Date
July 3, 2025, 10:10 a.m.
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 50.527886] ================================================================== [ 50.539970] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 50.547202] Free of addr ffff000096d10000 by task kunit_try_catch/346 [ 50.553732] [ 50.555273] CPU: 5 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 50.555304] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.555313] Hardware name: Thundercomm Dragonboard 845c (DT) [ 50.555325] Call trace: [ 50.555332] show_stack+0x20/0x38 (C) [ 50.555350] dump_stack_lvl+0x8c/0xd0 [ 50.555370] print_report+0x118/0x608 [ 50.555391] kasan_report_invalid_free+0xc0/0xe8 [ 50.555412] __kasan_mempool_poison_object+0x14c/0x150 [ 50.555433] mempool_free+0x28c/0x328 [ 50.555450] mempool_double_free_helper+0x150/0x2e8 [ 50.555470] mempool_kmalloc_large_double_free+0xc0/0x118 [ 50.555489] kunit_try_run_case+0x170/0x3f0 [ 50.555508] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.555529] kthread+0x328/0x630 [ 50.555544] ret_from_fork+0x10/0x20 [ 50.555562] [ 50.632486] The buggy address belongs to the physical page: [ 50.638132] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x116d10 [ 50.646237] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 50.653991] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 50.661043] page_type: f8(unknown) [ 50.664504] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 50.672348] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 50.680194] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 50.688120] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 50.696049] head: 0bfffe0000000002 fffffdffc25b4401 00000000ffffffff 00000000ffffffff [ 50.703981] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 50.711908] page dumped because: kasan: bad access detected [ 50.717551] [ 50.719084] Memory state around the buggy address: [ 50.723936] ffff000096d0ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.731246] ffff000096d0ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.738557] >ffff000096d10000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.745864] ^ [ 50.749146] ffff000096d10080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.756455] ffff000096d10100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.763772] ================================================================== [ 50.775160] ================================================================== [ 50.787784] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 50.795020] Free of addr ffff00008553c000 by task kunit_try_catch/348 [ 50.801544] [ 50.803078] CPU: 3 UID: 0 PID: 348 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 50.803110] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.803120] Hardware name: Thundercomm Dragonboard 845c (DT) [ 50.803134] Call trace: [ 50.803142] show_stack+0x20/0x38 (C) [ 50.803161] dump_stack_lvl+0x8c/0xd0 [ 50.803184] print_report+0x118/0x608 [ 50.803205] kasan_report_invalid_free+0xc0/0xe8 [ 50.803226] __kasan_mempool_poison_pages+0xe0/0xe8 [ 50.803252] mempool_free+0x24c/0x328 [ 50.803271] mempool_double_free_helper+0x150/0x2e8 [ 50.803291] mempool_page_alloc_double_free+0xbc/0x118 [ 50.803314] kunit_try_run_case+0x170/0x3f0 [ 50.803335] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.803358] kthread+0x328/0x630 [ 50.803375] ret_from_fork+0x10/0x20 [ 50.803393] [ 50.879848] The buggy address belongs to the physical page: [ 50.885504] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10553c [ 50.893611] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.900236] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 50.908086] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 50.915931] page dumped because: kasan: bad access detected [ 50.921583] [ 50.923111] Memory state around the buggy address: [ 50.927974] ffff00008553bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.935294] ffff00008553bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.942614] >ffff00008553c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.949929] ^ [ 50.953219] ffff00008553c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.960536] ffff00008553c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.967851] ================================================================== [ 50.139739] ================================================================== [ 50.151398] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 50.158641] Free of addr ffff000082240900 by task kunit_try_catch/344 [ 50.165169] [ 50.166709] CPU: 3 UID: 0 PID: 344 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 50.166742] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.166753] Hardware name: Thundercomm Dragonboard 845c (DT) [ 50.166769] Call trace: [ 50.166777] show_stack+0x20/0x38 (C) [ 50.166797] dump_stack_lvl+0x8c/0xd0 [ 50.166821] print_report+0x118/0x608 [ 50.166843] kasan_report_invalid_free+0xc0/0xe8 [ 50.166866] check_slab_allocation+0xd4/0x108 [ 50.166891] __kasan_mempool_poison_object+0x78/0x150 [ 50.166913] mempool_free+0x28c/0x328 [ 50.166934] mempool_double_free_helper+0x150/0x2e8 [ 50.166954] mempool_kmalloc_double_free+0xc0/0x118 [ 50.166974] kunit_try_run_case+0x170/0x3f0 [ 50.166995] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.167019] kthread+0x328/0x630 [ 50.167037] ret_from_fork+0x10/0x20 [ 50.167058] [ 50.247832] Allocated by task 344: [ 50.251300] kasan_save_stack+0x3c/0x68 [ 50.255213] kasan_save_track+0x20/0x40 [ 50.259125] kasan_save_alloc_info+0x40/0x58 [ 50.263464] __kasan_mempool_unpoison_object+0x11c/0x180 [ 50.268865] remove_element+0x130/0x1f8 [ 50.272775] mempool_alloc_preallocated+0x58/0xc0 [ 50.277560] mempool_double_free_helper+0x94/0x2e8 [ 50.282432] mempool_kmalloc_double_free+0xc0/0x118 [ 50.287393] kunit_try_run_case+0x170/0x3f0 [ 50.291646] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.297219] kthread+0x328/0x630 [ 50.300513] ret_from_fork+0x10/0x20 [ 50.304154] [ 50.305685] Freed by task 344: [ 50.308801] kasan_save_stack+0x3c/0x68 [ 50.312713] kasan_save_track+0x20/0x40 [ 50.316625] kasan_save_free_info+0x4c/0x78 [ 50.320877] __kasan_mempool_poison_object+0xc0/0x150 [ 50.326012] mempool_free+0x28c/0x328 [ 50.329738] mempool_double_free_helper+0x100/0x2e8 [ 50.334695] mempool_kmalloc_double_free+0xc0/0x118 [ 50.339652] kunit_try_run_case+0x170/0x3f0 [ 50.343905] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.349481] kthread+0x328/0x630 [ 50.352773] ret_from_fork+0x10/0x20 [ 50.356413] [ 50.357948] The buggy address belongs to the object at ffff000082240900 [ 50.357948] which belongs to the cache kmalloc-128 of size 128 [ 50.370609] The buggy address is located 0 bytes inside of [ 50.370609] 128-byte region [ffff000082240900, ffff000082240980) [ 50.382310] [ 50.383849] The buggy address belongs to the physical page: [ 50.389501] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102240 [ 50.397611] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 50.405371] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 50.412436] page_type: f5(slab) [ 50.415647] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 50.423497] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 50.431347] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 50.439281] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 50.447218] head: 0bfffe0000000001 fffffdffc2089001 00000000ffffffff 00000000ffffffff [ 50.455155] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 50.463085] page dumped because: kasan: bad access detected [ 50.468733] [ 50.470264] Memory state around the buggy address: [ 50.475131] ffff000082240800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 50.482448] ffff000082240880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.489767] >ffff000082240900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 50.497082] ^ [ 50.500372] ffff000082240980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.507691] ffff000082240a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 50.515008] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 49.944094] ================================================================== [ 49.955260] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 49.962062] Read of size 1 at addr ffff000095740000 by task kunit_try_catch/342 [ 49.969469] [ 49.971002] CPU: 6 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 49.971036] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.971045] Hardware name: Thundercomm Dragonboard 845c (DT) [ 49.971059] Call trace: [ 49.971066] show_stack+0x20/0x38 (C) [ 49.971087] dump_stack_lvl+0x8c/0xd0 [ 49.971110] print_report+0x118/0x608 [ 49.971130] kasan_report+0xdc/0x128 [ 49.971148] __asan_report_load1_noabort+0x20/0x30 [ 49.971165] mempool_uaf_helper+0x314/0x340 [ 49.971182] mempool_page_alloc_uaf+0xc0/0x118 [ 49.971200] kunit_try_run_case+0x170/0x3f0 [ 49.971220] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.971240] kthread+0x328/0x630 [ 49.971255] ret_from_fork+0x10/0x20 [ 49.971273] [ 50.041449] The buggy address belongs to the physical page: [ 50.047102] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x115740 [ 50.055211] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.061837] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 50.069675] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 50.077509] page dumped because: kasan: bad access detected [ 50.083150] [ 50.084681] Memory state around the buggy address: [ 50.089546] ffff00009573ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.096860] ffff00009573ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.104172] >ffff000095740000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.111483] ^ [ 50.114769] ffff000095740080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.122081] ffff000095740100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.129395] ================================================================== [ 49.353461] ================================================================== [ 49.364866] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 49.371664] Read of size 1 at addr ffff000095590000 by task kunit_try_catch/338 [ 49.379066] [ 49.380605] CPU: 4 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 49.380639] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.380648] Hardware name: Thundercomm Dragonboard 845c (DT) [ 49.380663] Call trace: [ 49.380671] show_stack+0x20/0x38 (C) [ 49.380692] dump_stack_lvl+0x8c/0xd0 [ 49.380715] print_report+0x118/0x608 [ 49.380737] kasan_report+0xdc/0x128 [ 49.380755] __asan_report_load1_noabort+0x20/0x30 [ 49.380773] mempool_uaf_helper+0x314/0x340 [ 49.380789] mempool_kmalloc_large_uaf+0xc4/0x120 [ 49.380808] kunit_try_run_case+0x170/0x3f0 [ 49.380827] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.380849] kthread+0x328/0x630 [ 49.380867] ret_from_fork+0x10/0x20 [ 49.380888] [ 49.451333] The buggy address belongs to the physical page: [ 49.456979] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x115590 [ 49.465084] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 49.472839] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 49.479891] page_type: f8(unknown) [ 49.483353] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 49.491197] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 49.499040] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 49.506967] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 49.514895] head: 0bfffe0000000002 fffffdffc2556401 00000000ffffffff 00000000ffffffff [ 49.522821] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 49.530744] page dumped because: kasan: bad access detected [ 49.536384] [ 49.537909] Memory state around the buggy address: [ 49.542763] ffff00009558ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 49.550080] ffff00009558ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 49.557398] >ffff000095590000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 49.564712] ^ [ 49.567992] ffff000095590080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 49.575310] ffff000095590100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 49.582617] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 49.594072] ================================================================== [ 49.606005] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 49.613251] Read of size 1 at addr ffff000097e1a240 by task kunit_try_catch/340 [ 49.620660] [ 49.622201] CPU: 3 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 49.622238] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.622247] Hardware name: Thundercomm Dragonboard 845c (DT) [ 49.622263] Call trace: [ 49.622273] show_stack+0x20/0x38 (C) [ 49.622295] dump_stack_lvl+0x8c/0xd0 [ 49.622318] print_report+0x118/0x608 [ 49.622341] kasan_report+0xdc/0x128 [ 49.622361] __asan_report_load1_noabort+0x20/0x30 [ 49.622381] mempool_uaf_helper+0x314/0x340 [ 49.622399] mempool_slab_uaf+0xc0/0x118 [ 49.622420] kunit_try_run_case+0x170/0x3f0 [ 49.622443] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.622468] kthread+0x328/0x630 [ 49.622486] ret_from_fork+0x10/0x20 [ 49.622509] [ 49.692208] Allocated by task 340: [ 49.695673] kasan_save_stack+0x3c/0x68 [ 49.699583] kasan_save_track+0x20/0x40 [ 49.703492] kasan_save_alloc_info+0x40/0x58 [ 49.707838] __kasan_mempool_unpoison_object+0xbc/0x180 [ 49.713150] remove_element+0x16c/0x1f8 [ 49.717059] mempool_alloc_preallocated+0x58/0xc0 [ 49.721842] mempool_uaf_helper+0xa4/0x340 [ 49.726008] mempool_slab_uaf+0xc0/0x118 [ 49.730004] kunit_try_run_case+0x170/0x3f0 [ 49.734256] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.739833] kthread+0x328/0x630 [ 49.743127] ret_from_fork+0x10/0x20 [ 49.746766] [ 49.748301] Freed by task 340: [ 49.751408] kasan_save_stack+0x3c/0x68 [ 49.755318] kasan_save_track+0x20/0x40 [ 49.759228] kasan_save_free_info+0x4c/0x78 [ 49.763478] __kasan_mempool_poison_object+0xc0/0x150 [ 49.768615] mempool_free+0x28c/0x328 [ 49.772349] mempool_uaf_helper+0x104/0x340 [ 49.776602] mempool_slab_uaf+0xc0/0x118 [ 49.780595] kunit_try_run_case+0x170/0x3f0 [ 49.784849] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.790422] kthread+0x328/0x630 [ 49.793713] ret_from_fork+0x10/0x20 [ 49.797360] [ 49.798891] The buggy address belongs to the object at ffff000097e1a240 [ 49.798891] which belongs to the cache test_cache of size 123 [ 49.811463] The buggy address is located 0 bytes inside of [ 49.811463] freed 123-byte region [ffff000097e1a240, ffff000097e1a2bb) [ 49.823689] [ 49.825218] The buggy address belongs to the physical page: [ 49.830869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x117e1a [ 49.838979] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 49.845601] page_type: f5(slab) [ 49.848811] raw: 0bfffe0000000000 ffff000082242280 dead000000000122 0000000000000000 [ 49.856665] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 49.864514] page dumped because: kasan: bad access detected [ 49.870163] [ 49.871701] Memory state around the buggy address: [ 49.876559] ffff000097e1a100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.883883] ffff000097e1a180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 49.891208] >ffff000097e1a200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 49.898528] ^ [ 49.903915] ffff000097e1a280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 49.911239] ffff000097e1a300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.918561] ================================================================== [ 48.978434] ================================================================== [ 48.990143] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 48.997399] Read of size 1 at addr ffff000082240500 by task kunit_try_catch/336 [ 49.004810] [ 49.006354] CPU: 3 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 49.006392] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.006401] Hardware name: Thundercomm Dragonboard 845c (DT) [ 49.006418] Call trace: [ 49.006427] show_stack+0x20/0x38 (C) [ 49.006451] dump_stack_lvl+0x8c/0xd0 [ 49.006476] print_report+0x118/0x608 [ 49.006499] kasan_report+0xdc/0x128 [ 49.006517] __asan_report_load1_noabort+0x20/0x30 [ 49.006538] mempool_uaf_helper+0x314/0x340 [ 49.006555] mempool_kmalloc_uaf+0xc4/0x120 [ 49.006573] kunit_try_run_case+0x170/0x3f0 [ 49.006597] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.006621] kthread+0x328/0x630 [ 49.006640] ret_from_fork+0x10/0x20 [ 49.006662] [ 49.076614] Allocated by task 336: [ 49.080075] kasan_save_stack+0x3c/0x68 [ 49.083988] kasan_save_track+0x20/0x40 [ 49.087897] kasan_save_alloc_info+0x40/0x58 [ 49.092233] __kasan_mempool_unpoison_object+0x11c/0x180 [ 49.097635] remove_element+0x130/0x1f8 [ 49.101545] mempool_alloc_preallocated+0x58/0xc0 [ 49.106327] mempool_uaf_helper+0xa4/0x340 [ 49.110493] mempool_kmalloc_uaf+0xc4/0x120 [ 49.114747] kunit_try_run_case+0x170/0x3f0 [ 49.118998] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.124576] kthread+0x328/0x630 [ 49.127867] ret_from_fork+0x10/0x20 [ 49.131507] [ 49.133043] Freed by task 336: [ 49.136154] kasan_save_stack+0x3c/0x68 [ 49.140065] kasan_save_track+0x20/0x40 [ 49.143973] kasan_save_free_info+0x4c/0x78 [ 49.148223] __kasan_mempool_poison_object+0xc0/0x150 [ 49.153354] mempool_free+0x28c/0x328 [ 49.157087] mempool_uaf_helper+0x104/0x340 [ 49.161339] mempool_kmalloc_uaf+0xc4/0x120 [ 49.165592] kunit_try_run_case+0x170/0x3f0 [ 49.169846] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.175419] kthread+0x328/0x630 [ 49.178712] ret_from_fork+0x10/0x20 [ 49.182349] [ 49.183885] The buggy address belongs to the object at ffff000082240500 [ 49.183885] which belongs to the cache kmalloc-128 of size 128 [ 49.196549] The buggy address is located 0 bytes inside of [ 49.196549] freed 128-byte region [ffff000082240500, ffff000082240580) [ 49.208781] [ 49.210316] The buggy address belongs to the physical page: [ 49.215971] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102240 [ 49.224083] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 49.231839] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 49.238904] page_type: f5(slab) [ 49.242114] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 49.249958] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.257803] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 49.265743] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.273684] head: 0bfffe0000000001 fffffdffc2089001 00000000ffffffff 00000000ffffffff [ 49.281623] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 49.289559] page dumped because: kasan: bad access detected [ 49.295207] [ 49.296742] Memory state around the buggy address: [ 49.301607] ffff000082240400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 49.308928] ffff000082240480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.316251] >ffff000082240500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 49.323566] ^ [ 49.326855] ffff000082240580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.334175] ffff000082240600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 49.341497] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 48.430801] ================================================================== [ 48.442730] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 48.450410] Read of size 1 at addr ffff00008553a001 by task kunit_try_catch/332 [ 48.457824] [ 48.459361] CPU: 3 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 48.459395] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.459403] Hardware name: Thundercomm Dragonboard 845c (DT) [ 48.459417] Call trace: [ 48.459425] show_stack+0x20/0x38 (C) [ 48.459446] dump_stack_lvl+0x8c/0xd0 [ 48.459469] print_report+0x118/0x608 [ 48.459489] kasan_report+0xdc/0x128 [ 48.459507] __asan_report_load1_noabort+0x20/0x30 [ 48.459525] mempool_oob_right_helper+0x2ac/0x2f0 [ 48.459543] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 48.459563] kunit_try_run_case+0x170/0x3f0 [ 48.459585] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.459607] kthread+0x328/0x630 [ 48.459623] ret_from_fork+0x10/0x20 [ 48.459640] [ 48.531140] The buggy address belongs to the physical page: [ 48.536789] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff00008553e600 pfn:0x105538 [ 48.546214] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 48.553974] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 48.561034] page_type: f8(unknown) [ 48.564504] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 48.572352] raw: ffff00008553e600 0000000000000000 00000000f8000000 0000000000000000 [ 48.580203] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 48.588136] head: ffff00008553e600 0000000000000000 00000000f8000000 0000000000000000 [ 48.596072] head: 0bfffe0000000002 fffffdffc2154e01 00000000ffffffff 00000000ffffffff [ 48.604006] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 48.611934] page dumped because: kasan: bad access detected [ 48.617585] [ 48.619115] Memory state around the buggy address: [ 48.623975] ffff000085539f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 48.631295] ffff000085539f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 48.638611] >ffff00008553a000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 48.645925] ^ [ 48.649213] ffff00008553a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 48.656528] ffff00008553a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 48.663842] ================================================================== [ 48.102457] ================================================================== [ 48.113501] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 48.121191] Read of size 1 at addr ffff00009068f473 by task kunit_try_catch/330 [ 48.128593] [ 48.130128] CPU: 5 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 48.130166] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.130175] Hardware name: Thundercomm Dragonboard 845c (DT) [ 48.130191] Call trace: [ 48.130199] show_stack+0x20/0x38 (C) [ 48.130220] dump_stack_lvl+0x8c/0xd0 [ 48.130243] print_report+0x118/0x608 [ 48.130264] kasan_report+0xdc/0x128 [ 48.130282] __asan_report_load1_noabort+0x20/0x30 [ 48.130302] mempool_oob_right_helper+0x2ac/0x2f0 [ 48.130319] mempool_kmalloc_oob_right+0xc4/0x120 [ 48.130337] kunit_try_run_case+0x170/0x3f0 [ 48.130358] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.130380] kthread+0x328/0x630 [ 48.130396] ret_from_fork+0x10/0x20 [ 48.130417] [ 48.201338] Allocated by task 330: [ 48.204796] kasan_save_stack+0x3c/0x68 [ 48.208696] kasan_save_track+0x20/0x40 [ 48.212595] kasan_save_alloc_info+0x40/0x58 [ 48.216932] __kasan_mempool_unpoison_object+0x11c/0x180 [ 48.222329] remove_element+0x130/0x1f8 [ 48.226227] mempool_alloc_preallocated+0x58/0xc0 [ 48.230998] mempool_oob_right_helper+0x98/0x2f0 [ 48.235684] mempool_kmalloc_oob_right+0xc4/0x120 [ 48.240459] kunit_try_run_case+0x170/0x3f0 [ 48.244712] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.250280] kthread+0x328/0x630 [ 48.253564] ret_from_fork+0x10/0x20 [ 48.257199] [ 48.258723] The buggy address belongs to the object at ffff00009068f400 [ 48.258723] which belongs to the cache kmalloc-128 of size 128 [ 48.271383] The buggy address is located 0 bytes to the right of [ 48.271383] allocated 115-byte region [ffff00009068f400, ffff00009068f473) [ 48.284480] [ 48.286008] The buggy address belongs to the physical page: [ 48.291655] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11068e [ 48.299761] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 48.307519] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 48.314578] page_type: f5(slab) [ 48.317781] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 48.325626] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.333471] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 48.341402] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.349333] head: 0bfffe0000000001 fffffdffc241a381 00000000ffffffff 00000000ffffffff [ 48.357262] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 48.365183] page dumped because: kasan: bad access detected [ 48.370827] [ 48.372358] Memory state around the buggy address: [ 48.377215] ffff00009068f300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 48.384522] ffff00009068f380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.391834] >ffff00009068f400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 48.399141] ^ [ 48.406103] ffff00009068f480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.413412] ffff00009068f500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 48.420719] ================================================================== [ 48.676501] ================================================================== [ 48.688943] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 48.696618] Read of size 1 at addr ffff000097e1d2bb by task kunit_try_catch/334 [ 48.704030] [ 48.705566] CPU: 3 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 48.705599] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.705607] Hardware name: Thundercomm Dragonboard 845c (DT) [ 48.705621] Call trace: [ 48.705628] show_stack+0x20/0x38 (C) [ 48.705647] dump_stack_lvl+0x8c/0xd0 [ 48.705671] print_report+0x118/0x608 [ 48.705690] kasan_report+0xdc/0x128 [ 48.705708] __asan_report_load1_noabort+0x20/0x30 [ 48.705726] mempool_oob_right_helper+0x2ac/0x2f0 [ 48.705745] mempool_slab_oob_right+0xc0/0x118 [ 48.705766] kunit_try_run_case+0x170/0x3f0 [ 48.705786] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.705807] kthread+0x328/0x630 [ 48.705822] ret_from_fork+0x10/0x20 [ 48.705842] [ 48.776582] Allocated by task 334: [ 48.780043] kasan_save_stack+0x3c/0x68 [ 48.783951] kasan_save_track+0x20/0x40 [ 48.787860] kasan_save_alloc_info+0x40/0x58 [ 48.792196] __kasan_mempool_unpoison_object+0xbc/0x180 [ 48.797509] remove_element+0x16c/0x1f8 [ 48.801419] mempool_alloc_preallocated+0x58/0xc0 [ 48.806201] mempool_oob_right_helper+0x98/0x2f0 [ 48.810896] mempool_slab_oob_right+0xc0/0x118 [ 48.815418] kunit_try_run_case+0x170/0x3f0 [ 48.819669] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.825238] kthread+0x328/0x630 [ 48.828529] ret_from_fork+0x10/0x20 [ 48.832177] [ 48.833708] The buggy address belongs to the object at ffff000097e1d240 [ 48.833708] which belongs to the cache test_cache of size 123 [ 48.846286] The buggy address is located 0 bytes to the right of [ 48.846286] allocated 123-byte region [ffff000097e1d240, ffff000097e1d2bb) [ 48.859391] [ 48.860929] The buggy address belongs to the physical page: [ 48.866578] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x117e1d [ 48.874691] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.881314] page_type: f5(slab) [ 48.884521] raw: 0bfffe0000000000 ffff000082242140 dead000000000122 0000000000000000 [ 48.892374] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 48.900216] page dumped because: kasan: bad access detected [ 48.905864] [ 48.907394] Memory state around the buggy address: [ 48.912260] ffff000097e1d180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 48.919576] ffff000097e1d200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 48.926891] >ffff000097e1d280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 48.934209] ^ [ 48.939331] ffff000097e1d300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.946655] ffff000097e1d380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.953972] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 47.150133] ================================================================== [ 47.161494] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300 [ 47.169365] Read of size 1 at addr ffff000080e02000 by task kunit_try_catch/324 [ 47.176783] [ 47.178327] CPU: 2 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 47.178364] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.178374] Hardware name: Thundercomm Dragonboard 845c (DT) [ 47.178392] Call trace: [ 47.178401] show_stack+0x20/0x38 (C) [ 47.178424] dump_stack_lvl+0x8c/0xd0 [ 47.178448] print_report+0x118/0x608 [ 47.178473] kasan_report+0xdc/0x128 [ 47.178491] __kasan_check_byte+0x54/0x70 [ 47.178513] kmem_cache_destroy+0x34/0x218 [ 47.178535] kmem_cache_double_destroy+0x174/0x300 [ 47.178555] kunit_try_run_case+0x170/0x3f0 [ 47.178579] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.178603] kthread+0x328/0x630 [ 47.178622] ret_from_fork+0x10/0x20 [ 47.178644] [ 47.248318] Allocated by task 324: [ 47.251789] kasan_save_stack+0x3c/0x68 [ 47.255695] kasan_save_track+0x20/0x40 [ 47.259601] kasan_save_alloc_info+0x40/0x58 [ 47.263945] __kasan_slab_alloc+0xa8/0xb0 [ 47.268025] kmem_cache_alloc_noprof+0x10c/0x398 [ 47.272724] __kmem_cache_create_args+0x178/0x280 [ 47.277504] kmem_cache_double_destroy+0xc0/0x300 [ 47.282283] kunit_try_run_case+0x170/0x3f0 [ 47.286546] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.292116] kthread+0x328/0x630 [ 47.295404] ret_from_fork+0x10/0x20 [ 47.299048] [ 47.300579] Freed by task 324: [ 47.303689] kasan_save_stack+0x3c/0x68 [ 47.307596] kasan_save_track+0x20/0x40 [ 47.311500] kasan_save_free_info+0x4c/0x78 [ 47.315760] __kasan_slab_free+0x6c/0x98 [ 47.319753] kmem_cache_free+0x260/0x468 [ 47.323745] slab_kmem_cache_release+0x38/0x50 [ 47.328266] kmem_cache_release+0x1c/0x30 [ 47.332344] kobject_put+0x17c/0x420 [ 47.335992] sysfs_slab_release+0x1c/0x30 [ 47.340071] kmem_cache_destroy+0x118/0x218 [ 47.344331] kmem_cache_double_destroy+0x128/0x300 [ 47.349196] kunit_try_run_case+0x170/0x3f0 [ 47.353456] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.359025] kthread+0x328/0x630 [ 47.362312] ret_from_fork+0x10/0x20 [ 47.365959] [ 47.367491] The buggy address belongs to the object at ffff000080e02000 [ 47.367491] which belongs to the cache kmem_cache of size 208 [ 47.380073] The buggy address is located 0 bytes inside of [ 47.380073] freed 208-byte region [ffff000080e02000, ffff000080e020d0) [ 47.392296] [ 47.393830] The buggy address belongs to the physical page: [ 47.399479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100e02 [ 47.407589] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 47.415351] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 47.422417] page_type: f5(slab) [ 47.425625] raw: 0bfffe0000000040 ffff000080002000 dead000000000122 0000000000000000 [ 47.433473] raw: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000 [ 47.441322] head: 0bfffe0000000040 ffff000080002000 dead000000000122 0000000000000000 [ 47.449257] head: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000 [ 47.457190] head: 0bfffe0000000001 fffffdffc2038081 00000000ffffffff 00000000ffffffff [ 47.465124] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 47.473054] page dumped because: kasan: bad access detected [ 47.478700] [ 47.480231] Memory state around the buggy address: [ 47.485095] ffff000080e01f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.492409] ffff000080e01f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.499724] >ffff000080e02000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 47.507037] ^ [ 47.510322] ffff000080e02080: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 47.517638] ffff000080e02100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.524951] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 46.712321] ================================================================== [ 46.724106] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468 [ 46.731347] Read of size 1 at addr ffff0000952aa000 by task kunit_try_catch/322 [ 46.738751] [ 46.740292] CPU: 6 UID: 0 PID: 322 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 46.740329] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.740340] Hardware name: Thundercomm Dragonboard 845c (DT) [ 46.740355] Call trace: [ 46.740364] show_stack+0x20/0x38 (C) [ 46.740386] dump_stack_lvl+0x8c/0xd0 [ 46.740408] print_report+0x118/0x608 [ 46.740429] kasan_report+0xdc/0x128 [ 46.740447] __asan_report_load1_noabort+0x20/0x30 [ 46.740464] kmem_cache_rcu_uaf+0x388/0x468 [ 46.740480] kunit_try_run_case+0x170/0x3f0 [ 46.740502] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.740525] kthread+0x328/0x630 [ 46.740541] ret_from_fork+0x10/0x20 [ 46.740560] [ 46.806243] Allocated by task 322: [ 46.809699] kasan_save_stack+0x3c/0x68 [ 46.813610] kasan_save_track+0x20/0x40 [ 46.817515] kasan_save_alloc_info+0x40/0x58 [ 46.821850] __kasan_slab_alloc+0xa8/0xb0 [ 46.825928] kmem_cache_alloc_noprof+0x10c/0x398 [ 46.830618] kmem_cache_rcu_uaf+0x12c/0x468 [ 46.834870] kunit_try_run_case+0x170/0x3f0 [ 46.839120] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.844685] kthread+0x328/0x630 [ 46.847967] ret_from_fork+0x10/0x20 [ 46.851599] [ 46.853122] Freed by task 0: [ 46.856056] kasan_save_stack+0x3c/0x68 [ 46.859961] kasan_save_track+0x20/0x40 [ 46.863864] kasan_save_free_info+0x4c/0x78 [ 46.868111] __kasan_slab_free+0x6c/0x98 [ 46.872101] slab_free_after_rcu_debug+0xd4/0x2f8 [ 46.876876] rcu_core+0x9f4/0x1e20 [ 46.880337] rcu_core_si+0x18/0x30 [ 46.883796] handle_softirqs+0x374/0xb28 [ 46.887789] __do_softirq+0x1c/0x28 [ 46.891335] [ 46.892858] Last potentially related work creation: [ 46.897797] kasan_save_stack+0x3c/0x68 [ 46.901704] kasan_record_aux_stack+0xb4/0xc8 [ 46.906126] kmem_cache_free+0x120/0x468 [ 46.910120] kmem_cache_rcu_uaf+0x16c/0x468 [ 46.914372] kunit_try_run_case+0x170/0x3f0 [ 46.918622] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.924185] kthread+0x328/0x630 [ 46.927469] ret_from_fork+0x10/0x20 [ 46.931103] [ 46.932634] The buggy address belongs to the object at ffff0000952aa000 [ 46.932634] which belongs to the cache test_cache of size 200 [ 46.945207] The buggy address is located 0 bytes inside of [ 46.945207] freed 200-byte region [ffff0000952aa000, ffff0000952aa0c8) [ 46.957422] [ 46.958947] The buggy address belongs to the physical page: [ 46.964590] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1152aa [ 46.972695] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 46.980449] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 46.987505] page_type: f5(slab) [ 46.990711] raw: 0bfffe0000000040 ffff000087bc8f00 dead000000000122 0000000000000000 [ 46.998556] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 47.006398] head: 0bfffe0000000040 ffff000087bc8f00 dead000000000122 0000000000000000 [ 47.014324] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 47.022251] head: 0bfffe0000000001 fffffdffc254aa81 00000000ffffffff 00000000ffffffff [ 47.030176] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 47.038098] page dumped because: kasan: bad access detected [ 47.043746] [ 47.045269] Memory state around the buggy address: [ 47.050133] ffff0000952a9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.057446] ffff0000952a9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.064759] >ffff0000952aa000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 47.072074] ^ [ 47.075354] ffff0000952aa080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 47.082672] ffff0000952aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.089984] ==================================================================
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 63.838352] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 61.128073] ================================================================== [ 61.135387] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 61.142883] Write of size 4 at addr ffff000081814330 by task kunit_try_catch/374 [ 61.150375] [ 61.151902] CPU: 4 UID: 0 PID: 374 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 61.151931] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.151938] Hardware name: Thundercomm Dragonboard 845c (DT) [ 61.151949] Call trace: [ 61.151955] show_stack+0x20/0x38 (C) [ 61.151972] dump_stack_lvl+0x8c/0xd0 [ 61.151991] print_report+0x118/0x608 [ 61.152010] kasan_report+0xdc/0x128 [ 61.152029] __asan_report_store4_noabort+0x20/0x30 [ 61.152046] kasan_atomics_helper+0x3f94/0x4858 [ 61.152065] kasan_atomics+0x198/0x2e0 [ 61.152082] kunit_try_run_case+0x170/0x3f0 [ 61.152099] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.152120] kthread+0x328/0x630 [ 61.152133] ret_from_fork+0x10/0x20 [ 61.152150] [ 61.222060] Allocated by task 374: [ 61.225518] kasan_save_stack+0x3c/0x68 [ 61.229418] kasan_save_track+0x20/0x40 [ 61.233316] kasan_save_alloc_info+0x40/0x58 [ 61.237655] __kasan_kmalloc+0xd4/0xd8 [ 61.241467] __kmalloc_cache_noprof+0x16c/0x3c0 [ 61.246072] kasan_atomics+0xb8/0x2e0 [ 61.249795] kunit_try_run_case+0x170/0x3f0 [ 61.254051] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.259623] kthread+0x328/0x630 [ 61.262909] ret_from_fork+0x10/0x20 [ 61.266547] [ 61.268071] The buggy address belongs to the object at ffff000081814300 [ 61.268071] which belongs to the cache kmalloc-64 of size 64 [ 61.280553] The buggy address is located 0 bytes to the right of [ 61.280553] allocated 48-byte region [ffff000081814300, ffff000081814330) [ 61.293560] [ 61.295085] The buggy address belongs to the physical page: [ 61.300735] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101814 [ 61.308836] ksm flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.315794] page_type: f5(slab) [ 61.318995] raw: 0bfffe0000000000 ffff0000800028c0 fffffdffc20ea340 0000000000000007 [ 61.326836] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.334671] page dumped because: kasan: bad access detected [ 61.340321] [ 61.341846] Memory state around the buggy address: [ 61.346703] ffff000081814200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.354019] ffff000081814280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.361332] >ffff000081814300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.368643] ^ [ 61.373503] ffff000081814380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.380820] ffff000081814400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.388134] ================================================================== [ 61.395515] ================================================================== [ 61.402829] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858 [ 61.410236] Write of size 4 at addr ffff000081814330 by task kunit_try_catch/374 [ 61.417727] [ 61.419255] CPU: 4 UID: 0 PID: 374 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 61.419285] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.419293] Hardware name: Thundercomm Dragonboard 845c (DT) [ 61.419305] Call trace: [ 61.419311] show_stack+0x20/0x38 (C) [ 61.419330] dump_stack_lvl+0x8c/0xd0 [ 61.419350] print_report+0x118/0x608 [ 61.419369] kasan_report+0xdc/0x128 [ 61.419388] kasan_check_range+0x100/0x1a8 [ 61.419409] __kasan_check_write+0x20/0x30 [ 61.419425] kasan_atomics_helper+0x3ac/0x4858 [ 61.419444] kasan_atomics+0x198/0x2e0 [ 61.419462] kunit_try_run_case+0x170/0x3f0 [ 61.419480] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.419502] kthread+0x328/0x630 [ 61.419516] ret_from_fork+0x10/0x20 [ 61.419534] [ 61.492710] Allocated by task 374: [ 61.496169] kasan_save_stack+0x3c/0x68 [ 61.500069] kasan_save_track+0x20/0x40 [ 61.503967] kasan_save_alloc_info+0x40/0x58 [ 61.508309] __kasan_kmalloc+0xd4/0xd8 [ 61.512120] __kmalloc_cache_noprof+0x16c/0x3c0 [ 61.516725] kasan_atomics+0xb8/0x2e0 [ 61.520449] kunit_try_run_case+0x170/0x3f0 [ 61.524706] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.530265] kthread+0x328/0x630 [ 61.533554] ret_from_fork+0x10/0x20 [ 61.537191] [ 61.538716] The buggy address belongs to the object at ffff000081814300 [ 61.538716] which belongs to the cache kmalloc-64 of size 64 [ 61.551198] The buggy address is located 0 bytes to the right of [ 61.551198] allocated 48-byte region [ffff000081814300, ffff000081814330) [ 61.564205] [ 61.565730] The buggy address belongs to the physical page: [ 61.571378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101814 [ 61.579478] ksm flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.586437] page_type: f5(slab) [ 61.589638] raw: 0bfffe0000000000 ffff0000800028c0 fffffdffc20ea340 0000000000000007 [ 61.597480] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.605315] page dumped because: kasan: bad access detected [ 61.610965] [ 61.612489] Memory state around the buggy address: [ 61.617347] ffff000081814200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.624661] ffff000081814280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.631979] >ffff000081814300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.639291] ^ [ 61.644149] ffff000081814380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.651465] ffff000081814400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.658778] ================================================================== [ 63.560409] ================================================================== [ 63.567724] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 63.575132] Write of size 4 at addr ffff000081814330 by task kunit_try_catch/374 [ 63.582623] [ 63.584149] CPU: 4 UID: 0 PID: 374 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 63.584179] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.584188] Hardware name: Thundercomm Dragonboard 845c (DT) [ 63.584199] Call trace: [ 63.584205] show_stack+0x20/0x38 (C) [ 63.584223] dump_stack_lvl+0x8c/0xd0 [ 63.584243] print_report+0x118/0x608 [ 63.584262] kasan_report+0xdc/0x128 [ 63.584280] kasan_check_range+0x100/0x1a8 [ 63.584300] __kasan_check_write+0x20/0x30 [ 63.584315] kasan_atomics_helper+0x6ec/0x4858 [ 63.584335] kasan_atomics+0x198/0x2e0 [ 63.584353] kunit_try_run_case+0x170/0x3f0 [ 63.584370] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.584392] kthread+0x328/0x630 [ 63.584406] ret_from_fork+0x10/0x20 [ 63.584422] [ 63.657598] Allocated by task 374: [ 63.661055] kasan_save_stack+0x3c/0x68 [ 63.664956] kasan_save_track+0x20/0x40 [ 63.668855] kasan_save_alloc_info+0x40/0x58 [ 63.673196] __kasan_kmalloc+0xd4/0xd8 [ 63.677007] __kmalloc_cache_noprof+0x16c/0x3c0 [ 63.681610] kasan_atomics+0xb8/0x2e0 [ 63.685334] kunit_try_run_case+0x170/0x3f0 [ 63.689588] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.695160] kthread+0x328/0x630 [ 63.698447] ret_from_fork+0x10/0x20 [ 63.702083] [ 63.703608] The buggy address belongs to the object at ffff000081814300 [ 63.703608] which belongs to the cache kmalloc-64 of size 64 [ 63.716091] The buggy address is located 0 bytes to the right of [ 63.716091] allocated 48-byte region [ffff000081814300, ffff000081814330) [ 63.729097] [ 63.730623] The buggy address belongs to the physical page: [ 63.736271] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101814 [ 63.744371] ksm flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.751330] page_type: f5(slab) [ 63.754531] raw: 0bfffe0000000000 ffff0000800028c0 fffffdffc20ea340 0000000000000007 [ 63.762371] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.770207] page dumped because: kasan: bad access detected [ 63.775855] [ 63.777381] Memory state around the buggy address: [ 63.782238] ffff000081814200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.789555] ffff000081814280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.796870] >ffff000081814300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 63.804182] ^ [ 63.809042] ffff000081814380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.816357] ffff000081814400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.823670] ================================================================== [ 60.857444] ================================================================== [ 60.864758] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 60.872166] Write of size 4 at addr ffff000081814330 by task kunit_try_catch/374 [ 60.879657] [ 60.881184] CPU: 4 UID: 0 PID: 374 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 60.881213] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.881220] Hardware name: Thundercomm Dragonboard 845c (DT) [ 60.881231] Call trace: [ 60.881238] show_stack+0x20/0x38 (C) [ 60.881255] dump_stack_lvl+0x8c/0xd0 [ 60.881274] print_report+0x118/0x608 [ 60.881292] kasan_report+0xdc/0x128 [ 60.881310] kasan_check_range+0x100/0x1a8 [ 60.881330] __kasan_check_write+0x20/0x30 [ 60.881346] kasan_atomics_helper+0x32c/0x4858 [ 60.881363] kasan_atomics+0x198/0x2e0 [ 60.881382] kunit_try_run_case+0x170/0x3f0 [ 60.881399] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.881420] kthread+0x328/0x630 [ 60.881435] ret_from_fork+0x10/0x20 [ 60.881452] [ 60.954631] Allocated by task 374: [ 60.958090] kasan_save_stack+0x3c/0x68 [ 60.961990] kasan_save_track+0x20/0x40 [ 60.965891] kasan_save_alloc_info+0x40/0x58 [ 60.970231] __kasan_kmalloc+0xd4/0xd8 [ 60.974041] __kmalloc_cache_noprof+0x16c/0x3c0 [ 60.978646] kasan_atomics+0xb8/0x2e0 [ 60.982371] kunit_try_run_case+0x170/0x3f0 [ 60.986626] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.992197] kthread+0x328/0x630 [ 60.995484] ret_from_fork+0x10/0x20 [ 60.999120] [ 61.000644] The buggy address belongs to the object at ffff000081814300 [ 61.000644] which belongs to the cache kmalloc-64 of size 64 [ 61.013128] The buggy address is located 0 bytes to the right of [ 61.013128] allocated 48-byte region [ffff000081814300, ffff000081814330) [ 61.026135] [ 61.027660] The buggy address belongs to the physical page: [ 61.033308] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101814 [ 61.041405] ksm flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.048363] page_type: f5(slab) [ 61.051566] raw: 0bfffe0000000000 ffff0000800028c0 fffffdffc20ea340 0000000000000007 [ 61.059406] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.067242] page dumped because: kasan: bad access detected [ 61.072892] [ 61.074415] Memory state around the buggy address: [ 61.079272] ffff000081814200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.086589] ffff000081814280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.093904] >ffff000081814300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.101217] ^ [ 61.106076] ffff000081814380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.113392] ffff000081814400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.120705] ================================================================== [ 59.234906] ================================================================== [ 59.249978] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 59.257484] Read of size 4 at addr ffff000081814330 by task kunit_try_catch/374 [ 59.264892] [ 59.266429] CPU: 3 UID: 0 PID: 374 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 59.266459] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.266469] Hardware name: Thundercomm Dragonboard 845c (DT) [ 59.266484] Call trace: [ 59.266491] show_stack+0x20/0x38 (C) [ 59.266511] dump_stack_lvl+0x8c/0xd0 [ 59.266534] print_report+0x118/0x608 [ 59.266556] kasan_report+0xdc/0x128 [ 59.266575] __asan_report_load4_noabort+0x20/0x30 [ 59.266594] kasan_atomics_helper+0x40a8/0x4858 [ 59.266614] kasan_atomics+0x198/0x2e0 [ 59.266632] kunit_try_run_case+0x170/0x3f0 [ 59.266652] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.266674] kthread+0x328/0x630 [ 59.266690] ret_from_fork+0x10/0x20 [ 59.266709] [ 59.336543] Allocated by task 374: [ 59.340005] kasan_save_stack+0x3c/0x68 [ 59.343919] kasan_save_track+0x20/0x40 [ 59.347830] kasan_save_alloc_info+0x40/0x58 [ 59.352172] __kasan_kmalloc+0xd4/0xd8 [ 59.355995] __kmalloc_cache_noprof+0x16c/0x3c0 [ 59.360600] kasan_atomics+0xb8/0x2e0 [ 59.364327] kunit_try_run_case+0x170/0x3f0 [ 59.368583] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.374160] kthread+0x328/0x630 [ 59.377453] ret_from_fork+0x10/0x20 [ 59.381092] [ 59.382626] The buggy address belongs to the object at ffff000081814300 [ 59.382626] which belongs to the cache kmalloc-64 of size 64 [ 59.395109] The buggy address is located 0 bytes to the right of [ 59.395109] allocated 48-byte region [ffff000081814300, ffff000081814330) [ 59.408122] [ 59.409654] The buggy address belongs to the physical page: [ 59.415303] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101814 [ 59.423410] ksm flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.430383] page_type: f5(slab) [ 59.433591] raw: 0bfffe0000000000 ffff0000800028c0 fffffdffc20ea340 0000000000000007 [ 59.441439] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.449282] page dumped because: kasan: bad access detected [ 59.454933] [ 59.456471] Memory state around the buggy address: [ 59.461335] ffff000081814200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.468652] ffff000081814280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.475970] >ffff000081814300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.483286] ^ [ 59.488150] ffff000081814380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.495471] ffff000081814400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.502787] ================================================================== [ 60.049140] ================================================================== [ 60.056462] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 60.063875] Write of size 4 at addr ffff000081814330 by task kunit_try_catch/374 [ 60.071371] [ 60.072899] CPU: 4 UID: 0 PID: 374 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 60.072930] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.072940] Hardware name: Thundercomm Dragonboard 845c (DT) [ 60.072950] Call trace: [ 60.072956] show_stack+0x20/0x38 (C) [ 60.072975] dump_stack_lvl+0x8c/0xd0 [ 60.072994] print_report+0x118/0x608 [ 60.073014] kasan_report+0xdc/0x128 [ 60.073034] kasan_check_range+0x100/0x1a8 [ 60.073057] __kasan_check_write+0x20/0x30 [ 60.073072] kasan_atomics_helper+0x24c/0x4858 [ 60.073090] kasan_atomics+0x198/0x2e0 [ 60.073107] kunit_try_run_case+0x170/0x3f0 [ 60.073126] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.073148] kthread+0x328/0x630 [ 60.073161] ret_from_fork+0x10/0x20 [ 60.073178] [ 60.146339] Allocated by task 374: [ 60.149792] kasan_save_stack+0x3c/0x68 [ 60.153699] kasan_save_track+0x20/0x40 [ 60.157606] kasan_save_alloc_info+0x40/0x58 [ 60.161943] __kasan_kmalloc+0xd4/0xd8 [ 60.165761] __kmalloc_cache_noprof+0x16c/0x3c0 [ 60.170362] kasan_atomics+0xb8/0x2e0 [ 60.174083] kunit_try_run_case+0x170/0x3f0 [ 60.178336] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.183900] kthread+0x328/0x630 [ 60.187184] ret_from_fork+0x10/0x20 [ 60.190818] [ 60.192348] The buggy address belongs to the object at ffff000081814300 [ 60.192348] which belongs to the cache kmalloc-64 of size 64 [ 60.204831] The buggy address is located 0 bytes to the right of [ 60.204831] allocated 48-byte region [ffff000081814300, ffff000081814330) [ 60.217837] [ 60.219369] The buggy address belongs to the physical page: [ 60.225014] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101814 [ 60.233116] ksm flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.240078] page_type: f5(slab) [ 60.243277] raw: 0bfffe0000000000 ffff0000800028c0 fffffdffc20ea340 0000000000000007 [ 60.251120] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.258957] page dumped because: kasan: bad access detected [ 60.264599] [ 60.266122] Memory state around the buggy address: [ 60.270974] ffff000081814200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.278283] ffff000081814280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.285599] >ffff000081814300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.292904] ^ [ 60.297758] ffff000081814380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.305065] ffff000081814400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.312370] ================================================================== [ 59.778720] ================================================================== [ 59.786041] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 59.793459] Read of size 4 at addr ffff000081814330 by task kunit_try_catch/374 [ 59.800859] [ 59.802389] CPU: 4 UID: 0 PID: 374 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 59.802421] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.802430] Hardware name: Thundercomm Dragonboard 845c (DT) [ 59.802442] Call trace: [ 59.802449] show_stack+0x20/0x38 (C) [ 59.802469] dump_stack_lvl+0x8c/0xd0 [ 59.802490] print_report+0x118/0x608 [ 59.802509] kasan_report+0xdc/0x128 [ 59.802529] kasan_check_range+0x100/0x1a8 [ 59.802550] __kasan_check_read+0x20/0x30 [ 59.802567] kasan_atomics_helper+0x1ec/0x4858 [ 59.802585] kasan_atomics+0x198/0x2e0 [ 59.802602] kunit_try_run_case+0x170/0x3f0 [ 59.802621] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.802642] kthread+0x328/0x630 [ 59.802656] ret_from_fork+0x10/0x20 [ 59.802672] [ 59.875760] Allocated by task 374: [ 59.879219] kasan_save_stack+0x3c/0x68 [ 59.883118] kasan_save_track+0x20/0x40 [ 59.887013] kasan_save_alloc_info+0x40/0x58 [ 59.891347] __kasan_kmalloc+0xd4/0xd8 [ 59.895156] __kmalloc_cache_noprof+0x16c/0x3c0 [ 59.899754] kasan_atomics+0xb8/0x2e0 [ 59.903476] kunit_try_run_case+0x170/0x3f0 [ 59.907729] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.913297] kthread+0x328/0x630 [ 59.916580] ret_from_fork+0x10/0x20 [ 59.920213] [ 59.921737] The buggy address belongs to the object at ffff000081814300 [ 59.921737] which belongs to the cache kmalloc-64 of size 64 [ 59.934220] The buggy address is located 0 bytes to the right of [ 59.934220] allocated 48-byte region [ffff000081814300, ffff000081814330) [ 59.947229] [ 59.948753] The buggy address belongs to the physical page: [ 59.954399] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101814 [ 59.962502] ksm flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.969466] page_type: f5(slab) [ 59.972663] raw: 0bfffe0000000000 ffff0000800028c0 fffffdffc20ea340 0000000000000007 [ 59.980508] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.988346] page dumped because: kasan: bad access detected [ 59.993991] [ 59.995521] Memory state around the buggy address: [ 60.000375] ffff000081814200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.007686] ffff000081814280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.014997] >ffff000081814300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.022303] ^ [ 60.027157] ffff000081814380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.034466] ffff000081814400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.041771] ================================================================== [ 60.590189] ================================================================== [ 60.597507] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 60.605001] Read of size 4 at addr ffff000081814330 by task kunit_try_catch/374 [ 60.612407] [ 60.613934] CPU: 4 UID: 0 PID: 374 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 60.613963] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.613973] Hardware name: Thundercomm Dragonboard 845c (DT) [ 60.613983] Call trace: [ 60.613990] show_stack+0x20/0x38 (C) [ 60.614006] dump_stack_lvl+0x8c/0xd0 [ 60.614025] print_report+0x118/0x608 [ 60.614044] kasan_report+0xdc/0x128 [ 60.614062] __asan_report_load4_noabort+0x20/0x30 [ 60.614079] kasan_atomics_helper+0x40fc/0x4858 [ 60.614098] kasan_atomics+0x198/0x2e0 [ 60.614116] kunit_try_run_case+0x170/0x3f0 [ 60.614134] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.614156] kthread+0x328/0x630 [ 60.614170] ret_from_fork+0x10/0x20 [ 60.614188] [ 60.684000] Allocated by task 374: [ 60.687458] kasan_save_stack+0x3c/0x68 [ 60.691357] kasan_save_track+0x20/0x40 [ 60.695256] kasan_save_alloc_info+0x40/0x58 [ 60.699596] __kasan_kmalloc+0xd4/0xd8 [ 60.703408] __kmalloc_cache_noprof+0x16c/0x3c0 [ 60.708010] kasan_atomics+0xb8/0x2e0 [ 60.711733] kunit_try_run_case+0x170/0x3f0 [ 60.715988] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.721558] kthread+0x328/0x630 [ 60.724845] ret_from_fork+0x10/0x20 [ 60.728481] [ 60.730006] The buggy address belongs to the object at ffff000081814300 [ 60.730006] which belongs to the cache kmalloc-64 of size 64 [ 60.742488] The buggy address is located 0 bytes to the right of [ 60.742488] allocated 48-byte region [ffff000081814300, ffff000081814330) [ 60.755492] [ 60.757018] The buggy address belongs to the physical page: [ 60.762666] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101814 [ 60.770765] ksm flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.777723] page_type: f5(slab) [ 60.780925] raw: 0bfffe0000000000 ffff0000800028c0 fffffdffc20ea340 0000000000000007 [ 60.788766] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.796601] page dumped because: kasan: bad access detected [ 60.802249] [ 60.803774] Memory state around the buggy address: [ 60.808631] ffff000081814200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.815945] ffff000081814280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.823259] >ffff000081814300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.830575] ^ [ 60.835433] ffff000081814380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.842747] ffff000081814400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.850060] ================================================================== [ 63.019186] ================================================================== [ 63.026500] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 63.033906] Write of size 4 at addr ffff000081814330 by task kunit_try_catch/374 [ 63.041397] [ 63.042924] CPU: 4 UID: 0 PID: 374 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 63.042953] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.042962] Hardware name: Thundercomm Dragonboard 845c (DT) [ 63.042972] Call trace: [ 63.042978] show_stack+0x20/0x38 (C) [ 63.042996] dump_stack_lvl+0x8c/0xd0 [ 63.043014] print_report+0x118/0x608 [ 63.043033] kasan_report+0xdc/0x128 [ 63.043055] kasan_check_range+0x100/0x1a8 [ 63.043075] __kasan_check_write+0x20/0x30 [ 63.043092] kasan_atomics_helper+0x61c/0x4858 [ 63.043111] kasan_atomics+0x198/0x2e0 [ 63.043128] kunit_try_run_case+0x170/0x3f0 [ 63.043147] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.043168] kthread+0x328/0x630 [ 63.043181] ret_from_fork+0x10/0x20 [ 63.043197] [ 63.116363] Allocated by task 374: [ 63.119820] kasan_save_stack+0x3c/0x68 [ 63.123723] kasan_save_track+0x20/0x40 [ 63.127621] kasan_save_alloc_info+0x40/0x58 [ 63.131962] __kasan_kmalloc+0xd4/0xd8 [ 63.135773] __kmalloc_cache_noprof+0x16c/0x3c0 [ 63.140376] kasan_atomics+0xb8/0x2e0 [ 63.144098] kunit_try_run_case+0x170/0x3f0 [ 63.148354] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.153915] kthread+0x328/0x630 [ 63.157203] ret_from_fork+0x10/0x20 [ 63.160840] [ 63.162365] The buggy address belongs to the object at ffff000081814300 [ 63.162365] which belongs to the cache kmalloc-64 of size 64 [ 63.174848] The buggy address is located 0 bytes to the right of [ 63.174848] allocated 48-byte region [ffff000081814300, ffff000081814330) [ 63.187858] [ 63.189382] The buggy address belongs to the physical page: [ 63.195031] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101814 [ 63.203130] ksm flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.210089] page_type: f5(slab) [ 63.213288] raw: 0bfffe0000000000 ffff0000800028c0 fffffdffc20ea340 0000000000000007 [ 63.221129] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.228963] page dumped because: kasan: bad access detected [ 63.234612] [ 63.236136] Memory state around the buggy address: [ 63.240994] ffff000081814200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.248309] ffff000081814280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.255624] >ffff000081814300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 63.262939] ^ [ 63.267797] ffff000081814380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.275113] ffff000081814400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.282426] ================================================================== [ 61.666143] ================================================================== [ 61.673456] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 61.680863] Write of size 4 at addr ffff000081814330 by task kunit_try_catch/374 [ 61.688353] [ 61.689878] CPU: 4 UID: 0 PID: 374 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 61.689908] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.689916] Hardware name: Thundercomm Dragonboard 845c (DT) [ 61.689926] Call trace: [ 61.689931] show_stack+0x20/0x38 (C) [ 61.689948] dump_stack_lvl+0x8c/0xd0 [ 61.689971] print_report+0x118/0x608 [ 61.689991] kasan_report+0xdc/0x128 [ 61.690009] kasan_check_range+0x100/0x1a8 [ 61.690029] __kasan_check_write+0x20/0x30 [ 61.690044] kasan_atomics_helper+0x414/0x4858 [ 61.690063] kasan_atomics+0x198/0x2e0 [ 61.690082] kunit_try_run_case+0x170/0x3f0 [ 61.690100] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.690121] kthread+0x328/0x630 [ 61.690136] ret_from_fork+0x10/0x20 [ 61.690153] [ 61.763307] Allocated by task 374: [ 61.766764] kasan_save_stack+0x3c/0x68 [ 61.770663] kasan_save_track+0x20/0x40 [ 61.774563] kasan_save_alloc_info+0x40/0x58 [ 61.778901] __kasan_kmalloc+0xd4/0xd8 [ 61.782713] __kmalloc_cache_noprof+0x16c/0x3c0 [ 61.787317] kasan_atomics+0xb8/0x2e0 [ 61.791039] kunit_try_run_case+0x170/0x3f0 [ 61.795297] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.800868] kthread+0x328/0x630 [ 61.804156] ret_from_fork+0x10/0x20 [ 61.807793] [ 61.809318] The buggy address belongs to the object at ffff000081814300 [ 61.809318] which belongs to the cache kmalloc-64 of size 64 [ 61.821800] The buggy address is located 0 bytes to the right of [ 61.821800] allocated 48-byte region [ffff000081814300, ffff000081814330) [ 61.834807] [ 61.836331] The buggy address belongs to the physical page: [ 61.841979] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101814 [ 61.850079] ksm flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.857038] page_type: f5(slab) [ 61.860239] raw: 0bfffe0000000000 ffff0000800028c0 fffffdffc20ea340 0000000000000007 [ 61.868080] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 61.875917] page dumped because: kasan: bad access detected [ 61.881567] [ 61.883090] Memory state around the buggy address: [ 61.887949] ffff000081814200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.895266] ffff000081814280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.902582] >ffff000081814300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 61.909897] ^ [ 61.914754] ffff000081814380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.922070] ffff000081814400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 61.929385] ================================================================== [ 62.207363] ================================================================== [ 62.214679] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 62.222086] Write of size 4 at addr ffff000081814330 by task kunit_try_catch/374 [ 62.229578] [ 62.231104] CPU: 4 UID: 0 PID: 374 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 62.231133] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.231141] Hardware name: Thundercomm Dragonboard 845c (DT) [ 62.231151] Call trace: [ 62.231157] show_stack+0x20/0x38 (C) [ 62.231174] dump_stack_lvl+0x8c/0xd0 [ 62.231193] print_report+0x118/0x608 [ 62.231211] kasan_report+0xdc/0x128 [ 62.231230] kasan_check_range+0x100/0x1a8 [ 62.231249] __kasan_check_write+0x20/0x30 [ 62.231264] kasan_atomics_helper+0x4e4/0x4858 [ 62.231282] kasan_atomics+0x198/0x2e0 [ 62.231299] kunit_try_run_case+0x170/0x3f0 [ 62.231317] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.231337] kthread+0x328/0x630 [ 62.231350] ret_from_fork+0x10/0x20 [ 62.231367] [ 62.304525] Allocated by task 374: [ 62.307982] kasan_save_stack+0x3c/0x68 [ 62.311881] kasan_save_track+0x20/0x40 [ 62.315782] kasan_save_alloc_info+0x40/0x58 [ 62.320122] __kasan_kmalloc+0xd4/0xd8 [ 62.323933] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.328537] kasan_atomics+0xb8/0x2e0 [ 62.332261] kunit_try_run_case+0x170/0x3f0 [ 62.336515] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.342075] kthread+0x328/0x630 [ 62.345363] ret_from_fork+0x10/0x20 [ 62.349000] [ 62.350524] The buggy address belongs to the object at ffff000081814300 [ 62.350524] which belongs to the cache kmalloc-64 of size 64 [ 62.363006] The buggy address is located 0 bytes to the right of [ 62.363006] allocated 48-byte region [ffff000081814300, ffff000081814330) [ 62.376010] [ 62.377534] The buggy address belongs to the physical page: [ 62.383184] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101814 [ 62.391282] ksm flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.398240] page_type: f5(slab) [ 62.401441] raw: 0bfffe0000000000 ffff0000800028c0 fffffdffc20ea340 0000000000000007 [ 62.409281] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.417117] page dumped because: kasan: bad access detected [ 62.422767] [ 62.424291] Memory state around the buggy address: [ 62.429150] ffff000081814200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.436466] ffff000081814280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.443782] >ffff000081814300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.451095] ^ [ 62.455952] ffff000081814380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.463265] ffff000081814400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.470578] ================================================================== [ 60.319739] ================================================================== [ 60.327049] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 60.334449] Read of size 4 at addr ffff000081814330 by task kunit_try_catch/374 [ 60.341857] [ 60.343383] CPU: 4 UID: 0 PID: 374 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 60.343413] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.343422] Hardware name: Thundercomm Dragonboard 845c (DT) [ 60.343434] Call trace: [ 60.343440] show_stack+0x20/0x38 (C) [ 60.343457] dump_stack_lvl+0x8c/0xd0 [ 60.343477] print_report+0x118/0x608 [ 60.343495] kasan_report+0xdc/0x128 [ 60.343515] kasan_check_range+0x100/0x1a8 [ 60.343534] __kasan_check_read+0x20/0x30 [ 60.343550] kasan_atomics_helper+0x2b0/0x4858 [ 60.343569] kasan_atomics+0x198/0x2e0 [ 60.343587] kunit_try_run_case+0x170/0x3f0 [ 60.343606] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.343628] kthread+0x328/0x630 [ 60.343642] ret_from_fork+0x10/0x20 [ 60.343659] [ 60.416744] Allocated by task 374: [ 60.420202] kasan_save_stack+0x3c/0x68 [ 60.424103] kasan_save_track+0x20/0x40 [ 60.428003] kasan_save_alloc_info+0x40/0x58 [ 60.432344] __kasan_kmalloc+0xd4/0xd8 [ 60.436158] __kmalloc_cache_noprof+0x16c/0x3c0 [ 60.440762] kasan_atomics+0xb8/0x2e0 [ 60.444487] kunit_try_run_case+0x170/0x3f0 [ 60.448744] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.454304] kthread+0x328/0x630 [ 60.457592] ret_from_fork+0x10/0x20 [ 60.461228] [ 60.462753] The buggy address belongs to the object at ffff000081814300 [ 60.462753] which belongs to the cache kmalloc-64 of size 64 [ 60.475235] The buggy address is located 0 bytes to the right of [ 60.475235] allocated 48-byte region [ffff000081814300, ffff000081814330) [ 60.488239] [ 60.489763] The buggy address belongs to the physical page: [ 60.495413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101814 [ 60.503513] ksm flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.510472] page_type: f5(slab) [ 60.513674] raw: 0bfffe0000000000 ffff0000800028c0 fffffdffc20ea340 0000000000000007 [ 60.521513] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 60.529349] page dumped because: kasan: bad access detected [ 60.534999] [ 60.536523] Memory state around the buggy address: [ 60.541380] ffff000081814200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.548695] ffff000081814280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.556011] >ffff000081814300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 60.563324] ^ [ 60.568182] ffff000081814380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.575496] ffff000081814400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 60.582809] ================================================================== [ 62.477958] ================================================================== [ 62.485272] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 62.492679] Write of size 4 at addr ffff000081814330 by task kunit_try_catch/374 [ 62.500172] [ 62.501698] CPU: 4 UID: 0 PID: 374 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 62.501727] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.501735] Hardware name: Thundercomm Dragonboard 845c (DT) [ 62.501745] Call trace: [ 62.501752] show_stack+0x20/0x38 (C) [ 62.501769] dump_stack_lvl+0x8c/0xd0 [ 62.501788] print_report+0x118/0x608 [ 62.501806] kasan_report+0xdc/0x128 [ 62.501824] kasan_check_range+0x100/0x1a8 [ 62.501844] __kasan_check_write+0x20/0x30 [ 62.501861] kasan_atomics_helper+0x54c/0x4858 [ 62.501880] kasan_atomics+0x198/0x2e0 [ 62.501897] kunit_try_run_case+0x170/0x3f0 [ 62.501916] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.501938] kthread+0x328/0x630 [ 62.501952] ret_from_fork+0x10/0x20 [ 62.501969] [ 62.575144] Allocated by task 374: [ 62.578601] kasan_save_stack+0x3c/0x68 [ 62.582502] kasan_save_track+0x20/0x40 [ 62.586399] kasan_save_alloc_info+0x40/0x58 [ 62.590738] __kasan_kmalloc+0xd4/0xd8 [ 62.594549] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.599153] kasan_atomics+0xb8/0x2e0 [ 62.602877] kunit_try_run_case+0x170/0x3f0 [ 62.607133] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.612695] kthread+0x328/0x630 [ 62.615983] ret_from_fork+0x10/0x20 [ 62.619620] [ 62.621144] The buggy address belongs to the object at ffff000081814300 [ 62.621144] which belongs to the cache kmalloc-64 of size 64 [ 62.633626] The buggy address is located 0 bytes to the right of [ 62.633626] allocated 48-byte region [ffff000081814300, ffff000081814330) [ 62.646634] [ 62.648159] The buggy address belongs to the physical page: [ 62.653806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101814 [ 62.661905] ksm flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.668864] page_type: f5(slab) [ 62.672066] raw: 0bfffe0000000000 ffff0000800028c0 fffffdffc20ea340 0000000000000007 [ 62.679905] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.687741] page dumped because: kasan: bad access detected [ 62.693390] [ 62.694914] Memory state around the buggy address: [ 62.699772] ffff000081814200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.707088] ffff000081814280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.714405] >ffff000081814300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.721719] ^ [ 62.726578] ffff000081814380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.733891] ffff000081814400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.741205] ================================================================== [ 62.748571] ================================================================== [ 62.755885] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 62.763293] Write of size 4 at addr ffff000081814330 by task kunit_try_catch/374 [ 62.770784] [ 62.772309] CPU: 4 UID: 0 PID: 374 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 62.772338] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.772346] Hardware name: Thundercomm Dragonboard 845c (DT) [ 62.772356] Call trace: [ 62.772362] show_stack+0x20/0x38 (C) [ 62.772380] dump_stack_lvl+0x8c/0xd0 [ 62.772398] print_report+0x118/0x608 [ 62.772418] kasan_report+0xdc/0x128 [ 62.772436] kasan_check_range+0x100/0x1a8 [ 62.772456] __kasan_check_write+0x20/0x30 [ 62.772472] kasan_atomics_helper+0x5b4/0x4858 [ 62.772490] kasan_atomics+0x198/0x2e0 [ 62.772507] kunit_try_run_case+0x170/0x3f0 [ 62.772526] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.772548] kthread+0x328/0x630 [ 62.772561] ret_from_fork+0x10/0x20 [ 62.772578] [ 62.845742] Allocated by task 374: [ 62.849200] kasan_save_stack+0x3c/0x68 [ 62.853100] kasan_save_track+0x20/0x40 [ 62.857000] kasan_save_alloc_info+0x40/0x58 [ 62.861341] __kasan_kmalloc+0xd4/0xd8 [ 62.865152] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.869754] kasan_atomics+0xb8/0x2e0 [ 62.873476] kunit_try_run_case+0x170/0x3f0 [ 62.877731] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.883302] kthread+0x328/0x630 [ 62.886588] ret_from_fork+0x10/0x20 [ 62.890223] [ 62.891747] The buggy address belongs to the object at ffff000081814300 [ 62.891747] which belongs to the cache kmalloc-64 of size 64 [ 62.904230] The buggy address is located 0 bytes to the right of [ 62.904230] allocated 48-byte region [ffff000081814300, ffff000081814330) [ 62.917235] [ 62.918761] The buggy address belongs to the physical page: [ 62.924411] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101814 [ 62.932510] ksm flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.939468] page_type: f5(slab) [ 62.942668] raw: 0bfffe0000000000 ffff0000800028c0 fffffdffc20ea340 0000000000000007 [ 62.950508] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.958343] page dumped because: kasan: bad access detected [ 62.963993] [ 62.965518] Memory state around the buggy address: [ 62.970375] ffff000081814200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.977693] ffff000081814280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.985008] >ffff000081814300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.992321] ^ [ 62.997179] ffff000081814380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.004493] ffff000081814400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.011808] ================================================================== [ 63.289792] ================================================================== [ 63.297106] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 63.304513] Write of size 4 at addr ffff000081814330 by task kunit_try_catch/374 [ 63.312006] [ 63.313532] CPU: 4 UID: 0 PID: 374 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 63.313561] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.313570] Hardware name: Thundercomm Dragonboard 845c (DT) [ 63.313581] Call trace: [ 63.313587] show_stack+0x20/0x38 (C) [ 63.313603] dump_stack_lvl+0x8c/0xd0 [ 63.313621] print_report+0x118/0x608 [ 63.313639] kasan_report+0xdc/0x128 [ 63.313658] kasan_check_range+0x100/0x1a8 [ 63.313678] __kasan_check_write+0x20/0x30 [ 63.313695] kasan_atomics_helper+0x684/0x4858 [ 63.313713] kasan_atomics+0x198/0x2e0 [ 63.313731] kunit_try_run_case+0x170/0x3f0 [ 63.313749] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.313770] kthread+0x328/0x630 [ 63.313784] ret_from_fork+0x10/0x20 [ 63.313802] [ 63.386957] Allocated by task 374: [ 63.390417] kasan_save_stack+0x3c/0x68 [ 63.394315] kasan_save_track+0x20/0x40 [ 63.398216] kasan_save_alloc_info+0x40/0x58 [ 63.402558] __kasan_kmalloc+0xd4/0xd8 [ 63.406369] __kmalloc_cache_noprof+0x16c/0x3c0 [ 63.410974] kasan_atomics+0xb8/0x2e0 [ 63.414699] kunit_try_run_case+0x170/0x3f0 [ 63.418955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.424517] kthread+0x328/0x630 [ 63.427804] ret_from_fork+0x10/0x20 [ 63.431440] [ 63.432964] The buggy address belongs to the object at ffff000081814300 [ 63.432964] which belongs to the cache kmalloc-64 of size 64 [ 63.445448] The buggy address is located 0 bytes to the right of [ 63.445448] allocated 48-byte region [ffff000081814300, ffff000081814330) [ 63.458456] [ 63.459981] The buggy address belongs to the physical page: [ 63.465629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101814 [ 63.473729] ksm flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.480687] page_type: f5(slab) [ 63.483888] raw: 0bfffe0000000000 ffff0000800028c0 fffffdffc20ea340 0000000000000007 [ 63.491729] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.499566] page dumped because: kasan: bad access detected [ 63.505216] [ 63.506740] Memory state around the buggy address: [ 63.511597] ffff000081814200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.518913] ffff000081814280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.526231] >ffff000081814300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 63.533543] ^ [ 63.538401] ffff000081814380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.545717] ffff000081814400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.553032] ================================================================== [ 61.936763] ================================================================== [ 61.944079] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 61.951488] Write of size 4 at addr ffff000081814330 by task kunit_try_catch/374 [ 61.958979] [ 61.960506] CPU: 4 UID: 0 PID: 374 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 61.960536] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.960543] Hardware name: Thundercomm Dragonboard 845c (DT) [ 61.960555] Call trace: [ 61.960561] show_stack+0x20/0x38 (C) [ 61.960578] dump_stack_lvl+0x8c/0xd0 [ 61.960598] print_report+0x118/0x608 [ 61.960617] kasan_report+0xdc/0x128 [ 61.960636] kasan_check_range+0x100/0x1a8 [ 61.960656] __kasan_check_write+0x20/0x30 [ 61.960671] kasan_atomics_helper+0x47c/0x4858 [ 61.960692] kasan_atomics+0x198/0x2e0 [ 61.960709] kunit_try_run_case+0x170/0x3f0 [ 61.960727] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.960749] kthread+0x328/0x630 [ 61.960764] ret_from_fork+0x10/0x20 [ 61.960781] [ 62.033945] Allocated by task 374: [ 62.037404] kasan_save_stack+0x3c/0x68 [ 62.041305] kasan_save_track+0x20/0x40 [ 62.045202] kasan_save_alloc_info+0x40/0x58 [ 62.049541] __kasan_kmalloc+0xd4/0xd8 [ 62.053353] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.057955] kasan_atomics+0xb8/0x2e0 [ 62.061678] kunit_try_run_case+0x170/0x3f0 [ 62.065932] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.071493] kthread+0x328/0x630 [ 62.074780] ret_from_fork+0x10/0x20 [ 62.078416] [ 62.079940] The buggy address belongs to the object at ffff000081814300 [ 62.079940] which belongs to the cache kmalloc-64 of size 64 [ 62.092423] The buggy address is located 0 bytes to the right of [ 62.092423] allocated 48-byte region [ffff000081814300, ffff000081814330) [ 62.105430] [ 62.106954] The buggy address belongs to the physical page: [ 62.112602] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101814 [ 62.120700] ksm flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.127660] page_type: f5(slab) [ 62.130861] raw: 0bfffe0000000000 ffff0000800028c0 fffffdffc20ea340 0000000000000007 [ 62.138701] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.146536] page dumped because: kasan: bad access detected [ 62.152186] [ 62.153709] Memory state around the buggy address: [ 62.158568] ffff000081814200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.165884] ffff000081814280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.173199] >ffff000081814300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.180513] ^ [ 62.185371] ffff000081814380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.192686] ffff000081814400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.200000] ================================================================== [ 59.510179] ================================================================== [ 59.517505] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 59.525010] Write of size 4 at addr ffff000081814330 by task kunit_try_catch/374 [ 59.532510] [ 59.534047] CPU: 3 UID: 0 PID: 374 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 59.534079] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.534089] Hardware name: Thundercomm Dragonboard 845c (DT) [ 59.534101] Call trace: [ 59.534109] show_stack+0x20/0x38 (C) [ 59.534128] dump_stack_lvl+0x8c/0xd0 [ 59.534149] print_report+0x118/0x608 [ 59.534169] kasan_report+0xdc/0x128 [ 59.534190] __asan_report_store4_noabort+0x20/0x30 [ 59.534209] kasan_atomics_helper+0x3f7c/0x4858 [ 59.534229] kasan_atomics+0x198/0x2e0 [ 59.534249] kunit_try_run_case+0x170/0x3f0 [ 59.534269] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.534292] kthread+0x328/0x630 [ 59.534308] ret_from_fork+0x10/0x20 [ 59.534326] [ 59.604257] Allocated by task 374: [ 59.607720] kasan_save_stack+0x3c/0x68 [ 59.611623] kasan_save_track+0x20/0x40 [ 59.615525] kasan_save_alloc_info+0x40/0x58 [ 59.619863] __kasan_kmalloc+0xd4/0xd8 [ 59.623675] __kmalloc_cache_noprof+0x16c/0x3c0 [ 59.628277] kasan_atomics+0xb8/0x2e0 [ 59.632014] kunit_try_run_case+0x170/0x3f0 [ 59.636271] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.641846] kthread+0x328/0x630 [ 59.645140] ret_from_fork+0x10/0x20 [ 59.648780] [ 59.650312] The buggy address belongs to the object at ffff000081814300 [ 59.650312] which belongs to the cache kmalloc-64 of size 64 [ 59.662799] The buggy address is located 0 bytes to the right of [ 59.662799] allocated 48-byte region [ffff000081814300, ffff000081814330) [ 59.675811] [ 59.677342] The buggy address belongs to the physical page: [ 59.682993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101814 [ 59.691098] ksm flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.698074] page_type: f5(slab) [ 59.701281] raw: 0bfffe0000000000 ffff0000800028c0 fffffdffc20ea340 0000000000000007 [ 59.709131] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 59.716974] page dumped because: kasan: bad access detected [ 59.722628] [ 59.724165] Memory state around the buggy address: [ 59.729030] ffff000081814200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.736355] ffff000081814280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.743673] >ffff000081814300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 59.750990] ^ [ 59.755853] ffff000081814380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.763172] ffff000081814400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 59.770488] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 57.861538] ================================================================== [ 57.868853] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 57.877922] Write of size 8 at addr ffff000098190208 by task kunit_try_catch/370 [ 57.885413] [ 57.886939] CPU: 5 UID: 0 PID: 370 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 57.886969] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.886979] Hardware name: Thundercomm Dragonboard 845c (DT) [ 57.886990] Call trace: [ 57.886996] show_stack+0x20/0x38 (C) [ 57.887013] dump_stack_lvl+0x8c/0xd0 [ 57.887032] print_report+0x118/0x608 [ 57.887051] kasan_report+0xdc/0x128 [ 57.887070] kasan_check_range+0x100/0x1a8 [ 57.887090] __kasan_check_write+0x20/0x30 [ 57.887106] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 57.887129] kasan_bitops_generic+0x11c/0x1c8 [ 57.887146] kunit_try_run_case+0x170/0x3f0 [ 57.887164] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.887187] kthread+0x328/0x630 [ 57.887200] ret_from_fork+0x10/0x20 [ 57.887217] [ 57.962658] Allocated by task 370: [ 57.966115] kasan_save_stack+0x3c/0x68 [ 57.970014] kasan_save_track+0x20/0x40 [ 57.973912] kasan_save_alloc_info+0x40/0x58 [ 57.978251] __kasan_kmalloc+0xd4/0xd8 [ 57.982061] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.986664] kasan_bitops_generic+0xa0/0x1c8 [ 57.991008] kunit_try_run_case+0x170/0x3f0 [ 57.995266] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.000828] kthread+0x328/0x630 [ 58.004115] ret_from_fork+0x10/0x20 [ 58.007752] [ 58.009276] The buggy address belongs to the object at ffff000098190200 [ 58.009276] which belongs to the cache kmalloc-16 of size 16 [ 58.021758] The buggy address is located 8 bytes inside of [ 58.021758] allocated 9-byte region [ffff000098190200, ffff000098190209) [ 58.034159] [ 58.035684] The buggy address belongs to the physical page: [ 58.041333] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x118190 [ 58.049431] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.056041] page_type: f5(slab) [ 58.059242] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 58.067084] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 58.074920] page dumped because: kasan: bad access detected [ 58.080569] [ 58.082093] Memory state around the buggy address: [ 58.086950] ffff000098190100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 58.094266] ffff000098190180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 58.101581] >ffff000098190200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.108894] ^ [ 58.112438] ffff000098190280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.119753] ffff000098190300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.127066] ================================================================== [ 57.319272] ================================================================== [ 57.326589] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 57.335658] Write of size 8 at addr ffff000098190208 by task kunit_try_catch/370 [ 57.343149] [ 57.344675] CPU: 5 UID: 0 PID: 370 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 57.344703] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.344712] Hardware name: Thundercomm Dragonboard 845c (DT) [ 57.344724] Call trace: [ 57.344729] show_stack+0x20/0x38 (C) [ 57.344747] dump_stack_lvl+0x8c/0xd0 [ 57.344767] print_report+0x118/0x608 [ 57.344787] kasan_report+0xdc/0x128 [ 57.344805] kasan_check_range+0x100/0x1a8 [ 57.344824] __kasan_check_write+0x20/0x30 [ 57.344840] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 57.344860] kasan_bitops_generic+0x11c/0x1c8 [ 57.344879] kunit_try_run_case+0x170/0x3f0 [ 57.344896] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.344917] kthread+0x328/0x630 [ 57.344931] ret_from_fork+0x10/0x20 [ 57.344947] [ 57.420392] Allocated by task 370: [ 57.423852] kasan_save_stack+0x3c/0x68 [ 57.427751] kasan_save_track+0x20/0x40 [ 57.431651] kasan_save_alloc_info+0x40/0x58 [ 57.435991] __kasan_kmalloc+0xd4/0xd8 [ 57.439801] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.444405] kasan_bitops_generic+0xa0/0x1c8 [ 57.448748] kunit_try_run_case+0x170/0x3f0 [ 57.453003] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.458575] kthread+0x328/0x630 [ 57.461862] ret_from_fork+0x10/0x20 [ 57.465499] [ 57.467024] The buggy address belongs to the object at ffff000098190200 [ 57.467024] which belongs to the cache kmalloc-16 of size 16 [ 57.479507] The buggy address is located 8 bytes inside of [ 57.479507] allocated 9-byte region [ffff000098190200, ffff000098190209) [ 57.491906] [ 57.493430] The buggy address belongs to the physical page: [ 57.499080] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x118190 [ 57.507180] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.513791] page_type: f5(slab) [ 57.516991] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 57.524831] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 57.532665] page dumped because: kasan: bad access detected [ 57.538315] [ 57.539838] Memory state around the buggy address: [ 57.544696] ffff000098190100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 57.552013] ffff000098190180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 57.559328] >ffff000098190200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.566640] ^ [ 57.570185] ffff000098190280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.577499] ffff000098190300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.584811] ================================================================== [ 57.592191] ================================================================== [ 57.599505] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 57.608576] Read of size 8 at addr ffff000098190208 by task kunit_try_catch/370 [ 57.615982] [ 57.617508] CPU: 5 UID: 0 PID: 370 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 57.617538] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.617546] Hardware name: Thundercomm Dragonboard 845c (DT) [ 57.617557] Call trace: [ 57.617562] show_stack+0x20/0x38 (C) [ 57.617580] dump_stack_lvl+0x8c/0xd0 [ 57.617598] print_report+0x118/0x608 [ 57.617616] kasan_report+0xdc/0x128 [ 57.617635] __asan_report_load8_noabort+0x20/0x30 [ 57.617650] kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 57.617672] kasan_bitops_generic+0x11c/0x1c8 [ 57.617689] kunit_try_run_case+0x170/0x3f0 [ 57.617707] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.617727] kthread+0x328/0x630 [ 57.617740] ret_from_fork+0x10/0x20 [ 57.617757] [ 57.689768] Allocated by task 370: [ 57.693225] kasan_save_stack+0x3c/0x68 [ 57.697126] kasan_save_track+0x20/0x40 [ 57.701027] kasan_save_alloc_info+0x40/0x58 [ 57.705368] __kasan_kmalloc+0xd4/0xd8 [ 57.709179] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.713783] kasan_bitops_generic+0xa0/0x1c8 [ 57.718126] kunit_try_run_case+0x170/0x3f0 [ 57.722383] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.727943] kthread+0x328/0x630 [ 57.731230] ret_from_fork+0x10/0x20 [ 57.734865] [ 57.736390] The buggy address belongs to the object at ffff000098190200 [ 57.736390] which belongs to the cache kmalloc-16 of size 16 [ 57.748873] The buggy address is located 8 bytes inside of [ 57.748873] allocated 9-byte region [ffff000098190200, ffff000098190209) [ 57.761271] [ 57.762795] The buggy address belongs to the physical page: [ 57.768443] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x118190 [ 57.776542] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.783153] page_type: f5(slab) [ 57.786355] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 57.794195] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 57.802033] page dumped because: kasan: bad access detected [ 57.807681] [ 57.809204] Memory state around the buggy address: [ 57.814061] ffff000098190100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 57.821375] ffff000098190180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 57.828688] >ffff000098190200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.835999] ^ [ 57.839543] ffff000098190280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.846858] ffff000098190300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.854170] ================================================================== [ 56.777168] ================================================================== [ 56.784483] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 56.793464] Write of size 8 at addr ffff000098190208 by task kunit_try_catch/370 [ 56.800956] [ 56.802481] CPU: 5 UID: 0 PID: 370 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 56.802513] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.802521] Hardware name: Thundercomm Dragonboard 845c (DT) [ 56.802533] Call trace: [ 56.802540] show_stack+0x20/0x38 (C) [ 56.802558] dump_stack_lvl+0x8c/0xd0 [ 56.802577] print_report+0x118/0x608 [ 56.802596] kasan_report+0xdc/0x128 [ 56.802614] kasan_check_range+0x100/0x1a8 [ 56.802635] __kasan_check_write+0x20/0x30 [ 56.802651] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 56.802675] kasan_bitops_generic+0x11c/0x1c8 [ 56.802694] kunit_try_run_case+0x170/0x3f0 [ 56.802713] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.802733] kthread+0x328/0x630 [ 56.802748] ret_from_fork+0x10/0x20 [ 56.802766] [ 56.878134] Allocated by task 370: [ 56.881592] kasan_save_stack+0x3c/0x68 [ 56.885493] kasan_save_track+0x20/0x40 [ 56.889392] kasan_save_alloc_info+0x40/0x58 [ 56.893733] __kasan_kmalloc+0xd4/0xd8 [ 56.897545] __kmalloc_cache_noprof+0x16c/0x3c0 [ 56.902146] kasan_bitops_generic+0xa0/0x1c8 [ 56.906488] kunit_try_run_case+0x170/0x3f0 [ 56.910745] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.916306] kthread+0x328/0x630 [ 56.919593] ret_from_fork+0x10/0x20 [ 56.923231] [ 56.924755] The buggy address belongs to the object at ffff000098190200 [ 56.924755] which belongs to the cache kmalloc-16 of size 16 [ 56.937236] The buggy address is located 8 bytes inside of [ 56.937236] allocated 9-byte region [ffff000098190200, ffff000098190209) [ 56.949636] [ 56.951161] The buggy address belongs to the physical page: [ 56.956809] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x118190 [ 56.964910] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.971520] page_type: f5(slab) [ 56.974720] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 56.982560] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 56.990394] page dumped because: kasan: bad access detected [ 56.996043] [ 56.997567] Memory state around the buggy address: [ 57.002427] ffff000098190100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 57.009743] ffff000098190180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 57.017056] >ffff000098190200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.024370] ^ [ 57.027914] ffff000098190280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.035230] ffff000098190300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.042543] ================================================================== [ 58.134445] ================================================================== [ 58.141761] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 58.150830] Read of size 8 at addr ffff000098190208 by task kunit_try_catch/370 [ 58.158236] [ 58.159762] CPU: 5 UID: 0 PID: 370 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 58.159792] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.159801] Hardware name: Thundercomm Dragonboard 845c (DT) [ 58.159812] Call trace: [ 58.159817] show_stack+0x20/0x38 (C) [ 58.159834] dump_stack_lvl+0x8c/0xd0 [ 58.159853] print_report+0x118/0x608 [ 58.159872] kasan_report+0xdc/0x128 [ 58.159890] __asan_report_load8_noabort+0x20/0x30 [ 58.159907] kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 58.159929] kasan_bitops_generic+0x11c/0x1c8 [ 58.159948] kunit_try_run_case+0x170/0x3f0 [ 58.159965] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.159986] kthread+0x328/0x630 [ 58.160000] ret_from_fork+0x10/0x20 [ 58.160017] [ 58.232025] Allocated by task 370: [ 58.235484] kasan_save_stack+0x3c/0x68 [ 58.239385] kasan_save_track+0x20/0x40 [ 58.243284] kasan_save_alloc_info+0x40/0x58 [ 58.247624] __kasan_kmalloc+0xd4/0xd8 [ 58.251435] __kmalloc_cache_noprof+0x16c/0x3c0 [ 58.256039] kasan_bitops_generic+0xa0/0x1c8 [ 58.260383] kunit_try_run_case+0x170/0x3f0 [ 58.264640] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.270213] kthread+0x328/0x630 [ 58.273502] ret_from_fork+0x10/0x20 [ 58.277139] [ 58.278662] The buggy address belongs to the object at ffff000098190200 [ 58.278662] which belongs to the cache kmalloc-16 of size 16 [ 58.291144] The buggy address is located 8 bytes inside of [ 58.291144] allocated 9-byte region [ffff000098190200, ffff000098190209) [ 58.303544] [ 58.305069] The buggy address belongs to the physical page: [ 58.310718] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x118190 [ 58.318817] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.325427] page_type: f5(slab) [ 58.328627] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 58.336464] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 58.344300] page dumped because: kasan: bad access detected [ 58.349950] [ 58.351474] Memory state around the buggy address: [ 58.356333] ffff000098190100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 58.363649] ffff000098190180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 58.370963] >ffff000098190200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.378275] ^ [ 58.381819] ffff000098190280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.389134] ffff000098190300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.396447] ================================================================== [ 57.049920] ================================================================== [ 57.057237] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 57.066305] Read of size 8 at addr ffff000098190208 by task kunit_try_catch/370 [ 57.073712] [ 57.075239] CPU: 5 UID: 0 PID: 370 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 57.075269] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.075278] Hardware name: Thundercomm Dragonboard 845c (DT) [ 57.075288] Call trace: [ 57.075294] show_stack+0x20/0x38 (C) [ 57.075314] dump_stack_lvl+0x8c/0xd0 [ 57.075333] print_report+0x118/0x608 [ 57.075352] kasan_report+0xdc/0x128 [ 57.075370] __asan_report_load8_noabort+0x20/0x30 [ 57.075386] kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 57.075408] kasan_bitops_generic+0x11c/0x1c8 [ 57.075427] kunit_try_run_case+0x170/0x3f0 [ 57.075446] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.075468] kthread+0x328/0x630 [ 57.075481] ret_from_fork+0x10/0x20 [ 57.075498] [ 57.147496] Allocated by task 370: [ 57.150954] kasan_save_stack+0x3c/0x68 [ 57.154856] kasan_save_track+0x20/0x40 [ 57.158756] kasan_save_alloc_info+0x40/0x58 [ 57.163097] __kasan_kmalloc+0xd4/0xd8 [ 57.166907] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.171510] kasan_bitops_generic+0xa0/0x1c8 [ 57.175855] kunit_try_run_case+0x170/0x3f0 [ 57.180110] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.185674] kthread+0x328/0x630 [ 57.188961] ret_from_fork+0x10/0x20 [ 57.192598] [ 57.194122] The buggy address belongs to the object at ffff000098190200 [ 57.194122] which belongs to the cache kmalloc-16 of size 16 [ 57.206606] The buggy address is located 8 bytes inside of [ 57.206606] allocated 9-byte region [ffff000098190200, ffff000098190209) [ 57.219004] [ 57.220528] The buggy address belongs to the physical page: [ 57.226178] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x118190 [ 57.234276] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.240886] page_type: f5(slab) [ 57.244087] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 57.251925] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 57.259762] page dumped because: kasan: bad access detected [ 57.265410] [ 57.266933] Memory state around the buggy address: [ 57.271791] ffff000098190100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 57.279105] ffff000098190180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 57.286421] >ffff000098190200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.293733] ^ [ 57.297278] ffff000098190280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.304592] ffff000098190300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.311906] ================================================================== [ 58.403814] ================================================================== [ 58.411129] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 58.420195] Write of size 8 at addr ffff000098190208 by task kunit_try_catch/370 [ 58.427686] [ 58.429212] CPU: 5 UID: 0 PID: 370 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 58.429239] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.429248] Hardware name: Thundercomm Dragonboard 845c (DT) [ 58.429258] Call trace: [ 58.429264] show_stack+0x20/0x38 (C) [ 58.429282] dump_stack_lvl+0x8c/0xd0 [ 58.429301] print_report+0x118/0x608 [ 58.429320] kasan_report+0xdc/0x128 [ 58.429337] kasan_check_range+0x100/0x1a8 [ 58.429357] __kasan_check_write+0x20/0x30 [ 58.429373] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 58.429395] kasan_bitops_generic+0x11c/0x1c8 [ 58.429413] kunit_try_run_case+0x170/0x3f0 [ 58.429431] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.429452] kthread+0x328/0x630 [ 58.429466] ret_from_fork+0x10/0x20 [ 58.429485] [ 58.504918] Allocated by task 370: [ 58.508375] kasan_save_stack+0x3c/0x68 [ 58.512274] kasan_save_track+0x20/0x40 [ 58.516174] kasan_save_alloc_info+0x40/0x58 [ 58.520514] __kasan_kmalloc+0xd4/0xd8 [ 58.524325] __kmalloc_cache_noprof+0x16c/0x3c0 [ 58.528928] kasan_bitops_generic+0xa0/0x1c8 [ 58.533272] kunit_try_run_case+0x170/0x3f0 [ 58.537528] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.543100] kthread+0x328/0x630 [ 58.546388] ret_from_fork+0x10/0x20 [ 58.550024] [ 58.551548] The buggy address belongs to the object at ffff000098190200 [ 58.551548] which belongs to the cache kmalloc-16 of size 16 [ 58.564032] The buggy address is located 8 bytes inside of [ 58.564032] allocated 9-byte region [ffff000098190200, ffff000098190209) [ 58.576431] [ 58.577955] The buggy address belongs to the physical page: [ 58.583603] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x118190 [ 58.591702] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.598313] page_type: f5(slab) [ 58.601514] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 58.609354] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 58.617188] page dumped because: kasan: bad access detected [ 58.622837] [ 58.624361] Memory state around the buggy address: [ 58.629218] ffff000098190100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 58.636533] ffff000098190180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 58.643847] >ffff000098190200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.651160] ^ [ 58.654706] ffff000098190280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.662021] ffff000098190300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.669334] ================================================================== [ 58.676712] ================================================================== [ 58.684026] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 58.693094] Read of size 8 at addr ffff000098190208 by task kunit_try_catch/370 [ 58.700499] [ 58.702026] CPU: 5 UID: 0 PID: 370 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 58.702056] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.702064] Hardware name: Thundercomm Dragonboard 845c (DT) [ 58.702075] Call trace: [ 58.702081] show_stack+0x20/0x38 (C) [ 58.702098] dump_stack_lvl+0x8c/0xd0 [ 58.702118] print_report+0x118/0x608 [ 58.702137] kasan_report+0xdc/0x128 [ 58.702155] __asan_report_load8_noabort+0x20/0x30 [ 58.702171] kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 58.702193] kasan_bitops_generic+0x11c/0x1c8 [ 58.702211] kunit_try_run_case+0x170/0x3f0 [ 58.702229] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.702250] kthread+0x328/0x630 [ 58.702263] ret_from_fork+0x10/0x20 [ 58.702280] [ 58.774303] Allocated by task 370: [ 58.777760] kasan_save_stack+0x3c/0x68 [ 58.781659] kasan_save_track+0x20/0x40 [ 58.785559] kasan_save_alloc_info+0x40/0x58 [ 58.789898] __kasan_kmalloc+0xd4/0xd8 [ 58.793711] __kmalloc_cache_noprof+0x16c/0x3c0 [ 58.798316] kasan_bitops_generic+0xa0/0x1c8 [ 58.802659] kunit_try_run_case+0x170/0x3f0 [ 58.806916] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.812476] kthread+0x328/0x630 [ 58.815764] ret_from_fork+0x10/0x20 [ 58.819402] [ 58.820927] The buggy address belongs to the object at ffff000098190200 [ 58.820927] which belongs to the cache kmalloc-16 of size 16 [ 58.833408] The buggy address is located 8 bytes inside of [ 58.833408] allocated 9-byte region [ffff000098190200, ffff000098190209) [ 58.845806] [ 58.847332] The buggy address belongs to the physical page: [ 58.852979] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x118190 [ 58.861078] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.867688] page_type: f5(slab) [ 58.870891] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 58.878729] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 58.886563] page dumped because: kasan: bad access detected [ 58.892212] [ 58.893737] Memory state around the buggy address: [ 58.898594] ffff000098190100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 58.905909] ffff000098190180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 58.913226] >ffff000098190200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.920539] ^ [ 58.924084] ffff000098190280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.931400] ffff000098190300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.938711] ================================================================== [ 58.946076] ================================================================== [ 58.953391] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 58.962460] Read of size 8 at addr ffff000098190208 by task kunit_try_catch/370 [ 58.969862] [ 58.971390] CPU: 5 UID: 0 PID: 370 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 58.971419] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.971427] Hardware name: Thundercomm Dragonboard 845c (DT) [ 58.971437] Call trace: [ 58.971444] show_stack+0x20/0x38 (C) [ 58.971462] dump_stack_lvl+0x8c/0xd0 [ 58.971480] print_report+0x118/0x608 [ 58.971499] kasan_report+0xdc/0x128 [ 58.971516] __asan_report_load8_noabort+0x20/0x30 [ 58.971533] kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 58.971555] kasan_bitops_generic+0x11c/0x1c8 [ 58.971572] kunit_try_run_case+0x170/0x3f0 [ 58.971589] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.971610] kthread+0x328/0x630 [ 58.971623] ret_from_fork+0x10/0x20 [ 58.971640] [ 59.043645] Allocated by task 370: [ 59.047103] kasan_save_stack+0x3c/0x68 [ 59.051003] kasan_save_track+0x20/0x40 [ 59.054901] kasan_save_alloc_info+0x40/0x58 [ 59.059241] __kasan_kmalloc+0xd4/0xd8 [ 59.063053] __kmalloc_cache_noprof+0x16c/0x3c0 [ 59.067656] kasan_bitops_generic+0xa0/0x1c8 [ 59.071998] kunit_try_run_case+0x170/0x3f0 [ 59.076252] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.081822] kthread+0x328/0x630 [ 59.085108] ret_from_fork+0x10/0x20 [ 59.088744] [ 59.090268] The buggy address belongs to the object at ffff000098190200 [ 59.090268] which belongs to the cache kmalloc-16 of size 16 [ 59.102752] The buggy address is located 8 bytes inside of [ 59.102752] allocated 9-byte region [ffff000098190200, ffff000098190209) [ 59.115149] [ 59.116674] The buggy address belongs to the physical page: [ 59.122323] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x118190 [ 59.130422] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.137031] page_type: f5(slab) [ 59.140233] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 59.148073] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 59.155909] page dumped because: kasan: bad access detected [ 59.161558] [ 59.163082] Memory state around the buggy address: [ 59.167940] ffff000098190100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 59.175256] ffff000098190180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 59.182572] >ffff000098190200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.189884] ^ [ 59.193429] ffff000098190280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.200743] ffff000098190300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.208057] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[ 54.887139] ================================================================== [ 54.894452] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 54.902736] Read of size 8 at addr ffff000098190208 by task kunit_try_catch/370 [ 54.910144] [ 54.911677] CPU: 6 UID: 0 PID: 370 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 54.911707] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.911717] Hardware name: Thundercomm Dragonboard 845c (DT) [ 54.911727] Call trace: [ 54.911733] show_stack+0x20/0x38 (C) [ 54.911751] dump_stack_lvl+0x8c/0xd0 [ 54.911770] print_report+0x118/0x608 [ 54.911790] kasan_report+0xdc/0x128 [ 54.911809] __asan_report_load8_noabort+0x20/0x30 [ 54.911828] kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 54.911848] kasan_bitops_generic+0x110/0x1c8 [ 54.911866] kunit_try_run_case+0x170/0x3f0 [ 54.911885] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.911907] kthread+0x328/0x630 [ 54.911920] ret_from_fork+0x10/0x20 [ 54.911937] [ 54.983160] Allocated by task 370: [ 54.986616] kasan_save_stack+0x3c/0x68 [ 54.990516] kasan_save_track+0x20/0x40 [ 54.994421] kasan_save_alloc_info+0x40/0x58 [ 54.998762] __kasan_kmalloc+0xd4/0xd8 [ 55.002581] __kmalloc_cache_noprof+0x16c/0x3c0 [ 55.007181] kasan_bitops_generic+0xa0/0x1c8 [ 55.011519] kunit_try_run_case+0x170/0x3f0 [ 55.015771] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.021340] kthread+0x328/0x630 [ 55.024624] ret_from_fork+0x10/0x20 [ 55.028260] [ 55.029783] The buggy address belongs to the object at ffff000098190200 [ 55.029783] which belongs to the cache kmalloc-16 of size 16 [ 55.042267] The buggy address is located 8 bytes inside of [ 55.042267] allocated 9-byte region [ffff000098190200, ffff000098190209) [ 55.054657] [ 55.056188] The buggy address belongs to the physical page: [ 55.061836] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x118190 [ 55.069936] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.076552] page_type: f5(slab) [ 55.079749] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 55.087594] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 55.095433] page dumped because: kasan: bad access detected [ 55.101080] [ 55.102603] Memory state around the buggy address: [ 55.107454] ffff000098190100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 55.114765] ffff000098190180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 55.122074] >ffff000098190200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.129382] ^ [ 55.132922] ffff000098190280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.140232] ffff000098190300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.147541] ================================================================== [ 55.154969] ================================================================== [ 55.162283] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 55.170565] Write of size 8 at addr ffff000098190208 by task kunit_try_catch/370 [ 55.178049] [ 55.179585] CPU: 6 UID: 0 PID: 370 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 55.179615] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.179625] Hardware name: Thundercomm Dragonboard 845c (DT) [ 55.179636] Call trace: [ 55.179643] show_stack+0x20/0x38 (C) [ 55.179660] dump_stack_lvl+0x8c/0xd0 [ 55.179679] print_report+0x118/0x608 [ 55.179698] kasan_report+0xdc/0x128 [ 55.179716] kasan_check_range+0x100/0x1a8 [ 55.179736] __kasan_check_write+0x20/0x30 [ 55.179752] kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 55.179773] kasan_bitops_generic+0x110/0x1c8 [ 55.179790] kunit_try_run_case+0x170/0x3f0 [ 55.179809] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.179829] kthread+0x328/0x630 [ 55.179842] ret_from_fork+0x10/0x20 [ 55.179860] [ 55.254493] Allocated by task 370: [ 55.257946] kasan_save_stack+0x3c/0x68 [ 55.261845] kasan_save_track+0x20/0x40 [ 55.265751] kasan_save_alloc_info+0x40/0x58 [ 55.270089] __kasan_kmalloc+0xd4/0xd8 [ 55.273907] __kmalloc_cache_noprof+0x16c/0x3c0 [ 55.278509] kasan_bitops_generic+0xa0/0x1c8 [ 55.282847] kunit_try_run_case+0x170/0x3f0 [ 55.287100] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.292668] kthread+0x328/0x630 [ 55.295951] ret_from_fork+0x10/0x20 [ 55.299587] [ 55.301110] The buggy address belongs to the object at ffff000098190200 [ 55.301110] which belongs to the cache kmalloc-16 of size 16 [ 55.313593] The buggy address is located 8 bytes inside of [ 55.313593] allocated 9-byte region [ffff000098190200, ffff000098190209) [ 55.325983] [ 55.327514] The buggy address belongs to the physical page: [ 55.333159] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x118190 [ 55.341261] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.347876] page_type: f5(slab) [ 55.351077] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 55.358921] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 55.366760] page dumped because: kasan: bad access detected [ 55.372403] [ 55.373925] Memory state around the buggy address: [ 55.378780] ffff000098190100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 55.386089] ffff000098190180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 55.393397] >ffff000098190200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.400702] ^ [ 55.404244] ffff000098190280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.411554] ffff000098190300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.418863] ================================================================== [ 56.238014] ================================================================== [ 56.245335] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 56.253618] Write of size 8 at addr ffff000098190208 by task kunit_try_catch/370 [ 56.261106] [ 56.262634] CPU: 5 UID: 0 PID: 370 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 56.262663] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.262672] Hardware name: Thundercomm Dragonboard 845c (DT) [ 56.262685] Call trace: [ 56.262691] show_stack+0x20/0x38 (C) [ 56.262709] dump_stack_lvl+0x8c/0xd0 [ 56.262728] print_report+0x118/0x608 [ 56.262746] kasan_report+0xdc/0x128 [ 56.262765] kasan_check_range+0x100/0x1a8 [ 56.262785] __kasan_check_write+0x20/0x30 [ 56.262801] kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 56.262823] kasan_bitops_generic+0x110/0x1c8 [ 56.262840] kunit_try_run_case+0x170/0x3f0 [ 56.262858] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.262878] kthread+0x328/0x630 [ 56.262892] ret_from_fork+0x10/0x20 [ 56.262911] [ 56.337562] Allocated by task 370: [ 56.341019] kasan_save_stack+0x3c/0x68 [ 56.344919] kasan_save_track+0x20/0x40 [ 56.348818] kasan_save_alloc_info+0x40/0x58 [ 56.353158] __kasan_kmalloc+0xd4/0xd8 [ 56.356969] __kmalloc_cache_noprof+0x16c/0x3c0 [ 56.361572] kasan_bitops_generic+0xa0/0x1c8 [ 56.365915] kunit_try_run_case+0x170/0x3f0 [ 56.370172] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.375743] kthread+0x328/0x630 [ 56.379030] ret_from_fork+0x10/0x20 [ 56.382667] [ 56.384190] The buggy address belongs to the object at ffff000098190200 [ 56.384190] which belongs to the cache kmalloc-16 of size 16 [ 56.396673] The buggy address is located 8 bytes inside of [ 56.396673] allocated 9-byte region [ffff000098190200, ffff000098190209) [ 56.409072] [ 56.410598] The buggy address belongs to the physical page: [ 56.416246] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x118190 [ 56.424343] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.430954] page_type: f5(slab) [ 56.434155] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 56.441993] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 56.449830] page dumped because: kasan: bad access detected [ 56.455478] [ 56.457002] Memory state around the buggy address: [ 56.461858] ffff000098190100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 56.469173] ffff000098190180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 56.476489] >ffff000098190200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.483803] ^ [ 56.487346] ffff000098190280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.494662] ffff000098190300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.501976] ================================================================== [ 55.698846] ================================================================== [ 55.706168] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 55.714455] Read of size 8 at addr ffff000098190208 by task kunit_try_catch/370 [ 55.721865] [ 55.723402] CPU: 5 UID: 0 PID: 370 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 55.723433] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.723442] Hardware name: Thundercomm Dragonboard 845c (DT) [ 55.723454] Call trace: [ 55.723460] show_stack+0x20/0x38 (C) [ 55.723480] dump_stack_lvl+0x8c/0xd0 [ 55.723500] print_report+0x118/0x608 [ 55.723520] kasan_report+0xdc/0x128 [ 55.723538] __asan_report_load8_noabort+0x20/0x30 [ 55.723555] kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 55.723577] kasan_bitops_generic+0x110/0x1c8 [ 55.723595] kunit_try_run_case+0x170/0x3f0 [ 55.723614] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.723636] kthread+0x328/0x630 [ 55.723650] ret_from_fork+0x10/0x20 [ 55.723668] [ 55.794876] Allocated by task 370: [ 55.798330] kasan_save_stack+0x3c/0x68 [ 55.802237] kasan_save_track+0x20/0x40 [ 55.806142] kasan_save_alloc_info+0x40/0x58 [ 55.810480] __kasan_kmalloc+0xd4/0xd8 [ 55.814298] __kmalloc_cache_noprof+0x16c/0x3c0 [ 55.818899] kasan_bitops_generic+0xa0/0x1c8 [ 55.823235] kunit_try_run_case+0x170/0x3f0 [ 55.827484] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.833052] kthread+0x328/0x630 [ 55.836335] ret_from_fork+0x10/0x20 [ 55.839968] [ 55.841493] The buggy address belongs to the object at ffff000098190200 [ 55.841493] which belongs to the cache kmalloc-16 of size 16 [ 55.853975] The buggy address is located 8 bytes inside of [ 55.853975] allocated 9-byte region [ffff000098190200, ffff000098190209) [ 55.866376] [ 55.867906] The buggy address belongs to the physical page: [ 55.873552] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x118190 [ 55.881653] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.888269] page_type: f5(slab) [ 55.891464] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 55.899310] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 55.907147] page dumped because: kasan: bad access detected [ 55.912790] [ 55.914315] Memory state around the buggy address: [ 55.919175] ffff000098190100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 55.926485] ffff000098190180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 55.933806] >ffff000098190200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.941121] ^ [ 55.944665] ffff000098190280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.951983] ffff000098190300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.959290] ================================================================== [ 55.426466] ================================================================== [ 55.433799] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 55.442093] Write of size 8 at addr ffff000098190208 by task kunit_try_catch/370 [ 55.449593] [ 55.451127] CPU: 2 UID: 0 PID: 370 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 55.451158] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.451166] Hardware name: Thundercomm Dragonboard 845c (DT) [ 55.451179] Call trace: [ 55.451185] show_stack+0x20/0x38 (C) [ 55.451203] dump_stack_lvl+0x8c/0xd0 [ 55.451224] print_report+0x118/0x608 [ 55.451244] kasan_report+0xdc/0x128 [ 55.451264] kasan_check_range+0x100/0x1a8 [ 55.451286] __kasan_check_write+0x20/0x30 [ 55.451304] kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 55.451326] kasan_bitops_generic+0x110/0x1c8 [ 55.451345] kunit_try_run_case+0x170/0x3f0 [ 55.451365] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.451388] kthread+0x328/0x630 [ 55.451404] ret_from_fork+0x10/0x20 [ 55.451422] [ 55.526115] Allocated by task 370: [ 55.529583] kasan_save_stack+0x3c/0x68 [ 55.533492] kasan_save_track+0x20/0x40 [ 55.537397] kasan_save_alloc_info+0x40/0x58 [ 55.541743] __kasan_kmalloc+0xd4/0xd8 [ 55.545561] __kmalloc_cache_noprof+0x16c/0x3c0 [ 55.550168] kasan_bitops_generic+0xa0/0x1c8 [ 55.554517] kunit_try_run_case+0x170/0x3f0 [ 55.558778] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.564349] kthread+0x328/0x630 [ 55.567639] ret_from_fork+0x10/0x20 [ 55.571283] [ 55.572814] The buggy address belongs to the object at ffff000098190200 [ 55.572814] which belongs to the cache kmalloc-16 of size 16 [ 55.585305] The buggy address is located 8 bytes inside of [ 55.585305] allocated 9-byte region [ffff000098190200, ffff000098190209) [ 55.597712] [ 55.599243] The buggy address belongs to the physical page: [ 55.604889] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x118190 [ 55.612997] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.619613] page_type: f5(slab) [ 55.622814] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 55.630663] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 55.638507] page dumped because: kasan: bad access detected [ 55.644155] [ 55.645686] Memory state around the buggy address: [ 55.650545] ffff000098190100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 55.657862] ffff000098190180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 55.665179] >ffff000098190200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.672492] ^ [ 55.676046] ffff000098190280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.683363] ffff000098190300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.690676] ================================================================== [ 54.071719] ================================================================== [ 54.082931] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 54.091226] Write of size 8 at addr ffff000098190208 by task kunit_try_catch/370 [ 54.098720] [ 54.100261] CPU: 3 UID: 0 PID: 370 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 54.100294] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.100305] Hardware name: Thundercomm Dragonboard 845c (DT) [ 54.100318] Call trace: [ 54.100326] show_stack+0x20/0x38 (C) [ 54.100345] dump_stack_lvl+0x8c/0xd0 [ 54.100366] print_report+0x118/0x608 [ 54.100388] kasan_report+0xdc/0x128 [ 54.100408] kasan_check_range+0x100/0x1a8 [ 54.100430] __kasan_check_write+0x20/0x30 [ 54.100447] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 54.100468] kasan_bitops_generic+0x110/0x1c8 [ 54.100488] kunit_try_run_case+0x170/0x3f0 [ 54.100507] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.100529] kthread+0x328/0x630 [ 54.100545] ret_from_fork+0x10/0x20 [ 54.100566] [ 54.175268] Allocated by task 370: [ 54.178732] kasan_save_stack+0x3c/0x68 [ 54.182645] kasan_save_track+0x20/0x40 [ 54.186558] kasan_save_alloc_info+0x40/0x58 [ 54.190898] __kasan_kmalloc+0xd4/0xd8 [ 54.194713] __kmalloc_cache_noprof+0x16c/0x3c0 [ 54.199325] kasan_bitops_generic+0xa0/0x1c8 [ 54.203667] kunit_try_run_case+0x170/0x3f0 [ 54.207923] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.213502] kthread+0x328/0x630 [ 54.216797] ret_from_fork+0x10/0x20 [ 54.220437] [ 54.221971] The buggy address belongs to the object at ffff000098190200 [ 54.221971] which belongs to the cache kmalloc-16 of size 16 [ 54.234457] The buggy address is located 8 bytes inside of [ 54.234457] allocated 9-byte region [ffff000098190200, ffff000098190209) [ 54.246860] [ 54.248397] The buggy address belongs to the physical page: [ 54.254048] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x118190 [ 54.262155] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.268772] page_type: f5(slab) [ 54.271980] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 54.279828] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 54.287674] page dumped because: kasan: bad access detected [ 54.293326] [ 54.294857] Memory state around the buggy address: [ 54.299719] ffff000098190100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 54.307037] ffff000098190180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 54.314355] >ffff000098190200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.321672] ^ [ 54.325222] ffff000098190280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.332540] ffff000098190300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.339855] ================================================================== [ 54.347272] ================================================================== [ 54.354590] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 54.362875] Read of size 8 at addr ffff000098190208 by task kunit_try_catch/370 [ 54.370280] [ 54.371822] CPU: 3 UID: 0 PID: 370 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 54.371854] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.371863] Hardware name: Thundercomm Dragonboard 845c (DT) [ 54.371875] Call trace: [ 54.371884] show_stack+0x20/0x38 (C) [ 54.371904] dump_stack_lvl+0x8c/0xd0 [ 54.371924] print_report+0x118/0x608 [ 54.371944] kasan_report+0xdc/0x128 [ 54.371965] __asan_report_load8_noabort+0x20/0x30 [ 54.371984] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 54.372006] kasan_bitops_generic+0x110/0x1c8 [ 54.372027] kunit_try_run_case+0x170/0x3f0 [ 54.372047] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.372072] kthread+0x328/0x630 [ 54.372087] ret_from_fork+0x10/0x20 [ 54.372106] [ 54.443352] Allocated by task 370: [ 54.446819] kasan_save_stack+0x3c/0x68 [ 54.450731] kasan_save_track+0x20/0x40 [ 54.454644] kasan_save_alloc_info+0x40/0x58 [ 54.458984] __kasan_kmalloc+0xd4/0xd8 [ 54.462798] __kmalloc_cache_noprof+0x16c/0x3c0 [ 54.467411] kasan_bitops_generic+0xa0/0x1c8 [ 54.471751] kunit_try_run_case+0x170/0x3f0 [ 54.476007] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.481586] kthread+0x328/0x630 [ 54.484879] ret_from_fork+0x10/0x20 [ 54.488519] [ 54.490051] The buggy address belongs to the object at ffff000098190200 [ 54.490051] which belongs to the cache kmalloc-16 of size 16 [ 54.502539] The buggy address is located 8 bytes inside of [ 54.502539] allocated 9-byte region [ffff000098190200, ffff000098190209) [ 54.514941] [ 54.516479] The buggy address belongs to the physical page: [ 54.522130] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x118190 [ 54.530239] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.536853] page_type: f5(slab) [ 54.540059] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 54.547909] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 54.555753] page dumped because: kasan: bad access detected [ 54.561404] [ 54.562934] Memory state around the buggy address: [ 54.567795] ffff000098190100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 54.575115] ffff000098190180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 54.582434] >ffff000098190200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.589749] ^ [ 54.593299] ffff000098190280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.600616] ffff000098190300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.607931] ================================================================== [ 55.966700] ================================================================== [ 55.974024] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 55.982306] Write of size 8 at addr ffff000098190208 by task kunit_try_catch/370 [ 55.989801] [ 55.991334] CPU: 5 UID: 0 PID: 370 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 55.991363] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.991371] Hardware name: Thundercomm Dragonboard 845c (DT) [ 55.991382] Call trace: [ 55.991389] show_stack+0x20/0x38 (C) [ 55.991407] dump_stack_lvl+0x8c/0xd0 [ 55.991426] print_report+0x118/0x608 [ 55.991445] kasan_report+0xdc/0x128 [ 55.991462] kasan_check_range+0x100/0x1a8 [ 55.991482] __kasan_check_write+0x20/0x30 [ 55.991497] kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 55.991516] kasan_bitops_generic+0x110/0x1c8 [ 55.991535] kunit_try_run_case+0x170/0x3f0 [ 55.991554] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.991576] kthread+0x328/0x630 [ 55.991590] ret_from_fork+0x10/0x20 [ 55.991606] [ 56.066247] Allocated by task 370: [ 56.069700] kasan_save_stack+0x3c/0x68 [ 56.073597] kasan_save_track+0x20/0x40 [ 56.077503] kasan_save_alloc_info+0x40/0x58 [ 56.081840] __kasan_kmalloc+0xd4/0xd8 [ 56.085657] __kmalloc_cache_noprof+0x16c/0x3c0 [ 56.090260] kasan_bitops_generic+0xa0/0x1c8 [ 56.094598] kunit_try_run_case+0x170/0x3f0 [ 56.098851] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.104413] kthread+0x328/0x630 [ 56.107694] ret_from_fork+0x10/0x20 [ 56.111325] [ 56.112859] The buggy address belongs to the object at ffff000098190200 [ 56.112859] which belongs to the cache kmalloc-16 of size 16 [ 56.125340] The buggy address is located 8 bytes inside of [ 56.125340] allocated 9-byte region [ffff000098190200, ffff000098190209) [ 56.137737] [ 56.139270] The buggy address belongs to the physical page: [ 56.144913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x118190 [ 56.153014] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.159626] page_type: f5(slab) [ 56.162829] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 56.170669] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 56.178506] page dumped because: kasan: bad access detected [ 56.184149] [ 56.185672] Memory state around the buggy address: [ 56.190524] ffff000098190100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 56.197842] ffff000098190180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 56.205160] >ffff000098190200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.212467] ^ [ 56.216017] ffff000098190280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.223335] ffff000098190300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.230642] ================================================================== [ 56.509370] ================================================================== [ 56.516685] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 56.524962] Read of size 8 at addr ffff000098190208 by task kunit_try_catch/370 [ 56.532369] [ 56.533896] CPU: 5 UID: 0 PID: 370 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 56.533926] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.533934] Hardware name: Thundercomm Dragonboard 845c (DT) [ 56.533947] Call trace: [ 56.533954] show_stack+0x20/0x38 (C) [ 56.533971] dump_stack_lvl+0x8c/0xd0 [ 56.533990] print_report+0x118/0x608 [ 56.534009] kasan_report+0xdc/0x128 [ 56.534028] __asan_report_load8_noabort+0x20/0x30 [ 56.534045] kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 56.534065] kasan_bitops_generic+0x110/0x1c8 [ 56.534082] kunit_try_run_case+0x170/0x3f0 [ 56.534101] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.534121] kthread+0x328/0x630 [ 56.534135] ret_from_fork+0x10/0x20 [ 56.534151] [ 56.605378] Allocated by task 370: [ 56.608836] kasan_save_stack+0x3c/0x68 [ 56.612735] kasan_save_track+0x20/0x40 [ 56.616634] kasan_save_alloc_info+0x40/0x58 [ 56.620976] __kasan_kmalloc+0xd4/0xd8 [ 56.624788] __kmalloc_cache_noprof+0x16c/0x3c0 [ 56.629391] kasan_bitops_generic+0xa0/0x1c8 [ 56.633736] kunit_try_run_case+0x170/0x3f0 [ 56.637992] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.643562] kthread+0x328/0x630 [ 56.646849] ret_from_fork+0x10/0x20 [ 56.650487] [ 56.652019] The buggy address belongs to the object at ffff000098190200 [ 56.652019] which belongs to the cache kmalloc-16 of size 16 [ 56.664500] The buggy address is located 8 bytes inside of [ 56.664500] allocated 9-byte region [ffff000098190200, ffff000098190209) [ 56.676899] [ 56.678424] The buggy address belongs to the physical page: [ 56.684071] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x118190 [ 56.692169] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.698779] page_type: f5(slab) [ 56.701979] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 56.709819] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 56.717656] page dumped because: kasan: bad access detected [ 56.723303] [ 56.724827] Memory state around the buggy address: [ 56.729685] ffff000098190100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 56.737000] ffff000098190180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 56.744316] >ffff000098190200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.751629] ^ [ 56.755174] ffff000098190280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.762488] ffff000098190300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 56.769799] ================================================================== [ 54.615771] ================================================================== [ 54.623096] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 54.631379] Write of size 8 at addr ffff000098190208 by task kunit_try_catch/370 [ 54.638871] [ 54.640407] CPU: 6 UID: 0 PID: 370 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 54.640440] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.640449] Hardware name: Thundercomm Dragonboard 845c (DT) [ 54.640461] Call trace: [ 54.640468] show_stack+0x20/0x38 (C) [ 54.640487] dump_stack_lvl+0x8c/0xd0 [ 54.640508] print_report+0x118/0x608 [ 54.640528] kasan_report+0xdc/0x128 [ 54.640547] kasan_check_range+0x100/0x1a8 [ 54.640569] __kasan_check_write+0x20/0x30 [ 54.640584] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 54.640605] kasan_bitops_generic+0x110/0x1c8 [ 54.640622] kunit_try_run_case+0x170/0x3f0 [ 54.640640] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.640661] kthread+0x328/0x630 [ 54.640674] ret_from_fork+0x10/0x20 [ 54.640692] [ 54.715367] Allocated by task 370: [ 54.718829] kasan_save_stack+0x3c/0x68 [ 54.722737] kasan_save_track+0x20/0x40 [ 54.726634] kasan_save_alloc_info+0x40/0x58 [ 54.730970] __kasan_kmalloc+0xd4/0xd8 [ 54.734780] __kmalloc_cache_noprof+0x16c/0x3c0 [ 54.739378] kasan_bitops_generic+0xa0/0x1c8 [ 54.743717] kunit_try_run_case+0x170/0x3f0 [ 54.747973] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.753541] kthread+0x328/0x630 [ 54.756827] ret_from_fork+0x10/0x20 [ 54.760461] [ 54.761986] The buggy address belongs to the object at ffff000098190200 [ 54.761986] which belongs to the cache kmalloc-16 of size 16 [ 54.774463] The buggy address is located 8 bytes inside of [ 54.774463] allocated 9-byte region [ffff000098190200, ffff000098190209) [ 54.786862] [ 54.788397] The buggy address belongs to the physical page: [ 54.794042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x118190 [ 54.802145] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.808758] page_type: f5(slab) [ 54.811960] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 54.819807] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 54.827650] page dumped because: kasan: bad access detected [ 54.833295] [ 54.834818] Memory state around the buggy address: [ 54.839683] ffff000098190100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 54.846995] ffff000098190180: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 54.854305] >ffff000098190200: 00 01 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.861611] ^ [ 54.865152] ffff000098190280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.872464] ffff000098190300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.879770] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strnlen
[ 53.762163] ================================================================== [ 53.769481] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88 [ 53.775575] Read of size 1 at addr ffff000085584210 by task kunit_try_catch/368 [ 53.782976] [ 53.784509] CPU: 6 UID: 0 PID: 368 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 53.784539] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.784549] Hardware name: Thundercomm Dragonboard 845c (DT) [ 53.784559] Call trace: [ 53.784565] show_stack+0x20/0x38 (C) [ 53.784583] dump_stack_lvl+0x8c/0xd0 [ 53.784601] print_report+0x118/0x608 [ 53.784620] kasan_report+0xdc/0x128 [ 53.784641] __asan_report_load1_noabort+0x20/0x30 [ 53.784658] strnlen+0x80/0x88 [ 53.784674] kasan_strings+0x478/0xb00 [ 53.784689] kunit_try_run_case+0x170/0x3f0 [ 53.784708] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.784729] kthread+0x328/0x630 [ 53.784742] ret_from_fork+0x10/0x20 [ 53.784760] [ 53.853083] Allocated by task 368: [ 53.856536] kasan_save_stack+0x3c/0x68 [ 53.860434] kasan_save_track+0x20/0x40 [ 53.864329] kasan_save_alloc_info+0x40/0x58 [ 53.868665] __kasan_kmalloc+0xd4/0xd8 [ 53.872476] __kmalloc_cache_noprof+0x16c/0x3c0 [ 53.877078] kasan_strings+0xc8/0xb00 [ 53.880807] kunit_try_run_case+0x170/0x3f0 [ 53.885060] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.890630] kthread+0x328/0x630 [ 53.893914] ret_from_fork+0x10/0x20 [ 53.897549] [ 53.899082] Freed by task 368: [ 53.902190] kasan_save_stack+0x3c/0x68 [ 53.906095] kasan_save_track+0x20/0x40 [ 53.910002] kasan_save_free_info+0x4c/0x78 [ 53.914254] __kasan_slab_free+0x6c/0x98 [ 53.918250] kfree+0x214/0x3c8 [ 53.921371] kasan_strings+0x24c/0xb00 [ 53.925182] kunit_try_run_case+0x170/0x3f0 [ 53.929436] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.935006] kthread+0x328/0x630 [ 53.938292] ret_from_fork+0x10/0x20 [ 53.941925] [ 53.943460] The buggy address belongs to the object at ffff000085584200 [ 53.943460] which belongs to the cache kmalloc-32 of size 32 [ 53.955944] The buggy address is located 16 bytes inside of [ 53.955944] freed 32-byte region [ffff000085584200, ffff000085584220) [ 53.968161] [ 53.969686] The buggy address belongs to the physical page: [ 53.975327] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105584 [ 53.983433] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.990052] page_type: f5(slab) [ 53.993250] raw: 0bfffe0000000000 ffff000080002780 dead000000000122 0000000000000000 [ 54.001095] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 54.008936] page dumped because: kasan: bad access detected [ 54.014581] [ 54.016113] Memory state around the buggy address: [ 54.020968] ffff000085584100: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 54.028277] ffff000085584180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 54.035596] >ffff000085584200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 54.042908] ^ [ 54.046711] ffff000085584280: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 54.054029] ffff000085584300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 54.061336] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strlen
[ 53.455848] ================================================================== [ 53.463159] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0 [ 53.469159] Read of size 1 at addr ffff000085584210 by task kunit_try_catch/368 [ 53.476567] [ 53.478093] CPU: 6 UID: 0 PID: 368 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 53.478123] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.478133] Hardware name: Thundercomm Dragonboard 845c (DT) [ 53.478144] Call trace: [ 53.478152] show_stack+0x20/0x38 (C) [ 53.478170] dump_stack_lvl+0x8c/0xd0 [ 53.478189] print_report+0x118/0x608 [ 53.478211] kasan_report+0xdc/0x128 [ 53.478230] __asan_report_load1_noabort+0x20/0x30 [ 53.478247] strlen+0xa8/0xb0 [ 53.478262] kasan_strings+0x418/0xb00 [ 53.478278] kunit_try_run_case+0x170/0x3f0 [ 53.478296] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.478318] kthread+0x328/0x630 [ 53.478332] ret_from_fork+0x10/0x20 [ 53.478350] [ 53.546572] Allocated by task 368: [ 53.550025] kasan_save_stack+0x3c/0x68 [ 53.553932] kasan_save_track+0x20/0x40 [ 53.557838] kasan_save_alloc_info+0x40/0x58 [ 53.562177] __kasan_kmalloc+0xd4/0xd8 [ 53.565994] __kmalloc_cache_noprof+0x16c/0x3c0 [ 53.570594] kasan_strings+0xc8/0xb00 [ 53.574325] kunit_try_run_case+0x170/0x3f0 [ 53.578579] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.584140] kthread+0x328/0x630 [ 53.587426] ret_from_fork+0x10/0x20 [ 53.591063] [ 53.592596] Freed by task 368: [ 53.595701] kasan_save_stack+0x3c/0x68 [ 53.599605] kasan_save_track+0x20/0x40 [ 53.603513] kasan_save_free_info+0x4c/0x78 [ 53.607760] __kasan_slab_free+0x6c/0x98 [ 53.611755] kfree+0x214/0x3c8 [ 53.614871] kasan_strings+0x24c/0xb00 [ 53.618687] kunit_try_run_case+0x170/0x3f0 [ 53.622938] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.628501] kthread+0x328/0x630 [ 53.631785] ret_from_fork+0x10/0x20 [ 53.635419] [ 53.636942] The buggy address belongs to the object at ffff000085584200 [ 53.636942] which belongs to the cache kmalloc-32 of size 32 [ 53.649424] The buggy address is located 16 bytes inside of [ 53.649424] freed 32-byte region [ffff000085584200, ffff000085584220) [ 53.661649] [ 53.663182] The buggy address belongs to the physical page: [ 53.668824] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105584 [ 53.676926] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.683539] page_type: f5(slab) [ 53.686743] raw: 0bfffe0000000000 ffff000080002780 dead000000000122 0000000000000000 [ 53.694583] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 53.702423] page dumped because: kasan: bad access detected [ 53.708065] [ 53.709588] Memory state around the buggy address: [ 53.714444] ffff000085584100: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 53.721762] ffff000085584180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 53.729072] >ffff000085584200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 53.736379] ^ [ 53.740190] ffff000085584280: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 53.747498] ffff000085584300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 53.754808] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[ 53.151711] ================================================================== [ 53.159042] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00 [ 53.165837] Read of size 1 at addr ffff000085584210 by task kunit_try_catch/368 [ 53.173239] [ 53.174768] CPU: 6 UID: 0 PID: 368 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 53.174799] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.174809] Hardware name: Thundercomm Dragonboard 845c (DT) [ 53.174821] Call trace: [ 53.174829] show_stack+0x20/0x38 (C) [ 53.174849] dump_stack_lvl+0x8c/0xd0 [ 53.174871] print_report+0x118/0x608 [ 53.174891] kasan_report+0xdc/0x128 [ 53.174909] __asan_report_load1_noabort+0x20/0x30 [ 53.174926] kasan_strings+0x95c/0xb00 [ 53.174943] kunit_try_run_case+0x170/0x3f0 [ 53.174960] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.174981] kthread+0x328/0x630 [ 53.174994] ret_from_fork+0x10/0x20 [ 53.175010] [ 53.240235] Allocated by task 368: [ 53.243692] kasan_save_stack+0x3c/0x68 [ 53.247600] kasan_save_track+0x20/0x40 [ 53.251506] kasan_save_alloc_info+0x40/0x58 [ 53.255843] __kasan_kmalloc+0xd4/0xd8 [ 53.259658] __kmalloc_cache_noprof+0x16c/0x3c0 [ 53.264263] kasan_strings+0xc8/0xb00 [ 53.267981] kunit_try_run_case+0x170/0x3f0 [ 53.272234] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.277802] kthread+0x328/0x630 [ 53.281085] ret_from_fork+0x10/0x20 [ 53.284729] [ 53.286253] Freed by task 368: [ 53.289360] kasan_save_stack+0x3c/0x68 [ 53.293268] kasan_save_track+0x20/0x40 [ 53.297172] kasan_save_free_info+0x4c/0x78 [ 53.301422] __kasan_slab_free+0x6c/0x98 [ 53.305417] kfree+0x214/0x3c8 [ 53.308526] kasan_strings+0x24c/0xb00 [ 53.312342] kunit_try_run_case+0x170/0x3f0 [ 53.316592] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.322159] kthread+0x328/0x630 [ 53.325442] ret_from_fork+0x10/0x20 [ 53.329076] [ 53.330602] The buggy address belongs to the object at ffff000085584200 [ 53.330602] which belongs to the cache kmalloc-32 of size 32 [ 53.343085] The buggy address is located 16 bytes inside of [ 53.343085] freed 32-byte region [ffff000085584200, ffff000085584220) [ 53.355306] [ 53.356830] The buggy address belongs to the physical page: [ 53.362474] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105584 [ 53.370577] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.377191] page_type: f5(slab) [ 53.380388] raw: 0bfffe0000000000 ffff000080002780 dead000000000122 0000000000000000 [ 53.388233] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 53.396073] page dumped because: kasan: bad access detected [ 53.401719] [ 53.403253] Memory state around the buggy address: [ 53.408105] ffff000085584100: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 53.415414] ffff000085584180: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 53.422723] >ffff000085584200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 53.430040] ^ [ 53.433853] ffff000085584280: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 53.441168] ffff000085584300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 53.448475] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp
[ 52.827617] ================================================================== [ 52.851775] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 [ 52.857783] Read of size 1 at addr ffff000085584210 by task kunit_try_catch/368 [ 52.865188] [ 52.866726] CPU: 3 UID: 0 PID: 368 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 52.866758] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.866767] Hardware name: Thundercomm Dragonboard 845c (DT) [ 52.866779] Call trace: [ 52.866789] show_stack+0x20/0x38 (C) [ 52.866808] dump_stack_lvl+0x8c/0xd0 [ 52.866830] print_report+0x118/0x608 [ 52.866851] kasan_report+0xdc/0x128 [ 52.866870] __asan_report_load1_noabort+0x20/0x30 [ 52.866889] strcmp+0xc0/0xc8 [ 52.866905] kasan_strings+0x340/0xb00 [ 52.866922] kunit_try_run_case+0x170/0x3f0 [ 52.866942] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.866965] kthread+0x328/0x630 [ 52.866980] ret_from_fork+0x10/0x20 [ 52.866998] [ 52.935262] Allocated by task 368: [ 52.938730] kasan_save_stack+0x3c/0x68 [ 52.942643] kasan_save_track+0x20/0x40 [ 52.946554] kasan_save_alloc_info+0x40/0x58 [ 52.950894] __kasan_kmalloc+0xd4/0xd8 [ 52.954706] __kmalloc_cache_noprof+0x16c/0x3c0 [ 52.959322] kasan_strings+0xc8/0xb00 [ 52.963048] kunit_try_run_case+0x170/0x3f0 [ 52.967304] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.972878] kthread+0x328/0x630 [ 52.976171] ret_from_fork+0x10/0x20 [ 52.979812] [ 52.981344] Freed by task 368: [ 52.984460] kasan_save_stack+0x3c/0x68 [ 52.988372] kasan_save_track+0x20/0x40 [ 52.992284] kasan_save_free_info+0x4c/0x78 [ 52.996539] __kasan_slab_free+0x6c/0x98 [ 53.000537] kfree+0x214/0x3c8 [ 53.003660] kasan_strings+0x24c/0xb00 [ 53.007473] kunit_try_run_case+0x170/0x3f0 [ 53.011727] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.017302] kthread+0x328/0x630 [ 53.020596] ret_from_fork+0x10/0x20 [ 53.024236] [ 53.025767] The buggy address belongs to the object at ffff000085584200 [ 53.025767] which belongs to the cache kmalloc-32 of size 32 [ 53.038255] The buggy address is located 16 bytes inside of [ 53.038255] freed 32-byte region [ffff000085584200, ffff000085584220) [ 53.050484] [ 53.052021] The buggy address belongs to the physical page: [ 53.057672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105584 [ 53.065787] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.072414] page_type: f5(slab) [ 53.075623] raw: 0bfffe0000000000 ffff000080002780 dead000000000122 0000000000000000 [ 53.083474] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 53.091320] page dumped because: kasan: bad access detected [ 53.096970] [ 53.098502] Memory state around the buggy address: [ 53.103366] ffff000085584100: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 53.110685] ffff000085584180: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 53.118003] >ffff000085584200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 53.125319] ^ [ 53.129137] ffff000085584280: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 53.136455] ffff000085584300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 53.143772] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[ 52.517957] ================================================================== [ 52.529102] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 52.535207] Read of size 1 at addr ffff000085584198 by task kunit_try_catch/366 [ 52.542624] [ 52.544164] CPU: 3 UID: 0 PID: 366 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 52.544197] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.544207] Hardware name: Thundercomm Dragonboard 845c (DT) [ 52.544219] Call trace: [ 52.544227] show_stack+0x20/0x38 (C) [ 52.544248] dump_stack_lvl+0x8c/0xd0 [ 52.544272] print_report+0x118/0x608 [ 52.544294] kasan_report+0xdc/0x128 [ 52.544314] __asan_report_load1_noabort+0x20/0x30 [ 52.544333] memcmp+0x198/0x1d8 [ 52.544351] kasan_memcmp+0x16c/0x300 [ 52.544369] kunit_try_run_case+0x170/0x3f0 [ 52.544388] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.544411] kthread+0x328/0x630 [ 52.544427] ret_from_fork+0x10/0x20 [ 52.544446] [ 52.612808] Allocated by task 366: [ 52.616271] kasan_save_stack+0x3c/0x68 [ 52.620183] kasan_save_track+0x20/0x40 [ 52.624095] kasan_save_alloc_info+0x40/0x58 [ 52.628435] __kasan_kmalloc+0xd4/0xd8 [ 52.632258] __kmalloc_cache_noprof+0x16c/0x3c0 [ 52.636874] kasan_memcmp+0xbc/0x300 [ 52.640511] kunit_try_run_case+0x170/0x3f0 [ 52.644767] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.650342] kthread+0x328/0x630 [ 52.653633] ret_from_fork+0x10/0x20 [ 52.657272] [ 52.658803] The buggy address belongs to the object at ffff000085584180 [ 52.658803] which belongs to the cache kmalloc-32 of size 32 [ 52.671294] The buggy address is located 0 bytes to the right of [ 52.671294] allocated 24-byte region [ffff000085584180, ffff000085584198) [ 52.684315] [ 52.685847] The buggy address belongs to the physical page: [ 52.691495] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105584 [ 52.699606] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.706224] page_type: f5(slab) [ 52.709430] raw: 0bfffe0000000000 ffff000080002780 dead000000000122 0000000000000000 [ 52.717276] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 52.725118] page dumped because: kasan: bad access detected [ 52.730769] [ 52.732304] Memory state around the buggy address: [ 52.737169] ffff000085584080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 52.744494] ffff000085584100: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 52.751810] >ffff000085584180: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.759125] ^ [ 52.763203] ffff000085584200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.770519] ffff000085584280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.777842] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[ 52.272512] ================================================================== [ 52.284077] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340 [ 52.291757] Read of size 1 at addr ffff8000843d7b4a by task kunit_try_catch/362 [ 52.299162] [ 52.300698] CPU: 2 UID: 0 PID: 362 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 52.300730] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.300738] Hardware name: Thundercomm Dragonboard 845c (DT) [ 52.300751] Call trace: [ 52.300760] show_stack+0x20/0x38 (C) [ 52.300778] dump_stack_lvl+0x8c/0xd0 [ 52.300803] print_report+0x310/0x608 [ 52.300824] kasan_report+0xdc/0x128 [ 52.300845] __asan_report_load1_noabort+0x20/0x30 [ 52.300865] kasan_alloca_oob_right+0x2dc/0x340 [ 52.300883] kunit_try_run_case+0x170/0x3f0 [ 52.300904] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.300925] kthread+0x328/0x630 [ 52.300941] ret_from_fork+0x10/0x20 [ 52.300961] [ 52.367018] The buggy address belongs to stack of task kunit_try_catch/362 [ 52.373999] [ 52.375534] The buggy address belongs to the virtual mapping at [ 52.375534] [ffff8000843d0000, ffff8000843d9000) created by: [ 52.375534] kernel_clone+0x150/0x7a8 [ 52.391014] [ 52.392550] The buggy address belongs to the physical page: [ 52.398196] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105592 [ 52.406303] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.412922] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 52.420772] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 52.428617] page dumped because: kasan: bad access detected [ 52.434264] [ 52.435794] Memory state around the buggy address: [ 52.440654] ffff8000843d7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 52.447971] ffff8000843d7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 52.455288] >ffff8000843d7b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 52.462602] ^ [ 52.468252] ffff8000843d7b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 52.475569] ffff8000843d7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 52.482883] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[ 52.050807] ================================================================== [ 52.061844] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 52.069432] Read of size 1 at addr ffff8000843b7b5f by task kunit_try_catch/360 [ 52.076842] [ 52.078380] CPU: 5 UID: 0 PID: 360 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 52.078412] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.078421] Hardware name: Thundercomm Dragonboard 845c (DT) [ 52.078433] Call trace: [ 52.078440] show_stack+0x20/0x38 (C) [ 52.078460] dump_stack_lvl+0x8c/0xd0 [ 52.078481] print_report+0x310/0x608 [ 52.078503] kasan_report+0xdc/0x128 [ 52.078522] __asan_report_load1_noabort+0x20/0x30 [ 52.078539] kasan_alloca_oob_left+0x2b8/0x310 [ 52.078557] kunit_try_run_case+0x170/0x3f0 [ 52.078575] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.078597] kthread+0x328/0x630 [ 52.078611] ret_from_fork+0x10/0x20 [ 52.078629] [ 52.144556] The buggy address belongs to stack of task kunit_try_catch/360 [ 52.151530] [ 52.153059] The buggy address belongs to the virtual mapping at [ 52.153059] [ffff8000843b0000, ffff8000843b9000) created by: [ 52.153059] kernel_clone+0x150/0x7a8 [ 52.168523] [ 52.170051] The buggy address belongs to the physical page: [ 52.175692] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10463d [ 52.183796] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.190421] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 52.198267] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 52.206107] page dumped because: kasan: bad access detected [ 52.211749] [ 52.213273] Memory state around the buggy address: [ 52.218130] ffff8000843b7a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 52.225438] ffff8000843b7a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 52.232746] >ffff8000843b7b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 52.240051] ^ [ 52.246221] ffff8000843b7b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 52.253530] ffff8000843b7c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 52.260836] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 51.798857] ================================================================== [ 51.814097] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 51.821070] Read of size 1 at addr ffff800084397c2a by task kunit_try_catch/358 [ 51.828483] [ 51.830019] CPU: 3 UID: 0 PID: 358 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 51.830052] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.830061] Hardware name: Thundercomm Dragonboard 845c (DT) [ 51.830073] Call trace: [ 51.830082] show_stack+0x20/0x38 (C) [ 51.830101] dump_stack_lvl+0x8c/0xd0 [ 51.830123] print_report+0x310/0x608 [ 51.830147] kasan_report+0xdc/0x128 [ 51.830167] __asan_report_load1_noabort+0x20/0x30 [ 51.830186] kasan_stack_oob+0x238/0x270 [ 51.830204] kunit_try_run_case+0x170/0x3f0 [ 51.830225] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.830247] kthread+0x328/0x630 [ 51.830264] ret_from_fork+0x10/0x20 [ 51.830284] [ 51.895735] The buggy address belongs to stack of task kunit_try_catch/358 [ 51.902704] and is located at offset 138 in frame: [ 51.907651] kasan_stack_oob+0x0/0x270 [ 51.911477] [ 51.913013] This frame has 4 objects: [ 51.916742] [48, 49) '__assertion' [ 51.916756] [64, 72) 'array' [ 51.920302] [96, 112) '__assertion' [ 51.923326] [128, 138) 'stack_array' [ 51.926961] [ 51.932211] The buggy address belongs to the virtual mapping at [ 51.932211] [ffff800084390000, ffff800084399000) created by: [ 51.932211] kernel_clone+0x150/0x7a8 [ 51.947690] [ 51.949220] The buggy address belongs to the physical page: [ 51.954871] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffffffffffffffff pfn:0x104649 [ 51.964295] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 51.970919] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 51.978765] raw: ffffffffffffffff 0000000000000000 00000001ffffffff 0000000000000000 [ 51.986604] page dumped because: kasan: bad access detected [ 51.992257] [ 51.993788] Memory state around the buggy address: [ 51.998649] ffff800084397b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 52.005974] ffff800084397b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 52.013300] >ffff800084397c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 52.020622] ^ [ 52.025230] ffff800084397c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 [ 52.032552] ffff800084397d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 52.039866] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 51.566397] ================================================================== [ 51.579107] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 51.586785] Read of size 1 at addr ffffb46a770e964d by task kunit_try_catch/354 [ 51.594197] [ 51.595740] CPU: 3 UID: 0 PID: 354 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 51.595771] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.595780] Hardware name: Thundercomm Dragonboard 845c (DT) [ 51.595792] Call trace: [ 51.595800] show_stack+0x20/0x38 (C) [ 51.595819] dump_stack_lvl+0x8c/0xd0 [ 51.595840] print_report+0x310/0x608 [ 51.595860] kasan_report+0xdc/0x128 [ 51.595879] __asan_report_load1_noabort+0x20/0x30 [ 51.595898] kasan_global_oob_right+0x230/0x270 [ 51.595915] kunit_try_run_case+0x170/0x3f0 [ 51.595935] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.595958] kthread+0x328/0x630 [ 51.595974] ret_from_fork+0x10/0x20 [ 51.595993] [ 51.662045] The buggy address belongs to the variable: [ 51.667263] global_array+0xd/0x40 [ 51.670738] [ 51.672290] The buggy address belongs to the virtual mapping at [ 51.672290] [ffffb46a75270000, ffffb46a771a1000) created by: [ 51.672290] paging_init+0x66c/0x7d0 [ 51.687690] [ 51.689225] The buggy address belongs to the physical page: [ 51.694875] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xa7ae9 [ 51.702892] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 51.710314] raw: 03fffe0000002000 fffffdffc09eba48 fffffdffc09eba48 0000000000000000 [ 51.718161] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 51.726003] page dumped because: kasan: bad access detected [ 51.731651] [ 51.733179] Memory state around the buggy address: [ 51.738042] ffffb46a770e9500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 51.745368] ffffb46a770e9580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 51.752693] >ffffb46a770e9600: 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 [ 51.760017] ^ [ 51.765672] ffffb46a770e9680: 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 [ 51.772996] ffffb46a770e9700: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00 [ 51.780319] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 50.980145] ================================================================== [ 50.992503] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 51.000623] Free of addr ffff000082240d01 by task kunit_try_catch/350 [ 51.007152] [ 51.008697] CPU: 3 UID: 0 PID: 350 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 51.008730] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.008739] Hardware name: Thundercomm Dragonboard 845c (DT) [ 51.008751] Call trace: [ 51.008759] show_stack+0x20/0x38 (C) [ 51.008778] dump_stack_lvl+0x8c/0xd0 [ 51.008800] print_report+0x118/0x608 [ 51.008823] kasan_report_invalid_free+0xc0/0xe8 [ 51.008845] check_slab_allocation+0xfc/0x108 [ 51.008865] __kasan_mempool_poison_object+0x78/0x150 [ 51.008890] mempool_free+0x28c/0x328 [ 51.008908] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 51.008930] mempool_kmalloc_invalid_free+0xc0/0x118 [ 51.008951] kunit_try_run_case+0x170/0x3f0 [ 51.008971] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.008995] kthread+0x328/0x630 [ 51.009011] ret_from_fork+0x10/0x20 [ 51.009030] [ 51.090707] Allocated by task 350: [ 51.094168] kasan_save_stack+0x3c/0x68 [ 51.098080] kasan_save_track+0x20/0x40 [ 51.101992] kasan_save_alloc_info+0x40/0x58 [ 51.106330] __kasan_mempool_unpoison_object+0x11c/0x180 [ 51.111727] remove_element+0x130/0x1f8 [ 51.115637] mempool_alloc_preallocated+0x58/0xc0 [ 51.120417] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 51.126076] mempool_kmalloc_invalid_free+0xc0/0x118 [ 51.131117] kunit_try_run_case+0x170/0x3f0 [ 51.135371] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.140943] kthread+0x328/0x630 [ 51.144234] ret_from_fork+0x10/0x20 [ 51.147873] [ 51.149406] The buggy address belongs to the object at ffff000082240d00 [ 51.149406] which belongs to the cache kmalloc-128 of size 128 [ 51.162072] The buggy address is located 1 bytes inside of [ 51.162072] 128-byte region [ffff000082240d00, ffff000082240d80) [ 51.173778] [ 51.175309] The buggy address belongs to the physical page: [ 51.180956] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102240 [ 51.189072] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 51.196832] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 51.203889] page_type: f5(slab) [ 51.207099] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 51.214947] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.222794] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 51.230727] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.238662] head: 0bfffe0000000001 fffffdffc2089001 00000000ffffffff 00000000ffffffff [ 51.246594] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 51.254523] page dumped because: kasan: bad access detected [ 51.260181] [ 51.261713] Memory state around the buggy address: [ 51.266576] ffff000082240c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 51.273901] ffff000082240c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.281226] >ffff000082240d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 51.288550] ^ [ 51.291842] ffff000082240d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.299162] ffff000082240e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 51.306476] ================================================================== [ 51.317178] ================================================================== [ 51.329369] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 51.337487] Free of addr ffff00008553c001 by task kunit_try_catch/352 [ 51.344023] [ 51.345558] CPU: 3 UID: 0 PID: 352 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 51.345590] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.345600] Hardware name: Thundercomm Dragonboard 845c (DT) [ 51.345613] Call trace: [ 51.345620] show_stack+0x20/0x38 (C) [ 51.345640] dump_stack_lvl+0x8c/0xd0 [ 51.345662] print_report+0x118/0x608 [ 51.345686] kasan_report_invalid_free+0xc0/0xe8 [ 51.345707] __kasan_mempool_poison_object+0xfc/0x150 [ 51.345732] mempool_free+0x28c/0x328 [ 51.345751] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 51.345773] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 51.345794] kunit_try_run_case+0x170/0x3f0 [ 51.345813] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.345836] kthread+0x328/0x630 [ 51.345853] ret_from_fork+0x10/0x20 [ 51.345871] [ 51.423654] The buggy address belongs to the physical page: [ 51.429300] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10553c [ 51.437414] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 51.445171] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 51.452226] page_type: f8(unknown) [ 51.455695] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 51.463539] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 51.471381] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 51.479311] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 51.487252] head: 0bfffe0000000002 fffffdffc2154f01 00000000ffffffff 00000000ffffffff [ 51.495194] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 51.503128] page dumped because: kasan: bad access detected [ 51.508782] [ 51.510313] Memory state around the buggy address: [ 51.515172] ffff00008553bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 51.522497] ffff00008553bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 51.529821] >ffff00008553c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 51.537140] ^ [ 51.540430] ffff00008553c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 51.547755] ffff00008553c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 51.555067] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 46.300749] ================================================================== [ 46.312428] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 46.319490] Free of addr ffff000095dfa001 by task kunit_try_catch/320 [ 46.326016] [ 46.327552] CPU: 4 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 46.327590] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.327601] Hardware name: Thundercomm Dragonboard 845c (DT) [ 46.327616] Call trace: [ 46.327625] show_stack+0x20/0x38 (C) [ 46.327646] dump_stack_lvl+0x8c/0xd0 [ 46.327668] print_report+0x118/0x608 [ 46.327688] kasan_report_invalid_free+0xc0/0xe8 [ 46.327708] check_slab_allocation+0xfc/0x108 [ 46.327728] __kasan_slab_pre_free+0x2c/0x48 [ 46.327746] kmem_cache_free+0xf0/0x468 [ 46.327766] kmem_cache_invalid_free+0x184/0x3c8 [ 46.327783] kunit_try_run_case+0x170/0x3f0 [ 46.327805] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.327827] kthread+0x328/0x630 [ 46.327842] ret_from_fork+0x10/0x20 [ 46.327862] [ 46.402805] Allocated by task 320: [ 46.406267] kasan_save_stack+0x3c/0x68 [ 46.410170] kasan_save_track+0x20/0x40 [ 46.414069] kasan_save_alloc_info+0x40/0x58 [ 46.418410] __kasan_slab_alloc+0xa8/0xb0 [ 46.422482] kmem_cache_alloc_noprof+0x10c/0x398 [ 46.427173] kmem_cache_invalid_free+0x12c/0x3c8 [ 46.431861] kunit_try_run_case+0x170/0x3f0 [ 46.436115] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.441677] kthread+0x328/0x630 [ 46.444964] ret_from_fork+0x10/0x20 [ 46.448600] [ 46.450126] The buggy address belongs to the object at ffff000095dfa000 [ 46.450126] which belongs to the cache test_cache of size 200 [ 46.462697] The buggy address is located 1 bytes inside of [ 46.462697] 200-byte region [ffff000095dfa000, ffff000095dfa0c8) [ 46.474391] [ 46.475917] The buggy address belongs to the physical page: [ 46.481568] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x115dfa [ 46.489669] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 46.497420] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 46.504483] page_type: f5(slab) [ 46.507690] raw: 0bfffe0000000040 ffff000080f20b40 dead000000000122 0000000000000000 [ 46.515530] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 46.523369] head: 0bfffe0000000040 ffff000080f20b40 dead000000000122 0000000000000000 [ 46.531293] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 46.539219] head: 0bfffe0000000001 fffffdffc2577e81 00000000ffffffff 00000000ffffffff [ 46.547144] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 46.555067] page dumped because: kasan: bad access detected [ 46.560718] [ 46.562243] Memory state around the buggy address: [ 46.567102] ffff000095df9f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 46.574419] ffff000095df9f80: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 46.581735] >ffff000095dfa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 46.589048] ^ [ 46.592334] ffff000095dfa080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 46.599649] ffff000095dfa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.606962] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 45.927019] ================================================================== [ 45.937987] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 45.944882] Free of addr ffff0000952aa000 by task kunit_try_catch/318 [ 45.951410] [ 45.952945] CPU: 6 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 45.952982] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.952991] Hardware name: Thundercomm Dragonboard 845c (DT) [ 45.953008] Call trace: [ 45.953016] show_stack+0x20/0x38 (C) [ 45.953038] dump_stack_lvl+0x8c/0xd0 [ 45.953060] print_report+0x118/0x608 [ 45.953079] kasan_report_invalid_free+0xc0/0xe8 [ 45.953099] check_slab_allocation+0xd4/0x108 [ 45.953119] __kasan_slab_pre_free+0x2c/0x48 [ 45.953138] kmem_cache_free+0xf0/0x468 [ 45.953160] kmem_cache_double_free+0x190/0x3c8 [ 45.953177] kunit_try_run_case+0x170/0x3f0 [ 45.953198] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.953220] kthread+0x328/0x630 [ 45.953235] ret_from_fork+0x10/0x20 [ 45.953256] [ 46.028107] Allocated by task 318: [ 46.031563] kasan_save_stack+0x3c/0x68 [ 46.035470] kasan_save_track+0x20/0x40 [ 46.039377] kasan_save_alloc_info+0x40/0x58 [ 46.043714] __kasan_slab_alloc+0xa8/0xb0 [ 46.047794] kmem_cache_alloc_noprof+0x10c/0x398 [ 46.052481] kmem_cache_double_free+0x12c/0x3c8 [ 46.057081] kunit_try_run_case+0x170/0x3f0 [ 46.061330] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.066896] kthread+0x328/0x630 [ 46.070181] ret_from_fork+0x10/0x20 [ 46.073814] [ 46.075345] Freed by task 318: [ 46.078454] kasan_save_stack+0x3c/0x68 [ 46.082349] kasan_save_track+0x20/0x40 [ 46.086254] kasan_save_free_info+0x4c/0x78 [ 46.090504] __kasan_slab_free+0x6c/0x98 [ 46.094495] kmem_cache_free+0x260/0x468 [ 46.098488] kmem_cache_double_free+0x140/0x3c8 [ 46.103085] kunit_try_run_case+0x170/0x3f0 [ 46.107334] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.112901] kthread+0x328/0x630 [ 46.116182] ret_from_fork+0x10/0x20 [ 46.119815] [ 46.121339] The buggy address belongs to the object at ffff0000952aa000 [ 46.121339] which belongs to the cache test_cache of size 200 [ 46.133909] The buggy address is located 0 bytes inside of [ 46.133909] 200-byte region [ffff0000952aa000, ffff0000952aa0c8) [ 46.145601] [ 46.147136] The buggy address belongs to the physical page: [ 46.152781] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1152aa [ 46.160886] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 46.168638] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 46.175695] page_type: f5(slab) [ 46.178902] raw: 0bfffe0000000040 ffff000087bc8dc0 dead000000000122 0000000000000000 [ 46.186743] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 46.194586] head: 0bfffe0000000040 ffff000087bc8dc0 dead000000000122 0000000000000000 [ 46.202514] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 46.210444] head: 0bfffe0000000001 fffffdffc254aa81 00000000ffffffff 00000000ffffffff [ 46.218373] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 46.226295] page dumped because: kasan: bad access detected [ 46.231937] [ 46.233459] Memory state around the buggy address: [ 46.238316] ffff0000952a9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.245635] ffff0000952a9f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.252952] >ffff0000952aa000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 46.260258] ^ [ 46.263539] ffff0000952aa080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 46.270848] ffff0000952aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.278154] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 45.568117] ================================================================== [ 45.579078] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430 [ 45.585872] Read of size 1 at addr ffff000095dfa0c8 by task kunit_try_catch/316 [ 45.593278] [ 45.594807] CPU: 5 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 45.594838] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.594846] Hardware name: Thundercomm Dragonboard 845c (DT) [ 45.594857] Call trace: [ 45.594864] show_stack+0x20/0x38 (C) [ 45.594882] dump_stack_lvl+0x8c/0xd0 [ 45.594903] print_report+0x118/0x608 [ 45.594924] kasan_report+0xdc/0x128 [ 45.594941] __asan_report_load1_noabort+0x20/0x30 [ 45.594957] kmem_cache_oob+0x344/0x430 [ 45.594972] kunit_try_run_case+0x170/0x3f0 [ 45.594989] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.595010] kthread+0x328/0x630 [ 45.595025] ret_from_fork+0x10/0x20 [ 45.595041] [ 45.660372] Allocated by task 316: [ 45.663826] kasan_save_stack+0x3c/0x68 [ 45.667734] kasan_save_track+0x20/0x40 [ 45.671638] kasan_save_alloc_info+0x40/0x58 [ 45.675975] __kasan_slab_alloc+0xa8/0xb0 [ 45.680052] kmem_cache_alloc_noprof+0x10c/0x398 [ 45.684739] kmem_cache_oob+0x12c/0x430 [ 45.688641] kunit_try_run_case+0x170/0x3f0 [ 45.692892] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.698458] kthread+0x328/0x630 [ 45.701740] ret_from_fork+0x10/0x20 [ 45.705381] [ 45.706904] The buggy address belongs to the object at ffff000095dfa000 [ 45.706904] which belongs to the cache test_cache of size 200 [ 45.719467] The buggy address is located 0 bytes to the right of [ 45.719467] allocated 200-byte region [ffff000095dfa000, ffff000095dfa0c8) [ 45.732563] [ 45.734087] The buggy address belongs to the physical page: [ 45.739735] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x115dfa [ 45.747836] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 45.755587] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 45.762638] page_type: f5(slab) [ 45.765835] raw: 0bfffe0000000040 ffff0000812c6a00 dead000000000122 0000000000000000 [ 45.773676] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 45.781515] head: 0bfffe0000000040 ffff0000812c6a00 dead000000000122 0000000000000000 [ 45.789442] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 45.797366] head: 0bfffe0000000001 fffffdffc2577e81 00000000ffffffff 00000000ffffffff [ 45.805288] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 45.813207] page dumped because: kasan: bad access detected [ 45.818848] [ 45.820376] Memory state around the buggy address: [ 45.825237] ffff000095df9f80: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 45.832548] ffff000095dfa000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 45.839861] >ffff000095dfa080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 45.847165] ^ [ 45.852804] ffff000095dfa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.860114] ffff000095dfa180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.867426] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 45.203416] ================================================================== [ 45.213757] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 45.220557] Read of size 8 at addr ffff0000810baf00 by task kunit_try_catch/309 [ 45.227962] [ 45.229492] CPU: 6 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 45.229523] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.229530] Hardware name: Thundercomm Dragonboard 845c (DT) [ 45.229541] Call trace: [ 45.229547] show_stack+0x20/0x38 (C) [ 45.229565] dump_stack_lvl+0x8c/0xd0 [ 45.229584] print_report+0x118/0x608 [ 45.229605] kasan_report+0xdc/0x128 [ 45.229622] __asan_report_load8_noabort+0x20/0x30 [ 45.229641] workqueue_uaf+0x480/0x4a8 [ 45.229657] kunit_try_run_case+0x170/0x3f0 [ 45.229675] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.229696] kthread+0x328/0x630 [ 45.229710] ret_from_fork+0x10/0x20 [ 45.229726] [ 45.294953] Allocated by task 309: [ 45.298409] kasan_save_stack+0x3c/0x68 [ 45.302316] kasan_save_track+0x20/0x40 [ 45.306218] kasan_save_alloc_info+0x40/0x58 [ 45.310552] __kasan_kmalloc+0xd4/0xd8 [ 45.314367] __kmalloc_cache_noprof+0x16c/0x3c0 [ 45.318967] workqueue_uaf+0x13c/0x4a8 [ 45.322780] kunit_try_run_case+0x170/0x3f0 [ 45.327030] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.332589] kthread+0x328/0x630 [ 45.335871] ret_from_fork+0x10/0x20 [ 45.339503] [ 45.341026] Freed by task 136: [ 45.344130] kasan_save_stack+0x3c/0x68 [ 45.348035] kasan_save_track+0x20/0x40 [ 45.351938] kasan_save_free_info+0x4c/0x78 [ 45.356186] __kasan_slab_free+0x6c/0x98 [ 45.360177] kfree+0x214/0x3c8 [ 45.363290] workqueue_uaf_work+0x18/0x30 [ 45.367363] process_one_work+0x530/0xf98 [ 45.371442] worker_thread+0x618/0xf38 [ 45.375248] kthread+0x328/0x630 [ 45.378531] ret_from_fork+0x10/0x20 [ 45.382163] [ 45.383692] Last potentially related work creation: [ 45.388641] kasan_save_stack+0x3c/0x68 [ 45.392545] kasan_record_aux_stack+0xb4/0xc8 [ 45.396969] __queue_work+0x65c/0xfe0 [ 45.400696] queue_work_on+0xbc/0xf8 [ 45.404326] workqueue_uaf+0x210/0x4a8 [ 45.408141] kunit_try_run_case+0x170/0x3f0 [ 45.412390] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.417957] kthread+0x328/0x630 [ 45.421238] ret_from_fork+0x10/0x20 [ 45.424879] [ 45.426402] The buggy address belongs to the object at ffff0000810baf00 [ 45.426402] which belongs to the cache kmalloc-32 of size 32 [ 45.438884] The buggy address is located 0 bytes inside of [ 45.438884] freed 32-byte region [ffff0000810baf00, ffff0000810baf20) [ 45.451016] [ 45.452547] The buggy address belongs to the physical page: [ 45.458190] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1010ba [ 45.466291] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 45.472902] page_type: f5(slab) [ 45.476099] raw: 0bfffe0000000000 ffff000080002780 dead000000000100 dead000000000122 [ 45.483940] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 45.491775] page dumped because: kasan: bad access detected [ 45.497419] [ 45.498943] Memory state around the buggy address: [ 45.503800] ffff0000810bae00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 45.511110] ffff0000810bae80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 45.518427] >ffff0000810baf00: fa fb fb fb fc fc fc fc 00 00 00 07 fc fc fc fc [ 45.525739] ^ [ 45.529019] ffff0000810baf80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 45.536336] ffff0000810bb000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 45.543649] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[ 44.799808] ================================================================== [ 44.810321] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 44.817111] Read of size 4 at addr ffff000084091980 by task swapper/5/0 [ 44.823809] [ 44.825339] CPU: 5 UID: 0 PID: 0 Comm: swapper/5 Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 44.825369] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.825378] Hardware name: Thundercomm Dragonboard 845c (DT) [ 44.825388] Call trace: [ 44.825395] show_stack+0x20/0x38 (C) [ 44.825413] dump_stack_lvl+0x8c/0xd0 [ 44.825433] print_report+0x118/0x608 [ 44.825453] kasan_report+0xdc/0x128 [ 44.825472] __asan_report_load4_noabort+0x20/0x30 [ 44.825488] rcu_uaf_reclaim+0x64/0x70 [ 44.825504] rcu_core+0x9f4/0x1e20 [ 44.825523] rcu_core_si+0x18/0x30 [ 44.825538] handle_softirqs+0x374/0xb28 [ 44.825558] __do_softirq+0x1c/0x28 [ 44.825571] ____do_softirq+0x18/0x30 [ 44.825589] call_on_irq_stack+0x24/0x30 [ 44.825605] do_softirq_own_stack+0x24/0x38 [ 44.825623] __irq_exit_rcu+0x1fc/0x318 [ 44.825639] irq_exit_rcu+0x1c/0x80 [ 44.825655] el1_interrupt+0x38/0x58 [ 44.825670] el1h_64_irq_handler+0x18/0x28 [ 44.825685] el1h_64_irq+0x6c/0x70 [ 44.825700] arch_local_irq_enable+0x4/0x8 (P) [ 44.825722] cpuidle_enter+0x60/0xb8 [ 44.825738] do_idle+0x36c/0x4e8 [ 44.825757] cpu_startup_entry+0x68/0x80 [ 44.825774] secondary_start_kernel+0x288/0x340 [ 44.825792] __secondary_switched+0xc0/0xc8 [ 44.825815] [ 44.942766] Allocated by task 307: [ 44.946219] kasan_save_stack+0x3c/0x68 [ 44.950126] kasan_save_track+0x20/0x40 [ 44.954032] kasan_save_alloc_info+0x40/0x58 [ 44.958367] __kasan_kmalloc+0xd4/0xd8 [ 44.962181] __kmalloc_cache_noprof+0x16c/0x3c0 [ 44.966780] rcu_uaf+0xb0/0x2d8 [ 44.969973] kunit_try_run_case+0x170/0x3f0 [ 44.974224] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.979784] kthread+0x328/0x630 [ 44.983070] ret_from_fork+0x10/0x20 [ 44.986703] [ 44.988233] Freed by task 0: [ 44.991165] kasan_save_stack+0x3c/0x68 [ 44.995068] kasan_save_track+0x20/0x40 [ 44.998973] kasan_save_free_info+0x4c/0x78 [ 45.003216] __kasan_slab_free+0x6c/0x98 [ 45.007207] kfree+0x214/0x3c8 [ 45.010317] rcu_uaf_reclaim+0x28/0x70 [ 45.014130] rcu_core+0x9f4/0x1e20 [ 45.017597] rcu_core_si+0x18/0x30 [ 45.021054] handle_softirqs+0x374/0xb28 [ 45.025043] __do_softirq+0x1c/0x28 [ 45.028595] [ 45.030118] Last potentially related work creation: [ 45.035063] kasan_save_stack+0x3c/0x68 [ 45.038968] kasan_record_aux_stack+0xb4/0xc8 [ 45.043394] __call_rcu_common.constprop.0+0x74/0x8c8 [ 45.048523] call_rcu+0x18/0x30 [ 45.051718] rcu_uaf+0x14c/0x2d8 [ 45.055004] kunit_try_run_case+0x170/0x3f0 [ 45.059250] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.064811] kthread+0x328/0x630 [ 45.068092] ret_from_fork+0x10/0x20 [ 45.071733] [ 45.073257] The buggy address belongs to the object at ffff000084091980 [ 45.073257] which belongs to the cache kmalloc-32 of size 32 [ 45.085734] The buggy address is located 0 bytes inside of [ 45.085734] freed 32-byte region [ffff000084091980, ffff0000840919a0) [ 45.097866] [ 45.099395] The buggy address belongs to the physical page: [ 45.105036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104091 [ 45.113139] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 45.119748] page_type: f5(slab) [ 45.122949] raw: 0bfffe0000000000 ffff000080002780 fffffdffc21098c0 dead000000000002 [ 45.130789] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 45.138623] page dumped because: kasan: bad access detected [ 45.144270] [ 45.145793] Memory state around the buggy address: [ 45.150648] ffff000084091880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 45.157956] ffff000084091900: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 45.165264] >ffff000084091980: fa fb fb fb fc fc fc fc 00 00 07 fc fc fc fc fc [ 45.172569] ^ [ 45.175850] ffff000084091a00: 00 00 05 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 45.183160] ffff000084091a80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 45.190467] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 44.083669] ================================================================== [ 44.090987] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 44.097437] Read of size 1 at addr ffff000082240200 by task kunit_try_catch/305 [ 44.104845] [ 44.106379] CPU: 3 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 44.106410] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.106419] Hardware name: Thundercomm Dragonboard 845c (DT) [ 44.106431] Call trace: [ 44.106438] show_stack+0x20/0x38 (C) [ 44.106458] dump_stack_lvl+0x8c/0xd0 [ 44.106480] print_report+0x118/0x608 [ 44.106499] kasan_report+0xdc/0x128 [ 44.106518] __asan_report_load1_noabort+0x20/0x30 [ 44.106536] ksize_uaf+0x598/0x5f8 [ 44.106552] kunit_try_run_case+0x170/0x3f0 [ 44.106573] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.106596] kthread+0x328/0x630 [ 44.106612] ret_from_fork+0x10/0x20 [ 44.106630] [ 44.171536] Allocated by task 305: [ 44.174997] kasan_save_stack+0x3c/0x68 [ 44.178900] kasan_save_track+0x20/0x40 [ 44.182809] kasan_save_alloc_info+0x40/0x58 [ 44.187146] __kasan_kmalloc+0xd4/0xd8 [ 44.190968] __kmalloc_cache_noprof+0x16c/0x3c0 [ 44.195578] ksize_uaf+0xb8/0x5f8 [ 44.198959] kunit_try_run_case+0x170/0x3f0 [ 44.203215] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.208787] kthread+0x328/0x630 [ 44.212076] ret_from_fork+0x10/0x20 [ 44.215716] [ 44.217246] Freed by task 305: [ 44.220358] kasan_save_stack+0x3c/0x68 [ 44.224269] kasan_save_track+0x20/0x40 [ 44.228180] kasan_save_free_info+0x4c/0x78 [ 44.232432] __kasan_slab_free+0x6c/0x98 [ 44.236428] kfree+0x214/0x3c8 [ 44.239540] ksize_uaf+0x11c/0x5f8 [ 44.243007] kunit_try_run_case+0x170/0x3f0 [ 44.247260] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.252830] kthread+0x328/0x630 [ 44.256124] ret_from_fork+0x10/0x20 [ 44.259764] [ 44.261291] The buggy address belongs to the object at ffff000082240200 [ 44.261291] which belongs to the cache kmalloc-128 of size 128 [ 44.273958] The buggy address is located 0 bytes inside of [ 44.273958] freed 128-byte region [ffff000082240200, ffff000082240280) [ 44.286181] [ 44.287718] The buggy address belongs to the physical page: [ 44.293367] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102240 [ 44.301483] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 44.309244] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 44.316301] page_type: f5(slab) [ 44.319509] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 44.327355] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 44.335203] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 44.343137] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 44.351072] head: 0bfffe0000000001 fffffdffc2089001 00000000ffffffff 00000000ffffffff [ 44.359006] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 44.366934] page dumped because: kasan: bad access detected [ 44.372582] [ 44.374111] Memory state around the buggy address: [ 44.378973] ffff000082240100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 44.386289] ffff000082240180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.393604] >ffff000082240200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 44.400916] ^ [ 44.404203] ffff000082240280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.411521] ffff000082240300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.418834] ================================================================== [ 44.427005] ================================================================== [ 44.434324] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 44.440772] Read of size 1 at addr ffff000082240278 by task kunit_try_catch/305 [ 44.448182] [ 44.449712] CPU: 4 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 44.449743] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.449751] Hardware name: Thundercomm Dragonboard 845c (DT) [ 44.449763] Call trace: [ 44.449770] show_stack+0x20/0x38 (C) [ 44.449788] dump_stack_lvl+0x8c/0xd0 [ 44.449807] print_report+0x118/0x608 [ 44.449825] kasan_report+0xdc/0x128 [ 44.449844] __asan_report_load1_noabort+0x20/0x30 [ 44.449861] ksize_uaf+0x544/0x5f8 [ 44.449877] kunit_try_run_case+0x170/0x3f0 [ 44.449896] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.449916] kthread+0x328/0x630 [ 44.449929] ret_from_fork+0x10/0x20 [ 44.449947] [ 44.514800] Allocated by task 305: [ 44.518255] kasan_save_stack+0x3c/0x68 [ 44.522162] kasan_save_track+0x20/0x40 [ 44.526068] kasan_save_alloc_info+0x40/0x58 [ 44.530407] __kasan_kmalloc+0xd4/0xd8 [ 44.534226] __kmalloc_cache_noprof+0x16c/0x3c0 [ 44.538825] ksize_uaf+0xb8/0x5f8 [ 44.542197] kunit_try_run_case+0x170/0x3f0 [ 44.546447] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.552012] kthread+0x328/0x630 [ 44.555296] ret_from_fork+0x10/0x20 [ 44.558931] [ 44.560462] Freed by task 305: [ 44.563568] kasan_save_stack+0x3c/0x68 [ 44.567474] kasan_save_track+0x20/0x40 [ 44.571378] kasan_save_free_info+0x4c/0x78 [ 44.575626] __kasan_slab_free+0x6c/0x98 [ 44.579619] kfree+0x214/0x3c8 [ 44.582733] ksize_uaf+0x11c/0x5f8 [ 44.586190] kunit_try_run_case+0x170/0x3f0 [ 44.590443] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.596005] kthread+0x328/0x630 [ 44.599288] ret_from_fork+0x10/0x20 [ 44.602923] [ 44.604453] The buggy address belongs to the object at ffff000082240200 [ 44.604453] which belongs to the cache kmalloc-128 of size 128 [ 44.617110] The buggy address is located 120 bytes inside of [ 44.617110] freed 128-byte region [ffff000082240200, ffff000082240280) [ 44.629499] [ 44.631034] The buggy address belongs to the physical page: [ 44.636677] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102240 [ 44.644782] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 44.652538] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 44.659587] page_type: f5(slab) [ 44.662789] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 44.670634] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 44.678477] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 44.686405] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 44.694334] head: 0bfffe0000000001 fffffdffc2089001 00000000ffffffff 00000000ffffffff [ 44.702262] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 44.710185] page dumped because: kasan: bad access detected [ 44.715822] [ 44.717346] Memory state around the buggy address: [ 44.722197] ffff000082240100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 44.729513] ffff000082240180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.736830] >ffff000082240200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 44.744146] ^ [ 44.751362] ffff000082240280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.758674] ffff000082240300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.765989] ================================================================== [ 43.734638] ================================================================== [ 43.746285] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 43.752731] Read of size 1 at addr ffff000082240200 by task kunit_try_catch/305 [ 43.760147] [ 43.761682] CPU: 3 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 43.761714] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.761723] Hardware name: Thundercomm Dragonboard 845c (DT) [ 43.761736] Call trace: [ 43.761743] show_stack+0x20/0x38 (C) [ 43.761762] dump_stack_lvl+0x8c/0xd0 [ 43.761784] print_report+0x118/0x608 [ 43.761804] kasan_report+0xdc/0x128 [ 43.761823] __kasan_check_byte+0x54/0x70 [ 43.761842] ksize+0x30/0x88 [ 43.761863] ksize_uaf+0x168/0x5f8 [ 43.761879] kunit_try_run_case+0x170/0x3f0 [ 43.761897] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.761920] kthread+0x328/0x630 [ 43.761934] ret_from_fork+0x10/0x20 [ 43.761953] [ 43.829008] Allocated by task 305: [ 43.832474] kasan_save_stack+0x3c/0x68 [ 43.836380] kasan_save_track+0x20/0x40 [ 43.840285] kasan_save_alloc_info+0x40/0x58 [ 43.844631] __kasan_kmalloc+0xd4/0xd8 [ 43.848448] __kmalloc_cache_noprof+0x16c/0x3c0 [ 43.853055] ksize_uaf+0xb8/0x5f8 [ 43.856430] kunit_try_run_case+0x170/0x3f0 [ 43.860690] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.866260] kthread+0x328/0x630 [ 43.869547] ret_from_fork+0x10/0x20 [ 43.873192] [ 43.874722] Freed by task 305: [ 43.877830] kasan_save_stack+0x3c/0x68 [ 43.881736] kasan_save_track+0x20/0x40 [ 43.885641] kasan_save_free_info+0x4c/0x78 [ 43.889899] __kasan_slab_free+0x6c/0x98 [ 43.893890] kfree+0x214/0x3c8 [ 43.897005] ksize_uaf+0x11c/0x5f8 [ 43.900476] kunit_try_run_case+0x170/0x3f0 [ 43.904737] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.910305] kthread+0x328/0x630 [ 43.913591] ret_from_fork+0x10/0x20 [ 43.917235] [ 43.918765] The buggy address belongs to the object at ffff000082240200 [ 43.918765] which belongs to the cache kmalloc-128 of size 128 [ 43.931429] The buggy address is located 0 bytes inside of [ 43.931429] freed 128-byte region [ffff000082240200, ffff000082240280) [ 43.943650] [ 43.945181] The buggy address belongs to the physical page: [ 43.950826] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102240 [ 43.958933] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 43.966692] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 43.973750] page_type: f5(slab) [ 43.976951] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 43.984799] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 43.992649] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 44.000584] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 44.008517] head: 0bfffe0000000001 fffffdffc2089001 00000000ffffffff 00000000ffffffff [ 44.016450] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 44.024379] page dumped because: kasan: bad access detected [ 44.030026] [ 44.031557] Memory state around the buggy address: [ 44.036416] ffff000082240100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 44.043732] ffff000082240180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.051049] >ffff000082240200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 44.058364] ^ [ 44.061650] ffff000082240280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.068968] ffff000082240300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.076281] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 42.805526] ================================================================== [ 42.817089] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 42.824589] Read of size 1 at addr ffff000082240173 by task kunit_try_catch/303 [ 42.831998] [ 42.833534] CPU: 3 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 42.833566] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.833574] Hardware name: Thundercomm Dragonboard 845c (DT) [ 42.833587] Call trace: [ 42.833594] show_stack+0x20/0x38 (C) [ 42.833613] dump_stack_lvl+0x8c/0xd0 [ 42.833635] print_report+0x118/0x608 [ 42.833655] kasan_report+0xdc/0x128 [ 42.833675] __asan_report_load1_noabort+0x20/0x30 [ 42.833694] ksize_unpoisons_memory+0x628/0x740 [ 42.833713] kunit_try_run_case+0x170/0x3f0 [ 42.833733] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.833754] kthread+0x328/0x630 [ 42.833769] ret_from_fork+0x10/0x20 [ 42.833788] [ 42.899872] Allocated by task 303: [ 42.903336] kasan_save_stack+0x3c/0x68 [ 42.907246] kasan_save_track+0x20/0x40 [ 42.911156] kasan_save_alloc_info+0x40/0x58 [ 42.915493] __kasan_kmalloc+0xd4/0xd8 [ 42.919315] __kmalloc_cache_noprof+0x16c/0x3c0 [ 42.923920] ksize_unpoisons_memory+0xc0/0x740 [ 42.928443] kunit_try_run_case+0x170/0x3f0 [ 42.932697] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.938272] kthread+0x328/0x630 [ 42.941564] ret_from_fork+0x10/0x20 [ 42.945211] [ 42.946741] The buggy address belongs to the object at ffff000082240100 [ 42.946741] which belongs to the cache kmalloc-128 of size 128 [ 42.959400] The buggy address is located 0 bytes to the right of [ 42.959400] allocated 115-byte region [ffff000082240100, ffff000082240173) [ 42.972503] [ 42.974035] The buggy address belongs to the physical page: [ 42.979681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102240 [ 42.987794] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 42.995552] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 43.002609] page_type: f5(slab) [ 43.005814] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 43.013659] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 43.021502] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 43.029434] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 43.037365] head: 0bfffe0000000001 fffffdffc2089001 00000000ffffffff 00000000ffffffff [ 43.045296] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 43.053222] page dumped because: kasan: bad access detected [ 43.058871] [ 43.060407] Memory state around the buggy address: [ 43.065269] ffff000082240000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 43.072595] ffff000082240080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.079918] >ffff000082240100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 43.087233] ^ [ 43.094200] ffff000082240180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.101524] ffff000082240200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.108844] ================================================================== [ 43.116234] ================================================================== [ 43.123557] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 43.131058] Read of size 1 at addr ffff000082240178 by task kunit_try_catch/303 [ 43.138470] [ 43.140009] CPU: 3 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 43.140038] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.140046] Hardware name: Thundercomm Dragonboard 845c (DT) [ 43.140057] Call trace: [ 43.140065] show_stack+0x20/0x38 (C) [ 43.140083] dump_stack_lvl+0x8c/0xd0 [ 43.140106] print_report+0x118/0x608 [ 43.140124] kasan_report+0xdc/0x128 [ 43.140143] __asan_report_load1_noabort+0x20/0x30 [ 43.140162] ksize_unpoisons_memory+0x618/0x740 [ 43.140182] kunit_try_run_case+0x170/0x3f0 [ 43.140200] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.140223] kthread+0x328/0x630 [ 43.140237] ret_from_fork+0x10/0x20 [ 43.140254] [ 43.206302] Allocated by task 303: [ 43.209762] kasan_save_stack+0x3c/0x68 [ 43.213672] kasan_save_track+0x20/0x40 [ 43.217582] kasan_save_alloc_info+0x40/0x58 [ 43.221920] __kasan_kmalloc+0xd4/0xd8 [ 43.225742] __kmalloc_cache_noprof+0x16c/0x3c0 [ 43.230352] ksize_unpoisons_memory+0xc0/0x740 [ 43.234873] kunit_try_run_case+0x170/0x3f0 [ 43.239124] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.244702] kthread+0x328/0x630 [ 43.247993] ret_from_fork+0x10/0x20 [ 43.251634] [ 43.253171] The buggy address belongs to the object at ffff000082240100 [ 43.253171] which belongs to the cache kmalloc-128 of size 128 [ 43.265835] The buggy address is located 5 bytes to the right of [ 43.265835] allocated 115-byte region [ffff000082240100, ffff000082240173) [ 43.278941] [ 43.280477] The buggy address belongs to the physical page: [ 43.286124] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102240 [ 43.294238] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 43.301995] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 43.309049] page_type: f5(slab) [ 43.312252] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 43.320096] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 43.327940] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 43.335872] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 43.343802] head: 0bfffe0000000001 fffffdffc2089001 00000000ffffffff 00000000ffffffff [ 43.351731] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 43.359656] page dumped because: kasan: bad access detected [ 43.365303] [ 43.366833] Memory state around the buggy address: [ 43.371692] ffff000082240000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 43.379007] ffff000082240080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.386332] >ffff000082240100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 43.393652] ^ [ 43.400888] ffff000082240180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.408212] ffff000082240200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.415527] ================================================================== [ 43.423704] ================================================================== [ 43.431032] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 43.438530] Read of size 1 at addr ffff00008224017f by task kunit_try_catch/303 [ 43.445936] [ 43.447472] CPU: 5 UID: 0 PID: 303 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 43.447503] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.447512] Hardware name: Thundercomm Dragonboard 845c (DT) [ 43.447523] Call trace: [ 43.447530] show_stack+0x20/0x38 (C) [ 43.447547] dump_stack_lvl+0x8c/0xd0 [ 43.447566] print_report+0x118/0x608 [ 43.447584] kasan_report+0xdc/0x128 [ 43.447603] __asan_report_load1_noabort+0x20/0x30 [ 43.447619] ksize_unpoisons_memory+0x690/0x740 [ 43.447637] kunit_try_run_case+0x170/0x3f0 [ 43.447654] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.447676] kthread+0x328/0x630 [ 43.447690] ret_from_fork+0x10/0x20 [ 43.447706] [ 43.513723] Allocated by task 303: [ 43.517175] kasan_save_stack+0x3c/0x68 [ 43.521083] kasan_save_track+0x20/0x40 [ 43.524987] kasan_save_alloc_info+0x40/0x58 [ 43.529323] __kasan_kmalloc+0xd4/0xd8 [ 43.533137] __kmalloc_cache_noprof+0x16c/0x3c0 [ 43.537738] ksize_unpoisons_memory+0xc0/0x740 [ 43.542249] kunit_try_run_case+0x170/0x3f0 [ 43.546499] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.552069] kthread+0x328/0x630 [ 43.555351] ret_from_fork+0x10/0x20 [ 43.558985] [ 43.560515] The buggy address belongs to the object at ffff000082240100 [ 43.560515] which belongs to the cache kmalloc-128 of size 128 [ 43.573168] The buggy address is located 12 bytes to the right of [ 43.573168] allocated 115-byte region [ffff000082240100, ffff000082240173) [ 43.586355] [ 43.587883] The buggy address belongs to the physical page: [ 43.593527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102240 [ 43.601629] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 43.609381] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 43.616437] page_type: f5(slab) [ 43.619631] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 43.627471] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 43.635313] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 43.643238] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 43.651163] head: 0bfffe0000000001 fffffdffc2089001 00000000ffffffff 00000000ffffffff [ 43.659090] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 43.667013] page dumped because: kasan: bad access detected [ 43.672663] [ 43.674185] Memory state around the buggy address: [ 43.679045] ffff000082240000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 43.686360] ffff000082240080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.693673] >ffff000082240100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 43.700984] ^ [ 43.708210] ffff000082240180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.715526] ffff000082240200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.722833] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive
[ 42.482103] ================================================================== [ 42.489417] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 42.495514] Free of addr ffff0000955dd4a0 by task kunit_try_catch/301 [ 42.502040] [ 42.503573] CPU: 7 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 42.503602] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.503609] Hardware name: Thundercomm Dragonboard 845c (DT) [ 42.503621] Call trace: [ 42.503628] show_stack+0x20/0x38 (C) [ 42.503646] dump_stack_lvl+0x8c/0xd0 [ 42.503664] print_report+0x118/0x608 [ 42.503682] kasan_report_invalid_free+0xc0/0xe8 [ 42.503703] check_slab_allocation+0xd4/0x108 [ 42.503722] __kasan_slab_pre_free+0x2c/0x48 [ 42.503741] kfree+0xe8/0x3c8 [ 42.503757] kfree_sensitive+0x3c/0xb0 [ 42.503773] kmalloc_double_kzfree+0x168/0x308 [ 42.503791] kunit_try_run_case+0x170/0x3f0 [ 42.503809] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.503830] kthread+0x328/0x630 [ 42.503843] ret_from_fork+0x10/0x20 [ 42.503860] [ 42.581525] Allocated by task 301: [ 42.584977] kasan_save_stack+0x3c/0x68 [ 42.588883] kasan_save_track+0x20/0x40 [ 42.592789] kasan_save_alloc_info+0x40/0x58 [ 42.597124] __kasan_kmalloc+0xd4/0xd8 [ 42.600940] __kmalloc_cache_noprof+0x16c/0x3c0 [ 42.605538] kmalloc_double_kzfree+0xb8/0x308 [ 42.609960] kunit_try_run_case+0x170/0x3f0 [ 42.614209] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.619773] kthread+0x328/0x630 [ 42.623058] ret_from_fork+0x10/0x20 [ 42.626690] [ 42.628220] Freed by task 301: [ 42.631325] kasan_save_stack+0x3c/0x68 [ 42.635220] kasan_save_track+0x20/0x40 [ 42.639124] kasan_save_free_info+0x4c/0x78 [ 42.643369] __kasan_slab_free+0x6c/0x98 [ 42.647361] kfree+0x214/0x3c8 [ 42.650473] kfree_sensitive+0x80/0xb0 [ 42.654288] kmalloc_double_kzfree+0x11c/0x308 [ 42.658799] kunit_try_run_case+0x170/0x3f0 [ 42.663049] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.668612] kthread+0x328/0x630 [ 42.671894] ret_from_fork+0x10/0x20 [ 42.675536] [ 42.677060] The buggy address belongs to the object at ffff0000955dd4a0 [ 42.677060] which belongs to the cache kmalloc-16 of size 16 [ 42.689538] The buggy address is located 0 bytes inside of [ 42.689538] 16-byte region [ffff0000955dd4a0, ffff0000955dd4b0) [ 42.701139] [ 42.702665] The buggy address belongs to the physical page: [ 42.708312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1155dd [ 42.716411] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.723028] page_type: f5(slab) [ 42.726226] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 42.734067] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 42.741904] page dumped because: kasan: bad access detected [ 42.747543] [ 42.749066] Memory state around the buggy address: [ 42.753917] ffff0000955dd380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 42.761237] ffff0000955dd400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 42.768556] >ffff0000955dd480: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 42.775869] ^ [ 42.780202] ffff0000955dd500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.787520] ffff0000955dd580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.794827] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[ 42.160570] ================================================================== [ 42.175202] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 42.182705] Read of size 1 at addr ffff0000955dd4a0 by task kunit_try_catch/301 [ 42.190110] [ 42.191644] CPU: 7 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 42.191676] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.191684] Hardware name: Thundercomm Dragonboard 845c (DT) [ 42.191697] Call trace: [ 42.191704] show_stack+0x20/0x38 (C) [ 42.191721] dump_stack_lvl+0x8c/0xd0 [ 42.191742] print_report+0x118/0x608 [ 42.191761] kasan_report+0xdc/0x128 [ 42.191778] __kasan_check_byte+0x54/0x70 [ 42.191796] kfree_sensitive+0x30/0xb0 [ 42.191817] kmalloc_double_kzfree+0x168/0x308 [ 42.191836] kunit_try_run_case+0x170/0x3f0 [ 42.191853] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.191874] kthread+0x328/0x630 [ 42.191887] ret_from_fork+0x10/0x20 [ 42.191905] [ 42.260854] Allocated by task 301: [ 42.264307] kasan_save_stack+0x3c/0x68 [ 42.268213] kasan_save_track+0x20/0x40 [ 42.272116] kasan_save_alloc_info+0x40/0x58 [ 42.276452] __kasan_kmalloc+0xd4/0xd8 [ 42.280268] __kmalloc_cache_noprof+0x16c/0x3c0 [ 42.284866] kmalloc_double_kzfree+0xb8/0x308 [ 42.289290] kunit_try_run_case+0x170/0x3f0 [ 42.293539] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.299105] kthread+0x328/0x630 [ 42.302388] ret_from_fork+0x10/0x20 [ 42.306031] [ 42.307560] Freed by task 301: [ 42.310672] kasan_save_stack+0x3c/0x68 [ 42.314576] kasan_save_track+0x20/0x40 [ 42.318479] kasan_save_free_info+0x4c/0x78 [ 42.322725] __kasan_slab_free+0x6c/0x98 [ 42.326718] kfree+0x214/0x3c8 [ 42.329827] kfree_sensitive+0x80/0xb0 [ 42.333644] kmalloc_double_kzfree+0x11c/0x308 [ 42.338156] kunit_try_run_case+0x170/0x3f0 [ 42.342405] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.347976] kthread+0x328/0x630 [ 42.351259] ret_from_fork+0x10/0x20 [ 42.354892] [ 42.356423] The buggy address belongs to the object at ffff0000955dd4a0 [ 42.356423] which belongs to the cache kmalloc-16 of size 16 [ 42.368902] The buggy address is located 0 bytes inside of [ 42.368902] freed 16-byte region [ffff0000955dd4a0, ffff0000955dd4b0) [ 42.381039] [ 42.382563] The buggy address belongs to the physical page: [ 42.388202] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1155dd [ 42.396302] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.402918] page_type: f5(slab) [ 42.406114] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 42.413953] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 42.421792] page dumped because: kasan: bad access detected [ 42.427432] [ 42.428954] Memory state around the buggy address: [ 42.433807] ffff0000955dd380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 42.441121] ffff0000955dd400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 42.448435] >ffff0000955dd480: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 42.455749] ^ [ 42.460082] ffff0000955dd500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.467398] ffff0000955dd580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.474706] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[ 41.840510] ================================================================== [ 41.851811] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 41.858520] Read of size 1 at addr ffff000097bcda28 by task kunit_try_catch/297 [ 41.865930] [ 41.867464] CPU: 2 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 41.867493] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.867502] Hardware name: Thundercomm Dragonboard 845c (DT) [ 41.867513] Call trace: [ 41.867520] show_stack+0x20/0x38 (C) [ 41.867537] dump_stack_lvl+0x8c/0xd0 [ 41.867558] print_report+0x118/0x608 [ 41.867576] kasan_report+0xdc/0x128 [ 41.867595] __asan_report_load1_noabort+0x20/0x30 [ 41.867613] kmalloc_uaf2+0x3f4/0x468 [ 41.867629] kunit_try_run_case+0x170/0x3f0 [ 41.867648] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.867670] kthread+0x328/0x630 [ 41.867685] ret_from_fork+0x10/0x20 [ 41.867702] [ 41.932886] Allocated by task 297: [ 41.936346] kasan_save_stack+0x3c/0x68 [ 41.940256] kasan_save_track+0x20/0x40 [ 41.944166] kasan_save_alloc_info+0x40/0x58 [ 41.948506] __kasan_kmalloc+0xd4/0xd8 [ 41.952329] __kmalloc_cache_noprof+0x16c/0x3c0 [ 41.956940] kmalloc_uaf2+0xc4/0x468 [ 41.960578] kunit_try_run_case+0x170/0x3f0 [ 41.964832] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.970408] kthread+0x328/0x630 [ 41.973699] ret_from_fork+0x10/0x20 [ 41.977336] [ 41.978868] Freed by task 297: [ 41.981980] kasan_save_stack+0x3c/0x68 [ 41.985890] kasan_save_track+0x20/0x40 [ 41.989800] kasan_save_free_info+0x4c/0x78 [ 41.994052] __kasan_slab_free+0x6c/0x98 [ 41.998049] kfree+0x214/0x3c8 [ 42.001168] kmalloc_uaf2+0x134/0x468 [ 42.004902] kunit_try_run_case+0x170/0x3f0 [ 42.009156] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.014731] kthread+0x328/0x630 [ 42.018022] ret_from_fork+0x10/0x20 [ 42.021660] [ 42.023188] The buggy address belongs to the object at ffff000097bcda00 [ 42.023188] which belongs to the cache kmalloc-64 of size 64 [ 42.035679] The buggy address is located 40 bytes inside of [ 42.035679] freed 64-byte region [ffff000097bcda00, ffff000097bcda40) [ 42.047901] [ 42.049431] The buggy address belongs to the physical page: [ 42.055080] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x117bcd [ 42.063195] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.069810] page_type: f5(slab) [ 42.073015] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 42.080860] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 42.088702] page dumped because: kasan: bad access detected [ 42.094354] [ 42.095889] Memory state around the buggy address: [ 42.100753] ffff000097bcd900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.108068] ffff000097bcd980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.115385] >ffff000097bcda00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.122698] ^ [ 42.127301] ffff000097bcda80: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 42.134618] ffff000097bcdb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.141940] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 41.523261] ================================================================== [ 41.533949] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 41.541182] Write of size 33 at addr ffff000081814780 by task kunit_try_catch/295 [ 41.548770] [ 41.550305] CPU: 3 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 41.550337] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.550346] Hardware name: Thundercomm Dragonboard 845c (DT) [ 41.550360] Call trace: [ 41.550367] show_stack+0x20/0x38 (C) [ 41.550385] dump_stack_lvl+0x8c/0xd0 [ 41.550409] print_report+0x118/0x608 [ 41.550427] kasan_report+0xdc/0x128 [ 41.550447] kasan_check_range+0x100/0x1a8 [ 41.550467] __asan_memset+0x34/0x78 [ 41.550485] kmalloc_uaf_memset+0x170/0x310 [ 41.550503] kunit_try_run_case+0x170/0x3f0 [ 41.550522] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.550544] kthread+0x328/0x630 [ 41.550558] ret_from_fork+0x10/0x20 [ 41.550576] [ 41.619207] Allocated by task 295: [ 41.622673] kasan_save_stack+0x3c/0x68 [ 41.626581] kasan_save_track+0x20/0x40 [ 41.630486] kasan_save_alloc_info+0x40/0x58 [ 41.634831] __kasan_kmalloc+0xd4/0xd8 [ 41.638650] __kmalloc_cache_noprof+0x16c/0x3c0 [ 41.643256] kmalloc_uaf_memset+0xb8/0x310 [ 41.647419] kunit_try_run_case+0x170/0x3f0 [ 41.651680] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.657249] kthread+0x328/0x630 [ 41.660536] ret_from_fork+0x10/0x20 [ 41.664181] [ 41.665711] Freed by task 295: [ 41.668820] kasan_save_stack+0x3c/0x68 [ 41.672726] kasan_save_track+0x20/0x40 [ 41.676632] kasan_save_free_info+0x4c/0x78 [ 41.680890] __kasan_slab_free+0x6c/0x98 [ 41.684883] kfree+0x214/0x3c8 [ 41.687997] kmalloc_uaf_memset+0x11c/0x310 [ 41.692256] kunit_try_run_case+0x170/0x3f0 [ 41.696518] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.702087] kthread+0x328/0x630 [ 41.705374] ret_from_fork+0x10/0x20 [ 41.709018] [ 41.710549] The buggy address belongs to the object at ffff000081814780 [ 41.710549] which belongs to the cache kmalloc-64 of size 64 [ 41.723037] The buggy address is located 0 bytes inside of [ 41.723037] freed 64-byte region [ffff000081814780, ffff0000818147c0) [ 41.735173] [ 41.736705] The buggy address belongs to the physical page: [ 41.742352] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101814 [ 41.750457] ksm flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.757428] page_type: f5(slab) [ 41.760628] raw: 0bfffe0000000000 ffff0000800028c0 fffffdffc20ea340 0000000000000007 [ 41.768476] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 41.776318] page dumped because: kasan: bad access detected [ 41.781966] [ 41.783496] Memory state around the buggy address: [ 41.788354] ffff000081814680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.795669] ffff000081814700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.802984] >ffff000081814780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.810298] ^ [ 41.813583] ffff000081814800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.820899] ffff000081814880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.828212] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[ 41.210189] ================================================================== [ 41.222363] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 41.228983] Read of size 1 at addr ffff000097bbea08 by task kunit_try_catch/293 [ 41.236397] [ 41.237931] CPU: 2 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 41.237962] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.237971] Hardware name: Thundercomm Dragonboard 845c (DT) [ 41.237985] Call trace: [ 41.237991] show_stack+0x20/0x38 (C) [ 41.238009] dump_stack_lvl+0x8c/0xd0 [ 41.238031] print_report+0x118/0x608 [ 41.238050] kasan_report+0xdc/0x128 [ 41.238069] __asan_report_load1_noabort+0x20/0x30 [ 41.238087] kmalloc_uaf+0x300/0x338 [ 41.238105] kunit_try_run_case+0x170/0x3f0 [ 41.238124] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.238146] kthread+0x328/0x630 [ 41.238161] ret_from_fork+0x10/0x20 [ 41.238179] [ 41.303268] Allocated by task 293: [ 41.306731] kasan_save_stack+0x3c/0x68 [ 41.310643] kasan_save_track+0x20/0x40 [ 41.314544] kasan_save_alloc_info+0x40/0x58 [ 41.318882] __kasan_kmalloc+0xd4/0xd8 [ 41.322696] __kmalloc_cache_noprof+0x16c/0x3c0 [ 41.327309] kmalloc_uaf+0xb8/0x338 [ 41.330863] kunit_try_run_case+0x170/0x3f0 [ 41.335116] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.340689] kthread+0x328/0x630 [ 41.343983] ret_from_fork+0x10/0x20 [ 41.347625] [ 41.349153] Freed by task 293: [ 41.352268] kasan_save_stack+0x3c/0x68 [ 41.356179] kasan_save_track+0x20/0x40 [ 41.360089] kasan_save_free_info+0x4c/0x78 [ 41.364343] __kasan_slab_free+0x6c/0x98 [ 41.368341] kfree+0x214/0x3c8 [ 41.371453] kmalloc_uaf+0x11c/0x338 [ 41.375091] kunit_try_run_case+0x170/0x3f0 [ 41.379346] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.384918] kthread+0x328/0x630 [ 41.388209] ret_from_fork+0x10/0x20 [ 41.391849] [ 41.393379] The buggy address belongs to the object at ffff000097bbea00 [ 41.393379] which belongs to the cache kmalloc-16 of size 16 [ 41.405865] The buggy address is located 8 bytes inside of [ 41.405865] freed 16-byte region [ffff000097bbea00, ffff000097bbea10) [ 41.418007] [ 41.419537] The buggy address belongs to the physical page: [ 41.425186] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x117bbe [ 41.433292] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.439909] page_type: f5(slab) [ 41.443119] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 41.450969] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 41.458814] page dumped because: kasan: bad access detected [ 41.464462] [ 41.465993] Memory state around the buggy address: [ 41.470857] ffff000097bbe900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 41.478173] ffff000097bbe980: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 41.485491] >ffff000097bbea00: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.492806] ^ [ 41.496355] ffff000097bbea80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.503673] ffff000097bbeb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.510989] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 40.932742] ================================================================== [ 40.944997] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0 [ 40.953019] Read of size 64 at addr ffff000098090384 by task kunit_try_catch/291 [ 40.960517] [ 40.962046] CPU: 4 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 40.962077] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.962085] Hardware name: Thundercomm Dragonboard 845c (DT) [ 40.962097] Call trace: [ 40.962104] show_stack+0x20/0x38 (C) [ 40.962123] dump_stack_lvl+0x8c/0xd0 [ 40.962144] print_report+0x118/0x608 [ 40.962162] kasan_report+0xdc/0x128 [ 40.962181] kasan_check_range+0x100/0x1a8 [ 40.962201] __asan_memmove+0x3c/0x98 [ 40.962215] kmalloc_memmove_invalid_size+0x154/0x2e0 [ 40.962234] kunit_try_run_case+0x170/0x3f0 [ 40.962253] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.962274] kthread+0x328/0x630 [ 40.962288] ret_from_fork+0x10/0x20 [ 40.962305] [ 41.031831] Allocated by task 291: [ 41.035286] kasan_save_stack+0x3c/0x68 [ 41.039185] kasan_save_track+0x20/0x40 [ 41.043080] kasan_save_alloc_info+0x40/0x58 [ 41.047416] __kasan_kmalloc+0xd4/0xd8 [ 41.051234] __kmalloc_cache_noprof+0x16c/0x3c0 [ 41.055837] kmalloc_memmove_invalid_size+0xb0/0x2e0 [ 41.060872] kunit_try_run_case+0x170/0x3f0 [ 41.065124] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.070690] kthread+0x328/0x630 [ 41.073975] ret_from_fork+0x10/0x20 [ 41.077609] [ 41.079141] The buggy address belongs to the object at ffff000098090380 [ 41.079141] which belongs to the cache kmalloc-64 of size 64 [ 41.091620] The buggy address is located 4 bytes inside of [ 41.091620] allocated 64-byte region [ffff000098090380, ffff0000980903c0) [ 41.104106] [ 41.105631] The buggy address belongs to the physical page: [ 41.111273] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x118090 [ 41.119377] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.125997] page_type: f5(slab) [ 41.129194] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 41.137036] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 41.144875] page dumped because: kasan: bad access detected [ 41.150523] [ 41.152053] Memory state around the buggy address: [ 41.156908] ffff000098090280: 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc fc [ 41.164225] ffff000098090300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.171532] >ffff000098090380: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 41.178842] ^ [ 41.184226] ffff000098090400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.191543] ffff000098090480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.198854] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 40.657013] ================================================================== [ 40.668578] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 40.676258] Read of size 18446744073709551614 at addr ffff000097bcd984 by task kunit_try_catch/289 [ 40.685339] [ 40.686875] CPU: 2 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 40.686905] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.686915] Hardware name: Thundercomm Dragonboard 845c (DT) [ 40.686927] Call trace: [ 40.686935] show_stack+0x20/0x38 (C) [ 40.686953] dump_stack_lvl+0x8c/0xd0 [ 40.686975] print_report+0x118/0x608 [ 40.686995] kasan_report+0xdc/0x128 [ 40.687014] kasan_check_range+0x100/0x1a8 [ 40.687035] __asan_memmove+0x3c/0x98 [ 40.687052] kmalloc_memmove_negative_size+0x154/0x2e0 [ 40.687072] kunit_try_run_case+0x170/0x3f0 [ 40.687090] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.687114] kthread+0x328/0x630 [ 40.687130] ret_from_fork+0x10/0x20 [ 40.687149] [ 40.756827] Allocated by task 289: [ 40.760294] kasan_save_stack+0x3c/0x68 [ 40.764201] kasan_save_track+0x20/0x40 [ 40.768106] kasan_save_alloc_info+0x40/0x58 [ 40.772452] __kasan_kmalloc+0xd4/0xd8 [ 40.776269] __kmalloc_cache_noprof+0x16c/0x3c0 [ 40.780877] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 40.786013] kunit_try_run_case+0x170/0x3f0 [ 40.790274] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.795845] kthread+0x328/0x630 [ 40.799132] ret_from_fork+0x10/0x20 [ 40.802776] [ 40.804307] The buggy address belongs to the object at ffff000097bcd980 [ 40.804307] which belongs to the cache kmalloc-64 of size 64 [ 40.816798] The buggy address is located 4 bytes inside of [ 40.816798] 64-byte region [ffff000097bcd980, ffff000097bcd9c0) [ 40.828415] [ 40.829948] The buggy address belongs to the physical page: [ 40.835594] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x117bcd [ 40.843699] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.850324] page_type: f5(slab) [ 40.853526] raw: 0bfffe0000000000 ffff0000800028c0 dead000000000122 0000000000000000 [ 40.861372] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 40.869216] page dumped because: kasan: bad access detected [ 40.874862] [ 40.876392] Memory state around the buggy address: [ 40.881250] ffff000097bcd880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 40.888564] ffff000097bcd900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 40.895881] >ffff000097bcd980: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 40.903195] ^ [ 40.906479] ffff000097bcda00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.913794] ffff000097bcda80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.921106] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[ 40.339324] ================================================================== [ 40.350793] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 40.358205] Write of size 16 at addr ffff000095356269 by task kunit_try_catch/287 [ 40.365788] [ 40.367324] CPU: 4 UID: 0 PID: 287 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 40.367355] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.367364] Hardware name: Thundercomm Dragonboard 845c (DT) [ 40.367377] Call trace: [ 40.367384] show_stack+0x20/0x38 (C) [ 40.367402] dump_stack_lvl+0x8c/0xd0 [ 40.367421] print_report+0x118/0x608 [ 40.367440] kasan_report+0xdc/0x128 [ 40.367457] kasan_check_range+0x100/0x1a8 [ 40.367476] __asan_memset+0x34/0x78 [ 40.367491] kmalloc_oob_memset_16+0x150/0x2f8 [ 40.367509] kunit_try_run_case+0x170/0x3f0 [ 40.367526] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.367547] kthread+0x328/0x630 [ 40.367560] ret_from_fork+0x10/0x20 [ 40.367577] [ 40.436420] Allocated by task 287: [ 40.439875] kasan_save_stack+0x3c/0x68 [ 40.443784] kasan_save_track+0x20/0x40 [ 40.447691] kasan_save_alloc_info+0x40/0x58 [ 40.452028] __kasan_kmalloc+0xd4/0xd8 [ 40.455848] __kmalloc_cache_noprof+0x16c/0x3c0 [ 40.460447] kmalloc_oob_memset_16+0xb0/0x2f8 [ 40.464871] kunit_try_run_case+0x170/0x3f0 [ 40.469122] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.474689] kthread+0x328/0x630 [ 40.477971] ret_from_fork+0x10/0x20 [ 40.481605] [ 40.483137] The buggy address belongs to the object at ffff000095356200 [ 40.483137] which belongs to the cache kmalloc-128 of size 128 [ 40.495794] The buggy address is located 105 bytes inside of [ 40.495794] allocated 120-byte region [ffff000095356200, ffff000095356278) [ 40.508541] [ 40.510067] The buggy address belongs to the physical page: [ 40.515712] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x115356 [ 40.523815] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 40.531570] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 40.538624] page_type: f5(slab) [ 40.541821] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 40.549664] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 40.557507] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 40.565435] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 40.573362] head: 0bfffe0000000001 fffffdffc254d581 00000000ffffffff 00000000ffffffff [ 40.581290] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 40.589215] page dumped because: kasan: bad access detected [ 40.594862] [ 40.596391] Memory state around the buggy address: [ 40.601245] ffff000095356100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 40.608563] ffff000095356180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.615870] >ffff000095356200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 40.623179] ^ [ 40.630400] ffff000095356280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.637717] ffff000095356300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.645022] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[ 40.021323] ================================================================== [ 40.032797] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 40.040122] Write of size 8 at addr ffff000082240071 by task kunit_try_catch/285 [ 40.047621] [ 40.049153] CPU: 3 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 40.049184] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.049192] Hardware name: Thundercomm Dragonboard 845c (DT) [ 40.049203] Call trace: [ 40.049211] show_stack+0x20/0x38 (C) [ 40.049229] dump_stack_lvl+0x8c/0xd0 [ 40.049249] print_report+0x118/0x608 [ 40.049268] kasan_report+0xdc/0x128 [ 40.049287] kasan_check_range+0x100/0x1a8 [ 40.049308] __asan_memset+0x34/0x78 [ 40.049323] kmalloc_oob_memset_8+0x150/0x2f8 [ 40.049341] kunit_try_run_case+0x170/0x3f0 [ 40.049361] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.049383] kthread+0x328/0x630 [ 40.049397] ret_from_fork+0x10/0x20 [ 40.049415] [ 40.118214] Allocated by task 285: [ 40.121673] kasan_save_stack+0x3c/0x68 [ 40.125581] kasan_save_track+0x20/0x40 [ 40.129489] kasan_save_alloc_info+0x40/0x58 [ 40.133827] __kasan_kmalloc+0xd4/0xd8 [ 40.137648] __kmalloc_cache_noprof+0x16c/0x3c0 [ 40.142258] kmalloc_oob_memset_8+0xb0/0x2f8 [ 40.146598] kunit_try_run_case+0x170/0x3f0 [ 40.150849] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.156425] kthread+0x328/0x630 [ 40.159717] ret_from_fork+0x10/0x20 [ 40.163356] [ 40.164892] The buggy address belongs to the object at ffff000082240000 [ 40.164892] which belongs to the cache kmalloc-128 of size 128 [ 40.177554] The buggy address is located 113 bytes inside of [ 40.177554] allocated 120-byte region [ffff000082240000, ffff000082240078) [ 40.190303] [ 40.191839] The buggy address belongs to the physical page: [ 40.197485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102240 [ 40.205595] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 40.213348] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 40.220400] page_type: f5(slab) [ 40.223607] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 40.231449] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 40.239292] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 40.247232] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 40.255171] head: 0bfffe0000000001 fffffdffc2089001 00000000ffffffff 00000000ffffffff [ 40.263111] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 40.271036] page dumped because: kasan: bad access detected [ 40.276689] [ 40.278219] Memory state around the buggy address: [ 40.283080] ffff00008223ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.290404] ffff00008223ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.297725] >ffff000082240000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 40.305044] ^ [ 40.312277] ffff000082240080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.319593] ffff000082240100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.326915] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[ 39.705265] ================================================================== [ 39.716745] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 39.724068] Write of size 4 at addr ffff000095356175 by task kunit_try_catch/283 [ 39.731563] [ 39.733101] CPU: 4 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 39.733131] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.733141] Hardware name: Thundercomm Dragonboard 845c (DT) [ 39.733152] Call trace: [ 39.733160] show_stack+0x20/0x38 (C) [ 39.733178] dump_stack_lvl+0x8c/0xd0 [ 39.733199] print_report+0x118/0x608 [ 39.733218] kasan_report+0xdc/0x128 [ 39.733237] kasan_check_range+0x100/0x1a8 [ 39.733257] __asan_memset+0x34/0x78 [ 39.733272] kmalloc_oob_memset_4+0x150/0x300 [ 39.733289] kunit_try_run_case+0x170/0x3f0 [ 39.733307] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.733329] kthread+0x328/0x630 [ 39.733342] ret_from_fork+0x10/0x20 [ 39.733358] [ 39.802129] Allocated by task 283: [ 39.805582] kasan_save_stack+0x3c/0x68 [ 39.809488] kasan_save_track+0x20/0x40 [ 39.813394] kasan_save_alloc_info+0x40/0x58 [ 39.817729] __kasan_kmalloc+0xd4/0xd8 [ 39.821546] __kmalloc_cache_noprof+0x16c/0x3c0 [ 39.826147] kmalloc_oob_memset_4+0xb0/0x300 [ 39.830486] kunit_try_run_case+0x170/0x3f0 [ 39.834737] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.840297] kthread+0x328/0x630 [ 39.843579] ret_from_fork+0x10/0x20 [ 39.847211] [ 39.848743] The buggy address belongs to the object at ffff000095356100 [ 39.848743] which belongs to the cache kmalloc-128 of size 128 [ 39.861399] The buggy address is located 117 bytes inside of [ 39.861399] allocated 120-byte region [ffff000095356100, ffff000095356178) [ 39.874140] [ 39.875671] The buggy address belongs to the physical page: [ 39.881319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x115356 [ 39.889417] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 39.897171] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 39.904217] page_type: f5(slab) [ 39.907414] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 39.915255] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.923098] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 39.931024] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.938949] head: 0bfffe0000000001 fffffdffc254d581 00000000ffffffff 00000000ffffffff [ 39.946874] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 39.954799] page dumped because: kasan: bad access detected [ 39.960440] [ 39.961963] Memory state around the buggy address: [ 39.966817] ffff000095356000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 39.974133] ffff000095356080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.981447] >ffff000095356100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 39.988763] ^ [ 39.995986] ffff000095356180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.003303] ffff000095356200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.010610] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[ 39.387999] ================================================================== [ 39.399563] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 39.406883] Write of size 2 at addr ffff000080df5877 by task kunit_try_catch/281 [ 39.414384] [ 39.415920] CPU: 2 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 39.415952] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.415961] Hardware name: Thundercomm Dragonboard 845c (DT) [ 39.415974] Call trace: [ 39.415980] show_stack+0x20/0x38 (C) [ 39.415998] dump_stack_lvl+0x8c/0xd0 [ 39.416020] print_report+0x118/0x608 [ 39.416040] kasan_report+0xdc/0x128 [ 39.416058] kasan_check_range+0x100/0x1a8 [ 39.416079] __asan_memset+0x34/0x78 [ 39.416095] kmalloc_oob_memset_2+0x150/0x2f8 [ 39.416113] kunit_try_run_case+0x170/0x3f0 [ 39.416131] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.416152] kthread+0x328/0x630 [ 39.416169] ret_from_fork+0x10/0x20 [ 39.416187] [ 39.484991] Allocated by task 281: [ 39.488458] kasan_save_stack+0x3c/0x68 [ 39.492363] kasan_save_track+0x20/0x40 [ 39.496269] kasan_save_alloc_info+0x40/0x58 [ 39.500613] __kasan_kmalloc+0xd4/0xd8 [ 39.504432] __kmalloc_cache_noprof+0x16c/0x3c0 [ 39.509040] kmalloc_oob_memset_2+0xb0/0x2f8 [ 39.513387] kunit_try_run_case+0x170/0x3f0 [ 39.517646] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.523215] kthread+0x328/0x630 [ 39.526502] ret_from_fork+0x10/0x20 [ 39.530147] [ 39.531677] The buggy address belongs to the object at ffff000080df5800 [ 39.531677] which belongs to the cache kmalloc-128 of size 128 [ 39.544339] The buggy address is located 119 bytes inside of [ 39.544339] allocated 120-byte region [ffff000080df5800, ffff000080df5878) [ 39.557090] [ 39.558621] The buggy address belongs to the physical page: [ 39.564270] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100df4 [ 39.572375] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 39.580135] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 39.587193] page_type: f5(slab) [ 39.590393] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 39.598240] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.606088] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 39.614021] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.621956] head: 0bfffe0000000001 fffffdffc2037d01 00000000ffffffff 00000000ffffffff [ 39.629889] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 39.637817] page dumped because: kasan: bad access detected [ 39.643463] [ 39.644993] Memory state around the buggy address: [ 39.649853] ffff000080df5700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 39.657168] ffff000080df5780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.664484] >ffff000080df5800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 39.671797] ^ [ 39.679022] ffff000080df5880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.686337] ffff000080df5900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.693651] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 39.070531] ================================================================== [ 39.081492] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 39.088904] Write of size 128 at addr ffff0000814acf00 by task kunit_try_catch/279 [ 39.096577] [ 39.098114] CPU: 3 UID: 0 PID: 279 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 39.098143] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.098152] Hardware name: Thundercomm Dragonboard 845c (DT) [ 39.098164] Call trace: [ 39.098173] show_stack+0x20/0x38 (C) [ 39.098190] dump_stack_lvl+0x8c/0xd0 [ 39.098212] print_report+0x118/0x608 [ 39.098233] kasan_report+0xdc/0x128 [ 39.098252] kasan_check_range+0x100/0x1a8 [ 39.098273] __asan_memset+0x34/0x78 [ 39.098289] kmalloc_oob_in_memset+0x144/0x2d0 [ 39.098306] kunit_try_run_case+0x170/0x3f0 [ 39.098324] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.098346] kthread+0x328/0x630 [ 39.098361] ret_from_fork+0x10/0x20 [ 39.098380] [ 39.167262] Allocated by task 279: [ 39.170724] kasan_save_stack+0x3c/0x68 [ 39.174633] kasan_save_track+0x20/0x40 [ 39.178543] kasan_save_alloc_info+0x40/0x58 [ 39.182881] __kasan_kmalloc+0xd4/0xd8 [ 39.186702] __kmalloc_cache_noprof+0x16c/0x3c0 [ 39.191313] kmalloc_oob_in_memset+0xb0/0x2d0 [ 39.195748] kunit_try_run_case+0x170/0x3f0 [ 39.200000] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.205574] kthread+0x328/0x630 [ 39.208865] ret_from_fork+0x10/0x20 [ 39.212502] [ 39.214033] The buggy address belongs to the object at ffff0000814acf00 [ 39.214033] which belongs to the cache kmalloc-128 of size 128 [ 39.226699] The buggy address is located 0 bytes inside of [ 39.226699] allocated 120-byte region [ffff0000814acf00, ffff0000814acf78) [ 39.239277] [ 39.240816] The buggy address belongs to the physical page: [ 39.246469] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1014ac [ 39.254583] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 39.262340] anon flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 39.269838] page_type: f5(slab) [ 39.273043] raw: 0bfffe0000000040 ffff000080002a00 0000000000000000 0000000000000001 [ 39.280886] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.288732] head: 0bfffe0000000040 ffff000080002a00 0000000000000000 0000000000000001 [ 39.296665] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.304596] head: 0bfffe0000000001 fffffdffc2052b01 00000000ffffffff 00000000ffffffff [ 39.312527] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 39.320453] page dumped because: kasan: bad access detected [ 39.326103] [ 39.327640] Memory state around the buggy address: [ 39.332500] ffff0000814ace00: 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc [ 39.339814] ffff0000814ace80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.347131] >ffff0000814acf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 39.354444] ^ [ 39.361668] ffff0000814acf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.368994] ffff0000814ad000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.376314] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[ 38.755294] ================================================================== [ 38.766237] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 38.773123] Read of size 16 at addr ffff0000981901e0 by task kunit_try_catch/277 [ 38.780625] [ 38.782160] CPU: 3 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 38.782189] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.782198] Hardware name: Thundercomm Dragonboard 845c (DT) [ 38.782210] Call trace: [ 38.782218] show_stack+0x20/0x38 (C) [ 38.782237] dump_stack_lvl+0x8c/0xd0 [ 38.782259] print_report+0x118/0x608 [ 38.782280] kasan_report+0xdc/0x128 [ 38.782298] __asan_report_load16_noabort+0x20/0x30 [ 38.782318] kmalloc_uaf_16+0x3bc/0x438 [ 38.782335] kunit_try_run_case+0x170/0x3f0 [ 38.782353] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.782375] kthread+0x328/0x630 [ 38.782391] ret_from_fork+0x10/0x20 [ 38.782409] [ 38.847849] Allocated by task 277: [ 38.851315] kasan_save_stack+0x3c/0x68 [ 38.855223] kasan_save_track+0x20/0x40 [ 38.859127] kasan_save_alloc_info+0x40/0x58 [ 38.863474] __kasan_kmalloc+0xd4/0xd8 [ 38.867290] __kmalloc_cache_noprof+0x16c/0x3c0 [ 38.871897] kmalloc_uaf_16+0x140/0x438 [ 38.875802] kunit_try_run_case+0x170/0x3f0 [ 38.880063] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.885634] kthread+0x328/0x630 [ 38.888919] ret_from_fork+0x10/0x20 [ 38.892564] [ 38.894094] Freed by task 277: [ 38.897203] kasan_save_stack+0x3c/0x68 [ 38.901109] kasan_save_track+0x20/0x40 [ 38.905016] kasan_save_free_info+0x4c/0x78 [ 38.909275] __kasan_slab_free+0x6c/0x98 [ 38.913266] kfree+0x214/0x3c8 [ 38.916381] kmalloc_uaf_16+0x190/0x438 [ 38.920285] kunit_try_run_case+0x170/0x3f0 [ 38.924546] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.930116] kthread+0x328/0x630 [ 38.933403] ret_from_fork+0x10/0x20 [ 38.937048] [ 38.938579] The buggy address belongs to the object at ffff0000981901e0 [ 38.938579] which belongs to the cache kmalloc-16 of size 16 [ 38.951066] The buggy address is located 0 bytes inside of [ 38.951066] freed 16-byte region [ffff0000981901e0, ffff0000981901f0) [ 38.963202] [ 38.964733] The buggy address belongs to the physical page: [ 38.970381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x118190 [ 38.978485] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.985109] page_type: f5(slab) [ 38.988310] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 38.996157] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 39.004000] page dumped because: kasan: bad access detected [ 39.009647] [ 39.011177] Memory state around the buggy address: [ 39.016035] ffff000098190080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 39.023350] ffff000098190100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 39.030666] >ffff000098190180: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 39.037980] ^ [ 39.044420] ffff000098190200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.051736] ffff000098190280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.059050] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[ 38.486881] ================================================================== [ 38.497656] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 38.504453] Write of size 16 at addr ffff000098190180 by task kunit_try_catch/275 [ 38.512040] [ 38.513574] CPU: 3 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 38.513606] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.513614] Hardware name: Thundercomm Dragonboard 845c (DT) [ 38.513627] Call trace: [ 38.513633] show_stack+0x20/0x38 (C) [ 38.513651] dump_stack_lvl+0x8c/0xd0 [ 38.513672] print_report+0x118/0x608 [ 38.513691] kasan_report+0xdc/0x128 [ 38.513711] __asan_report_store16_noabort+0x20/0x30 [ 38.513730] kmalloc_oob_16+0x3a0/0x3f8 [ 38.513747] kunit_try_run_case+0x170/0x3f0 [ 38.513766] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.513788] kthread+0x328/0x630 [ 38.513803] ret_from_fork+0x10/0x20 [ 38.513820] [ 38.579351] Allocated by task 275: [ 38.582813] kasan_save_stack+0x3c/0x68 [ 38.586723] kasan_save_track+0x20/0x40 [ 38.590633] kasan_save_alloc_info+0x40/0x58 [ 38.594970] __kasan_kmalloc+0xd4/0xd8 [ 38.598792] __kmalloc_cache_noprof+0x16c/0x3c0 [ 38.603401] kmalloc_oob_16+0xb4/0x3f8 [ 38.607222] kunit_try_run_case+0x170/0x3f0 [ 38.611476] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.617046] kthread+0x328/0x630 [ 38.620338] ret_from_fork+0x10/0x20 [ 38.623977] [ 38.625507] The buggy address belongs to the object at ffff000098190180 [ 38.625507] which belongs to the cache kmalloc-16 of size 16 [ 38.638000] The buggy address is located 0 bytes inside of [ 38.638000] allocated 13-byte region [ffff000098190180, ffff00009819018d) [ 38.650494] [ 38.652030] The buggy address belongs to the physical page: [ 38.657679] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x118190 [ 38.665793] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.672415] page_type: f5(slab) [ 38.675623] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 38.683469] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 38.691310] page dumped because: kasan: bad access detected [ 38.696956] [ 38.698486] Memory state around the buggy address: [ 38.703346] ffff000098190080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 38.710663] ffff000098190100: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 38.717988] >ffff000098190180: 00 05 fc fc 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.725310] ^ [ 38.728856] ffff000098190200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.736181] ffff000098190280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.743496] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 37.788324] ================================================================== [ 37.800061] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 37.806768] Read of size 1 at addr ffff000086189800 by task kunit_try_catch/273 [ 37.814179] [ 37.815721] CPU: 3 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 37.815750] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.815758] Hardware name: Thundercomm Dragonboard 845c (DT) [ 37.815768] Call trace: [ 37.815775] show_stack+0x20/0x38 (C) [ 37.815793] dump_stack_lvl+0x8c/0xd0 [ 37.815812] print_report+0x118/0x608 [ 37.815830] kasan_report+0xdc/0x128 [ 37.815850] __kasan_check_byte+0x54/0x70 [ 37.815868] krealloc_noprof+0x44/0x360 [ 37.815886] krealloc_uaf+0x180/0x520 [ 37.815904] kunit_try_run_case+0x170/0x3f0 [ 37.815923] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.815944] kthread+0x328/0x630 [ 37.815959] ret_from_fork+0x10/0x20 [ 37.815976] [ 37.884249] Allocated by task 273: [ 37.887711] kasan_save_stack+0x3c/0x68 [ 37.891614] kasan_save_track+0x20/0x40 [ 37.895516] kasan_save_alloc_info+0x40/0x58 [ 37.899854] __kasan_kmalloc+0xd4/0xd8 [ 37.903666] __kmalloc_cache_noprof+0x16c/0x3c0 [ 37.908278] krealloc_uaf+0xc8/0x520 [ 37.911917] kunit_try_run_case+0x170/0x3f0 [ 37.916173] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.921750] kthread+0x328/0x630 [ 37.925042] ret_from_fork+0x10/0x20 [ 37.928680] [ 37.930210] Freed by task 273: [ 37.933325] kasan_save_stack+0x3c/0x68 [ 37.937237] kasan_save_track+0x20/0x40 [ 37.941148] kasan_save_free_info+0x4c/0x78 [ 37.945402] __kasan_slab_free+0x6c/0x98 [ 37.949401] kfree+0x214/0x3c8 [ 37.952521] krealloc_uaf+0x12c/0x520 [ 37.956246] kunit_try_run_case+0x170/0x3f0 [ 37.960501] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.966076] kthread+0x328/0x630 [ 37.969369] ret_from_fork+0x10/0x20 [ 37.973007] [ 37.974537] The buggy address belongs to the object at ffff000086189800 [ 37.974537] which belongs to the cache kmalloc-256 of size 256 [ 37.987202] The buggy address is located 0 bytes inside of [ 37.987202] freed 256-byte region [ffff000086189800, ffff000086189900) [ 37.999430] [ 38.000958] The buggy address belongs to the physical page: [ 38.006610] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106188 [ 38.014714] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 38.022473] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 38.029531] page_type: f5(slab) [ 38.032737] raw: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 38.040585] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.048434] head: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 38.056368] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.064300] head: 0bfffe0000000002 fffffdffc2186201 00000000ffffffff 00000000ffffffff [ 38.072233] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 38.080164] page dumped because: kasan: bad access detected [ 38.085815] [ 38.087343] Memory state around the buggy address: [ 38.092204] ffff000086189700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.099523] ffff000086189780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.106840] >ffff000086189800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.114154] ^ [ 38.117443] ffff000086189880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.124759] ffff000086189900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.132073] ================================================================== [ 38.139451] ================================================================== [ 38.146771] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 38.153485] Read of size 1 at addr ffff000086189800 by task kunit_try_catch/273 [ 38.160898] [ 38.162432] CPU: 3 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 38.162462] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.162472] Hardware name: Thundercomm Dragonboard 845c (DT) [ 38.162483] Call trace: [ 38.162489] show_stack+0x20/0x38 (C) [ 38.162509] dump_stack_lvl+0x8c/0xd0 [ 38.162530] print_report+0x118/0x608 [ 38.162549] kasan_report+0xdc/0x128 [ 38.162568] __asan_report_load1_noabort+0x20/0x30 [ 38.162586] krealloc_uaf+0x4c8/0x520 [ 38.162604] kunit_try_run_case+0x170/0x3f0 [ 38.162622] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.162644] kthread+0x328/0x630 [ 38.162659] ret_from_fork+0x10/0x20 [ 38.162677] [ 38.227864] Allocated by task 273: [ 38.231328] kasan_save_stack+0x3c/0x68 [ 38.235239] kasan_save_track+0x20/0x40 [ 38.239152] kasan_save_alloc_info+0x40/0x58 [ 38.243491] __kasan_kmalloc+0xd4/0xd8 [ 38.247305] __kmalloc_cache_noprof+0x16c/0x3c0 [ 38.251916] krealloc_uaf+0xc8/0x520 [ 38.255558] kunit_try_run_case+0x170/0x3f0 [ 38.259810] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.265386] kthread+0x328/0x630 [ 38.268678] ret_from_fork+0x10/0x20 [ 38.272318] [ 38.273848] Freed by task 273: [ 38.276962] kasan_save_stack+0x3c/0x68 [ 38.280874] kasan_save_track+0x20/0x40 [ 38.284785] kasan_save_free_info+0x4c/0x78 [ 38.289037] __kasan_slab_free+0x6c/0x98 [ 38.293034] kfree+0x214/0x3c8 [ 38.296155] krealloc_uaf+0x12c/0x520 [ 38.299882] kunit_try_run_case+0x170/0x3f0 [ 38.304137] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.309711] kthread+0x328/0x630 [ 38.313006] ret_from_fork+0x10/0x20 [ 38.316645] [ 38.318176] The buggy address belongs to the object at ffff000086189800 [ 38.318176] which belongs to the cache kmalloc-256 of size 256 [ 38.330835] The buggy address is located 0 bytes inside of [ 38.330835] freed 256-byte region [ffff000086189800, ffff000086189900) [ 38.343058] [ 38.344587] The buggy address belongs to the physical page: [ 38.350237] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106188 [ 38.358342] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 38.366102] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 38.373160] page_type: f5(slab) [ 38.376365] raw: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 38.384213] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.392060] head: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 38.399994] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.407927] head: 0bfffe0000000002 fffffdffc2186201 00000000ffffffff 00000000ffffffff [ 38.415859] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 38.423789] page dumped because: kasan: bad access detected [ 38.429439] [ 38.430968] Memory state around the buggy address: [ 38.435828] ffff000086189700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.443145] ffff000086189780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.450464] >ffff000086189800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.457777] ^ [ 38.461066] ffff000086189880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 38.468383] ffff000086189900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.475698] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 35.477527] ================================================================== [ 35.484839] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 35.492502] Write of size 1 at addr ffff00009697ecea by task kunit_try_catch/267 [ 35.499989] [ 35.501516] CPU: 4 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 35.501544] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.501552] Hardware name: Thundercomm Dragonboard 845c (DT) [ 35.501562] Call trace: [ 35.501567] show_stack+0x20/0x38 (C) [ 35.501584] dump_stack_lvl+0x8c/0xd0 [ 35.501602] print_report+0x118/0x608 [ 35.501619] kasan_report+0xdc/0x128 [ 35.501637] __asan_report_store1_noabort+0x20/0x30 [ 35.501654] krealloc_less_oob_helper+0xae4/0xc50 [ 35.501672] krealloc_less_oob+0x20/0x38 [ 35.501688] kunit_try_run_case+0x170/0x3f0 [ 35.501705] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.501726] kthread+0x328/0x630 [ 35.501739] ret_from_fork+0x10/0x20 [ 35.501754] [ 35.571979] Allocated by task 267: [ 35.575433] kasan_save_stack+0x3c/0x68 [ 35.579339] kasan_save_track+0x20/0x40 [ 35.583245] kasan_save_alloc_info+0x40/0x58 [ 35.587582] __kasan_krealloc+0x118/0x178 [ 35.591654] krealloc_noprof+0x128/0x360 [ 35.595646] krealloc_less_oob_helper+0x168/0xc50 [ 35.600422] krealloc_less_oob+0x20/0x38 [ 35.604413] kunit_try_run_case+0x170/0x3f0 [ 35.608664] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.614231] kthread+0x328/0x630 [ 35.617514] ret_from_fork+0x10/0x20 [ 35.621147] [ 35.622670] The buggy address belongs to the object at ffff00009697ec00 [ 35.622670] which belongs to the cache kmalloc-256 of size 256 [ 35.635325] The buggy address is located 33 bytes to the right of [ 35.635325] allocated 201-byte region [ffff00009697ec00, ffff00009697ecc9) [ 35.648508] [ 35.650031] The buggy address belongs to the physical page: [ 35.655672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11697c [ 35.663774] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 35.671530] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 35.678583] page_type: f5(slab) [ 35.681781] raw: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 35.689626] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.697471] head: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 35.705401] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.713331] head: 0bfffe0000000002 fffffdffc25a5f01 00000000ffffffff 00000000ffffffff [ 35.721262] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 35.729186] page dumped because: kasan: bad access detected [ 35.734830] [ 35.736362] Memory state around the buggy address: [ 35.741216] ffff00009697eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.748524] ffff00009697ec00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.755832] >ffff00009697ec80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 35.763141] ^ [ 35.769840] ffff00009697ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.777149] ffff00009697ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.784453] ================================================================== [ 34.531896] ================================================================== [ 34.543105] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 34.550778] Write of size 1 at addr ffff00009697ecc9 by task kunit_try_catch/267 [ 34.558272] [ 34.559813] CPU: 2 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 34.559843] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.559851] Hardware name: Thundercomm Dragonboard 845c (DT) [ 34.559860] Call trace: [ 34.559867] show_stack+0x20/0x38 (C) [ 34.559884] dump_stack_lvl+0x8c/0xd0 [ 34.559904] print_report+0x118/0x608 [ 34.559924] kasan_report+0xdc/0x128 [ 34.559942] __asan_report_store1_noabort+0x20/0x30 [ 34.559959] krealloc_less_oob_helper+0xa48/0xc50 [ 34.559977] krealloc_less_oob+0x20/0x38 [ 34.559994] kunit_try_run_case+0x170/0x3f0 [ 34.560012] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.560033] kthread+0x328/0x630 [ 34.560048] ret_from_fork+0x10/0x20 [ 34.560065] [ 34.630340] Allocated by task 267: [ 34.633799] kasan_save_stack+0x3c/0x68 [ 34.637708] kasan_save_track+0x20/0x40 [ 34.641614] kasan_save_alloc_info+0x40/0x58 [ 34.645949] __kasan_krealloc+0x118/0x178 [ 34.650031] krealloc_noprof+0x128/0x360 [ 34.654026] krealloc_less_oob_helper+0x168/0xc50 [ 34.658808] krealloc_less_oob+0x20/0x38 [ 34.662803] kunit_try_run_case+0x170/0x3f0 [ 34.667053] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.672620] kthread+0x328/0x630 [ 34.675912] ret_from_fork+0x10/0x20 [ 34.679551] [ 34.681087] The buggy address belongs to the object at ffff00009697ec00 [ 34.681087] which belongs to the cache kmalloc-256 of size 256 [ 34.693747] The buggy address is located 0 bytes to the right of [ 34.693747] allocated 201-byte region [ffff00009697ec00, ffff00009697ecc9) [ 34.706852] [ 34.708385] The buggy address belongs to the physical page: [ 34.714036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11697c [ 34.722147] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.729900] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 34.736952] page_type: f5(slab) [ 34.740155] raw: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 34.747998] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.755841] head: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 34.763771] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.771700] head: 0bfffe0000000002 fffffdffc25a5f01 00000000ffffffff 00000000ffffffff [ 34.779628] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 34.787554] page dumped because: kasan: bad access detected [ 34.793197] [ 34.794727] Memory state around the buggy address: [ 34.799586] ffff00009697eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.806900] ffff00009697ec00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.814221] >ffff00009697ec80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 34.821541] ^ [ 34.827190] ffff00009697ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.834514] ffff00009697ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.841833] ================================================================== [ 37.308828] ================================================================== [ 37.316142] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 37.323807] Write of size 1 at addr ffff0000861960ea by task kunit_try_catch/271 [ 37.331291] [ 37.332818] CPU: 4 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 37.332848] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.332855] Hardware name: Thundercomm Dragonboard 845c (DT) [ 37.332865] Call trace: [ 37.332871] show_stack+0x20/0x38 (C) [ 37.332887] dump_stack_lvl+0x8c/0xd0 [ 37.332905] print_report+0x118/0x608 [ 37.332922] kasan_report+0xdc/0x128 [ 37.332939] __asan_report_store1_noabort+0x20/0x30 [ 37.332956] krealloc_less_oob_helper+0xae4/0xc50 [ 37.332974] krealloc_large_less_oob+0x20/0x38 [ 37.332991] kunit_try_run_case+0x170/0x3f0 [ 37.333009] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.333028] kthread+0x328/0x630 [ 37.333041] ret_from_fork+0x10/0x20 [ 37.333057] [ 37.403834] The buggy address belongs to the physical page: [ 37.409480] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106194 [ 37.417586] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 37.425332] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 37.432384] page_type: f8(unknown) [ 37.435844] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 37.443689] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 37.451525] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 37.459453] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 37.467383] head: 0bfffe0000000002 fffffdffc2186501 00000000ffffffff 00000000ffffffff [ 37.475312] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 37.483241] page dumped because: kasan: bad access detected [ 37.488888] [ 37.490410] Memory state around the buggy address: [ 37.495261] ffff000086195f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.502573] ffff000086196000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.509882] >ffff000086196080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 37.517189] ^ [ 37.523888] ffff000086196100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 37.531198] ffff000086196180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 37.538507] ================================================================== [ 34.849245] ================================================================== [ 34.856566] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 34.864238] Write of size 1 at addr ffff00009697ecd0 by task kunit_try_catch/267 [ 34.871740] [ 34.873268] CPU: 2 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 34.873297] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.873305] Hardware name: Thundercomm Dragonboard 845c (DT) [ 34.873316] Call trace: [ 34.873324] show_stack+0x20/0x38 (C) [ 34.873343] dump_stack_lvl+0x8c/0xd0 [ 34.873365] print_report+0x118/0x608 [ 34.873386] kasan_report+0xdc/0x128 [ 34.873405] __asan_report_store1_noabort+0x20/0x30 [ 34.873423] krealloc_less_oob_helper+0xb9c/0xc50 [ 34.873441] krealloc_less_oob+0x20/0x38 [ 34.873459] kunit_try_run_case+0x170/0x3f0 [ 34.873477] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.873499] kthread+0x328/0x630 [ 34.873514] ret_from_fork+0x10/0x20 [ 34.873532] [ 34.943836] Allocated by task 267: [ 34.947300] kasan_save_stack+0x3c/0x68 [ 34.951210] kasan_save_track+0x20/0x40 [ 34.955119] kasan_save_alloc_info+0x40/0x58 [ 34.959457] __kasan_krealloc+0x118/0x178 [ 34.963538] krealloc_noprof+0x128/0x360 [ 34.967534] krealloc_less_oob_helper+0x168/0xc50 [ 34.972313] krealloc_less_oob+0x20/0x38 [ 34.976307] kunit_try_run_case+0x170/0x3f0 [ 34.980562] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.986135] kthread+0x328/0x630 [ 34.989425] ret_from_fork+0x10/0x20 [ 34.993064] [ 34.994594] The buggy address belongs to the object at ffff00009697ec00 [ 34.994594] which belongs to the cache kmalloc-256 of size 256 [ 35.007258] The buggy address is located 7 bytes to the right of [ 35.007258] allocated 201-byte region [ffff00009697ec00, ffff00009697ecc9) [ 35.020359] [ 35.021891] The buggy address belongs to the physical page: [ 35.027538] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11697c [ 35.035650] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 35.043405] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 35.050459] page_type: f5(slab) [ 35.053664] raw: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 35.061509] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.069354] head: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 35.077284] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.085213] head: 0bfffe0000000002 fffffdffc25a5f01 00000000ffffffff 00000000ffffffff [ 35.093144] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 35.101069] page dumped because: kasan: bad access detected [ 35.106719] [ 35.108252] Memory state around the buggy address: [ 35.113113] ffff00009697eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.120438] ffff00009697ec00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.127753] >ffff00009697ec80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 35.135065] ^ [ 35.140981] ffff00009697ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.148304] ffff00009697ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.155619] ================================================================== [ 36.835388] ================================================================== [ 36.842709] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 36.850383] Write of size 1 at addr ffff0000861960d0 by task kunit_try_catch/271 [ 36.857880] [ 36.859411] CPU: 3 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 36.859439] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.859447] Hardware name: Thundercomm Dragonboard 845c (DT) [ 36.859457] Call trace: [ 36.859464] show_stack+0x20/0x38 (C) [ 36.859482] dump_stack_lvl+0x8c/0xd0 [ 36.859503] print_report+0x118/0x608 [ 36.859521] kasan_report+0xdc/0x128 [ 36.859539] __asan_report_store1_noabort+0x20/0x30 [ 36.859557] krealloc_less_oob_helper+0xb9c/0xc50 [ 36.859576] krealloc_large_less_oob+0x20/0x38 [ 36.859595] kunit_try_run_case+0x170/0x3f0 [ 36.859613] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.859634] kthread+0x328/0x630 [ 36.859649] ret_from_fork+0x10/0x20 [ 36.859666] [ 36.930484] The buggy address belongs to the physical page: [ 36.936138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106194 [ 36.944249] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.952004] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.959062] page_type: f8(unknown) [ 36.962528] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.970373] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 36.978218] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.986148] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 36.994079] head: 0bfffe0000000002 fffffdffc2186501 00000000ffffffff 00000000ffffffff [ 37.002008] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 37.009935] page dumped because: kasan: bad access detected [ 37.015581] [ 37.017107] Memory state around the buggy address: [ 37.021969] ffff000086195f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.029293] ffff000086196000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.036616] >ffff000086196080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 37.043937] ^ [ 37.049847] ffff000086196100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 37.057171] ffff000086196180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 37.064493] ================================================================== [ 35.792013] ================================================================== [ 35.799339] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 35.807017] Write of size 1 at addr ffff00009697eceb by task kunit_try_catch/267 [ 35.814508] [ 35.816048] CPU: 3 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 35.816076] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.816085] Hardware name: Thundercomm Dragonboard 845c (DT) [ 35.816096] Call trace: [ 35.816103] show_stack+0x20/0x38 (C) [ 35.816122] dump_stack_lvl+0x8c/0xd0 [ 35.816143] print_report+0x118/0x608 [ 35.816162] kasan_report+0xdc/0x128 [ 35.816181] __asan_report_store1_noabort+0x20/0x30 [ 35.816199] krealloc_less_oob_helper+0xa58/0xc50 [ 35.816217] krealloc_less_oob+0x20/0x38 [ 35.816235] kunit_try_run_case+0x170/0x3f0 [ 35.816255] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.816275] kthread+0x328/0x630 [ 35.816290] ret_from_fork+0x10/0x20 [ 35.816307] [ 35.886597] Allocated by task 267: [ 35.890058] kasan_save_stack+0x3c/0x68 [ 35.893968] kasan_save_track+0x20/0x40 [ 35.897879] kasan_save_alloc_info+0x40/0x58 [ 35.902219] __kasan_krealloc+0x118/0x178 [ 35.906302] krealloc_noprof+0x128/0x360 [ 35.910300] krealloc_less_oob_helper+0x168/0xc50 [ 35.915083] krealloc_less_oob+0x20/0x38 [ 35.919080] kunit_try_run_case+0x170/0x3f0 [ 35.923335] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.928907] kthread+0x328/0x630 [ 35.932199] ret_from_fork+0x10/0x20 [ 35.935839] [ 35.937370] The buggy address belongs to the object at ffff00009697ec00 [ 35.937370] which belongs to the cache kmalloc-256 of size 256 [ 35.950026] The buggy address is located 34 bytes to the right of [ 35.950026] allocated 201-byte region [ffff00009697ec00, ffff00009697ecc9) [ 35.963211] [ 35.964739] The buggy address belongs to the physical page: [ 35.970389] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11697c [ 35.978492] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 35.986252] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 35.993309] page_type: f5(slab) [ 35.996513] raw: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 36.004360] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.012206] head: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 36.020139] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.028072] head: 0bfffe0000000002 fffffdffc25a5f01 00000000ffffffff 00000000ffffffff [ 36.036005] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 36.043934] page dumped because: kasan: bad access detected [ 36.049585] [ 36.051113] Memory state around the buggy address: [ 36.055974] ffff00009697eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.063293] ffff00009697ec00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.070611] >ffff00009697ec80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 36.077923] ^ [ 36.084630] ffff00009697ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.091945] ffff00009697ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.099262] ================================================================== [ 36.594768] ================================================================== [ 36.606509] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 36.614186] Write of size 1 at addr ffff0000861960c9 by task kunit_try_catch/271 [ 36.621687] [ 36.623221] CPU: 3 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 36.623249] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.623257] Hardware name: Thundercomm Dragonboard 845c (DT) [ 36.623270] Call trace: [ 36.623277] show_stack+0x20/0x38 (C) [ 36.623295] dump_stack_lvl+0x8c/0xd0 [ 36.623315] print_report+0x118/0x608 [ 36.623334] kasan_report+0xdc/0x128 [ 36.623353] __asan_report_store1_noabort+0x20/0x30 [ 36.623372] krealloc_less_oob_helper+0xa48/0xc50 [ 36.623392] krealloc_large_less_oob+0x20/0x38 [ 36.623410] kunit_try_run_case+0x170/0x3f0 [ 36.623429] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.623450] kthread+0x328/0x630 [ 36.623465] ret_from_fork+0x10/0x20 [ 36.623483] [ 36.694294] The buggy address belongs to the physical page: [ 36.699939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106194 [ 36.708044] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.715802] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.722860] page_type: f8(unknown) [ 36.726330] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.734178] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 36.742026] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.749959] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 36.757891] head: 0bfffe0000000002 fffffdffc2186501 00000000ffffffff 00000000ffffffff [ 36.765824] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 36.773751] page dumped because: kasan: bad access detected [ 36.779396] [ 36.780926] Memory state around the buggy address: [ 36.785785] ffff000086195f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.793100] ffff000086196000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.800415] >ffff000086196080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 36.807727] ^ [ 36.813375] ffff000086196100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.820689] ffff000086196180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.828002] ================================================================== [ 37.072217] ================================================================== [ 37.079537] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 37.087212] Write of size 1 at addr ffff0000861960da by task kunit_try_catch/271 [ 37.094700] [ 37.096238] CPU: 4 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 37.096268] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.096276] Hardware name: Thundercomm Dragonboard 845c (DT) [ 37.096286] Call trace: [ 37.096292] show_stack+0x20/0x38 (C) [ 37.096310] dump_stack_lvl+0x8c/0xd0 [ 37.096329] print_report+0x118/0x608 [ 37.096347] kasan_report+0xdc/0x128 [ 37.096365] __asan_report_store1_noabort+0x20/0x30 [ 37.096381] krealloc_less_oob_helper+0xa80/0xc50 [ 37.096399] krealloc_large_less_oob+0x20/0x38 [ 37.096415] kunit_try_run_case+0x170/0x3f0 [ 37.096432] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.096454] kthread+0x328/0x630 [ 37.096467] ret_from_fork+0x10/0x20 [ 37.096483] [ 37.167264] The buggy address belongs to the physical page: [ 37.172910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106194 [ 37.181016] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 37.188762] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 37.195813] page_type: f8(unknown) [ 37.199274] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 37.207108] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 37.214945] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 37.222874] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 37.230804] head: 0bfffe0000000002 fffffdffc2186501 00000000ffffffff 00000000ffffffff [ 37.238734] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 37.246651] page dumped because: kasan: bad access detected [ 37.252292] [ 37.253816] Memory state around the buggy address: [ 37.258671] ffff000086195f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.265980] ffff000086196000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.273289] >ffff000086196080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 37.280598] ^ [ 37.286767] ffff000086196100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 37.294078] ffff000086196180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 37.301387] ================================================================== [ 37.546341] ================================================================== [ 37.553662] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 37.561332] Write of size 1 at addr ffff0000861960eb by task kunit_try_catch/271 [ 37.568823] [ 37.570351] CPU: 5 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 37.570381] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.570389] Hardware name: Thundercomm Dragonboard 845c (DT) [ 37.570400] Call trace: [ 37.570406] show_stack+0x20/0x38 (C) [ 37.570423] dump_stack_lvl+0x8c/0xd0 [ 37.570442] print_report+0x118/0x608 [ 37.570460] kasan_report+0xdc/0x128 [ 37.570478] __asan_report_store1_noabort+0x20/0x30 [ 37.570495] krealloc_less_oob_helper+0xa58/0xc50 [ 37.570512] krealloc_large_less_oob+0x20/0x38 [ 37.570530] kunit_try_run_case+0x170/0x3f0 [ 37.570546] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.570566] kthread+0x328/0x630 [ 37.570580] ret_from_fork+0x10/0x20 [ 37.570597] [ 37.641384] The buggy address belongs to the physical page: [ 37.647027] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106194 [ 37.655125] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 37.662879] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 37.669933] page_type: f8(unknown) [ 37.673391] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 37.681230] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 37.689070] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 37.696993] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 37.704917] head: 0bfffe0000000002 fffffdffc2186501 00000000ffffffff 00000000ffffffff [ 37.712842] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 37.720765] page dumped because: kasan: bad access detected [ 37.726406] [ 37.727934] Memory state around the buggy address: [ 37.732784] ffff000086195f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.740097] ffff000086196000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.747411] >ffff000086196080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 37.754719] ^ [ 37.761412] ffff000086196100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 37.768727] ffff000086196180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 37.776035] ================================================================== [ 35.163637] ================================================================== [ 35.170964] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 35.178639] Write of size 1 at addr ffff00009697ecda by task kunit_try_catch/267 [ 35.186136] [ 35.187673] CPU: 4 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 35.187702] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.187711] Hardware name: Thundercomm Dragonboard 845c (DT) [ 35.187721] Call trace: [ 35.187727] show_stack+0x20/0x38 (C) [ 35.187745] dump_stack_lvl+0x8c/0xd0 [ 35.187766] print_report+0x118/0x608 [ 35.187784] kasan_report+0xdc/0x128 [ 35.187802] __asan_report_store1_noabort+0x20/0x30 [ 35.187820] krealloc_less_oob_helper+0xa80/0xc50 [ 35.187837] krealloc_less_oob+0x20/0x38 [ 35.187854] kunit_try_run_case+0x170/0x3f0 [ 35.187872] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.187892] kthread+0x328/0x630 [ 35.187906] ret_from_fork+0x10/0x20 [ 35.187923] [ 35.258166] Allocated by task 267: [ 35.261622] kasan_save_stack+0x3c/0x68 [ 35.265519] kasan_save_track+0x20/0x40 [ 35.269424] kasan_save_alloc_info+0x40/0x58 [ 35.273760] __kasan_krealloc+0x118/0x178 [ 35.277842] krealloc_noprof+0x128/0x360 [ 35.281824] krealloc_less_oob_helper+0x168/0xc50 [ 35.286598] krealloc_less_oob+0x20/0x38 [ 35.290581] kunit_try_run_case+0x170/0x3f0 [ 35.294832] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.300397] kthread+0x328/0x630 [ 35.303680] ret_from_fork+0x10/0x20 [ 35.307313] [ 35.308836] The buggy address belongs to the object at ffff00009697ec00 [ 35.308836] which belongs to the cache kmalloc-256 of size 256 [ 35.321486] The buggy address is located 17 bytes to the right of [ 35.321486] allocated 201-byte region [ffff00009697ec00, ffff00009697ecc9) [ 35.334669] [ 35.336202] The buggy address belongs to the physical page: [ 35.341847] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11697c [ 35.349951] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 35.357705] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 35.364755] page_type: f5(slab) [ 35.367954] raw: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 35.375799] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.383642] head: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 35.391572] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.399501] head: 0bfffe0000000002 fffffdffc25a5f01 00000000ffffffff 00000000ffffffff [ 35.407430] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 35.415356] page dumped because: kasan: bad access detected [ 35.421004] [ 35.422526] Memory state around the buggy address: [ 35.427378] ffff00009697eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.434691] ffff00009697ec00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 35.442000] >ffff00009697ec80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 35.449307] ^ [ 35.455473] ffff00009697ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.462783] ffff00009697ed80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.470092] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 36.352885] ================================================================== [ 36.360200] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 36.367878] Write of size 1 at addr ffff0000861920f0 by task kunit_try_catch/269 [ 36.375370] [ 36.376901] CPU: 3 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 36.376929] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.376938] Hardware name: Thundercomm Dragonboard 845c (DT) [ 36.376948] Call trace: [ 36.376955] show_stack+0x20/0x38 (C) [ 36.376973] dump_stack_lvl+0x8c/0xd0 [ 36.376992] print_report+0x118/0x608 [ 36.377012] kasan_report+0xdc/0x128 [ 36.377030] __asan_report_store1_noabort+0x20/0x30 [ 36.377048] krealloc_more_oob_helper+0x5c0/0x678 [ 36.377066] krealloc_large_more_oob+0x20/0x38 [ 36.377086] kunit_try_run_case+0x170/0x3f0 [ 36.377105] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.377126] kthread+0x328/0x630 [ 36.377140] ret_from_fork+0x10/0x20 [ 36.377158] [ 36.447972] The buggy address belongs to the physical page: [ 36.453623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106190 [ 36.461729] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.469487] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.476545] page_type: f8(unknown) [ 36.480010] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.487857] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 36.495705] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.503639] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 36.511573] head: 0bfffe0000000002 fffffdffc2186401 00000000ffffffff 00000000ffffffff [ 36.519504] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 36.527432] page dumped because: kasan: bad access detected [ 36.533080] [ 36.534610] Memory state around the buggy address: [ 36.539471] ffff000086191f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.546787] ffff000086192000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.554102] >ffff000086192080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 36.561416] ^ [ 36.568383] ffff000086192100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.575700] ffff000086192180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.583016] ================================================================== [ 33.896092] ================================================================== [ 33.907040] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 33.914710] Write of size 1 at addr ffff0000861896eb by task kunit_try_catch/265 [ 33.922205] [ 33.923745] CPU: 3 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 33.923773] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.923780] Hardware name: Thundercomm Dragonboard 845c (DT) [ 33.923791] Call trace: [ 33.923797] show_stack+0x20/0x38 (C) [ 33.923815] dump_stack_lvl+0x8c/0xd0 [ 33.923835] print_report+0x118/0x608 [ 33.923855] kasan_report+0xdc/0x128 [ 33.923873] __asan_report_store1_noabort+0x20/0x30 [ 33.923890] krealloc_more_oob_helper+0x60c/0x678 [ 33.923909] krealloc_more_oob+0x20/0x38 [ 33.923928] kunit_try_run_case+0x170/0x3f0 [ 33.923946] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.923967] kthread+0x328/0x630 [ 33.923981] ret_from_fork+0x10/0x20 [ 33.923998] [ 33.994280] Allocated by task 265: [ 33.997736] kasan_save_stack+0x3c/0x68 [ 34.001646] kasan_save_track+0x20/0x40 [ 34.005555] kasan_save_alloc_info+0x40/0x58 [ 34.009892] __kasan_krealloc+0x118/0x178 [ 34.013973] krealloc_noprof+0x128/0x360 [ 34.017969] krealloc_more_oob_helper+0x168/0x678 [ 34.022753] krealloc_more_oob+0x20/0x38 [ 34.026747] kunit_try_run_case+0x170/0x3f0 [ 34.030998] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.036564] kthread+0x328/0x630 [ 34.039856] ret_from_fork+0x10/0x20 [ 34.043495] [ 34.045032] The buggy address belongs to the object at ffff000086189600 [ 34.045032] which belongs to the cache kmalloc-256 of size 256 [ 34.057695] The buggy address is located 0 bytes to the right of [ 34.057695] allocated 235-byte region [ffff000086189600, ffff0000861896eb) [ 34.070799] [ 34.072334] The buggy address belongs to the physical page: [ 34.077983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106188 [ 34.086093] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.093848] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 34.100910] page_type: f5(slab) [ 34.104113] raw: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 34.111955] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.119799] head: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 34.127727] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.135655] head: 0bfffe0000000002 fffffdffc2186201 00000000ffffffff 00000000ffffffff [ 34.143583] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 34.151507] page dumped because: kasan: bad access detected [ 34.157150] [ 34.158679] Memory state around the buggy address: [ 34.163538] ffff000086189580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.170860] ffff000086189600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.178180] >ffff000086189680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 34.185498] ^ [ 34.192201] ffff000086189700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.199517] ffff000086189780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.206836] ================================================================== [ 36.111747] ================================================================== [ 36.122953] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 36.130631] Write of size 1 at addr ffff0000861920eb by task kunit_try_catch/269 [ 36.138133] [ 36.139675] CPU: 3 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 36.139703] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.139712] Hardware name: Thundercomm Dragonboard 845c (DT) [ 36.139723] Call trace: [ 36.139729] show_stack+0x20/0x38 (C) [ 36.139746] dump_stack_lvl+0x8c/0xd0 [ 36.139767] print_report+0x118/0x608 [ 36.139787] kasan_report+0xdc/0x128 [ 36.139806] __asan_report_store1_noabort+0x20/0x30 [ 36.139823] krealloc_more_oob_helper+0x60c/0x678 [ 36.139843] krealloc_large_more_oob+0x20/0x38 [ 36.139861] kunit_try_run_case+0x170/0x3f0 [ 36.139880] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.139901] kthread+0x328/0x630 [ 36.139917] ret_from_fork+0x10/0x20 [ 36.139934] [ 36.210731] The buggy address belongs to the physical page: [ 36.216378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106190 [ 36.224484] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.232241] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.239300] page_type: f8(unknown) [ 36.242767] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.250614] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 36.258462] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 36.266395] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 36.274328] head: 0bfffe0000000002 fffffdffc2186401 00000000ffffffff 00000000ffffffff [ 36.282261] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 36.290189] page dumped because: kasan: bad access detected [ 36.295834] [ 36.297364] Memory state around the buggy address: [ 36.302227] ffff000086191f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.309540] ffff000086192000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 36.316855] >ffff000086192080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 36.324167] ^ [ 36.330870] ffff000086192100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.338185] ffff000086192180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 36.345497] ================================================================== [ 34.214270] ================================================================== [ 34.221593] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 34.229264] Write of size 1 at addr ffff0000861896f0 by task kunit_try_catch/265 [ 34.236761] [ 34.238295] CPU: 3 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 34.238324] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.238333] Hardware name: Thundercomm Dragonboard 845c (DT) [ 34.238343] Call trace: [ 34.238350] show_stack+0x20/0x38 (C) [ 34.238369] dump_stack_lvl+0x8c/0xd0 [ 34.238389] print_report+0x118/0x608 [ 34.238408] kasan_report+0xdc/0x128 [ 34.238427] __asan_report_store1_noabort+0x20/0x30 [ 34.238444] krealloc_more_oob_helper+0x5c0/0x678 [ 34.238464] krealloc_more_oob+0x20/0x38 [ 34.238482] kunit_try_run_case+0x170/0x3f0 [ 34.238501] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.238522] kthread+0x328/0x630 [ 34.238537] ret_from_fork+0x10/0x20 [ 34.238555] [ 34.308868] Allocated by task 265: [ 34.312326] kasan_save_stack+0x3c/0x68 [ 34.316236] kasan_save_track+0x20/0x40 [ 34.320144] kasan_save_alloc_info+0x40/0x58 [ 34.324481] __kasan_krealloc+0x118/0x178 [ 34.328561] krealloc_noprof+0x128/0x360 [ 34.332556] krealloc_more_oob_helper+0x168/0x678 [ 34.337339] krealloc_more_oob+0x20/0x38 [ 34.341333] kunit_try_run_case+0x170/0x3f0 [ 34.345585] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.351155] kthread+0x328/0x630 [ 34.354445] ret_from_fork+0x10/0x20 [ 34.358092] [ 34.359618] The buggy address belongs to the object at ffff000086189600 [ 34.359618] which belongs to the cache kmalloc-256 of size 256 [ 34.372272] The buggy address is located 5 bytes to the right of [ 34.372272] allocated 235-byte region [ffff000086189600, ffff0000861896eb) [ 34.385376] [ 34.386905] The buggy address belongs to the physical page: [ 34.392556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106188 [ 34.400667] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 34.408420] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 34.415475] page_type: f5(slab) [ 34.418681] raw: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 34.426531] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.434373] head: 0bfffe0000000040 ffff000080002b40 dead000000000122 0000000000000000 [ 34.442311] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.450250] head: 0bfffe0000000002 fffffdffc2186201 00000000ffffffff 00000000ffffffff [ 34.458189] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 34.466123] page dumped because: kasan: bad access detected [ 34.471777] [ 34.473304] Memory state around the buggy address: [ 34.478164] ffff000086189580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.485487] ffff000086189600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.492807] >ffff000086189680: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 34.500126] ^ [ 34.507094] ffff000086189700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.514416] ffff000086189780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.521734] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 33.698497] ================================================================== [ 33.713747] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 33.720192] Read of size 1 at addr ffff0000934a0000 by task kunit_try_catch/263 [ 33.727595] [ 33.729130] CPU: 3 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 33.729159] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.729168] Hardware name: Thundercomm Dragonboard 845c (DT) [ 33.729179] Call trace: [ 33.729186] show_stack+0x20/0x38 (C) [ 33.729204] dump_stack_lvl+0x8c/0xd0 [ 33.729224] print_report+0x118/0x608 [ 33.729245] kasan_report+0xdc/0x128 [ 33.729264] __asan_report_load1_noabort+0x20/0x30 [ 33.729282] page_alloc_uaf+0x328/0x350 [ 33.729299] kunit_try_run_case+0x170/0x3f0 [ 33.729317] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.729340] kthread+0x328/0x630 [ 33.729355] ret_from_fork+0x10/0x20 [ 33.729372] [ 33.794725] The buggy address belongs to the physical page: [ 33.800370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1134a0 [ 33.808474] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.815089] page_type: f0(buddy) [ 33.818378] raw: 0bfffe0000000000 ffff0000fd587e48 ffff0000fd587e48 0000000000000000 [ 33.826224] raw: 0000000000000000 0000000000000005 00000000f0000000 0000000000000000 [ 33.834066] page dumped because: kasan: bad access detected [ 33.839711] [ 33.841242] Memory state around the buggy address: [ 33.846100] ffff00009349ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.853415] ffff00009349ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.860729] >ffff0000934a0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.868041] ^ [ 33.871325] ffff0000934a0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.878639] ffff0000934a0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.885952] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree
[ 33.450870] ================================================================== [ 33.461993] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 33.467477] Free of addr ffff000096d0c001 by task kunit_try_catch/259 [ 33.474005] [ 33.475540] CPU: 5 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 33.475571] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.475579] Hardware name: Thundercomm Dragonboard 845c (DT) [ 33.475590] Call trace: [ 33.475596] show_stack+0x20/0x38 (C) [ 33.475613] dump_stack_lvl+0x8c/0xd0 [ 33.475634] print_report+0x118/0x608 [ 33.475652] kasan_report_invalid_free+0xc0/0xe8 [ 33.475671] __kasan_kfree_large+0x5c/0xa8 [ 33.475691] free_large_kmalloc+0x68/0x150 [ 33.475707] kfree+0x270/0x3c8 [ 33.475723] kmalloc_large_invalid_free+0x108/0x270 [ 33.475739] kunit_try_run_case+0x170/0x3f0 [ 33.475756] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.475776] kthread+0x328/0x630 [ 33.475788] ret_from_fork+0x10/0x20 [ 33.475805] [ 33.549757] The buggy address belongs to the physical page: [ 33.555396] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x116d0c [ 33.563494] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.571246] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.578294] page_type: f8(unknown) [ 33.581754] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.589595] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 33.597434] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.605359] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 33.613284] head: 0bfffe0000000002 fffffdffc25b4301 00000000ffffffff 00000000ffffffff [ 33.621211] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 33.629129] page dumped because: kasan: bad access detected [ 33.634772] [ 33.636301] Memory state around the buggy address: [ 33.641154] ffff000096d0bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.648468] ffff000096d0bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.655784] >ffff000096d0c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.663091] ^ [ 33.666373] ffff000096d0c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.673687] ffff000096d0c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.681000] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 33.258012] ================================================================== [ 33.269662] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 33.276371] Read of size 1 at addr ffff000086190000 by task kunit_try_catch/257 [ 33.283784] [ 33.285315] CPU: 3 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 33.285343] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.285351] Hardware name: Thundercomm Dragonboard 845c (DT) [ 33.285362] Call trace: [ 33.285369] show_stack+0x20/0x38 (C) [ 33.285387] dump_stack_lvl+0x8c/0xd0 [ 33.285407] print_report+0x118/0x608 [ 33.285427] kasan_report+0xdc/0x128 [ 33.285445] __asan_report_load1_noabort+0x20/0x30 [ 33.285463] kmalloc_large_uaf+0x2cc/0x2f8 [ 33.285480] kunit_try_run_case+0x170/0x3f0 [ 33.285499] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.285521] kthread+0x328/0x630 [ 33.285536] ret_from_fork+0x10/0x20 [ 33.285554] [ 33.351176] The buggy address belongs to the physical page: [ 33.356829] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106190 [ 33.364942] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.371563] raw: 0bfffe0000000000 fffffdffc2186508 ffff0000dae04c00 0000000000000000 [ 33.379407] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 33.387247] page dumped because: kasan: bad access detected [ 33.392901] [ 33.394432] Memory state around the buggy address: [ 33.399295] ffff00008618ff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.406616] ffff00008618ff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.413939] >ffff000086190000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.421259] ^ [ 33.424547] ffff000086190080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.431862] ffff000086190100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.439176] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 33.022254] ================================================================== [ 33.033729] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 33.041313] Write of size 1 at addr ffff00009558a00a by task kunit_try_catch/255 [ 33.048805] [ 33.050335] CPU: 4 UID: 0 PID: 255 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 33.050365] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.050374] Hardware name: Thundercomm Dragonboard 845c (DT) [ 33.050385] Call trace: [ 33.050391] show_stack+0x20/0x38 (C) [ 33.050409] dump_stack_lvl+0x8c/0xd0 [ 33.050429] print_report+0x118/0x608 [ 33.050449] kasan_report+0xdc/0x128 [ 33.050466] __asan_report_store1_noabort+0x20/0x30 [ 33.050483] kmalloc_large_oob_right+0x278/0x2b8 [ 33.050500] kunit_try_run_case+0x170/0x3f0 [ 33.050517] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.050537] kthread+0x328/0x630 [ 33.050549] ret_from_fork+0x10/0x20 [ 33.050567] [ 33.116774] The buggy address belongs to the physical page: [ 33.122417] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x115588 [ 33.130525] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.138273] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.145327] page_type: f8(unknown) [ 33.148795] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.156633] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 33.164469] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.172394] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 33.180315] head: 0bfffe0000000002 fffffdffc2556201 00000000ffffffff 00000000ffffffff [ 33.188239] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 33.196156] page dumped because: kasan: bad access detected [ 33.201796] [ 33.203327] Memory state around the buggy address: [ 33.208185] ffff000095589f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.215498] ffff000095589f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.222806] >ffff00009558a000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 33.230116] ^ [ 33.233665] ffff00009558a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 33.240976] ffff00009558a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 33.248286] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 32.710092] ================================================================== [ 32.722367] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 32.729781] Write of size 1 at addr ffff000086f55f00 by task kunit_try_catch/253 [ 32.737278] [ 32.738813] CPU: 2 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 32.738841] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.738849] Hardware name: Thundercomm Dragonboard 845c (DT) [ 32.738859] Call trace: [ 32.738865] show_stack+0x20/0x38 (C) [ 32.738883] dump_stack_lvl+0x8c/0xd0 [ 32.738904] print_report+0x118/0x608 [ 32.738924] kasan_report+0xdc/0x128 [ 32.738944] __asan_report_store1_noabort+0x20/0x30 [ 32.738961] kmalloc_big_oob_right+0x2a4/0x2f0 [ 32.738979] kunit_try_run_case+0x170/0x3f0 [ 32.738997] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.739018] kthread+0x328/0x630 [ 32.739033] ret_from_fork+0x10/0x20 [ 32.739050] [ 32.805122] Allocated by task 253: [ 32.808579] kasan_save_stack+0x3c/0x68 [ 32.812487] kasan_save_track+0x20/0x40 [ 32.816396] kasan_save_alloc_info+0x40/0x58 [ 32.820733] __kasan_kmalloc+0xd4/0xd8 [ 32.824554] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.829165] kmalloc_big_oob_right+0xb8/0x2f0 [ 32.833600] kunit_try_run_case+0x170/0x3f0 [ 32.837854] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.843425] kthread+0x328/0x630 [ 32.846717] ret_from_fork+0x10/0x20 [ 32.850354] [ 32.851890] The buggy address belongs to the object at ffff000086f54000 [ 32.851890] which belongs to the cache kmalloc-8k of size 8192 [ 32.864549] The buggy address is located 0 bytes to the right of [ 32.864549] allocated 7936-byte region [ffff000086f54000, ffff000086f55f00) [ 32.877742] [ 32.879272] The buggy address belongs to the physical page: [ 32.884928] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106f50 [ 32.893040] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.900794] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.907848] page_type: f5(slab) [ 32.911055] raw: 0bfffe0000000040 ffff000080003180 dead000000000122 0000000000000000 [ 32.918898] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 32.926741] head: 0bfffe0000000040 ffff000080003180 dead000000000122 0000000000000000 [ 32.934669] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 32.942608] head: 0bfffe0000000003 fffffdffc21bd401 00000000ffffffff 00000000ffffffff [ 32.950537] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 32.958472] page dumped because: kasan: bad access detected [ 32.964125] [ 32.965655] Memory state around the buggy address: [ 32.970516] ffff000086f55e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.977838] ffff000086f55e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.985160] >ffff000086f55f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.992479] ^ [ 32.995768] ffff000086f55f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.003082] ffff000086f56000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.010404] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[ 32.395637] ================================================================== [ 32.402962] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488 [ 32.411163] Write of size 1 at addr ffff000080df5778 by task kunit_try_catch/251 [ 32.418663] [ 32.420202] CPU: 2 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 32.420230] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.420239] Hardware name: Thundercomm Dragonboard 845c (DT) [ 32.420250] Call trace: [ 32.420257] show_stack+0x20/0x38 (C) [ 32.420274] dump_stack_lvl+0x8c/0xd0 [ 32.420297] print_report+0x118/0x608 [ 32.420317] kasan_report+0xdc/0x128 [ 32.420335] __asan_report_store1_noabort+0x20/0x30 [ 32.420354] kmalloc_track_caller_oob_right+0x418/0x488 [ 32.420374] kunit_try_run_case+0x170/0x3f0 [ 32.420392] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.420414] kthread+0x328/0x630 [ 32.420430] ret_from_fork+0x10/0x20 [ 32.420448] [ 32.487278] Allocated by task 251: [ 32.490738] kasan_save_stack+0x3c/0x68 [ 32.494648] kasan_save_track+0x20/0x40 [ 32.498556] kasan_save_alloc_info+0x40/0x58 [ 32.502892] __kasan_kmalloc+0xd4/0xd8 [ 32.506712] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 32.512375] kmalloc_track_caller_oob_right+0x184/0x488 [ 32.517688] kunit_try_run_case+0x170/0x3f0 [ 32.521941] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.527511] kthread+0x328/0x630 [ 32.530803] ret_from_fork+0x10/0x20 [ 32.534440] [ 32.535973] The buggy address belongs to the object at ffff000080df5700 [ 32.535973] which belongs to the cache kmalloc-128 of size 128 [ 32.548632] The buggy address is located 0 bytes to the right of [ 32.548632] allocated 120-byte region [ffff000080df5700, ffff000080df5778) [ 32.561737] [ 32.563265] The buggy address belongs to the physical page: [ 32.568920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100df4 [ 32.577031] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.584785] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.591839] page_type: f5(slab) [ 32.595046] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 32.602889] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.610732] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 32.618670] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.626611] head: 0bfffe0000000001 fffffdffc2037d01 00000000ffffffff 00000000ffffffff [ 32.634550] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 32.642485] page dumped because: kasan: bad access detected [ 32.648138] [ 32.649668] Memory state around the buggy address: [ 32.654531] ffff000080df5600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.661852] ffff000080df5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.669174] >ffff000080df5700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.676494] ^ [ 32.683718] ffff000080df5780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.691030] ffff000080df5800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.698350] ================================================================== [ 32.081276] ================================================================== [ 32.092839] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 32.101042] Write of size 1 at addr ffff000080df5678 by task kunit_try_catch/251 [ 32.108538] [ 32.110075] CPU: 2 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 32.110106] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.110114] Hardware name: Thundercomm Dragonboard 845c (DT) [ 32.110126] Call trace: [ 32.110132] show_stack+0x20/0x38 (C) [ 32.110153] dump_stack_lvl+0x8c/0xd0 [ 32.110176] print_report+0x118/0x608 [ 32.110195] kasan_report+0xdc/0x128 [ 32.110214] __asan_report_store1_noabort+0x20/0x30 [ 32.110234] kmalloc_track_caller_oob_right+0x40c/0x488 [ 32.110253] kunit_try_run_case+0x170/0x3f0 [ 32.110273] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.110295] kthread+0x328/0x630 [ 32.110311] ret_from_fork+0x10/0x20 [ 32.110330] [ 32.177174] Allocated by task 251: [ 32.180632] kasan_save_stack+0x3c/0x68 [ 32.184542] kasan_save_track+0x20/0x40 [ 32.188450] kasan_save_alloc_info+0x40/0x58 [ 32.192788] __kasan_kmalloc+0xd4/0xd8 [ 32.196609] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 32.202268] kmalloc_track_caller_oob_right+0xa8/0x488 [ 32.207494] kunit_try_run_case+0x170/0x3f0 [ 32.211754] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.217323] kthread+0x328/0x630 [ 32.220613] ret_from_fork+0x10/0x20 [ 32.224261] [ 32.225793] The buggy address belongs to the object at ffff000080df5600 [ 32.225793] which belongs to the cache kmalloc-128 of size 128 [ 32.238454] The buggy address is located 0 bytes to the right of [ 32.238454] allocated 120-byte region [ffff000080df5600, ffff000080df5678) [ 32.251557] [ 32.253094] The buggy address belongs to the physical page: [ 32.258743] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x100df4 [ 32.266856] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.274610] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.281665] page_type: f5(slab) [ 32.284868] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 32.292710] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.300554] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 32.308492] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.316431] head: 0bfffe0000000001 fffffdffc2037d01 00000000ffffffff 00000000ffffffff [ 32.324360] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 32.332284] page dumped because: kasan: bad access detected [ 32.337936] [ 32.339466] Memory state around the buggy address: [ 32.344334] ffff000080df5500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.351648] ffff000080df5580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.358962] >ffff000080df5600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.366281] ^ [ 32.373512] ffff000080df5680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.380834] ffff000080df5700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.388153] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 31.770818] ================================================================== [ 31.781855] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 31.789358] Read of size 1 at addr ffff00008448b000 by task kunit_try_catch/249 [ 31.796767] [ 31.798304] CPU: 3 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 31.798334] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.798342] Hardware name: Thundercomm Dragonboard 845c (DT) [ 31.798354] Call trace: [ 31.798361] show_stack+0x20/0x38 (C) [ 31.798381] dump_stack_lvl+0x8c/0xd0 [ 31.798403] print_report+0x118/0x608 [ 31.798422] kasan_report+0xdc/0x128 [ 31.798441] __asan_report_load1_noabort+0x20/0x30 [ 31.798458] kmalloc_node_oob_right+0x2f4/0x330 [ 31.798476] kunit_try_run_case+0x170/0x3f0 [ 31.798496] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.798518] kthread+0x328/0x630 [ 31.798533] ret_from_fork+0x10/0x20 [ 31.798551] [ 31.864617] Allocated by task 249: [ 31.868077] kasan_save_stack+0x3c/0x68 [ 31.871987] kasan_save_track+0x20/0x40 [ 31.875897] kasan_save_alloc_info+0x40/0x58 [ 31.880234] __kasan_kmalloc+0xd4/0xd8 [ 31.884056] __kmalloc_cache_node_noprof+0x178/0x3d0 [ 31.889101] kmalloc_node_oob_right+0xbc/0x330 [ 31.893617] kunit_try_run_case+0x170/0x3f0 [ 31.897870] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.903442] kthread+0x328/0x630 [ 31.906735] ret_from_fork+0x10/0x20 [ 31.910373] [ 31.911910] The buggy address belongs to the object at ffff00008448a000 [ 31.911910] which belongs to the cache kmalloc-4k of size 4096 [ 31.924573] The buggy address is located 0 bytes to the right of [ 31.924573] allocated 4096-byte region [ffff00008448a000, ffff00008448b000) [ 31.937758] [ 31.939288] The buggy address belongs to the physical page: [ 31.944935] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x104488 [ 31.953048] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.960804] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.967863] page_type: f5(slab) [ 31.971071] raw: 0bfffe0000000040 ffff000080003040 dead000000000122 0000000000000000 [ 31.978916] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 31.986761] head: 0bfffe0000000040 ffff000080003040 dead000000000122 0000000000000000 [ 31.994690] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 32.002622] head: 0bfffe0000000003 fffffdffc2112201 00000000ffffffff 00000000ffffffff [ 32.010553] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 32.018480] page dumped because: kasan: bad access detected [ 32.024134] [ 32.025663] Memory state around the buggy address: [ 32.030526] ffff00008448af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.037849] ffff00008448af80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.045174] >ffff00008448b000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.052496] ^ [ 32.055783] ffff00008448b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.063099] ffff00008448b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.070411] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 31.437944] ================================================================== [ 31.449083] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 31.456058] Read of size 1 at addr ffff00009819015f by task kunit_try_catch/247 [ 31.463465] [ 31.465008] CPU: 3 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 31.465040] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.465049] Hardware name: Thundercomm Dragonboard 845c (DT) [ 31.465062] Call trace: [ 31.465069] show_stack+0x20/0x38 (C) [ 31.465090] dump_stack_lvl+0x8c/0xd0 [ 31.465112] print_report+0x118/0x608 [ 31.465132] kasan_report+0xdc/0x128 [ 31.465149] __asan_report_load1_noabort+0x20/0x30 [ 31.465168] kmalloc_oob_left+0x2ec/0x320 [ 31.465184] kunit_try_run_case+0x170/0x3f0 [ 31.465205] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.465227] kthread+0x328/0x630 [ 31.465245] ret_from_fork+0x10/0x20 [ 31.465263] [ 31.530794] Allocated by task 180: [ 31.534256] kasan_save_stack+0x3c/0x68 [ 31.538169] kasan_save_track+0x20/0x40 [ 31.542079] kasan_save_alloc_info+0x40/0x58 [ 31.546418] __kasan_kmalloc+0xd4/0xd8 [ 31.550241] __kmalloc_noprof+0x198/0x4c8 [ 31.554325] kunit_kmalloc_array+0x34/0x88 [ 31.558495] test_readerwriter+0x3b0/0x948 [ 31.562668] kunit_try_run_case+0x170/0x3f0 [ 31.566922] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.572491] kthread+0x328/0x630 [ 31.575785] ret_from_fork+0x10/0x20 [ 31.579426] [ 31.580963] Freed by task 190: [ 31.584079] kasan_save_stack+0x3c/0x68 [ 31.587985] kasan_save_track+0x20/0x40 [ 31.591894] kasan_save_free_info+0x4c/0x78 [ 31.596145] __kasan_slab_free+0x6c/0x98 [ 31.600142] kfree+0x214/0x3c8 [ 31.603255] kfree_action_wrapper+0x18/0x30 [ 31.607508] __kunit_action_free+0x58/0x80 [ 31.611673] kunit_remove_resource+0x14c/0x1f8 [ 31.616194] kunit_cleanup+0x6c/0x108 [ 31.619929] kunit_try_run_case_cleanup+0xa4/0xe0 [ 31.624713] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.630287] kthread+0x328/0x630 [ 31.633578] ret_from_fork+0x10/0x20 [ 31.637215] [ 31.638746] The buggy address belongs to the object at ffff000098190140 [ 31.638746] which belongs to the cache kmalloc-16 of size 16 [ 31.651237] The buggy address is located 15 bytes to the right of [ 31.651237] allocated 16-byte region [ffff000098190140, ffff000098190150) [ 31.664341] [ 31.665874] The buggy address belongs to the physical page: [ 31.671521] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x118190 [ 31.679633] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.686250] page_type: f5(slab) [ 31.689457] raw: 0bfffe0000000000 ffff000080002640 dead000000000122 0000000000000000 [ 31.697301] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 31.705141] page dumped because: kasan: bad access detected [ 31.710790] [ 31.712325] Memory state around the buggy address: [ 31.717189] ffff000098190000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.724514] ffff000098190080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.731838] >ffff000098190100: fa fb fc fc fa fb fc fc fa fb fc fc 00 07 fc fc [ 31.739150] ^ [ 31.745327] ffff000098190180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.752651] ffff000098190200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.759972] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 31.132904] ================================================================== [ 31.140222] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 31.147271] Read of size 1 at addr ffff00009068f180 by task kunit_try_catch/245 [ 31.154666] [ 31.156199] CPU: 5 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 31.156228] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.156235] Hardware name: Thundercomm Dragonboard 845c (DT) [ 31.156247] Call trace: [ 31.156253] show_stack+0x20/0x38 (C) [ 31.156269] dump_stack_lvl+0x8c/0xd0 [ 31.156286] print_report+0x118/0x608 [ 31.156304] kasan_report+0xdc/0x128 [ 31.156322] __asan_report_load1_noabort+0x20/0x30 [ 31.156338] kmalloc_oob_right+0x5d0/0x660 [ 31.156355] kunit_try_run_case+0x170/0x3f0 [ 31.156371] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.156391] kthread+0x328/0x630 [ 31.156403] ret_from_fork+0x10/0x20 [ 31.156419] [ 31.221996] Allocated by task 245: [ 31.225447] kasan_save_stack+0x3c/0x68 [ 31.229353] kasan_save_track+0x20/0x40 [ 31.233258] kasan_save_alloc_info+0x40/0x58 [ 31.237592] __kasan_kmalloc+0xd4/0xd8 [ 31.241409] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.246007] kmalloc_oob_right+0xb0/0x660 [ 31.250081] kunit_try_run_case+0x170/0x3f0 [ 31.254331] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.259892] kthread+0x328/0x630 [ 31.263176] ret_from_fork+0x10/0x20 [ 31.266809] [ 31.268339] The buggy address belongs to the object at ffff00009068f100 [ 31.268339] which belongs to the cache kmalloc-128 of size 128 [ 31.280989] The buggy address is located 13 bytes to the right of [ 31.280989] allocated 115-byte region [ffff00009068f100, ffff00009068f173) [ 31.294164] [ 31.295694] The buggy address belongs to the physical page: [ 31.301335] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11068e [ 31.309433] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.317183] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.324228] page_type: f5(slab) [ 31.327424] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 31.335264] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.343104] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 31.351028] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.358953] head: 0bfffe0000000001 fffffdffc241a381 00000000ffffffff 00000000ffffffff [ 31.366876] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 31.374797] page dumped because: kasan: bad access detected [ 31.380445] [ 31.381968] Memory state around the buggy address: [ 31.386818] ffff00009068f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.394134] ffff00009068f100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.401448] >ffff00009068f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.408762] ^ [ 31.412041] ffff00009068f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.419356] ffff00009068f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.426658] ================================================================== [ 30.827720] ================================================================== [ 30.835029] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 30.842082] Write of size 1 at addr ffff00009068f178 by task kunit_try_catch/245 [ 30.849575] [ 30.851113] CPU: 5 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 30.851142] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.851150] Hardware name: Thundercomm Dragonboard 845c (DT) [ 30.851159] Call trace: [ 30.851165] show_stack+0x20/0x38 (C) [ 30.851182] dump_stack_lvl+0x8c/0xd0 [ 30.851201] print_report+0x118/0x608 [ 30.851220] kasan_report+0xdc/0x128 [ 30.851237] __asan_report_store1_noabort+0x20/0x30 [ 30.851253] kmalloc_oob_right+0x538/0x660 [ 30.851268] kunit_try_run_case+0x170/0x3f0 [ 30.851285] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.851305] kthread+0x328/0x630 [ 30.851319] ret_from_fork+0x10/0x20 [ 30.851335] [ 30.916997] Allocated by task 245: [ 30.920461] kasan_save_stack+0x3c/0x68 [ 30.924368] kasan_save_track+0x20/0x40 [ 30.928272] kasan_save_alloc_info+0x40/0x58 [ 30.932602] __kasan_kmalloc+0xd4/0xd8 [ 30.936418] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.941015] kmalloc_oob_right+0xb0/0x660 [ 30.945090] kunit_try_run_case+0x170/0x3f0 [ 30.949341] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.954908] kthread+0x328/0x630 [ 30.958189] ret_from_fork+0x10/0x20 [ 30.961829] [ 30.963360] The buggy address belongs to the object at ffff00009068f100 [ 30.963360] which belongs to the cache kmalloc-128 of size 128 [ 30.976011] The buggy address is located 5 bytes to the right of [ 30.976011] allocated 115-byte region [ffff00009068f100, ffff00009068f173) [ 30.989099] [ 30.990625] The buggy address belongs to the physical page: [ 30.996266] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11068e [ 31.004369] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.012119] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.019171] page_type: f5(slab) [ 31.022371] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 31.030211] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.038050] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 31.045975] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.053902] head: 0bfffe0000000001 fffffdffc241a381 00000000ffffffff 00000000ffffffff [ 31.061825] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 31.069744] page dumped because: kasan: bad access detected [ 31.075381] [ 31.076903] Memory state around the buggy address: [ 31.081755] ffff00009068f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.089070] ffff00009068f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.096383] >ffff00009068f100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.103696] ^ [ 31.110918] ffff00009068f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.118231] ffff00009068f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.125545] ================================================================== [ 30.518340] ================================================================== [ 30.525671] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 30.532740] Write of size 1 at addr ffff00009068f173 by task kunit_try_catch/245 [ 30.540236] [ 30.541772] CPU: 5 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G N 6.16.0-rc4-next-20250703 #1 PREEMPT [ 30.541805] Tainted: [N]=TEST [ 30.541812] Hardware name: Thundercomm Dragonboard 845c (DT) [ 30.541827] Call trace: [ 30.541835] show_stack+0x20/0x38 (C) [ 30.541865] dump_stack_lvl+0x8c/0xd0 [ 30.541930] print_report+0x118/0x608 [ 30.541951] kasan_report+0xdc/0x128 [ 30.541969] __asan_report_store1_noabort+0x20/0x30 [ 30.541986] kmalloc_oob_right+0x5a4/0x660 [ 30.542002] kunit_try_run_case+0x170/0x3f0 [ 30.542021] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.542042] kthread+0x328/0x630 [ 30.542057] ret_from_fork+0x10/0x20 [ 30.542076] [ 30.606528] Allocated by task 245: [ 30.609983] kasan_save_stack+0x3c/0x68 [ 30.613890] kasan_save_track+0x20/0x40 [ 30.617793] kasan_save_alloc_info+0x40/0x58 [ 30.622129] __kasan_kmalloc+0xd4/0xd8 [ 30.625945] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.630546] kmalloc_oob_right+0xb0/0x660 [ 30.634621] kunit_try_run_case+0x170/0x3f0 [ 30.638870] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.644432] kthread+0x328/0x630 [ 30.647714] ret_from_fork+0x10/0x20 [ 30.651346] [ 30.652881] The buggy address belongs to the object at ffff00009068f100 [ 30.652881] which belongs to the cache kmalloc-128 of size 128 [ 30.665533] The buggy address is located 0 bytes to the right of [ 30.665533] allocated 115-byte region [ffff00009068f100, ffff00009068f173) [ 30.678621] [ 30.680153] The buggy address belongs to the physical page: [ 30.685798] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x11068e [ 30.693902] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.701654] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.708705] page_type: f5(slab) [ 30.711906] raw: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 30.719746] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.727586] head: 0bfffe0000000040 ffff000080002a00 dead000000000122 0000000000000000 [ 30.735511] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.743435] head: 0bfffe0000000001 fffffdffc241a381 00000000ffffffff 00000000ffffffff [ 30.751358] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.759278] page dumped because: kasan: bad access detected [ 30.764919] [ 30.766441] Memory state around the buggy address: [ 30.771301] ffff00009068f000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.778607] ffff00009068f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.785921] >ffff00009068f100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.793232] ^ [ 30.800185] ffff00009068f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.807500] ffff00009068f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.814806] ==================================================================
Failure - lava/job
(no logs available)
Failure - lava/fastboot-boot
(no logs available)
Failure - lava/auto-login-action
(no logs available)
Failure - lava/login-action
(no logs available)
Failure - boot/gcc-13-lkftconfig-kunit
(no logs available)