] The buggy address belongs to the physical page: [ 30.060506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105773 [ 30.060580] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.060634] page_type: f5(slab) [ 30.060683] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.060738] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.060781] page dumped because: kasan: bad access detected [ 30.060815] [ 30.060836] Memory state around the buggy address: [ 30.060909] fff00000c5773d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.060967] fff00000c5773d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.061019] >fff00000c5773e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.061075] ^ [ 30.061127] fff00000c5773e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.061174] fff00000c5773f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.061216] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[ 29.978857] ================================================================== [ 29.978921] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 29.978987] Write of size 8 at addr fff00000c5773d78 by task kunit_try_catch/293 [ 29.979041] [ 29.979342] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.979512] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.979547] Hardware name: linux,dummy-virt (DT) [ 29.979606] Call trace: [ 29.979656] show_stack+0x20/0x38 (C) [ 29.979717] dump_stack_lvl+0x8c/0xd0 [ 29.979917] print_report+0x118/0x608 [ 29.980108] kasan_report+0xdc/0x128 [ 29.980241] kasan_check_range+0x100/0x1a8 [ 29.980376] __kasan_check_write+0x20/0x30 [ 29.980525] copy_to_kernel_nofault+0x8c/0x250 [ 29.980657] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 29.980818] kunit_try_run_case+0x170/0x3f0 [ 29.981034] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.981212] kthread+0x328/0x630 [ 29.981299] ret_from_fork+0x10/0x20 [ 29.981487] [ 29.981509] Allocated by task 293: [ 29.981541] kasan_save_stack+0x3c/0x68 [ 29.981899] kasan_save_track+0x20/0x40 [ 29.982328] kasan_save_alloc_info+0x40/0x58 [ 29.982457] __kasan_kmalloc+0xd4/0xd8 [ 29.982523] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.982668] copy_to_kernel_nofault_oob+0xc8/0x418 [ 29.982819] kunit_try_run_case+0x170/0x3f0 [ 29.982864] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.982973] kthread+0x328/0x630 [ 29.983325] ret_from_fork+0x10/0x20 [ 29.983399] [ 29.983448] The buggy address belongs to the object at fff00000c5773d00 [ 29.983448] which belongs to the cache kmalloc-128 of size 128 [ 29.983511] The buggy address is located 0 bytes to the right of [ 29.983511] allocated 120-byte region [fff00000c5773d00, fff00000c5773d78) [ 29.983979] [ 29.984293] The buggy address belongs to the physical page: [ 29.984627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105773 [ 29.984703] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.984756] page_type: f5(slab) [ 29.984798] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.984850] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.984893] page dumped because: kasan: bad access detected [ 29.984928] [ 29.984947] Memory state around the buggy address: [ 29.984980] fff00000c5773c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.985026] fff00000c5773c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.985081] >fff00000c5773d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.985121] ^ [ 29.985163] fff00000c5773d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.985207] fff00000c5773e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.985246] ================================================================== [ 29.970806] ================================================================== [ 29.970900] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 29.971245] Read of size 8 at addr fff00000c5773d78 by task kunit_try_catch/293 [ 29.971361] [ 29.971399] CPU: 0 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.971508] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.971596] Hardware name: linux,dummy-virt (DT) [ 29.971700] Call trace: [ 29.971813] show_stack+0x20/0x38 (C) [ 29.972121] dump_stack_lvl+0x8c/0xd0 [ 29.972205] print_report+0x118/0x608 [ 29.972381] kasan_report+0xdc/0x128 [ 29.972509] __asan_report_load8_noabort+0x20/0x30 [ 29.972709] copy_to_kernel_nofault+0x204/0x250 [ 29.972848] copy_to_kernel_nofault_oob+0x158/0x418 [ 29.973282] kunit_try_run_case+0x170/0x3f0 [ 29.973529] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.973654] kthread+0x328/0x630 [ 29.973787] ret_from_fork+0x10/0x20 [ 29.973886] [ 29.973982] Allocated by task 293: [ 29.974374] kasan_save_stack+0x3c/0x68 [ 29.974444] kasan_save_track+0x20/0x40 [ 29.974509] kasan_save_alloc_info+0x40/0x58 [ 29.974661] __kasan_kmalloc+0xd4/0xd8 [ 29.974757] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.975069] copy_to_kernel_nofault_oob+0xc8/0x418 [ 29.975161] kunit_try_run_case+0x170/0x3f0 [ 29.975331] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.975401] kthread+0x328/0x630 [ 29.975751] ret_from_fork+0x10/0x20 [ 29.975985] [ 29.976143] The buggy address belongs to the object at fff00000c5773d00 [ 29.976143] which belongs to the cache kmalloc-128 of size 128 [ 29.976287] The buggy address is located 0 bytes to the right of [ 29.976287] allocated 120-byte region [fff00000c5773d00, fff00000c5773d78) [ 29.976424] [ 29.976449] The buggy address belongs to the physical page: [ 29.976483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105773 [ 29.976835] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.976920] page_type: f5(slab) [ 29.976970] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.977098] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.977153] page dumped because: kasan: bad access detected [ 29.977202] [ 29.977224] Memory state around the buggy address: [ 29.977258] fff00000c5773c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.977303] fff00000c5773c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.977357] >fff00000c5773d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.977406] ^ [ 29.977447] fff00000c5773d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.977502] fff00000c5773e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.977558] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[ 29.041195] ================================================================== [ 29.041271] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 29.041328] Read of size 1 at addr ffff800080b17b5f by task kunit_try_catch/263 [ 29.041618] [ 29.041660] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.041775] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.041804] Hardware name: linux,dummy-virt (DT) [ 29.041885] Call trace: [ 29.041911] show_stack+0x20/0x38 (C) [ 29.041962] dump_stack_lvl+0x8c/0xd0 [ 29.042014] print_report+0x310/0x608 [ 29.042195] kasan_report+0xdc/0x128 [ 29.042250] __asan_report_load1_noabort+0x20/0x30 [ 29.042299] kasan_alloca_oob_left+0x2b8/0x310 [ 29.042494] kunit_try_run_case+0x170/0x3f0 [ 29.042613] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.042698] kthread+0x328/0x630 [ 29.042753] ret_from_fork+0x10/0x20 [ 29.042804] [ 29.042826] The buggy address belongs to stack of task kunit_try_catch/263 [ 29.042937] [ 29.043028] The buggy address belongs to the virtual mapping at [ 29.043028] [ffff800080b10000, ffff800080b19000) created by: [ 29.043028] kernel_clone+0x150/0x7a8 [ 29.043160] [ 29.043182] The buggy address belongs to the physical page: [ 29.043239] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105785 [ 29.043294] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.043582] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 29.043669] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 29.043748] page dumped because: kasan: bad access detected [ 29.043789] [ 29.043905] Memory state around the buggy address: [ 29.044042] ffff800080b17a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.044137] ffff800080b17a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.044261] >ffff800080b17b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 29.044436] ^ [ 29.044539] ffff800080b17b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 29.044585] ffff800080b17c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 29.044801] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 29.923553] ================================================================== [ 29.923603] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 29.924189] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/281 [ 29.924321] [ 29.924521] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.924768] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.924937] Hardware name: linux,dummy-virt (DT) [ 29.925027] Call trace: [ 29.925189] show_stack+0x20/0x38 (C) [ 29.925293] dump_stack_lvl+0x8c/0xd0 [ 29.925344] print_report+0x310/0x608 [ 29.925710] kasan_report+0xdc/0x128 [ 29.925907] __asan_report_load1_noabort+0x20/0x30 [ 29.926109] vmalloc_oob+0x51c/0x5d0 [ 29.926168] kunit_try_run_case+0x170/0x3f0 [ 29.926218] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.926273] kthread+0x328/0x630 [ 29.926316] ret_from_fork+0x10/0x20 [ 29.926367] [ 29.926457] The buggy address belongs to the virtual mapping at [ 29.926457] [ffff8000800fe000, ffff800080100000) created by: [ 29.926457] vmalloc_oob+0x98/0x5d0 [ 29.926558] [ 29.926587] The buggy address belongs to the physical page: [ 29.926621] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105783 [ 29.926686] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.926754] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 29.926817] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 29.926870] page dumped because: kasan: bad access detected [ 29.926911] [ 29.926942] Memory state around the buggy address: [ 29.926977] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.927030] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.927087] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 29.927126] ^ [ 29.927169] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 29.927223] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 29.927264] ================================================================== [ 29.915731] ================================================================== [ 29.916043] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 29.916128] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/281 [ 29.916430] [ 29.916538] CPU: 0 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.916684] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.916794] Hardware name: linux,dummy-virt (DT) [ 29.916931] Call trace: [ 29.917007] show_stack+0x20/0x38 (C) [ 29.917375] dump_stack_lvl+0x8c/0xd0 [ 29.917592] print_report+0x310/0x608 [ 29.917806] kasan_report+0xdc/0x128 [ 29.917879] __asan_report_load1_noabort+0x20/0x30 [ 29.918106] vmalloc_oob+0x578/0x5d0 [ 29.918303] kunit_try_run_case+0x170/0x3f0 [ 29.918816] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.918983] kthread+0x328/0x630 [ 29.919350] ret_from_fork+0x10/0x20 [ 29.919514] [ 29.919614] The buggy address belongs to the virtual mapping at [ 29.919614] [ffff8000800fe000, ffff800080100000) created by: [ 29.919614] vmalloc_oob+0x98/0x5d0 [ 29.919696] [ 29.919727] The buggy address belongs to the physical page: [ 29.920013] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105783 [ 29.920255] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.920399] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 29.920677] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 29.920997] page dumped because: kasan: bad access detected [ 29.921108] [ 29.921170] Memory state around the buggy address: [ 29.921282] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.921468] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.921691] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 29.921738] ^ [ 29.921962] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 29.922268] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 29.922448] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 29.816823] ================================================================== [ 29.816870] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 29.816919] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.816981] [ 29.817012] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.817114] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.817142] Hardware name: linux,dummy-virt (DT) [ 29.817283] Call trace: [ 29.817317] show_stack+0x20/0x38 (C) [ 29.817371] dump_stack_lvl+0x8c/0xd0 [ 29.818073] print_report+0x118/0x608 [ 29.818163] kasan_report+0xdc/0x128 [ 29.818672] kasan_check_range+0x100/0x1a8 [ 29.818733] __kasan_check_write+0x20/0x30 [ 29.818807] kasan_atomics_helper+0x15b4/0x4858 [ 29.818873] kasan_atomics+0x198/0x2e0 [ 29.818930] kunit_try_run_case+0x170/0x3f0 [ 29.819136] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.819224] kthread+0x328/0x630 [ 29.819270] ret_from_fork+0x10/0x20 [ 29.819346] [ 29.819377] Allocated by task 277: [ 29.819750] kasan_save_stack+0x3c/0x68 [ 29.820030] kasan_save_track+0x20/0x40 [ 29.820229] kasan_save_alloc_info+0x40/0x58 [ 29.820288] __kasan_kmalloc+0xd4/0xd8 [ 29.820328] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.820375] kasan_atomics+0xb8/0x2e0 [ 29.820415] kunit_try_run_case+0x170/0x3f0 [ 29.820627] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.820984] kthread+0x328/0x630 [ 29.821241] ret_from_fork+0x10/0x20 [ 29.821479] [ 29.821816] The buggy address belongs to the object at fff00000c451ca00 [ 29.821816] which belongs to the cache kmalloc-64 of size 64 [ 29.821890] The buggy address is located 0 bytes to the right of [ 29.821890] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.822310] [ 29.822463] The buggy address belongs to the physical page: [ 29.822709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.822820] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.823073] page_type: f5(slab) [ 29.823173] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.823433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.823478] page dumped because: kasan: bad access detected [ 29.823557] [ 29.823968] Memory state around the buggy address: [ 29.824031] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.824357] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.824671] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.824725] ^ [ 29.825065] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.825500] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.825736] ================================================================== [ 29.843464] ================================================================== [ 29.843604] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 29.843841] Read of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.843976] [ 29.844026] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.844298] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.844497] Hardware name: linux,dummy-virt (DT) [ 29.844553] Call trace: [ 29.845143] show_stack+0x20/0x38 (C) [ 29.845300] dump_stack_lvl+0x8c/0xd0 [ 29.845413] print_report+0x118/0x608 [ 29.845462] kasan_report+0xdc/0x128 [ 29.845698] __asan_report_load8_noabort+0x20/0x30 [ 29.845777] kasan_atomics_helper+0x3df4/0x4858 [ 29.846832] kasan_atomics+0x198/0x2e0 [ 29.846925] kunit_try_run_case+0x170/0x3f0 [ 29.846979] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.847067] kthread+0x328/0x630 [ 29.847162] ret_from_fork+0x10/0x20 [ 29.847262] [ 29.847438] Allocated by task 277: [ 29.847807] kasan_save_stack+0x3c/0x68 [ 29.848264] kasan_save_track+0x20/0x40 [ 29.848534] kasan_save_alloc_info+0x40/0x58 [ 29.848683] __kasan_kmalloc+0xd4/0xd8 [ 29.848729] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.848771] kasan_atomics+0xb8/0x2e0 [ 29.849047] kunit_try_run_case+0x170/0x3f0 [ 29.849507] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.849759] kthread+0x328/0x630 [ 29.849804] ret_from_fork+0x10/0x20 [ 29.849954] [ 29.850178] The buggy address belongs to the object at fff00000c451ca00 [ 29.850178] which belongs to the cache kmalloc-64 of size 64 [ 29.850345] The buggy address is located 0 bytes to the right of [ 29.850345] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.850561] [ 29.850602] The buggy address belongs to the physical page: [ 29.850636] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.850719] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.850770] page_type: f5(slab) [ 29.850809] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.850870] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.850912] page dumped because: kasan: bad access detected [ 29.850955] [ 29.850980] Memory state around the buggy address: [ 29.851011] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.851066] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.851111] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.851161] ^ [ 29.851197] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.851242] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.851292] ================================================================== [ 29.598943] ================================================================== [ 29.598996] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 29.599253] Read of size 4 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.599329] [ 29.599362] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.599564] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.599663] Hardware name: linux,dummy-virt (DT) [ 29.599729] Call trace: [ 29.599756] show_stack+0x20/0x38 (C) [ 29.600119] dump_stack_lvl+0x8c/0xd0 [ 29.600180] print_report+0x118/0x608 [ 29.600230] kasan_report+0xdc/0x128 [ 29.600425] __asan_report_load4_noabort+0x20/0x30 [ 29.600531] kasan_atomics_helper+0x3dd8/0x4858 [ 29.600981] kasan_atomics+0x198/0x2e0 [ 29.601593] kunit_try_run_case+0x170/0x3f0 [ 29.601811] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.601958] kthread+0x328/0x630 [ 29.602295] ret_from_fork+0x10/0x20 [ 29.602698] [ 29.602784] Allocated by task 277: [ 29.602846] kasan_save_stack+0x3c/0x68 [ 29.602904] kasan_save_track+0x20/0x40 [ 29.602951] kasan_save_alloc_info+0x40/0x58 [ 29.603000] __kasan_kmalloc+0xd4/0xd8 [ 29.603040] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.603091] kasan_atomics+0xb8/0x2e0 [ 29.603139] kunit_try_run_case+0x170/0x3f0 [ 29.603184] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.603233] kthread+0x328/0x630 [ 29.603287] ret_from_fork+0x10/0x20 [ 29.603323] [ 29.603345] The buggy address belongs to the object at fff00000c451ca00 [ 29.603345] which belongs to the cache kmalloc-64 of size 64 [ 29.603404] The buggy address is located 0 bytes to the right of [ 29.603404] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.603469] [ 29.603500] The buggy address belongs to the physical page: [ 29.603553] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.603608] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.603658] page_type: f5(slab) [ 29.603718] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.603799] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.603841] page dumped because: kasan: bad access detected [ 29.603874] [ 29.603909] Memory state around the buggy address: [ 29.603943] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.603997] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.604042] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.604120] ^ [ 29.604260] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.605228] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.605513] ================================================================== [ 29.792773] ================================================================== [ 29.792920] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 29.793144] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.793270] [ 29.793304] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.793394] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.793604] Hardware name: linux,dummy-virt (DT) [ 29.793645] Call trace: [ 29.793668] show_stack+0x20/0x38 (C) [ 29.793722] dump_stack_lvl+0x8c/0xd0 [ 29.793770] print_report+0x118/0x608 [ 29.793961] kasan_report+0xdc/0x128 [ 29.794026] kasan_check_range+0x100/0x1a8 [ 29.794098] __kasan_check_write+0x20/0x30 [ 29.794147] kasan_atomics_helper+0x147c/0x4858 [ 29.794202] kasan_atomics+0x198/0x2e0 [ 29.794260] kunit_try_run_case+0x170/0x3f0 [ 29.794311] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.794365] kthread+0x328/0x630 [ 29.794409] ret_from_fork+0x10/0x20 [ 29.794468] [ 29.794497] Allocated by task 277: [ 29.794528] kasan_save_stack+0x3c/0x68 [ 29.794571] kasan_save_track+0x20/0x40 [ 29.794618] kasan_save_alloc_info+0x40/0x58 [ 29.794659] __kasan_kmalloc+0xd4/0xd8 [ 29.794698] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.794747] kasan_atomics+0xb8/0x2e0 [ 29.794799] kunit_try_run_case+0x170/0x3f0 [ 29.794840] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.794896] kthread+0x328/0x630 [ 29.794934] ret_from_fork+0x10/0x20 [ 29.794972] [ 29.794993] The buggy address belongs to the object at fff00000c451ca00 [ 29.794993] which belongs to the cache kmalloc-64 of size 64 [ 29.795062] The buggy address is located 0 bytes to the right of [ 29.795062] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.795839] [ 29.795887] The buggy address belongs to the physical page: [ 29.795922] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.795977] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.796027] page_type: f5(slab) [ 29.796418] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.796670] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.797205] page dumped because: kasan: bad access detected [ 29.797390] [ 29.797415] Memory state around the buggy address: [ 29.797626] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.797878] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.797954] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.798219] ^ [ 29.798437] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.798775] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.798825] ================================================================== [ 29.711766] ================================================================== [ 29.711835] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 29.711919] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.711990] [ 29.712068] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.712158] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.712199] Hardware name: linux,dummy-virt (DT) [ 29.712383] Call trace: [ 29.712444] show_stack+0x20/0x38 (C) [ 29.712572] dump_stack_lvl+0x8c/0xd0 [ 29.712715] print_report+0x118/0x608 [ 29.713008] kasan_report+0xdc/0x128 [ 29.713125] kasan_check_range+0x100/0x1a8 [ 29.713308] __kasan_check_write+0x20/0x30 [ 29.713405] kasan_atomics_helper+0x10c0/0x4858 [ 29.713464] kasan_atomics+0x198/0x2e0 [ 29.714187] kunit_try_run_case+0x170/0x3f0 [ 29.714277] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.714336] kthread+0x328/0x630 [ 29.714681] ret_from_fork+0x10/0x20 [ 29.715132] [ 29.715212] Allocated by task 277: [ 29.715318] kasan_save_stack+0x3c/0x68 [ 29.715506] kasan_save_track+0x20/0x40 [ 29.715755] kasan_save_alloc_info+0x40/0x58 [ 29.716028] __kasan_kmalloc+0xd4/0xd8 [ 29.716194] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.716395] kasan_atomics+0xb8/0x2e0 [ 29.716444] kunit_try_run_case+0x170/0x3f0 [ 29.716609] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.716860] kthread+0x328/0x630 [ 29.717071] ret_from_fork+0x10/0x20 [ 29.717237] [ 29.717267] The buggy address belongs to the object at fff00000c451ca00 [ 29.717267] which belongs to the cache kmalloc-64 of size 64 [ 29.717481] The buggy address is located 0 bytes to the right of [ 29.717481] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.717724] [ 29.717763] The buggy address belongs to the physical page: [ 29.717928] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.718185] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.718244] page_type: f5(slab) [ 29.718516] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.718804] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.718853] page dumped because: kasan: bad access detected [ 29.719080] [ 29.719220] Memory state around the buggy address: [ 29.719608] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.719674] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.719866] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.720141] ^ [ 29.720188] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.720375] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.720469] ================================================================== [ 29.811518] ================================================================== [ 29.811753] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 29.811817] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.811867] [ 29.811909] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.812140] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.812435] Hardware name: linux,dummy-virt (DT) [ 29.812647] Call trace: [ 29.812891] show_stack+0x20/0x38 (C) [ 29.812976] dump_stack_lvl+0x8c/0xd0 [ 29.813114] print_report+0x118/0x608 [ 29.813404] kasan_report+0xdc/0x128 [ 29.813695] kasan_check_range+0x100/0x1a8 [ 29.813912] __kasan_check_write+0x20/0x30 [ 29.814330] kasan_atomics_helper+0x154c/0x4858 [ 29.814584] kasan_atomics+0x198/0x2e0 [ 29.814711] kunit_try_run_case+0x170/0x3f0 [ 29.814831] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.814937] kthread+0x328/0x630 [ 29.815116] ret_from_fork+0x10/0x20 [ 29.815193] [ 29.815220] Allocated by task 277: [ 29.815265] kasan_save_stack+0x3c/0x68 [ 29.815309] kasan_save_track+0x20/0x40 [ 29.815350] kasan_save_alloc_info+0x40/0x58 [ 29.815388] __kasan_kmalloc+0xd4/0xd8 [ 29.815428] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.815477] kasan_atomics+0xb8/0x2e0 [ 29.815517] kunit_try_run_case+0x170/0x3f0 [ 29.815557] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.815619] kthread+0x328/0x630 [ 29.815663] ret_from_fork+0x10/0x20 [ 29.815702] [ 29.815722] The buggy address belongs to the object at fff00000c451ca00 [ 29.815722] which belongs to the cache kmalloc-64 of size 64 [ 29.815781] The buggy address is located 0 bytes to the right of [ 29.815781] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.815847] [ 29.815888] The buggy address belongs to the physical page: [ 29.815939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.815994] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.816051] page_type: f5(slab) [ 29.816100] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.816152] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.816194] page dumped because: kasan: bad access detected [ 29.816226] [ 29.816247] Memory state around the buggy address: [ 29.816284] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.816329] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.816379] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.816442] ^ [ 29.816499] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.816542] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.816590] ================================================================== [ 29.730174] ================================================================== [ 29.730230] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 29.730283] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.730341] [ 29.730517] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.730776] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.730980] Hardware name: linux,dummy-virt (DT) [ 29.731025] Call trace: [ 29.731092] show_stack+0x20/0x38 (C) [ 29.731302] dump_stack_lvl+0x8c/0xd0 [ 29.731440] print_report+0x118/0x608 [ 29.731494] kasan_report+0xdc/0x128 [ 29.731541] kasan_check_range+0x100/0x1a8 [ 29.731592] __kasan_check_write+0x20/0x30 [ 29.731638] kasan_atomics_helper+0x1190/0x4858 [ 29.731688] kasan_atomics+0x198/0x2e0 [ 29.732049] kunit_try_run_case+0x170/0x3f0 [ 29.732291] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.732472] kthread+0x328/0x630 [ 29.732718] ret_from_fork+0x10/0x20 [ 29.733161] [ 29.733186] Allocated by task 277: [ 29.733255] kasan_save_stack+0x3c/0x68 [ 29.733475] kasan_save_track+0x20/0x40 [ 29.733551] kasan_save_alloc_info+0x40/0x58 [ 29.733724] __kasan_kmalloc+0xd4/0xd8 [ 29.733948] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.734000] kasan_atomics+0xb8/0x2e0 [ 29.734326] kunit_try_run_case+0x170/0x3f0 [ 29.734488] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.734689] kthread+0x328/0x630 [ 29.734741] ret_from_fork+0x10/0x20 [ 29.734780] [ 29.734801] The buggy address belongs to the object at fff00000c451ca00 [ 29.734801] which belongs to the cache kmalloc-64 of size 64 [ 29.735030] The buggy address is located 0 bytes to the right of [ 29.735030] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.735156] [ 29.735197] The buggy address belongs to the physical page: [ 29.735233] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.735287] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.735334] page_type: f5(slab) [ 29.735376] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.735435] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.735487] page dumped because: kasan: bad access detected [ 29.735530] [ 29.735549] Memory state around the buggy address: [ 29.735582] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.735634] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.735677] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.735726] ^ [ 29.735793] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.736072] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.736156] ================================================================== [ 29.747747] ================================================================== [ 29.747871] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 29.747981] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.748032] [ 29.748073] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.748400] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.748462] Hardware name: linux,dummy-virt (DT) [ 29.748589] Call trace: [ 29.748648] show_stack+0x20/0x38 (C) [ 29.748847] dump_stack_lvl+0x8c/0xd0 [ 29.749083] print_report+0x118/0x608 [ 29.749260] kasan_report+0xdc/0x128 [ 29.749403] kasan_check_range+0x100/0x1a8 [ 29.749510] __kasan_check_write+0x20/0x30 [ 29.749712] kasan_atomics_helper+0x126c/0x4858 [ 29.749906] kasan_atomics+0x198/0x2e0 [ 29.750221] kunit_try_run_case+0x170/0x3f0 [ 29.750296] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.750352] kthread+0x328/0x630 [ 29.750516] ret_from_fork+0x10/0x20 [ 29.750589] [ 29.750622] Allocated by task 277: [ 29.750660] kasan_save_stack+0x3c/0x68 [ 29.750712] kasan_save_track+0x20/0x40 [ 29.750760] kasan_save_alloc_info+0x40/0x58 [ 29.750800] __kasan_kmalloc+0xd4/0xd8 [ 29.750839] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.750880] kasan_atomics+0xb8/0x2e0 [ 29.750916] kunit_try_run_case+0x170/0x3f0 [ 29.750967] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.751014] kthread+0x328/0x630 [ 29.751333] ret_from_fork+0x10/0x20 [ 29.751653] [ 29.751715] The buggy address belongs to the object at fff00000c451ca00 [ 29.751715] which belongs to the cache kmalloc-64 of size 64 [ 29.752149] The buggy address is located 0 bytes to the right of [ 29.752149] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.752406] [ 29.752432] The buggy address belongs to the physical page: [ 29.752467] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.752522] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.752571] page_type: f5(slab) [ 29.752610] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.753241] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.753580] page dumped because: kasan: bad access detected [ 29.753819] [ 29.753867] Memory state around the buggy address: [ 29.754229] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.754491] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.754750] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.754801] ^ [ 29.754839] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.755071] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.755318] ================================================================== [ 29.774088] ================================================================== [ 29.774441] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 29.774785] Read of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.774964] [ 29.775073] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.775500] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.775710] Hardware name: linux,dummy-virt (DT) [ 29.775803] Call trace: [ 29.775828] show_stack+0x20/0x38 (C) [ 29.775884] dump_stack_lvl+0x8c/0xd0 [ 29.776003] print_report+0x118/0x608 [ 29.776070] kasan_report+0xdc/0x128 [ 29.776118] __asan_report_load8_noabort+0x20/0x30 [ 29.776167] kasan_atomics_helper+0x3f04/0x4858 [ 29.776219] kasan_atomics+0x198/0x2e0 [ 29.776266] kunit_try_run_case+0x170/0x3f0 [ 29.776318] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.776384] kthread+0x328/0x630 [ 29.776430] ret_from_fork+0x10/0x20 [ 29.776482] [ 29.776511] Allocated by task 277: [ 29.776551] kasan_save_stack+0x3c/0x68 [ 29.776605] kasan_save_track+0x20/0x40 [ 29.776650] kasan_save_alloc_info+0x40/0x58 [ 29.776689] __kasan_kmalloc+0xd4/0xd8 [ 29.776728] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.776769] kasan_atomics+0xb8/0x2e0 [ 29.776808] kunit_try_run_case+0x170/0x3f0 [ 29.776862] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.776909] kthread+0x328/0x630 [ 29.776949] ret_from_fork+0x10/0x20 [ 29.776997] [ 29.777017] The buggy address belongs to the object at fff00000c451ca00 [ 29.777017] which belongs to the cache kmalloc-64 of size 64 [ 29.777398] The buggy address is located 0 bytes to the right of [ 29.777398] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.777807] [ 29.777863] The buggy address belongs to the physical page: [ 29.777915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.777987] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.778463] page_type: f5(slab) [ 29.778797] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.778993] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.779120] page dumped because: kasan: bad access detected [ 29.779201] [ 29.779595] Memory state around the buggy address: [ 29.779711] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.779959] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.780035] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.780142] ^ [ 29.780447] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.780503] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.780940] ================================================================== [ 29.525954] ================================================================== [ 29.526038] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 29.526114] Write of size 4 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.526173] [ 29.526204] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.526291] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.526320] Hardware name: linux,dummy-virt (DT) [ 29.526468] Call trace: [ 29.526501] show_stack+0x20/0x38 (C) [ 29.526554] dump_stack_lvl+0x8c/0xd0 [ 29.526603] print_report+0x118/0x608 [ 29.526653] kasan_report+0xdc/0x128 [ 29.526700] kasan_check_range+0x100/0x1a8 [ 29.526751] __kasan_check_write+0x20/0x30 [ 29.526823] kasan_atomics_helper+0xa6c/0x4858 [ 29.526874] kasan_atomics+0x198/0x2e0 [ 29.526930] kunit_try_run_case+0x170/0x3f0 [ 29.526978] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.527032] kthread+0x328/0x630 [ 29.527661] ret_from_fork+0x10/0x20 [ 29.527722] [ 29.527742] Allocated by task 277: [ 29.527806] kasan_save_stack+0x3c/0x68 [ 29.527930] kasan_save_track+0x20/0x40 [ 29.528120] kasan_save_alloc_info+0x40/0x58 [ 29.528239] __kasan_kmalloc+0xd4/0xd8 [ 29.528462] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.528776] kasan_atomics+0xb8/0x2e0 [ 29.528922] kunit_try_run_case+0x170/0x3f0 [ 29.529068] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.529180] kthread+0x328/0x630 [ 29.529692] ret_from_fork+0x10/0x20 [ 29.529902] [ 29.529946] The buggy address belongs to the object at fff00000c451ca00 [ 29.529946] which belongs to the cache kmalloc-64 of size 64 [ 29.530041] The buggy address is located 0 bytes to the right of [ 29.530041] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.530151] [ 29.530346] The buggy address belongs to the physical page: [ 29.530521] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.530776] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.531022] page_type: f5(slab) [ 29.531123] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.531285] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.531420] page dumped because: kasan: bad access detected [ 29.531460] [ 29.531501] Memory state around the buggy address: [ 29.531999] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.532156] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.532325] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.532614] ^ [ 29.532763] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.532837] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.533031] ================================================================== [ 29.781485] ================================================================== [ 29.781746] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 29.782076] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.782450] [ 29.782525] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.782624] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.782831] Hardware name: linux,dummy-virt (DT) [ 29.782877] Call trace: [ 29.782907] show_stack+0x20/0x38 (C) [ 29.782960] dump_stack_lvl+0x8c/0xd0 [ 29.783435] print_report+0x118/0x608 [ 29.783520] kasan_report+0xdc/0x128 [ 29.783574] kasan_check_range+0x100/0x1a8 [ 29.783802] __kasan_check_write+0x20/0x30 [ 29.783871] kasan_atomics_helper+0x1414/0x4858 [ 29.783923] kasan_atomics+0x198/0x2e0 [ 29.783970] kunit_try_run_case+0x170/0x3f0 [ 29.784019] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.784460] kthread+0x328/0x630 [ 29.784729] ret_from_fork+0x10/0x20 [ 29.784888] [ 29.784996] Allocated by task 277: [ 29.785597] kasan_save_stack+0x3c/0x68 [ 29.785752] kasan_save_track+0x20/0x40 [ 29.786066] kasan_save_alloc_info+0x40/0x58 [ 29.786464] __kasan_kmalloc+0xd4/0xd8 [ 29.786645] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.786986] kasan_atomics+0xb8/0x2e0 [ 29.787353] kunit_try_run_case+0x170/0x3f0 [ 29.787570] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.787637] kthread+0x328/0x630 [ 29.787672] ret_from_fork+0x10/0x20 [ 29.788073] [ 29.788117] The buggy address belongs to the object at fff00000c451ca00 [ 29.788117] which belongs to the cache kmalloc-64 of size 64 [ 29.788343] The buggy address is located 0 bytes to the right of [ 29.788343] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.788461] [ 29.788486] The buggy address belongs to the physical page: [ 29.788520] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.788780] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.789037] page_type: f5(slab) [ 29.789421] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.789616] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.789718] page dumped because: kasan: bad access detected [ 29.789783] [ 29.789990] Memory state around the buggy address: [ 29.790191] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.790284] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.790540] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.790727] ^ [ 29.790933] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.790987] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.791205] ================================================================== [ 29.800997] ================================================================== [ 29.801050] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 29.801589] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.801744] [ 29.801778] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.802090] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.802231] Hardware name: linux,dummy-virt (DT) [ 29.802474] Call trace: [ 29.802500] show_stack+0x20/0x38 (C) [ 29.802662] dump_stack_lvl+0x8c/0xd0 [ 29.802876] print_report+0x118/0x608 [ 29.802937] kasan_report+0xdc/0x128 [ 29.802991] kasan_check_range+0x100/0x1a8 [ 29.803040] __kasan_check_write+0x20/0x30 [ 29.803098] kasan_atomics_helper+0x14e4/0x4858 [ 29.803448] kasan_atomics+0x198/0x2e0 [ 29.803826] kunit_try_run_case+0x170/0x3f0 [ 29.803954] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.804161] kthread+0x328/0x630 [ 29.804355] ret_from_fork+0x10/0x20 [ 29.804578] [ 29.804640] Allocated by task 277: [ 29.805027] kasan_save_stack+0x3c/0x68 [ 29.805601] kasan_save_track+0x20/0x40 [ 29.805668] kasan_save_alloc_info+0x40/0x58 [ 29.806022] __kasan_kmalloc+0xd4/0xd8 [ 29.806219] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.806375] kasan_atomics+0xb8/0x2e0 [ 29.806685] kunit_try_run_case+0x170/0x3f0 [ 29.806833] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.807013] kthread+0x328/0x630 [ 29.807254] ret_from_fork+0x10/0x20 [ 29.807657] [ 29.807687] The buggy address belongs to the object at fff00000c451ca00 [ 29.807687] which belongs to the cache kmalloc-64 of size 64 [ 29.807763] The buggy address is located 0 bytes to the right of [ 29.807763] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.808010] [ 29.808285] The buggy address belongs to the physical page: [ 29.808405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.808684] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.808744] page_type: f5(slab) [ 29.809005] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.809306] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.809536] page dumped because: kasan: bad access detected [ 29.809731] [ 29.809774] Memory state around the buggy address: [ 29.809925] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.809996] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.810047] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.810233] ^ [ 29.810441] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.810734] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.810848] ================================================================== [ 29.737786] ================================================================== [ 29.737846] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 29.737900] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.738066] [ 29.738101] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.738198] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.738431] Hardware name: linux,dummy-virt (DT) [ 29.738797] Call trace: [ 29.738840] show_stack+0x20/0x38 (C) [ 29.738893] dump_stack_lvl+0x8c/0xd0 [ 29.739095] print_report+0x118/0x608 [ 29.739169] kasan_report+0xdc/0x128 [ 29.739303] kasan_check_range+0x100/0x1a8 [ 29.739353] __kasan_check_write+0x20/0x30 [ 29.739415] kasan_atomics_helper+0x11f8/0x4858 [ 29.739604] kasan_atomics+0x198/0x2e0 [ 29.739668] kunit_try_run_case+0x170/0x3f0 [ 29.739719] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.740433] kthread+0x328/0x630 [ 29.740762] ret_from_fork+0x10/0x20 [ 29.740859] [ 29.740926] Allocated by task 277: [ 29.740990] kasan_save_stack+0x3c/0x68 [ 29.741088] kasan_save_track+0x20/0x40 [ 29.741163] kasan_save_alloc_info+0x40/0x58 [ 29.741217] __kasan_kmalloc+0xd4/0xd8 [ 29.741257] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.741467] kasan_atomics+0xb8/0x2e0 [ 29.741617] kunit_try_run_case+0x170/0x3f0 [ 29.742002] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.742199] kthread+0x328/0x630 [ 29.742397] ret_from_fork+0x10/0x20 [ 29.742932] [ 29.743116] The buggy address belongs to the object at fff00000c451ca00 [ 29.743116] which belongs to the cache kmalloc-64 of size 64 [ 29.743365] The buggy address is located 0 bytes to the right of [ 29.743365] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.743589] [ 29.743812] The buggy address belongs to the physical page: [ 29.744044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.744297] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.744546] page_type: f5(slab) [ 29.744631] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.744936] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.745087] page dumped because: kasan: bad access detected [ 29.745193] [ 29.745271] Memory state around the buggy address: [ 29.745358] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.745547] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.745755] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.745826] ^ [ 29.745923] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.746081] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.746183] ================================================================== [ 29.654434] ================================================================== [ 29.654488] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 29.654541] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.654592] [ 29.654623] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.654712] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.655661] Hardware name: linux,dummy-virt (DT) [ 29.655751] Call trace: [ 29.655897] show_stack+0x20/0x38 (C) [ 29.656109] dump_stack_lvl+0x8c/0xd0 [ 29.656398] print_report+0x118/0x608 [ 29.656544] kasan_report+0xdc/0x128 [ 29.656818] __asan_report_store8_noabort+0x20/0x30 [ 29.657222] kasan_atomics_helper+0x3e5c/0x4858 [ 29.657426] kasan_atomics+0x198/0x2e0 [ 29.657508] kunit_try_run_case+0x170/0x3f0 [ 29.657640] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.657722] kthread+0x328/0x630 [ 29.657776] ret_from_fork+0x10/0x20 [ 29.657835] [ 29.657862] Allocated by task 277: [ 29.657899] kasan_save_stack+0x3c/0x68 [ 29.657945] kasan_save_track+0x20/0x40 [ 29.657985] kasan_save_alloc_info+0x40/0x58 [ 29.658023] __kasan_kmalloc+0xd4/0xd8 [ 29.658073] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.658114] kasan_atomics+0xb8/0x2e0 [ 29.658166] kunit_try_run_case+0x170/0x3f0 [ 29.658215] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.658261] kthread+0x328/0x630 [ 29.658304] ret_from_fork+0x10/0x20 [ 29.658352] [ 29.658387] The buggy address belongs to the object at fff00000c451ca00 [ 29.658387] which belongs to the cache kmalloc-64 of size 64 [ 29.658446] The buggy address is located 0 bytes to the right of [ 29.658446] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.658511] [ 29.658534] The buggy address belongs to the physical page: [ 29.658589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.658657] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.658706] page_type: f5(slab) [ 29.658746] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.658797] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.658839] page dumped because: kasan: bad access detected [ 29.658881] [ 29.658904] Memory state around the buggy address: [ 29.658946] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.659001] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.659045] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.659771] ^ [ 29.659839] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.659887] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.660294] ================================================================== [ 29.835498] ================================================================== [ 29.835551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 29.835605] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.835803] [ 29.835838] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.835927] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.836369] Hardware name: linux,dummy-virt (DT) [ 29.836460] Call trace: [ 29.836597] show_stack+0x20/0x38 (C) [ 29.836759] dump_stack_lvl+0x8c/0xd0 [ 29.836884] print_report+0x118/0x608 [ 29.836931] kasan_report+0xdc/0x128 [ 29.836988] kasan_check_range+0x100/0x1a8 [ 29.837203] __kasan_check_write+0x20/0x30 [ 29.837289] kasan_atomics_helper+0x1644/0x4858 [ 29.837467] kasan_atomics+0x198/0x2e0 [ 29.837703] kunit_try_run_case+0x170/0x3f0 [ 29.837873] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.838171] kthread+0x328/0x630 [ 29.838373] ret_from_fork+0x10/0x20 [ 29.838449] [ 29.838470] Allocated by task 277: [ 29.838511] kasan_save_stack+0x3c/0x68 [ 29.838555] kasan_save_track+0x20/0x40 [ 29.838595] kasan_save_alloc_info+0x40/0x58 [ 29.838652] __kasan_kmalloc+0xd4/0xd8 [ 29.838693] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.838735] kasan_atomics+0xb8/0x2e0 [ 29.838772] kunit_try_run_case+0x170/0x3f0 [ 29.838813] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.838868] kthread+0x328/0x630 [ 29.838904] ret_from_fork+0x10/0x20 [ 29.838957] [ 29.838987] The buggy address belongs to the object at fff00000c451ca00 [ 29.838987] which belongs to the cache kmalloc-64 of size 64 [ 29.839047] The buggy address is located 0 bytes to the right of [ 29.839047] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.839423] [ 29.839793] The buggy address belongs to the physical page: [ 29.839864] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.840196] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.840593] page_type: f5(slab) [ 29.840744] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.841160] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.841692] page dumped because: kasan: bad access detected [ 29.841752] [ 29.841806] Memory state around the buggy address: [ 29.841868] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.842051] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.842439] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.842568] ^ [ 29.842614] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.842695] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.842738] ================================================================== [ 29.851560] ================================================================== [ 29.851609] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 29.851657] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.851708] [ 29.851738] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.852354] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.852471] Hardware name: linux,dummy-virt (DT) [ 29.852514] Call trace: [ 29.852539] show_stack+0x20/0x38 (C) [ 29.852592] dump_stack_lvl+0x8c/0xd0 [ 29.852944] print_report+0x118/0x608 [ 29.853226] kasan_report+0xdc/0x128 [ 29.853539] kasan_check_range+0x100/0x1a8 [ 29.853658] __kasan_check_write+0x20/0x30 [ 29.853835] kasan_atomics_helper+0x16d0/0x4858 [ 29.854224] kasan_atomics+0x198/0x2e0 [ 29.854315] kunit_try_run_case+0x170/0x3f0 [ 29.854498] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.854714] kthread+0x328/0x630 [ 29.854767] ret_from_fork+0x10/0x20 [ 29.855066] [ 29.855247] Allocated by task 277: [ 29.855585] kasan_save_stack+0x3c/0x68 [ 29.855844] kasan_save_track+0x20/0x40 [ 29.855953] kasan_save_alloc_info+0x40/0x58 [ 29.856446] __kasan_kmalloc+0xd4/0xd8 [ 29.856591] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.856660] kasan_atomics+0xb8/0x2e0 [ 29.856729] kunit_try_run_case+0x170/0x3f0 [ 29.856771] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.857101] kthread+0x328/0x630 [ 29.857346] ret_from_fork+0x10/0x20 [ 29.857558] [ 29.857616] The buggy address belongs to the object at fff00000c451ca00 [ 29.857616] which belongs to the cache kmalloc-64 of size 64 [ 29.857914] The buggy address is located 0 bytes to the right of [ 29.857914] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.858377] [ 29.858580] The buggy address belongs to the physical page: [ 29.858644] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.858738] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.858996] page_type: f5(slab) [ 29.859167] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.859579] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.859712] page dumped because: kasan: bad access detected [ 29.859838] [ 29.859905] Memory state around the buggy address: [ 29.859987] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.860364] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.860494] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.860700] ^ [ 29.860744] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.860915] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.861142] ================================================================== [ 29.662791] ================================================================== [ 29.662916] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 29.663227] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.663281] [ 29.663314] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.663536] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.663787] Hardware name: linux,dummy-virt (DT) [ 29.663947] Call trace: [ 29.664203] show_stack+0x20/0x38 (C) [ 29.664605] dump_stack_lvl+0x8c/0xd0 [ 29.664733] print_report+0x118/0x608 [ 29.664955] kasan_report+0xdc/0x128 [ 29.665395] kasan_check_range+0x100/0x1a8 [ 29.665589] __kasan_check_write+0x20/0x30 [ 29.666121] kasan_atomics_helper+0xeb8/0x4858 [ 29.666446] kasan_atomics+0x198/0x2e0 [ 29.666568] kunit_try_run_case+0x170/0x3f0 [ 29.666722] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.666934] kthread+0x328/0x630 [ 29.667029] ret_from_fork+0x10/0x20 [ 29.667619] [ 29.667730] Allocated by task 277: [ 29.667840] kasan_save_stack+0x3c/0x68 [ 29.667895] kasan_save_track+0x20/0x40 [ 29.667936] kasan_save_alloc_info+0x40/0x58 [ 29.667974] __kasan_kmalloc+0xd4/0xd8 [ 29.668271] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.668501] kasan_atomics+0xb8/0x2e0 [ 29.668971] kunit_try_run_case+0x170/0x3f0 [ 29.669156] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.669398] kthread+0x328/0x630 [ 29.669486] ret_from_fork+0x10/0x20 [ 29.669666] [ 29.669729] The buggy address belongs to the object at fff00000c451ca00 [ 29.669729] which belongs to the cache kmalloc-64 of size 64 [ 29.669792] The buggy address is located 0 bytes to the right of [ 29.669792] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.670006] [ 29.670127] The buggy address belongs to the physical page: [ 29.670545] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.670646] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.670826] page_type: f5(slab) [ 29.671024] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.671407] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.671534] page dumped because: kasan: bad access detected [ 29.671637] [ 29.671686] Memory state around the buggy address: [ 29.671722] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.672041] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.672281] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.672516] ^ [ 29.672740] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.672826] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.672939] ================================================================== [ 29.764693] ================================================================== [ 29.764746] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 29.764798] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.764866] [ 29.764897] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.765356] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.765548] Hardware name: linux,dummy-virt (DT) [ 29.765725] Call trace: [ 29.765766] show_stack+0x20/0x38 (C) [ 29.765820] dump_stack_lvl+0x8c/0xd0 [ 29.765930] print_report+0x118/0x608 [ 29.766019] kasan_report+0xdc/0x128 [ 29.766085] kasan_check_range+0x100/0x1a8 [ 29.766304] __kasan_check_write+0x20/0x30 [ 29.766368] kasan_atomics_helper+0x1384/0x4858 [ 29.766698] kasan_atomics+0x198/0x2e0 [ 29.766812] kunit_try_run_case+0x170/0x3f0 [ 29.767338] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.767417] kthread+0x328/0x630 [ 29.767465] ret_from_fork+0x10/0x20 [ 29.767801] [ 29.767849] Allocated by task 277: [ 29.767883] kasan_save_stack+0x3c/0x68 [ 29.767929] kasan_save_track+0x20/0x40 [ 29.767970] kasan_save_alloc_info+0x40/0x58 [ 29.768009] __kasan_kmalloc+0xd4/0xd8 [ 29.768580] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.769004] kasan_atomics+0xb8/0x2e0 [ 29.769240] kunit_try_run_case+0x170/0x3f0 [ 29.769327] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.769685] kthread+0x328/0x630 [ 29.769747] ret_from_fork+0x10/0x20 [ 29.769908] [ 29.770157] The buggy address belongs to the object at fff00000c451ca00 [ 29.770157] which belongs to the cache kmalloc-64 of size 64 [ 29.770363] The buggy address is located 0 bytes to the right of [ 29.770363] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.770582] [ 29.770752] The buggy address belongs to the physical page: [ 29.770985] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.771204] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.771412] page_type: f5(slab) [ 29.771494] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.771548] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.771780] page dumped because: kasan: bad access detected [ 29.772166] [ 29.772345] Memory state around the buggy address: [ 29.772419] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.772569] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.772616] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.772670] ^ [ 29.772714] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.773287] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.773554] ================================================================== [ 29.674148] ================================================================== [ 29.674382] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 29.674460] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.674663] [ 29.674875] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.675012] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.675069] Hardware name: linux,dummy-virt (DT) [ 29.675105] Call trace: [ 29.675588] show_stack+0x20/0x38 (C) [ 29.675701] dump_stack_lvl+0x8c/0xd0 [ 29.675772] print_report+0x118/0x608 [ 29.676156] kasan_report+0xdc/0x128 [ 29.676278] kasan_check_range+0x100/0x1a8 [ 29.676532] __kasan_check_write+0x20/0x30 [ 29.676612] kasan_atomics_helper+0xf20/0x4858 [ 29.676667] kasan_atomics+0x198/0x2e0 [ 29.676995] kunit_try_run_case+0x170/0x3f0 [ 29.677160] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.677535] kthread+0x328/0x630 [ 29.677800] ret_from_fork+0x10/0x20 [ 29.678018] [ 29.678127] Allocated by task 277: [ 29.678326] kasan_save_stack+0x3c/0x68 [ 29.678629] kasan_save_track+0x20/0x40 [ 29.678865] kasan_save_alloc_info+0x40/0x58 [ 29.678917] __kasan_kmalloc+0xd4/0xd8 [ 29.678957] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.679304] kasan_atomics+0xb8/0x2e0 [ 29.679771] kunit_try_run_case+0x170/0x3f0 [ 29.680076] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.680259] kthread+0x328/0x630 [ 29.680301] ret_from_fork+0x10/0x20 [ 29.680340] [ 29.680363] The buggy address belongs to the object at fff00000c451ca00 [ 29.680363] which belongs to the cache kmalloc-64 of size 64 [ 29.680428] The buggy address is located 0 bytes to the right of [ 29.680428] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.680492] [ 29.680523] The buggy address belongs to the physical page: [ 29.680553] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.680626] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.680683] page_type: f5(slab) [ 29.680732] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.680792] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.680840] page dumped because: kasan: bad access detected [ 29.680873] [ 29.680892] Memory state around the buggy address: [ 29.680933] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.680979] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.681028] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.681079] ^ [ 29.681127] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.681186] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.681235] ================================================================== [ 29.607019] ================================================================== [ 29.607389] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 29.607488] Write of size 4 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.607543] [ 29.607574] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.607662] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.607916] Hardware name: linux,dummy-virt (DT) [ 29.608307] Call trace: [ 29.608409] show_stack+0x20/0x38 (C) [ 29.608494] dump_stack_lvl+0x8c/0xd0 [ 29.608626] print_report+0x118/0x608 [ 29.608681] kasan_report+0xdc/0x128 [ 29.608878] kasan_check_range+0x100/0x1a8 [ 29.609325] __kasan_check_write+0x20/0x30 [ 29.609546] kasan_atomics_helper+0xd3c/0x4858 [ 29.609787] kasan_atomics+0x198/0x2e0 [ 29.610011] kunit_try_run_case+0x170/0x3f0 [ 29.610274] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.610493] kthread+0x328/0x630 [ 29.610556] ret_from_fork+0x10/0x20 [ 29.610672] [ 29.610850] Allocated by task 277: [ 29.611000] kasan_save_stack+0x3c/0x68 [ 29.611230] kasan_save_track+0x20/0x40 [ 29.611463] kasan_save_alloc_info+0x40/0x58 [ 29.611597] __kasan_kmalloc+0xd4/0xd8 [ 29.611638] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.611755] kasan_atomics+0xb8/0x2e0 [ 29.612208] kunit_try_run_case+0x170/0x3f0 [ 29.612439] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.612544] kthread+0x328/0x630 [ 29.612595] ret_from_fork+0x10/0x20 [ 29.612838] [ 29.612936] The buggy address belongs to the object at fff00000c451ca00 [ 29.612936] which belongs to the cache kmalloc-64 of size 64 [ 29.613228] The buggy address is located 0 bytes to the right of [ 29.613228] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.613400] [ 29.613479] The buggy address belongs to the physical page: [ 29.613529] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.613847] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.614205] page_type: f5(slab) [ 29.614396] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.614650] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.614790] page dumped because: kasan: bad access detected [ 29.614891] [ 29.615000] Memory state around the buggy address: [ 29.615033] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.615246] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.615720] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.615936] ^ [ 29.616026] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.616207] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.616286] ================================================================== [ 29.826232] ================================================================== [ 29.826302] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 29.826355] Read of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.826595] [ 29.826638] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.826729] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.827026] Hardware name: linux,dummy-virt (DT) [ 29.827323] Call trace: [ 29.827416] show_stack+0x20/0x38 (C) [ 29.827478] dump_stack_lvl+0x8c/0xd0 [ 29.827689] print_report+0x118/0x608 [ 29.827892] kasan_report+0xdc/0x128 [ 29.827963] __asan_report_load8_noabort+0x20/0x30 [ 29.828153] kasan_atomics_helper+0x3db0/0x4858 [ 29.828260] kasan_atomics+0x198/0x2e0 [ 29.828410] kunit_try_run_case+0x170/0x3f0 [ 29.828469] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.828524] kthread+0x328/0x630 [ 29.828569] ret_from_fork+0x10/0x20 [ 29.828920] [ 29.829257] Allocated by task 277: [ 29.829314] kasan_save_stack+0x3c/0x68 [ 29.829431] kasan_save_track+0x20/0x40 [ 29.829647] kasan_save_alloc_info+0x40/0x58 [ 29.830163] __kasan_kmalloc+0xd4/0xd8 [ 29.830329] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.830520] kasan_atomics+0xb8/0x2e0 [ 29.830726] kunit_try_run_case+0x170/0x3f0 [ 29.830792] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.831348] kthread+0x328/0x630 [ 29.831427] ret_from_fork+0x10/0x20 [ 29.831603] [ 29.831641] The buggy address belongs to the object at fff00000c451ca00 [ 29.831641] which belongs to the cache kmalloc-64 of size 64 [ 29.831839] The buggy address is located 0 bytes to the right of [ 29.831839] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.832076] [ 29.832103] The buggy address belongs to the physical page: [ 29.832138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.832194] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.832243] page_type: f5(slab) [ 29.832578] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.832906] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.833093] page dumped because: kasan: bad access detected [ 29.833222] [ 29.833396] Memory state around the buggy address: [ 29.833565] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.833746] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.833848] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.833946] ^ [ 29.834121] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.834205] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.834253] ================================================================== [ 29.626710] ================================================================== [ 29.626773] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 29.626826] Read of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.626901] [ 29.626938] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.627239] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.627283] Hardware name: linux,dummy-virt (DT) [ 29.627607] Call trace: [ 29.627706] show_stack+0x20/0x38 (C) [ 29.627768] dump_stack_lvl+0x8c/0xd0 [ 29.628145] print_report+0x118/0x608 [ 29.628262] kasan_report+0xdc/0x128 [ 29.628628] kasan_check_range+0x100/0x1a8 [ 29.628789] __kasan_check_read+0x20/0x30 [ 29.628845] kasan_atomics_helper+0xdd4/0x4858 [ 29.629156] kasan_atomics+0x198/0x2e0 [ 29.629724] kunit_try_run_case+0x170/0x3f0 [ 29.630205] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.630402] kthread+0x328/0x630 [ 29.630496] ret_from_fork+0x10/0x20 [ 29.630655] [ 29.630797] Allocated by task 277: [ 29.631107] kasan_save_stack+0x3c/0x68 [ 29.631328] kasan_save_track+0x20/0x40 [ 29.631497] kasan_save_alloc_info+0x40/0x58 [ 29.631545] __kasan_kmalloc+0xd4/0xd8 [ 29.631585] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.631787] kasan_atomics+0xb8/0x2e0 [ 29.631964] kunit_try_run_case+0x170/0x3f0 [ 29.632259] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.632317] kthread+0x328/0x630 [ 29.632473] ret_from_fork+0x10/0x20 [ 29.632546] [ 29.632585] The buggy address belongs to the object at fff00000c451ca00 [ 29.632585] which belongs to the cache kmalloc-64 of size 64 [ 29.632654] The buggy address is located 0 bytes to the right of [ 29.632654] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.632720] [ 29.632758] The buggy address belongs to the physical page: [ 29.632797] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.632852] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.633264] page_type: f5(slab) [ 29.633389] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.633792] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.633870] page dumped because: kasan: bad access detected [ 29.634077] [ 29.634303] Memory state around the buggy address: [ 29.634513] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.634585] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.634712] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.634813] ^ [ 29.634906] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.634950] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.635124] ================================================================== [ 29.887450] ================================================================== [ 29.887534] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 29.887588] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.887784] [ 29.887880] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.888097] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.888243] Hardware name: linux,dummy-virt (DT) [ 29.888287] Call trace: [ 29.888311] show_stack+0x20/0x38 (C) [ 29.888364] dump_stack_lvl+0x8c/0xd0 [ 29.888577] print_report+0x118/0x608 [ 29.889079] kasan_report+0xdc/0x128 [ 29.889238] kasan_check_range+0x100/0x1a8 [ 29.889363] __kasan_check_write+0x20/0x30 [ 29.889505] kasan_atomics_helper+0x17ec/0x4858 [ 29.889639] kasan_atomics+0x198/0x2e0 [ 29.889697] kunit_try_run_case+0x170/0x3f0 [ 29.889934] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.890098] kthread+0x328/0x630 [ 29.890374] ret_from_fork+0x10/0x20 [ 29.890499] [ 29.890696] Allocated by task 277: [ 29.890872] kasan_save_stack+0x3c/0x68 [ 29.891273] kasan_save_track+0x20/0x40 [ 29.891349] kasan_save_alloc_info+0x40/0x58 [ 29.891480] __kasan_kmalloc+0xd4/0xd8 [ 29.891690] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.891833] kasan_atomics+0xb8/0x2e0 [ 29.892216] kunit_try_run_case+0x170/0x3f0 [ 29.892270] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.892317] kthread+0x328/0x630 [ 29.892353] ret_from_fork+0x10/0x20 [ 29.892391] [ 29.892413] The buggy address belongs to the object at fff00000c451ca00 [ 29.892413] which belongs to the cache kmalloc-64 of size 64 [ 29.892943] The buggy address is located 0 bytes to the right of [ 29.892943] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.893498] [ 29.893879] The buggy address belongs to the physical page: [ 29.894169] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.894254] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.894307] page_type: f5(slab) [ 29.894359] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.894410] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.894453] page dumped because: kasan: bad access detected [ 29.894593] [ 29.894621] Memory state around the buggy address: [ 29.894656] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.894702] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.894768] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.894809] ^ [ 29.894853] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.894904] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.894951] ================================================================== [ 29.862394] ================================================================== [ 29.862468] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 29.862531] Read of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.862673] [ 29.862707] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.862803] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.862957] Hardware name: linux,dummy-virt (DT) [ 29.863040] Call trace: [ 29.863095] show_stack+0x20/0x38 (C) [ 29.863159] dump_stack_lvl+0x8c/0xd0 [ 29.863529] print_report+0x118/0x608 [ 29.863616] kasan_report+0xdc/0x128 [ 29.863726] __asan_report_load8_noabort+0x20/0x30 [ 29.863793] kasan_atomics_helper+0x3e10/0x4858 [ 29.863844] kasan_atomics+0x198/0x2e0 [ 29.864179] kunit_try_run_case+0x170/0x3f0 [ 29.864260] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.864430] kthread+0x328/0x630 [ 29.864644] ret_from_fork+0x10/0x20 [ 29.864916] [ 29.864940] Allocated by task 277: [ 29.864973] kasan_save_stack+0x3c/0x68 [ 29.865157] kasan_save_track+0x20/0x40 [ 29.865208] kasan_save_alloc_info+0x40/0x58 [ 29.865247] __kasan_kmalloc+0xd4/0xd8 [ 29.865470] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.865524] kasan_atomics+0xb8/0x2e0 [ 29.865591] kunit_try_run_case+0x170/0x3f0 [ 29.865633] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.865678] kthread+0x328/0x630 [ 29.865724] ret_from_fork+0x10/0x20 [ 29.865764] [ 29.865785] The buggy address belongs to the object at fff00000c451ca00 [ 29.865785] which belongs to the cache kmalloc-64 of size 64 [ 29.865855] The buggy address is located 0 bytes to the right of [ 29.865855] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.865922] [ 29.865942] The buggy address belongs to the physical page: [ 29.865984] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.866044] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.866125] page_type: f5(slab) [ 29.866170] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.866234] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.866276] page dumped because: kasan: bad access detected [ 29.866318] [ 29.866344] Memory state around the buggy address: [ 29.866383] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.866427] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.866471] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.866509] ^ [ 29.866555] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.866611] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.866662] ================================================================== [ 29.534338] ================================================================== [ 29.534391] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 29.534446] Write of size 4 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.534499] [ 29.535112] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.535477] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.535529] Hardware name: linux,dummy-virt (DT) [ 29.535619] Call trace: [ 29.535646] show_stack+0x20/0x38 (C) [ 29.535919] dump_stack_lvl+0x8c/0xd0 [ 29.535994] print_report+0x118/0x608 [ 29.536503] kasan_report+0xdc/0x128 [ 29.536693] kasan_check_range+0x100/0x1a8 [ 29.536851] __kasan_check_write+0x20/0x30 [ 29.537498] kunit_try_run_case+0x170/0x3f0 [ 29.539178] [ 29.539366] The buggy address belongs to the physical page: [ 29.539451] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.539501] page_type: f5(slab) [ 29.539549] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.539601] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.539643] page dumped because: kasan: bad access detected [ 29.539675] [ 29.539705] Memory state around the buggy address: [ 29.539738] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.540042] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.540340] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.540423] ^ [ 29.540740] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.540896] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.541075] ================================================================== [ 29.695907] ================================================================== [ 29.695965] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 29.696042] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.696107] [ 29.696139] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.696226] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.696253] Hardware name: linux,dummy-virt (DT) [ 29.696299] Call trace: [ 29.696323] show_stack+0x20/0x38 (C) [ 29.696372] dump_stack_lvl+0x8c/0xd0 [ 29.696421] print_report+0x118/0x608 [ 29.696468] kasan_report+0xdc/0x128 [ 29.696525] kasan_check_range+0x100/0x1a8 [ 29.696577] __kasan_check_write+0x20/0x30 [ 29.696638] kasan_atomics_helper+0xff0/0x4858 [ 29.696688] kasan_atomics+0x198/0x2e0 [ 29.696735] kunit_try_run_case+0x170/0x3f0 [ 29.696784] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.696839] kthread+0x328/0x630 [ 29.696882] ret_from_fork+0x10/0x20 [ 29.696931] [ 29.696951] Allocated by task 277: [ 29.696980] kasan_save_stack+0x3c/0x68 [ 29.697022] kasan_save_track+0x20/0x40 [ 29.697328] kasan_save_alloc_info+0x40/0x58 [ 29.697673] __kasan_kmalloc+0xd4/0xd8 [ 29.698105] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.698194] kasan_atomics+0xb8/0x2e0 [ 29.698273] kunit_try_run_case+0x170/0x3f0 [ 29.698518] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.698682] kthread+0x328/0x630 [ 29.698864] ret_from_fork+0x10/0x20 [ 29.698946] [ 29.699268] The buggy address belongs to the object at fff00000c451ca00 [ 29.699268] which belongs to the cache kmalloc-64 of size 64 [ 29.699623] The buggy address is located 0 bytes to the right of [ 29.699623] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.700184] [ 29.700245] The buggy address belongs to the physical page: [ 29.700278] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.700332] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.700546] page_type: f5(slab) [ 29.700967] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.701484] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.701542] page dumped because: kasan: bad access detected [ 29.701703] [ 29.702139] Memory state around the buggy address: [ 29.702457] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.702605] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.702908] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.703301] ^ [ 29.703475] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.703602] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.703854] ================================================================== [ 29.756284] ================================================================== [ 29.756336] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 29.756793] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.756864] [ 29.757108] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.757211] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.757248] Hardware name: linux,dummy-virt (DT) [ 29.757279] Call trace: [ 29.757303] show_stack+0x20/0x38 (C) [ 29.757355] dump_stack_lvl+0x8c/0xd0 [ 29.757636] print_report+0x118/0x608 [ 29.757714] kasan_report+0xdc/0x128 [ 29.758038] kasan_check_range+0x100/0x1a8 [ 29.758193] __kasan_check_write+0x20/0x30 [ 29.758246] kasan_atomics_helper+0x12d8/0x4858 [ 29.758419] kasan_atomics+0x198/0x2e0 [ 29.758489] kunit_try_run_case+0x170/0x3f0 [ 29.758543] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.758801] kthread+0x328/0x630 [ 29.758979] ret_from_fork+0x10/0x20 [ 29.759231] [ 29.759279] Allocated by task 277: [ 29.759329] kasan_save_stack+0x3c/0x68 [ 29.759376] kasan_save_track+0x20/0x40 [ 29.759948] kasan_save_alloc_info+0x40/0x58 [ 29.760163] __kasan_kmalloc+0xd4/0xd8 [ 29.760247] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.760290] kasan_atomics+0xb8/0x2e0 [ 29.760327] kunit_try_run_case+0x170/0x3f0 [ 29.760369] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.760417] kthread+0x328/0x630 [ 29.760454] ret_from_fork+0x10/0x20 [ 29.761140] [ 29.761256] The buggy address belongs to the object at fff00000c451ca00 [ 29.761256] which belongs to the cache kmalloc-64 of size 64 [ 29.761323] The buggy address is located 0 bytes to the right of [ 29.761323] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.761953] [ 29.761995] The buggy address belongs to the physical page: [ 29.762031] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.762096] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.762203] page_type: f5(slab) [ 29.762246] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.762316] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.762360] page dumped because: kasan: bad access detected [ 29.762393] [ 29.762424] Memory state around the buggy address: [ 29.762457] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.762502] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.762555] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.762596] ^ [ 29.762636] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.762681] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.762736] ================================================================== [ 29.878320] ================================================================== [ 29.878536] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 29.878685] Read of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.878761] [ 29.878820] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.878981] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.879037] Hardware name: linux,dummy-virt (DT) [ 29.879220] Call trace: [ 29.879247] show_stack+0x20/0x38 (C) [ 29.879453] dump_stack_lvl+0x8c/0xd0 [ 29.879515] print_report+0x118/0x608 [ 29.879803] kasan_report+0xdc/0x128 [ 29.880298] __asan_report_load8_noabort+0x20/0x30 [ 29.880388] kasan_atomics_helper+0x3e20/0x4858 [ 29.880443] kasan_atomics+0x198/0x2e0 [ 29.880491] kunit_try_run_case+0x170/0x3f0 [ 29.880690] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.881202] kthread+0x328/0x630 [ 29.881335] ret_from_fork+0x10/0x20 [ 29.881438] [ 29.881476] Allocated by task 277: [ 29.881653] kasan_save_stack+0x3c/0x68 [ 29.881868] kasan_save_track+0x20/0x40 [ 29.882098] kasan_save_alloc_info+0x40/0x58 [ 29.882271] __kasan_kmalloc+0xd4/0xd8 [ 29.882322] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.882566] kasan_atomics+0xb8/0x2e0 [ 29.882740] kunit_try_run_case+0x170/0x3f0 [ 29.883103] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.883260] kthread+0x328/0x630 [ 29.883299] ret_from_fork+0x10/0x20 [ 29.883497] [ 29.883708] The buggy address belongs to the object at fff00000c451ca00 [ 29.883708] which belongs to the cache kmalloc-64 of size 64 [ 29.883904] The buggy address is located 0 bytes to the right of [ 29.883904] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.884111] [ 29.884137] The buggy address belongs to the physical page: [ 29.884322] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.884588] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.884723] page_type: f5(slab) [ 29.885110] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.885250] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.885355] page dumped because: kasan: bad access detected [ 29.885389] [ 29.885556] Memory state around the buggy address: [ 29.885739] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.885790] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.885834] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.885875] ^ [ 29.885943] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.885987] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.886028] ================================================================== [ 29.617917] ================================================================== [ 29.617969] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 29.618032] Read of size 4 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.618519] [ 29.618598] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.618693] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.618723] Hardware name: linux,dummy-virt (DT) [ 29.618755] Call trace: [ 29.618778] show_stack+0x20/0x38 (C) [ 29.618832] dump_stack_lvl+0x8c/0xd0 [ 29.618883] print_report+0x118/0x608 [ 29.618932] kasan_report+0xdc/0x128 [ 29.619002] __asan_report_load4_noabort+0x20/0x30 [ 29.619068] kasan_atomics_helper+0x3e04/0x4858 [ 29.619136] kasan_atomics+0x198/0x2e0 [ 29.619193] kunit_try_run_case+0x170/0x3f0 [ 29.619251] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.619311] kthread+0x328/0x630 [ 29.619355] ret_from_fork+0x10/0x20 [ 29.619415] [ 29.619444] Allocated by task 277: [ 29.619475] kasan_save_stack+0x3c/0x68 [ 29.619518] kasan_save_track+0x20/0x40 [ 29.619573] kasan_save_alloc_info+0x40/0x58 [ 29.619622] __kasan_kmalloc+0xd4/0xd8 [ 29.619663] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.619707] kasan_atomics+0xb8/0x2e0 [ 29.619744] kunit_try_run_case+0x170/0x3f0 [ 29.620532] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.620592] kthread+0x328/0x630 [ 29.621025] ret_from_fork+0x10/0x20 [ 29.621274] [ 29.621329] The buggy address belongs to the object at fff00000c451ca00 [ 29.621329] which belongs to the cache kmalloc-64 of size 64 [ 29.621525] The buggy address is located 0 bytes to the right of [ 29.621525] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.621778] [ 29.621819] The buggy address belongs to the physical page: [ 29.621870] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.622205] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.622387] page_type: f5(slab) [ 29.622499] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.622578] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.622974] page dumped because: kasan: bad access detected [ 29.623214] [ 29.623418] Memory state around the buggy address: [ 29.623494] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.623637] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.623751] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.623940] ^ [ 29.623982] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.624121] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.624348] ================================================================== [ 29.705377] ================================================================== [ 29.705441] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 29.705706] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.705786] [ 29.706073] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.706290] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.706506] Hardware name: linux,dummy-virt (DT) [ 29.706669] Call trace: [ 29.706841] show_stack+0x20/0x38 (C) [ 29.707027] dump_stack_lvl+0x8c/0xd0 [ 29.707359] print_report+0x118/0x608 [ 29.707533] kasan_report+0xdc/0x128 [ 29.707596] kasan_check_range+0x100/0x1a8 [ 29.707935] __kasan_check_write+0x20/0x30 [ 29.708148] kasan_atomics_helper+0x1058/0x4858 [ 29.708282] kasan_atomics+0x198/0x2e0 [ 29.708336] kunit_try_run_case+0x170/0x3f0 [ 29.708393] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.708594] kthread+0x328/0x630 [ 29.708836] ret_from_fork+0x10/0x20 [ 29.709006] [ 29.709040] Allocated by task 277: [ 29.709085] kasan_save_stack+0x3c/0x68 [ 29.709143] kasan_save_track+0x20/0x40 [ 29.709184] kasan_save_alloc_info+0x40/0x58 [ 29.709221] __kasan_kmalloc+0xd4/0xd8 [ 29.709262] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.709314] kasan_atomics+0xb8/0x2e0 [ 29.709371] kunit_try_run_case+0x170/0x3f0 [ 29.709413] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.709477] kthread+0x328/0x630 [ 29.709527] ret_from_fork+0x10/0x20 [ 29.709565] [ 29.709593] The buggy address belongs to the object at fff00000c451ca00 [ 29.709593] which belongs to the cache kmalloc-64 of size 64 [ 29.709675] The buggy address is located 0 bytes to the right of [ 29.709675] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.709750] [ 29.709787] The buggy address belongs to the physical page: [ 29.709827] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.709889] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.709951] page_type: f5(slab) [ 29.709992] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.710044] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.710094] page dumped because: kasan: bad access detected [ 29.710127] [ 29.710165] Memory state around the buggy address: [ 29.710198] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.710256] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.710307] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.710356] ^ [ 29.710400] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.710451] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.710500] ================================================================== [ 29.490137] ================================================================== [ 29.490204] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 29.490258] Read of size 4 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.490318] [ 29.490351] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.490441] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.490478] Hardware name: linux,dummy-virt (DT) [ 29.490511] Call trace: [ 29.490544] show_stack+0x20/0x38 (C) [ 29.490595] dump_stack_lvl+0x8c/0xd0 [ 29.490644] print_report+0x118/0x608 [ 29.490701] kasan_report+0xdc/0x128 [ 29.490750] __asan_report_load4_noabort+0x20/0x30 [ 29.490801] kasan_atomics_helper+0x42d8/0x4858 [ 29.490863] kasan_atomics+0x198/0x2e0 [ 29.490912] kunit_try_run_case+0x170/0x3f0 [ 29.490968] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.491023] kthread+0x328/0x630 [ 29.491466] ret_from_fork+0x10/0x20 [ 29.491527] [ 29.491594] Allocated by task 277: [ 29.491628] kasan_save_stack+0x3c/0x68 [ 29.492294] kasan_save_track+0x20/0x40 [ 29.492375] kasan_save_alloc_info+0x40/0x58 [ 29.492416] __kasan_kmalloc+0xd4/0xd8 [ 29.492456] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.492497] kasan_atomics+0xb8/0x2e0 [ 29.492537] kunit_try_run_case+0x170/0x3f0 [ 29.492940] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.493509] kthread+0x328/0x630 [ 29.493614] ret_from_fork+0x10/0x20 [ 29.493709] [ 29.493773] The buggy address belongs to the object at fff00000c451ca00 [ 29.493773] which belongs to the cache kmalloc-64 of size 64 [ 29.494174] The buggy address is located 0 bytes to the right of [ 29.494174] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.494312] [ 29.494337] The buggy address belongs to the physical page: [ 29.494779] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.494856] page_type: f5(slab) [ 29.495203] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.496341] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.499377] ================================================================== [ 29.721382] ================================================================== [ 29.721571] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 29.721752] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.721815] [ 29.721849] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.721941] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.722136] Hardware name: linux,dummy-virt (DT) [ 29.722346] Call trace: [ 29.722393] show_stack+0x20/0x38 (C) [ 29.722449] dump_stack_lvl+0x8c/0xd0 [ 29.722659] print_report+0x118/0x608 [ 29.722756] kasan_report+0xdc/0x128 [ 29.723091] kasan_check_range+0x100/0x1a8 [ 29.723172] __kasan_check_write+0x20/0x30 [ 29.723391] kasan_atomics_helper+0x1128/0x4858 [ 29.723456] kasan_atomics+0x198/0x2e0 [ 29.723603] kunit_try_run_case+0x170/0x3f0 [ 29.723659] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.723715] kthread+0x328/0x630 [ 29.724073] ret_from_fork+0x10/0x20 [ 29.724486] [ 29.724586] Allocated by task 277: [ 29.724624] kasan_save_stack+0x3c/0x68 [ 29.724672] kasan_save_track+0x20/0x40 [ 29.724712] kasan_save_alloc_info+0x40/0x58 [ 29.724759] __kasan_kmalloc+0xd4/0xd8 [ 29.724921] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.725136] kasan_atomics+0xb8/0x2e0 [ 29.725219] kunit_try_run_case+0x170/0x3f0 [ 29.725583] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.725936] kthread+0x328/0x630 [ 29.726193] ret_from_fork+0x10/0x20 [ 29.726244] [ 29.726266] The buggy address belongs to the object at fff00000c451ca00 [ 29.726266] which belongs to the cache kmalloc-64 of size 64 [ 29.726432] The buggy address is located 0 bytes to the right of [ 29.726432] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.726946] [ 29.726983] The buggy address belongs to the physical page: [ 29.727036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.727102] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.727153] page_type: f5(slab) [ 29.727388] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.727677] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.727925] page dumped because: kasan: bad access detected [ 29.728197] [ 29.728248] Memory state around the buggy address: [ 29.728450] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.728681] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.728733] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.728773] ^ [ 29.728841] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.728886] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.728942] ================================================================== [ 29.868490] ================================================================== [ 29.868702] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 29.869014] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.869095] [ 29.869144] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.869321] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.869390] Hardware name: linux,dummy-virt (DT) [ 29.869425] Call trace: [ 29.869449] show_stack+0x20/0x38 (C) [ 29.869682] dump_stack_lvl+0x8c/0xd0 [ 29.869754] print_report+0x118/0x608 [ 29.869896] kasan_report+0xdc/0x128 [ 29.870147] kasan_check_range+0x100/0x1a8 [ 29.870703] __kasan_check_write+0x20/0x30 [ 29.870781] kasan_atomics_helper+0x175c/0x4858 [ 29.870833] kasan_atomics+0x198/0x2e0 [ 29.870880] kunit_try_run_case+0x170/0x3f0 [ 29.871031] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.871151] kthread+0x328/0x630 [ 29.871214] ret_from_fork+0x10/0x20 [ 29.871554] [ 29.871590] Allocated by task 277: [ 29.871893] kasan_save_stack+0x3c/0x68 [ 29.872274] kasan_save_track+0x20/0x40 [ 29.872364] kasan_save_alloc_info+0x40/0x58 [ 29.872420] __kasan_kmalloc+0xd4/0xd8 [ 29.872460] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.872502] kasan_atomics+0xb8/0x2e0 [ 29.872540] kunit_try_run_case+0x170/0x3f0 [ 29.873014] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.873321] kthread+0x328/0x630 [ 29.873452] ret_from_fork+0x10/0x20 [ 29.873581] [ 29.873639] The buggy address belongs to the object at fff00000c451ca00 [ 29.873639] which belongs to the cache kmalloc-64 of size 64 [ 29.873947] The buggy address is located 0 bytes to the right of [ 29.873947] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.874362] [ 29.874881] The buggy address belongs to the physical page: [ 29.875043] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.875241] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.875560] page_type: f5(slab) [ 29.875609] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.876036] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.876234] page dumped because: kasan: bad access detected [ 29.876456] [ 29.876504] Memory state around the buggy address: [ 29.876661] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.876772] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.877152] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.877242] ^ [ 29.877323] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.877449] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.877561] ================================================================== [ 29.683045] ================================================================== [ 29.683559] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 29.683633] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.683685] [ 29.683715] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.683802] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.684290] Hardware name: linux,dummy-virt (DT) [ 29.684618] Call trace: [ 29.684770] show_stack+0x20/0x38 (C) [ 29.684849] dump_stack_lvl+0x8c/0xd0 [ 29.684920] print_report+0x118/0x608 [ 29.685281] kasan_report+0xdc/0x128 [ 29.685370] kasan_check_range+0x100/0x1a8 [ 29.685478] __kasan_check_write+0x20/0x30 [ 29.685541] kasan_atomics_helper+0xf88/0x4858 [ 29.685749] kasan_atomics+0x198/0x2e0 [ 29.685954] kunit_try_run_case+0x170/0x3f0 [ 29.686188] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.686309] kthread+0x328/0x630 [ 29.686357] ret_from_fork+0x10/0x20 [ 29.686663] [ 29.686995] Allocated by task 277: [ 29.687150] kasan_save_stack+0x3c/0x68 [ 29.687393] kasan_save_track+0x20/0x40 [ 29.688196] kasan_save_alloc_info+0x40/0x58 [ 29.688259] __kasan_kmalloc+0xd4/0xd8 [ 29.688301] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.688493] kasan_atomics+0xb8/0x2e0 [ 29.688896] kunit_try_run_case+0x170/0x3f0 [ 29.689241] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.689449] kthread+0x328/0x630 [ 29.689518] ret_from_fork+0x10/0x20 [ 29.689690] [ 29.690222] The buggy address belongs to the object at fff00000c451ca00 [ 29.690222] which belongs to the cache kmalloc-64 of size 64 [ 29.690291] The buggy address is located 0 bytes to the right of [ 29.690291] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.690488] [ 29.690823] The buggy address belongs to the physical page: [ 29.690865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.691181] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.691709] page_type: f5(slab) [ 29.691785] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.691859] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.691915] page dumped because: kasan: bad access detected [ 29.691947] [ 29.691968] Memory state around the buggy address: [ 29.692456] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.692666] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.692845] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.692945] ^ [ 29.693180] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.693830] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.693972] ================================================================== [ 29.508792] ================================================================== [ 29.508978] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 29.509188] Write of size 4 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.509253] [ 29.509415] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.509517] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.509725] Hardware name: linux,dummy-virt (DT) [ 29.509770] Call trace: [ 29.509796] show_stack+0x20/0x38 (C) [ 29.509960] dump_stack_lvl+0x8c/0xd0 [ 29.510022] print_report+0x118/0x608 [ 29.510166] kasan_report+0xdc/0x128 [ 29.510284] kasan_check_range+0x100/0x1a8 [ 29.510402] __kasan_check_write+0x20/0x30 [ 29.510451] kasan_atomics_helper+0x99c/0x4858 [ 29.510502] kasan_atomics+0x198/0x2e0 [ 29.510547] kunit_try_run_case+0x170/0x3f0 [ 29.511020] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.511122] kthread+0x328/0x630 [ 29.511327] ret_from_fork+0x10/0x20 [ 29.511394] [ 29.511414] Allocated by task 277: [ 29.511642] kasan_save_stack+0x3c/0x68 [ 29.511796] kasan_save_track+0x20/0x40 [ 29.512028] kasan_save_alloc_info+0x40/0x58 [ 29.512089] __kasan_kmalloc+0xd4/0xd8 [ 29.512129] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.512365] kasan_atomics+0xb8/0x2e0 [ 29.512597] kunit_try_run_case+0x170/0x3f0 [ 29.512709] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.512907] kthread+0x328/0x630 [ 29.512948] ret_from_fork+0x10/0x20 [ 29.513021] [ 29.513232] The buggy address belongs to the object at fff00000c451ca00 [ 29.513232] which belongs to the cache kmalloc-64 of size 64 [ 29.513331] The buggy address is located 0 bytes to the right of [ 29.513331] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.513540] [ 29.513567] The buggy address belongs to the physical page: [ 29.513601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.513656] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.513734] page_type: f5(slab) [ 29.513774] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.513839] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.513881] page dumped because: kasan: bad access detected [ 29.513923] [ 29.513944] Memory state around the buggy address: [ 29.513984] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.514038] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.514095] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.514152] ^ [ 29.514249] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.515894] [ 29.516292] Call trace: [ 29.517317] kasan_check_range+0x100/0x1a8 [ 29.521837] [ 29.521939] The buggy address belongs to the physical page: [ 29.522045] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.522162] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.522350] page_type: f5(slab) [ 29.522424] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.522799] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.523039] page dumped because: kasan: bad access detected [ 29.523192] [ 29.523252] Memory state around the buggy address: [ 29.523424] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.523655] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.523867] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.524044] ^ [ 29.524143] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.524192] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.524233] ================================================================== [ 29.636385] ================================================================== [ 29.636437] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 29.636653] Read of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.637065] [ 29.637192] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.637289] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.637320] Hardware name: linux,dummy-virt (DT) [ 29.637479] Call trace: [ 29.637506] show_stack+0x20/0x38 (C) [ 29.637562] dump_stack_lvl+0x8c/0xd0 [ 29.637645] print_report+0x118/0x608 [ 29.637978] kasan_report+0xdc/0x128 [ 29.638068] __asan_report_load8_noabort+0x20/0x30 [ 29.638176] kasan_atomics_helper+0x3f58/0x4858 [ 29.638270] kasan_atomics+0x198/0x2e0 [ 29.638668] kunit_try_run_case+0x170/0x3f0 [ 29.638747] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.639087] kthread+0x328/0x630 [ 29.639329] ret_from_fork+0x10/0x20 [ 29.639480] [ 29.639508] Allocated by task 277: [ 29.639740] kasan_save_stack+0x3c/0x68 [ 29.639813] kasan_save_track+0x20/0x40 [ 29.639855] kasan_save_alloc_info+0x40/0x58 [ 29.640134] __kasan_kmalloc+0xd4/0xd8 [ 29.640178] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.640227] kasan_atomics+0xb8/0x2e0 [ 29.640266] kunit_try_run_case+0x170/0x3f0 [ 29.640582] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.640821] kthread+0x328/0x630 [ 29.641038] ret_from_fork+0x10/0x20 [ 29.641092] [ 29.641168] The buggy address belongs to the object at fff00000c451ca00 [ 29.641168] which belongs to the cache kmalloc-64 of size 64 [ 29.641232] The buggy address is located 0 bytes to the right of [ 29.641232] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.641297] [ 29.641338] The buggy address belongs to the physical page: [ 29.641369] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.641436] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.641497] page_type: f5(slab) [ 29.641544] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.641597] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.641673] page dumped because: kasan: bad access detected [ 29.641716] [ 29.641750] Memory state around the buggy address: [ 29.641782] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.641828] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.641881] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.641932] ^ [ 29.641976] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.642030] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.642079] ================================================================== [ 29.643522] ================================================================== [ 29.643575] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 29.643631] Write of size 8 at addr fff00000c451ca30 by task kunit_try_catch/277 [ 29.644110] [ 29.644187] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.644960] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.645022] Hardware name: linux,dummy-virt (DT) [ 29.645131] Call trace: [ 29.645159] show_stack+0x20/0x38 (C) [ 29.645233] dump_stack_lvl+0x8c/0xd0 [ 29.645609] print_report+0x118/0x608 [ 29.645688] kasan_report+0xdc/0x128 [ 29.645869] kasan_check_range+0x100/0x1a8 [ 29.646105] __kasan_check_write+0x20/0x30 [ 29.646184] kasan_atomics_helper+0xe44/0x4858 [ 29.646373] kasan_atomics+0x198/0x2e0 [ 29.646617] kunit_try_run_case+0x170/0x3f0 [ 29.646814] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.647010] kthread+0x328/0x630 [ 29.647089] ret_from_fork+0x10/0x20 [ 29.647593] [ 29.647676] Allocated by task 277: [ 29.647829] kasan_save_stack+0x3c/0x68 [ 29.648021] kasan_save_track+0x20/0x40 [ 29.648247] kasan_save_alloc_info+0x40/0x58 [ 29.648386] __kasan_kmalloc+0xd4/0xd8 [ 29.648530] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.648897] kasan_atomics+0xb8/0x2e0 [ 29.648975] kunit_try_run_case+0x170/0x3f0 [ 29.649017] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.649331] kthread+0x328/0x630 [ 29.649615] ret_from_fork+0x10/0x20 [ 29.649795] [ 29.649920] The buggy address belongs to the object at fff00000c451ca00 [ 29.649920] which belongs to the cache kmalloc-64 of size 64 [ 29.650380] The buggy address is located 0 bytes to the right of [ 29.650380] allocated 48-byte region [fff00000c451ca00, fff00000c451ca30) [ 29.650615] [ 29.650710] The buggy address belongs to the physical page: [ 29.650984] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10451c [ 29.651182] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.651480] page_type: f5(slab) [ 29.651555] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.651742] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.651797] page dumped because: kasan: bad access detected [ 29.651958] [ 29.652254] Memory state around the buggy address: [ 29.652298] fff00000c451c900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.652344] fff00000c451c980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.652521] >fff00000c451ca00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.652752] ^ [ 29.652797] fff00000c451ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.653112] fff00000c451cb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.653207] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 29.238800] ================================================================== [ 29.238852] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 29.238964] [ 29.239184] Call trace: [ 29.239318] print_report+0x118/0x608 [ 29.239474] kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 29.239647] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.241569] __kasan_kmalloc+0xd4/0xd8 [ 29.242106] kunit_try_run_case+0x170/0x3f0 [ 29.243455] The buggy address is located 8 bytes inside of [ 29.243455] allocated 9-byte region [fff00000c16b9cc0, fff00000c16b9cc9) [ 29.245147] fff00000c16b9b80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 29.247696] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[ 29.119433] ================================================================== [ 29.119826] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 29.119907] Write of size 8 at addr fff00000c16b9cc8 by task kunit_try_catch/273 [ 29.119960] [ 29.119995] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.120473] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.120667] Hardware name: linux,dummy-virt (DT) [ 29.120731] Call trace: [ 29.120791] show_stack+0x20/0x38 (C) [ 29.120949] dump_stack_lvl+0x8c/0xd0 [ 29.121343] print_report+0x118/0x608 [ 29.121415] kasan_report+0xdc/0x128 [ 29.121831] kasan_check_range+0x100/0x1a8 [ 29.121992] __kasan_check_write+0x20/0x30 [ 29.122105] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 29.122351] kasan_bitops_generic+0x110/0x1c8 [ 29.122630] kunit_try_run_case+0x170/0x3f0 [ 29.122705] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.122910] kthread+0x328/0x630 [ 29.123114] ret_from_fork+0x10/0x20 [ 29.123293] [ 29.123609] Allocated by task 273: [ 29.123839] kasan_save_stack+0x3c/0x68 [ 29.124039] kasan_save_track+0x20/0x40 [ 29.124097] kasan_save_alloc_info+0x40/0x58 [ 29.124477] __kasan_kmalloc+0xd4/0xd8 [ 29.124740] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.124963] kasan_bitops_generic+0xa0/0x1c8 [ 29.125022] kunit_try_run_case+0x170/0x3f0 [ 29.125224] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.125279] kthread+0x328/0x630 [ 29.125533] ret_from_fork+0x10/0x20 [ 29.125734] [ 29.125853] The buggy address belongs to the object at fff00000c16b9cc0 [ 29.125853] which belongs to the cache kmalloc-16 of size 16 [ 29.126250] The buggy address is located 8 bytes inside of [ 29.126250] allocated 9-byte region [fff00000c16b9cc0, fff00000c16b9cc9) [ 29.126426] [ 29.126468] The buggy address belongs to the physical page: [ 29.126509] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c16b9ba0 pfn:0x1016b9 [ 29.126580] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.126642] page_type: f5(slab) [ 29.126683] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 29.126737] raw: fff00000c16b9ba0 000000008080007f 00000000f5000000 0000000000000000 [ 29.126790] page dumped because: kasan: bad access detected [ 29.126824] [ 29.126853] Memory state around the buggy address: [ 29.126887] fff00000c16b9b80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 29.126939] fff00000c16b9c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.126985] >fff00000c16b9c80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 29.127040] ^ [ 29.127090] fff00000c16b9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.127152] fff00000c16b9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.127192] ================================================================== [ 29.132673] ================================================================== [ 29.133132] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 29.133354] Read of size 8 at addr fff00000c16b9cc8 by task kunit_try_catch/273 [ 29.133541] [ 29.133585] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.133767] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.133801] Hardware name: linux,dummy-virt (DT) [ 29.133870] Call trace: [ 29.133897] show_stack+0x20/0x38 (C) [ 29.134014] dump_stack_lvl+0x8c/0xd0 [ 29.134078] print_report+0x118/0x608 [ 29.134274] kasan_report+0xdc/0x128 [ 29.134534] __asan_report_load8_noabort+0x20/0x30 [ 29.134605] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 29.134858] kasan_bitops_generic+0x110/0x1c8 [ 29.135018] kunit_try_run_case+0x170/0x3f0 [ 29.135276] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.135494] kthread+0x328/0x630 [ 29.135611] ret_from_fork+0x10/0x20 [ 29.135675] [ 29.135696] Allocated by task 273: [ 29.135729] kasan_save_stack+0x3c/0x68 [ 29.135783] kasan_save_track+0x20/0x40 [ 29.135990] kasan_save_alloc_info+0x40/0x58 [ 29.136124] __kasan_kmalloc+0xd4/0xd8 [ 29.136428] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.136594] kasan_bitops_generic+0xa0/0x1c8 [ 29.136694] kunit_try_run_case+0x170/0x3f0 [ 29.136735] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.136801] kthread+0x328/0x630 [ 29.137015] ret_from_fork+0x10/0x20 [ 29.137220] [ 29.137398] The buggy address belongs to the object at fff00000c16b9cc0 [ 29.137398] which belongs to the cache kmalloc-16 of size 16 [ 29.137535] The buggy address is located 8 bytes inside of [ 29.137535] allocated 9-byte region [fff00000c16b9cc0, fff00000c16b9cc9) [ 29.137640] [ 29.137662] The buggy address belongs to the physical page: [ 29.137743] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c16b9ba0 pfn:0x1016b9 [ 29.137959] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.138080] page_type: f5(slab) [ 29.138237] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 29.138695] raw: fff00000c16b9ba0 000000008080007f 00000000f5000000 0000000000000000 [ 29.138781] page dumped because: kasan: bad access detected [ 29.138914] [ 29.138957] Memory state around the buggy address: [ 29.139192] fff00000c16b9b80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 29.139415] fff00000c16b9c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.139526] >fff00000c16b9c80: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 29.139656] ^ [ 29.139713] fff00000c16b9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.139892] fff00000c16b9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.139981] ================================================================== [ 29.141753] ================================================================== [ 29.141809] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 29.141865] Write of size 8 at addr fff00000c16b9cc8 by task kunit_try_catch/273 [ 29.141918] [ 29.142309] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.142519] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.142553] Hardware name: linux,dummy-virt (DT) [ 29.142633] Call trace: [ 29.142661] show_stack+0x20/0x38 (C) [ 29.142982] dump_stack_lvl+0x8c/0xd0 [ 29.143043] print_report+0x118/0x608 [ 29.143103] kasan_report+0xdc/0x128 [ 29.143151] kasan_check_range+0x100/0x1a8 [ 29.143201] __kasan_check_write+0x20/0x30 [ 29.143268] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 29.143323] kasan_bitops_generic+0x110/0x1c8 [ 29.144584] kasan_bitops_generic+0xa0/0x1c8 [ 29.145344] [ 29.145949] The buggy address belongs to the physical page: [ 29.148153] fff00000c16b9c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.150463] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 29.151411] Call trace: [ 29.151662] __asan_report_load8_noabort+0x20/0x30 [ 29.151939] kthread+0x328/0x630 [ 29.152985] kasan_save_alloc_info+0x40/0x58 [ 29.153813] kunit_try_run_case+0x170/0x3f0 [ 29.154484] [ 29.154993] [ 29.155199] The buggy address belongs to the physical page: [ 29.155352] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.155497] raw: fff00000c16b9ba0 000000008080007f 00000000f5000000 0000000000000000 [ 29.156154] fff00000c16b9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.158597] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.159476] kasan_report+0xdc/0x128 [ 29.159674] kasan_check_range+0x100/0x1a8 [ 29.159877] __kasan_check_write+0x20/0x30 [ 29.160764] ret_from_fork+0x10/0x20 [ 29.161658] kasan_save_alloc_info+0x40/0x58 [ 29.161867] kunit_try_run_case+0x170/0x3f0 [ 29.162015] ret_from_fork+0x10/0x20 [ 29.162249] [ 29.162284] The buggy address belongs to the physical page: [ 29.162435] page_type: f5(slab) [ 29.162709] fff00000c16b9c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.165980] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.166260] dump_stack_lvl+0x8c/0xd0 [ 29.166615] print_report+0x118/0x608 [ 29.166731] kasan_report+0xdc/0x128 [ 29.167093] kasan_bitops_generic+0x110/0x1c8 [ 29.168153] kasan_save_stack+0x3c/0x68 [ 29.168540] kasan_save_alloc_info+0x40/0x58 [ 29.169814] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.170919] The buggy address is located 8 bytes inside of [ 29.170919] allocated 9-byte region [fff00000c16b9cc0, fff00000c16b9cc9) [ 29.172122] page_type: f5(slab) [ 29.173221] fff00000c16b9b80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 29.174167] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strnlen
[ 29.104601] ================================================================== [ 29.104652] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88 [ 29.104810] Read of size 1 at addr fff00000c5770790 by task kunit_try_catch/271 [ 29.104901] [ 29.104933] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.105241] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.105315] Hardware name: linux,dummy-virt (DT) [ 29.105411] Call trace: [ 29.105437] show_stack+0x20/0x38 (C) [ 29.105506] dump_stack_lvl+0x8c/0xd0 [ 29.105603] print_report+0x118/0x608 [ 29.105719] kasan_report+0xdc/0x128 [ 29.105772] __asan_report_load1_noabort+0x20/0x30 [ 29.105829] strnlen+0x80/0x88 [ 29.106086] kasan_strings+0x478/0xb00 [ 29.106170] kunit_try_run_case+0x170/0x3f0 [ 29.106314] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.106376] kthread+0x328/0x630 [ 29.106421] ret_from_fork+0x10/0x20 [ 29.106547] [ 29.106575] Allocated by task 271: [ 29.106623] kasan_save_stack+0x3c/0x68 [ 29.106676] kasan_save_track+0x20/0x40 [ 29.106778] kasan_save_alloc_info+0x40/0x58 [ 29.106822] __kasan_kmalloc+0xd4/0xd8 [ 29.106900] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.107219] kasan_strings+0xc8/0xb00 [ 29.107323] kunit_try_run_case+0x170/0x3f0 [ 29.107400] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.107567] kthread+0x328/0x630 [ 29.107613] ret_from_fork+0x10/0x20 [ 29.107680] [ 29.107759] Freed by task 271: [ 29.108046] kasan_save_stack+0x3c/0x68 [ 29.108168] kasan_save_track+0x20/0x40 [ 29.108218] kasan_save_free_info+0x4c/0x78 [ 29.108258] __kasan_slab_free+0x6c/0x98 [ 29.108297] kfree+0x214/0x3c8 [ 29.108338] kasan_strings+0x24c/0xb00 [ 29.108377] kunit_try_run_case+0x170/0x3f0 [ 29.108417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.108463] kthread+0x328/0x630 [ 29.108496] ret_from_fork+0x10/0x20 [ 29.108729] [ 29.108881] The buggy address belongs to the object at fff00000c5770780 [ 29.108881] which belongs to the cache kmalloc-32 of size 32 [ 29.108966] The buggy address is located 16 bytes inside of [ 29.108966] freed 32-byte region [fff00000c5770780, fff00000c57707a0) [ 29.109211] [ 29.109467] The buggy address belongs to the physical page: [ 29.109622] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105770 [ 29.109788] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.109919] page_type: f5(slab) [ 29.110026] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 29.110111] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 29.110322] page dumped because: kasan: bad access detected [ 29.110419] [ 29.110459] Memory state around the buggy address: [ 29.110604] fff00000c5770680: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 29.110679] fff00000c5770700: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 29.110840] >fff00000c5770780: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 29.110996] ^ [ 29.111069] fff00000c5770800: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 29.111242] fff00000c5770880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 29.111356] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strlen
[ 29.096831] ================================================================== [ 29.097162] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0 [ 29.097303] Read of size 1 at addr fff00000c5770790 by task kunit_try_catch/271 [ 29.097399] [ 29.097506] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.097628] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.097675] Hardware name: linux,dummy-virt (DT) [ 29.097710] Call trace: [ 29.097732] show_stack+0x20/0x38 (C) [ 29.097946] dump_stack_lvl+0x8c/0xd0 [ 29.098043] print_report+0x118/0x608 [ 29.098200] kasan_report+0xdc/0x128 [ 29.098267] __asan_report_load1_noabort+0x20/0x30 [ 29.098321] strlen+0xa8/0xb0 [ 29.098363] kasan_strings+0x418/0xb00 [ 29.098411] kunit_try_run_case+0x170/0x3f0 [ 29.098642] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.098846] kthread+0x328/0x630 [ 29.098906] ret_from_fork+0x10/0x20 [ 29.098959] [ 29.099018] Allocated by task 271: [ 29.099052] kasan_save_stack+0x3c/0x68 [ 29.099127] kasan_save_track+0x20/0x40 [ 29.099168] kasan_save_alloc_info+0x40/0x58 [ 29.099206] __kasan_kmalloc+0xd4/0xd8 [ 29.099254] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.099296] kasan_strings+0xc8/0xb00 [ 29.099333] kunit_try_run_case+0x170/0x3f0 [ 29.099382] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.099428] kthread+0x328/0x630 [ 29.099462] ret_from_fork+0x10/0x20 [ 29.099500] [ 29.099528] Freed by task 271: [ 29.099557] kasan_save_stack+0x3c/0x68 [ 29.099598] kasan_save_track+0x20/0x40 [ 29.099635] kasan_save_free_info+0x4c/0x78 [ 29.099672] __kasan_slab_free+0x6c/0x98 [ 29.099722] kfree+0x214/0x3c8 [ 29.099756] kasan_strings+0x24c/0xb00 [ 29.099823] kunit_try_run_case+0x170/0x3f0 [ 29.099867] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.100163] kthread+0x328/0x630 [ 29.100443] ret_from_fork+0x10/0x20 [ 29.100620] [ 29.100678] The buggy address belongs to the object at fff00000c5770780 [ 29.100678] which belongs to the cache kmalloc-32 of size 32 [ 29.100894] The buggy address is located 16 bytes inside of [ 29.100894] freed 32-byte region [fff00000c5770780, fff00000c57707a0) [ 29.101115] [ 29.101183] The buggy address belongs to the physical page: [ 29.101287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105770 [ 29.101412] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.101562] page_type: f5(slab) [ 29.101646] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 29.101749] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 29.101848] page dumped because: kasan: bad access detected [ 29.101975] [ 29.102093] Memory state around the buggy address: [ 29.102344] fff00000c5770680: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 29.102501] fff00000c5770700: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 29.102597] >fff00000c5770780: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 29.102712] ^ [ 29.102899] fff00000c5770800: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 29.102986] fff00000c5770880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 29.103026] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 26.616485] ================================================================== [ 26.616540] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 26.616621] Read of size 1 at addr fff00000c64e0000 by task kunit_try_catch/166 [ 26.616675] [ 26.616740] CPU: 0 UID: 0 PID: 166 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 26.616846] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.616872] Hardware name: linux,dummy-virt (DT) [ 26.616901] Call trace: [ 26.616921] show_stack+0x20/0x38 (C) [ 26.616970] dump_stack_lvl+0x8c/0xd0 [ 26.617016] print_report+0x118/0x608 [ 26.617073] kasan_report+0xdc/0x128 [ 26.617118] __asan_report_load1_noabort+0x20/0x30 [ 26.617166] page_alloc_uaf+0x328/0x350 [ 26.617211] kunit_try_run_case+0x170/0x3f0 [ 26.617365] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.617419] kthread+0x328/0x630 [ 26.617462] ret_from_fork+0x10/0x20 [ 26.617563] [ 26.617612] The buggy address belongs to the physical page: [ 26.617647] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064e0 [ 26.617775] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.617889] page_type: f0(buddy) [ 26.617985] raw: 0bfffe0000000000 fff00000ff616108 fff00000ff616108 0000000000000000 [ 26.618033] raw: 0000000000000000 0000000000000005 00000000f0000000 0000000000000000 [ 26.618081] page dumped because: kasan: bad access detected [ 26.618170] [ 26.618190] Memory state around the buggy address: [ 26.618222] fff00000c64dff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.618264] fff00000c64dff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.618304] >fff00000c64e0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.618358] ^ [ 26.618507] fff00000c64e0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.618681] fff00000c64e0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.618762] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[ 29.089264] ================================================================== [ 29.089317] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00 [ 29.089553] Read of size 1 at addr fff00000c5770790 by task kunit_try_catch/271 [ 29.089623] [ 29.089703] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.089794] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.089822] Hardware name: linux,dummy-virt (DT) [ 29.089967] Call trace: [ 29.090147] show_stack+0x20/0x38 (C) [ 29.090240] dump_stack_lvl+0x8c/0xd0 [ 29.090292] print_report+0x118/0x608 [ 29.090365] kasan_report+0xdc/0x128 [ 29.090439] __asan_report_load1_noabort+0x20/0x30 [ 29.090514] kasan_strings+0x95c/0xb00 [ 29.090561] kunit_try_run_case+0x170/0x3f0 [ 29.090846] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.090953] kthread+0x328/0x630 [ 29.091026] ret_from_fork+0x10/0x20 [ 29.091089] [ 29.091376] Allocated by task 271: [ 29.091461] kasan_save_stack+0x3c/0x68 [ 29.091526] kasan_save_track+0x20/0x40 [ 29.091593] kasan_save_alloc_info+0x40/0x58 [ 29.091653] __kasan_kmalloc+0xd4/0xd8 [ 29.091693] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.091734] kasan_strings+0xc8/0xb00 [ 29.091770] kunit_try_run_case+0x170/0x3f0 [ 29.091840] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.091890] kthread+0x328/0x630 [ 29.092080] ret_from_fork+0x10/0x20 [ 29.092229] [ 29.092306] Freed by task 271: [ 29.092337] kasan_save_stack+0x3c/0x68 [ 29.092377] kasan_save_track+0x20/0x40 [ 29.092417] kasan_save_free_info+0x4c/0x78 [ 29.092755] __kasan_slab_free+0x6c/0x98 [ 29.092870] kfree+0x214/0x3c8 [ 29.092983] kasan_strings+0x24c/0xb00 [ 29.093080] kunit_try_run_case+0x170/0x3f0 [ 29.093121] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.093446] kthread+0x328/0x630 [ 29.093534] ret_from_fork+0x10/0x20 [ 29.093648] [ 29.093727] The buggy address belongs to the object at fff00000c5770780 [ 29.093727] which belongs to the cache kmalloc-32 of size 32 [ 29.093837] The buggy address is located 16 bytes inside of [ 29.093837] freed 32-byte region [fff00000c5770780, fff00000c57707a0) [ 29.093942] [ 29.094202] The buggy address belongs to the physical page: [ 29.094256] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105770 [ 29.094371] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.094424] page_type: f5(slab) [ 29.094462] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 29.094514] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 29.094555] page dumped because: kasan: bad access detected [ 29.094589] [ 29.095105] Memory state around the buggy address: [ 29.095169] fff00000c5770680: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 29.095317] fff00000c5770700: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 29.095428] >fff00000c5770780: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 29.095588] ^ [ 29.095684] fff00000c5770800: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 29.095754] fff00000c5770880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 29.095871] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-strcmp
[ 29.079585] ================================================================== [ 29.079648] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 [ 29.079986] Read of size 1 at addr fff00000c5770790 by task kunit_try_catch/271 [ 29.080110] [ 29.080231] CPU: 0 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.080347] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.080452] Hardware name: linux,dummy-virt (DT) [ 29.080539] Call trace: [ 29.080614] show_stack+0x20/0x38 (C) [ 29.080735] dump_stack_lvl+0x8c/0xd0 [ 29.080829] print_report+0x118/0x608 [ 29.080879] kasan_report+0xdc/0x128 [ 29.080927] __asan_report_load1_noabort+0x20/0x30 [ 29.080976] strcmp+0xc0/0xc8 [ 29.081431] kasan_strings+0x340/0xb00 [ 29.081573] kunit_try_run_case+0x170/0x3f0 [ 29.081681] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.081843] kthread+0x328/0x630 [ 29.081986] ret_from_fork+0x10/0x20 [ 29.082191] [ 29.082242] Allocated by task 271: [ 29.082273] kasan_save_stack+0x3c/0x68 [ 29.082347] kasan_save_track+0x20/0x40 [ 29.082784] kasan_save_alloc_info+0x40/0x58 [ 29.082910] __kasan_kmalloc+0xd4/0xd8 [ 29.083017] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.083166] kasan_strings+0xc8/0xb00 [ 29.083253] kunit_try_run_case+0x170/0x3f0 [ 29.083348] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.083451] kthread+0x328/0x630 [ 29.083486] ret_from_fork+0x10/0x20 [ 29.083551] [ 29.083738] Freed by task 271: [ 29.083903] kasan_save_stack+0x3c/0x68 [ 29.084158] kasan_save_track+0x20/0x40 [ 29.084244] kasan_save_free_info+0x4c/0x78 [ 29.084306] __kasan_slab_free+0x6c/0x98 [ 29.084375] kfree+0x214/0x3c8 [ 29.084439] kasan_strings+0x24c/0xb00 [ 29.084481] kunit_try_run_case+0x170/0x3f0 [ 29.084523] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.084748] kthread+0x328/0x630 [ 29.084875] ret_from_fork+0x10/0x20 [ 29.084998] [ 29.085151] The buggy address belongs to the object at fff00000c5770780 [ 29.085151] which belongs to the cache kmalloc-32 of size 32 [ 29.085284] The buggy address is located 16 bytes inside of [ 29.085284] freed 32-byte region [fff00000c5770780, fff00000c57707a0) [ 29.085423] [ 29.085502] The buggy address belongs to the physical page: [ 29.085570] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105770 [ 29.085631] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.085689] page_type: f5(slab) [ 29.085750] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 29.085802] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 29.085842] page dumped because: kasan: bad access detected [ 29.085875] [ 29.085903] Memory state around the buggy address: [ 29.085937] fff00000c5770680: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 29.085982] fff00000c5770700: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 29.086038] >fff00000c5770780: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 29.086089] ^ [ 29.086121] fff00000c5770800: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 29.086180] fff00000c5770880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 29.086230] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[ 29.066360] ================================================================== [ 29.066422] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 29.066478] Read of size 1 at addr fff00000c5770618 by task kunit_try_catch/269 [ 29.066531] [ 29.066565] CPU: 0 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.066669] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.066698] Hardware name: linux,dummy-virt (DT) [ 29.066741] Call trace: [ 29.066765] show_stack+0x20/0x38 (C) [ 29.067159] dump_stack_lvl+0x8c/0xd0 [ 29.067339] print_report+0x118/0x608 [ 29.067393] kasan_report+0xdc/0x128 [ 29.067448] __asan_report_load1_noabort+0x20/0x30 [ 29.067573] memcmp+0x198/0x1d8 [ 29.067668] kasan_memcmp+0x16c/0x300 [ 29.067739] kunit_try_run_case+0x170/0x3f0 [ 29.067853] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.067927] kthread+0x328/0x630 [ 29.067976] ret_from_fork+0x10/0x20 [ 29.068026] [ 29.068048] Allocated by task 269: [ 29.068352] kasan_save_stack+0x3c/0x68 [ 29.068596] kasan_save_track+0x20/0x40 [ 29.068672] kasan_save_alloc_info+0x40/0x58 [ 29.068812] __kasan_kmalloc+0xd4/0xd8 [ 29.068924] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.069035] kasan_memcmp+0xbc/0x300 [ 29.069131] kunit_try_run_case+0x170/0x3f0 [ 29.069297] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.069343] kthread+0x328/0x630 [ 29.069716] ret_from_fork+0x10/0x20 [ 29.069878] [ 29.069948] The buggy address belongs to the object at fff00000c5770600 [ 29.069948] which belongs to the cache kmalloc-32 of size 32 [ 29.070131] The buggy address is located 0 bytes to the right of [ 29.070131] allocated 24-byte region [fff00000c5770600, fff00000c5770618) [ 29.070260] [ 29.070367] The buggy address belongs to the physical page: [ 29.070437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105770 [ 29.070534] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.070853] page_type: f5(slab) [ 29.071042] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 29.071218] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 29.071316] page dumped because: kasan: bad access detected [ 29.071368] [ 29.071495] Memory state around the buggy address: [ 29.071619] fff00000c5770500: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 29.071765] fff00000c5770580: 00 00 00 04 fc fc fc fc 00 00 07 fc fc fc fc fc [ 29.071822] >fff00000c5770600: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.071863] ^ [ 29.072047] fff00000c5770680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.072207] fff00000c5770700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.072373] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[ 29.050008] ================================================================== [ 29.050243] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340 [ 29.050308] Read of size 1 at addr ffff800080987b4a by task kunit_try_catch/265 [ 29.050360] [ 29.050390] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.050766] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.050812] Hardware name: linux,dummy-virt (DT) [ 29.050850] Call trace: [ 29.050921] show_stack+0x20/0x38 (C) [ 29.050985] dump_stack_lvl+0x8c/0xd0 [ 29.051035] print_report+0x310/0x608 [ 29.051103] kasan_report+0xdc/0x128 [ 29.051153] __asan_report_load1_noabort+0x20/0x30 [ 29.051203] kasan_alloca_oob_right+0x2dc/0x340 [ 29.051442] kunit_try_run_case+0x170/0x3f0 [ 29.051494] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.051549] kthread+0x328/0x630 [ 29.051594] ret_from_fork+0x10/0x20 [ 29.051767] [ 29.051792] The buggy address belongs to stack of task kunit_try_catch/265 [ 29.051898] [ 29.052050] The buggy address belongs to the virtual mapping at [ 29.052050] [ffff800080980000, ffff800080989000) created by: [ 29.052050] kernel_clone+0x150/0x7a8 [ 29.052216] [ 29.052240] The buggy address belongs to the physical page: [ 29.052293] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065b3 [ 29.052413] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.052542] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 29.052634] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 29.052768] page dumped because: kasan: bad access detected [ 29.052839] [ 29.052879] Memory state around the buggy address: [ 29.052918] ffff800080987a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.052964] ffff800080987a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.053033] >ffff800080987b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 29.053080] ^ [ 29.053135] ffff800080987b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 29.053178] ffff800080987c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 29.053218] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 29.031773] ================================================================== [ 29.031851] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 29.031909] Read of size 1 at addr ffff800080b17c2a by task kunit_try_catch/261 [ 29.031972] [ 29.032001] CPU: 0 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.032103] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.032130] Hardware name: linux,dummy-virt (DT) [ 29.032158] Call trace: [ 29.032445] show_stack+0x20/0x38 (C) [ 29.032592] dump_stack_lvl+0x8c/0xd0 [ 29.032714] print_report+0x310/0x608 [ 29.032849] kasan_report+0xdc/0x128 [ 29.033014] __asan_report_load1_noabort+0x20/0x30 [ 29.033124] kasan_stack_oob+0x238/0x270 [ 29.033209] kunit_try_run_case+0x170/0x3f0 [ 29.033257] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.033465] kthread+0x328/0x630 [ 29.033601] ret_from_fork+0x10/0x20 [ 29.033656] [ 29.033748] The buggy address belongs to stack of task kunit_try_catch/261 [ 29.033892] and is located at offset 138 in frame: [ 29.033960] kasan_stack_oob+0x0/0x270 [ 29.034168] [ 29.034221] This frame has 4 objects: [ 29.034332] [48, 49) '__assertion' [ 29.034371] [64, 72) 'array' [ 29.034423] [96, 112) '__assertion' [ 29.034479] [128, 138) 'stack_array' [ 29.034532] [ 29.034565] The buggy address belongs to the virtual mapping at [ 29.034565] [ffff800080b10000, ffff800080b19000) created by: [ 29.034565] kernel_clone+0x150/0x7a8 [ 29.034646] [ 29.034676] The buggy address belongs to the physical page: [ 29.034720] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105785 [ 29.034774] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.034845] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 29.034909] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 29.034961] page dumped because: kasan: bad access detected [ 29.035000] [ 29.035027] Memory state around the buggy address: [ 29.035071] ffff800080b17b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.035115] ffff800080b17b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 29.035160] >ffff800080b17c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 29.035239] ^ [ 29.035276] ffff800080b17c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 [ 29.035650] ffff800080b17d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 29.035833] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 29.015526] ================================================================== [ 29.015594] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 29.015667] Read of size 1 at addr ffff90e9b76c768d by task kunit_try_catch/257 [ 29.015717] [ 29.015752] CPU: 0 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.015870] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.015897] Hardware name: linux,dummy-virt (DT) [ 29.015974] Call trace: [ 29.016010] show_stack+0x20/0x38 (C) [ 29.016297] dump_stack_lvl+0x8c/0xd0 [ 29.016357] print_report+0x310/0x608 [ 29.016404] kasan_report+0xdc/0x128 [ 29.016512] __asan_report_load1_noabort+0x20/0x30 [ 29.016607] kasan_global_oob_right+0x230/0x270 [ 29.016684] kunit_try_run_case+0x170/0x3f0 [ 29.016809] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.017178] kthread+0x328/0x630 [ 29.017279] ret_from_fork+0x10/0x20 [ 29.017460] [ 29.017889] The buggy address belongs to the variable: [ 29.017967] global_array+0xd/0x40 [ 29.018038] [ 29.018570] The buggy address belongs to the virtual mapping at [ 29.018570] [ffff90e9b5860000, ffff90e9b7781000) created by: [ 29.018570] paging_init+0x66c/0x7d0 [ 29.018716] [ 29.019334] The buggy address belongs to the physical page: [ 29.019389] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47cc7 [ 29.019445] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 29.019523] raw: 03fffe0000002000 ffffc1ffc01f31c8 ffffc1ffc01f31c8 0000000000000000 [ 29.019573] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 29.019622] page dumped because: kasan: bad access detected [ 29.019654] [ 29.019672] Memory state around the buggy address: [ 29.019713] ffff90e9b76c7580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.019755] ffff90e9b76c7600: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9 [ 29.019797] >ffff90e9b76c7680: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 [ 29.019843] ^ [ 29.019878] ffff90e9b76c7700: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 [ 29.019930] ffff90e9b76c7780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.019970] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 28.993425] ================================================================== [ 28.993508] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 28.993765] Free of addr fff00000c5773901 by task kunit_try_catch/253 [ 28.994230] [ 28.994386] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 28.994546] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.994627] Hardware name: linux,dummy-virt (DT) [ 28.994732] Call trace: [ 28.994791] show_stack+0x20/0x38 (C) [ 28.994874] dump_stack_lvl+0x8c/0xd0 [ 28.995136] print_report+0x118/0x608 [ 28.995203] kasan_report_invalid_free+0xc0/0xe8 [ 28.995256] check_slab_allocation+0xfc/0x108 [ 28.995312] __kasan_mempool_poison_object+0x78/0x150 [ 28.995367] mempool_free+0x28c/0x328 [ 28.995414] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 28.995467] mempool_kmalloc_invalid_free+0xc0/0x118 [ 28.995515] kunit_try_run_case+0x170/0x3f0 [ 28.995578] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.995633] kthread+0x328/0x630 [ 28.995676] ret_from_fork+0x10/0x20 [ 28.995729] [ 28.995747] Allocated by task 253: [ 28.996113] kasan_save_stack+0x3c/0x68 [ 28.996275] kasan_save_track+0x20/0x40 [ 28.996381] kasan_save_alloc_info+0x40/0x58 [ 28.996437] __kasan_mempool_unpoison_object+0x11c/0x180 [ 28.996480] remove_element+0x130/0x1f8 [ 28.996548] mempool_alloc_preallocated+0x58/0xc0 [ 28.996613] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 28.996656] mempool_kmalloc_invalid_free+0xc0/0x118 [ 28.996695] kunit_try_run_case+0x170/0x3f0 [ 28.996843] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.996906] kthread+0x328/0x630 [ 28.996996] ret_from_fork+0x10/0x20 [ 28.997076] [ 28.997146] The buggy address belongs to the object at fff00000c5773900 [ 28.997146] which belongs to the cache kmalloc-128 of size 128 [ 28.997256] The buggy address is located 1 bytes inside of [ 28.997256] 128-byte region [fff00000c5773900, fff00000c5773980) [ 28.997512] [ 28.997596] The buggy address belongs to the physical page: [ 28.997660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105773 [ 28.997753] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.997910] page_type: f5(slab) [ 28.997948] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 28.998014] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 28.998362] page dumped because: kasan: bad access detected [ 28.998509] [ 28.998590] Memory state around the buggy address: [ 28.998685] fff00000c5773800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.998745] fff00000c5773880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.998788] >fff00000c5773900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.998938] ^ [ 28.999087] fff00000c5773980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.999252] fff00000c5773a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.999364] ================================================================== [ 29.005719] ================================================================== [ 29.005813] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 29.005876] Free of addr fff00000c6554001 by task kunit_try_catch/255 [ 29.005920] [ 29.005970] CPU: 0 UID: 0 PID: 255 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 29.006080] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.006107] Hardware name: linux,dummy-virt (DT) [ 29.006192] Call trace: [ 29.006215] show_stack+0x20/0x38 (C) [ 29.006264] dump_stack_lvl+0x8c/0xd0 [ 29.006443] print_report+0x118/0x608 [ 29.006499] kasan_report_invalid_free+0xc0/0xe8 [ 29.006737] __kasan_mempool_poison_object+0xfc/0x150 [ 29.006812] mempool_free+0x28c/0x328 [ 29.006886] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 29.006941] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 29.006993] kunit_try_run_case+0x170/0x3f0 [ 29.007039] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.007105] kthread+0x328/0x630 [ 29.007330] ret_from_fork+0x10/0x20 [ 29.007386] [ 29.007424] The buggy address belongs to the physical page: [ 29.007471] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106554 [ 29.007544] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.007609] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.007661] page_type: f8(unknown) [ 29.007702] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.007752] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.007801] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.007861] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.007910] head: 0bfffe0000000002 ffffc1ffc3195501 00000000ffffffff 00000000ffffffff [ 29.008089] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 29.008168] page dumped because: kasan: bad access detected [ 29.008213] [ 29.008237] Memory state around the buggy address: [ 29.008269] fff00000c6553f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.008319] fff00000c6553f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.008388] >fff00000c6554000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.008423] ^ [ 29.008451] fff00000c6554080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.008492] fff00000c6554100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.008562] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 28.963159] ================================================================== [ 28.963245] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 28.963305] Free of addr fff00000c5773500 by task kunit_try_catch/247 [ 28.963392] [ 28.963429] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 28.963544] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.963592] Hardware name: linux,dummy-virt (DT) [ 28.963645] Call trace: [ 28.963679] show_stack+0x20/0x38 (C) [ 28.963763] dump_stack_lvl+0x8c/0xd0 [ 28.963884] print_report+0x118/0x608 [ 28.964027] kasan_report_invalid_free+0xc0/0xe8 [ 28.964187] check_slab_allocation+0xd4/0x108 [ 28.964244] __kasan_mempool_poison_object+0x78/0x150 [ 28.964297] mempool_free+0x28c/0x328 [ 28.964573] mempool_double_free_helper+0x150/0x2e8 [ 28.964629] mempool_kmalloc_double_free+0xc0/0x118 [ 28.964766] kunit_try_run_case+0x170/0x3f0 [ 28.964860] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.964967] kthread+0x328/0x630 [ 28.965023] ret_from_fork+0x10/0x20 [ 28.965194] [ 28.965231] Allocated by task 247: [ 28.965261] kasan_save_stack+0x3c/0x68 [ 28.965571] kasan_save_track+0x20/0x40 [ 28.965681] kasan_save_alloc_info+0x40/0x58 [ 28.965719] __kasan_mempool_unpoison_object+0x11c/0x180 [ 28.965773] remove_element+0x130/0x1f8 [ 28.965816] mempool_alloc_preallocated+0x58/0xc0 [ 28.965855] mempool_double_free_helper+0x94/0x2e8 [ 28.965909] mempool_kmalloc_double_free+0xc0/0x118 [ 28.965964] kunit_try_run_case+0x170/0x3f0 [ 28.966005] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.966065] kthread+0x328/0x630 [ 28.966097] ret_from_fork+0x10/0x20 [ 28.966134] [ 28.966165] Freed by task 247: [ 28.966209] kasan_save_stack+0x3c/0x68 [ 28.966251] kasan_save_track+0x20/0x40 [ 28.966288] kasan_save_free_info+0x4c/0x78 [ 28.966322] __kasan_mempool_poison_object+0xc0/0x150 [ 28.966364] mempool_free+0x28c/0x328 [ 28.966396] mempool_double_free_helper+0x100/0x2e8 [ 28.966446] mempool_kmalloc_double_free+0xc0/0x118 [ 28.966508] kunit_try_run_case+0x170/0x3f0 [ 28.966546] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.966589] kthread+0x328/0x630 [ 28.966634] ret_from_fork+0x10/0x20 [ 28.966671] [ 28.966697] The buggy address belongs to the object at fff00000c5773500 [ 28.966697] which belongs to the cache kmalloc-128 of size 128 [ 28.966754] The buggy address is located 0 bytes inside of [ 28.966754] 128-byte region [fff00000c5773500, fff00000c5773580) [ 28.966814] [ 28.966833] The buggy address belongs to the physical page: [ 28.966865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105773 [ 28.966921] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.966983] page_type: f5(slab) [ 28.967024] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 28.967083] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 28.967123] page dumped because: kasan: bad access detected [ 28.967154] [ 28.967172] Memory state around the buggy address: [ 28.967206] fff00000c5773400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.967249] fff00000c5773480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.967290] >fff00000c5773500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.967748] ^ [ 28.967842] fff00000c5773580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.968008] fff00000c5773600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.968128] ================================================================== [ 28.983790] ================================================================== [ 28.983848] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 28.984219] Free of addr fff00000c6550000 by task kunit_try_catch/251 [ 28.984393] [ 28.984500] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 28.984625] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.984716] Hardware name: linux,dummy-virt (DT) [ 28.984748] Call trace: [ 28.984807] show_stack+0x20/0x38 (C) [ 28.984874] dump_stack_lvl+0x8c/0xd0 [ 28.985046] print_report+0x118/0x608 [ 28.985176] kasan_report_invalid_free+0xc0/0xe8 [ 28.985256] __kasan_mempool_poison_pages+0xe0/0xe8 [ 28.985307] mempool_free+0x24c/0x328 [ 28.985352] mempool_double_free_helper+0x150/0x2e8 [ 28.985400] mempool_page_alloc_double_free+0xbc/0x118 [ 28.985600] kunit_try_run_case+0x170/0x3f0 [ 28.985781] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.985998] kthread+0x328/0x630 [ 28.986075] ret_from_fork+0x10/0x20 [ 28.986174] [ 28.986296] The buggy address belongs to the physical page: [ 28.986373] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106550 [ 28.986453] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.986537] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 28.986596] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 28.986857] page dumped because: kasan: bad access detected [ 28.986905] [ 28.986924] Memory state around the buggy address: [ 28.987006] fff00000c654ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.987185] fff00000c654ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.987294] >fff00000c6550000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.987382] ^ [ 28.987472] fff00000c6550080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.987613] fff00000c6550100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.987713] ================================================================== [ 28.974745] ================================================================== [ 28.974805] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 28.974914] Free of addr fff00000c6550000 by task kunit_try_catch/249 [ 28.974955] [ 28.975009] CPU: 0 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 28.975146] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.975228] Hardware name: linux,dummy-virt (DT) [ 28.975287] Call trace: [ 28.975355] show_stack+0x20/0x38 (C) [ 28.975435] dump_stack_lvl+0x8c/0xd0 [ 28.975520] print_report+0x118/0x608 [ 28.975591] kasan_report_invalid_free+0xc0/0xe8 [ 28.975654] __kasan_mempool_poison_object+0x14c/0x150 [ 28.975707] mempool_free+0x28c/0x328 [ 28.975750] mempool_double_free_helper+0x150/0x2e8 [ 28.975811] mempool_kmalloc_large_double_free+0xc0/0x118 [ 28.975863] kunit_try_run_case+0x170/0x3f0 [ 28.975909] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.976144] kthread+0x328/0x630 [ 28.976231] ret_from_fork+0x10/0x20 [ 28.976353] [ 28.976451] The buggy address belongs to the physical page: [ 28.976516] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106550 [ 28.976611] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 28.976686] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 28.976810] page_type: f8(unknown) [ 28.976878] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.976961] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 28.977010] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.977258] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 28.977359] head: 0bfffe0000000002 ffffc1ffc3195401 00000000ffffffff 00000000ffffffff [ 28.977494] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 28.977598] page dumped because: kasan: bad access detected [ 28.977669] [ 28.977834] Memory state around the buggy address: [ 28.977941] fff00000c654ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.978091] fff00000c654ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.978350] >fff00000c6550000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.978389] ^ [ 28.978645] fff00000c6550080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.978751] fff00000c6550100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.978835] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 28.865813] ================================================================== [ 28.865884] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 28.865936] Read of size 1 at addr fff00000c654c000 by task kunit_try_catch/241 [ 28.866173] [ 28.866313] CPU: 0 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 28.866406] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.866433] Hardware name: linux,dummy-virt (DT) [ 28.866462] Call trace: [ 28.866645] show_stack+0x20/0x38 (C) [ 28.866704] dump_stack_lvl+0x8c/0xd0 [ 28.866840] print_report+0x118/0x608 [ 28.866947] kasan_report+0xdc/0x128 [ 28.866993] __asan_report_load1_noabort+0x20/0x30 [ 28.867050] mempool_uaf_helper+0x314/0x340 [ 28.867106] mempool_kmalloc_large_uaf+0xc4/0x120 [ 28.867175] kunit_try_run_case+0x170/0x3f0 [ 28.867221] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.867331] kthread+0x328/0x630 [ 28.867535] ret_from_fork+0x10/0x20 [ 28.867580] [ 28.867647] The buggy address belongs to the physical page: [ 28.867817] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10654c [ 28.868048] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 28.868123] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 28.868179] page_type: f8(unknown) [ 28.868218] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.868270] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 28.868872] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.869172] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 28.869367] head: 0bfffe0000000002 ffffc1ffc3195301 00000000ffffffff 00000000ffffffff [ 28.869618] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 28.869894] page dumped because: kasan: bad access detected [ 28.869941] [ 28.870187] Memory state around the buggy address: [ 28.870234] fff00000c654bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.870550] fff00000c654bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.870596] >fff00000c654c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.870634] ^ [ 28.871063] fff00000c654c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.871436] fff00000c654c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.871740] ================================================================== [ 28.946959] ================================================================== [ 28.947023] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 28.947101] Read of size 1 at addr fff00000c654c000 by task kunit_try_catch/245 [ 28.947150] [ 28.948859] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 28.948976] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.949004] Hardware name: linux,dummy-virt (DT) [ 28.949035] Call trace: [ 28.949068] show_stack+0x20/0x38 (C) [ 28.949123] dump_stack_lvl+0x8c/0xd0 [ 28.949171] print_report+0x118/0x608 [ 28.949220] kasan_report+0xdc/0x128 [ 28.949263] __asan_report_load1_noabort+0x20/0x30 [ 28.949311] mempool_uaf_helper+0x314/0x340 [ 28.949355] mempool_page_alloc_uaf+0xc0/0x118 [ 28.949403] kunit_try_run_case+0x170/0x3f0 [ 28.949453] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.949590] kthread+0x328/0x630 [ 28.949644] ret_from_fork+0x10/0x20 [ 28.949693] [ 28.949714] The buggy address belongs to the physical page: [ 28.949847] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10654c [ 28.949988] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.950092] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 28.950174] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 28.950226] page dumped because: kasan: bad access detected [ 28.950259] [ 28.950276] Memory state around the buggy address: [ 28.950308] fff00000c654bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.950637] fff00000c654bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.950685] >fff00000c654c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.950723] ^ [ 28.950780] fff00000c654c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.950879] fff00000c654c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.951040] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 28.855027] ================================================================== [ 28.855128] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 28.855206] Read of size 1 at addr fff00000c5773100 by task kunit_try_catch/239 [ 28.855265] [ 28.855327] CPU: 0 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 28.855443] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.855480] Hardware name: linux,dummy-virt (DT) [ 28.855512] Call trace: [ 28.855545] show_stack+0x20/0x38 (C) [ 28.855598] dump_stack_lvl+0x8c/0xd0 [ 28.855684] print_report+0x118/0x608 [ 28.855804] kasan_report+0xdc/0x128 [ 28.855877] __asan_report_load1_noabort+0x20/0x30 [ 28.856015] mempool_uaf_helper+0x314/0x340 [ 28.856155] mempool_kmalloc_uaf+0xc4/0x120 [ 28.856273] kunit_try_run_case+0x170/0x3f0 [ 28.856323] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.856441] kthread+0x328/0x630 [ 28.856484] ret_from_fork+0x10/0x20 [ 28.856557] [ 28.856577] Allocated by task 239: [ 28.856604] kasan_save_stack+0x3c/0x68 [ 28.856647] kasan_save_track+0x20/0x40 [ 28.856684] kasan_save_alloc_info+0x40/0x58 [ 28.856756] __kasan_mempool_unpoison_object+0x11c/0x180 [ 28.856801] remove_element+0x130/0x1f8 [ 28.856851] mempool_alloc_preallocated+0x58/0xc0 [ 28.856901] mempool_uaf_helper+0xa4/0x340 [ 28.856953] mempool_kmalloc_uaf+0xc4/0x120 [ 28.856992] kunit_try_run_case+0x170/0x3f0 [ 28.857030] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.857116] kthread+0x328/0x630 [ 28.857147] ret_from_fork+0x10/0x20 [ 28.857264] [ 28.857401] Freed by task 239: [ 28.857472] kasan_save_stack+0x3c/0x68 [ 28.857539] kasan_save_track+0x20/0x40 [ 28.857615] kasan_save_free_info+0x4c/0x78 [ 28.857687] __kasan_mempool_poison_object+0xc0/0x150 [ 28.857730] mempool_free+0x28c/0x328 [ 28.857765] mempool_uaf_helper+0x104/0x340 [ 28.857803] mempool_kmalloc_uaf+0xc4/0x120 [ 28.857873] kunit_try_run_case+0x170/0x3f0 [ 28.857912] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.857968] kthread+0x328/0x630 [ 28.858012] ret_from_fork+0x10/0x20 [ 28.858110] [ 28.858129] The buggy address belongs to the object at fff00000c5773100 [ 28.858129] which belongs to the cache kmalloc-128 of size 128 [ 28.858203] The buggy address is located 0 bytes inside of [ 28.858203] freed 128-byte region [fff00000c5773100, fff00000c5773180) [ 28.858525] [ 28.858585] The buggy address belongs to the physical page: [ 28.858619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105773 [ 28.858676] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.858877] page_type: f5(slab) [ 28.858989] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 28.859066] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 28.859107] page dumped because: kasan: bad access detected [ 28.859138] [ 28.859156] Memory state around the buggy address: [ 28.859208] fff00000c5773000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.859251] fff00000c5773080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.859304] >fff00000c5773100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.859375] ^ [ 28.859402] fff00000c5773180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.859453] fff00000c5773200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.859491] ================================================================== [ 28.893579] ================================================================== [ 28.893648] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 28.893707] Read of size 1 at addr fff00000c5731240 by task kunit_try_catch/243 [ 28.895603] [ 28.895763] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 28.896240] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.896282] Hardware name: linux,dummy-virt (DT) [ 28.896412] Call trace: [ 28.896595] show_stack+0x20/0x38 (C) [ 28.896770] dump_stack_lvl+0x8c/0xd0 [ 28.896824] print_report+0x118/0x608 [ 28.896870] kasan_report+0xdc/0x128 [ 28.896916] __asan_report_load1_noabort+0x20/0x30 [ 28.896963] mempool_uaf_helper+0x314/0x340 [ 28.897207] mempool_slab_uaf+0xc0/0x118 [ 28.897701] kunit_try_run_case+0x170/0x3f0 [ 28.897758] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.898091] kthread+0x328/0x630 [ 28.898165] ret_from_fork+0x10/0x20 [ 28.898216] [ 28.898401] Allocated by task 243: [ 28.898509] kasan_save_stack+0x3c/0x68 [ 28.898957] kasan_save_track+0x20/0x40 [ 28.899142] kasan_save_alloc_info+0x40/0x58 [ 28.899178] __kasan_mempool_unpoison_object+0xbc/0x180 [ 28.899223] remove_element+0x16c/0x1f8 [ 28.899665] mempool_alloc_preallocated+0x58/0xc0 [ 28.899872] mempool_uaf_helper+0xa4/0x340 [ 28.899925] mempool_slab_uaf+0xc0/0x118 [ 28.899969] kunit_try_run_case+0x170/0x3f0 [ 28.900007] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.900050] kthread+0x328/0x630 [ 28.900091] ret_from_fork+0x10/0x20 [ 28.900715] [ 28.900743] Freed by task 243: [ 28.900771] kasan_save_stack+0x3c/0x68 [ 28.900940] kasan_save_track+0x20/0x40 [ 28.900985] kasan_save_free_info+0x4c/0x78 [ 28.901228] __kasan_mempool_poison_object+0xc0/0x150 [ 28.901421] mempool_free+0x28c/0x328 [ 28.901743] mempool_uaf_helper+0x104/0x340 [ 28.901784] mempool_slab_uaf+0xc0/0x118 [ 28.901821] kunit_try_run_case+0x170/0x3f0 [ 28.902220] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.902642] kthread+0x328/0x630 [ 28.902947] ret_from_fork+0x10/0x20 [ 28.903299] [ 28.903321] The buggy address belongs to the object at fff00000c5731240 [ 28.903321] which belongs to the cache test_cache of size 123 [ 28.903710] The buggy address is located 0 bytes inside of [ 28.903710] freed 123-byte region [fff00000c5731240, fff00000c57312bb) [ 28.904088] [ 28.904262] The buggy address belongs to the physical page: [ 28.904473] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105731 [ 28.904715] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.904882] page_type: f5(slab) [ 28.905142] raw: 0bfffe0000000000 fff00000c56d4780 dead000000000122 0000000000000000 [ 28.905345] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 28.905427] page dumped because: kasan: bad access detected [ 28.905472] [ 28.905490] Memory state around the buggy address: [ 28.905768] fff00000c5731100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.905868] fff00000c5731180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.905912] >fff00000c5731200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 28.906171] ^ [ 28.906489] fff00000c5731280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.906543] fff00000c5731300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.906774] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 28.793208] ================================================================== [ 28.793310] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 28.793398] Read of size 1 at addr fff00000c654a001 by task kunit_try_catch/235 [ 28.793448] [ 28.793522] CPU: 0 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 28.793612] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.793640] Hardware name: linux,dummy-virt (DT) [ 28.793672] Call trace: [ 28.793693] show_stack+0x20/0x38 (C) [ 28.793759] dump_stack_lvl+0x8c/0xd0 [ 28.793809] print_report+0x118/0x608 [ 28.793857] kasan_report+0xdc/0x128 [ 28.793903] __asan_report_load1_noabort+0x20/0x30 [ 28.793960] mempool_oob_right_helper+0x2ac/0x2f0 [ 28.794010] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 28.794071] kunit_try_run_case+0x170/0x3f0 [ 28.794120] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.794179] kthread+0x328/0x630 [ 28.794228] ret_from_fork+0x10/0x20 [ 28.794276] [ 28.794297] The buggy address belongs to the physical page: [ 28.794331] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106548 [ 28.794384] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 28.794433] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 28.794487] page_type: f8(unknown) [ 28.794528] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.794575] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 28.794625] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 28.794682] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 28.794732] head: 0bfffe0000000002 ffffc1ffc3195201 00000000ffffffff 00000000ffffffff [ 28.794780] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 28.794819] page dumped because: kasan: bad access detected [ 28.794850] [ 28.794910] Memory state around the buggy address: [ 28.794951] fff00000c6549f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.795049] fff00000c6549f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 28.795101] >fff00000c654a000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 28.795138] ^ [ 28.795164] fff00000c654a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 28.795205] fff00000c654a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 28.795242] ================================================================== [ 28.806368] ================================================================== [ 28.806433] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 28.807864] Read of size 1 at addr fff00000c57732bb by task kunit_try_catch/237 [ 28.810076] [ 28.810126] CPU: 0 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 28.810258] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.810288] Hardware name: linux,dummy-virt (DT) [ 28.810321] Call trace: [ 28.810343] show_stack+0x20/0x38 (C) [ 28.810396] dump_stack_lvl+0x8c/0xd0 [ 28.810443] print_report+0x118/0x608 [ 28.810535] kasan_report+0xdc/0x128 [ 28.810631] __asan_report_load1_noabort+0x20/0x30 [ 28.811029] mempool_oob_right_helper+0x2ac/0x2f0 [ 28.811619] mempool_slab_oob_right+0xc0/0x118 [ 28.811806] kunit_try_run_case+0x170/0x3f0 [ 28.811961] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.812229] kthread+0x328/0x630 [ 28.812330] ret_from_fork+0x10/0x20 [ 28.812697] [ 28.812716] Allocated by task 237: [ 28.812745] kasan_save_stack+0x3c/0x68 [ 28.813170] kasan_save_track+0x20/0x40 [ 28.813210] kasan_save_alloc_info+0x40/0x58 [ 28.813485] __kasan_mempool_unpoison_object+0xbc/0x180 [ 28.813679] remove_element+0x16c/0x1f8 [ 28.813915] mempool_alloc_preallocated+0x58/0xc0 [ 28.814367] mempool_oob_right_helper+0x98/0x2f0 [ 28.814446] mempool_slab_oob_right+0xc0/0x118 [ 28.814487] kunit_try_run_case+0x170/0x3f0 [ 28.815064] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.815122] kthread+0x328/0x630 [ 28.815158] ret_from_fork+0x10/0x20 [ 28.815195] [ 28.815216] The buggy address belongs to the object at fff00000c5773240 [ 28.815216] which belongs to the cache test_cache of size 123 [ 28.815613] The buggy address is located 0 bytes to the right of [ 28.815613] allocated 123-byte region [fff00000c5773240, fff00000c57732bb) [ 28.815918] [ 28.816117] The buggy address belongs to the physical page: [ 28.816243] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105773 [ 28.816303] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.816356] page_type: f5(slab) [ 28.817111] raw: 0bfffe0000000000 fff00000c56d4640 dead000000000122 0000000000000000 [ 28.817162] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 28.817697] page dumped because: kasan: bad access detected [ 28.817796] [ 28.818013] Memory state around the buggy address: [ 28.818243] fff00000c5773180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.818292] fff00000c5773200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 28.818335] >fff00000c5773280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 28.818769] ^ [ 28.818846] fff00000c5773300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.818966] fff00000c5773380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.819170] ================================================================== [ 28.774450] ================================================================== [ 28.774522] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 28.774595] Read of size 1 at addr fff00000c643fd73 by task kunit_try_catch/233 [ 28.774646] [ 28.774686] CPU: 0 UID: 0 PID: 233 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 28.774780] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.774808] Hardware name: linux,dummy-virt (DT) [ 28.774841] Call trace: [ 28.774866] show_stack+0x20/0x38 (C) [ 28.774918] dump_stack_lvl+0x8c/0xd0 [ 28.774969] print_report+0x118/0x608 [ 28.775017] kasan_report+0xdc/0x128 [ 28.775079] __asan_report_load1_noabort+0x20/0x30 [ 28.775128] mempool_oob_right_helper+0x2ac/0x2f0 [ 28.775177] mempool_kmalloc_oob_right+0xc4/0x120 [ 28.775226] kunit_try_run_case+0x170/0x3f0 [ 28.775275] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.775328] kthread+0x328/0x630 [ 28.775372] ret_from_fork+0x10/0x20 [ 28.775421] [ 28.775440] Allocated by task 233: [ 28.775469] kasan_save_stack+0x3c/0x68 [ 28.775510] kasan_save_track+0x20/0x40 [ 28.775546] kasan_save_alloc_info+0x40/0x58 [ 28.775583] __kasan_mempool_unpoison_object+0x11c/0x180 [ 28.775626] remove_element+0x130/0x1f8 [ 28.775667] mempool_alloc_preallocated+0x58/0xc0 [ 28.775706] mempool_oob_right_helper+0x98/0x2f0 [ 28.775746] mempool_kmalloc_oob_right+0xc4/0x120 [ 28.775920] kunit_try_run_case+0x170/0x3f0 [ 28.775970] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.776013] kthread+0x328/0x630 [ 28.776046] ret_from_fork+0x10/0x20 [ 28.776095] [ 28.776116] The buggy address belongs to the object at fff00000c643fd00 [ 28.776116] which belongs to the cache kmalloc-128 of size 128 [ 28.776177] The buggy address is located 0 bytes to the right of [ 28.776177] allocated 115-byte region [fff00000c643fd00, fff00000c643fd73) [ 28.776239] [ 28.776259] The buggy address belongs to the physical page: [ 28.776292] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643f [ 28.776346] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.776398] page_type: f5(slab) [ 28.776438] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 28.776488] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 28.776530] page dumped because: kasan: bad access detected [ 28.776559] [ 28.776578] Memory state around the buggy address: [ 28.776610] fff00000c643fc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.776652] fff00000c643fc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.776693] >fff00000c643fd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 28.776731] ^ [ 28.776769] fff00000c643fd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.776810] fff00000c643fe00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 28.776850] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 28.219590] ================================================================== [ 28.219667] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300 [ 28.219738] Read of size 1 at addr fff00000c56c2a00 by task kunit_try_catch/227 [ 28.219799] [ 28.219836] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 28.219930] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.219959] Hardware name: linux,dummy-virt (DT) [ 28.219992] Call trace: [ 28.220015] show_stack+0x20/0x38 (C) [ 28.220133] dump_stack_lvl+0x8c/0xd0 [ 28.220187] print_report+0x118/0x608 [ 28.220234] kasan_report+0xdc/0x128 [ 28.220280] __kasan_check_byte+0x54/0x70 [ 28.220328] kmem_cache_destroy+0x34/0x218 [ 28.220375] kmem_cache_double_destroy+0x174/0x300 [ 28.220425] kunit_try_run_case+0x170/0x3f0 [ 28.220476] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.220528] kthread+0x328/0x630 [ 28.220571] ret_from_fork+0x10/0x20 [ 28.220620] [ 28.220638] Allocated by task 227: [ 28.220668] kasan_save_stack+0x3c/0x68 [ 28.220711] kasan_save_track+0x20/0x40 [ 28.220749] kasan_save_alloc_info+0x40/0x58 [ 28.220786] __kasan_slab_alloc+0xa8/0xb0 [ 28.220824] kmem_cache_alloc_noprof+0x10c/0x398 [ 28.220866] __kmem_cache_create_args+0x178/0x280 [ 28.220906] kmem_cache_double_destroy+0xc0/0x300 [ 28.220946] kunit_try_run_case+0x170/0x3f0 [ 28.220984] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.221027] kthread+0x328/0x630 [ 28.221068] ret_from_fork+0x10/0x20 [ 28.221105] [ 28.221123] Freed by task 227: [ 28.221147] kasan_save_stack+0x3c/0x68 [ 28.221184] kasan_save_track+0x20/0x40 [ 28.221222] kasan_save_free_info+0x4c/0x78 [ 28.221257] __kasan_slab_free+0x6c/0x98 [ 28.221295] kmem_cache_free+0x260/0x468 [ 28.221331] slab_kmem_cache_release+0x38/0x50 [ 28.221370] kmem_cache_release+0x1c/0x30 [ 28.221406] kobject_put+0x17c/0x420 [ 28.221442] sysfs_slab_release+0x1c/0x30 [ 28.221479] kmem_cache_destroy+0x118/0x218 [ 28.221518] kmem_cache_double_destroy+0x128/0x300 [ 28.221556] kunit_try_run_case+0x170/0x3f0 [ 28.221594] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.221636] kthread+0x328/0x630 [ 28.221669] ret_from_fork+0x10/0x20 [ 28.221703] [ 28.221722] The buggy address belongs to the object at fff00000c56c2a00 [ 28.221722] which belongs to the cache kmem_cache of size 208 [ 28.221778] The buggy address is located 0 bytes inside of [ 28.221778] freed 208-byte region [fff00000c56c2a00, fff00000c56c2ad0) [ 28.221837] [ 28.221857] The buggy address belongs to the physical page: [ 28.221890] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056c2 [ 28.221944] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.221995] page_type: f5(slab) [ 28.222036] raw: 0bfffe0000000000 fff00000c0001000 dead000000000100 dead000000000122 [ 28.222094] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000 [ 28.222134] page dumped because: kasan: bad access detected [ 28.222171] [ 28.222188] Memory state around the buggy address: [ 28.222221] fff00000c56c2900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.222263] fff00000c56c2980: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.222305] >fff00000c56c2a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.222343] ^ [ 28.222368] fff00000c56c2a80: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 28.222409] fff00000c56c2b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.222448] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 28.172157] ================================================================== [ 28.172246] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468 [ 28.172324] Read of size 1 at addr fff00000c77fa000 by task kunit_try_catch/225 [ 28.172375] [ 28.172418] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 28.172509] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.172537] Hardware name: linux,dummy-virt (DT) [ 28.172570] Call trace: [ 28.172596] show_stack+0x20/0x38 (C) [ 28.172650] dump_stack_lvl+0x8c/0xd0 [ 28.172704] print_report+0x118/0x608 [ 28.172751] kasan_report+0xdc/0x128 [ 28.172797] __asan_report_load1_noabort+0x20/0x30 [ 28.172846] kmem_cache_rcu_uaf+0x388/0x468 [ 28.172896] kunit_try_run_case+0x170/0x3f0 [ 28.172948] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.173000] kthread+0x328/0x630 [ 28.173046] ret_from_fork+0x10/0x20 [ 28.173110] [ 28.173130] Allocated by task 225: [ 28.173159] kasan_save_stack+0x3c/0x68 [ 28.173201] kasan_save_track+0x20/0x40 [ 28.173240] kasan_save_alloc_info+0x40/0x58 [ 28.173277] __kasan_slab_alloc+0xa8/0xb0 [ 28.173315] kmem_cache_alloc_noprof+0x10c/0x398 [ 28.173356] kmem_cache_rcu_uaf+0x12c/0x468 [ 28.173394] kunit_try_run_case+0x170/0x3f0 [ 28.173431] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.173475] kthread+0x328/0x630 [ 28.173506] ret_from_fork+0x10/0x20 [ 28.173541] [ 28.173560] Freed by task 0: [ 28.173586] kasan_save_stack+0x3c/0x68 [ 28.173623] kasan_save_track+0x20/0x40 [ 28.173659] kasan_save_free_info+0x4c/0x78 [ 28.173696] __kasan_slab_free+0x6c/0x98 [ 28.173732] slab_free_after_rcu_debug+0xd4/0x2f8 [ 28.173773] rcu_core+0x9f4/0x1e20 [ 28.173810] rcu_core_si+0x18/0x30 [ 28.173844] handle_softirqs+0x374/0xb28 [ 28.173881] __do_softirq+0x1c/0x28 [ 28.173916] [ 28.173935] Last potentially related work creation: [ 28.173962] kasan_save_stack+0x3c/0x68 [ 28.174001] kasan_record_aux_stack+0xb4/0xc8 [ 28.174038] kmem_cache_free+0x120/0x468 [ 28.174087] kmem_cache_rcu_uaf+0x16c/0x468 [ 28.174124] kunit_try_run_case+0x170/0x3f0 [ 28.174167] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.174212] kthread+0x328/0x630 [ 28.174244] ret_from_fork+0x10/0x20 [ 28.174280] [ 28.174298] The buggy address belongs to the object at fff00000c77fa000 [ 28.174298] which belongs to the cache test_cache of size 200 [ 28.174357] The buggy address is located 0 bytes inside of [ 28.174357] freed 200-byte region [fff00000c77fa000, fff00000c77fa0c8) [ 28.174417] [ 28.174439] The buggy address belongs to the physical page: [ 28.174471] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1077fa [ 28.174528] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.174580] page_type: f5(slab) [ 28.174621] raw: 0bfffe0000000000 fff00000c56c28c0 dead000000000122 0000000000000000 [ 28.174671] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 28.174713] page dumped because: kasan: bad access detected [ 28.174745] [ 28.174762] Memory state around the buggy address: [ 28.174793] fff00000c77f9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.174836] fff00000c77f9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 28.174879] >fff00000c77fa000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 28.174917] ^ [ 28.174943] fff00000c77fa080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 28.174985] fff00000c77fa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.175025] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 27.793459] ================================================================== [ 27.793525] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 27.793589] Free of addr fff00000c5766001 by task kunit_try_catch/223 [ 27.793631] [ 27.793668] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 27.793757] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.793813] Hardware name: linux,dummy-virt (DT) [ 27.793847] Call trace: [ 27.793885] show_stack+0x20/0x38 (C) [ 27.793939] dump_stack_lvl+0x8c/0xd0 [ 27.793990] print_report+0x118/0x608 [ 27.794038] kasan_report_invalid_free+0xc0/0xe8 [ 27.794101] check_slab_allocation+0xfc/0x108 [ 27.794148] __kasan_slab_pre_free+0x2c/0x48 [ 27.794665] kmem_cache_free+0xf0/0x468 [ 27.794752] kmem_cache_invalid_free+0x184/0x3c8 [ 27.794828] kunit_try_run_case+0x170/0x3f0 [ 27.794883] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.794938] kthread+0x328/0x630 [ 27.794982] ret_from_fork+0x10/0x20 [ 27.795048] [ 27.795099] Allocated by task 223: [ 27.795156] kasan_save_stack+0x3c/0x68 [ 27.795199] kasan_save_track+0x20/0x40 [ 27.795236] kasan_save_alloc_info+0x40/0x58 [ 27.795438] __kasan_slab_alloc+0xa8/0xb0 [ 27.795490] kmem_cache_alloc_noprof+0x10c/0x398 [ 27.795534] kmem_cache_invalid_free+0x12c/0x3c8 [ 27.795627] kunit_try_run_case+0x170/0x3f0 [ 27.795670] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.795719] kthread+0x328/0x630 [ 27.795753] ret_from_fork+0x10/0x20 [ 27.795855] [ 27.795875] The buggy address belongs to the object at fff00000c5766000 [ 27.795875] which belongs to the cache test_cache of size 200 [ 27.795934] The buggy address is located 1 bytes inside of [ 27.795934] 200-byte region [fff00000c5766000, fff00000c57660c8) [ 27.795994] [ 27.796015] The buggy address belongs to the physical page: [ 27.796047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105766 [ 27.796114] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.796430] page_type: f5(slab) [ 27.796491] raw: 0bfffe0000000000 fff00000c56d4500 dead000000000122 0000000000000000 [ 27.796598] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 27.796660] page dumped because: kasan: bad access detected [ 27.796747] [ 27.796764] Memory state around the buggy address: [ 27.796827] fff00000c5765f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.797174] fff00000c5765f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.797220] >fff00000c5766000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.797550] ^ [ 27.797628] fff00000c5766080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 27.797796] fff00000c5766100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.797920] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 27.769993] ================================================================== [ 27.770113] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 27.770191] Free of addr fff00000c5764000 by task kunit_try_catch/221 [ 27.770288] [ 27.770350] CPU: 0 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 27.770518] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.770547] Hardware name: linux,dummy-virt (DT) [ 27.770580] Call trace: [ 27.770647] show_stack+0x20/0x38 (C) [ 27.770909] dump_stack_lvl+0x8c/0xd0 [ 27.771023] print_report+0x118/0x608 [ 27.771122] kasan_report_invalid_free+0xc0/0xe8 [ 27.771252] check_slab_allocation+0xd4/0x108 [ 27.771316] __kasan_slab_pre_free+0x2c/0x48 [ 27.771367] kmem_cache_free+0xf0/0x468 [ 27.771432] kmem_cache_double_free+0x190/0x3c8 [ 27.771687] kunit_try_run_case+0x170/0x3f0 [ 27.771845] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.771979] kthread+0x328/0x630 [ 27.772160] ret_from_fork+0x10/0x20 [ 27.772323] [ 27.772414] Allocated by task 221: [ 27.772535] kasan_save_stack+0x3c/0x68 [ 27.772608] kasan_save_track+0x20/0x40 [ 27.772656] kasan_save_alloc_info+0x40/0x58 [ 27.772693] __kasan_slab_alloc+0xa8/0xb0 [ 27.772732] kmem_cache_alloc_noprof+0x10c/0x398 [ 27.772772] kmem_cache_double_free+0x12c/0x3c8 [ 27.773118] kunit_try_run_case+0x170/0x3f0 [ 27.773304] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.773416] kthread+0x328/0x630 [ 27.773573] ret_from_fork+0x10/0x20 [ 27.773622] [ 27.773641] Freed by task 221: [ 27.773667] kasan_save_stack+0x3c/0x68 [ 27.773728] kasan_save_track+0x20/0x40 [ 27.773770] kasan_save_free_info+0x4c/0x78 [ 27.773808] __kasan_slab_free+0x6c/0x98 [ 27.773846] kmem_cache_free+0x260/0x468 [ 27.773883] kmem_cache_double_free+0x140/0x3c8 [ 27.773924] kunit_try_run_case+0x170/0x3f0 [ 27.773961] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.774020] kthread+0x328/0x630 [ 27.774073] ret_from_fork+0x10/0x20 [ 27.774120] [ 27.774138] The buggy address belongs to the object at fff00000c5764000 [ 27.774138] which belongs to the cache test_cache of size 200 [ 27.774225] The buggy address is located 0 bytes inside of [ 27.774225] 200-byte region [fff00000c5764000, fff00000c57640c8) [ 27.774286] [ 27.774312] The buggy address belongs to the physical page: [ 27.774355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105764 [ 27.774421] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.774476] page_type: f5(slab) [ 27.774516] raw: 0bfffe0000000000 fff00000c56d43c0 dead000000000122 0000000000000000 [ 27.774566] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 27.774622] page dumped because: kasan: bad access detected [ 27.774653] [ 27.774670] Memory state around the buggy address: [ 27.774721] fff00000c5763f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.774769] fff00000c5763f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.774826] >fff00000c5764000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.774863] ^ [ 27.774907] fff00000c5764080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 27.774948] fff00000c5764100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.774993] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 27.506313] ================================================================== [ 27.506387] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430 [ 27.506452] Read of size 1 at addr fff00000c57620c8 by task kunit_try_catch/219 [ 27.506502] [ 27.506541] CPU: 0 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 27.506808] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.506845] Hardware name: linux,dummy-virt (DT) [ 27.506879] Call trace: [ 27.506930] show_stack+0x20/0x38 (C) [ 27.507024] dump_stack_lvl+0x8c/0xd0 [ 27.507088] print_report+0x118/0x608 [ 27.507145] kasan_report+0xdc/0x128 [ 27.507192] __asan_report_load1_noabort+0x20/0x30 [ 27.507261] kmem_cache_oob+0x344/0x430 [ 27.507336] kunit_try_run_case+0x170/0x3f0 [ 27.507433] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.507517] kthread+0x328/0x630 [ 27.507562] ret_from_fork+0x10/0x20 [ 27.507630] [ 27.507649] Allocated by task 219: [ 27.507706] kasan_save_stack+0x3c/0x68 [ 27.507786] kasan_save_track+0x20/0x40 [ 27.507882] kasan_save_alloc_info+0x40/0x58 [ 27.507937] __kasan_slab_alloc+0xa8/0xb0 [ 27.507975] kmem_cache_alloc_noprof+0x10c/0x398 [ 27.508186] kmem_cache_oob+0x12c/0x430 [ 27.508329] kunit_try_run_case+0x170/0x3f0 [ 27.508372] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.508416] kthread+0x328/0x630 [ 27.508474] ret_from_fork+0x10/0x20 [ 27.508511] [ 27.508530] The buggy address belongs to the object at fff00000c5762000 [ 27.508530] which belongs to the cache test_cache of size 200 [ 27.508587] The buggy address is located 0 bytes to the right of [ 27.508587] allocated 200-byte region [fff00000c5762000, fff00000c57620c8) [ 27.508650] [ 27.508669] The buggy address belongs to the physical page: [ 27.508702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105762 [ 27.508768] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.508819] page_type: f5(slab) [ 27.508859] raw: 0bfffe0000000000 fff00000c56d4280 dead000000000122 0000000000000000 [ 27.508919] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 27.508960] page dumped because: kasan: bad access detected [ 27.509006] [ 27.509024] Memory state around the buggy address: [ 27.509070] fff00000c5761f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.509112] fff00000c5762000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 27.509293] >fff00000c5762080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 27.509526] ^ [ 27.509607] fff00000c5762100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.509712] fff00000c5762180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.509830] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 27.411456] ================================================================== [ 27.411530] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 27.411878] Read of size 8 at addr fff00000c575f080 by task kunit_try_catch/212 [ 27.412265] [ 27.412314] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 27.412408] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.412442] Hardware name: linux,dummy-virt (DT) [ 27.412552] Call trace: [ 27.412864] show_stack+0x20/0x38 (C) [ 27.413172] dump_stack_lvl+0x8c/0xd0 [ 27.413466] print_report+0x118/0x608 [ 27.413824] kasan_report+0xdc/0x128 [ 27.413878] __asan_report_load8_noabort+0x20/0x30 [ 27.414035] workqueue_uaf+0x480/0x4a8 [ 27.414092] kunit_try_run_case+0x170/0x3f0 [ 27.414269] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.414540] kthread+0x328/0x630 [ 27.414591] ret_from_fork+0x10/0x20 [ 27.414856] [ 27.414879] Allocated by task 212: [ 27.414907] kasan_save_stack+0x3c/0x68 [ 27.415087] kasan_save_track+0x20/0x40 [ 27.415279] kasan_save_alloc_info+0x40/0x58 [ 27.415327] __kasan_kmalloc+0xd4/0xd8 [ 27.415363] __kmalloc_cache_noprof+0x16c/0x3c0 [ 27.415717] workqueue_uaf+0x13c/0x4a8 [ 27.415762] kunit_try_run_case+0x170/0x3f0 [ 27.415801] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.416201] kthread+0x328/0x630 [ 27.416248] ret_from_fork+0x10/0x20 [ 27.416285] [ 27.416303] Freed by task 9: [ 27.416353] kasan_save_stack+0x3c/0x68 [ 27.416397] kasan_save_track+0x20/0x40 [ 27.416576] kasan_save_free_info+0x4c/0x78 [ 27.416641] __kasan_slab_free+0x6c/0x98 [ 27.416987] kfree+0x214/0x3c8 [ 27.417021] workqueue_uaf_work+0x18/0x30 [ 27.417472] process_one_work+0x530/0xf98 [ 27.417547] worker_thread+0x618/0xf38 [ 27.417743] kthread+0x328/0x630 [ 27.417784] ret_from_fork+0x10/0x20 [ 27.417821] [ 27.417946] Last potentially related work creation: [ 27.418229] kasan_save_stack+0x3c/0x68 [ 27.418360] kasan_record_aux_stack+0xb4/0xc8 [ 27.418406] __queue_work+0x65c/0xfe0 [ 27.418442] queue_work_on+0xbc/0xf8 [ 27.418556] workqueue_uaf+0x210/0x4a8 [ 27.418613] kunit_try_run_case+0x170/0x3f0 [ 27.418652] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.419177] kthread+0x328/0x630 [ 27.419222] ret_from_fork+0x10/0x20 [ 27.419260] [ 27.419636] The buggy address belongs to the object at fff00000c575f080 [ 27.419636] which belongs to the cache kmalloc-32 of size 32 [ 27.419844] The buggy address is located 0 bytes inside of [ 27.419844] freed 32-byte region [fff00000c575f080, fff00000c575f0a0) [ 27.419917] [ 27.420127] The buggy address belongs to the physical page: [ 27.420387] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10575f [ 27.420718] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.420791] page_type: f5(slab) [ 27.420831] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 27.421129] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 27.421176] page dumped because: kasan: bad access detected [ 27.421207] [ 27.421224] Memory state around the buggy address: [ 27.421357] fff00000c575ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.422001] fff00000c575f000: 00 00 07 fc fc fc fc fc 00 00 00 07 fc fc fc fc [ 27.422109] >fff00000c575f080: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 27.422629] ^ [ 27.422671] fff00000c575f100: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.422713] fff00000c575f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.422751] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[ 27.366726] ================================================================== [ 27.367418] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 27.368460] Read of size 4 at addr fff00000c5752ec0 by task swapper/0/0 [ 27.368719] [ 27.369216] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 27.369660] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.370243] Hardware name: linux,dummy-virt (DT) [ 27.370424] Call trace: [ 27.370456] show_stack+0x20/0x38 (C) [ 27.370610] dump_stack_lvl+0x8c/0xd0 [ 27.371228] print_report+0x118/0x608 [ 27.371296] kasan_report+0xdc/0x128 [ 27.371815] __asan_report_load4_noabort+0x20/0x30 [ 27.371874] rcu_uaf_reclaim+0x64/0x70 [ 27.371928] rcu_core+0x9f4/0x1e20 [ 27.371975] rcu_core_si+0x18/0x30 [ 27.372019] handle_softirqs+0x374/0xb28 [ 27.372075] __do_softirq+0x1c/0x28 [ 27.372472] ____do_softirq+0x18/0x30 [ 27.372634] call_on_irq_stack+0x24/0x30 [ 27.372781] do_softirq_own_stack+0x24/0x38 [ 27.372830] __irq_exit_rcu+0x1fc/0x318 [ 27.373097] irq_exit_rcu+0x1c/0x80 [ 27.373327] el1_interrupt+0x38/0x58 [ 27.373598] el1h_64_irq_handler+0x18/0x28 [ 27.373827] el1h_64_irq+0x6c/0x70 [ 27.374549] arch_local_irq_enable+0x4/0x8 (P) [ 27.374792] do_idle+0x384/0x4e8 [ 27.374978] cpu_startup_entry+0x68/0x80 [ 27.375041] rest_init+0x160/0x188 [ 27.375099] start_kernel+0x30c/0x3d0 [ 27.375665] __primary_switched+0x8c/0xa0 [ 27.375724] [ 27.375742] Allocated by task 210: [ 27.375782] kasan_save_stack+0x3c/0x68 [ 27.375823] kasan_save_track+0x20/0x40 [ 27.376362] kasan_save_alloc_info+0x40/0x58 [ 27.376410] __kasan_kmalloc+0xd4/0xd8 [ 27.376573] __kmalloc_cache_noprof+0x16c/0x3c0 [ 27.376616] rcu_uaf+0xb0/0x2d8 [ 27.376649] kunit_try_run_case+0x170/0x3f0 [ 27.377135] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.377183] kthread+0x328/0x630 [ 27.377222] ret_from_fork+0x10/0x20 [ 27.377717] [ 27.377787] Freed by task 0: [ 27.378246] kasan_save_stack+0x3c/0x68 [ 27.378352] kasan_save_track+0x20/0x40 [ 27.378545] kasan_save_free_info+0x4c/0x78 [ 27.378585] __kasan_slab_free+0x6c/0x98 [ 27.378624] kfree+0x214/0x3c8 [ 27.379006] rcu_uaf_reclaim+0x28/0x70 [ 27.379196] rcu_core+0x9f4/0x1e20 [ 27.379240] rcu_core_si+0x18/0x30 [ 27.379276] handle_softirqs+0x374/0xb28 [ 27.379439] __do_softirq+0x1c/0x28 [ 27.379497] [ 27.379751] Last potentially related work creation: [ 27.380036] kasan_save_stack+0x3c/0x68 [ 27.380109] kasan_record_aux_stack+0xb4/0xc8 [ 27.380265] __call_rcu_common.constprop.0+0x74/0x8c8 [ 27.380380] call_rcu+0x18/0x30 [ 27.380465] rcu_uaf+0x14c/0x2d8 [ 27.380631] kunit_try_run_case+0x170/0x3f0 [ 27.380755] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.380801] kthread+0x328/0x630 [ 27.380833] ret_from_fork+0x10/0x20 [ 27.380879] [ 27.381607] The buggy address belongs to the object at fff00000c5752ec0 [ 27.381607] which belongs to the cache kmalloc-32 of size 32 [ 27.381772] The buggy address is located 0 bytes inside of [ 27.381772] freed 32-byte region [fff00000c5752ec0, fff00000c5752ee0) [ 27.381841] [ 27.381862] The buggy address belongs to the physical page: [ 27.382419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105752 [ 27.382575] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.382642] page_type: f5(slab) [ 27.382997] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 27.383063] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 27.383452] page dumped because: kasan: bad access detected [ 27.383763] [ 27.383867] Memory state around the buggy address: [ 27.383903] fff00000c5752d80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 27.384220] fff00000c5752e00: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 27.384344] >fff00000c5752e80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 27.384381] ^ [ 27.384418] fff00000c5752f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.384460] fff00000c5752f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.384497] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 27.107209] ================================================================== [ 27.107319] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 27.107388] Read of size 1 at addr fff00000c643fa00 by task kunit_try_catch/208 [ 27.107437] [ 27.107467] CPU: 0 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 27.107553] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.108297] Hardware name: linux,dummy-virt (DT) [ 27.108350] Call trace: [ 27.108372] show_stack+0x20/0x38 (C) [ 27.108424] dump_stack_lvl+0x8c/0xd0 [ 27.108472] print_report+0x118/0x608 [ 27.108845] kasan_report+0xdc/0x128 [ 27.108899] __asan_report_load1_noabort+0x20/0x30 [ 27.108956] ksize_uaf+0x598/0x5f8 [ 27.109339] kunit_try_run_case+0x170/0x3f0 [ 27.109396] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.109739] kthread+0x328/0x630 [ 27.109944] ret_from_fork+0x10/0x20 [ 27.110335] [ 27.110365] Allocated by task 208: [ 27.110397] kasan_save_stack+0x3c/0x68 [ 27.110668] kasan_save_track+0x20/0x40 [ 27.110732] kasan_save_alloc_info+0x40/0x58 [ 27.110768] __kasan_kmalloc+0xd4/0xd8 [ 27.110804] __kmalloc_cache_noprof+0x16c/0x3c0 [ 27.111380] ksize_uaf+0xb8/0x5f8 [ 27.111434] kunit_try_run_case+0x170/0x3f0 [ 27.111472] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.111718] kthread+0x328/0x630 [ 27.111948] ret_from_fork+0x10/0x20 [ 27.111997] [ 27.112016] Freed by task 208: [ 27.112052] kasan_save_stack+0x3c/0x68 [ 27.112189] kasan_save_track+0x20/0x40 [ 27.112461] kasan_save_free_info+0x4c/0x78 [ 27.112555] __kasan_slab_free+0x6c/0x98 [ 27.112592] kfree+0x214/0x3c8 [ 27.112624] ksize_uaf+0x11c/0x5f8 [ 27.112659] kunit_try_run_case+0x170/0x3f0 [ 27.112696] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.112740] kthread+0x328/0x630 [ 27.112773] ret_from_fork+0x10/0x20 [ 27.112810] [ 27.112829] The buggy address belongs to the object at fff00000c643fa00 [ 27.112829] which belongs to the cache kmalloc-128 of size 128 [ 27.113912] The buggy address is located 0 bytes inside of [ 27.113912] freed 128-byte region [fff00000c643fa00, fff00000c643fa80) [ 27.114325] [ 27.114557] The buggy address belongs to the physical page: [ 27.114769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643f [ 27.114822] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.114872] page_type: f5(slab) [ 27.115481] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 27.115537] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.115577] page dumped because: kasan: bad access detected [ 27.115608] [ 27.115842] Memory state around the buggy address: [ 27.116272] fff00000c643f900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.116441] fff00000c643f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.116490] >fff00000c643fa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.116857] ^ [ 27.116893] fff00000c643fa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.117234] fff00000c643fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.117276] ================================================================== [ 27.097452] ================================================================== [ 27.097511] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 27.097562] Read of size 1 at addr fff00000c643fa00 by task kunit_try_catch/208 [ 27.097610] [ 27.097640] CPU: 0 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 27.097726] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.097753] Hardware name: linux,dummy-virt (DT) [ 27.097783] Call trace: [ 27.097805] show_stack+0x20/0x38 (C) [ 27.097854] dump_stack_lvl+0x8c/0xd0 [ 27.097903] print_report+0x118/0x608 [ 27.097951] kasan_report+0xdc/0x128 [ 27.097997] __kasan_check_byte+0x54/0x70 [ 27.098043] ksize+0x30/0x88 [ 27.098670] ksize_uaf+0x168/0x5f8 [ 27.098719] kunit_try_run_case+0x170/0x3f0 [ 27.099328] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.099410] kthread+0x328/0x630 [ 27.099457] ret_from_fork+0x10/0x20 [ 27.099506] [ 27.099524] Allocated by task 208: [ 27.099552] kasan_save_stack+0x3c/0x68 [ 27.099594] kasan_save_track+0x20/0x40 [ 27.099632] kasan_save_alloc_info+0x40/0x58 [ 27.099669] __kasan_kmalloc+0xd4/0xd8 [ 27.099706] __kmalloc_cache_noprof+0x16c/0x3c0 [ 27.099747] ksize_uaf+0xb8/0x5f8 [ 27.099791] kunit_try_run_case+0x170/0x3f0 [ 27.099829] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.099872] kthread+0x328/0x630 [ 27.099905] ret_from_fork+0x10/0x20 [ 27.099941] [ 27.099960] Freed by task 208: [ 27.099984] kasan_save_stack+0x3c/0x68 [ 27.100020] kasan_save_track+0x20/0x40 [ 27.100065] kasan_save_free_info+0x4c/0x78 [ 27.100101] __kasan_slab_free+0x6c/0x98 [ 27.101143] kfree+0x214/0x3c8 [ 27.101198] ksize_uaf+0x11c/0x5f8 [ 27.101287] kunit_try_run_case+0x170/0x3f0 [ 27.101324] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.101368] kthread+0x328/0x630 [ 27.101517] ret_from_fork+0x10/0x20 [ 27.101827] [ 27.101908] The buggy address belongs to the object at fff00000c643fa00 [ 27.101908] which belongs to the cache kmalloc-128 of size 128 [ 27.102276] The buggy address is located 0 bytes inside of [ 27.102276] freed 128-byte region [fff00000c643fa00, fff00000c643fa80) [ 27.102727] [ 27.102994] The buggy address belongs to the physical page: [ 27.103128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643f [ 27.103519] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.103579] page_type: f5(slab) [ 27.103624] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 27.103674] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.104049] page dumped because: kasan: bad access detected [ 27.104098] [ 27.104118] Memory state around the buggy address: [ 27.104149] fff00000c643f900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.104658] fff00000c643f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.104710] >fff00000c643fa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.104958] ^ [ 27.104990] fff00000c643fa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.105032] fff00000c643fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.105095] ================================================================== [ 27.118633] ================================================================== [ 27.118683] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 27.118734] Read of size 1 at addr fff00000c643fa78 by task kunit_try_catch/208 [ 27.118784] [ 27.118813] CPU: 0 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 27.118900] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.118927] Hardware name: linux,dummy-virt (DT) [ 27.120230] Call trace: [ 27.120271] show_stack+0x20/0x38 (C) [ 27.120391] dump_stack_lvl+0x8c/0xd0 [ 27.120441] print_report+0x118/0x608 [ 27.120488] kasan_report+0xdc/0x128 [ 27.120533] __asan_report_load1_noabort+0x20/0x30 [ 27.120676] ksize_uaf+0x544/0x5f8 [ 27.120949] kunit_try_run_case+0x170/0x3f0 [ 27.121386] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.121512] kthread+0x328/0x630 [ 27.121763] ret_from_fork+0x10/0x20 [ 27.122125] [ 27.122176] Allocated by task 208: [ 27.122239] kasan_save_stack+0x3c/0x68 [ 27.122284] kasan_save_track+0x20/0x40 [ 27.122321] kasan_save_alloc_info+0x40/0x58 [ 27.122358] __kasan_kmalloc+0xd4/0xd8 [ 27.122394] __kmalloc_cache_noprof+0x16c/0x3c0 [ 27.123317] ksize_uaf+0xb8/0x5f8 [ 27.123747] kunit_try_run_case+0x170/0x3f0 [ 27.123859] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.123905] kthread+0x328/0x630 [ 27.123937] ret_from_fork+0x10/0x20 [ 27.124115] [ 27.124483] Freed by task 208: [ 27.124728] kasan_save_stack+0x3c/0x68 [ 27.124778] kasan_save_track+0x20/0x40 [ 27.124816] kasan_save_free_info+0x4c/0x78 [ 27.124853] __kasan_slab_free+0x6c/0x98 [ 27.125690] kfree+0x214/0x3c8 [ 27.125736] ksize_uaf+0x11c/0x5f8 [ 27.125773] kunit_try_run_case+0x170/0x3f0 [ 27.125809] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.126358] kthread+0x328/0x630 [ 27.126689] ret_from_fork+0x10/0x20 [ 27.126991] [ 27.127114] The buggy address belongs to the object at fff00000c643fa00 [ 27.127114] which belongs to the cache kmalloc-128 of size 128 [ 27.127416] The buggy address is located 120 bytes inside of [ 27.127416] freed 128-byte region [fff00000c643fa00, fff00000c643fa80) [ 27.127522] [ 27.127801] The buggy address belongs to the physical page: [ 27.127870] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643f [ 27.127946] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.128268] page_type: f5(slab) [ 27.128521] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 27.128702] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.128749] page dumped because: kasan: bad access detected [ 27.128782] [ 27.128799] Memory state around the buggy address: [ 27.129118] fff00000c643f900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.129337] fff00000c643f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.129654] >fff00000c643fa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.129736] ^ [ 27.130097] fff00000c643fa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.130181] fff00000c643fb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.130220] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 27.077219] ================================================================== [ 27.077714] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 27.077815] Read of size 1 at addr fff00000c643f97f by task kunit_try_catch/206 [ 27.077865] [ 27.077896] CPU: 0 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 27.078447] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.078495] Hardware name: linux,dummy-virt (DT) [ 27.078700] Call trace: [ 27.078791] show_stack+0x20/0x38 (C) [ 27.078844] dump_stack_lvl+0x8c/0xd0 [ 27.078893] print_report+0x118/0x608 [ 27.078941] kasan_report+0xdc/0x128 [ 27.078987] __asan_report_load1_noabort+0x20/0x30 [ 27.079036] ksize_unpoisons_memory+0x690/0x740 [ 27.079095] kunit_try_run_case+0x170/0x3f0 [ 27.079989] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.080189] kthread+0x328/0x630 [ 27.080435] ret_from_fork+0x10/0x20 [ 27.080488] [ 27.080698] Allocated by task 206: [ 27.080771] kasan_save_stack+0x3c/0x68 [ 27.080976] kasan_save_track+0x20/0x40 [ 27.081226] kasan_save_alloc_info+0x40/0x58 [ 27.081512] __kasan_kmalloc+0xd4/0xd8 [ 27.081563] __kmalloc_cache_noprof+0x16c/0x3c0 [ 27.081985] ksize_unpoisons_memory+0xc0/0x740 [ 27.082027] kunit_try_run_case+0x170/0x3f0 [ 27.082546] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.082712] kthread+0x328/0x630 [ 27.082787] ret_from_fork+0x10/0x20 [ 27.083076] [ 27.083099] The buggy address belongs to the object at fff00000c643f900 [ 27.083099] which belongs to the cache kmalloc-128 of size 128 [ 27.083344] The buggy address is located 12 bytes to the right of [ 27.083344] allocated 115-byte region [fff00000c643f900, fff00000c643f973) [ 27.083410] [ 27.083429] The buggy address belongs to the physical page: [ 27.083847] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643f [ 27.084119] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.084468] page_type: f5(slab) [ 27.084781] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 27.085122] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.085415] page dumped because: kasan: bad access detected [ 27.085919] [ 27.085995] Memory state around the buggy address: [ 27.086126] fff00000c643f800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.086184] fff00000c643f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.086226] >fff00000c643f900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 27.086494] ^ [ 27.086601] fff00000c643f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.086747] fff00000c643fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.087065] ================================================================== [ 27.051509] ================================================================== [ 27.051753] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 27.051981] Read of size 1 at addr fff00000c643f973 by task kunit_try_catch/206 [ 27.052031] [ 27.052078] CPU: 0 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 27.052833] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.053110] Hardware name: linux,dummy-virt (DT) [ 27.053321] Call trace: [ 27.053385] show_stack+0x20/0x38 (C) [ 27.053443] dump_stack_lvl+0x8c/0xd0 [ 27.053492] print_report+0x118/0x608 [ 27.054105] kasan_report+0xdc/0x128 [ 27.054549] __asan_report_load1_noabort+0x20/0x30 [ 27.054697] ksize_unpoisons_memory+0x628/0x740 [ 27.054746] kunit_try_run_case+0x170/0x3f0 [ 27.055246] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.055313] kthread+0x328/0x630 [ 27.055483] ret_from_fork+0x10/0x20 [ 27.055953] [ 27.055973] Allocated by task 206: [ 27.056067] kasan_save_stack+0x3c/0x68 [ 27.056112] kasan_save_track+0x20/0x40 [ 27.056371] kasan_save_alloc_info+0x40/0x58 [ 27.056455] __kasan_kmalloc+0xd4/0xd8 [ 27.056493] __kmalloc_cache_noprof+0x16c/0x3c0 [ 27.056606] ksize_unpoisons_memory+0xc0/0x740 [ 27.056645] kunit_try_run_case+0x170/0x3f0 [ 27.057092] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.057387] kthread+0x328/0x630 [ 27.057425] ret_from_fork+0x10/0x20 [ 27.057461] [ 27.057481] The buggy address belongs to the object at fff00000c643f900 [ 27.057481] which belongs to the cache kmalloc-128 of size 128 [ 27.057542] The buggy address is located 0 bytes to the right of [ 27.057542] allocated 115-byte region [fff00000c643f900, fff00000c643f973) [ 27.058380] [ 27.058729] The buggy address belongs to the physical page: [ 27.058816] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643f [ 27.058926] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.058979] page_type: f5(slab) [ 27.059617] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 27.059676] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.059718] page dumped because: kasan: bad access detected [ 27.059750] [ 27.059768] Memory state around the buggy address: [ 27.059802] fff00000c643f800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.060202] fff00000c643f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.060444] >fff00000c643f900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 27.060776] ^ [ 27.060853] fff00000c643f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.060895] fff00000c643fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.060933] ================================================================== [ 27.065783] ================================================================== [ 27.065832] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 27.065889] Read of size 1 at addr fff00000c643f978 by task kunit_try_catch/206 [ 27.065936] [ 27.065965] CPU: 0 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 27.066049] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.066086] Hardware name: linux,dummy-virt (DT) [ 27.067359] Call trace: [ 27.067439] show_stack+0x20/0x38 (C) [ 27.067494] dump_stack_lvl+0x8c/0xd0 [ 27.067551] print_report+0x118/0x608 [ 27.067597] kasan_report+0xdc/0x128 [ 27.067642] __asan_report_load1_noabort+0x20/0x30 [ 27.068130] ksize_unpoisons_memory+0x618/0x740 [ 27.068341] kunit_try_run_case+0x170/0x3f0 [ 27.068395] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.068923] kthread+0x328/0x630 [ 27.069104] ret_from_fork+0x10/0x20 [ 27.069695] [ 27.069892] Allocated by task 206: [ 27.070111] kasan_save_stack+0x3c/0x68 [ 27.070165] kasan_save_track+0x20/0x40 [ 27.070318] kasan_save_alloc_info+0x40/0x58 [ 27.070483] __kasan_kmalloc+0xd4/0xd8 [ 27.070679] __kmalloc_cache_noprof+0x16c/0x3c0 [ 27.070726] ksize_unpoisons_memory+0xc0/0x740 [ 27.071106] kunit_try_run_case+0x170/0x3f0 [ 27.071163] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.071382] kthread+0x328/0x630 [ 27.071443] ret_from_fork+0x10/0x20 [ 27.071669] [ 27.071853] The buggy address belongs to the object at fff00000c643f900 [ 27.071853] which belongs to the cache kmalloc-128 of size 128 [ 27.071968] The buggy address is located 5 bytes to the right of [ 27.071968] allocated 115-byte region [fff00000c643f900, fff00000c643f973) [ 27.072218] [ 27.072404] The buggy address belongs to the physical page: [ 27.072441] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643f [ 27.072886] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.072942] page_type: f5(slab) [ 27.073163] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 27.073388] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 27.073432] page dumped because: kasan: bad access detected [ 27.073462] [ 27.073481] Memory state around the buggy address: [ 27.073511] fff00000c643f800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 27.074297] fff00000c643f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.074625] >fff00000c643f900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 27.074825] ^ [ 27.074992] fff00000c643f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.075118] fff00000c643fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.075157] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-double-free-in-kfree_sensitive
[ 27.020930] ================================================================== [ 27.021002] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 27.021049] Free of addr fff00000c16b9ca0 by task kunit_try_catch/204 [ 27.021105] [ 27.021132] CPU: 0 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 27.021219] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.021247] Hardware name: linux,dummy-virt (DT) [ 27.021277] Call trace: [ 27.021298] show_stack+0x20/0x38 (C) [ 27.021346] dump_stack_lvl+0x8c/0xd0 [ 27.021393] print_report+0x118/0x608 [ 27.021437] kasan_report_invalid_free+0xc0/0xe8 [ 27.023198] check_slab_allocation+0xd4/0x108 [ 27.023813] __kasan_slab_pre_free+0x2c/0x48 [ 27.024124] kfree+0xe8/0x3c8 [ 27.024394] kfree_sensitive+0x3c/0xb0 [ 27.024477] kmalloc_double_kzfree+0x168/0x308 [ 27.024529] kunit_try_run_case+0x170/0x3f0 [ 27.024574] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.025220] kthread+0x328/0x630 [ 27.025404] ret_from_fork+0x10/0x20 [ 27.025692] [ 27.025733] Allocated by task 204: [ 27.025763] kasan_save_stack+0x3c/0x68 [ 27.026200] kasan_save_track+0x20/0x40 [ 27.026291] kasan_save_alloc_info+0x40/0x58 [ 27.026485] __kasan_kmalloc+0xd4/0xd8 [ 27.026582] __kmalloc_cache_noprof+0x16c/0x3c0 [ 27.026928] kmalloc_double_kzfree+0xb8/0x308 [ 27.027091] kunit_try_run_case+0x170/0x3f0 [ 27.027133] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.027179] kthread+0x328/0x630 [ 27.027710] ret_from_fork+0x10/0x20 [ 27.027798] [ 27.028154] Freed by task 204: [ 27.028240] kasan_save_stack+0x3c/0x68 [ 27.028520] kasan_save_track+0x20/0x40 [ 27.028560] kasan_save_free_info+0x4c/0x78 [ 27.029152] __kasan_slab_free+0x6c/0x98 [ 27.029202] kfree+0x214/0x3c8 [ 27.029240] kfree_sensitive+0x80/0xb0 [ 27.029277] kmalloc_double_kzfree+0x11c/0x308 [ 27.029314] kunit_try_run_case+0x170/0x3f0 [ 27.029352] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.029398] kthread+0x328/0x630 [ 27.029912] ret_from_fork+0x10/0x20 [ 27.029955] [ 27.029974] The buggy address belongs to the object at fff00000c16b9ca0 [ 27.029974] which belongs to the cache kmalloc-16 of size 16 [ 27.030723] The buggy address is located 0 bytes inside of [ 27.030723] 16-byte region [fff00000c16b9ca0, fff00000c16b9cb0) [ 27.031289] [ 27.031472] The buggy address belongs to the physical page: [ 27.031632] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c16b9ba0 pfn:0x1016b9 [ 27.031852] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.031906] page_type: f5(slab) [ 27.031945] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.031995] raw: fff00000c16b9ba0 000000008080007f 00000000f5000000 0000000000000000 [ 27.032036] page dumped because: kasan: bad access detected [ 27.032361] [ 27.032388] Memory state around the buggy address: [ 27.032466] fff00000c16b9b80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 27.032567] fff00000c16b9c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.033031] >fff00000c16b9c80: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 27.033281] ^ [ 27.033358] fff00000c16b9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.033779] fff00000c16b9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.034095] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[ 27.006257] ================================================================== [ 27.007276] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 27.007363] Read of size 1 at addr fff00000c16b9ca0 by task kunit_try_catch/204 [ 27.007415] [ 27.007563] CPU: 0 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 27.008175] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.008221] Hardware name: linux,dummy-virt (DT) [ 27.008252] Call trace: [ 27.008473] show_stack+0x20/0x38 (C) [ 27.008854] dump_stack_lvl+0x8c/0xd0 [ 27.009149] print_report+0x118/0x608 [ 27.009205] kasan_report+0xdc/0x128 [ 27.009604] __kasan_check_byte+0x54/0x70 [ 27.009893] kfree_sensitive+0x30/0xb0 [ 27.010094] kmalloc_double_kzfree+0x168/0x308 [ 27.010602] kunit_try_run_case+0x170/0x3f0 [ 27.011048] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.011146] kthread+0x328/0x630 [ 27.011191] ret_from_fork+0x10/0x20 [ 27.011246] [ 27.011265] Allocated by task 204: [ 27.011295] kasan_save_stack+0x3c/0x68 [ 27.012162] kasan_save_track+0x20/0x40 [ 27.012392] kasan_save_alloc_info+0x40/0x58 [ 27.012452] __kasan_kmalloc+0xd4/0xd8 [ 27.012664] __kmalloc_cache_noprof+0x16c/0x3c0 [ 27.012785] kmalloc_double_kzfree+0xb8/0x308 [ 27.012827] kunit_try_run_case+0x170/0x3f0 [ 27.013097] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.013308] kthread+0x328/0x630 [ 27.013620] ret_from_fork+0x10/0x20 [ 27.013846] [ 27.013866] Freed by task 204: [ 27.013894] kasan_save_stack+0x3c/0x68 [ 27.014346] kasan_save_track+0x20/0x40 [ 27.014431] kasan_save_free_info+0x4c/0x78 [ 27.014700] __kasan_slab_free+0x6c/0x98 [ 27.014741] kfree+0x214/0x3c8 [ 27.014775] kfree_sensitive+0x80/0xb0 [ 27.014810] kmalloc_double_kzfree+0x11c/0x308 [ 27.015437] kunit_try_run_case+0x170/0x3f0 [ 27.015484] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.015530] kthread+0x328/0x630 [ 27.015562] ret_from_fork+0x10/0x20 [ 27.015599] [ 27.015618] The buggy address belongs to the object at fff00000c16b9ca0 [ 27.015618] which belongs to the cache kmalloc-16 of size 16 [ 27.015678] The buggy address is located 0 bytes inside of [ 27.015678] freed 16-byte region [fff00000c16b9ca0, fff00000c16b9cb0) [ 27.016524] [ 27.016555] The buggy address belongs to the physical page: [ 27.016599] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c16b9ba0 pfn:0x1016b9 [ 27.016684] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.017221] page_type: f5(slab) [ 27.017265] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 27.017315] raw: fff00000c16b9ba0 000000008080007f 00000000f5000000 0000000000000000 [ 27.017824] page dumped because: kasan: bad access detected [ 27.017894] [ 27.017914] Memory state around the buggy address: [ 27.017950] fff00000c16b9b80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 27.018393] fff00000c16b9c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 27.018621] >fff00000c16b9c80: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 27.018665] ^ [ 27.018696] fff00000c16b9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.018740] fff00000c16b9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.018779] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 26.941568] ================================================================== [ 26.941768] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 26.941884] Write of size 33 at addr fff00000c5753700 by task kunit_try_catch/198 [ 26.942089] [ 26.942236] CPU: 0 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 26.942351] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.942404] Hardware name: linux,dummy-virt (DT) [ 26.942550] Call trace: [ 26.942575] show_stack+0x20/0x38 (C) [ 26.942625] dump_stack_lvl+0x8c/0xd0 [ 26.942726] print_report+0x118/0x608 [ 26.942776] kasan_report+0xdc/0x128 [ 26.942822] kasan_check_range+0x100/0x1a8 [ 26.942869] __asan_memset+0x34/0x78 [ 26.942919] kmalloc_uaf_memset+0x170/0x310 [ 26.943181] kunit_try_run_case+0x170/0x3f0 [ 26.943231] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.943284] kthread+0x328/0x630 [ 26.943326] ret_from_fork+0x10/0x20 [ 26.943371] [ 26.943390] Allocated by task 198: [ 26.943422] kasan_save_stack+0x3c/0x68 [ 26.943625] kasan_save_track+0x20/0x40 [ 26.944010] kasan_save_alloc_info+0x40/0x58 [ 26.944189] __kasan_kmalloc+0xd4/0xd8 [ 26.944659] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.945006] kmalloc_uaf_memset+0xb8/0x310 [ 26.945068] kunit_try_run_case+0x170/0x3f0 [ 26.945106] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.945150] kthread+0x328/0x630 [ 26.945182] ret_from_fork+0x10/0x20 [ 26.945244] [ 26.945264] Freed by task 198: [ 26.945319] kasan_save_stack+0x3c/0x68 [ 26.945455] kasan_save_track+0x20/0x40 [ 26.945641] kasan_save_free_info+0x4c/0x78 [ 26.945853] __kasan_slab_free+0x6c/0x98 [ 26.945981] kfree+0x214/0x3c8 [ 26.946015] kmalloc_uaf_memset+0x11c/0x310 [ 26.946072] kunit_try_run_case+0x170/0x3f0 [ 26.946133] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.946216] kthread+0x328/0x630 [ 26.946400] ret_from_fork+0x10/0x20 [ 26.946582] [ 26.946603] The buggy address belongs to the object at fff00000c5753700 [ 26.946603] which belongs to the cache kmalloc-64 of size 64 [ 26.947164] The buggy address is located 0 bytes inside of [ 26.947164] freed 64-byte region [fff00000c5753700, fff00000c5753740) [ 26.947280] [ 26.947370] The buggy address belongs to the physical page: [ 26.947399] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105753 [ 26.947574] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.947635] page_type: f5(slab) [ 26.947673] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.947814] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.947857] page dumped because: kasan: bad access detected [ 26.947889] [ 26.948051] Memory state around the buggy address: [ 26.948261] fff00000c5753600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.948315] fff00000c5753680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.948379] >fff00000c5753700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.948656] ^ [ 26.948719] fff00000c5753780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.948790] fff00000c5753800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.948884] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[ 26.928826] ================================================================== [ 26.928883] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 26.928969] Read of size 1 at addr fff00000c16b9c88 by task kunit_try_catch/196 [ 26.929020] [ 26.929047] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 26.929146] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.929171] Hardware name: linux,dummy-virt (DT) [ 26.929210] Call trace: [ 26.929232] show_stack+0x20/0x38 (C) [ 26.929281] dump_stack_lvl+0x8c/0xd0 [ 26.929327] print_report+0x118/0x608 [ 26.929373] kasan_report+0xdc/0x128 [ 26.929418] __asan_report_load1_noabort+0x20/0x30 [ 26.929538] kmalloc_uaf+0x300/0x338 [ 26.929581] kunit_try_run_case+0x170/0x3f0 [ 26.929628] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.929679] kthread+0x328/0x630 [ 26.929730] ret_from_fork+0x10/0x20 [ 26.929778] [ 26.929795] Allocated by task 196: [ 26.929820] kasan_save_stack+0x3c/0x68 [ 26.929861] kasan_save_track+0x20/0x40 [ 26.929896] kasan_save_alloc_info+0x40/0x58 [ 26.929934] __kasan_kmalloc+0xd4/0xd8 [ 26.929970] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.930162] kmalloc_uaf+0xb8/0x338 [ 26.930310] kunit_try_run_case+0x170/0x3f0 [ 26.930368] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.930413] kthread+0x328/0x630 [ 26.930489] ret_from_fork+0x10/0x20 [ 26.930523] [ 26.930542] Freed by task 196: [ 26.930567] kasan_save_stack+0x3c/0x68 [ 26.930604] kasan_save_track+0x20/0x40 [ 26.930639] kasan_save_free_info+0x4c/0x78 [ 26.930675] __kasan_slab_free+0x6c/0x98 [ 26.930713] kfree+0x214/0x3c8 [ 26.930786] kmalloc_uaf+0x11c/0x338 [ 26.930922] kunit_try_run_case+0x170/0x3f0 [ 26.930960] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.931003] kthread+0x328/0x630 [ 26.931041] ret_from_fork+0x10/0x20 [ 26.931143] [ 26.931161] The buggy address belongs to the object at fff00000c16b9c80 [ 26.931161] which belongs to the cache kmalloc-16 of size 16 [ 26.931334] The buggy address is located 8 bytes inside of [ 26.931334] freed 16-byte region [fff00000c16b9c80, fff00000c16b9c90) [ 26.931494] [ 26.931549] The buggy address belongs to the physical page: [ 26.931663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c16b9ba0 pfn:0x1016b9 [ 26.931747] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.931827] page_type: f5(slab) [ 26.931863] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 26.931913] raw: fff00000c16b9ba0 000000008080007f 00000000f5000000 0000000000000000 [ 26.931952] page dumped because: kasan: bad access detected [ 26.931982] [ 26.932001] Memory state around the buggy address: [ 26.932029] fff00000c16b9b80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 26.932080] fff00000c16b9c00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.932121] >fff00000c16b9c80: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.932158] ^ [ 26.932184] fff00000c16b9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.932226] fff00000c16b9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.932262] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 26.918604] ================================================================== [ 26.918659] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0 [ 26.918710] Read of size 64 at addr fff00000c5753404 by task kunit_try_catch/194 [ 26.918759] [ 26.918788] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 26.918881] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.918908] Hardware name: linux,dummy-virt (DT) [ 26.918979] Call trace: [ 26.919006] show_stack+0x20/0x38 (C) [ 26.919066] dump_stack_lvl+0x8c/0xd0 [ 26.919113] print_report+0x118/0x608 [ 26.919159] kasan_report+0xdc/0x128 [ 26.919202] kasan_check_range+0x100/0x1a8 [ 26.919260] __asan_memmove+0x3c/0x98 [ 26.919302] kmalloc_memmove_invalid_size+0x154/0x2e0 [ 26.919352] kunit_try_run_case+0x170/0x3f0 [ 26.919397] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.919448] kthread+0x328/0x630 [ 26.919489] ret_from_fork+0x10/0x20 [ 26.919585] [ 26.919604] Allocated by task 194: [ 26.919632] kasan_save_stack+0x3c/0x68 [ 26.919674] kasan_save_track+0x20/0x40 [ 26.919712] kasan_save_alloc_info+0x40/0x58 [ 26.919748] __kasan_kmalloc+0xd4/0xd8 [ 26.920392] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.920438] kmalloc_memmove_invalid_size+0xb0/0x2e0 [ 26.920545] kunit_try_run_case+0x170/0x3f0 [ 26.920587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.920631] kthread+0x328/0x630 [ 26.920684] ret_from_fork+0x10/0x20 [ 26.920721] [ 26.920739] The buggy address belongs to the object at fff00000c5753400 [ 26.920739] which belongs to the cache kmalloc-64 of size 64 [ 26.920795] The buggy address is located 4 bytes inside of [ 26.920795] allocated 64-byte region [fff00000c5753400, fff00000c5753440) [ 26.920855] [ 26.920873] The buggy address belongs to the physical page: [ 26.920903] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105753 [ 26.920953] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.920997] page_type: f5(slab) [ 26.921085] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.921138] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.921175] page dumped because: kasan: bad access detected [ 26.921206] [ 26.921225] Memory state around the buggy address: [ 26.921253] fff00000c5753300: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc [ 26.921295] fff00000c5753380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.921338] >fff00000c5753400: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 26.921375] ^ [ 26.921406] fff00000c5753480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.921448] fff00000c5753500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.921486] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 26.909899] ================================================================== [ 26.909977] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 26.910032] Read of size 18446744073709551614 at addr fff00000c5753204 by task kunit_try_catch/192 [ 26.910126] [ 26.910162] CPU: 0 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 26.910262] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.910288] Hardware name: linux,dummy-virt (DT) [ 26.910407] Call trace: [ 26.910458] show_stack+0x20/0x38 (C) [ 26.910621] dump_stack_lvl+0x8c/0xd0 [ 26.910670] print_report+0x118/0x608 [ 26.910717] kasan_report+0xdc/0x128 [ 26.910761] kasan_check_range+0x100/0x1a8 [ 26.910808] __asan_memmove+0x3c/0x98 [ 26.910851] kmalloc_memmove_negative_size+0x154/0x2e0 [ 26.910902] kunit_try_run_case+0x170/0x3f0 [ 26.910948] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.911001] kthread+0x328/0x630 [ 26.911042] ret_from_fork+0x10/0x20 [ 26.911098] [ 26.911125] Allocated by task 192: [ 26.911153] kasan_save_stack+0x3c/0x68 [ 26.911191] kasan_save_track+0x20/0x40 [ 26.911229] kasan_save_alloc_info+0x40/0x58 [ 26.911266] __kasan_kmalloc+0xd4/0xd8 [ 26.911302] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.911341] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 26.911418] kunit_try_run_case+0x170/0x3f0 [ 26.911530] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.911653] kthread+0x328/0x630 [ 26.911752] ret_from_fork+0x10/0x20 [ 26.911840] [ 26.911859] The buggy address belongs to the object at fff00000c5753200 [ 26.911859] which belongs to the cache kmalloc-64 of size 64 [ 26.912185] The buggy address is located 4 bytes inside of [ 26.912185] 64-byte region [fff00000c5753200, fff00000c5753240) [ 26.912246] [ 26.912272] The buggy address belongs to the physical page: [ 26.912302] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105753 [ 26.912386] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.912479] page_type: f5(slab) [ 26.912521] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 26.912606] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.912763] page dumped because: kasan: bad access detected [ 26.912900] [ 26.912918] Memory state around the buggy address: [ 26.913011] fff00000c5753100: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc [ 26.913134] fff00000c5753180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.913175] >fff00000c5753200: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 26.913214] ^ [ 26.913245] fff00000c5753280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.913421] fff00000c5753300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.913458] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[ 26.900485] ================================================================== [ 26.900540] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 26.900588] Write of size 16 at addr fff00000c643f869 by task kunit_try_catch/190 [ 26.900636] [ 26.900663] CPU: 0 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 26.900746] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.901208] Hardware name: linux,dummy-virt (DT) [ 26.901253] Call trace: [ 26.901274] show_stack+0x20/0x38 (C) [ 26.901322] dump_stack_lvl+0x8c/0xd0 [ 26.901367] print_report+0x118/0x608 [ 26.901411] kasan_report+0xdc/0x128 [ 26.901455] kasan_check_range+0x100/0x1a8 [ 26.901501] __asan_memset+0x34/0x78 [ 26.901542] kmalloc_oob_memset_16+0x150/0x2f8 [ 26.901587] kunit_try_run_case+0x170/0x3f0 [ 26.901632] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.901682] kthread+0x328/0x630 [ 26.901723] ret_from_fork+0x10/0x20 [ 26.901768] [ 26.901812] Allocated by task 190: [ 26.901839] kasan_save_stack+0x3c/0x68 [ 26.901878] kasan_save_track+0x20/0x40 [ 26.901914] kasan_save_alloc_info+0x40/0x58 [ 26.901949] __kasan_kmalloc+0xd4/0xd8 [ 26.901984] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.902022] kmalloc_oob_memset_16+0xb0/0x2f8 [ 26.902068] kunit_try_run_case+0x170/0x3f0 [ 26.902104] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.902146] kthread+0x328/0x630 [ 26.902183] ret_from_fork+0x10/0x20 [ 26.902218] [ 26.902235] The buggy address belongs to the object at fff00000c643f800 [ 26.902235] which belongs to the cache kmalloc-128 of size 128 [ 26.902369] The buggy address is located 105 bytes inside of [ 26.902369] allocated 120-byte region [fff00000c643f800, fff00000c643f878) [ 26.902525] [ 26.902662] The buggy address belongs to the physical page: [ 26.902691] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643f [ 26.902739] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.902783] page_type: f5(slab) [ 26.902819] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 26.902866] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.902903] page dumped because: kasan: bad access detected [ 26.902941] [ 26.902958] Memory state around the buggy address: [ 26.902986] fff00000c643f700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.903032] fff00000c643f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.903082] >fff00000c643f800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 26.903117] ^ [ 26.903156] fff00000c643f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.903246] fff00000c643f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.903368] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[ 26.891298] ================================================================== [ 26.891353] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 26.891402] Write of size 8 at addr fff00000c643f771 by task kunit_try_catch/188 [ 26.891449] [ 26.891477] CPU: 0 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 26.891562] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.891587] Hardware name: linux,dummy-virt (DT) [ 26.891880] Call trace: [ 26.891922] show_stack+0x20/0x38 (C) [ 26.892006] dump_stack_lvl+0x8c/0xd0 [ 26.892085] print_report+0x118/0x608 [ 26.892156] kasan_report+0xdc/0x128 [ 26.892991] kasan_check_range+0x100/0x1a8 [ 26.893040] __asan_memset+0x34/0x78 [ 26.893119] kmalloc_oob_memset_8+0x150/0x2f8 [ 26.893164] kunit_try_run_case+0x170/0x3f0 [ 26.893210] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.893261] kthread+0x328/0x630 [ 26.893302] ret_from_fork+0x10/0x20 [ 26.893357] [ 26.893375] Allocated by task 188: [ 26.893400] kasan_save_stack+0x3c/0x68 [ 26.893440] kasan_save_track+0x20/0x40 [ 26.893476] kasan_save_alloc_info+0x40/0x58 [ 26.893512] __kasan_kmalloc+0xd4/0xd8 [ 26.893547] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.893585] kmalloc_oob_memset_8+0xb0/0x2f8 [ 26.893711] kunit_try_run_case+0x170/0x3f0 [ 26.893755] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.893891] kthread+0x328/0x630 [ 26.893962] ret_from_fork+0x10/0x20 [ 26.894105] [ 26.894123] The buggy address belongs to the object at fff00000c643f700 [ 26.894123] which belongs to the cache kmalloc-128 of size 128 [ 26.894186] The buggy address is located 113 bytes inside of [ 26.894186] allocated 120-byte region [fff00000c643f700, fff00000c643f778) [ 26.894376] [ 26.894397] The buggy address belongs to the physical page: [ 26.894426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643f [ 26.894475] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.894519] page_type: f5(slab) [ 26.894564] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 26.894612] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.894649] page dumped because: kasan: bad access detected [ 26.894678] [ 26.894695] Memory state around the buggy address: [ 26.894724] fff00000c643f600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.894764] fff00000c643f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.894803] >fff00000c643f700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 26.894839] ^ [ 26.894895] fff00000c643f780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.895042] fff00000c643f800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.895132] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[ 26.884354] ================================================================== [ 26.884413] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 26.884468] Write of size 4 at addr fff00000c643f675 by task kunit_try_catch/186 [ 26.884515] [ 26.884548] CPU: 0 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 26.884633] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.884658] Hardware name: linux,dummy-virt (DT) [ 26.884687] Call trace: [ 26.884709] show_stack+0x20/0x38 (C) [ 26.884755] dump_stack_lvl+0x8c/0xd0 [ 26.884801] print_report+0x118/0x608 [ 26.884846] kasan_report+0xdc/0x128 [ 26.884892] kasan_check_range+0x100/0x1a8 [ 26.884939] __asan_memset+0x34/0x78 [ 26.884979] kmalloc_oob_memset_4+0x150/0x300 [ 26.885024] kunit_try_run_case+0x170/0x3f0 [ 26.885111] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.885309] kthread+0x328/0x630 [ 26.885350] ret_from_fork+0x10/0x20 [ 26.885396] [ 26.885413] Allocated by task 186: [ 26.885439] kasan_save_stack+0x3c/0x68 [ 26.885480] kasan_save_track+0x20/0x40 [ 26.885516] kasan_save_alloc_info+0x40/0x58 [ 26.885563] __kasan_kmalloc+0xd4/0xd8 [ 26.885736] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.885794] kmalloc_oob_memset_4+0xb0/0x300 [ 26.885861] kunit_try_run_case+0x170/0x3f0 [ 26.885948] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.885990] kthread+0x328/0x630 [ 26.886051] ret_from_fork+0x10/0x20 [ 26.886219] [ 26.886261] The buggy address belongs to the object at fff00000c643f600 [ 26.886261] which belongs to the cache kmalloc-128 of size 128 [ 26.886318] The buggy address is located 117 bytes inside of [ 26.886318] allocated 120-byte region [fff00000c643f600, fff00000c643f678) [ 26.886377] [ 26.886396] The buggy address belongs to the physical page: [ 26.886426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643f [ 26.886477] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.886523] page_type: f5(slab) [ 26.886560] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 26.886607] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.886645] page dumped because: kasan: bad access detected [ 26.886714] [ 26.886816] Memory state around the buggy address: [ 26.886895] fff00000c643f500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.886942] fff00000c643f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.887061] >fff00000c643f600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 26.887099] ^ [ 26.887137] fff00000c643f680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.887176] fff00000c643f700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.887214] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[ 26.864083] ================================================================== [ 26.864509] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 26.864838] Write of size 2 at addr fff00000c643f577 by task kunit_try_catch/184 [ 26.865000] [ 26.865156] CPU: 0 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 26.865500] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.865557] Hardware name: linux,dummy-virt (DT) [ 26.865623] Call trace: [ 26.865749] show_stack+0x20/0x38 (C) [ 26.865804] dump_stack_lvl+0x8c/0xd0 [ 26.866119] print_report+0x118/0x608 [ 26.866248] kasan_report+0xdc/0x128 [ 26.866652] kasan_check_range+0x100/0x1a8 [ 26.866787] __asan_memset+0x34/0x78 [ 26.866874] kmalloc_oob_memset_2+0x150/0x2f8 [ 26.866967] kunit_try_run_case+0x170/0x3f0 [ 26.867069] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.867598] kthread+0x328/0x630 [ 26.867690] ret_from_fork+0x10/0x20 [ 26.867824] [ 26.867873] Allocated by task 184: [ 26.867963] kasan_save_stack+0x3c/0x68 [ 26.868077] kasan_save_track+0x20/0x40 [ 26.868115] kasan_save_alloc_info+0x40/0x58 [ 26.868309] __kasan_kmalloc+0xd4/0xd8 [ 26.868463] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.868615] kmalloc_oob_memset_2+0xb0/0x2f8 [ 26.868730] kunit_try_run_case+0x170/0x3f0 [ 26.868911] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.869104] kthread+0x328/0x630 [ 26.869241] ret_from_fork+0x10/0x20 [ 26.869320] [ 26.869426] The buggy address belongs to the object at fff00000c643f500 [ 26.869426] which belongs to the cache kmalloc-128 of size 128 [ 26.869499] The buggy address is located 119 bytes inside of [ 26.869499] allocated 120-byte region [fff00000c643f500, fff00000c643f578) [ 26.869607] [ 26.869634] The buggy address belongs to the physical page: [ 26.869677] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643f [ 26.869733] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.869795] page_type: f5(slab) [ 26.869843] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 26.869892] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.869937] page dumped because: kasan: bad access detected [ 26.869967] [ 26.869993] Memory state around the buggy address: [ 26.870026] fff00000c643f400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.870234] fff00000c643f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.870451] >fff00000c643f500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 26.870745] ^ [ 26.870802] fff00000c643f580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.871289] fff00000c643f600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.871436] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 26.849242] ================================================================== [ 26.849338] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 26.849469] Write of size 128 at addr fff00000c643f400 by task kunit_try_catch/182 [ 26.849527] [ 26.849583] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 26.849984] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.850081] Hardware name: linux,dummy-virt (DT) [ 26.850165] Call trace: [ 26.850215] show_stack+0x20/0x38 (C) [ 26.850269] dump_stack_lvl+0x8c/0xd0 [ 26.850335] print_report+0x118/0x608 [ 26.850467] kasan_report+0xdc/0x128 [ 26.850533] kasan_check_range+0x100/0x1a8 [ 26.850581] __asan_memset+0x34/0x78 [ 26.850882] kmalloc_oob_in_memset+0x144/0x2d0 [ 26.851092] kunit_try_run_case+0x170/0x3f0 [ 26.851197] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.851252] kthread+0x328/0x630 [ 26.851294] ret_from_fork+0x10/0x20 [ 26.851481] [ 26.851499] Allocated by task 182: [ 26.851918] kasan_save_stack+0x3c/0x68 [ 26.852024] kasan_save_track+0x20/0x40 [ 26.852126] kasan_save_alloc_info+0x40/0x58 [ 26.852198] __kasan_kmalloc+0xd4/0xd8 [ 26.852490] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.852616] kmalloc_oob_in_memset+0xb0/0x2d0 [ 26.852658] kunit_try_run_case+0x170/0x3f0 [ 26.852695] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.852796] kthread+0x328/0x630 [ 26.852845] ret_from_fork+0x10/0x20 [ 26.852880] [ 26.852899] The buggy address belongs to the object at fff00000c643f400 [ 26.852899] which belongs to the cache kmalloc-128 of size 128 [ 26.852976] The buggy address is located 0 bytes inside of [ 26.852976] allocated 120-byte region [fff00000c643f400, fff00000c643f478) [ 26.853041] [ 26.853078] The buggy address belongs to the physical page: [ 26.853109] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643f [ 26.853182] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.853232] page_type: f5(slab) [ 26.853269] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 26.853325] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.853363] page dumped because: kasan: bad access detected [ 26.853393] [ 26.853410] Memory state around the buggy address: [ 26.853439] fff00000c643f300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.853479] fff00000c643f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.853519] >fff00000c643f400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 26.853571] ^ [ 26.853618] fff00000c643f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.853672] fff00000c643f500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.853714] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[ 26.829812] ================================================================== [ 26.829866] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 26.829917] Read of size 16 at addr fff00000c16b9c60 by task kunit_try_catch/180 [ 26.830221] [ 26.830375] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 26.830709] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.830745] Hardware name: linux,dummy-virt (DT) [ 26.830906] Call trace: [ 26.830983] show_stack+0x20/0x38 (C) [ 26.831039] dump_stack_lvl+0x8c/0xd0 [ 26.831149] print_report+0x118/0x608 [ 26.831236] kasan_report+0xdc/0x128 [ 26.831285] __asan_report_load16_noabort+0x20/0x30 [ 26.831333] kmalloc_uaf_16+0x3bc/0x438 [ 26.831640] kunit_try_run_case+0x170/0x3f0 [ 26.831938] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.832193] kthread+0x328/0x630 [ 26.832376] ret_from_fork+0x10/0x20 [ 26.832592] [ 26.832761] Allocated by task 180: [ 26.832799] kasan_save_stack+0x3c/0x68 [ 26.832841] kasan_save_track+0x20/0x40 [ 26.832877] kasan_save_alloc_info+0x40/0x58 [ 26.832914] __kasan_kmalloc+0xd4/0xd8 [ 26.833296] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.833404] kmalloc_uaf_16+0x140/0x438 [ 26.833538] kunit_try_run_case+0x170/0x3f0 [ 26.833617] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.833797] kthread+0x328/0x630 [ 26.833843] ret_from_fork+0x10/0x20 [ 26.833898] [ 26.834073] Freed by task 180: [ 26.834208] kasan_save_stack+0x3c/0x68 [ 26.834355] kasan_save_track+0x20/0x40 [ 26.834521] kasan_save_free_info+0x4c/0x78 [ 26.834626] __kasan_slab_free+0x6c/0x98 [ 26.834738] kfree+0x214/0x3c8 [ 26.834791] kmalloc_uaf_16+0x190/0x438 [ 26.834870] kunit_try_run_case+0x170/0x3f0 [ 26.835179] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.835713] kthread+0x328/0x630 [ 26.836112] ret_from_fork+0x10/0x20 [ 26.836219] [ 26.836294] The buggy address belongs to the object at fff00000c16b9c60 [ 26.836294] which belongs to the cache kmalloc-16 of size 16 [ 26.836352] The buggy address is located 0 bytes inside of [ 26.836352] freed 16-byte region [fff00000c16b9c60, fff00000c16b9c70) [ 26.836613] [ 26.836740] The buggy address belongs to the physical page: [ 26.836805] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c16b9ba0 pfn:0x1016b9 [ 26.836922] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.837271] page_type: f5(slab) [ 26.837365] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 26.837585] raw: fff00000c16b9ba0 000000008080007f 00000000f5000000 0000000000000000 [ 26.837662] page dumped because: kasan: bad access detected [ 26.837706] [ 26.837723] Memory state around the buggy address: [ 26.837760] fff00000c16b9b00: 00 01 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.837811] fff00000c16b9b80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 26.837851] >fff00000c16b9c00: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 26.837887] ^ [ 26.837924] fff00000c16b9c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.837970] fff00000c16b9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.838006] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[ 26.814199] ================================================================== [ 26.814280] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 26.814839] Write of size 16 at addr fff00000c16b9c00 by task kunit_try_catch/178 [ 26.815007] [ 26.815090] CPU: 0 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 26.815311] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.815696] Hardware name: linux,dummy-virt (DT) [ 26.815753] Call trace: [ 26.816074] show_stack+0x20/0x38 (C) [ 26.816346] dump_stack_lvl+0x8c/0xd0 [ 26.816777] print_report+0x118/0x608 [ 26.816889] kasan_report+0xdc/0x128 [ 26.817021] __asan_report_store16_noabort+0x20/0x30 [ 26.817388] kmalloc_oob_16+0x3a0/0x3f8 [ 26.817542] kunit_try_run_case+0x170/0x3f0 [ 26.817597] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.817650] kthread+0x328/0x630 [ 26.817720] ret_from_fork+0x10/0x20 [ 26.817778] [ 26.817802] Allocated by task 178: [ 26.817829] kasan_save_stack+0x3c/0x68 [ 26.817869] kasan_save_track+0x20/0x40 [ 26.817905] kasan_save_alloc_info+0x40/0x58 [ 26.817940] __kasan_kmalloc+0xd4/0xd8 [ 26.817976] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.818013] kmalloc_oob_16+0xb4/0x3f8 [ 26.818049] kunit_try_run_case+0x170/0x3f0 [ 26.818114] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.818169] kthread+0x328/0x630 [ 26.818200] ret_from_fork+0x10/0x20 [ 26.818244] [ 26.818262] The buggy address belongs to the object at fff00000c16b9c00 [ 26.818262] which belongs to the cache kmalloc-16 of size 16 [ 26.818317] The buggy address is located 0 bytes inside of [ 26.818317] allocated 13-byte region [fff00000c16b9c00, fff00000c16b9c0d) [ 26.818386] [ 26.818405] The buggy address belongs to the physical page: [ 26.818436] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c16b9ba0 pfn:0x1016b9 [ 26.818490] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.818544] page_type: f5(slab) [ 26.818595] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 26.818654] raw: fff00000c16b9ba0 000000008080007f 00000000f5000000 0000000000000000 [ 26.818707] page dumped because: kasan: bad access detected [ 26.818738] [ 26.818763] Memory state around the buggy address: [ 26.818802] fff00000c16b9b00: 00 01 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.818858] fff00000c16b9b80: fa fb fc fc fa fb fc fc 00 04 fc fc fa fb fc fc [ 26.818898] >fff00000c16b9c00: 00 05 fc fc 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.818934] ^ [ 26.818962] fff00000c16b9c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.819010] fff00000c16b9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.819047] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 26.791479] ================================================================== [ 26.791533] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 26.791782] Read of size 1 at addr fff00000c1c40e00 by task kunit_try_catch/176 [ 26.791907] [ 26.792147] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 26.792357] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.792383] Hardware name: linux,dummy-virt (DT) [ 26.792630] Call trace: [ 26.792799] show_stack+0x20/0x38 (C) [ 26.792924] dump_stack_lvl+0x8c/0xd0 [ 26.793124] print_report+0x118/0x608 [ 26.793243] kasan_report+0xdc/0x128 [ 26.793300] __asan_report_load1_noabort+0x20/0x30 [ 26.793575] krealloc_uaf+0x4c8/0x520 [ 26.793916] kunit_try_run_case+0x170/0x3f0 [ 26.794087] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.794207] kthread+0x328/0x630 [ 26.794267] ret_from_fork+0x10/0x20 [ 26.794601] [ 26.794821] Allocated by task 176: [ 26.794910] kasan_save_stack+0x3c/0x68 [ 26.794988] kasan_save_track+0x20/0x40 [ 26.795199] kasan_save_alloc_info+0x40/0x58 [ 26.795266] __kasan_kmalloc+0xd4/0xd8 [ 26.795437] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.795692] krealloc_uaf+0xc8/0x520 [ 26.795759] kunit_try_run_case+0x170/0x3f0 [ 26.795940] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.796039] kthread+0x328/0x630 [ 26.796217] ret_from_fork+0x10/0x20 [ 26.796255] [ 26.796273] Freed by task 176: [ 26.796320] kasan_save_stack+0x3c/0x68 [ 26.796523] kasan_save_track+0x20/0x40 [ 26.796671] kasan_save_free_info+0x4c/0x78 [ 26.796856] __kasan_slab_free+0x6c/0x98 [ 26.796992] kfree+0x214/0x3c8 [ 26.797155] krealloc_uaf+0x12c/0x520 [ 26.797236] kunit_try_run_case+0x170/0x3f0 [ 26.797300] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.797471] kthread+0x328/0x630 [ 26.797707] ret_from_fork+0x10/0x20 [ 26.797818] [ 26.797910] The buggy address belongs to the object at fff00000c1c40e00 [ 26.797910] which belongs to the cache kmalloc-256 of size 256 [ 26.797996] The buggy address is located 0 bytes inside of [ 26.797996] freed 256-byte region [fff00000c1c40e00, fff00000c1c40f00) [ 26.798140] [ 26.798244] The buggy address belongs to the physical page: [ 26.798275] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c40 [ 26.798499] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.798674] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.798907] page_type: f5(slab) [ 26.798951] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 26.799073] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.799568] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 26.799642] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.799804] head: 0bfffe0000000001 ffffc1ffc3071001 00000000ffffffff 00000000ffffffff [ 26.800012] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 26.800125] page dumped because: kasan: bad access detected [ 26.800263] [ 26.800313] Memory state around the buggy address: [ 26.800376] fff00000c1c40d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.800521] fff00000c1c40d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.800604] >fff00000c1c40e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.800775] ^ [ 26.800832] fff00000c1c40e80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.801043] fff00000c1c40f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.801115] ================================================================== [ 26.783507] ================================================================== [ 26.783596] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 26.783861] Read of size 1 at addr fff00000c1c40e00 by task kunit_try_catch/176 [ 26.783937] [ 26.784012] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 26.784147] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.784173] Hardware name: linux,dummy-virt (DT) [ 26.784223] Call trace: [ 26.784246] show_stack+0x20/0x38 (C) [ 26.784296] dump_stack_lvl+0x8c/0xd0 [ 26.784496] print_report+0x118/0x608 [ 26.784629] kasan_report+0xdc/0x128 [ 26.784768] __kasan_check_byte+0x54/0x70 [ 26.784836] krealloc_noprof+0x44/0x360 [ 26.785138] krealloc_uaf+0x180/0x520 [ 26.785240] kunit_try_run_case+0x170/0x3f0 [ 26.785365] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.785489] kthread+0x328/0x630 [ 26.785532] ret_from_fork+0x10/0x20 [ 26.785625] [ 26.785850] Allocated by task 176: [ 26.785886] kasan_save_stack+0x3c/0x68 [ 26.786237] kasan_save_track+0x20/0x40 [ 26.786390] kasan_save_alloc_info+0x40/0x58 [ 26.786538] __kasan_kmalloc+0xd4/0xd8 [ 26.786691] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.786780] krealloc_uaf+0xc8/0x520 [ 26.786923] kunit_try_run_case+0x170/0x3f0 [ 26.787028] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.787278] kthread+0x328/0x630 [ 26.787420] ret_from_fork+0x10/0x20 [ 26.787539] [ 26.787621] Freed by task 176: [ 26.787756] kasan_save_stack+0x3c/0x68 [ 26.787836] kasan_save_track+0x20/0x40 [ 26.787873] kasan_save_free_info+0x4c/0x78 [ 26.787922] __kasan_slab_free+0x6c/0x98 [ 26.788262] kfree+0x214/0x3c8 [ 26.788330] krealloc_uaf+0x12c/0x520 [ 26.788368] kunit_try_run_case+0x170/0x3f0 [ 26.788404] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.788447] kthread+0x328/0x630 [ 26.788496] ret_from_fork+0x10/0x20 [ 26.788579] [ 26.788606] The buggy address belongs to the object at fff00000c1c40e00 [ 26.788606] which belongs to the cache kmalloc-256 of size 256 [ 26.788772] The buggy address is located 0 bytes inside of [ 26.788772] freed 256-byte region [fff00000c1c40e00, fff00000c1c40f00) [ 26.788856] [ 26.788892] The buggy address belongs to the physical page: [ 26.788925] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c40 [ 26.788975] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.789026] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.789090] page_type: f5(slab) [ 26.789127] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 26.789175] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.789232] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 26.789288] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.789336] head: 0bfffe0000000001 ffffc1ffc3071001 00000000ffffffff 00000000ffffffff [ 26.789391] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 26.789430] page dumped because: kasan: bad access detected [ 26.789459] [ 26.789477] Memory state around the buggy address: [ 26.789507] fff00000c1c40d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.789548] fff00000c1c40d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.789594] >fff00000c1c40e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.789636] ^ [ 26.789662] fff00000c1c40e80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.789717] fff00000c1c40f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.789763] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 26.649709] ================================================================== [ 26.649914] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 26.649974] Write of size 1 at addr fff00000c1c40cd0 by task kunit_try_catch/170 [ 26.650021] [ 26.650048] CPU: 0 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 26.650322] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.650356] Hardware name: linux,dummy-virt (DT) [ 26.650384] Call trace: [ 26.650404] show_stack+0x20/0x38 (C) [ 26.650453] dump_stack_lvl+0x8c/0xd0 [ 26.650499] print_report+0x118/0x608 [ 26.650546] kasan_report+0xdc/0x128 [ 26.651071] __asan_report_store1_noabort+0x20/0x30 [ 26.651201] krealloc_less_oob_helper+0xb9c/0xc50 [ 26.651252] krealloc_less_oob+0x20/0x38 [ 26.651307] kunit_try_run_case+0x170/0x3f0 [ 26.651516] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.651569] kthread+0x328/0x630 [ 26.651609] ret_from_fork+0x10/0x20 [ 26.651655] [ 26.651673] Allocated by task 170: [ 26.651698] kasan_save_stack+0x3c/0x68 [ 26.651744] kasan_save_track+0x20/0x40 [ 26.651898] kasan_save_alloc_info+0x40/0x58 [ 26.652091] __kasan_krealloc+0x118/0x178 [ 26.652279] krealloc_noprof+0x128/0x360 [ 26.652316] krealloc_less_oob_helper+0x168/0xc50 [ 26.652460] krealloc_less_oob+0x20/0x38 [ 26.652562] kunit_try_run_case+0x170/0x3f0 [ 26.652598] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.652639] kthread+0x328/0x630 [ 26.652669] ret_from_fork+0x10/0x20 [ 26.652709] [ 26.652795] The buggy address belongs to the object at fff00000c1c40c00 [ 26.652795] which belongs to the cache kmalloc-256 of size 256 [ 26.652899] The buggy address is located 7 bytes to the right of [ 26.652899] allocated 201-byte region [fff00000c1c40c00, fff00000c1c40cc9) [ 26.652960] [ 26.652979] The buggy address belongs to the physical page: [ 26.653010] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c40 [ 26.653069] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.653113] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.653163] page_type: f5(slab) [ 26.653626] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 26.653679] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.654076] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 26.654508] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.654689] head: 0bfffe0000000001 ffffc1ffc3071001 00000000ffffffff 00000000ffffffff [ 26.655117] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 26.655186] page dumped because: kasan: bad access detected [ 26.655217] [ 26.655234] Memory state around the buggy address: [ 26.655264] fff00000c1c40b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.655305] fff00000c1c40c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.655345] >fff00000c1c40c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 26.655381] ^ [ 26.655880] fff00000c1c40d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.656033] fff00000c1c40d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.656081] ================================================================== [ 26.768025] ================================================================== [ 26.768160] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 26.768285] Write of size 1 at addr fff00000c649e0da by task kunit_try_catch/174 [ 26.768335] [ 26.768362] CPU: 0 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 26.768446] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.768471] Hardware name: linux,dummy-virt (DT) [ 26.768500] Call trace: [ 26.768520] show_stack+0x20/0x38 (C) [ 26.768568] dump_stack_lvl+0x8c/0xd0 [ 26.768614] print_report+0x118/0x608 [ 26.768782] kasan_report+0xdc/0x128 [ 26.769273] __asan_report_store1_noabort+0x20/0x30 [ 26.769679] krealloc_less_oob_helper+0xa80/0xc50 [ 26.769732] krealloc_large_less_oob+0x20/0x38 [ 26.769791] kunit_try_run_case+0x170/0x3f0 [ 26.769841] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.769893] kthread+0x328/0x630 [ 26.769937] ret_from_fork+0x10/0x20 [ 26.769984] [ 26.770003] The buggy address belongs to the physical page: [ 26.770032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10649c [ 26.770091] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.770136] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.770191] page_type: f8(unknown) [ 26.770229] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.770276] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.770324] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.770371] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.770418] head: 0bfffe0000000002 ffffc1ffc3192701 00000000ffffffff 00000000ffffffff [ 26.770464] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 26.770502] page dumped because: kasan: bad access detected [ 26.770531] [ 26.770548] Memory state around the buggy address: [ 26.770577] fff00000c649df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.770616] fff00000c649e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.770656] >fff00000c649e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 26.770691] ^ [ 26.770726] fff00000c649e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.770765] fff00000c649e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.770801] ================================================================== [ 26.641459] ================================================================== [ 26.641515] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 26.641644] Write of size 1 at addr fff00000c1c40cc9 by task kunit_try_catch/170 [ 26.641696] [ 26.641726] CPU: 0 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 26.641809] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.641835] Hardware name: linux,dummy-virt (DT) [ 26.641871] Call trace: [ 26.641958] show_stack+0x20/0x38 (C) [ 26.642179] dump_stack_lvl+0x8c/0xd0 [ 26.642227] print_report+0x118/0x608 [ 26.642334] kasan_report+0xdc/0x128 [ 26.642379] __asan_report_store1_noabort+0x20/0x30 [ 26.642426] krealloc_less_oob_helper+0xa48/0xc50 [ 26.642474] krealloc_less_oob+0x20/0x38 [ 26.642524] kunit_try_run_case+0x170/0x3f0 [ 26.642762] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.642857] kthread+0x328/0x630 [ 26.643472] ret_from_fork+0x10/0x20 [ 26.643626] [ 26.643866] Allocated by task 170: [ 26.644155] kasan_save_stack+0x3c/0x68 [ 26.644206] kasan_save_track+0x20/0x40 [ 26.644242] kasan_save_alloc_info+0x40/0x58 [ 26.644277] __kasan_krealloc+0x118/0x178 [ 26.644314] krealloc_noprof+0x128/0x360 [ 26.644349] krealloc_less_oob_helper+0x168/0xc50 [ 26.644626] krealloc_less_oob+0x20/0x38 [ 26.644702] kunit_try_run_case+0x170/0x3f0 [ 26.644741] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.644783] kthread+0x328/0x630 [ 26.644825] ret_from_fork+0x10/0x20 [ 26.645092] [ 26.645159] The buggy address belongs to the object at fff00000c1c40c00 [ 26.645159] which belongs to the cache kmalloc-256 of size 256 [ 26.645225] The buggy address is located 0 bytes to the right of [ 26.645225] allocated 201-byte region [fff00000c1c40c00, fff00000c1c40cc9) [ 26.645370] [ 26.645389] The buggy address belongs to the physical page: [ 26.645419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c40 [ 26.645470] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.645797] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.645885] page_type: f5(slab) [ 26.645922] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 26.645970] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.646074] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 26.646275] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.646364] head: 0bfffe0000000001 ffffc1ffc3071001 00000000ffffffff 00000000ffffffff [ 26.646749] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 26.646793] page dumped because: kasan: bad access detected [ 26.646824] [ 26.646842] Memory state around the buggy address: [ 26.646872] fff00000c1c40b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.646996] fff00000c1c40c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.647154] >fff00000c1c40c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 26.647202] ^ [ 26.647298] fff00000c1c40d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.647428] fff00000c1c40d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.647464] ================================================================== [ 26.753337] ================================================================== [ 26.753389] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 26.753437] Write of size 1 at addr fff00000c649e0d0 by task kunit_try_catch/174 [ 26.754685] [ 26.754821] CPU: 0 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 26.755644] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.755850] Hardware name: linux,dummy-virt (DT) [ 26.756016] Call trace: [ 26.756045] show_stack+0x20/0x38 (C) [ 26.756600] dump_stack_lvl+0x8c/0xd0 [ 26.756884] print_report+0x118/0x608 [ 26.757015] kasan_report+0xdc/0x128 [ 26.757248] __asan_report_store1_noabort+0x20/0x30 [ 26.757302] krealloc_less_oob_helper+0xb9c/0xc50 [ 26.757571] krealloc_large_less_oob+0x20/0x38 [ 26.757650] kunit_try_run_case+0x170/0x3f0 [ 26.757697] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.758299] kthread+0x328/0x630 [ 26.758399] ret_from_fork+0x10/0x20 [ 26.758558] [ 26.759331] The buggy address belongs to the physical page: [ 26.759758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10649c [ 26.760100] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.760149] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.760292] page_type: f8(unknown) [ 26.760533] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.760588] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.760957] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.761504] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.761749] head: 0bfffe0000000002 ffffc1ffc3192701 00000000ffffffff 00000000ffffffff [ 26.761798] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 26.761836] page dumped because: kasan: bad access detected [ 26.763019] [ 26.763043] Memory state around the buggy address: [ 26.763478] fff00000c649df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.763795] fff00000c649e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.764231] >fff00000c649e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 26.764278] ^ [ 26.764841] fff00000c649e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.765006] fff00000c649e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.765275] ================================================================== [ 26.657872] ================================================================== [ 26.658008] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 26.658207] Write of size 1 at addr fff00000c1c40cda by task kunit_try_catch/170 [ 26.658261] [ 26.658289] CPU: 0 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 26.658823] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.658963] Hardware name: linux,dummy-virt (DT) [ 26.658998] Call trace: [ 26.659084] show_stack+0x20/0x38 (C) [ 26.659133] dump_stack_lvl+0x8c/0xd0 [ 26.659185] print_report+0x118/0x608 [ 26.659370] kasan_report+0xdc/0x128 [ 26.659489] __asan_report_store1_noabort+0x20/0x30 [ 26.659582] krealloc_less_oob_helper+0xa80/0xc50 [ 26.659713] krealloc_less_oob+0x20/0x38 [ 26.659763] kunit_try_run_case+0x170/0x3f0 [ 26.659818] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.659871] kthread+0x328/0x630 [ 26.659911] ret_from_fork+0x10/0x20 [ 26.659957] [ 26.659974] Allocated by task 170: [ 26.660000] kasan_save_stack+0x3c/0x68 [ 26.660480] kasan_save_track+0x20/0x40 [ 26.660544] kasan_save_alloc_info+0x40/0x58 [ 26.660832] __kasan_krealloc+0x118/0x178 [ 26.660958] krealloc_noprof+0x128/0x360 [ 26.660994] krealloc_less_oob_helper+0x168/0xc50 [ 26.661035] krealloc_less_oob+0x20/0x38 [ 26.661363] kunit_try_run_case+0x170/0x3f0 [ 26.661434] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.661476] kthread+0x328/0x630 [ 26.661513] ret_from_fork+0x10/0x20 [ 26.661805] [ 26.661824] The buggy address belongs to the object at fff00000c1c40c00 [ 26.661824] which belongs to the cache kmalloc-256 of size 256 [ 26.662078] The buggy address is located 17 bytes to the right of [ 26.662078] allocated 201-byte region [fff00000c1c40c00, fff00000c1c40cc9) [ 26.662456] [ 26.662481] The buggy address belongs to the physical page: [ 26.662623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c40 [ 26.662679] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.663113] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.663175] page_type: f5(slab) [ 26.663212] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 26.663269] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.663317] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 26.663589] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.663897] head: 0bfffe0000000001 ffffc1ffc3071001 00000000ffffffff 00000000ffffffff [ 26.663975] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 26.664030] page dumped because: kasan: bad access detected [ 26.664075] [ 26.664092] Memory state around the buggy address: [ 26.664125] fff00000c1c40b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.664413] fff00000c1c40c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.664477] >fff00000c1c40c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 26.664513] ^ [ 26.664610] fff00000c1c40d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.664780] fff00000c1c40d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.664815] ================================================================== [ 26.771360] ================================================================== [ 26.771402] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 26.771448] Write of size 1 at addr fff00000c649e0ea by task kunit_try_catch/174 [ 26.771495] [ 26.771523] CPU: 0 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 26.771603] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.771627] Hardware name: linux,dummy-virt (DT) [ 26.771655] Call trace: [ 26.771675] show_stack+0x20/0x38 (C) [ 26.771720] dump_stack_lvl+0x8c/0xd0 [ 26.771765] print_report+0x118/0x608 [ 26.771817] kasan_report+0xdc/0x128 [ 26.771862] __asan_report_store1_noabort+0x20/0x30 [ 26.771909] krealloc_less_oob_helper+0xae4/0xc50 [ 26.771957] krealloc_large_less_oob+0x20/0x38 [ 26.772004] kunit_try_run_case+0x170/0x3f0 [ 26.772050] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.772447] kthread+0x328/0x630 [ 26.772502] ret_from_fork+0x10/0x20 [ 26.772548] [ 26.772567] The buggy address belongs to the physical page: [ 26.772596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10649c [ 26.772646] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.772690] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.772741] page_type: f8(unknown) [ 26.772779] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.772827] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.772875] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.772921] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.772967] head: 0bfffe0000000002 ffffc1ffc3192701 00000000ffffffff 00000000ffffffff [ 26.773014] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 26.773051] page dumped because: kasan: bad access detected [ 26.773093] [ 26.773110] Memory state around the buggy address: [ 26.773138] fff00000c649df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.773177] fff00000c649e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.773256] >fff00000c649e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 26.773314] ^ [ 26.773352] fff00000c649e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.773422] fff00000c649e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.773459] ================================================================== [ 26.774020] ================================================================== [ 26.774115] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 26.774169] Write of size 1 at addr fff00000c649e0eb by task kunit_try_catch/174 [ 26.774250] [ 26.774297] CPU: 0 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 26.774395] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.774447] Hardware name: linux,dummy-virt (DT) [ 26.774504] Call trace: [ 26.774542] show_stack+0x20/0x38 (C) [ 26.774589] dump_stack_lvl+0x8c/0xd0 [ 26.774634] print_report+0x118/0x608 [ 26.774759] kasan_report+0xdc/0x128 [ 26.775012] __asan_report_store1_noabort+0x20/0x30 [ 26.775093] krealloc_less_oob_helper+0xa58/0xc50 [ 26.775195] krealloc_large_less_oob+0x20/0x38 [ 26.775271] kunit_try_run_case+0x170/0x3f0 [ 26.775350] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.775404] kthread+0x328/0x630 [ 26.775517] ret_from_fork+0x10/0x20 [ 26.775699] [ 26.775718] The buggy address belongs to the physical page: [ 26.775755] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10649c [ 26.775805] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.775861] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.775910] page_type: f8(unknown) [ 26.775975] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.776029] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.776319] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.776403] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.776487] head: 0bfffe0000000002 ffffc1ffc3192701 00000000ffffffff 00000000ffffffff [ 26.776552] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 26.776590] page dumped because: kasan: bad access detected [ 26.776620] [ 26.776637] Memory state around the buggy address: [ 26.776665] fff00000c649df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.776876] fff00000c649e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.777182] >fff00000c649e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 26.777301] ^ [ 26.777366] fff00000c649e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.777406] fff00000c649e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.777616] ================================================================== [ 26.665806] ================================================================== [ 26.665962] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 26.666293] Write of size 1 at addr fff00000c1c40cea by task kunit_try_catch/170 [ 26.666859] [ 26.666900] CPU: 0 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 26.666994] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.667099] Hardware name: linux,dummy-virt (DT) [ 26.667136] Call trace: [ 26.667159] show_stack+0x20/0x38 (C) [ 26.667210] dump_stack_lvl+0x8c/0xd0 [ 26.667578] print_report+0x118/0x608 [ 26.667647] kasan_report+0xdc/0x128 [ 26.667695] __asan_report_store1_noabort+0x20/0x30 [ 26.667938] krealloc_less_oob_helper+0xae4/0xc50 [ 26.668288] krealloc_less_oob+0x20/0x38 [ 26.668335] kunit_try_run_case+0x170/0x3f0 [ 26.668381] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.668564] kthread+0x328/0x630 [ 26.668610] ret_from_fork+0x10/0x20 [ 26.668681] [ 26.668699] Allocated by task 170: [ 26.668967] kasan_save_stack+0x3c/0x68 [ 26.669013] kasan_save_track+0x20/0x40 [ 26.669049] kasan_save_alloc_info+0x40/0x58 [ 26.669095] __kasan_krealloc+0x118/0x178 [ 26.669131] krealloc_noprof+0x128/0x360 [ 26.669169] krealloc_less_oob_helper+0x168/0xc50 [ 26.669207] krealloc_less_oob+0x20/0x38 [ 26.669399] kunit_try_run_case+0x170/0x3f0 [ 26.669439] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.669643] kthread+0x328/0x630 [ 26.669794] ret_from_fork+0x10/0x20 [ 26.669828] [ 26.669846] The buggy address belongs to the object at fff00000c1c40c00 [ 26.669846] which belongs to the cache kmalloc-256 of size 256 [ 26.669900] The buggy address is located 33 bytes to the right of [ 26.669900] allocated 201-byte region [fff00000c1c40c00, fff00000c1c40cc9) [ 26.669983] [ 26.670040] The buggy address belongs to the physical page: [ 26.670078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c40 [ 26.670126] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.670174] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.670222] page_type: f5(slab) [ 26.670258] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 26.670306] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.671258] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 26.671388] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.671785] head: 0bfffe0000000001 ffffc1ffc3071001 00000000ffffffff 00000000ffffffff [ 26.671926] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 26.671965] page dumped because: kasan: bad access detected [ 26.672017] [ 26.672035] Memory state around the buggy address: [ 26.672074] fff00000c1c40b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.672114] fff00000c1c40c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.672154] >fff00000c1c40c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 26.672242] ^ [ 26.672402] fff00000c1c40d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.672526] fff00000c1c40d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.672581] ================================================================== [ 26.736712] ================================================================== [ 26.736768] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 26.736827] Write of size 1 at addr fff00000c649e0c9 by task kunit_try_catch/174 [ 26.736876] [ 26.736911] CPU: 0 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 26.736997] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.737023] Hardware name: linux,dummy-virt (DT) [ 26.737066] Call trace: [ 26.737088] show_stack+0x20/0x38 (C) [ 26.738676] dump_stack_lvl+0x8c/0xd0 [ 26.739267] print_report+0x118/0x608 [ 26.739351] kasan_report+0xdc/0x128 [ 26.739397] __asan_report_store1_noabort+0x20/0x30 [ 26.739936] krealloc_less_oob_helper+0xa48/0xc50 [ 26.740464] krealloc_large_less_oob+0x20/0x38 [ 26.741035] kunit_try_run_case+0x170/0x3f0 [ 26.741097] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.741864] kthread+0x328/0x630 [ 26.742339] ret_from_fork+0x10/0x20 [ 26.742714] [ 26.742745] The buggy address belongs to the physical page: [ 26.743086] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10649c [ 26.743350] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.743842] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.744260] page_type: f8(unknown) [ 26.745261] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.745440] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.745744] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.746373] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.746487] head: 0bfffe0000000002 ffffc1ffc3192701 00000000ffffffff 00000000ffffffff [ 26.746534] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 26.746572] page dumped because: kasan: bad access detected [ 26.746602] [ 26.746619] Memory state around the buggy address: [ 26.747829] fff00000c649df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.747932] fff00000c649e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.747974] >fff00000c649e080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 26.748011] ^ [ 26.748188] fff00000c649e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.748479] fff00000c649e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.749001] ================================================================== [ 26.674110] ================================================================== [ 26.674270] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 26.674355] Write of size 1 at addr fff00000c1c40ceb by task kunit_try_catch/170 [ 26.674403] [ 26.674430] CPU: 0 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 26.674511] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.674536] Hardware name: linux,dummy-virt (DT) [ 26.674564] Call trace: [ 26.674584] show_stack+0x20/0x38 (C) [ 26.674630] dump_stack_lvl+0x8c/0xd0 [ 26.674675] print_report+0x118/0x608 [ 26.674720] kasan_report+0xdc/0x128 [ 26.674775] __asan_report_store1_noabort+0x20/0x30 [ 26.674823] krealloc_less_oob_helper+0xa58/0xc50 [ 26.675001] krealloc_less_oob+0x20/0x38 [ 26.675045] kunit_try_run_case+0x170/0x3f0 [ 26.675100] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.675291] kthread+0x328/0x630 [ 26.675335] ret_from_fork+0x10/0x20 [ 26.675582] [ 26.675668] Allocated by task 170: [ 26.676089] kasan_save_stack+0x3c/0x68 [ 26.676697] kasan_save_track+0x20/0x40 [ 26.676748] kasan_save_alloc_info+0x40/0x58 [ 26.676784] __kasan_krealloc+0x118/0x178 [ 26.677462] krealloc_noprof+0x128/0x360 [ 26.677517] krealloc_less_oob_helper+0x168/0xc50 [ 26.678048] krealloc_less_oob+0x20/0x38 [ 26.678108] kunit_try_run_case+0x170/0x3f0 [ 26.678145] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.678939] kthread+0x328/0x630 [ 26.679405] ret_from_fork+0x10/0x20 [ 26.679902] [ 26.679942] The buggy address belongs to the object at fff00000c1c40c00 [ 26.679942] which belongs to the cache kmalloc-256 of size 256 [ 26.680008] The buggy address is located 34 bytes to the right of [ 26.680008] allocated 201-byte region [fff00000c1c40c00, fff00000c1c40cc9) [ 26.681040] [ 26.681091] The buggy address belongs to the physical page: [ 26.681121] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c40 [ 26.681264] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.681489] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.681863] page_type: f5(slab) [ 26.681932] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 26.682039] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.682171] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 26.682332] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.682380] head: 0bfffe0000000001 ffffc1ffc3071001 00000000ffffffff 00000000ffffffff [ 26.682506] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 26.682656] page dumped because: kasan: bad access detected [ 26.682705] [ 26.682792] Memory state around the buggy address: [ 26.682864] fff00000c1c40b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.682906] fff00000c1c40c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.682965] >fff00000c1c40c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 26.683016] ^ [ 26.683752] fff00000c1c40d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.683837] fff00000c1c40d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.683885] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 26.697825] ================================================================== [ 26.698094] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 26.698305] Write of size 1 at addr fff00000c649e0f0 by task kunit_try_catch/172 [ 26.698402] [ 26.698429] CPU: 0 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 26.698509] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.698533] Hardware name: linux,dummy-virt (DT) [ 26.698561] Call trace: [ 26.698731] show_stack+0x20/0x38 (C) [ 26.698976] dump_stack_lvl+0x8c/0xd0 [ 26.699175] print_report+0x118/0x608 [ 26.699290] kasan_report+0xdc/0x128 [ 26.699368] __asan_report_store1_noabort+0x20/0x30 [ 26.699415] krealloc_more_oob_helper+0x5c0/0x678 [ 26.699469] krealloc_large_more_oob+0x20/0x38 [ 26.699554] kunit_try_run_case+0x170/0x3f0 [ 26.699817] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.700856] kthread+0x328/0x630 [ 26.701184] ret_from_fork+0x10/0x20 [ 26.701361] [ 26.701676] The buggy address belongs to the physical page: [ 26.701757] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10649c [ 26.702485] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.702705] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.703390] page_type: f8(unknown) [ 26.703536] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.704023] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.704259] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.704306] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.705353] head: 0bfffe0000000002 ffffc1ffc3192701 00000000ffffffff 00000000ffffffff [ 26.705544] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 26.705633] page dumped because: kasan: bad access detected [ 26.705663] [ 26.706177] Memory state around the buggy address: [ 26.706244] fff00000c649df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.706791] fff00000c649e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.707417] >fff00000c649e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 26.707767] ^ [ 26.707813] fff00000c649e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.708095] fff00000c649e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.708133] ================================================================== [ 26.628468] ================================================================== [ 26.628514] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 26.628583] Write of size 1 at addr fff00000c1c40af0 by task kunit_try_catch/168 [ 26.628828] [ 26.628862] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 26.628943] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.628968] Hardware name: linux,dummy-virt (DT) [ 26.628996] Call trace: [ 26.629026] show_stack+0x20/0x38 (C) [ 26.629086] dump_stack_lvl+0x8c/0xd0 [ 26.629131] print_report+0x118/0x608 [ 26.629176] kasan_report+0xdc/0x128 [ 26.629220] __asan_report_store1_noabort+0x20/0x30 [ 26.629276] krealloc_more_oob_helper+0x5c0/0x678 [ 26.629408] krealloc_more_oob+0x20/0x38 [ 26.629453] kunit_try_run_case+0x170/0x3f0 [ 26.629498] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.629549] kthread+0x328/0x630 [ 26.629589] ret_from_fork+0x10/0x20 [ 26.629643] [ 26.629661] Allocated by task 168: [ 26.629686] kasan_save_stack+0x3c/0x68 [ 26.629724] kasan_save_track+0x20/0x40 [ 26.629760] kasan_save_alloc_info+0x40/0x58 [ 26.629794] __kasan_krealloc+0x118/0x178 [ 26.629830] krealloc_noprof+0x128/0x360 [ 26.629865] krealloc_more_oob_helper+0x168/0x678 [ 26.630013] krealloc_more_oob+0x20/0x38 [ 26.630048] kunit_try_run_case+0x170/0x3f0 [ 26.630134] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.630255] kthread+0x328/0x630 [ 26.630339] ret_from_fork+0x10/0x20 [ 26.630536] [ 26.630554] The buggy address belongs to the object at fff00000c1c40a00 [ 26.630554] which belongs to the cache kmalloc-256 of size 256 [ 26.630613] The buggy address is located 5 bytes to the right of [ 26.630613] allocated 235-byte region [fff00000c1c40a00, fff00000c1c40aeb) [ 26.630879] [ 26.630898] The buggy address belongs to the physical page: [ 26.630926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c40 [ 26.630980] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.631579] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.631741] page_type: f5(slab) [ 26.631865] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 26.631914] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.631961] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 26.632007] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.632061] head: 0bfffe0000000001 ffffc1ffc3071001 00000000ffffffff 00000000ffffffff [ 26.632107] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 26.632145] page dumped because: kasan: bad access detected [ 26.632173] [ 26.632190] Memory state around the buggy address: [ 26.632218] fff00000c1c40980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.632258] fff00000c1c40a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.632297] >fff00000c1c40a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 26.632383] ^ [ 26.632420] fff00000c1c40b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.632461] fff00000c1c40b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.632564] ================================================================== [ 26.693611] ================================================================== [ 26.693673] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 26.693856] Write of size 1 at addr fff00000c649e0eb by task kunit_try_catch/172 [ 26.693919] [ 26.694033] CPU: 0 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 26.694204] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.694229] Hardware name: linux,dummy-virt (DT) [ 26.694258] Call trace: [ 26.694279] show_stack+0x20/0x38 (C) [ 26.694329] dump_stack_lvl+0x8c/0xd0 [ 26.694377] print_report+0x118/0x608 [ 26.694422] kasan_report+0xdc/0x128 [ 26.694476] __asan_report_store1_noabort+0x20/0x30 [ 26.694524] krealloc_more_oob_helper+0x60c/0x678 [ 26.694573] krealloc_large_more_oob+0x20/0x38 [ 26.694681] kunit_try_run_case+0x170/0x3f0 [ 26.695174] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.695410] kthread+0x328/0x630 [ 26.695515] ret_from_fork+0x10/0x20 [ 26.695639] [ 26.695659] The buggy address belongs to the physical page: [ 26.695689] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10649c [ 26.695741] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.695793] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.695844] page_type: f8(unknown) [ 26.695882] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.695930] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.695977] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.696395] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.696446] head: 0bfffe0000000002 ffffc1ffc3192701 00000000ffffffff 00000000ffffffff [ 26.696493] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 26.696546] page dumped because: kasan: bad access detected [ 26.696626] [ 26.696673] Memory state around the buggy address: [ 26.696740] fff00000c649df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.696865] fff00000c649e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.696969] >fff00000c649e080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 26.697140] ^ [ 26.697273] fff00000c649e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.697315] fff00000c649e180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.697649] ================================================================== [ 26.624607] ================================================================== [ 26.624665] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 26.624760] Write of size 1 at addr fff00000c1c40aeb by task kunit_try_catch/168 [ 26.624938] [ 26.624969] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 26.625064] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.625089] Hardware name: linux,dummy-virt (DT) [ 26.625128] Call trace: [ 26.625149] show_stack+0x20/0x38 (C) [ 26.625198] dump_stack_lvl+0x8c/0xd0 [ 26.625244] print_report+0x118/0x608 [ 26.625289] kasan_report+0xdc/0x128 [ 26.625334] __asan_report_store1_noabort+0x20/0x30 [ 26.625508] krealloc_more_oob_helper+0x60c/0x678 [ 26.625559] krealloc_more_oob+0x20/0x38 [ 26.625605] kunit_try_run_case+0x170/0x3f0 [ 26.625662] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.625714] kthread+0x328/0x630 [ 26.625755] ret_from_fork+0x10/0x20 [ 26.625802] [ 26.625819] Allocated by task 168: [ 26.625846] kasan_save_stack+0x3c/0x68 [ 26.625886] kasan_save_track+0x20/0x40 [ 26.625922] kasan_save_alloc_info+0x40/0x58 [ 26.626016] __kasan_krealloc+0x118/0x178 [ 26.626063] krealloc_noprof+0x128/0x360 [ 26.626139] krealloc_more_oob_helper+0x168/0x678 [ 26.626217] krealloc_more_oob+0x20/0x38 [ 26.626254] kunit_try_run_case+0x170/0x3f0 [ 26.626291] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.626332] kthread+0x328/0x630 [ 26.626363] ret_from_fork+0x10/0x20 [ 26.626397] [ 26.626415] The buggy address belongs to the object at fff00000c1c40a00 [ 26.626415] which belongs to the cache kmalloc-256 of size 256 [ 26.626528] The buggy address is located 0 bytes to the right of [ 26.626528] allocated 235-byte region [fff00000c1c40a00, fff00000c1c40aeb) [ 26.626688] [ 26.626732] The buggy address belongs to the physical page: [ 26.626900] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101c40 [ 26.627079] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.627124] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.627174] page_type: f5(slab) [ 26.627211] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 26.627259] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.627306] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 26.627353] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.627399] head: 0bfffe0000000001 ffffc1ffc3071001 00000000ffffffff 00000000ffffffff [ 26.627445] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 26.627483] page dumped because: kasan: bad access detected [ 26.627512] [ 26.627529] Memory state around the buggy address: [ 26.627570] fff00000c1c40980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.627611] fff00000c1c40a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.627651] >fff00000c1c40a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 26.627733] ^ [ 26.627836] fff00000c1c40b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.627878] fff00000c1c40b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.627949] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-invalid-free-in-kfree
[ 26.602576] ================================================================== [ 26.602779] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 26.602930] Free of addr fff00000c6498001 by task kunit_try_catch/162 [ 26.603038] [ 26.603179] CPU: 0 UID: 0 PID: 162 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 26.603289] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.603320] Hardware name: linux,dummy-virt (DT) [ 26.603355] Call trace: [ 26.603375] show_stack+0x20/0x38 (C) [ 26.603424] dump_stack_lvl+0x8c/0xd0 [ 26.603471] print_report+0x118/0x608 [ 26.603519] kasan_report_invalid_free+0xc0/0xe8 [ 26.603568] __kasan_kfree_large+0x5c/0xa8 [ 26.603614] free_large_kmalloc+0x68/0x150 [ 26.603670] kfree+0x270/0x3c8 [ 26.603842] kmalloc_large_invalid_free+0x108/0x270 [ 26.603912] kunit_try_run_case+0x170/0x3f0 [ 26.603958] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.604075] kthread+0x328/0x630 [ 26.604138] ret_from_fork+0x10/0x20 [ 26.604235] [ 26.604319] The buggy address belongs to the physical page: [ 26.604372] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106498 [ 26.604423] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.604468] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.604518] page_type: f8(unknown) [ 26.604554] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.604602] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.604649] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.604695] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.604741] head: 0bfffe0000000002 ffffc1ffc3192601 00000000ffffffff 00000000ffffffff [ 26.604808] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 26.604846] page dumped because: kasan: bad access detected [ 26.604875] [ 26.604892] Memory state around the buggy address: [ 26.604935] fff00000c6497f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.605044] fff00000c6497f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.605138] >fff00000c6498000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.605173] ^ [ 26.605300] fff00000c6498080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.605347] fff00000c6498100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.605564] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 26.596621] ================================================================== [ 26.596682] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 26.596730] Read of size 1 at addr fff00000c6498000 by task kunit_try_catch/160 [ 26.596777] [ 26.596804] CPU: 0 UID: 0 PID: 160 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 26.596887] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.596911] Hardware name: linux,dummy-virt (DT) [ 26.596940] Call trace: [ 26.596960] show_stack+0x20/0x38 (C) [ 26.597018] dump_stack_lvl+0x8c/0xd0 [ 26.597078] print_report+0x118/0x608 [ 26.597122] kasan_report+0xdc/0x128 [ 26.597166] __asan_report_load1_noabort+0x20/0x30 [ 26.597211] kmalloc_large_uaf+0x2cc/0x2f8 [ 26.597255] kunit_try_run_case+0x170/0x3f0 [ 26.597455] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.597507] kthread+0x328/0x630 [ 26.597547] ret_from_fork+0x10/0x20 [ 26.597592] [ 26.597610] The buggy address belongs to the physical page: [ 26.597639] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106498 [ 26.597697] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.597754] raw: 0bfffe0000000000 ffffc1ffc3192708 fff00000da466c80 0000000000000000 [ 26.597801] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 26.597838] page dumped because: kasan: bad access detected [ 26.597867] [ 26.597884] Memory state around the buggy address: [ 26.597912] fff00000c6497f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.598013] fff00000c6497f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.598061] >fff00000c6498000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.598103] ^ [ 26.598196] fff00000c6498080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.598237] fff00000c6498100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 26.598372] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 26.588297] ================================================================== [ 26.588388] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 26.588440] Write of size 1 at addr fff00000c649a00a by task kunit_try_catch/158 [ 26.588486] [ 26.588514] CPU: 0 UID: 0 PID: 158 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 26.588597] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.588622] Hardware name: linux,dummy-virt (DT) [ 26.588682] Call trace: [ 26.588703] show_stack+0x20/0x38 (C) [ 26.588750] dump_stack_lvl+0x8c/0xd0 [ 26.588812] print_report+0x118/0x608 [ 26.588857] kasan_report+0xdc/0x128 [ 26.588901] __asan_report_store1_noabort+0x20/0x30 [ 26.588947] kmalloc_large_oob_right+0x278/0x2b8 [ 26.588993] kunit_try_run_case+0x170/0x3f0 [ 26.589038] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.589100] kthread+0x328/0x630 [ 26.589142] ret_from_fork+0x10/0x20 [ 26.589210] [ 26.589243] The buggy address belongs to the physical page: [ 26.589273] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106498 [ 26.589400] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.589470] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.589637] page_type: f8(unknown) [ 26.589697] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.589756] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.589803] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 26.590150] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 26.590397] head: 0bfffe0000000002 ffffc1ffc3192601 00000000ffffffff 00000000ffffffff [ 26.590478] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 26.590574] page dumped because: kasan: bad access detected [ 26.590637] [ 26.590654] Memory state around the buggy address: [ 26.590683] fff00000c6499f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.590723] fff00000c6499f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.590762] >fff00000c649a000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.590797] ^ [ 26.590824] fff00000c649a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.590863] fff00000c649a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 26.590898] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 26.580242] ================================================================== [ 26.580297] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 26.580343] Write of size 1 at addr fff00000c65d5f00 by task kunit_try_catch/156 [ 26.580391] [ 26.580418] CPU: 0 UID: 0 PID: 156 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 26.580500] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.580525] Hardware name: linux,dummy-virt (DT) [ 26.580554] Call trace: [ 26.580574] show_stack+0x20/0x38 (C) [ 26.580620] dump_stack_lvl+0x8c/0xd0 [ 26.580664] print_report+0x118/0x608 [ 26.580709] kasan_report+0xdc/0x128 [ 26.580752] __asan_report_store1_noabort+0x20/0x30 [ 26.580798] kmalloc_big_oob_right+0x2a4/0x2f0 [ 26.580843] kunit_try_run_case+0x170/0x3f0 [ 26.580888] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.580938] kthread+0x328/0x630 [ 26.580978] ret_from_fork+0x10/0x20 [ 26.581023] [ 26.581040] Allocated by task 156: [ 26.581083] kasan_save_stack+0x3c/0x68 [ 26.581122] kasan_save_track+0x20/0x40 [ 26.581157] kasan_save_alloc_info+0x40/0x58 [ 26.581192] __kasan_kmalloc+0xd4/0xd8 [ 26.581227] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.581264] kmalloc_big_oob_right+0xb8/0x2f0 [ 26.581300] kunit_try_run_case+0x170/0x3f0 [ 26.581336] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.581377] kthread+0x328/0x630 [ 26.581407] ret_from_fork+0x10/0x20 [ 26.581441] [ 26.581458] The buggy address belongs to the object at fff00000c65d4000 [ 26.581458] which belongs to the cache kmalloc-8k of size 8192 [ 26.581511] The buggy address is located 0 bytes to the right of [ 26.581511] allocated 7936-byte region [fff00000c65d4000, fff00000c65d5f00) [ 26.581571] [ 26.581589] The buggy address belongs to the physical page: [ 26.581618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065d0 [ 26.581666] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.581709] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.581757] page_type: f5(slab) [ 26.581792] raw: 0bfffe0000000040 fff00000c0002280 dead000000000100 dead000000000122 [ 26.581839] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 26.581886] head: 0bfffe0000000040 fff00000c0002280 dead000000000100 dead000000000122 [ 26.581931] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 26.581978] head: 0bfffe0000000003 ffffc1ffc3197401 00000000ffffffff 00000000ffffffff [ 26.582024] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 26.582150] page dumped because: kasan: bad access detected [ 26.582186] [ 26.582203] Memory state around the buggy address: [ 26.582232] fff00000c65d5e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.582273] fff00000c65d5e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.582312] >fff00000c65d5f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.582347] ^ [ 26.582372] fff00000c65d5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.582411] fff00000c65d6000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.582446] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[ 26.572844] ================================================================== [ 26.572971] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488 [ 26.573019] Write of size 1 at addr fff00000c643f378 by task kunit_try_catch/154 [ 26.573077] [ 26.573104] CPU: 0 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 26.573185] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.573210] Hardware name: linux,dummy-virt (DT) [ 26.573241] Call trace: [ 26.573262] show_stack+0x20/0x38 (C) [ 26.573309] dump_stack_lvl+0x8c/0xd0 [ 26.573354] print_report+0x118/0x608 [ 26.573422] kasan_report+0xdc/0x128 [ 26.573469] __asan_report_store1_noabort+0x20/0x30 [ 26.573516] kmalloc_track_caller_oob_right+0x418/0x488 [ 26.573645] kunit_try_run_case+0x170/0x3f0 [ 26.573713] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.573796] kthread+0x328/0x630 [ 26.573838] ret_from_fork+0x10/0x20 [ 26.573925] [ 26.573943] Allocated by task 154: [ 26.573968] kasan_save_stack+0x3c/0x68 [ 26.574125] kasan_save_track+0x20/0x40 [ 26.574166] kasan_save_alloc_info+0x40/0x58 [ 26.574298] __kasan_kmalloc+0xd4/0xd8 [ 26.574334] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 26.574375] kmalloc_track_caller_oob_right+0x184/0x488 [ 26.574415] kunit_try_run_case+0x170/0x3f0 [ 26.574451] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.574493] kthread+0x328/0x630 [ 26.574537] ret_from_fork+0x10/0x20 [ 26.574571] [ 26.574588] The buggy address belongs to the object at fff00000c643f300 [ 26.574588] which belongs to the cache kmalloc-128 of size 128 [ 26.574667] The buggy address is located 0 bytes to the right of [ 26.574667] allocated 120-byte region [fff00000c643f300, fff00000c643f378) [ 26.574964] [ 26.574982] The buggy address belongs to the physical page: [ 26.575022] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643f [ 26.575088] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.575227] page_type: f5(slab) [ 26.575339] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 26.575464] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.575520] page dumped because: kasan: bad access detected [ 26.575555] [ 26.575648] Memory state around the buggy address: [ 26.575677] fff00000c643f200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.575717] fff00000c643f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.575819] >fff00000c643f300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 26.575855] ^ [ 26.575891] fff00000c643f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.575930] fff00000c643f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.575966] ================================================================== [ 26.569313] ================================================================== [ 26.569367] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 26.569419] Write of size 1 at addr fff00000c643f278 by task kunit_try_catch/154 [ 26.569466] [ 26.569495] CPU: 0 UID: 0 PID: 154 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 26.569578] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.569634] Hardware name: linux,dummy-virt (DT) [ 26.569671] Call trace: [ 26.569764] show_stack+0x20/0x38 (C) [ 26.569812] dump_stack_lvl+0x8c/0xd0 [ 26.569859] print_report+0x118/0x608 [ 26.569905] kasan_report+0xdc/0x128 [ 26.569949] __asan_report_store1_noabort+0x20/0x30 [ 26.569996] kmalloc_track_caller_oob_right+0x40c/0x488 [ 26.570045] kunit_try_run_case+0x170/0x3f0 [ 26.570102] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.570166] kthread+0x328/0x630 [ 26.570208] ret_from_fork+0x10/0x20 [ 26.570254] [ 26.570271] Allocated by task 154: [ 26.570297] kasan_save_stack+0x3c/0x68 [ 26.570335] kasan_save_track+0x20/0x40 [ 26.570371] kasan_save_alloc_info+0x40/0x58 [ 26.570405] __kasan_kmalloc+0xd4/0xd8 [ 26.570439] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 26.570553] kmalloc_track_caller_oob_right+0xa8/0x488 [ 26.570684] kunit_try_run_case+0x170/0x3f0 [ 26.570721] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.570762] kthread+0x328/0x630 [ 26.570798] ret_from_fork+0x10/0x20 [ 26.570925] [ 26.570944] The buggy address belongs to the object at fff00000c643f200 [ 26.570944] which belongs to the cache kmalloc-128 of size 128 [ 26.571005] The buggy address is located 0 bytes to the right of [ 26.571005] allocated 120-byte region [fff00000c643f200, fff00000c643f278) [ 26.571112] [ 26.571130] The buggy address belongs to the physical page: [ 26.571160] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643f [ 26.571253] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.571298] page_type: f5(slab) [ 26.571334] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 26.571462] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.571545] page dumped because: kasan: bad access detected [ 26.571581] [ 26.571668] Memory state around the buggy address: [ 26.571800] fff00000c643f100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.571841] fff00000c643f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.571881] >fff00000c643f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 26.571916] ^ [ 26.571953] fff00000c643f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.571992] fff00000c643f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.572050] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 26.559365] ================================================================== [ 26.559424] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 26.559477] Read of size 1 at addr fff00000c65c5000 by task kunit_try_catch/152 [ 26.559526] [ 26.559842] CPU: 0 UID: 0 PID: 152 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 26.559962] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.560156] Hardware name: linux,dummy-virt (DT) [ 26.560189] Call trace: [ 26.560211] show_stack+0x20/0x38 (C) [ 26.560278] dump_stack_lvl+0x8c/0xd0 [ 26.560326] print_report+0x118/0x608 [ 26.560373] kasan_report+0xdc/0x128 [ 26.560419] __asan_report_load1_noabort+0x20/0x30 [ 26.560467] kmalloc_node_oob_right+0x2f4/0x330 [ 26.560515] kunit_try_run_case+0x170/0x3f0 [ 26.560563] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.560614] kthread+0x328/0x630 [ 26.560657] ret_from_fork+0x10/0x20 [ 26.560705] [ 26.560722] Allocated by task 152: [ 26.560748] kasan_save_stack+0x3c/0x68 [ 26.560799] kasan_save_track+0x20/0x40 [ 26.560835] kasan_save_alloc_info+0x40/0x58 [ 26.560871] __kasan_kmalloc+0xd4/0xd8 [ 26.560906] __kmalloc_cache_node_noprof+0x178/0x3d0 [ 26.560946] kmalloc_node_oob_right+0xbc/0x330 [ 26.560983] kunit_try_run_case+0x170/0x3f0 [ 26.561020] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.561233] kthread+0x328/0x630 [ 26.561395] ret_from_fork+0x10/0x20 [ 26.561437] [ 26.561455] The buggy address belongs to the object at fff00000c65c4000 [ 26.561455] which belongs to the cache kmalloc-4k of size 4096 [ 26.561659] The buggy address is located 0 bytes to the right of [ 26.561659] allocated 4096-byte region [fff00000c65c4000, fff00000c65c5000) [ 26.561811] [ 26.561831] The buggy address belongs to the physical page: [ 26.561904] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065c0 [ 26.562690] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 26.562910] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 26.563027] page_type: f5(slab) [ 26.563133] raw: 0bfffe0000000040 fff00000c0002140 dead000000000100 dead000000000122 [ 26.563216] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 26.563325] head: 0bfffe0000000040 fff00000c0002140 dead000000000100 dead000000000122 [ 26.563372] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 26.563419] head: 0bfffe0000000003 ffffc1ffc3197001 00000000ffffffff 00000000ffffffff [ 26.563466] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 26.563507] page dumped because: kasan: bad access detected [ 26.563551] [ 26.563568] Memory state around the buggy address: [ 26.563597] fff00000c65c4f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.563637] fff00000c65c4f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 26.563677] >fff00000c65c5000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.563722] ^ [ 26.563839] fff00000c65c5080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.563892] fff00000c65c5100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.563927] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 26.550614] ================================================================== [ 26.550671] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 26.550720] Read of size 1 at addr fff00000c16b9bdf by task kunit_try_catch/150 [ 26.550768] [ 26.550797] CPU: 0 UID: 0 PID: 150 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 26.551045] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.551090] Hardware name: linux,dummy-virt (DT) [ 26.551255] Call trace: [ 26.551277] show_stack+0x20/0x38 (C) [ 26.551332] dump_stack_lvl+0x8c/0xd0 [ 26.551396] print_report+0x118/0x608 [ 26.551441] kasan_report+0xdc/0x128 [ 26.551487] __asan_report_load1_noabort+0x20/0x30 [ 26.551535] kmalloc_oob_left+0x2ec/0x320 [ 26.551579] kunit_try_run_case+0x170/0x3f0 [ 26.551674] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.551884] kthread+0x328/0x630 [ 26.551990] ret_from_fork+0x10/0x20 [ 26.552038] [ 26.552064] Allocated by task 12: [ 26.552113] kasan_save_stack+0x3c/0x68 [ 26.552154] kasan_save_track+0x20/0x40 [ 26.552190] kasan_save_alloc_info+0x40/0x58 [ 26.552224] __kasan_kmalloc+0xd4/0xd8 [ 26.552259] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 26.552301] kvasprintf+0xe0/0x180 [ 26.552335] __kthread_create_on_node+0x16c/0x350 [ 26.552372] kthread_create_on_node+0xe4/0x130 [ 26.552407] create_worker+0x380/0x6b8 [ 26.552441] worker_thread+0x808/0xf38 [ 26.552475] kthread+0x328/0x630 [ 26.552505] ret_from_fork+0x10/0x20 [ 26.552538] [ 26.552556] The buggy address belongs to the object at fff00000c16b9bc0 [ 26.552556] which belongs to the cache kmalloc-16 of size 16 [ 26.552609] The buggy address is located 19 bytes to the right of [ 26.552609] allocated 12-byte region [fff00000c16b9bc0, fff00000c16b9bcc) [ 26.552670] [ 26.552688] The buggy address belongs to the physical page: [ 26.552717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c16b9ba0 pfn:0x1016b9 [ 26.552771] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.552817] page_type: f5(slab) [ 26.552852] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 26.552901] raw: fff00000c16b9ba0 000000008080007f 00000000f5000000 0000000000000000 [ 26.552940] page dumped because: kasan: bad access detected [ 26.552968] [ 26.552984] Memory state around the buggy address: [ 26.553013] fff00000c16b9a80: 00 03 fc fc fa fb fc fc 00 02 fc fc fa fb fc fc [ 26.553062] fff00000c16b9b00: 00 01 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 26.553145] >fff00000c16b9b80: fa fb fc fc fa fb fc fc 00 04 fc fc 00 07 fc fc [ 26.553214] ^ [ 26.553310] fff00000c16b9c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.553458] fff00000c16b9c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.553494] ==================================================================
Failure - log-parser-boot - kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 26.538628] ================================================================== [ 26.538665] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 26.538716] Write of size 1 at addr fff00000c643f078 by task kunit_try_catch/148 [ 26.538763] [ 26.538792] CPU: 0 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 26.538875] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.538900] Hardware name: linux,dummy-virt (DT) [ 26.538928] Call trace: [ 26.538949] show_stack+0x20/0x38 (C) [ 26.538995] dump_stack_lvl+0x8c/0xd0 [ 26.539040] print_report+0x118/0x608 [ 26.539101] kasan_report+0xdc/0x128 [ 26.539147] __asan_report_store1_noabort+0x20/0x30 [ 26.539195] kmalloc_oob_right+0x538/0x660 [ 26.539240] kunit_try_run_case+0x170/0x3f0 [ 26.539286] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.539338] kthread+0x328/0x630 [ 26.539378] ret_from_fork+0x10/0x20 [ 26.539424] [ 26.539455] Allocated by task 148: [ 26.539482] kasan_save_stack+0x3c/0x68 [ 26.539523] kasan_save_track+0x20/0x40 [ 26.539560] kasan_save_alloc_info+0x40/0x58 [ 26.539595] __kasan_kmalloc+0xd4/0xd8 [ 26.539630] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.539667] kmalloc_oob_right+0xb0/0x660 [ 26.539703] kunit_try_run_case+0x170/0x3f0 [ 26.539739] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.539780] kthread+0x328/0x630 [ 26.539811] ret_from_fork+0x10/0x20 [ 26.539870] [ 26.539949] The buggy address belongs to the object at fff00000c643f000 [ 26.539949] which belongs to the cache kmalloc-128 of size 128 [ 26.540140] The buggy address is located 5 bytes to the right of [ 26.540140] allocated 115-byte region [fff00000c643f000, fff00000c643f073) [ 26.540202] [ 26.540222] The buggy address belongs to the physical page: [ 26.540260] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643f [ 26.540508] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.540563] page_type: f5(slab) [ 26.540600] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 26.540648] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.540685] page dumped because: kasan: bad access detected [ 26.540714] [ 26.540730] Memory state around the buggy address: [ 26.540760] fff00000c643ef00: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc [ 26.540799] fff00000c643ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.540839] >fff00000c643f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 26.540904] ^ [ 26.540943] fff00000c643f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.540982] fff00000c643f100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.541017] ================================================================== [ 26.529794] ================================================================== [ 26.530431] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 26.531280] Write of size 1 at addr fff00000c643f073 by task kunit_try_catch/148 [ 26.531386] [ 26.532172] CPU: 0 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 26.532320] Tainted: [N]=TEST [ 26.532352] Hardware name: linux,dummy-virt (DT) [ 26.532567] Call trace: [ 26.532734] show_stack+0x20/0x38 (C) [ 26.532866] dump_stack_lvl+0x8c/0xd0 [ 26.532920] print_report+0x118/0x608 [ 26.532968] kasan_report+0xdc/0x128 [ 26.533013] __asan_report_store1_noabort+0x20/0x30 [ 26.533073] kmalloc_oob_right+0x5a4/0x660 [ 26.533119] kunit_try_run_case+0x170/0x3f0 [ 26.533169] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.533222] kthread+0x328/0x630 [ 26.533266] ret_from_fork+0x10/0x20 [ 26.533422] [ 26.533459] Allocated by task 148: [ 26.533579] kasan_save_stack+0x3c/0x68 [ 26.533634] kasan_save_track+0x20/0x40 [ 26.533671] kasan_save_alloc_info+0x40/0x58 [ 26.533706] __kasan_kmalloc+0xd4/0xd8 [ 26.533742] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.533782] kmalloc_oob_right+0xb0/0x660 [ 26.533817] kunit_try_run_case+0x170/0x3f0 [ 26.533854] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.533896] kthread+0x328/0x630 [ 26.533927] ret_from_fork+0x10/0x20 [ 26.533979] [ 26.534036] The buggy address belongs to the object at fff00000c643f000 [ 26.534036] which belongs to the cache kmalloc-128 of size 128 [ 26.534138] The buggy address is located 0 bytes to the right of [ 26.534138] allocated 115-byte region [fff00000c643f000, fff00000c643f073) [ 26.534207] [ 26.534287] The buggy address belongs to the physical page: [ 26.534487] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643f [ 26.534757] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.535036] page_type: f5(slab) [ 26.535331] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 26.535392] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.535496] page dumped because: kasan: bad access detected [ 26.535534] [ 26.535558] Memory state around the buggy address: [ 26.535765] fff00000c643ef00: 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc fc [ 26.535827] fff00000c643ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.535878] >fff00000c643f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 26.535930] ^ [ 26.536010] fff00000c643f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.536050] fff00000c643f100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.536124] ================================================================== [ 26.541340] ================================================================== [ 26.541411] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 26.541459] Read of size 1 at addr fff00000c643f080 by task kunit_try_catch/148 [ 26.541512] [ 26.541558] CPU: 0 UID: 0 PID: 148 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 26.541960] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.541992] Hardware name: linux,dummy-virt (DT) [ 26.542082] Call trace: [ 26.542108] show_stack+0x20/0x38 (C) [ 26.542237] dump_stack_lvl+0x8c/0xd0 [ 26.542310] print_report+0x118/0x608 [ 26.542400] kasan_report+0xdc/0x128 [ 26.542451] __asan_report_load1_noabort+0x20/0x30 [ 26.542548] kmalloc_oob_right+0x5d0/0x660 [ 26.542686] kunit_try_run_case+0x170/0x3f0 [ 26.542732] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.542789] kthread+0x328/0x630 [ 26.542854] ret_from_fork+0x10/0x20 [ 26.543045] [ 26.543139] Allocated by task 148: [ 26.543193] kasan_save_stack+0x3c/0x68 [ 26.543231] kasan_save_track+0x20/0x40 [ 26.543272] kasan_save_alloc_info+0x40/0x58 [ 26.543455] __kasan_kmalloc+0xd4/0xd8 [ 26.543491] __kmalloc_cache_noprof+0x16c/0x3c0 [ 26.543528] kmalloc_oob_right+0xb0/0x660 [ 26.543568] kunit_try_run_case+0x170/0x3f0 [ 26.543750] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 26.544373] kthread+0x328/0x630 [ 26.544526] ret_from_fork+0x10/0x20 [ 26.544564] [ 26.544582] The buggy address belongs to the object at fff00000c643f000 [ 26.544582] which belongs to the cache kmalloc-128 of size 128 [ 26.544635] The buggy address is located 13 bytes to the right of [ 26.544635] allocated 115-byte region [fff00000c643f000, fff00000c643f073) [ 26.544696] [ 26.544714] The buggy address belongs to the physical page: [ 26.544742] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10643f [ 26.544790] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 26.544834] page_type: f5(slab) [ 26.544870] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 26.544917] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 26.544954] page dumped because: kasan: bad access detected [ 26.544983] [ 26.545000] Memory state around the buggy address: [ 26.545028] fff00000c643ef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.545078] fff00000c643f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 26.545117] >fff00000c643f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.545152] ^ [ 26.545177] fff00000c643f100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 26.545216] fff00000c643f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.545252] ==================================================================
Failure - log-parser-boot - exception-warning-libmathint_log-at-intlog10
------------[ cut here ]------------ [ 106.191582] WARNING: lib/math/int_log.c:120 at intlog10+0x38/0x48, CPU#0: kunit_try_catch/670 [ 106.193000] Modules linked in: [ 106.193900] CPU: 0 UID: 0 PID: 670 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 106.195308] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 106.196093] Hardware name: linux,dummy-virt (DT) [ 106.196781] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 106.197612] pc : intlog10+0x38/0x48 [ 106.198141] lr : intlog10_test+0xe4/0x200 [ 106.198749] sp : ffff8000823d7c10 [ 106.199094] x29: ffff8000823d7c90 x28: 0000000000000000 x27: 0000000000000000 [ 106.199460] x26: 1ffe000018f92da1 x25: 0000000000000000 x24: ffff8000823d7ce0 [ 106.199979] x23: ffff8000823d7d00 x22: 0000000000000000 x21: 1ffff0001047af82 [ 106.200960] x20: ffff90e9b37fcb60 x19: ffff800080087990 x18: 00000000f8dbd559 [ 106.201939] x17: 000000003b105915 x16: fff00000c65bc83c x15: fff00000ff616b08 [ 106.202918] x14: 0000000000018fff x13: 1ffe00001b4909cd x12: ffff721d36ed2389 [ 106.203888] x11: 1ffff21d36ed2388 x10: ffff721d36ed2388 x9 : ffff90e9b0e3d25c [ 106.204862] x8 : ffff90e9b7691c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 106.205488] x5 : ffff70001047af82 x4 : 1ffff00010010f3b x3 : 1ffff21d366ff96c [ 106.205846] x2 : 1ffff21d366ff96c x1 : 0000000000000003 x0 : 0000000000000000 [ 106.206661] Call trace: [ 106.207103] intlog10+0x38/0x48 (P) [ 106.207682] kunit_try_run_case+0x170/0x3f0 [ 106.208517] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 106.209306] kthread+0x328/0x630 [ 106.209836] ret_from_fork+0x10/0x20 [ 106.210414] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - exception-warning-libmathint_log-at-intlog2
------------[ cut here ]------------ [ 106.143153] WARNING: lib/math/int_log.c:63 at intlog2+0xd8/0xf8, CPU#0: kunit_try_catch/652 [ 106.147307] Modules linked in: [ 106.148159] CPU: 0 UID: 0 PID: 652 Comm: kunit_try_catch Tainted: G B D N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 106.148966] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 106.149635] Hardware name: linux,dummy-virt (DT) [ 106.150432] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 106.151090] pc : intlog2+0xd8/0xf8 [ 106.151556] lr : intlog2_test+0xe4/0x200 [ 106.151761] sp : ffff8000822f7c10 [ 106.152357] x29: ffff8000822f7c90 x28: 0000000000000000 x27: 0000000000000000 [ 106.153558] x26: 1ffe000019407761 x25: 0000000000000000 x24: ffff8000822f7ce0 [ 106.154332] x23: ffff8000822f7d00 x22: 0000000000000000 x21: 1ffff0001045ef82 [ 106.154690] x20: ffff90e9b37fca60 x19: ffff800080087990 x18: 000000008bfb9596 [ 106.155031] x17: 000000003000adfa x16: fff00000c65bc83c x15: fff00000ff616b08 [ 106.155864] x14: 0000000000018fff x13: 1ffe00001b4909cd x12: ffff721d36ed2389 [ 106.156425] x11: 1ffff21d36ed2388 x10: ffff721d36ed2388 x9 : ffff90e9b0e3d45c [ 106.156789] x8 : ffff90e9b7691c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 106.157150] x5 : ffff70001045ef82 x4 : 1ffff00010010f3b x3 : 1ffff21d366ff94c [ 106.157775] x2 : 1ffff21d366ff94c x1 : 0000000000000003 x0 : 0000000000000000 [ 106.158276] Call trace: [ 106.158420] intlog2+0xd8/0xf8 (P) [ 106.158610] kunit_try_run_case+0x170/0x3f0 [ 106.158818] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 106.159084] kthread+0x328/0x630 [ 106.159744] ret_from_fork+0x10/0x20 [ 106.160367] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot - internal-error-oops-oops-smp
KNOWN ISSUE - LKFT: Dragonboard 845c: Internal error: Oops: ufs_qcom_setup_clocks
[ 105.270271] Internal error: Oops: 0000000096000005 [#1] SMP [ 105.278002] Modules linked in: [ 105.278512] CPU: 1 UID: 0 PID: 544 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc3-next-20250626 #1 PREEMPT [ 105.279255] Tainted: [B]=BAD_PAGE, [N]=TEST [ 105.279440] Hardware name: linux,dummy-virt (DT) [ 105.279712] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 105.280585] pc : kunit_test_null_dereference+0x70/0x170 [ 105.281192] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 105.281801] sp : ffff800082047d30 [ 105.282214] x29: ffff800082047d90 x28: 0000000000000000 x27: 0000000000000000 [ 105.283070] x26: 1ffe000018ae9fe1 x25: 0000000000000000 x24: 0000000000000004 [ 105.283507] x23: fff00000c574ff0c x22: ffff90e9b0e29ce8 x21: fff00000c138bc08 [ 105.283897] x20: 1ffff00010408fa6 x19: ffff800080087990 x18: 00000000a05527a6 [ 105.284695] x17: 0000000000000001 x16: fff00000da484d28 x15: 000000004e62dc82 [ 105.285045] x14: 000000005ded5061 x13: 1ffe00001b490989 x12: fffd800018f13b3c [ 105.285392] x11: 1ffe000018f13b3b x10: fffd800018f13b3b x9 : ffff90e9b0e21478 [ 105.285774] x8 : ffff800082047c18 x7 : 0000000000000001 x6 : 0000000041b58ab3 [ 105.286122] x5 : ffff700010408fa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 105.286465] x2 : dfff800000000000 x1 : fff00000c789d100 x0 : ffff800080087990 [ 105.286832] Call trace: [ 105.286997] kunit_test_null_dereference+0x70/0x170 (P) [ 105.287513] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 105.287757] kthread+0x328/0x630 [ 105.288109] ret_from_fork+0x10/0x20 [ 105.288535] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 105.288994] ---[ end trace 0000000000000000 ]---