Date
July 8, 2025, 11:10 a.m.
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp
[ 33.512729] ================================================================== [ 33.512783] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 [ 33.512834] Read of size 1 at addr fff00000c9a662d0 by task kunit_try_catch/290 [ 33.512885] [ 33.513845] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.514094] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.514257] Hardware name: linux,dummy-virt (DT) [ 33.514464] Call trace: [ 33.514524] show_stack+0x20/0x38 (C) [ 33.514626] dump_stack_lvl+0x8c/0xd0 [ 33.514716] print_report+0x118/0x5d0 [ 33.515121] kasan_report+0xdc/0x128 [ 33.515262] __asan_report_load1_noabort+0x20/0x30 [ 33.515348] strcmp+0xc0/0xc8 [ 33.515503] kasan_strings+0x340/0xb00 [ 33.515567] kunit_try_run_case+0x170/0x3f0 [ 33.516034] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.516154] kthread+0x328/0x630 [ 33.516377] ret_from_fork+0x10/0x20 [ 33.516583] [ 33.516612] Allocated by task 290: [ 33.516680] kasan_save_stack+0x3c/0x68 [ 33.516728] kasan_save_track+0x20/0x40 [ 33.517021] kasan_save_alloc_info+0x40/0x58 [ 33.517173] __kasan_kmalloc+0xd4/0xd8 [ 33.517263] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.517486] kasan_strings+0xc8/0xb00 [ 33.517667] kunit_try_run_case+0x170/0x3f0 [ 33.517804] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.517854] kthread+0x328/0x630 [ 33.517891] ret_from_fork+0x10/0x20 [ 33.518111] [ 33.518178] Freed by task 290: [ 33.518353] kasan_save_stack+0x3c/0x68 [ 33.518446] kasan_save_track+0x20/0x40 [ 33.518709] kasan_save_free_info+0x4c/0x78 [ 33.518896] __kasan_slab_free+0x6c/0x98 [ 33.518977] kfree+0x214/0x3c8 [ 33.519061] kasan_strings+0x24c/0xb00 [ 33.519166] kunit_try_run_case+0x170/0x3f0 [ 33.519253] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.519472] kthread+0x328/0x630 [ 33.519661] ret_from_fork+0x10/0x20 [ 33.519773] [ 33.519850] The buggy address belongs to the object at fff00000c9a662c0 [ 33.519850] which belongs to the cache kmalloc-32 of size 32 [ 33.520150] The buggy address is located 16 bytes inside of [ 33.520150] freed 32-byte region [fff00000c9a662c0, fff00000c9a662e0) [ 33.520335] [ 33.520377] The buggy address belongs to the physical page: [ 33.520425] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a66 [ 33.520566] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.520664] page_type: f5(slab) [ 33.521036] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 33.521107] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 33.521731] >fff00000c9a66280: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 33.524990] Hardware name: linux,dummy-virt (DT) [ 33.525824] __kasan_kmalloc+0xd4/0xd8 [ 33.527676] kthread+0x328/0x630 [ 33.528345] [ 33.528880] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 33.529725] fff00000c9a66300: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 33.531523] Hardware name: linux,dummy-virt (DT) [ 33.534064] kthread+0x328/0x630 [ 33.534620] kasan_save_track+0x20/0x40 [ 33.536379] The buggy address is located 16 bytes inside of [ 33.536379] freed 32-byte region [fff00000c9a662c0, fff00000c9a662e0) [ 33.538229] >fff00000c9a66280: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 33.540252] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.541902] __kasan_kmalloc+0xd4/0xd8 [ 33.542316] kasan_save_stack+0x3c/0x68 [ 33.542839] The buggy address belongs to the object at fff00000c9a662c0 [ 33.542839] which belongs to the cache kmalloc-32 of size 32 [ 33.554870] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 33.556511] kthread+0x328/0x630 [ 33.557958] kthread+0x328/0x630 [ 33.558591] The buggy address belongs to the physical page: [ 33.559475] fff00000c7981600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.562164] Call trace: [ 33.562870] kasan_report+0xdc/0x128 [ 33.563808] [ 33.564106] __kasan_kmalloc+0xd4/0xd8 [ 33.564787] ret_from_fork+0x10/0x20 [ 33.565204] [ 33.565847] page_type: f5(slab) [ 33.566906] ^ [ 33.567440] ==================================================================
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 33.799728] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 33.639175] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[ 33.605909] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0
Failure - log-parser-boot/internal-error-oops-oops-smp
[ 111.467950] Internal error: Oops: 0000000096000005 [#1] SMP [ 111.473506] Modules linked in: [ 111.475180] CPU: 1 UID: 0 PID: 563 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 111.476302] Tainted: [B]=BAD_PAGE, [N]=TEST [ 111.476973] Hardware name: linux,dummy-virt (DT) [ 111.477812] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 111.478564] pc : kunit_test_null_dereference+0x70/0x170 [ 111.479315] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 111.480044] sp : ffff800080f17d30 [ 111.480610] x29: ffff800080f17d90 x28: 0000000000000000 x27: 0000000000000000 [ 111.481674] x26: 1ffe0000193d1861 x25: 0000000000000000 x24: 0000000000000004 [ 111.482477] x23: fff00000c9e8c30c x22: ffff92c7b5031a70 x21: fff00000c13a7908 [ 111.483261] x20: 1ffff000101e2fa6 x19: ffff800080087990 x18: 0000000056d790fb [ 111.483861] x17: 0000000000000001 x16: fff00000da47ace8 x15: 0000000048789fa8 [ 111.484220] x14: 000000002e4f09f3 x13: 1ffe00001b48f581 x12: fffd800018e0711c [ 111.484642] x11: 1ffe000018e0711b x10: fffd800018e0711b x9 : ffff92c7b5029200 [ 111.485615] x8 : ffff800080f17c18 x7 : 0000000000000001 x6 : 0000000041b58ab3 [ 111.486404] x5 : ffff7000101e2fa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 111.487144] x2 : dfff800000000000 x1 : fff00000c7038000 x0 : ffff800080087990 [ 111.487931] Call trace: [ 111.488273] kunit_test_null_dereference+0x70/0x170 (P) [ 111.488915] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 111.489557] kthread+0x328/0x630 [ 111.489999] ret_from_fork+0x10/0x20 [ 111.490565] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 111.491409] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc
[ 64.365721] ================================================================== [ 64.365787] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 64.365787] [ 64.365877] Use-after-free read at 0x00000000b92afe52 (in kfence-#200): [ 64.365929] test_krealloc+0x51c/0x830 [ 64.365975] kunit_try_run_case+0x170/0x3f0 [ 64.366021] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.366067] kthread+0x328/0x630 [ 64.366107] ret_from_fork+0x10/0x20 [ 64.366148] [ 64.366172] kfence-#200: 0x00000000b92afe52-0x000000000dc55975, size=32, cache=kmalloc-32 [ 64.366172] [ 64.366241] allocated by task 368 on cpu 1 at 64.364995s (0.001241s ago): [ 64.366311] test_alloc+0x29c/0x628 [ 64.366352] test_krealloc+0xc0/0x830 [ 64.366392] kunit_try_run_case+0x170/0x3f0 [ 64.366435] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.366479] kthread+0x328/0x630 [ 64.366515] ret_from_fork+0x10/0x20 [ 64.366553] [ 64.366578] freed by task 368 on cpu 1 at 64.365335s (0.001239s ago): [ 64.366639] krealloc_noprof+0x148/0x360 [ 64.366680] test_krealloc+0x1dc/0x830 [ 64.366720] kunit_try_run_case+0x170/0x3f0 [ 64.366761] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.366805] kthread+0x328/0x630 [ 64.366843] ret_from_fork+0x10/0x20 [ 64.366881] [ 64.366925] CPU: 1 UID: 0 PID: 368 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 64.367006] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.367035] Hardware name: linux,dummy-virt (DT) [ 64.367073] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[ 64.288996] ================================================================== [ 64.289097] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 64.289097] [ 64.289203] Use-after-free read at 0x000000003def5459 (in kfence-#199): [ 64.289279] test_memcache_typesafe_by_rcu+0x280/0x560 [ 64.289331] kunit_try_run_case+0x170/0x3f0 [ 64.289378] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.289425] kthread+0x328/0x630 [ 64.289465] ret_from_fork+0x10/0x20 [ 64.289507] [ 64.289532] kfence-#199: 0x000000003def5459-0x000000005860e2b8, size=32, cache=test [ 64.289532] [ 64.289584] allocated by task 366 on cpu 1 at 64.264932s (0.024647s ago): [ 64.289656] test_alloc+0x230/0x628 [ 64.289695] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 64.289738] kunit_try_run_case+0x170/0x3f0 [ 64.289779] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.289823] kthread+0x328/0x630 [ 64.289858] ret_from_fork+0x10/0x20 [ 64.289897] [ 64.289920] freed by task 366 on cpu 1 at 64.265048s (0.024868s ago): [ 64.289976] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 64.290020] kunit_try_run_case+0x170/0x3f0 [ 64.290061] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.290103] kthread+0x328/0x630 [ 64.290139] ret_from_fork+0x10/0x20 [ 64.290177] [ 64.290236] CPU: 1 UID: 0 PID: 366 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 64.290318] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.290348] Hardware name: linux,dummy-virt (DT) [ 64.290382] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access
[ 42.025814] ================================================================== [ 42.025961] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 42.025961] [ 42.026068] Invalid read at 0x000000005ebb45c0: [ 42.026136] test_invalid_access+0xdc/0x1f0 [ 42.026192] kunit_try_run_case+0x170/0x3f0 [ 42.026263] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.026397] kthread+0x328/0x630 [ 42.026479] ret_from_fork+0x10/0x20 [ 42.027235] [ 42.027458] CPU: 0 UID: 0 PID: 362 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 42.027635] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.027672] Hardware name: linux,dummy-virt (DT) [ 42.028301] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[ 41.793311] ================================================================== [ 41.793403] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 41.793403] [ 41.793468] Corrupted memory at 0x0000000043cbc5af [ ! . . . . . . . . . . . . . . . ] (in kfence-#195): [ 41.793782] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 41.793830] kunit_try_run_case+0x170/0x3f0 [ 41.793877] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.793923] kthread+0x328/0x630 [ 41.793961] ret_from_fork+0x10/0x20 [ 41.794001] [ 41.794026] kfence-#195: 0x0000000023dc8c43-0x000000001b62b549, size=73, cache=kmalloc-96 [ 41.794026] [ 41.794083] allocated by task 356 on cpu 0 at 41.793049s (0.001030s ago): [ 41.794148] test_alloc+0x29c/0x628 [ 41.794188] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 41.794248] kunit_try_run_case+0x170/0x3f0 [ 41.794289] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.794333] kthread+0x328/0x630 [ 41.794370] ret_from_fork+0x10/0x20 [ 41.794410] [ 41.794434] freed by task 356 on cpu 0 at 41.793196s (0.001234s ago): [ 41.794498] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 41.794543] kunit_try_run_case+0x170/0x3f0 [ 41.794586] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.794631] kthread+0x328/0x630 [ 41.794668] ret_from_fork+0x10/0x20 [ 41.794707] [ 41.794753] CPU: 0 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 41.794835] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.794864] Hardware name: linux,dummy-virt (DT) [ 41.794900] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[ 41.689136] ================================================================== [ 41.689245] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 41.689245] [ 41.689344] Out-of-bounds read at 0x00000000def14830 (105B right of kfence-#194): [ 41.689407] test_kmalloc_aligned_oob_read+0x238/0x468 [ 41.689459] kunit_try_run_case+0x170/0x3f0 [ 41.689506] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.689552] kthread+0x328/0x630 [ 41.689591] ret_from_fork+0x10/0x20 [ 41.689632] [ 41.689658] kfence-#194: 0x000000001b9e6b4b-0x0000000018025a8f, size=73, cache=kmalloc-96 [ 41.689658] [ 41.689712] allocated by task 354 on cpu 0 at 41.688905s (0.000804s ago): [ 41.689784] test_alloc+0x29c/0x628 [ 41.689825] test_kmalloc_aligned_oob_read+0x100/0x468 [ 41.689868] kunit_try_run_case+0x170/0x3f0 [ 41.689909] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.689955] kthread+0x328/0x630 [ 41.689992] ret_from_fork+0x10/0x20 [ 41.690030] [ 41.690078] CPU: 0 UID: 0 PID: 354 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 41.690159] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.690189] Hardware name: linux,dummy-virt (DT) [ 41.690236] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption
[ 37.109177] ================================================================== [ 37.109288] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 37.109288] [ 37.109353] Corrupted memory at 0x000000002b61ffad [ ! ] (in kfence-#150): [ 37.109467] test_corruption+0x1d8/0x378 [ 37.109515] kunit_try_run_case+0x170/0x3f0 [ 37.109559] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.109605] kthread+0x328/0x630 [ 37.109643] ret_from_fork+0x10/0x20 [ 37.109684] [ 37.109707] kfence-#150: 0x000000003a6b315c-0x0000000010e08806, size=32, cache=test [ 37.109707] [ 37.109762] allocated by task 344 on cpu 0 at 37.109020s (0.000738s ago): [ 37.109822] test_alloc+0x230/0x628 [ 37.109864] test_corruption+0x198/0x378 [ 37.109905] kunit_try_run_case+0x170/0x3f0 [ 37.109946] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.109990] kthread+0x328/0x630 [ 37.110026] ret_from_fork+0x10/0x20 [ 37.110066] [ 37.110092] freed by task 344 on cpu 0 at 37.109087s (0.001001s ago): [ 37.110154] test_corruption+0x1d8/0x378 [ 37.110195] kunit_try_run_case+0x170/0x3f0 [ 37.110249] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.110294] kthread+0x328/0x630 [ 37.110330] ret_from_fork+0x10/0x20 [ 37.110369] [ 37.110410] CPU: 0 UID: 0 PID: 344 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 37.110489] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.110519] Hardware name: linux,dummy-virt (DT) [ 37.110553] ================================================================== [ 37.005141] ================================================================== [ 37.005254] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 37.005254] [ 37.005322] Corrupted memory at 0x000000003cf90ef2 [ ! . . . . . . . . . . . . . . . ] (in kfence-#149): [ 37.005636] test_corruption+0x120/0x378 [ 37.005683] kunit_try_run_case+0x170/0x3f0 [ 37.005730] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.005776] kthread+0x328/0x630 [ 37.005815] ret_from_fork+0x10/0x20 [ 37.005857] [ 37.005881] kfence-#149: 0x00000000d975ab00-0x0000000061478567, size=32, cache=test [ 37.005881] [ 37.005936] allocated by task 344 on cpu 0 at 37.004983s (0.000950s ago): [ 37.005996] test_alloc+0x230/0x628 [ 37.006038] test_corruption+0xdc/0x378 [ 37.006077] kunit_try_run_case+0x170/0x3f0 [ 37.006116] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.006161] kthread+0x328/0x630 [ 37.006197] ret_from_fork+0x10/0x20 [ 37.006249] [ 37.006273] freed by task 344 on cpu 0 at 37.005045s (0.001224s ago): [ 37.006337] test_corruption+0x120/0x378 [ 37.006380] kunit_try_run_case+0x170/0x3f0 [ 37.006421] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.006464] kthread+0x328/0x630 [ 37.006499] ret_from_fork+0x10/0x20 [ 37.006539] [ 37.006583] CPU: 0 UID: 0 PID: 344 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 37.006664] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.006694] Hardware name: linux,dummy-virt (DT) [ 37.006729] ================================================================== [ 36.797378] ================================================================== [ 36.797492] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 36.797492] [ 36.797564] Corrupted memory at 0x00000000cad947eb [ ! . . . . . . . . . . . . . . . ] (in kfence-#147): [ 36.798684] test_corruption+0x278/0x378 [ 36.798741] kunit_try_run_case+0x170/0x3f0 [ 36.798789] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.798836] kthread+0x328/0x630 [ 36.798876] ret_from_fork+0x10/0x20 [ 36.798918] [ 36.798943] kfence-#147: 0x0000000077976b7d-0x000000000059992a, size=32, cache=kmalloc-32 [ 36.798943] [ 36.799002] allocated by task 342 on cpu 0 at 36.797029s (0.001970s ago): [ 36.799067] test_alloc+0x29c/0x628 [ 36.799108] test_corruption+0xdc/0x378 [ 36.799148] kunit_try_run_case+0x170/0x3f0 [ 36.799190] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.799248] kthread+0x328/0x630 [ 36.799283] ret_from_fork+0x10/0x20 [ 36.799323] [ 36.799349] freed by task 342 on cpu 0 at 36.797141s (0.002204s ago): [ 36.799411] test_corruption+0x278/0x378 [ 36.799451] kunit_try_run_case+0x170/0x3f0 [ 36.799490] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.799535] kthread+0x328/0x630 [ 36.799570] ret_from_fork+0x10/0x20 [ 36.799607] [ 36.799658] CPU: 0 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 36.799738] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.799769] Hardware name: linux,dummy-virt (DT) [ 36.799803] ================================================================== [ 36.901332] ================================================================== [ 36.901426] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 36.901426] [ 36.901490] Corrupted memory at 0x00000000fa5cc97d [ ! ] (in kfence-#148): [ 36.901620] test_corruption+0x284/0x378 [ 36.901668] kunit_try_run_case+0x170/0x3f0 [ 36.901713] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.901759] kthread+0x328/0x630 [ 36.901796] ret_from_fork+0x10/0x20 [ 36.901837] [ 36.901860] kfence-#148: 0x00000000da5376bb-0x00000000af98cba4, size=32, cache=kmalloc-32 [ 36.901860] [ 36.901916] allocated by task 342 on cpu 0 at 36.901033s (0.000879s ago): [ 36.901978] test_alloc+0x29c/0x628 [ 36.902020] test_corruption+0x198/0x378 [ 36.902060] kunit_try_run_case+0x170/0x3f0 [ 36.902101] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.902146] kthread+0x328/0x630 [ 36.902181] ret_from_fork+0x10/0x20 [ 36.902234] [ 36.902258] freed by task 342 on cpu 0 at 36.901140s (0.001114s ago): [ 36.902321] test_corruption+0x284/0x378 [ 36.902362] kunit_try_run_case+0x170/0x3f0 [ 36.902401] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.902446] kthread+0x328/0x630 [ 36.902480] ret_from_fork+0x10/0x20 [ 36.902519] [ 36.902562] CPU: 0 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 36.902642] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.902671] Hardware name: linux,dummy-virt (DT) [ 36.902705] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[ 36.589157] ================================================================== [ 36.589267] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 36.589267] [ 36.589335] Invalid free of 0x000000005f6241f1 (in kfence-#145): [ 36.589393] test_invalid_addr_free+0x1ac/0x238 [ 36.589442] kunit_try_run_case+0x170/0x3f0 [ 36.589487] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.589534] kthread+0x328/0x630 [ 36.589574] ret_from_fork+0x10/0x20 [ 36.589616] [ 36.589641] kfence-#145: 0x000000002b4736fa-0x00000000c27d130c, size=32, cache=kmalloc-32 [ 36.589641] [ 36.589696] allocated by task 338 on cpu 1 at 36.589000s (0.000692s ago): [ 36.589762] test_alloc+0x29c/0x628 [ 36.589802] test_invalid_addr_free+0xd4/0x238 [ 36.589846] kunit_try_run_case+0x170/0x3f0 [ 36.589887] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.589932] kthread+0x328/0x630 [ 36.589968] ret_from_fork+0x10/0x20 [ 36.590008] [ 36.590057] CPU: 1 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 36.590138] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.590167] Hardware name: linux,dummy-virt (DT) [ 36.590200] ================================================================== [ 36.693085] ================================================================== [ 36.693178] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 36.693178] [ 36.693257] Invalid free of 0x00000000e2ab1308 (in kfence-#146): [ 36.693314] test_invalid_addr_free+0xec/0x238 [ 36.693361] kunit_try_run_case+0x170/0x3f0 [ 36.693407] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.693453] kthread+0x328/0x630 [ 36.693490] ret_from_fork+0x10/0x20 [ 36.693529] [ 36.693554] kfence-#146: 0x0000000096c8dce3-0x000000005554ee18, size=32, cache=test [ 36.693554] [ 36.693606] allocated by task 340 on cpu 1 at 36.692940s (0.000662s ago): [ 36.693670] test_alloc+0x230/0x628 [ 36.693710] test_invalid_addr_free+0xd4/0x238 [ 36.693753] kunit_try_run_case+0x170/0x3f0 [ 36.693794] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.693837] kthread+0x328/0x630 [ 36.693873] ret_from_fork+0x10/0x20 [ 36.693912] [ 36.693954] CPU: 1 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 36.694034] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.694063] Hardware name: linux,dummy-virt (DT) [ 36.694097] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 33.646058] ================================================================== [ 33.646113] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 33.646773] kasan_report+0xdc/0x128 [ 33.647270] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.647741] kunit_try_run_case+0x170/0x3f0 [ 33.647990] The buggy address is located 8 bytes inside of [ 33.647990] allocated 9-byte region [fff00000c79816e0, fff00000c79816e9) [ 33.649449] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free
[ 36.381311] ================================================================== [ 36.381429] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 36.381429] [ 36.381502] Invalid free of 0x0000000027937c6a (in kfence-#143): [ 36.381569] test_double_free+0x1bc/0x238 [ 36.381616] kunit_try_run_case+0x170/0x3f0 [ 36.381664] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.381711] kthread+0x328/0x630 [ 36.381752] ret_from_fork+0x10/0x20 [ 36.381794] [ 36.381818] kfence-#143: 0x0000000027937c6a-0x0000000052bf6d9a, size=32, cache=kmalloc-32 [ 36.381818] [ 36.381873] allocated by task 334 on cpu 0 at 36.380989s (0.000881s ago): [ 36.381938] test_alloc+0x29c/0x628 [ 36.381980] test_double_free+0xd4/0x238 [ 36.382023] kunit_try_run_case+0x170/0x3f0 [ 36.382065] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.382111] kthread+0x328/0x630 [ 36.382148] ret_from_fork+0x10/0x20 [ 36.382188] [ 36.382227] freed by task 334 on cpu 0 at 36.381066s (0.001157s ago): [ 36.382291] test_double_free+0x1ac/0x238 [ 36.382333] kunit_try_run_case+0x170/0x3f0 [ 36.382385] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.382431] kthread+0x328/0x630 [ 36.382467] ret_from_fork+0x10/0x20 [ 36.382507] [ 36.382554] CPU: 0 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 36.382637] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.382667] Hardware name: linux,dummy-virt (DT) [ 36.382700] ================================================================== [ 36.485258] ================================================================== [ 36.485355] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 36.485355] [ 36.485421] Invalid free of 0x00000000d97aa65a (in kfence-#144): [ 36.485475] test_double_free+0x100/0x238 [ 36.485522] kunit_try_run_case+0x170/0x3f0 [ 36.485570] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.485616] kthread+0x328/0x630 [ 36.485656] ret_from_fork+0x10/0x20 [ 36.485696] [ 36.485720] kfence-#144: 0x00000000d97aa65a-0x000000005e272f38, size=32, cache=test [ 36.485720] [ 36.485774] allocated by task 336 on cpu 0 at 36.485000s (0.000771s ago): [ 36.485839] test_alloc+0x230/0x628 [ 36.485881] test_double_free+0xd4/0x238 [ 36.485922] kunit_try_run_case+0x170/0x3f0 [ 36.485965] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.486011] kthread+0x328/0x630 [ 36.486047] ret_from_fork+0x10/0x20 [ 36.486087] [ 36.486111] freed by task 336 on cpu 0 at 36.485071s (0.001036s ago): [ 36.486175] test_double_free+0xf0/0x238 [ 36.486227] kunit_try_run_case+0x170/0x3f0 [ 36.486269] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.486314] kthread+0x328/0x630 [ 36.486349] ret_from_fork+0x10/0x20 [ 36.486389] [ 36.486432] CPU: 0 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 36.486515] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.486543] Hardware name: linux,dummy-virt (DT) [ 36.486578] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[ 35.961647] ================================================================== [ 35.961813] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 35.961813] [ 35.961978] Use-after-free read at 0x00000000e138ed8e (in kfence-#139): [ 35.962042] test_use_after_free_read+0x114/0x248 [ 35.962093] kunit_try_run_case+0x170/0x3f0 [ 35.962360] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.962425] kthread+0x328/0x630 [ 35.962465] ret_from_fork+0x10/0x20 [ 35.962549] [ 35.962576] kfence-#139: 0x00000000e138ed8e-0x0000000054847e1c, size=32, cache=kmalloc-32 [ 35.962576] [ 35.962632] allocated by task 326 on cpu 0 at 35.961259s (0.001370s ago): [ 35.962719] test_alloc+0x29c/0x628 [ 35.962763] test_use_after_free_read+0xd0/0x248 [ 35.962806] kunit_try_run_case+0x170/0x3f0 [ 35.962994] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.963065] kthread+0x328/0x630 [ 35.963135] ret_from_fork+0x10/0x20 [ 35.963241] [ 35.963620] freed by task 326 on cpu 0 at 35.961331s (0.001965s ago): [ 35.963831] test_use_after_free_read+0x1c0/0x248 [ 35.963916] kunit_try_run_case+0x170/0x3f0 [ 35.963978] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.964060] kthread+0x328/0x630 [ 35.964146] ret_from_fork+0x10/0x20 [ 35.964251] [ 35.964344] CPU: 0 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 35.964455] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.964486] Hardware name: linux,dummy-virt (DT) [ 35.964521] ================================================================== [ 36.071806] ================================================================== [ 36.071892] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 36.071892] [ 36.071980] Use-after-free read at 0x00000000f6e68098 (in kfence-#140): [ 36.072035] test_use_after_free_read+0x114/0x248 [ 36.072085] kunit_try_run_case+0x170/0x3f0 [ 36.072963] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.073080] kthread+0x328/0x630 [ 36.073129] ret_from_fork+0x10/0x20 [ 36.073170] [ 36.073197] kfence-#140: 0x00000000f6e68098-0x00000000af6ba70e, size=32, cache=test [ 36.073197] [ 36.073358] allocated by task 328 on cpu 0 at 36.071061s (0.002293s ago): [ 36.073460] test_alloc+0x230/0x628 [ 36.073590] test_use_after_free_read+0xd0/0x248 [ 36.073856] kunit_try_run_case+0x170/0x3f0 [ 36.074124] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.074175] kthread+0x328/0x630 [ 36.074575] ret_from_fork+0x10/0x20 [ 36.074877] [ 36.074905] freed by task 328 on cpu 0 at 36.071355s (0.003546s ago): [ 36.075515] test_use_after_free_read+0xf0/0x248 [ 36.075934] kunit_try_run_case+0x170/0x3f0 [ 36.076336] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.076479] kthread+0x328/0x630 [ 36.076762] ret_from_fork+0x10/0x20 [ 36.076848] [ 36.076927] CPU: 0 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 36.077441] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.077485] Hardware name: linux,dummy-virt (DT) [ 36.077519] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[ 35.857831] ================================================================== [ 35.857919] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 35.857919] [ 35.858046] Out-of-bounds write at 0x000000004490a70a (1B left of kfence-#138): [ 35.858109] test_out_of_bounds_write+0x100/0x240 [ 35.858158] kunit_try_run_case+0x170/0x3f0 [ 35.858223] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.858297] kthread+0x328/0x630 [ 35.858339] ret_from_fork+0x10/0x20 [ 35.858380] [ 35.858403] kfence-#138: 0x00000000ebac7135-0x000000002c821f3d, size=32, cache=test [ 35.858403] [ 35.858644] allocated by task 324 on cpu 0 at 35.857706s (0.000905s ago): [ 35.858726] test_alloc+0x230/0x628 [ 35.858799] test_out_of_bounds_write+0xc8/0x240 [ 35.858843] kunit_try_run_case+0x170/0x3f0 [ 35.858943] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.859017] kthread+0x328/0x630 [ 35.859083] ret_from_fork+0x10/0x20 [ 35.859124] [ 35.859169] CPU: 0 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 35.859264] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.859501] Hardware name: linux,dummy-virt (DT) [ 35.859553] ================================================================== [ 35.547590] ================================================================== [ 35.547760] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 35.547760] [ 35.547856] Out-of-bounds write at 0x000000000f57d1be (1B left of kfence-#135): [ 35.547980] test_out_of_bounds_write+0x100/0x240 [ 35.548033] kunit_try_run_case+0x170/0x3f0 [ 35.548118] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.548182] kthread+0x328/0x630 [ 35.548500] ret_from_fork+0x10/0x20 [ 35.548593] [ 35.548634] kfence-#135: 0x00000000ee1d8197-0x000000000b031ad3, size=32, cache=kmalloc-32 [ 35.548634] [ 35.548785] allocated by task 322 on cpu 0 at 35.547346s (0.001428s ago): [ 35.548857] test_alloc+0x29c/0x628 [ 35.548946] test_out_of_bounds_write+0xc8/0x240 [ 35.549011] kunit_try_run_case+0x170/0x3f0 [ 35.549051] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.549096] kthread+0x328/0x630 [ 35.549132] ret_from_fork+0x10/0x20 [ 35.549171] [ 35.549230] CPU: 0 UID: 0 PID: 322 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 35.549313] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.549482] Hardware name: linux,dummy-virt (DT) [ 35.549581] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[ 35.338148] ================================================================== [ 35.338403] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 35.338403] [ 35.338493] Out-of-bounds read at 0x00000000f878214a (1B left of kfence-#133): [ 35.338550] test_out_of_bounds_read+0x114/0x3e0 [ 35.338685] kunit_try_run_case+0x170/0x3f0 [ 35.338760] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.338809] kthread+0x328/0x630 [ 35.338967] ret_from_fork+0x10/0x20 [ 35.339307] [ 35.339404] kfence-#133: 0x0000000041b1f5e0-0x0000000095b4cd26, size=32, cache=test [ 35.339404] [ 35.339515] allocated by task 320 on cpu 0 at 35.337970s (0.001524s ago): [ 35.339684] test_alloc+0x230/0x628 [ 35.339748] test_out_of_bounds_read+0xdc/0x3e0 [ 35.339807] kunit_try_run_case+0x170/0x3f0 [ 35.339850] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.339895] kthread+0x328/0x630 [ 35.339951] ret_from_fork+0x10/0x20 [ 35.339991] [ 35.340035] CPU: 0 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 35.340198] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.340245] Hardware name: linux,dummy-virt (DT) [ 35.340289] ================================================================== [ 35.129576] ================================================================== [ 35.129968] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 35.129968] [ 35.130085] Out-of-bounds read at 0x000000004369ef9e (32B right of kfence-#131): [ 35.130146] test_out_of_bounds_read+0x1c8/0x3e0 [ 35.130219] kunit_try_run_case+0x170/0x3f0 [ 35.130267] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.130396] kthread+0x328/0x630 [ 35.130439] ret_from_fork+0x10/0x20 [ 35.130493] [ 35.130541] kfence-#131: 0x000000000ab37535-0x000000000e10db1f, size=32, cache=kmalloc-32 [ 35.130541] [ 35.130607] allocated by task 318 on cpu 0 at 35.129337s (0.001265s ago): [ 35.130678] test_alloc+0x29c/0x628 [ 35.130720] test_out_of_bounds_read+0x198/0x3e0 [ 35.130878] kunit_try_run_case+0x170/0x3f0 [ 35.130945] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.131106] kthread+0x328/0x630 [ 35.131189] ret_from_fork+0x10/0x20 [ 35.131369] [ 35.131415] CPU: 0 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 35.131496] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.131524] Hardware name: linux,dummy-virt (DT) [ 35.131558] ================================================================== [ 34.818395] ================================================================== [ 34.818672] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 34.818672] [ 34.818850] Out-of-bounds read at 0x00000000dbc24fa3 (1B left of kfence-#128): [ 34.819131] test_out_of_bounds_read+0x114/0x3e0 [ 34.819188] kunit_try_run_case+0x170/0x3f0 [ 34.819408] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.819615] kthread+0x328/0x630 [ 34.819658] ret_from_fork+0x10/0x20 [ 34.819754] [ 34.820009] kfence-#128: 0x00000000bc053c43-0x00000000443fffbf, size=32, cache=kmalloc-32 [ 34.820009] [ 34.820434] allocated by task 318 on cpu 0 at 34.817418s (0.002894s ago): [ 34.821360] test_alloc+0x29c/0x628 [ 34.821570] test_out_of_bounds_read+0xdc/0x3e0 [ 34.821656] kunit_try_run_case+0x170/0x3f0 [ 34.821821] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.822048] kthread+0x328/0x630 [ 34.822234] ret_from_fork+0x10/0x20 [ 34.822498] [ 34.822938] CPU: 0 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.823054] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.823085] Hardware name: linux,dummy-virt (DT) [ 34.823457] ================================================================== [ 35.441848] ================================================================== [ 35.441928] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 35.441928] [ 35.442014] Out-of-bounds read at 0x00000000d31506f3 (32B right of kfence-#134): [ 35.442072] test_out_of_bounds_read+0x1c8/0x3e0 [ 35.442122] kunit_try_run_case+0x170/0x3f0 [ 35.442342] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.442411] kthread+0x328/0x630 [ 35.442454] ret_from_fork+0x10/0x20 [ 35.442512] [ 35.442539] kfence-#134: 0x000000008e85b0fc-0x00000000666547d1, size=32, cache=test [ 35.442539] [ 35.442638] allocated by task 320 on cpu 0 at 35.441766s (0.000841s ago): [ 35.442708] test_alloc+0x230/0x628 [ 35.442749] test_out_of_bounds_read+0x198/0x3e0 [ 35.442792] kunit_try_run_case+0x170/0x3f0 [ 35.442970] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.443022] kthread+0x328/0x630 [ 35.443057] ret_from_fork+0x10/0x20 [ 35.443145] [ 35.443228] CPU: 0 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 35.443353] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.443430] Hardware name: linux,dummy-virt (DT) [ 35.443467] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[ 34.454065] ================================================================== [ 34.454127] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 34.454184] Write of size 1 at addr fff00000c9adfc78 by task kunit_try_catch/316 [ 34.454260] [ 34.454293] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.454389] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.454419] Hardware name: linux,dummy-virt (DT) [ 34.454452] Call trace: [ 34.454483] show_stack+0x20/0x38 (C) [ 34.454737] dump_stack_lvl+0x8c/0xd0 [ 34.454801] print_report+0x118/0x5d0 [ 34.454894] kasan_report+0xdc/0x128 [ 34.454975] __asan_report_store1_noabort+0x20/0x30 [ 34.455033] strncpy_from_user+0x270/0x2a0 [ 34.455090] copy_user_test_oob+0x5c0/0xec8 [ 34.455155] kunit_try_run_case+0x170/0x3f0 [ 34.455274] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.455410] kthread+0x328/0x630 [ 34.455490] ret_from_fork+0x10/0x20 [ 34.455572] [ 34.455602] Allocated by task 316: [ 34.455640] kasan_save_stack+0x3c/0x68 [ 34.455686] kasan_save_track+0x20/0x40 [ 34.455742] kasan_save_alloc_info+0x40/0x58 [ 34.455803] __kasan_kmalloc+0xd4/0xd8 [ 34.455851] __kmalloc_noprof+0x198/0x4c8 [ 34.455899] kunit_kmalloc_array+0x34/0x88 [ 34.455946] copy_user_test_oob+0xac/0xec8 [ 34.455988] kunit_try_run_case+0x170/0x3f0 [ 34.456048] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.456098] kthread+0x328/0x630 [ 34.456134] ret_from_fork+0x10/0x20 [ 34.456188] [ 34.456342] The buggy address belongs to the object at fff00000c9adfc00 [ 34.456342] which belongs to the cache kmalloc-128 of size 128 [ 34.456484] The buggy address is located 0 bytes to the right of [ 34.456484] allocated 120-byte region [fff00000c9adfc00, fff00000c9adfc78) [ 34.456656] [ 34.456716] The buggy address belongs to the physical page: [ 34.456765] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109adf [ 34.456992] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.457164] page_type: f5(slab) [ 34.457291] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.457344] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.457386] page dumped because: kasan: bad access detected [ 34.457444] [ 34.457466] Memory state around the buggy address: [ 34.457501] fff00000c9adfb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.457772] fff00000c9adfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.457890] >fff00000c9adfc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 34.457995] ^ [ 34.458311] fff00000c9adfc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.458441] fff00000c9adfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.458489] ================================================================== [ 34.448430] ================================================================== [ 34.448484] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 34.448538] Write of size 121 at addr fff00000c9adfc00 by task kunit_try_catch/316 [ 34.448605] [ 34.448635] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.449175] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.449240] Hardware name: linux,dummy-virt (DT) [ 34.449291] Call trace: [ 34.449317] show_stack+0x20/0x38 (C) [ 34.449384] dump_stack_lvl+0x8c/0xd0 [ 34.449507] print_report+0x118/0x5d0 [ 34.449576] kasan_report+0xdc/0x128 [ 34.449645] kasan_check_range+0x100/0x1a8 [ 34.449735] __kasan_check_write+0x20/0x30 [ 34.449783] strncpy_from_user+0x3c/0x2a0 [ 34.449852] copy_user_test_oob+0x5c0/0xec8 [ 34.449901] kunit_try_run_case+0x170/0x3f0 [ 34.450089] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.450192] kthread+0x328/0x630 [ 34.450285] ret_from_fork+0x10/0x20 [ 34.450369] [ 34.450420] Allocated by task 316: [ 34.450532] kasan_save_stack+0x3c/0x68 [ 34.450638] kasan_save_track+0x20/0x40 [ 34.450905] kasan_save_alloc_info+0x40/0x58 [ 34.450989] __kasan_kmalloc+0xd4/0xd8 [ 34.451058] __kmalloc_noprof+0x198/0x4c8 [ 34.451142] kunit_kmalloc_array+0x34/0x88 [ 34.451200] copy_user_test_oob+0xac/0xec8 [ 34.451306] kunit_try_run_case+0x170/0x3f0 [ 34.451386] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.451461] kthread+0x328/0x630 [ 34.451519] ret_from_fork+0x10/0x20 [ 34.451632] [ 34.451687] The buggy address belongs to the object at fff00000c9adfc00 [ 34.451687] which belongs to the cache kmalloc-128 of size 128 [ 34.451747] The buggy address is located 0 bytes inside of [ 34.451747] allocated 120-byte region [fff00000c9adfc00, fff00000c9adfc78) [ 34.451811] [ 34.451833] The buggy address belongs to the physical page: [ 34.451866] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109adf [ 34.452064] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.452156] page_type: f5(slab) [ 34.452236] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.452313] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.452373] page dumped because: kasan: bad access detected [ 34.452437] [ 34.452767] Memory state around the buggy address: [ 34.452858] fff00000c9adfb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.452965] fff00000c9adfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.453036] >fff00000c9adfc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 34.453097] ^ [ 34.453139] fff00000c9adfc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.453219] fff00000c9adfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.453261] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[ 34.434842] ================================================================== [ 34.434896] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 34.434947] Read of size 121 at addr fff00000c9adfc00 by task kunit_try_catch/316 [ 34.435241] [ 34.435287] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.435388] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.435427] Hardware name: linux,dummy-virt (DT) [ 34.435462] Call trace: [ 34.435493] show_stack+0x20/0x38 (C) [ 34.435752] dump_stack_lvl+0x8c/0xd0 [ 34.435816] print_report+0x118/0x5d0 [ 34.435867] kasan_report+0xdc/0x128 [ 34.435914] kasan_check_range+0x100/0x1a8 [ 34.435961] __kasan_check_read+0x20/0x30 [ 34.436007] copy_user_test_oob+0x3c8/0xec8 [ 34.436056] kunit_try_run_case+0x170/0x3f0 [ 34.436124] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.436188] kthread+0x328/0x630 [ 34.436247] ret_from_fork+0x10/0x20 [ 34.436303] [ 34.436421] Allocated by task 316: [ 34.436453] kasan_save_stack+0x3c/0x68 [ 34.436499] kasan_save_track+0x20/0x40 [ 34.436705] kasan_save_alloc_info+0x40/0x58 [ 34.436917] __kasan_kmalloc+0xd4/0xd8 [ 34.437119] __kmalloc_noprof+0x198/0x4c8 [ 34.437188] kunit_kmalloc_array+0x34/0x88 [ 34.437265] copy_user_test_oob+0xac/0xec8 [ 34.437346] kunit_try_run_case+0x170/0x3f0 [ 34.437417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.437497] kthread+0x328/0x630 [ 34.437547] ret_from_fork+0x10/0x20 [ 34.437598] [ 34.437623] The buggy address belongs to the object at fff00000c9adfc00 [ 34.437623] which belongs to the cache kmalloc-128 of size 128 [ 34.437713] The buggy address is located 0 bytes inside of [ 34.437713] allocated 120-byte region [fff00000c9adfc00, fff00000c9adfc78) [ 34.437904] [ 34.437928] The buggy address belongs to the physical page: [ 34.438039] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109adf [ 34.438100] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.438348] page_type: f5(slab) [ 34.438460] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.438540] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.438614] page dumped because: kasan: bad access detected [ 34.438705] [ 34.438755] Memory state around the buggy address: [ 34.438820] fff00000c9adfb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.438916] fff00000c9adfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.439002] >fff00000c9adfc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 34.439068] ^ [ 34.439138] fff00000c9adfc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.439249] fff00000c9adfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.439308] ================================================================== [ 34.444979] ================================================================== [ 34.445060] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 34.445129] Read of size 121 at addr fff00000c9adfc00 by task kunit_try_catch/316 [ 34.445183] [ 34.445226] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.445352] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.445480] Hardware name: linux,dummy-virt (DT) [ 34.445529] Call trace: [ 34.445554] show_stack+0x20/0x38 (C) [ 34.445614] dump_stack_lvl+0x8c/0xd0 [ 34.445689] print_report+0x118/0x5d0 [ 34.445746] kasan_report+0xdc/0x128 [ 34.445804] kasan_check_range+0x100/0x1a8 [ 34.445855] __kasan_check_read+0x20/0x30 [ 34.445903] copy_user_test_oob+0x4a0/0xec8 [ 34.445951] kunit_try_run_case+0x170/0x3f0 [ 34.446009] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.446065] kthread+0x328/0x630 [ 34.446120] ret_from_fork+0x10/0x20 [ 34.446170] [ 34.446190] Allocated by task 316: [ 34.446483] kasan_save_stack+0x3c/0x68 [ 34.446553] kasan_save_track+0x20/0x40 [ 34.446614] kasan_save_alloc_info+0x40/0x58 [ 34.446663] __kasan_kmalloc+0xd4/0xd8 [ 34.446714] __kmalloc_noprof+0x198/0x4c8 [ 34.446762] kunit_kmalloc_array+0x34/0x88 [ 34.446805] copy_user_test_oob+0xac/0xec8 [ 34.447016] kunit_try_run_case+0x170/0x3f0 [ 34.447074] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.447175] kthread+0x328/0x630 [ 34.447242] ret_from_fork+0x10/0x20 [ 34.447290] [ 34.447319] The buggy address belongs to the object at fff00000c9adfc00 [ 34.447319] which belongs to the cache kmalloc-128 of size 128 [ 34.447382] The buggy address is located 0 bytes inside of [ 34.447382] allocated 120-byte region [fff00000c9adfc00, fff00000c9adfc78) [ 34.447453] [ 34.447482] The buggy address belongs to the physical page: [ 34.447531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109adf [ 34.447592] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.447641] page_type: f5(slab) [ 34.447682] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.447735] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.447778] page dumped because: kasan: bad access detected [ 34.447811] [ 34.447832] Memory state around the buggy address: [ 34.447874] fff00000c9adfb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.447928] fff00000c9adfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.447981] >fff00000c9adfc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 34.448023] ^ [ 34.448063] fff00000c9adfc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.448115] fff00000c9adfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.448163] ================================================================== [ 34.410174] ================================================================== [ 34.410341] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 34.410416] Read of size 121 at addr fff00000c9adfc00 by task kunit_try_catch/316 [ 34.410514] [ 34.410557] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.410736] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.410764] Hardware name: linux,dummy-virt (DT) [ 34.410800] Call trace: [ 34.411137] show_stack+0x20/0x38 (C) [ 34.411201] dump_stack_lvl+0x8c/0xd0 [ 34.411306] print_report+0x118/0x5d0 [ 34.411361] kasan_report+0xdc/0x128 [ 34.411410] kasan_check_range+0x100/0x1a8 [ 34.411456] __kasan_check_read+0x20/0x30 [ 34.411504] copy_user_test_oob+0x728/0xec8 [ 34.411552] kunit_try_run_case+0x170/0x3f0 [ 34.411603] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.411658] kthread+0x328/0x630 [ 34.411701] ret_from_fork+0x10/0x20 [ 34.411753] [ 34.411774] Allocated by task 316: [ 34.411805] kasan_save_stack+0x3c/0x68 [ 34.411850] kasan_save_track+0x20/0x40 [ 34.411891] kasan_save_alloc_info+0x40/0x58 [ 34.411930] __kasan_kmalloc+0xd4/0xd8 [ 34.411970] __kmalloc_noprof+0x198/0x4c8 [ 34.412011] kunit_kmalloc_array+0x34/0x88 [ 34.412052] copy_user_test_oob+0xac/0xec8 [ 34.412091] kunit_try_run_case+0x170/0x3f0 [ 34.412132] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.412179] kthread+0x328/0x630 [ 34.412226] ret_from_fork+0x10/0x20 [ 34.412271] [ 34.412293] The buggy address belongs to the object at fff00000c9adfc00 [ 34.412293] which belongs to the cache kmalloc-128 of size 128 [ 34.412353] The buggy address is located 0 bytes inside of [ 34.412353] allocated 120-byte region [fff00000c9adfc00, fff00000c9adfc78) [ 34.412419] [ 34.412441] The buggy address belongs to the physical page: [ 34.412477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109adf [ 34.412533] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.412622] page_type: f5(slab) [ 34.413089] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.414692] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.414777] page dumped because: kasan: bad access detected [ 34.414815] [ 34.414836] Memory state around the buggy address: [ 34.414877] fff00000c9adfb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.414923] fff00000c9adfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.416007] >fff00000c9adfc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 34.416375] ^ [ 34.416884] fff00000c9adfc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.417399] fff00000c9adfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.417473] ================================================================== [ 34.391662] ================================================================== [ 34.392677] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 34.393354] Write of size 121 at addr fff00000c9adfc00 by task kunit_try_catch/316 [ 34.393638] [ 34.394117] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.394413] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.394561] Hardware name: linux,dummy-virt (DT) [ 34.395172] Call trace: [ 34.395287] show_stack+0x20/0x38 (C) [ 34.395348] dump_stack_lvl+0x8c/0xd0 [ 34.395409] print_report+0x118/0x5d0 [ 34.395556] kasan_report+0xdc/0x128 [ 34.395692] kasan_check_range+0x100/0x1a8 [ 34.396290] __kasan_check_write+0x20/0x30 [ 34.396624] copy_user_test_oob+0x234/0xec8 [ 34.396686] kunit_try_run_case+0x170/0x3f0 [ 34.396744] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.396798] kthread+0x328/0x630 [ 34.396845] ret_from_fork+0x10/0x20 [ 34.396900] [ 34.397833] Allocated by task 316: [ 34.397975] kasan_save_stack+0x3c/0x68 [ 34.398036] kasan_save_track+0x20/0x40 [ 34.398374] kasan_save_alloc_info+0x40/0x58 [ 34.398420] __kasan_kmalloc+0xd4/0xd8 [ 34.398878] __kmalloc_noprof+0x198/0x4c8 [ 34.399142] kunit_kmalloc_array+0x34/0x88 [ 34.399358] copy_user_test_oob+0xac/0xec8 [ 34.399408] kunit_try_run_case+0x170/0x3f0 [ 34.399730] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.399793] kthread+0x328/0x630 [ 34.400184] ret_from_fork+0x10/0x20 [ 34.400237] [ 34.400260] The buggy address belongs to the object at fff00000c9adfc00 [ 34.400260] which belongs to the cache kmalloc-128 of size 128 [ 34.400698] The buggy address is located 0 bytes inside of [ 34.400698] allocated 120-byte region [fff00000c9adfc00, fff00000c9adfc78) [ 34.401266] [ 34.401298] The buggy address belongs to the physical page: [ 34.401336] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109adf [ 34.401411] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.401470] page_type: f5(slab) [ 34.401518] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.401571] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.401716] page dumped because: kasan: bad access detected [ 34.401889] [ 34.401911] Memory state around the buggy address: [ 34.401949] fff00000c9adfb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.402002] fff00000c9adfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.402048] >fff00000c9adfc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 34.402088] ^ [ 34.402133] fff00000c9adfc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.402179] fff00000c9adfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.402227] ================================================================== [ 34.439652] ================================================================== [ 34.439703] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 34.439763] Write of size 121 at addr fff00000c9adfc00 by task kunit_try_catch/316 [ 34.439936] [ 34.439975] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.440063] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.440091] Hardware name: linux,dummy-virt (DT) [ 34.440244] Call trace: [ 34.440293] show_stack+0x20/0x38 (C) [ 34.440376] dump_stack_lvl+0x8c/0xd0 [ 34.440426] print_report+0x118/0x5d0 [ 34.440473] kasan_report+0xdc/0x128 [ 34.440532] kasan_check_range+0x100/0x1a8 [ 34.440755] __kasan_check_write+0x20/0x30 [ 34.440868] copy_user_test_oob+0x434/0xec8 [ 34.440962] kunit_try_run_case+0x170/0x3f0 [ 34.441065] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.441122] kthread+0x328/0x630 [ 34.441176] ret_from_fork+0x10/0x20 [ 34.441236] [ 34.441257] Allocated by task 316: [ 34.441288] kasan_save_stack+0x3c/0x68 [ 34.441356] kasan_save_track+0x20/0x40 [ 34.441399] kasan_save_alloc_info+0x40/0x58 [ 34.441441] __kasan_kmalloc+0xd4/0xd8 [ 34.441484] __kmalloc_noprof+0x198/0x4c8 [ 34.441674] kunit_kmalloc_array+0x34/0x88 [ 34.441755] copy_user_test_oob+0xac/0xec8 [ 34.441842] kunit_try_run_case+0x170/0x3f0 [ 34.441896] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.441988] kthread+0x328/0x630 [ 34.442156] ret_from_fork+0x10/0x20 [ 34.442312] [ 34.442402] The buggy address belongs to the object at fff00000c9adfc00 [ 34.442402] which belongs to the cache kmalloc-128 of size 128 [ 34.442501] The buggy address is located 0 bytes inside of [ 34.442501] allocated 120-byte region [fff00000c9adfc00, fff00000c9adfc78) [ 34.442586] [ 34.442607] The buggy address belongs to the physical page: [ 34.442640] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109adf [ 34.442708] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.442910] page_type: f5(slab) [ 34.443049] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.443145] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.443226] page dumped because: kasan: bad access detected [ 34.443281] [ 34.443512] Memory state around the buggy address: [ 34.443587] fff00000c9adfb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.443652] fff00000c9adfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.443697] >fff00000c9adfc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 34.443738] ^ [ 34.443825] fff00000c9adfc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.443876] fff00000c9adfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.443919] ================================================================== [ 34.428241] ================================================================== [ 34.428438] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 34.428615] Write of size 121 at addr fff00000c9adfc00 by task kunit_try_catch/316 [ 34.428827] [ 34.428978] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.429188] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.429389] Hardware name: linux,dummy-virt (DT) [ 34.429694] Call trace: [ 34.429779] show_stack+0x20/0x38 (C) [ 34.429852] dump_stack_lvl+0x8c/0xd0 [ 34.429953] print_report+0x118/0x5d0 [ 34.430041] kasan_report+0xdc/0x128 [ 34.430090] kasan_check_range+0x100/0x1a8 [ 34.430147] __kasan_check_write+0x20/0x30 [ 34.430195] copy_user_test_oob+0x35c/0xec8 [ 34.430655] kunit_try_run_case+0x170/0x3f0 [ 34.430832] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.431023] kthread+0x328/0x630 [ 34.431131] ret_from_fork+0x10/0x20 [ 34.431182] [ 34.431203] Allocated by task 316: [ 34.431248] kasan_save_stack+0x3c/0x68 [ 34.431294] kasan_save_track+0x20/0x40 [ 34.431552] kasan_save_alloc_info+0x40/0x58 [ 34.431643] __kasan_kmalloc+0xd4/0xd8 [ 34.431762] __kmalloc_noprof+0x198/0x4c8 [ 34.431915] kunit_kmalloc_array+0x34/0x88 [ 34.431962] copy_user_test_oob+0xac/0xec8 [ 34.432045] kunit_try_run_case+0x170/0x3f0 [ 34.432150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.432228] kthread+0x328/0x630 [ 34.432264] ret_from_fork+0x10/0x20 [ 34.432302] [ 34.432364] The buggy address belongs to the object at fff00000c9adfc00 [ 34.432364] which belongs to the cache kmalloc-128 of size 128 [ 34.432603] The buggy address is located 0 bytes inside of [ 34.432603] allocated 120-byte region [fff00000c9adfc00, fff00000c9adfc78) [ 34.432670] [ 34.432904] The buggy address belongs to the physical page: [ 34.432952] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109adf [ 34.433029] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.433139] page_type: f5(slab) [ 34.433218] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.433272] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.433316] page dumped because: kasan: bad access detected [ 34.433496] [ 34.433518] Memory state around the buggy address: [ 34.433555] fff00000c9adfb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.433600] fff00000c9adfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.433951] >fff00000c9adfc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 34.434024] ^ [ 34.434082] fff00000c9adfc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.434167] fff00000c9adfd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.434265] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[ 34.318393] ================================================================== [ 34.318449] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 34.318505] Write of size 8 at addr fff00000c9adfb78 by task kunit_try_catch/312 [ 34.318556] [ 34.318591] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.318679] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.319881] Hardware name: linux,dummy-virt (DT) [ 34.319936] Call trace: [ 34.319962] show_stack+0x20/0x38 (C) [ 34.320018] dump_stack_lvl+0x8c/0xd0 [ 34.320066] print_report+0x118/0x5d0 [ 34.320115] kasan_report+0xdc/0x128 [ 34.320164] kasan_check_range+0x100/0x1a8 [ 34.320222] __kasan_check_write+0x20/0x30 [ 34.321200] copy_to_kernel_nofault+0x8c/0x250 [ 34.321442] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 34.321638] kunit_try_run_case+0x170/0x3f0 [ 34.322054] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.322127] kthread+0x328/0x630 [ 34.322174] ret_from_fork+0x10/0x20 [ 34.322825] [ 34.322905] Allocated by task 312: [ 34.322969] kasan_save_stack+0x3c/0x68 [ 34.323572] kasan_save_track+0x20/0x40 [ 34.323627] kasan_save_alloc_info+0x40/0x58 [ 34.323716] __kasan_kmalloc+0xd4/0xd8 [ 34.324139] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.324195] copy_to_kernel_nofault_oob+0xc8/0x418 [ 34.324687] kunit_try_run_case+0x170/0x3f0 [ 34.324982] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.325108] kthread+0x328/0x630 [ 34.325149] ret_from_fork+0x10/0x20 [ 34.325349] [ 34.325423] The buggy address belongs to the object at fff00000c9adfb00 [ 34.325423] which belongs to the cache kmalloc-128 of size 128 [ 34.325485] The buggy address is located 0 bytes to the right of [ 34.325485] allocated 120-byte region [fff00000c9adfb00, fff00000c9adfb78) [ 34.325550] [ 34.325573] The buggy address belongs to the physical page: [ 34.326245] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109adf [ 34.326330] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.326625] page_type: f5(slab) [ 34.326756] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.327118] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.327269] page dumped because: kasan: bad access detected [ 34.327304] [ 34.327324] Memory state around the buggy address: [ 34.327775] fff00000c9adfa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.327853] fff00000c9adfa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.327905] >fff00000c9adfb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 34.327945] ^ [ 34.327990] fff00000c9adfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.328035] fff00000c9adfc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.328076] ================================================================== [ 34.305887] ================================================================== [ 34.305958] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 34.306029] Read of size 8 at addr fff00000c9adfb78 by task kunit_try_catch/312 [ 34.306079] [ 34.306120] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.307174] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.307585] Hardware name: linux,dummy-virt (DT) [ 34.307845] Call trace: [ 34.307874] show_stack+0x20/0x38 (C) [ 34.308524] dump_stack_lvl+0x8c/0xd0 [ 34.308795] print_report+0x118/0x5d0 [ 34.308935] kasan_report+0xdc/0x128 [ 34.308985] __asan_report_load8_noabort+0x20/0x30 [ 34.309035] copy_to_kernel_nofault+0x204/0x250 [ 34.309789] copy_to_kernel_nofault_oob+0x158/0x418 [ 34.309856] kunit_try_run_case+0x170/0x3f0 [ 34.310327] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.310519] kthread+0x328/0x630 [ 34.310706] ret_from_fork+0x10/0x20 [ 34.310760] [ 34.311141] Allocated by task 312: [ 34.311182] kasan_save_stack+0x3c/0x68 [ 34.311561] kasan_save_track+0x20/0x40 [ 34.311943] kasan_save_alloc_info+0x40/0x58 [ 34.312181] __kasan_kmalloc+0xd4/0xd8 [ 34.312442] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.312497] copy_to_kernel_nofault_oob+0xc8/0x418 [ 34.312836] kunit_try_run_case+0x170/0x3f0 [ 34.312898] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.312947] kthread+0x328/0x630 [ 34.313196] ret_from_fork+0x10/0x20 [ 34.313249] [ 34.313272] The buggy address belongs to the object at fff00000c9adfb00 [ 34.313272] which belongs to the cache kmalloc-128 of size 128 [ 34.313334] The buggy address is located 0 bytes to the right of [ 34.313334] allocated 120-byte region [fff00000c9adfb00, fff00000c9adfb78) [ 34.313398] [ 34.314051] The buggy address belongs to the physical page: [ 34.314116] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109adf [ 34.314255] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.314328] page_type: f5(slab) [ 34.314373] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 34.314427] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 34.314470] page dumped because: kasan: bad access detected [ 34.314505] [ 34.314526] Memory state around the buggy address: [ 34.314563] fff00000c9adfa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 34.314609] fff00000c9adfa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.315281] >fff00000c9adfb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 34.315343] ^ [ 34.315867] fff00000c9adfb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.316024] fff00000c9adfc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.316252] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 34.212424] ================================================================== [ 34.212500] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 34.213232] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/300 [ 34.213361] [ 34.213402] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.213493] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.213562] Hardware name: linux,dummy-virt (DT) [ 34.213626] Call trace: [ 34.213935] show_stack+0x20/0x38 (C) [ 34.213995] dump_stack_lvl+0x8c/0xd0 [ 34.214045] print_report+0x310/0x5d0 [ 34.214096] kasan_report+0xdc/0x128 [ 34.214144] __asan_report_load1_noabort+0x20/0x30 [ 34.214599] vmalloc_oob+0x578/0x5d0 [ 34.215038] kunit_try_run_case+0x170/0x3f0 [ 34.215480] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.215717] kthread+0x328/0x630 [ 34.215926] ret_from_fork+0x10/0x20 [ 34.215982] [ 34.216305] The buggy address ffff8000800fe7f3 belongs to a vmalloc virtual mapping [ 34.216518] The buggy address belongs to the physical page: [ 34.216654] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bd9 [ 34.216847] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.217159] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 34.217241] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 34.217689] page dumped because: kasan: bad access detected [ 34.218112] [ 34.218139] Memory state around the buggy address: [ 34.218197] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.218397] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.218753] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 34.218965] ^ [ 34.219270] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 34.219458] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 34.219744] ================================================================== [ 34.222202] ================================================================== [ 34.222271] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 34.222322] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/300 [ 34.222373] [ 34.222404] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.222490] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.222520] Hardware name: linux,dummy-virt (DT) [ 34.223166] Call trace: [ 34.223255] show_stack+0x20/0x38 (C) [ 34.223311] dump_stack_lvl+0x8c/0xd0 [ 34.223656] print_report+0x310/0x5d0 [ 34.224089] kasan_report+0xdc/0x128 [ 34.224342] __asan_report_load1_noabort+0x20/0x30 [ 34.224395] vmalloc_oob+0x51c/0x5d0 [ 34.224441] kunit_try_run_case+0x170/0x3f0 [ 34.224491] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.224960] kthread+0x328/0x630 [ 34.225079] ret_from_fork+0x10/0x20 [ 34.225530] [ 34.225601] The buggy address ffff8000800fe7f8 belongs to a vmalloc virtual mapping [ 34.225678] The buggy address belongs to the physical page: [ 34.225726] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bd9 [ 34.225781] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.226135] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 34.226436] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 34.226775] page dumped because: kasan: bad access detected [ 34.226955] [ 34.226978] Memory state around the buggy address: [ 34.227272] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.227405] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.227688] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 34.227942] ^ [ 34.228415] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 34.228486] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 34.228712] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 34.015602] ================================================================== [ 34.015669] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 34.015721] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 34.015772] [ 34.015802] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.015888] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.015917] Hardware name: linux,dummy-virt (DT) [ 34.015950] Call trace: [ 34.015974] show_stack+0x20/0x38 (C) [ 34.016021] dump_stack_lvl+0x8c/0xd0 [ 34.016069] print_report+0x118/0x5d0 [ 34.016116] kasan_report+0xdc/0x128 [ 34.016166] kasan_check_range+0x100/0x1a8 [ 34.016223] __kasan_check_write+0x20/0x30 [ 34.016269] kasan_atomics_helper+0x126c/0x4858 [ 34.016320] kasan_atomics+0x198/0x2e0 [ 34.016369] kunit_try_run_case+0x170/0x3f0 [ 34.016419] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.016477] kthread+0x328/0x630 [ 34.016925] ret_from_fork+0x10/0x20 [ 34.017076] [ 34.017098] Allocated by task 296: [ 34.017130] kasan_save_stack+0x3c/0x68 [ 34.017176] kasan_save_track+0x20/0x40 [ 34.017367] kasan_save_alloc_info+0x40/0x58 [ 34.017426] __kasan_kmalloc+0xd4/0xd8 [ 34.017520] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.017563] kasan_atomics+0xb8/0x2e0 [ 34.017609] kunit_try_run_case+0x170/0x3f0 [ 34.017772] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.017862] kthread+0x328/0x630 [ 34.017981] ret_from_fork+0x10/0x20 [ 34.018019] [ 34.018043] The buggy address belongs to the object at fff00000c9a67800 [ 34.018043] which belongs to the cache kmalloc-64 of size 64 [ 34.018103] The buggy address is located 0 bytes to the right of [ 34.018103] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 34.018170] [ 34.018195] The buggy address belongs to the physical page: [ 34.018245] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 34.018492] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.018546] page_type: f5(slab) [ 34.018666] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.018720] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.018762] page dumped because: kasan: bad access detected [ 34.018837] [ 34.018929] Memory state around the buggy address: [ 34.019035] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.019115] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.019160] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.019216] ^ [ 34.019253] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.019296] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.020073] ================================================================== [ 34.112574] ================================================================== [ 34.113406] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 34.114126] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 34.114663] [ 34.115276] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.116086] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.116123] Hardware name: linux,dummy-virt (DT) [ 34.116833] Call trace: [ 34.116932] show_stack+0x20/0x38 (C) [ 34.117463] dump_stack_lvl+0x8c/0xd0 [ 34.118049] print_report+0x118/0x5d0 [ 34.118107] kasan_report+0xdc/0x128 [ 34.118155] kasan_check_range+0x100/0x1a8 [ 34.118202] __kasan_check_write+0x20/0x30 [ 34.118260] kasan_atomics_helper+0x15b4/0x4858 [ 34.118312] kasan_atomics+0x198/0x2e0 [ 34.118360] kunit_try_run_case+0x170/0x3f0 [ 34.120442] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.121245] kthread+0x328/0x630 [ 34.121422] ret_from_fork+0x10/0x20 [ 34.121648] [ 34.121735] Allocated by task 296: [ 34.121767] kasan_save_stack+0x3c/0x68 [ 34.121830] kasan_save_track+0x20/0x40 [ 34.122307] kasan_save_alloc_info+0x40/0x58 [ 34.122659] __kasan_kmalloc+0xd4/0xd8 [ 34.122812] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.123011] kasan_atomics+0xb8/0x2e0 [ 34.123922] kunit_try_run_case+0x170/0x3f0 [ 34.124091] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.124139] kthread+0x328/0x630 [ 34.124332] ret_from_fork+0x10/0x20 [ 34.124787] [ 34.124815] The buggy address belongs to the object at fff00000c9a67800 [ 34.124815] which belongs to the cache kmalloc-64 of size 64 [ 34.125052] The buggy address is located 0 bytes to the right of [ 34.125052] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 34.125219] [ 34.125636] The buggy address belongs to the physical page: [ 34.125870] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 34.126170] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.126243] page_type: f5(slab) [ 34.126284] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.126337] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.126979] page dumped because: kasan: bad access detected [ 34.127021] [ 34.127043] Memory state around the buggy address: [ 34.127077] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.127693] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.128059] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.128105] ^ [ 34.128143] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.128189] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.128761] ================================================================== [ 33.858004] ================================================================== [ 33.858191] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 33.858494] Read of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 33.858688] [ 33.858829] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.859239] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.859276] Hardware name: linux,dummy-virt (DT) [ 33.859313] Call trace: [ 33.859659] show_stack+0x20/0x38 (C) [ 33.860008] kasan_atomics+0x198/0x2e0 [ 33.862689] The buggy address belongs to the object at fff00000c9a67800 [ 33.862689] which belongs to the cache kmalloc-64 of size 64 [ 33.866582] ================================================================== [ 34.146069] ================================================================== [ 34.146119] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 34.146171] Read of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 34.146238] [ 34.146270] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.146356] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.146385] Hardware name: linux,dummy-virt (DT) [ 34.146418] Call trace: [ 34.146442] show_stack+0x20/0x38 (C) [ 34.146490] dump_stack_lvl+0x8c/0xd0 [ 34.146540] print_report+0x118/0x5d0 [ 34.146588] kasan_report+0xdc/0x128 [ 34.146638] __asan_report_load8_noabort+0x20/0x30 [ 34.146688] kasan_atomics_helper+0x3df4/0x4858 [ 34.146737] kasan_atomics+0x198/0x2e0 [ 34.146786] kunit_try_run_case+0x170/0x3f0 [ 34.146837] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.146893] kthread+0x328/0x630 [ 34.146938] ret_from_fork+0x10/0x20 [ 34.146987] [ 34.147007] Allocated by task 296: [ 34.147037] kasan_save_stack+0x3c/0x68 [ 34.147081] kasan_save_track+0x20/0x40 [ 34.147122] kasan_save_alloc_info+0x40/0x58 [ 34.147161] __kasan_kmalloc+0xd4/0xd8 [ 34.147200] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.148180] kasan_atomics+0xb8/0x2e0 [ 34.148242] kunit_try_run_case+0x170/0x3f0 [ 34.148282] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.148463] kthread+0x328/0x630 [ 34.148606] ret_from_fork+0x10/0x20 [ 34.148647] [ 34.148670] The buggy address belongs to the object at fff00000c9a67800 [ 34.148670] which belongs to the cache kmalloc-64 of size 64 [ 34.148730] The buggy address is located 0 bytes to the right of [ 34.148730] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 34.148800] [ 34.148821] The buggy address belongs to the physical page: [ 34.148853] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 34.149004] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.149068] page_type: f5(slab) [ 34.149106] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.149158] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.149200] page dumped because: kasan: bad access detected [ 34.149643] [ 34.149675] Memory state around the buggy address: [ 34.149712] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.149759] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.149806] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.149846] ^ [ 34.149880] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.149927] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.149968] ================================================================== [ 34.003955] ================================================================== [ 34.004031] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 34.004082] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 34.004713] [ 34.004748] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.005187] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.005251] Hardware name: linux,dummy-virt (DT) [ 34.005307] Call trace: [ 34.005332] show_stack+0x20/0x38 (C) [ 34.005386] dump_stack_lvl+0x8c/0xd0 [ 34.005509] print_report+0x118/0x5d0 [ 34.005689] kasan_report+0xdc/0x128 [ 34.005741] kasan_check_range+0x100/0x1a8 [ 34.005811] __kasan_check_write+0x20/0x30 [ 34.005957] kasan_atomics_helper+0x1190/0x4858 [ 34.006349] kasan_atomics+0x198/0x2e0 [ 34.006402] kunit_try_run_case+0x170/0x3f0 [ 34.006751] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.006827] kthread+0x328/0x630 [ 34.006878] ret_from_fork+0x10/0x20 [ 34.006983] [ 34.007003] Allocated by task 296: [ 34.007034] kasan_save_stack+0x3c/0x68 [ 34.007289] kasan_save_track+0x20/0x40 [ 34.007424] kasan_save_alloc_info+0x40/0x58 [ 34.007513] __kasan_kmalloc+0xd4/0xd8 [ 34.007554] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.007598] kasan_atomics+0xb8/0x2e0 [ 34.007642] kunit_try_run_case+0x170/0x3f0 [ 34.007793] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.007842] kthread+0x328/0x630 [ 34.007876] ret_from_fork+0x10/0x20 [ 34.007966] [ 34.008032] The buggy address belongs to the object at fff00000c9a67800 [ 34.008032] which belongs to the cache kmalloc-64 of size 64 [ 34.008118] The buggy address is located 0 bytes to the right of [ 34.008118] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 34.008183] [ 34.008217] The buggy address belongs to the physical page: [ 34.008249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 34.008303] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.008349] page_type: f5(slab) [ 34.008389] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.008438] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.008481] page dumped because: kasan: bad access detected [ 34.008835] [ 34.008863] Memory state around the buggy address: [ 34.008925] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.008972] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.009016] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.009056] ^ [ 34.009431] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.009483] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.009523] ================================================================== [ 33.914081] ================================================================== [ 33.914509] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 33.914599] Read of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 33.914825] [ 33.914861] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.914948] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.914977] Hardware name: linux,dummy-virt (DT) [ 33.915011] Call trace: [ 33.915304] show_stack+0x20/0x38 (C) [ 33.915555] dump_stack_lvl+0x8c/0xd0 [ 33.915887] print_report+0x118/0x5d0 [ 33.916128] kasan_report+0xdc/0x128 [ 33.916568] __asan_report_load4_noabort+0x20/0x30 [ 33.916760] kasan_atomics_helper+0x3e04/0x4858 [ 33.917067] kasan_atomics+0x198/0x2e0 [ 33.917126] kunit_try_run_case+0x170/0x3f0 [ 33.917178] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.917430] kthread+0x328/0x630 [ 33.917485] ret_from_fork+0x10/0x20 [ 33.917918] [ 33.917946] Allocated by task 296: [ 33.918134] kasan_save_stack+0x3c/0x68 [ 33.918187] kasan_save_track+0x20/0x40 [ 33.918744] kasan_save_alloc_info+0x40/0x58 [ 33.918797] __kasan_kmalloc+0xd4/0xd8 [ 33.919158] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.919484] kasan_atomics+0xb8/0x2e0 [ 33.919763] kunit_try_run_case+0x170/0x3f0 [ 33.920078] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.920314] kthread+0x328/0x630 [ 33.920456] ret_from_fork+0x10/0x20 [ 33.920908] [ 33.920974] The buggy address belongs to the object at fff00000c9a67800 [ 33.920974] which belongs to the cache kmalloc-64 of size 64 [ 33.921259] The buggy address is located 0 bytes to the right of [ 33.921259] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 33.921450] [ 33.921518] The buggy address belongs to the physical page: [ 33.921763] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 33.921822] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.921955] page_type: f5(slab) [ 33.922050] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.922158] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.922202] page dumped because: kasan: bad access detected [ 33.922311] [ 33.922332] Memory state around the buggy address: [ 33.922610] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.922914] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.923057] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.923175] ^ [ 33.923222] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.923266] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.923306] ================================================================== [ 33.951952] ================================================================== [ 33.952164] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 33.952722] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 33.953029] [ 33.953065] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.953174] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.953252] Hardware name: linux,dummy-virt (DT) [ 33.953287] Call trace: [ 33.953314] show_stack+0x20/0x38 (C) [ 33.953367] dump_stack_lvl+0x8c/0xd0 [ 33.953416] print_report+0x118/0x5d0 [ 33.953466] kasan_report+0xdc/0x128 [ 33.953790] __asan_report_store8_noabort+0x20/0x30 [ 33.953884] kasan_atomics_helper+0x3e5c/0x4858 [ 33.954176] kasan_atomics+0x198/0x2e0 [ 33.954243] kunit_try_run_case+0x170/0x3f0 [ 33.954295] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.954352] kthread+0x328/0x630 [ 33.954396] ret_from_fork+0x10/0x20 [ 33.954508] [ 33.954612] Allocated by task 296: [ 33.954643] kasan_save_stack+0x3c/0x68 [ 33.954689] kasan_save_track+0x20/0x40 [ 33.954735] kasan_save_alloc_info+0x40/0x58 [ 33.954847] __kasan_kmalloc+0xd4/0xd8 [ 33.954887] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.954985] kasan_atomics+0xb8/0x2e0 [ 33.955078] kunit_try_run_case+0x170/0x3f0 [ 33.955140] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.955245] kthread+0x328/0x630 [ 33.955280] ret_from_fork+0x10/0x20 [ 33.955711] [ 33.955735] The buggy address belongs to the object at fff00000c9a67800 [ 33.955735] which belongs to the cache kmalloc-64 of size 64 [ 33.955795] The buggy address is located 0 bytes to the right of [ 33.955795] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 33.955860] [ 33.955883] The buggy address belongs to the physical page: [ 33.955916] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 33.956406] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.956742] page_type: f5(slab) [ 33.956809] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.957132] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.957250] page dumped because: kasan: bad access detected [ 33.957285] [ 33.957420] Memory state around the buggy address: [ 33.957466] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.957514] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.957558] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.957599] ^ [ 33.957874] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.957948] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.958160] ================================================================== [ 33.959904] ================================================================== [ 33.959970] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 33.960188] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 33.960450] [ 33.960490] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.960754] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.961151] Hardware name: linux,dummy-virt (DT) [ 33.961187] Call trace: [ 33.961225] show_stack+0x20/0x38 (C) [ 33.961279] dump_stack_lvl+0x8c/0xd0 [ 33.961352] print_report+0x118/0x5d0 [ 33.961404] kasan_report+0xdc/0x128 [ 33.961452] kasan_check_range+0x100/0x1a8 [ 33.961500] __kasan_check_write+0x20/0x30 [ 33.961593] kasan_atomics_helper+0xeb8/0x4858 [ 33.961761] kasan_atomics+0x198/0x2e0 [ 33.962171] kunit_try_run_case+0x170/0x3f0 [ 33.962299] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.962356] kthread+0x328/0x630 [ 33.962401] ret_from_fork+0x10/0x20 [ 33.962535] [ 33.962633] Allocated by task 296: [ 33.962727] kasan_save_stack+0x3c/0x68 [ 33.962773] kasan_save_track+0x20/0x40 [ 33.962814] kasan_save_alloc_info+0x40/0x58 [ 33.962855] __kasan_kmalloc+0xd4/0xd8 [ 33.962895] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.962979] kasan_atomics+0xb8/0x2e0 [ 33.963052] kunit_try_run_case+0x170/0x3f0 [ 33.963094] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.963498] kthread+0x328/0x630 [ 33.963639] ret_from_fork+0x10/0x20 [ 33.964081] [ 33.964106] The buggy address belongs to the object at fff00000c9a67800 [ 33.964106] which belongs to the cache kmalloc-64 of size 64 [ 33.964419] The buggy address is located 0 bytes to the right of [ 33.964419] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 33.964891] [ 33.964973] The buggy address belongs to the physical page: [ 33.965064] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 33.965132] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.965667] page_type: f5(slab) [ 33.965728] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.965866] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.965909] page dumped because: kasan: bad access detected [ 33.965950] [ 33.965970] Memory state around the buggy address: [ 33.966005] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.966050] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.966119] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.966177] ^ [ 33.966223] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.966267] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.966307] ================================================================== [ 33.903591] ================================================================== [ 33.903844] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 33.903946] Write of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 33.904055] [ 33.904287] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.904624] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.904657] Hardware name: linux,dummy-virt (DT) [ 33.904691] Call trace: [ 33.904716] show_stack+0x20/0x38 (C) [ 33.904768] dump_stack_lvl+0x8c/0xd0 [ 33.904817] print_report+0x118/0x5d0 [ 33.904866] kasan_report+0xdc/0x128 [ 33.904913] kasan_check_range+0x100/0x1a8 [ 33.904962] __kasan_check_write+0x20/0x30 [ 33.905140] kasan_atomics_helper+0xd3c/0x4858 [ 33.905225] kasan_atomics+0x198/0x2e0 [ 33.905719] kunit_try_run_case+0x170/0x3f0 [ 33.905796] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.906400] kthread+0x328/0x630 [ 33.906694] ret_from_fork+0x10/0x20 [ 33.906870] [ 33.907277] Allocated by task 296: [ 33.907438] kasan_save_stack+0x3c/0x68 [ 33.907487] kasan_save_track+0x20/0x40 [ 33.907867] kasan_save_alloc_info+0x40/0x58 [ 33.908109] __kasan_kmalloc+0xd4/0xd8 [ 33.908160] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.908549] kasan_atomics+0xb8/0x2e0 [ 33.908912] kunit_try_run_case+0x170/0x3f0 [ 33.909005] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.909298] kthread+0x328/0x630 [ 33.909548] ret_from_fork+0x10/0x20 [ 33.909705] [ 33.909729] The buggy address belongs to the object at fff00000c9a67800 [ 33.909729] which belongs to the cache kmalloc-64 of size 64 [ 33.909944] The buggy address is located 0 bytes to the right of [ 33.909944] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 33.910030] [ 33.910216] The buggy address belongs to the physical page: [ 33.910350] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 33.910404] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.910455] page_type: f5(slab) [ 33.910494] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.910915] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.910971] page dumped because: kasan: bad access detected [ 33.911477] [ 33.911569] Memory state around the buggy address: [ 33.911809] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.911975] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.912021] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.912060] ^ [ 33.912096] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.912140] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.912179] ================================================================== [ 34.032455] ================================================================== [ 34.032880] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 34.032947] Read of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 34.033154] [ 34.033186] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.033332] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.033404] Hardware name: linux,dummy-virt (DT) [ 34.033437] Call trace: [ 34.033461] show_stack+0x20/0x38 (C) [ 34.033536] dump_stack_lvl+0x8c/0xd0 [ 34.033584] print_report+0x118/0x5d0 [ 34.033635] kasan_report+0xdc/0x128 [ 34.033682] __asan_report_load8_noabort+0x20/0x30 [ 34.034009] kasan_atomics_helper+0x3f04/0x4858 [ 34.034220] kasan_atomics+0x198/0x2e0 [ 34.034272] kunit_try_run_case+0x170/0x3f0 [ 34.034323] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.034646] kthread+0x328/0x630 [ 34.034693] ret_from_fork+0x10/0x20 [ 34.034800] [ 34.034851] Allocated by task 296: [ 34.034900] kasan_save_stack+0x3c/0x68 [ 34.034945] kasan_save_track+0x20/0x40 [ 34.034992] kasan_save_alloc_info+0x40/0x58 [ 34.035157] __kasan_kmalloc+0xd4/0xd8 [ 34.035263] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.035314] kasan_atomics+0xb8/0x2e0 [ 34.035464] kunit_try_run_case+0x170/0x3f0 [ 34.035533] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.035583] kthread+0x328/0x630 [ 34.035643] ret_from_fork+0x10/0x20 [ 34.035681] [ 34.035745] The buggy address belongs to the object at fff00000c9a67800 [ 34.035745] which belongs to the cache kmalloc-64 of size 64 [ 34.035917] The buggy address is located 0 bytes to the right of [ 34.035917] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 34.035984] [ 34.036005] The buggy address belongs to the physical page: [ 34.036037] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 34.036092] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.036139] page_type: f5(slab) [ 34.036205] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.036266] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.036308] page dumped because: kasan: bad access detected [ 34.036341] [ 34.036418] Memory state around the buggy address: [ 34.036453] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.036498] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.037155] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.037203] ^ [ 34.037249] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.037295] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.037335] ================================================================== [ 33.848505] ================================================================== [ 33.848569] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 33.848896] Write of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 33.849091] [ 33.849166] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.849654] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.849720] Hardware name: linux,dummy-virt (DT) [ 33.849888] Call trace: [ 33.850036] show_stack+0x20/0x38 (C) [ 33.850229] dump_stack_lvl+0x8c/0xd0 [ 33.850280] print_report+0x118/0x5d0 [ 33.850571] kasan_report+0xdc/0x128 [ 33.850664] kasan_check_range+0x100/0x1a8 [ 33.850893] __kasan_check_write+0x20/0x30 [ 33.851056] kasan_atomics_helper+0xb70/0x4858 [ 33.851136] kasan_atomics+0x198/0x2e0 [ 33.851448] kunit_try_run_case+0x170/0x3f0 [ 33.851587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.851645] kthread+0x328/0x630 [ 33.851688] ret_from_fork+0x10/0x20 [ 33.851747] [ 33.851768] Allocated by task 296: [ 33.851799] kasan_save_stack+0x3c/0x68 [ 33.851852] kasan_save_track+0x20/0x40 [ 33.851892] kasan_save_alloc_info+0x40/0x58 [ 33.851933] __kasan_kmalloc+0xd4/0xd8 [ 33.851973] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.852049] kasan_atomics+0xb8/0x2e0 [ 33.852365] kunit_try_run_case+0x170/0x3f0 [ 33.852672] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.852725] kthread+0x328/0x630 [ 33.852915] ret_from_fork+0x10/0x20 [ 33.852971] [ 33.853047] The buggy address belongs to the object at fff00000c9a67800 [ 33.853047] which belongs to the cache kmalloc-64 of size 64 [ 33.853187] The buggy address is located 0 bytes to the right of [ 33.853187] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 33.853322] [ 33.853344] The buggy address belongs to the physical page: [ 33.853377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 33.853431] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.853981] page_type: f5(slab) [ 33.854395] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.854547] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.854774] page dumped because: kasan: bad access detected [ 33.854812] [ 33.855083] Memory state around the buggy address: [ 33.855313] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.855624] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.855732] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.856285] ^ [ 33.856338] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.856385] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.856426] ================================================================== [ 34.038536] ================================================================== [ 34.038622] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 34.038674] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 34.038724] [ 34.038788] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.038937] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.038966] Hardware name: linux,dummy-virt (DT) [ 34.038998] Call trace: [ 34.039022] show_stack+0x20/0x38 (C) [ 34.039070] dump_stack_lvl+0x8c/0xd0 [ 34.039568] print_report+0x118/0x5d0 [ 34.039944] kasan_report+0xdc/0x128 [ 34.040000] kasan_check_range+0x100/0x1a8 [ 34.040097] __kasan_check_write+0x20/0x30 [ 34.040230] kasan_atomics_helper+0x1414/0x4858 [ 34.040302] kasan_atomics+0x198/0x2e0 [ 34.040366] kunit_try_run_case+0x170/0x3f0 [ 34.040418] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.040474] kthread+0x328/0x630 [ 34.040525] ret_from_fork+0x10/0x20 [ 34.040633] [ 34.040653] Allocated by task 296: [ 34.040684] kasan_save_stack+0x3c/0x68 [ 34.041218] kasan_save_track+0x20/0x40 [ 34.041356] kasan_save_alloc_info+0x40/0x58 [ 34.041422] __kasan_kmalloc+0xd4/0xd8 [ 34.041464] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.041505] kasan_atomics+0xb8/0x2e0 [ 34.041544] kunit_try_run_case+0x170/0x3f0 [ 34.041586] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.041634] kthread+0x328/0x630 [ 34.041890] ret_from_fork+0x10/0x20 [ 34.041961] [ 34.042035] The buggy address belongs to the object at fff00000c9a67800 [ 34.042035] which belongs to the cache kmalloc-64 of size 64 [ 34.042096] The buggy address is located 0 bytes to the right of [ 34.042096] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 34.042195] [ 34.042272] The buggy address belongs to the physical page: [ 34.042305] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 34.042357] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.042412] page_type: f5(slab) [ 34.042579] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.042820] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.042899] page dumped because: kasan: bad access detected [ 34.043573] [ 34.043702] Memory state around the buggy address: [ 34.043737] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.044232] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.044451] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.044957] ^ [ 34.045422] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.045799] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.046402] ================================================================== [ 34.092202] ================================================================== [ 34.093494] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 34.094381] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 34.094798] [ 34.095022] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.095828] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.096021] Hardware name: linux,dummy-virt (DT) [ 34.096394] Call trace: [ 34.096839] show_stack+0x20/0x38 (C) [ 34.096934] dump_stack_lvl+0x8c/0xd0 [ 34.096983] print_report+0x118/0x5d0 [ 34.097816] kasan_report+0xdc/0x128 [ 34.098094] kasan_check_range+0x100/0x1a8 [ 34.098143] __kasan_check_write+0x20/0x30 [ 34.098827] kasan_atomics_helper+0x154c/0x4858 [ 34.099125] kasan_atomics+0x198/0x2e0 [ 34.099183] kunit_try_run_case+0x170/0x3f0 [ 34.099245] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.099302] kthread+0x328/0x630 [ 34.100346] ret_from_fork+0x10/0x20 [ 34.100412] [ 34.100434] Allocated by task 296: [ 34.100466] kasan_save_stack+0x3c/0x68 [ 34.100512] kasan_save_track+0x20/0x40 [ 34.100561] kasan_save_alloc_info+0x40/0x58 [ 34.102137] __kasan_kmalloc+0xd4/0xd8 [ 34.102934] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.103120] kasan_atomics+0xb8/0x2e0 [ 34.103161] kunit_try_run_case+0x170/0x3f0 [ 34.103204] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.104579] kthread+0x328/0x630 [ 34.104723] ret_from_fork+0x10/0x20 [ 34.104928] [ 34.104955] The buggy address belongs to the object at fff00000c9a67800 [ 34.104955] which belongs to the cache kmalloc-64 of size 64 [ 34.105024] The buggy address is located 0 bytes to the right of [ 34.105024] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 34.105090] [ 34.105738] The buggy address belongs to the physical page: [ 34.105839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 34.106128] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.106793] page_type: f5(slab) [ 34.106882] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.106935] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.106978] page dumped because: kasan: bad access detected [ 34.107010] [ 34.108066] Memory state around the buggy address: [ 34.108278] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.108986] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.109316] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.109976] ^ [ 34.110107] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.110531] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.110864] ================================================================== [ 33.742587] ================================================================== [ 33.742654] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858 [ 33.742707] Write of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 33.742765] [ 33.742955] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.743078] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.743117] Hardware name: linux,dummy-virt (DT) [ 33.743151] Call trace: [ 33.743178] show_stack+0x20/0x38 (C) [ 33.743374] dump_stack_lvl+0x8c/0xd0 [ 33.743518] print_report+0x118/0x5d0 [ 33.743575] kasan_report+0xdc/0x128 [ 33.743623] kasan_check_range+0x100/0x1a8 [ 33.743678] __kasan_check_write+0x20/0x30 [ 33.743727] kasan_atomics_helper+0x3ac/0x4858 [ 33.743779] kasan_atomics+0x198/0x2e0 [ 33.743827] kunit_try_run_case+0x170/0x3f0 [ 33.744005] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.744106] kthread+0x328/0x630 [ 33.744189] ret_from_fork+0x10/0x20 [ 33.744272] [ 33.744309] Allocated by task 296: [ 33.744558] kasan_save_stack+0x3c/0x68 [ 33.744687] kasan_save_track+0x20/0x40 [ 33.744763] kasan_save_alloc_info+0x40/0x58 [ 33.744831] __kasan_kmalloc+0xd4/0xd8 [ 33.744945] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.744988] kasan_atomics+0xb8/0x2e0 [ 33.745051] kunit_try_run_case+0x170/0x3f0 [ 33.745236] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.745469] ret_from_fork+0x10/0x20 [ 33.745597] [ 33.745647] The buggy address belongs to the object at fff00000c9a67800 [ 33.745647] which belongs to the cache kmalloc-64 of size 64 [ 33.745727] The buggy address is located 0 bytes to the right of [ 33.745727] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 33.746315] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.746402] page_type: f5(slab) [ 33.746792] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.747361] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.747493] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.747563] ^ [ 33.747618] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.747985] ================================================================== [ 33.997780] ================================================================== [ 33.997829] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 33.998121] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 33.998321] [ 33.998355] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.998686] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.998720] Hardware name: linux,dummy-virt (DT) [ 33.998948] Call trace: [ 33.998981] show_stack+0x20/0x38 (C) [ 33.999032] dump_stack_lvl+0x8c/0xd0 [ 33.999092] print_report+0x118/0x5d0 [ 33.999158] kasan_report+0xdc/0x128 [ 33.999217] kasan_check_range+0x100/0x1a8 [ 33.999264] __kasan_check_write+0x20/0x30 [ 33.999313] kasan_atomics_helper+0x1128/0x4858 [ 33.999707] kasan_atomics+0x198/0x2e0 [ 33.999762] kunit_try_run_case+0x170/0x3f0 [ 33.999982] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.000123] kthread+0x328/0x630 [ 34.000170] ret_from_fork+0x10/0x20 [ 34.000231] [ 34.000251] Allocated by task 296: [ 34.000282] kasan_save_stack+0x3c/0x68 [ 34.000328] kasan_save_track+0x20/0x40 [ 34.000370] kasan_save_alloc_info+0x40/0x58 [ 34.000410] __kasan_kmalloc+0xd4/0xd8 [ 34.000450] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.000492] kasan_atomics+0xb8/0x2e0 [ 34.000581] kunit_try_run_case+0x170/0x3f0 [ 34.001105] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.001561] kthread+0x328/0x630 [ 34.001652] ret_from_fork+0x10/0x20 [ 34.001706] [ 34.001730] The buggy address belongs to the object at fff00000c9a67800 [ 34.001730] which belongs to the cache kmalloc-64 of size 64 [ 34.001790] The buggy address is located 0 bytes to the right of [ 34.001790] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 34.001856] [ 34.002172] The buggy address belongs to the physical page: [ 34.002225] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 34.002316] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.002366] page_type: f5(slab) [ 34.002406] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.002457] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.002691] page dumped because: kasan: bad access detected [ 34.002882] [ 34.002905] Memory state around the buggy address: [ 34.002938] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.003276] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.003380] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.003462] ^ [ 34.003601] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.003664] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.003705] ================================================================== [ 33.978315] ================================================================== [ 33.978363] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 33.978424] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 33.978575] [ 33.978604] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.978740] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.978770] Hardware name: linux,dummy-virt (DT) [ 33.978815] Call trace: [ 33.978840] show_stack+0x20/0x38 (C) [ 33.978888] dump_stack_lvl+0x8c/0xd0 [ 33.979012] print_report+0x118/0x5d0 [ 33.979070] kasan_report+0xdc/0x128 [ 33.979118] kasan_check_range+0x100/0x1a8 [ 33.979172] __kasan_check_write+0x20/0x30 [ 33.979381] kasan_atomics_helper+0xff0/0x4858 [ 33.979547] kasan_atomics+0x198/0x2e0 [ 33.979596] kunit_try_run_case+0x170/0x3f0 [ 33.979704] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.979759] kthread+0x328/0x630 [ 33.979804] ret_from_fork+0x10/0x20 [ 33.979851] [ 33.979872] Allocated by task 296: [ 33.979903] kasan_save_stack+0x3c/0x68 [ 33.979947] kasan_save_track+0x20/0x40 [ 33.979988] kasan_save_alloc_info+0x40/0x58 [ 33.980027] __kasan_kmalloc+0xd4/0xd8 [ 33.980068] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.980111] kasan_atomics+0xb8/0x2e0 [ 33.980157] kunit_try_run_case+0x170/0x3f0 [ 33.980529] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.980978] kthread+0x328/0x630 [ 33.981669] ret_from_fork+0x10/0x20 [ 33.981925] [ 33.981949] The buggy address belongs to the object at fff00000c9a67800 [ 33.981949] which belongs to the cache kmalloc-64 of size 64 [ 33.982029] The buggy address is located 0 bytes to the right of [ 33.982029] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 33.982096] [ 33.982119] The buggy address belongs to the physical page: [ 33.982149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 33.982203] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.982778] page_type: f5(slab) [ 33.982866] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.983173] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.983519] page dumped because: kasan: bad access detected [ 33.983558] [ 33.983578] Memory state around the buggy address: [ 33.983614] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.983660] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.983704] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.983744] ^ [ 33.983794] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.983838] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.984171] ================================================================== [ 34.159106] ================================================================== [ 34.159154] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 34.159203] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 34.159274] [ 34.159304] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.159389] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.159418] Hardware name: linux,dummy-virt (DT) [ 34.159452] Call trace: [ 34.159544] show_stack+0x20/0x38 (C) [ 34.159638] dump_stack_lvl+0x8c/0xd0 [ 34.159688] print_report+0x118/0x5d0 [ 34.159735] kasan_report+0xdc/0x128 [ 34.159783] kasan_check_range+0x100/0x1a8 [ 34.159829] __kasan_check_write+0x20/0x30 [ 34.159888] kasan_atomics_helper+0x175c/0x4858 [ 34.160048] kasan_atomics+0x198/0x2e0 [ 34.160163] kunit_try_run_case+0x170/0x3f0 [ 34.160225] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.160281] kthread+0x328/0x630 [ 34.160444] ret_from_fork+0x10/0x20 [ 34.160519] [ 34.160638] Allocated by task 296: [ 34.160670] kasan_save_stack+0x3c/0x68 [ 34.160716] kasan_save_track+0x20/0x40 [ 34.160757] kasan_save_alloc_info+0x40/0x58 [ 34.160797] __kasan_kmalloc+0xd4/0xd8 [ 34.160847] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.160952] kasan_atomics+0xb8/0x2e0 [ 34.161010] kunit_try_run_case+0x170/0x3f0 [ 34.161052] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.161099] kthread+0x328/0x630 [ 34.161179] ret_from_fork+0x10/0x20 [ 34.161251] [ 34.161275] The buggy address belongs to the object at fff00000c9a67800 [ 34.161275] which belongs to the cache kmalloc-64 of size 64 [ 34.161335] The buggy address is located 0 bytes to the right of [ 34.161335] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 34.161418] [ 34.161439] The buggy address belongs to the physical page: [ 34.161472] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 34.161636] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.161727] page_type: f5(slab) [ 34.162032] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.162083] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.162123] page dumped because: kasan: bad access detected [ 34.162158] [ 34.162177] Memory state around the buggy address: [ 34.162220] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.162271] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.162420] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.162461] ^ [ 34.162496] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.162593] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.162760] ================================================================== [ 34.129520] ================================================================== [ 34.129571] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 34.130127] Read of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 34.130564] [ 34.130697] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.130890] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.131094] Hardware name: linux,dummy-virt (DT) [ 34.131586] Call trace: [ 34.131617] show_stack+0x20/0x38 (C) [ 34.131793] dump_stack_lvl+0x8c/0xd0 [ 34.131843] print_report+0x118/0x5d0 [ 34.131895] kasan_report+0xdc/0x128 [ 34.131943] __asan_report_load8_noabort+0x20/0x30 [ 34.131992] kasan_atomics_helper+0x3db0/0x4858 [ 34.132088] kasan_atomics+0x198/0x2e0 [ 34.132719] kunit_try_run_case+0x170/0x3f0 [ 34.132775] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.133733] kthread+0x328/0x630 [ 34.133864] ret_from_fork+0x10/0x20 [ 34.134267] [ 34.134346] Allocated by task 296: [ 34.134380] kasan_save_stack+0x3c/0x68 [ 34.134735] kasan_save_track+0x20/0x40 [ 34.135032] kasan_save_alloc_info+0x40/0x58 [ 34.135255] __kasan_kmalloc+0xd4/0xd8 [ 34.135712] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.135824] kasan_atomics+0xb8/0x2e0 [ 34.136160] kunit_try_run_case+0x170/0x3f0 [ 34.136222] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.136502] kthread+0x328/0x630 [ 34.136927] ret_from_fork+0x10/0x20 [ 34.137101] [ 34.137127] The buggy address belongs to the object at fff00000c9a67800 [ 34.137127] which belongs to the cache kmalloc-64 of size 64 [ 34.137189] The buggy address is located 0 bytes to the right of [ 34.137189] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 34.137266] [ 34.137288] The buggy address belongs to the physical page: [ 34.137321] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 34.137378] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.138062] page_type: f5(slab) [ 34.138127] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.138178] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.138534] page dumped because: kasan: bad access detected [ 34.138571] [ 34.138591] Memory state around the buggy address: [ 34.138625] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.138670] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.138715] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.138756] ^ [ 34.138791] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.138836] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.138876] ================================================================== [ 33.837349] ================================================================== [ 33.837405] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 33.837457] Write of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 33.837509] [ 33.837543] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.837927] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.837989] Hardware name: linux,dummy-virt (DT) [ 33.838027] Call trace: [ 33.838053] show_stack+0x20/0x38 (C) [ 33.838287] dump_stack_lvl+0x8c/0xd0 [ 33.838389] print_report+0x118/0x5d0 [ 33.838459] kasan_report+0xdc/0x128 [ 33.838520] kasan_check_range+0x100/0x1a8 [ 33.838633] __kasan_check_write+0x20/0x30 [ 33.838685] kasan_atomics_helper+0xad4/0x4858 [ 33.838737] kasan_atomics+0x198/0x2e0 [ 33.838791] kunit_try_run_case+0x170/0x3f0 [ 33.839000] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.839078] kthread+0x328/0x630 [ 33.839134] ret_from_fork+0x10/0x20 [ 33.839347] [ 33.839432] Allocated by task 296: [ 33.839484] kasan_save_stack+0x3c/0x68 [ 33.839530] kasan_save_track+0x20/0x40 [ 33.839584] kasan_save_alloc_info+0x40/0x58 [ 33.839633] __kasan_kmalloc+0xd4/0xd8 [ 33.839737] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.839787] kasan_atomics+0xb8/0x2e0 [ 33.839844] kunit_try_run_case+0x170/0x3f0 [ 33.839903] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.840037] kthread+0x328/0x630 [ 33.840084] ret_from_fork+0x10/0x20 [ 33.840133] [ 33.840162] The buggy address belongs to the object at fff00000c9a67800 [ 33.840162] which belongs to the cache kmalloc-64 of size 64 [ 33.840476] The buggy address is located 0 bytes to the right of [ 33.840476] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 33.840590] [ 33.840689] The buggy address belongs to the physical page: [ 33.840750] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 33.840852] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.840902] page_type: f5(slab) [ 33.840942] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.840993] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.841036] page dumped because: kasan: bad access detected [ 33.841258] [ 33.841286] Memory state around the buggy address: [ 33.841329] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.841459] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.841528] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.841578] ^ [ 33.841796] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.841932] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.842002] ================================================================== [ 33.812291] ================================================================== [ 33.812516] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 33.812711] Write of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 33.812848] [ 33.812907] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.813024] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.813267] Hardware name: linux,dummy-virt (DT) [ 33.813340] Call trace: [ 33.813386] show_stack+0x20/0x38 (C) [ 33.813516] dump_stack_lvl+0x8c/0xd0 [ 33.813595] print_report+0x118/0x5d0 [ 33.813722] kasan_report+0xdc/0x128 [ 33.813803] kasan_check_range+0x100/0x1a8 [ 33.813929] __kasan_check_write+0x20/0x30 [ 33.813982] kasan_atomics_helper+0x934/0x4858 [ 33.814036] kasan_atomics+0x198/0x2e0 [ 33.814392] kunit_try_run_case+0x170/0x3f0 [ 33.814456] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.814539] kthread+0x328/0x630 [ 33.814702] ret_from_fork+0x10/0x20 [ 33.814969] [ 33.815091] kasan_save_stack+0x3c/0x68 [ 33.815198] kasan_save_track+0x20/0x40 [ 33.815270] kasan_save_alloc_info+0x40/0x58 [ 33.815321] __kasan_kmalloc+0xd4/0xd8 [ 33.815566] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.815646] kasan_atomics+0xb8/0x2e0 [ 33.815713] kunit_try_run_case+0x170/0x3f0 [ 33.815842] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.815920] kthread+0x328/0x630 [ 33.816051] ret_from_fork+0x10/0x20 [ 33.816119] [ 33.816166] The buggy address belongs to the object at fff00000c9a67800 [ 33.816166] which belongs to the cache kmalloc-64 of size 64 [ 33.816282] The buggy address is located 0 bytes to the right of [ 33.816282] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 33.816360] [ 33.816384] The buggy address belongs to the physical page: [ 33.816422] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 33.816507] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.816781] page_type: f5(slab) [ 33.816913] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.816992] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.817074] page dumped because: kasan: bad access detected [ 33.817159] [ 33.817223] Memory state around the buggy address: [ 33.817260] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.817559] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.817643] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.817711] ^ [ 33.817801] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.817888] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.817935] ================================================================== [ 33.991384] ================================================================== [ 33.991471] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 33.991522] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 33.991857] [ 33.992029] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.992133] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.992163] Hardware name: linux,dummy-virt (DT) [ 33.992195] Call trace: [ 33.992233] show_stack+0x20/0x38 (C) [ 33.992283] dump_stack_lvl+0x8c/0xd0 [ 33.992342] print_report+0x118/0x5d0 [ 33.992393] kasan_report+0xdc/0x128 [ 33.992780] kasan_check_range+0x100/0x1a8 [ 33.992839] __kasan_check_write+0x20/0x30 [ 33.993077] kasan_atomics_helper+0x10c0/0x4858 [ 33.993232] kasan_atomics+0x198/0x2e0 [ 33.993639] kunit_try_run_case+0x170/0x3f0 [ 33.993784] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.993924] kthread+0x328/0x630 [ 33.994090] ret_from_fork+0x10/0x20 [ 33.994170] [ 33.994270] Allocated by task 296: [ 33.994319] kasan_save_stack+0x3c/0x68 [ 33.994364] kasan_save_track+0x20/0x40 [ 33.994405] kasan_save_alloc_info+0x40/0x58 [ 33.994445] __kasan_kmalloc+0xd4/0xd8 [ 33.994491] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.994632] kasan_atomics+0xb8/0x2e0 [ 33.994700] kunit_try_run_case+0x170/0x3f0 [ 33.994779] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.994886] kthread+0x328/0x630 [ 33.994922] ret_from_fork+0x10/0x20 [ 33.994960] [ 33.994981] The buggy address belongs to the object at fff00000c9a67800 [ 33.994981] which belongs to the cache kmalloc-64 of size 64 [ 33.995040] The buggy address is located 0 bytes to the right of [ 33.995040] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 33.995106] [ 33.995128] The buggy address belongs to the physical page: [ 33.995168] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 33.995259] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.995308] page_type: f5(slab) [ 33.995381] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.995434] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.995475] page dumped because: kasan: bad access detected [ 33.995508] [ 33.995842] Memory state around the buggy address: [ 33.996191] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.996253] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.996298] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.997231] ^ [ 33.997345] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.997513] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.997554] ================================================================== [ 34.170308] ================================================================== [ 34.170611] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 34.170748] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 34.170962] [ 34.170995] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.171082] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.171109] Hardware name: linux,dummy-virt (DT) [ 34.171143] Call trace: [ 34.171167] show_stack+0x20/0x38 (C) [ 34.171229] dump_stack_lvl+0x8c/0xd0 [ 34.171979] print_report+0x118/0x5d0 [ 34.172383] kasan_report+0xdc/0x128 [ 34.172507] kasan_check_range+0x100/0x1a8 [ 34.172898] __kasan_check_write+0x20/0x30 [ 34.173231] kasan_atomics_helper+0x17ec/0x4858 [ 34.173307] kasan_atomics+0x198/0x2e0 [ 34.173700] kunit_try_run_case+0x170/0x3f0 [ 34.173957] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.174017] kthread+0x328/0x630 [ 34.174485] ret_from_fork+0x10/0x20 [ 34.174821] [ 34.174844] Allocated by task 296: [ 34.175081] kasan_save_stack+0x3c/0x68 [ 34.175218] kasan_save_track+0x20/0x40 [ 34.175261] kasan_save_alloc_info+0x40/0x58 [ 34.175302] __kasan_kmalloc+0xd4/0xd8 [ 34.175342] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.175385] kasan_atomics+0xb8/0x2e0 [ 34.175963] kunit_try_run_case+0x170/0x3f0 [ 34.176056] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.176107] kthread+0x328/0x630 [ 34.176144] ret_from_fork+0x10/0x20 [ 34.176183] [ 34.176319] The buggy address belongs to the object at fff00000c9a67800 [ 34.176319] which belongs to the cache kmalloc-64 of size 64 [ 34.176384] The buggy address is located 0 bytes to the right of [ 34.176384] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 34.176554] [ 34.176820] The buggy address belongs to the physical page: [ 34.177118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 34.177192] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.177254] page_type: f5(slab) [ 34.177296] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.177911] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.178392] page dumped because: kasan: bad access detected [ 34.178563] [ 34.178586] Memory state around the buggy address: [ 34.178967] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.179015] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.179060] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.179101] ^ [ 34.179137] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.179754] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.180075] ================================================================== [ 33.831637] ================================================================== [ 33.831746] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 33.831816] Write of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 33.831930] [ 33.831997] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.832094] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.832124] Hardware name: linux,dummy-virt (DT) [ 33.832299] Call trace: [ 33.832391] show_stack+0x20/0x38 (C) [ 33.832463] dump_stack_lvl+0x8c/0xd0 [ 33.832601] print_report+0x118/0x5d0 [ 33.832697] kasan_report+0xdc/0x128 [ 33.832752] kasan_check_range+0x100/0x1a8 [ 33.832835] __kasan_check_write+0x20/0x30 [ 33.832900] kasan_atomics_helper+0xa6c/0x4858 [ 33.832955] kasan_atomics+0x198/0x2e0 [ 33.833016] kunit_try_run_case+0x170/0x3f0 [ 33.833065] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.833121] kthread+0x328/0x630 [ 33.833173] ret_from_fork+0x10/0x20 [ 33.833240] [ 33.833262] Allocated by task 296: [ 33.833302] kasan_save_stack+0x3c/0x68 [ 33.833346] kasan_save_track+0x20/0x40 [ 33.833402] kasan_save_alloc_info+0x40/0x58 [ 33.833443] __kasan_kmalloc+0xd4/0xd8 [ 33.833482] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.833529] kasan_atomics+0xb8/0x2e0 [ 33.833569] kunit_try_run_case+0x170/0x3f0 [ 33.833609] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.833656] kthread+0x328/0x630 [ 33.833903] ret_from_fork+0x10/0x20 [ 33.834124] [ 33.834165] The buggy address belongs to the object at fff00000c9a67800 [ 33.834165] which belongs to the cache kmalloc-64 of size 64 [ 33.834400] The buggy address is located 0 bytes to the right of [ 33.834400] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 33.834620] [ 33.834661] The buggy address belongs to the physical page: [ 33.834719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 33.834848] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.834929] page_type: f5(slab) [ 33.835006] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.835363] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.835458] page dumped because: kasan: bad access detected [ 33.835610] [ 33.835661] Memory state around the buggy address: [ 33.835718] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.836031] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.836100] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.836169] ^ [ 33.836227] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.836272] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.836314] ================================================================== [ 33.967826] ================================================================== [ 33.968265] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 33.968389] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 33.968443] [ 33.968474] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.968569] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.968603] Hardware name: linux,dummy-virt (DT) [ 33.968634] Call trace: [ 33.968658] show_stack+0x20/0x38 (C) [ 33.968708] dump_stack_lvl+0x8c/0xd0 [ 33.968758] print_report+0x118/0x5d0 [ 33.968808] kasan_report+0xdc/0x128 [ 33.968856] kasan_check_range+0x100/0x1a8 [ 33.969490] __kasan_check_write+0x20/0x30 [ 33.969594] kasan_atomics_helper+0xf20/0x4858 [ 33.969773] kasan_atomics+0x198/0x2e0 [ 33.969831] kunit_try_run_case+0x170/0x3f0 [ 33.969927] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.970068] kthread+0x328/0x630 [ 33.970580] ret_from_fork+0x10/0x20 [ 33.970752] [ 33.970773] Allocated by task 296: [ 33.970883] kasan_save_stack+0x3c/0x68 [ 33.971062] kasan_save_track+0x20/0x40 [ 33.971236] kasan_save_alloc_info+0x40/0x58 [ 33.971347] __kasan_kmalloc+0xd4/0xd8 [ 33.971443] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.971532] kasan_atomics+0xb8/0x2e0 [ 33.971571] kunit_try_run_case+0x170/0x3f0 [ 33.971619] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.971778] kthread+0x328/0x630 [ 33.971814] ret_from_fork+0x10/0x20 [ 33.971854] [ 33.971875] The buggy address belongs to the object at fff00000c9a67800 [ 33.971875] which belongs to the cache kmalloc-64 of size 64 [ 33.971936] The buggy address is located 0 bytes to the right of [ 33.971936] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 33.972022] [ 33.972101] The buggy address belongs to the physical page: [ 33.972134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 33.972225] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.972275] page_type: f5(slab) [ 33.972346] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.972399] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.972441] page dumped because: kasan: bad access detected [ 33.972600] [ 33.972624] Memory state around the buggy address: [ 33.972728] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.973080] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.973137] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.973200] ^ [ 33.973243] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.973286] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.973326] ================================================================== [ 33.974084] ================================================================== [ 33.974380] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 33.974493] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 33.974545] [ 33.974585] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.974780] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.974851] Hardware name: linux,dummy-virt (DT) [ 33.974952] Call trace: [ 33.974989] show_stack+0x20/0x38 (C) [ 33.975037] dump_stack_lvl+0x8c/0xd0 [ 33.975086] print_report+0x118/0x5d0 [ 33.975268] kasan_report+0xdc/0x128 [ 33.975326] kasan_check_range+0x100/0x1a8 [ 33.975425] __kasan_check_write+0x20/0x30 [ 33.975473] kasan_atomics_helper+0xf88/0x4858 [ 33.975564] kasan_atomics+0x198/0x2e0 [ 33.975613] kunit_try_run_case+0x170/0x3f0 [ 33.975735] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.975938] kthread+0x328/0x630 [ 33.976007] ret_from_fork+0x10/0x20 [ 33.976055] [ 33.976077] Allocated by task 296: [ 33.976107] kasan_save_stack+0x3c/0x68 [ 33.976150] kasan_save_track+0x20/0x40 [ 33.976191] kasan_save_alloc_info+0x40/0x58 [ 33.976241] __kasan_kmalloc+0xd4/0xd8 [ 33.976282] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.976325] kasan_atomics+0xb8/0x2e0 [ 33.976364] kunit_try_run_case+0x170/0x3f0 [ 33.976406] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.976454] kthread+0x328/0x630 [ 33.976487] ret_from_fork+0x10/0x20 [ 33.976526] [ 33.976843] The buggy address belongs to the object at fff00000c9a67800 [ 33.976843] which belongs to the cache kmalloc-64 of size 64 [ 33.976929] The buggy address is located 0 bytes to the right of [ 33.976929] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 33.977041] [ 33.977062] The buggy address belongs to the physical page: [ 33.977095] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 33.977146] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.977195] page_type: f5(slab) [ 33.977244] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.977295] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.977368] page dumped because: kasan: bad access detected [ 33.977405] [ 33.977425] Memory state around the buggy address: [ 33.977458] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.977657] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.977702] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.977742] ^ [ 33.977777] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.977898] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.977973] ================================================================== [ 33.944415] ================================================================== [ 33.944741] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 33.944795] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 33.944847] [ 33.944879] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.944966] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.944996] Hardware name: linux,dummy-virt (DT) [ 33.945030] Call trace: [ 33.945056] show_stack+0x20/0x38 (C) [ 33.945463] dump_stack_lvl+0x8c/0xd0 [ 33.945554] print_report+0x118/0x5d0 [ 33.945605] kasan_report+0xdc/0x128 [ 33.945897] kasan_check_range+0x100/0x1a8 [ 33.946002] __kasan_check_write+0x20/0x30 [ 33.946051] kasan_atomics_helper+0xe44/0x4858 [ 33.946320] kasan_atomics+0x198/0x2e0 [ 33.946378] kunit_try_run_case+0x170/0x3f0 [ 33.946429] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.946485] kthread+0x328/0x630 [ 33.946532] ret_from_fork+0x10/0x20 [ 33.946581] [ 33.946623] Allocated by task 296: [ 33.946761] kasan_save_stack+0x3c/0x68 [ 33.946807] kasan_save_track+0x20/0x40 [ 33.946855] kasan_save_alloc_info+0x40/0x58 [ 33.946895] __kasan_kmalloc+0xd4/0xd8 [ 33.946970] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.947130] kasan_atomics+0xb8/0x2e0 [ 33.947171] kunit_try_run_case+0x170/0x3f0 [ 33.947545] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.947612] kthread+0x328/0x630 [ 33.947819] ret_from_fork+0x10/0x20 [ 33.947863] [ 33.948183] The buggy address belongs to the object at fff00000c9a67800 [ 33.948183] which belongs to the cache kmalloc-64 of size 64 [ 33.948424] The buggy address is located 0 bytes to the right of [ 33.948424] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 33.948972] [ 33.949140] The buggy address belongs to the physical page: [ 33.949223] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 33.949373] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.949423] page_type: f5(slab) [ 33.949462] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.949521] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.949669] page dumped because: kasan: bad access detected [ 33.949706] [ 33.949729] Memory state around the buggy address: [ 33.949767] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.949823] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.949868] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.949908] ^ [ 33.949974] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.950017] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.950057] ================================================================== [ 33.893760] ================================================================== [ 33.893815] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 33.893937] Read of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 33.893998] [ 33.894230] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.894533] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.894700] Hardware name: linux,dummy-virt (DT) [ 33.894848] Call trace: [ 33.895048] show_stack+0x20/0x38 (C) [ 33.895127] dump_stack_lvl+0x8c/0xd0 [ 33.895603] print_report+0x118/0x5d0 [ 33.895800] kasan_report+0xdc/0x128 [ 33.896108] __asan_report_load4_noabort+0x20/0x30 [ 33.896237] kasan_atomics_helper+0x3dd8/0x4858 [ 33.896404] kasan_atomics+0x198/0x2e0 [ 33.896461] kunit_try_run_case+0x170/0x3f0 [ 33.896657] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.897014] kthread+0x328/0x630 [ 33.897100] ret_from_fork+0x10/0x20 [ 33.897386] [ 33.897409] Allocated by task 296: [ 33.897489] kasan_save_stack+0x3c/0x68 [ 33.897536] kasan_save_track+0x20/0x40 [ 33.897760] kasan_save_alloc_info+0x40/0x58 [ 33.897817] __kasan_kmalloc+0xd4/0xd8 [ 33.898097] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.898275] kasan_atomics+0xb8/0x2e0 [ 33.898339] kunit_try_run_case+0x170/0x3f0 [ 33.898478] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.898528] kthread+0x328/0x630 [ 33.898565] ret_from_fork+0x10/0x20 [ 33.898604] [ 33.898628] The buggy address belongs to the object at fff00000c9a67800 [ 33.898628] which belongs to the cache kmalloc-64 of size 64 [ 33.899284] The buggy address is located 0 bytes to the right of [ 33.899284] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 33.899602] [ 33.899626] The buggy address belongs to the physical page: [ 33.899660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 33.900268] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.900476] page_type: f5(slab) [ 33.900631] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.900930] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.900977] page dumped because: kasan: bad access detected [ 33.901011] [ 33.901031] Memory state around the buggy address: [ 33.901065] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.901109] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.901155] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.901195] ^ [ 33.901656] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.901723] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.901778] ================================================================== [ 34.151067] ================================================================== [ 34.151119] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 34.151171] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 34.151239] [ 34.151271] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.151358] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.151386] Hardware name: linux,dummy-virt (DT) [ 34.151419] Call trace: [ 34.151444] show_stack+0x20/0x38 (C) [ 34.151493] dump_stack_lvl+0x8c/0xd0 [ 34.151540] print_report+0x118/0x5d0 [ 34.151588] kasan_report+0xdc/0x128 [ 34.151720] kasan_check_range+0x100/0x1a8 [ 34.151793] __kasan_check_write+0x20/0x30 [ 34.151839] kasan_atomics_helper+0x16d0/0x4858 [ 34.151889] kasan_atomics+0x198/0x2e0 [ 34.151937] kunit_try_run_case+0x170/0x3f0 [ 34.152031] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.152195] kthread+0x328/0x630 [ 34.152264] ret_from_fork+0x10/0x20 [ 34.152352] [ 34.152372] Allocated by task 296: [ 34.152402] kasan_save_stack+0x3c/0x68 [ 34.152524] kasan_save_track+0x20/0x40 [ 34.152758] kasan_save_alloc_info+0x40/0x58 [ 34.152811] __kasan_kmalloc+0xd4/0xd8 [ 34.152954] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.153010] kasan_atomics+0xb8/0x2e0 [ 34.153117] kunit_try_run_case+0x170/0x3f0 [ 34.153189] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.153315] kthread+0x328/0x630 [ 34.153351] ret_from_fork+0x10/0x20 [ 34.153390] [ 34.153413] The buggy address belongs to the object at fff00000c9a67800 [ 34.153413] which belongs to the cache kmalloc-64 of size 64 [ 34.153520] The buggy address is located 0 bytes to the right of [ 34.153520] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 34.153657] [ 34.153681] The buggy address belongs to the physical page: [ 34.153713] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 34.153768] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.153817] page_type: f5(slab) [ 34.153855] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.153935] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.153977] page dumped because: kasan: bad access detected [ 34.154031] [ 34.154127] Memory state around the buggy address: [ 34.154300] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.154473] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.154524] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.154670] ^ [ 34.154760] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.154850] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.154892] ================================================================== [ 33.842478] ================================================================== [ 33.842549] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 33.842604] Read of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 33.842655] [ 33.842688] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.843075] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.843111] Hardware name: linux,dummy-virt (DT) [ 33.843163] Call trace: [ 33.843189] show_stack+0x20/0x38 (C) [ 33.843257] dump_stack_lvl+0x8c/0xd0 [ 33.843448] print_report+0x118/0x5d0 [ 33.843526] kasan_report+0xdc/0x128 [ 33.843674] __asan_report_load4_noabort+0x20/0x30 [ 33.843733] kasan_atomics_helper+0x3dcc/0x4858 [ 33.843785] kasan_atomics+0x198/0x2e0 [ 33.844025] kunit_try_run_case+0x170/0x3f0 [ 33.844164] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.844235] kthread+0x328/0x630 [ 33.844279] ret_from_fork+0x10/0x20 [ 33.844337] [ 33.844359] Allocated by task 296: [ 33.844388] kasan_save_stack+0x3c/0x68 [ 33.844431] kasan_save_track+0x20/0x40 [ 33.844472] kasan_save_alloc_info+0x40/0x58 [ 33.844512] __kasan_kmalloc+0xd4/0xd8 [ 33.844561] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.844608] kasan_atomics+0xb8/0x2e0 [ 33.844656] kunit_try_run_case+0x170/0x3f0 [ 33.845063] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.845190] kthread+0x328/0x630 [ 33.845280] ret_from_fork+0x10/0x20 [ 33.845348] [ 33.845410] The buggy address belongs to the object at fff00000c9a67800 [ 33.845410] which belongs to the cache kmalloc-64 of size 64 [ 33.845607] The buggy address is located 0 bytes to the right of [ 33.845607] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 33.845696] [ 33.845993] The buggy address belongs to the physical page: [ 33.846052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 33.846127] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.846276] page_type: f5(slab) [ 33.846344] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.846440] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.846743] page dumped because: kasan: bad access detected [ 33.846878] [ 33.846922] Memory state around the buggy address: [ 33.846971] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.847043] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.847174] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.847257] ^ [ 33.847293] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.847338] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.847639] ================================================================== [ 34.155067] ================================================================== [ 34.155263] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 34.155329] Read of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 34.155381] [ 34.155419] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.155629] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.155707] Hardware name: linux,dummy-virt (DT) [ 34.155740] Call trace: [ 34.155763] show_stack+0x20/0x38 (C) [ 34.155813] dump_stack_lvl+0x8c/0xd0 [ 34.155861] print_report+0x118/0x5d0 [ 34.155959] kasan_report+0xdc/0x128 [ 34.156071] __asan_report_load8_noabort+0x20/0x30 [ 34.156124] kasan_atomics_helper+0x3e10/0x4858 [ 34.156174] kasan_atomics+0x198/0x2e0 [ 34.156231] kunit_try_run_case+0x170/0x3f0 [ 34.156282] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.156339] kthread+0x328/0x630 [ 34.156392] ret_from_fork+0x10/0x20 [ 34.156442] [ 34.156462] Allocated by task 296: [ 34.156627] kasan_save_stack+0x3c/0x68 [ 34.156726] kasan_save_track+0x20/0x40 [ 34.156770] kasan_save_alloc_info+0x40/0x58 [ 34.156845] __kasan_kmalloc+0xd4/0xd8 [ 34.156969] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.157078] kasan_atomics+0xb8/0x2e0 [ 34.157189] kunit_try_run_case+0x170/0x3f0 [ 34.157260] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.157307] kthread+0x328/0x630 [ 34.157365] ret_from_fork+0x10/0x20 [ 34.157404] [ 34.157427] The buggy address belongs to the object at fff00000c9a67800 [ 34.157427] which belongs to the cache kmalloc-64 of size 64 [ 34.157519] The buggy address is located 0 bytes to the right of [ 34.157519] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 34.157587] [ 34.157672] The buggy address belongs to the physical page: [ 34.157750] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 34.157806] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.157858] page_type: f5(slab) [ 34.157903] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.158055] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.158121] page dumped because: kasan: bad access detected [ 34.158155] [ 34.158174] Memory state around the buggy address: [ 34.158216] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.158267] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.158416] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.158458] ^ [ 34.158545] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.158717] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.158843] ================================================================== [ 33.824350] ================================================================== [ 33.824413] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 33.824526] Write of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 33.824715] [ 33.824875] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.824997] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.825108] Hardware name: linux,dummy-virt (DT) [ 33.825169] Call trace: [ 33.825449] show_stack+0x20/0x38 (C) [ 33.825525] dump_stack_lvl+0x8c/0xd0 [ 33.825605] print_report+0x118/0x5d0 [ 33.825894] kasan_report+0xdc/0x128 [ 33.825989] kasan_check_range+0x100/0x1a8 [ 33.826165] __kasan_check_write+0x20/0x30 [ 33.826257] kasan_atomics_helper+0xa04/0x4858 [ 33.826354] kasan_atomics+0x198/0x2e0 [ 33.826477] kunit_try_run_case+0x170/0x3f0 [ 33.826567] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.826661] kthread+0x328/0x630 [ 33.826790] ret_from_fork+0x10/0x20 [ 33.826879] [ 33.826983] Allocated by task 296: [ 33.827035] kasan_save_stack+0x3c/0x68 [ 33.827081] kasan_save_track+0x20/0x40 [ 33.827121] kasan_save_alloc_info+0x40/0x58 [ 33.827186] __kasan_kmalloc+0xd4/0xd8 [ 33.827480] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.827557] kasan_atomics+0xb8/0x2e0 [ 33.827856] kunit_try_run_case+0x170/0x3f0 [ 33.827931] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.828064] kthread+0x328/0x630 [ 33.828148] ret_from_fork+0x10/0x20 [ 33.828283] [ 33.828333] The buggy address belongs to the object at fff00000c9a67800 [ 33.828333] which belongs to the cache kmalloc-64 of size 64 [ 33.828447] The buggy address is located 0 bytes to the right of [ 33.828447] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 33.828669] [ 33.828697] The buggy address belongs to the physical page: [ 33.828731] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 33.828925] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.829005] page_type: f5(slab) [ 33.829128] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.829257] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.829338] page dumped because: kasan: bad access detected [ 33.829527] [ 33.829548] Memory state around the buggy address: [ 33.829631] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.829695] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.829817] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.829901] ^ [ 33.829939] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.829984] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.830262] ================================================================== [ 34.139108] ================================================================== [ 34.139157] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 34.139223] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 34.140420] [ 34.140534] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.140657] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.140751] Hardware name: linux,dummy-virt (DT) [ 34.140785] Call trace: [ 34.140809] show_stack+0x20/0x38 (C) [ 34.140861] dump_stack_lvl+0x8c/0xd0 [ 34.140910] print_report+0x118/0x5d0 [ 34.140958] kasan_report+0xdc/0x128 [ 34.141010] kasan_check_range+0x100/0x1a8 [ 34.141057] __kasan_check_write+0x20/0x30 [ 34.141104] kasan_atomics_helper+0x1644/0x4858 [ 34.141155] kasan_atomics+0x198/0x2e0 [ 34.141204] kunit_try_run_case+0x170/0x3f0 [ 34.141274] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.141330] kthread+0x328/0x630 [ 34.141374] ret_from_fork+0x10/0x20 [ 34.141423] [ 34.141444] Allocated by task 296: [ 34.141474] kasan_save_stack+0x3c/0x68 [ 34.141518] kasan_save_track+0x20/0x40 [ 34.141559] kasan_save_alloc_info+0x40/0x58 [ 34.141599] __kasan_kmalloc+0xd4/0xd8 [ 34.141639] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.141682] kasan_atomics+0xb8/0x2e0 [ 34.141720] kunit_try_run_case+0x170/0x3f0 [ 34.141763] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.141811] kthread+0x328/0x630 [ 34.141845] ret_from_fork+0x10/0x20 [ 34.141883] [ 34.141905] The buggy address belongs to the object at fff00000c9a67800 [ 34.141905] which belongs to the cache kmalloc-64 of size 64 [ 34.141964] The buggy address is located 0 bytes to the right of [ 34.141964] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 34.142030] [ 34.142051] The buggy address belongs to the physical page: [ 34.142084] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 34.142138] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.143437] page_type: f5(slab) [ 34.143525] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.143577] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.143621] page dumped because: kasan: bad access detected [ 34.143874] [ 34.143901] Memory state around the buggy address: [ 34.144060] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.145534] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.145594] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.145635] ^ [ 34.145672] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.145717] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.145757] ================================================================== [ 34.163011] ================================================================== [ 34.163109] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 34.163171] Read of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 34.163232] [ 34.163262] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.163484] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.163515] Hardware name: linux,dummy-virt (DT) [ 34.163548] Call trace: [ 34.163578] show_stack+0x20/0x38 (C) [ 34.163640] dump_stack_lvl+0x8c/0xd0 [ 34.163689] print_report+0x118/0x5d0 [ 34.163737] kasan_report+0xdc/0x128 [ 34.163787] __asan_report_load8_noabort+0x20/0x30 [ 34.164017] kasan_atomics_helper+0x3e20/0x4858 [ 34.164129] kasan_atomics+0x198/0x2e0 [ 34.164287] kunit_try_run_case+0x170/0x3f0 [ 34.164337] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.164504] kthread+0x328/0x630 [ 34.164609] ret_from_fork+0x10/0x20 [ 34.164689] [ 34.164710] Allocated by task 296: [ 34.164872] kasan_save_stack+0x3c/0x68 [ 34.164919] kasan_save_track+0x20/0x40 [ 34.164999] kasan_save_alloc_info+0x40/0x58 [ 34.165041] __kasan_kmalloc+0xd4/0xd8 [ 34.165082] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.165124] kasan_atomics+0xb8/0x2e0 [ 34.165256] kunit_try_run_case+0x170/0x3f0 [ 34.165298] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.165345] kthread+0x328/0x630 [ 34.165381] ret_from_fork+0x10/0x20 [ 34.165459] [ 34.165551] The buggy address belongs to the object at fff00000c9a67800 [ 34.165551] which belongs to the cache kmalloc-64 of size 64 [ 34.165728] The buggy address is located 0 bytes to the right of [ 34.165728] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 34.165823] [ 34.165921] The buggy address belongs to the physical page: [ 34.166255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 34.166402] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.166623] page_type: f5(slab) [ 34.166766] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.167097] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.167144] page dumped because: kasan: bad access detected [ 34.167184] [ 34.167480] Memory state around the buggy address: [ 34.167693] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.168172] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.168850] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.168901] ^ [ 34.168939] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.168982] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.169419] ================================================================== [ 33.805753] ================================================================== [ 33.805894] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 33.805952] Read of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 33.806023] [ 33.806282] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.806427] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.806456] Hardware name: linux,dummy-virt (DT) [ 33.806489] Call trace: [ 33.806530] show_stack+0x20/0x38 (C) [ 33.806584] dump_stack_lvl+0x8c/0xd0 [ 33.806641] print_report+0x118/0x5d0 [ 33.806925] kasan_report+0xdc/0x128 [ 33.807049] __asan_report_load4_noabort+0x20/0x30 [ 33.807104] kasan_atomics_helper+0x42d8/0x4858 [ 33.807156] kasan_atomics+0x198/0x2e0 [ 33.807425] kunit_try_run_case+0x170/0x3f0 [ 33.807537] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.807629] kthread+0x328/0x630 [ 33.807677] ret_from_fork+0x10/0x20 [ 33.807746] [ 33.807991] Allocated by task 296: [ 33.808052] kasan_save_stack+0x3c/0x68 [ 33.808113] kasan_save_track+0x20/0x40 [ 33.808203] kasan_save_alloc_info+0x40/0x58 [ 33.808275] __kasan_kmalloc+0xd4/0xd8 [ 33.808383] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.808441] kasan_atomics+0xb8/0x2e0 [ 33.808490] kunit_try_run_case+0x170/0x3f0 [ 33.808552] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.808691] kthread+0x328/0x630 [ 33.808726] ret_from_fork+0x10/0x20 [ 33.809043] [ 33.809105] The buggy address belongs to the object at fff00000c9a67800 [ 33.809105] which belongs to the cache kmalloc-64 of size 64 [ 33.809263] The buggy address is located 0 bytes to the right of [ 33.809263] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 33.809416] [ 33.809439] The buggy address belongs to the physical page: [ 33.809578] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 33.809726] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.809850] page_type: f5(slab) [ 33.809918] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.810045] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.810089] page dumped because: kasan: bad access detected [ 33.810330] [ 33.810424] Memory state around the buggy address: [ 33.810459] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.810717] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.810841] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.810902] ^ [ 33.810973] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.811083] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.811143] ================================================================== [ 34.069856] ================================================================== [ 34.069909] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 34.069962] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 34.071565] [ 34.071692] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.071785] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.071813] Hardware name: linux,dummy-virt (DT) [ 34.072956] Call trace: [ 34.073077] show_stack+0x20/0x38 (C) [ 34.074116] dump_stack_lvl+0x8c/0xd0 [ 34.074339] print_report+0x118/0x5d0 [ 34.074866] kasan_report+0xdc/0x128 [ 34.075013] kasan_check_range+0x100/0x1a8 [ 34.075199] __kasan_check_write+0x20/0x30 [ 34.075519] kasan_atomics_helper+0x14e4/0x4858 [ 34.075577] kasan_atomics+0x198/0x2e0 [ 34.076204] kunit_try_run_case+0x170/0x3f0 [ 34.076276] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.076334] kthread+0x328/0x630 [ 34.076379] ret_from_fork+0x10/0x20 [ 34.077246] [ 34.077875] Allocated by task 296: [ 34.077928] kasan_save_stack+0x3c/0x68 [ 34.078414] kasan_save_track+0x20/0x40 [ 34.079204] kasan_save_alloc_info+0x40/0x58 [ 34.079347] __kasan_kmalloc+0xd4/0xd8 [ 34.079700] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.079805] kasan_atomics+0xb8/0x2e0 [ 34.080034] kunit_try_run_case+0x170/0x3f0 [ 34.080078] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.080126] kthread+0x328/0x630 [ 34.080899] ret_from_fork+0x10/0x20 [ 34.081314] [ 34.081781] The buggy address belongs to the object at fff00000c9a67800 [ 34.081781] which belongs to the cache kmalloc-64 of size 64 [ 34.082634] The buggy address is located 0 bytes to the right of [ 34.082634] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 34.083570] [ 34.083757] The buggy address belongs to the physical page: [ 34.083848] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 34.084044] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.084605] page_type: f5(slab) [ 34.085074] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.085404] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.085481] page dumped because: kasan: bad access detected [ 34.085515] [ 34.085938] Memory state around the buggy address: [ 34.086218] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.086888] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.086939] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.086980] ^ [ 34.087017] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.087712] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.088251] ================================================================== [ 33.748379] ================================================================== [ 33.748431] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 33.748647] Write of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 33.748851] [ 33.748907] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.749075] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.749134] Hardware name: linux,dummy-virt (DT) [ 33.749190] Call trace: [ 33.749330] show_stack+0x20/0x38 (C) [ 33.749390] dump_stack_lvl+0x8c/0xd0 [ 33.749524] print_report+0x118/0x5d0 [ 33.749580] kasan_report+0xdc/0x128 [ 33.749687] kasan_check_range+0x100/0x1a8 [ 33.749769] __kasan_check_write+0x20/0x30 [ 33.749970] kasan_atomics_helper+0x414/0x4858 [ 33.750116] kasan_atomics+0x198/0x2e0 [ 33.750186] kunit_try_run_case+0x170/0x3f0 [ 33.750314] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.750404] kthread+0x328/0x630 [ 33.750456] ret_from_fork+0x10/0x20 [ 33.750700] [ 33.750754] Allocated by task 296: [ 33.750785] kasan_save_stack+0x3c/0x68 [ 33.750929] kasan_save_track+0x20/0x40 [ 33.751013] kasan_save_alloc_info+0x40/0x58 [ 33.751063] __kasan_kmalloc+0xd4/0xd8 [ 33.751104] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.751194] kunit_try_run_case+0x170/0x3f0 [ 33.751246] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.751293] kthread+0x328/0x630 [ 33.751344] ret_from_fork+0x10/0x20 [ 33.751390] [ 33.751480] The buggy address is located 0 bytes to the right of [ 33.751480] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 33.751716] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.751765] page_type: f5(slab) [ 33.751806] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.752087] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.752163] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.752205] ^ [ 33.752252] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.752294] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.752724] ================================================================== [ 34.048498] ================================================================== [ 34.048621] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 34.048937] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 34.049524] [ 34.050160] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.050295] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.051170] Hardware name: linux,dummy-virt (DT) [ 34.051502] Call trace: [ 34.051696] show_stack+0x20/0x38 (C) [ 34.051784] dump_stack_lvl+0x8c/0xd0 [ 34.051834] print_report+0x118/0x5d0 [ 34.052725] kasan_report+0xdc/0x128 [ 34.053288] kasan_check_range+0x100/0x1a8 [ 34.053823] __kasan_check_write+0x20/0x30 [ 34.054187] kasan_atomics_helper+0x147c/0x4858 [ 34.054822] kasan_atomics+0x198/0x2e0 [ 34.055335] kunit_try_run_case+0x170/0x3f0 [ 34.055878] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.056753] kthread+0x328/0x630 [ 34.056820] ret_from_fork+0x10/0x20 [ 34.057930] [ 34.058044] Allocated by task 296: [ 34.058123] kasan_save_stack+0x3c/0x68 [ 34.058303] kasan_save_track+0x20/0x40 [ 34.058348] kasan_save_alloc_info+0x40/0x58 [ 34.058695] __kasan_kmalloc+0xd4/0xd8 [ 34.059131] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.059407] kasan_atomics+0xb8/0x2e0 [ 34.059848] kunit_try_run_case+0x170/0x3f0 [ 34.060873] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.060975] kthread+0x328/0x630 [ 34.061010] ret_from_fork+0x10/0x20 [ 34.061050] [ 34.061587] The buggy address belongs to the object at fff00000c9a67800 [ 34.061587] which belongs to the cache kmalloc-64 of size 64 [ 34.062106] The buggy address is located 0 bytes to the right of [ 34.062106] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 34.062181] [ 34.062877] The buggy address belongs to the physical page: [ 34.063656] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 34.064109] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.064361] page_type: f5(slab) [ 34.064884] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.065204] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.065261] page dumped because: kasan: bad access detected [ 34.065294] [ 34.066054] Memory state around the buggy address: [ 34.066114] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.066394] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.067022] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.067131] ^ [ 34.067170] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.068039] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.068504] ================================================================== [ 33.759253] ================================================================== [ 33.759322] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 33.759376] Write of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 33.759446] [ 33.759690] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.759796] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.759824] Hardware name: linux,dummy-virt (DT) [ 33.759867] Call trace: [ 33.759936] show_stack+0x20/0x38 (C) [ 33.759992] dump_stack_lvl+0x8c/0xd0 [ 33.760042] print_report+0x118/0x5d0 [ 33.760153] kasan_report+0xdc/0x128 [ 33.760218] kasan_check_range+0x100/0x1a8 [ 33.760277] __kasan_check_write+0x20/0x30 [ 33.760345] kasan_atomics_helper+0x4e4/0x4858 [ 33.760414] kasan_atomics+0x198/0x2e0 [ 33.760619] kunit_try_run_case+0x170/0x3f0 [ 33.760808] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.760898] kthread+0x328/0x630 [ 33.761041] ret_from_fork+0x10/0x20 [ 33.761121] [ 33.761291] Allocated by task 296: [ 33.761558] kasan_save_track+0x20/0x40 [ 33.762041] kunit_try_run_case+0x170/0x3f0 [ 33.762443] [ 33.762972] The buggy address belongs to the physical page: [ 33.763473] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.763701] Memory state around the buggy address: [ 33.764165] ^ [ 33.764392] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.765563] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 33.765970] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.766063] show_stack+0x20/0x38 (C) [ 33.766222] print_report+0x118/0x5d0 [ 33.766378] __kasan_check_write+0x20/0x30 [ 33.766479] kasan_atomics+0x198/0x2e0 [ 33.766638] kthread+0x328/0x630 [ 33.766793] kasan_save_stack+0x3c/0x68 [ 33.767137] kthread+0x328/0x630 [ 33.767440] The buggy address is located 0 bytes to the right of [ 33.767440] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 33.769327] ================================================================== [ 34.010112] ================================================================== [ 34.010164] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 34.010230] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 34.010281] [ 34.010310] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.010396] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.010425] Hardware name: linux,dummy-virt (DT) [ 34.010458] Call trace: [ 34.010481] show_stack+0x20/0x38 (C) [ 34.010528] dump_stack_lvl+0x8c/0xd0 [ 34.010577] print_report+0x118/0x5d0 [ 34.010624] kasan_report+0xdc/0x128 [ 34.010674] kasan_check_range+0x100/0x1a8 [ 34.010721] __kasan_check_write+0x20/0x30 [ 34.010786] kasan_atomics_helper+0x11f8/0x4858 [ 34.010838] kasan_atomics+0x198/0x2e0 [ 34.010892] kunit_try_run_case+0x170/0x3f0 [ 34.011053] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.011109] kthread+0x328/0x630 [ 34.011245] ret_from_fork+0x10/0x20 [ 34.011301] [ 34.011385] Allocated by task 296: [ 34.011488] kasan_save_stack+0x3c/0x68 [ 34.011533] kasan_save_track+0x20/0x40 [ 34.011580] kasan_save_alloc_info+0x40/0x58 [ 34.011665] __kasan_kmalloc+0xd4/0xd8 [ 34.011721] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.011891] kasan_atomics+0xb8/0x2e0 [ 34.011930] kunit_try_run_case+0x170/0x3f0 [ 34.011972] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.012020] kthread+0x328/0x630 [ 34.012060] ret_from_fork+0x10/0x20 [ 34.012579] [ 34.012627] The buggy address belongs to the object at fff00000c9a67800 [ 34.012627] which belongs to the cache kmalloc-64 of size 64 [ 34.012692] The buggy address is located 0 bytes to the right of [ 34.012692] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 34.012758] [ 34.012780] The buggy address belongs to the physical page: [ 34.012814] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 34.012868] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.013828] page_type: f5(slab) [ 34.013947] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.013997] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.014050] page dumped because: kasan: bad access detected [ 34.014184] [ 34.014642] Memory state around the buggy address: [ 34.014695] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.014742] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.014787] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.014838] ^ [ 34.014976] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.015133] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.015173] ================================================================== [ 33.753536] ================================================================== [ 33.753590] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 33.753702] Write of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 33.753760] [ 33.753791] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.754055] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.754098] Hardware name: linux,dummy-virt (DT) [ 33.754199] Call trace: [ 33.754239] show_stack+0x20/0x38 (C) [ 33.754311] dump_stack_lvl+0x8c/0xd0 [ 33.754539] print_report+0x118/0x5d0 [ 33.754611] kasan_report+0xdc/0x128 [ 33.754696] kasan_check_range+0x100/0x1a8 [ 33.754755] __kasan_check_write+0x20/0x30 [ 33.754812] kasan_atomics_helper+0x47c/0x4858 [ 33.754916] kasan_atomics+0x198/0x2e0 [ 33.755186] kunit_try_run_case+0x170/0x3f0 [ 33.755302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.755382] kthread+0x328/0x630 [ 33.755428] ret_from_fork+0x10/0x20 [ 33.755483] [ 33.755543] Allocated by task 296: [ 33.755583] kasan_save_stack+0x3c/0x68 [ 33.755629] kasan_save_track+0x20/0x40 [ 33.755678] kasan_save_alloc_info+0x40/0x58 [ 33.755773] __kasan_kmalloc+0xd4/0xd8 [ 33.755815] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.755857] kasan_atomics+0xb8/0x2e0 [ 33.756109] kunit_try_run_case+0x170/0x3f0 [ 33.756181] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.756252] kthread+0x328/0x630 [ 33.756289] ret_from_fork+0x10/0x20 [ 33.756399] [ 33.756424] The buggy address belongs to the object at fff00000c9a67800 [ 33.756424] which belongs to the cache kmalloc-64 of size 64 [ 33.756485] The buggy address is located 0 bytes to the right of [ 33.756485] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 33.756821] The buggy address belongs to the physical page: [ 33.757081] page_type: f5(slab) [ 33.757121] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.757174] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.757548] [ 33.757569] Memory state around the buggy address: [ 33.757969] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.758119] ^ [ 33.758263] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.758335] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.758443] ================================================================== [ 34.020815] ================================================================== [ 34.021031] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 34.021149] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 34.021324] [ 34.021390] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.021477] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.021512] Hardware name: linux,dummy-virt (DT) [ 34.021648] Call trace: [ 34.021672] show_stack+0x20/0x38 (C) [ 34.021740] dump_stack_lvl+0x8c/0xd0 [ 34.021790] print_report+0x118/0x5d0 [ 34.021843] kasan_report+0xdc/0x128 [ 34.022053] kasan_check_range+0x100/0x1a8 [ 34.022152] __kasan_check_write+0x20/0x30 [ 34.022197] kasan_atomics_helper+0x12d8/0x4858 [ 34.022261] kasan_atomics+0x198/0x2e0 [ 34.022310] kunit_try_run_case+0x170/0x3f0 [ 34.022361] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.022423] kthread+0x328/0x630 [ 34.022496] ret_from_fork+0x10/0x20 [ 34.022586] [ 34.022607] Allocated by task 296: [ 34.022639] kasan_save_stack+0x3c/0x68 [ 34.022684] kasan_save_track+0x20/0x40 [ 34.022725] kasan_save_alloc_info+0x40/0x58 [ 34.022765] __kasan_kmalloc+0xd4/0xd8 [ 34.022811] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.022978] kasan_atomics+0xb8/0x2e0 [ 34.023045] kunit_try_run_case+0x170/0x3f0 [ 34.023118] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.023804] kthread+0x328/0x630 [ 34.024074] ret_from_fork+0x10/0x20 [ 34.024139] [ 34.024163] The buggy address belongs to the object at fff00000c9a67800 [ 34.024163] which belongs to the cache kmalloc-64 of size 64 [ 34.024234] The buggy address is located 0 bytes to the right of [ 34.024234] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 34.024300] [ 34.024322] The buggy address belongs to the physical page: [ 34.024355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 34.024409] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.024805] page_type: f5(slab) [ 34.025176] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.025237] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.025279] page dumped because: kasan: bad access detected [ 34.025314] [ 34.025451] Memory state around the buggy address: [ 34.025489] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.025534] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.025748] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.025888] ^ [ 34.026325] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.026422] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.026462] ================================================================== [ 33.926375] ================================================================== [ 33.926430] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 33.926983] Read of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 33.927522] [ 33.927561] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.927786] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.928343] Hardware name: linux,dummy-virt (DT) [ 33.928466] Call trace: [ 33.928667] show_stack+0x20/0x38 (C) [ 33.929001] dump_stack_lvl+0x8c/0xd0 [ 33.929252] print_report+0x118/0x5d0 [ 33.929469] kasan_report+0xdc/0x128 [ 33.929652] kasan_check_range+0x100/0x1a8 [ 33.929754] __kasan_check_read+0x20/0x30 [ 33.930098] kasan_atomics_helper+0xdd4/0x4858 [ 33.930234] kasan_atomics+0x198/0x2e0 [ 33.930559] kunit_try_run_case+0x170/0x3f0 [ 33.930612] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.930669] kthread+0x328/0x630 [ 33.931306] ret_from_fork+0x10/0x20 [ 33.931463] [ 33.931487] Allocated by task 296: [ 33.931519] kasan_save_stack+0x3c/0x68 [ 33.931712] kasan_save_track+0x20/0x40 [ 33.931758] kasan_save_alloc_info+0x40/0x58 [ 33.931805] __kasan_kmalloc+0xd4/0xd8 [ 33.931845] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.932291] kasan_atomics+0xb8/0x2e0 [ 33.932570] kunit_try_run_case+0x170/0x3f0 [ 33.933034] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.933255] kthread+0x328/0x630 [ 33.933304] ret_from_fork+0x10/0x20 [ 33.933390] [ 33.933436] The buggy address belongs to the object at fff00000c9a67800 [ 33.933436] which belongs to the cache kmalloc-64 of size 64 [ 33.933763] The buggy address is located 0 bytes to the right of [ 33.933763] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 33.934236] [ 33.934265] The buggy address belongs to the physical page: [ 33.934562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 33.934621] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.934985] page_type: f5(slab) [ 33.935363] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.935658] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.935775] page dumped because: kasan: bad access detected [ 33.935816] [ 33.936002] Memory state around the buggy address: [ 33.936314] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.936507] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.936629] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.936816] ^ [ 33.936955] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.937033] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.937075] ================================================================== [ 34.026886] ================================================================== [ 34.026936] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 34.026987] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 34.027038] [ 34.027070] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 34.027155] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.027184] Hardware name: linux,dummy-virt (DT) [ 34.027241] Call trace: [ 34.027266] show_stack+0x20/0x38 (C) [ 34.027315] dump_stack_lvl+0x8c/0xd0 [ 34.027364] print_report+0x118/0x5d0 [ 34.027824] kasan_report+0xdc/0x128 [ 34.027946] kasan_check_range+0x100/0x1a8 [ 34.027992] __kasan_check_write+0x20/0x30 [ 34.028038] kasan_atomics_helper+0x1384/0x4858 [ 34.028089] kasan_atomics+0x198/0x2e0 [ 34.028521] kunit_try_run_case+0x170/0x3f0 [ 34.028702] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.028759] kthread+0x328/0x630 [ 34.029159] ret_from_fork+0x10/0x20 [ 34.029247] [ 34.029268] Allocated by task 296: [ 34.029299] kasan_save_stack+0x3c/0x68 [ 34.029344] kasan_save_track+0x20/0x40 [ 34.029453] kasan_save_alloc_info+0x40/0x58 [ 34.029607] __kasan_kmalloc+0xd4/0xd8 [ 34.029648] __kmalloc_cache_noprof+0x16c/0x3c0 [ 34.029690] kasan_atomics+0xb8/0x2e0 [ 34.029731] kunit_try_run_case+0x170/0x3f0 [ 34.029777] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.029827] kthread+0x328/0x630 [ 34.029861] ret_from_fork+0x10/0x20 [ 34.029901] [ 34.029925] The buggy address belongs to the object at fff00000c9a67800 [ 34.029925] which belongs to the cache kmalloc-64 of size 64 [ 34.029984] The buggy address is located 0 bytes to the right of [ 34.029984] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 34.030090] [ 34.030159] The buggy address belongs to the physical page: [ 34.030191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 34.030254] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.030303] page_type: f5(slab) [ 34.030341] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.030678] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.030972] page dumped because: kasan: bad access detected [ 34.031011] [ 34.031034] Memory state around the buggy address: [ 34.031066] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.031169] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.031463] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.031566] ^ [ 34.031882] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.031937] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.032099] ================================================================== [ 33.818849] ================================================================== [ 33.819200] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 33.819339] Write of size 4 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 33.819402] [ 33.819484] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.819573] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.819610] Hardware name: linux,dummy-virt (DT) [ 33.819644] Call trace: [ 33.819669] show_stack+0x20/0x38 (C) [ 33.819719] dump_stack_lvl+0x8c/0xd0 [ 33.819768] print_report+0x118/0x5d0 [ 33.819816] kasan_report+0xdc/0x128 [ 33.819864] kasan_check_range+0x100/0x1a8 [ 33.819910] __kasan_check_write+0x20/0x30 [ 33.819957] kasan_atomics_helper+0x99c/0x4858 [ 33.820008] kasan_atomics+0x198/0x2e0 [ 33.820054] kunit_try_run_case+0x170/0x3f0 [ 33.820104] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.820158] kthread+0x328/0x630 [ 33.820201] ret_from_fork+0x10/0x20 [ 33.820260] [ 33.820283] Allocated by task 296: [ 33.820311] kasan_save_stack+0x3c/0x68 [ 33.820355] kasan_save_track+0x20/0x40 [ 33.820405] kasan_save_alloc_info+0x40/0x58 [ 33.820445] __kasan_kmalloc+0xd4/0xd8 [ 33.820490] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.820533] kasan_atomics+0xb8/0x2e0 [ 33.820973] kunit_try_run_case+0x170/0x3f0 [ 33.821019] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.821096] kthread+0x328/0x630 [ 33.821133] ret_from_fork+0x10/0x20 [ 33.821429] [ 33.821485] The buggy address belongs to the object at fff00000c9a67800 [ 33.821485] which belongs to the cache kmalloc-64 of size 64 [ 33.821627] The buggy address is located 0 bytes to the right of [ 33.821627] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 33.821725] [ 33.821969] The buggy address belongs to the physical page: [ 33.822031] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 33.822107] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.822262] page_type: f5(slab) [ 33.822317] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.822370] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.822657] page dumped because: kasan: bad access detected [ 33.822734] [ 33.822782] Memory state around the buggy address: [ 33.822891] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.823129] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.823217] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.823330] ^ [ 33.823386] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.823441] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.823703] ================================================================== [ 33.985065] ================================================================== [ 33.985134] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 33.985191] Write of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 33.985406] [ 33.985445] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.985604] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.985713] Hardware name: linux,dummy-virt (DT) [ 33.985753] Call trace: [ 33.985806] show_stack+0x20/0x38 (C) [ 33.985856] dump_stack_lvl+0x8c/0xd0 [ 33.985949] print_report+0x118/0x5d0 [ 33.986057] kasan_report+0xdc/0x128 [ 33.986165] kasan_check_range+0x100/0x1a8 [ 33.986228] __kasan_check_write+0x20/0x30 [ 33.986417] kasan_atomics_helper+0x1058/0x4858 [ 33.986522] kasan_atomics+0x198/0x2e0 [ 33.986647] kunit_try_run_case+0x170/0x3f0 [ 33.986703] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.986906] kthread+0x328/0x630 [ 33.986957] ret_from_fork+0x10/0x20 [ 33.987005] [ 33.987025] Allocated by task 296: [ 33.987054] kasan_save_stack+0x3c/0x68 [ 33.987103] kasan_save_track+0x20/0x40 [ 33.987229] kasan_save_alloc_info+0x40/0x58 [ 33.987269] __kasan_kmalloc+0xd4/0xd8 [ 33.987310] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.987376] kasan_atomics+0xb8/0x2e0 [ 33.987417] kunit_try_run_case+0x170/0x3f0 [ 33.987834] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.988095] kthread+0x328/0x630 [ 33.988139] ret_from_fork+0x10/0x20 [ 33.988178] [ 33.988200] The buggy address belongs to the object at fff00000c9a67800 [ 33.988200] which belongs to the cache kmalloc-64 of size 64 [ 33.988712] The buggy address is located 0 bytes to the right of [ 33.988712] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 33.989217] [ 33.989246] The buggy address belongs to the physical page: [ 33.989280] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 33.989334] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.989384] page_type: f5(slab) [ 33.989424] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.989477] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.989675] page dumped because: kasan: bad access detected [ 33.989835] [ 33.989880] Memory state around the buggy address: [ 33.989916] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.989962] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.990160] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.990291] ^ [ 33.990501] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.990557] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.990631] ================================================================== [ 33.937967] ================================================================== [ 33.938019] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 33.938082] Read of size 8 at addr fff00000c9a67830 by task kunit_try_catch/296 [ 33.938337] [ 33.938372] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.938462] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.938492] Hardware name: linux,dummy-virt (DT) [ 33.938533] Call trace: [ 33.938632] show_stack+0x20/0x38 (C) [ 33.938790] dump_stack_lvl+0x8c/0xd0 [ 33.938840] print_report+0x118/0x5d0 [ 33.939007] kasan_report+0xdc/0x128 [ 33.939056] __asan_report_load8_noabort+0x20/0x30 [ 33.939110] kasan_atomics_helper+0x3f58/0x4858 [ 33.939162] kasan_atomics+0x198/0x2e0 [ 33.939704] kunit_try_run_case+0x170/0x3f0 [ 33.939901] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.939992] kthread+0x328/0x630 [ 33.940156] ret_from_fork+0x10/0x20 [ 33.940511] [ 33.940537] Allocated by task 296: [ 33.940569] kasan_save_stack+0x3c/0x68 [ 33.940624] kasan_save_track+0x20/0x40 [ 33.941027] kasan_save_alloc_info+0x40/0x58 [ 33.941074] __kasan_kmalloc+0xd4/0xd8 [ 33.941113] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.941155] kasan_atomics+0xb8/0x2e0 [ 33.941493] kunit_try_run_case+0x170/0x3f0 [ 33.941811] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.941891] kthread+0x328/0x630 [ 33.941928] ret_from_fork+0x10/0x20 [ 33.941966] [ 33.941988] The buggy address belongs to the object at fff00000c9a67800 [ 33.941988] which belongs to the cache kmalloc-64 of size 64 [ 33.942218] The buggy address is located 0 bytes to the right of [ 33.942218] allocated 48-byte region [fff00000c9a67800, fff00000c9a67830) [ 33.942748] [ 33.942776] The buggy address belongs to the physical page: [ 33.942843] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a67 [ 33.942927] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.942978] page_type: f5(slab) [ 33.943174] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.943509] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.943558] page dumped because: kasan: bad access detected [ 33.943605] [ 33.943625] Memory state around the buggy address: [ 33.943688] fff00000c9a67700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.943738] fff00000c9a67780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.943783] >fff00000c9a67800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.943825] ^ [ 33.943860] fff00000c9a67880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.943937] fff00000c9a67900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.943995] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[ 33.495346] ================================================================== [ 33.495408] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 33.495464] Read of size 1 at addr fff00000c9a66118 by task kunit_try_catch/288 [ 33.495590] [ 33.495629] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.495725] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.495756] Hardware name: linux,dummy-virt (DT) [ 33.495790] Call trace: [ 33.495827] show_stack+0x20/0x38 (C) [ 33.495882] dump_stack_lvl+0x8c/0xd0 [ 33.495931] print_report+0x118/0x5d0 [ 33.495982] kasan_report+0xdc/0x128 [ 33.496031] __asan_report_load1_noabort+0x20/0x30 [ 33.496082] memcmp+0x198/0x1d8 [ 33.496127] kasan_memcmp+0x16c/0x300 [ 33.496174] kunit_try_run_case+0x170/0x3f0 [ 33.496239] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.496306] kthread+0x328/0x630 [ 33.496352] ret_from_fork+0x10/0x20 [ 33.496402] [ 33.496425] Allocated by task 288: [ 33.496456] kasan_save_stack+0x3c/0x68 [ 33.496499] kasan_save_track+0x20/0x40 [ 33.497150] kasan_save_alloc_info+0x40/0x58 [ 33.497262] __kasan_kmalloc+0xd4/0xd8 [ 33.497368] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.497446] kasan_memcmp+0xbc/0x300 [ 33.497661] kunit_try_run_case+0x170/0x3f0 [ 33.497704] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.497888] kthread+0x328/0x630 [ 33.498002] ret_from_fork+0x10/0x20 [ 33.498066] [ 33.498163] The buggy address belongs to the object at fff00000c9a66100 [ 33.498163] which belongs to the cache kmalloc-32 of size 32 [ 33.498285] The buggy address is located 0 bytes to the right of [ 33.498285] allocated 24-byte region [fff00000c9a66100, fff00000c9a66118) [ 33.498425] [ 33.498474] The buggy address belongs to the physical page: [ 33.498525] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a66 [ 33.498640] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.498719] page_type: f5(slab) [ 33.498761] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 33.499064] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 33.499134] page dumped because: kasan: bad access detected [ 33.499190] [ 33.499302] Memory state around the buggy address: [ 33.499352] fff00000c9a66000: 00 00 00 fc fc fc fc fc 00 00 00 04 fc fc fc fc [ 33.499446] fff00000c9a66080: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 33.499575] >fff00000c9a66100: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.499635] ^ [ 33.499705] fff00000c9a66180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.500004] fff00000c9a66200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.500084] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[ 33.471187] ================================================================== [ 33.471399] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340 [ 33.471466] Read of size 1 at addr ffff800080b47b4a by task kunit_try_catch/284 [ 33.471615] [ 33.471651] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.471756] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.472046] Hardware name: linux,dummy-virt (DT) [ 33.472108] Call trace: [ 33.472135] show_stack+0x20/0x38 (C) [ 33.472190] dump_stack_lvl+0x8c/0xd0 [ 33.472325] print_report+0x310/0x5d0 [ 33.472380] kasan_report+0xdc/0x128 [ 33.472427] __asan_report_load1_noabort+0x20/0x30 [ 33.472498] kasan_alloca_oob_right+0x2dc/0x340 [ 33.472675] kunit_try_run_case+0x170/0x3f0 [ 33.472743] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.472823] kthread+0x328/0x630 [ 33.472868] ret_from_fork+0x10/0x20 [ 33.473255] [ 33.473294] The buggy address belongs to stack of task kunit_try_catch/284 [ 33.473750] [ 33.473790] The buggy address ffff800080b47b4a belongs to a vmalloc virtual mapping [ 33.473872] The buggy address belongs to the physical page: [ 33.473923] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bd7 [ 33.474087] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.474189] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 33.474290] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.474622] page dumped because: kasan: bad access detected [ 33.474679] [ 33.474740] Memory state around the buggy address: [ 33.474881] ffff800080b47a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.474959] ffff800080b47a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.475027] >ffff800080b47b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 33.475161] ^ [ 33.475236] ffff800080b47b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 33.475305] ffff800080b47c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 33.475637] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[ 33.458026] ================================================================== [ 33.458106] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 33.458163] Read of size 1 at addr ffff800080b37b5f by task kunit_try_catch/282 [ 33.458230] [ 33.458881] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.458988] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.459175] Hardware name: linux,dummy-virt (DT) [ 33.459238] Call trace: [ 33.459293] show_stack+0x20/0x38 (C) [ 33.459356] dump_stack_lvl+0x8c/0xd0 [ 33.459430] print_report+0x310/0x5d0 [ 33.459480] kasan_report+0xdc/0x128 [ 33.459540] __asan_report_load1_noabort+0x20/0x30 [ 33.459912] kasan_alloca_oob_left+0x2b8/0x310 [ 33.460103] kunit_try_run_case+0x170/0x3f0 [ 33.460169] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.460413] kthread+0x328/0x630 [ 33.460478] ret_from_fork+0x10/0x20 [ 33.460537] [ 33.460710] The buggy address belongs to stack of task kunit_try_catch/282 [ 33.461117] [ 33.461167] The buggy address ffff800080b37b5f belongs to a vmalloc virtual mapping [ 33.461289] The buggy address belongs to the physical page: [ 33.461376] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc9 [ 33.461453] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.461882] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 33.462087] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.462155] page dumped because: kasan: bad access detected [ 33.462296] [ 33.462355] Memory state around the buggy address: [ 33.462416] ffff800080b37a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.462474] ffff800080b37a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.462725] >ffff800080b37b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 33.462930] ^ [ 33.463044] ffff800080b37b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 33.463149] ffff800080b37c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 33.463192] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 33.440315] ================================================================== [ 33.440411] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 33.440476] Read of size 1 at addr ffff800080b27c2a by task kunit_try_catch/280 [ 33.440885] [ 33.440977] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.441192] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.441243] Hardware name: linux,dummy-virt (DT) [ 33.441280] Call trace: [ 33.441309] show_stack+0x20/0x38 (C) [ 33.441527] dump_stack_lvl+0x8c/0xd0 [ 33.441648] print_report+0x310/0x5d0 [ 33.441794] kasan_report+0xdc/0x128 [ 33.441871] __asan_report_load1_noabort+0x20/0x30 [ 33.441930] kasan_stack_oob+0x238/0x270 [ 33.442095] kunit_try_run_case+0x170/0x3f0 [ 33.442276] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.442429] kthread+0x328/0x630 [ 33.442507] ret_from_fork+0x10/0x20 [ 33.442583] [ 33.442859] The buggy address belongs to stack of task kunit_try_catch/280 [ 33.443134] and is located at offset 138 in frame: [ 33.443250] kasan_stack_oob+0x0/0x270 [ 33.443755] [ 33.443812] This frame has 4 objects: [ 33.443985] [48, 49) '__assertion' [ 33.444040] [64, 72) 'array' [ 33.444087] [96, 112) '__assertion' [ 33.444132] [128, 138) 'stack_array' [ 33.444190] [ 33.444231] The buggy address ffff800080b27c2a belongs to a vmalloc virtual mapping [ 33.444275] The buggy address belongs to the physical page: [ 33.444309] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ad2 [ 33.444401] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.444469] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 33.444520] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.444912] page dumped because: kasan: bad access detected [ 33.445162] [ 33.445229] Memory state around the buggy address: [ 33.445266] ffff800080b27b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.445599] ffff800080b27b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 33.445664] >ffff800080b27c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 33.445795] ^ [ 33.445859] ffff800080b27c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 [ 33.446076] ffff800080b27d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 33.446163] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 33.418431] ================================================================== [ 33.418509] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 33.418575] Read of size 1 at addr ffff92c7bb9126cd by task kunit_try_catch/276 [ 33.418771] [ 33.418970] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.419088] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.419139] Hardware name: linux,dummy-virt (DT) [ 33.419175] Call trace: [ 33.419258] show_stack+0x20/0x38 (C) [ 33.419336] dump_stack_lvl+0x8c/0xd0 [ 33.419551] print_report+0x310/0x5d0 [ 33.419718] kasan_report+0xdc/0x128 [ 33.419801] __asan_report_load1_noabort+0x20/0x30 [ 33.419856] kasan_global_oob_right+0x230/0x270 [ 33.419966] kunit_try_run_case+0x170/0x3f0 [ 33.420044] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.420111] kthread+0x328/0x630 [ 33.420237] ret_from_fork+0x10/0x20 [ 33.420304] [ 33.420362] The buggy address belongs to the variable: [ 33.420434] global_array+0xd/0x40 [ 33.420492] [ 33.420920] The buggy address ffff92c7bb9126cd belongs to a vmalloc virtual mapping [ 33.421365] The buggy address belongs to the physical page: [ 33.421449] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47d12 [ 33.421633] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 33.421865] raw: 03fffe0000002000 ffffc1ffc01f4488 ffffc1ffc01f4488 0000000000000000 [ 33.421990] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.422061] page dumped because: kasan: bad access detected [ 33.422164] [ 33.422236] Memory state around the buggy address: [ 33.422286] ffff92c7bb912580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.422391] ffff92c7bb912600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.422437] >ffff92c7bb912680: 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 [ 33.422485] ^ [ 33.422549] ffff92c7bb912700: 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 [ 33.422594] ffff92c7bb912780: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00 [ 33.422635] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 33.389961] ================================================================== [ 33.390025] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 33.390279] Free of addr fff00000c9adf701 by task kunit_try_catch/272 [ 33.390356] [ 33.390478] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.390573] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.390601] Hardware name: linux,dummy-virt (DT) [ 33.390700] Call trace: [ 33.390727] show_stack+0x20/0x38 (C) [ 33.390809] dump_stack_lvl+0x8c/0xd0 [ 33.390975] print_report+0x118/0x5d0 [ 33.391031] kasan_report_invalid_free+0xc0/0xe8 [ 33.391134] check_slab_allocation+0xfc/0x108 [ 33.391185] __kasan_mempool_poison_object+0x78/0x150 [ 33.391256] mempool_free+0x28c/0x328 [ 33.391500] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 33.391717] mempool_kmalloc_invalid_free+0xc0/0x118 [ 33.391781] kunit_try_run_case+0x170/0x3f0 [ 33.391906] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.391997] kthread+0x328/0x630 [ 33.392041] ret_from_fork+0x10/0x20 [ 33.392255] [ 33.392273] Allocated by task 272: [ 33.392413] kasan_save_stack+0x3c/0x68 [ 33.392467] kasan_save_track+0x20/0x40 [ 33.392507] kasan_save_alloc_info+0x40/0x58 [ 33.392697] __kasan_mempool_unpoison_object+0x11c/0x180 [ 33.392799] remove_element+0x130/0x1f8 [ 33.393017] mempool_alloc_preallocated+0x58/0xc0 [ 33.393122] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 33.393195] mempool_kmalloc_invalid_free+0xc0/0x118 [ 33.393335] kunit_try_run_case+0x170/0x3f0 [ 33.393394] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.393463] kthread+0x328/0x630 [ 33.393592] ret_from_fork+0x10/0x20 [ 33.393656] [ 33.393805] The buggy address belongs to the object at fff00000c9adf700 [ 33.393805] which belongs to the cache kmalloc-128 of size 128 [ 33.393966] The buggy address is located 1 bytes inside of [ 33.393966] 128-byte region [fff00000c9adf700, fff00000c9adf780) [ 33.394061] [ 33.394082] The buggy address belongs to the physical page: [ 33.394227] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109adf [ 33.394291] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.394343] page_type: f5(slab) [ 33.394450] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.394520] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.394561] page dumped because: kasan: bad access detected [ 33.394590] [ 33.394618] Memory state around the buggy address: [ 33.394651] fff00000c9adf600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.394695] fff00000c9adf680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.394753] >fff00000c9adf700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.394809] ^ [ 33.394845] fff00000c9adf780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.394888] fff00000c9adf800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.394936] ================================================================== [ 33.405163] ================================================================== [ 33.405273] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 33.405349] Free of addr fff00000c9b94001 by task kunit_try_catch/274 [ 33.405470] [ 33.405570] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.405709] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.405778] Hardware name: linux,dummy-virt (DT) [ 33.405839] Call trace: [ 33.405871] show_stack+0x20/0x38 (C) [ 33.406052] dump_stack_lvl+0x8c/0xd0 [ 33.406107] print_report+0x118/0x5d0 [ 33.406286] kasan_report_invalid_free+0xc0/0xe8 [ 33.406554] __kasan_mempool_poison_object+0xfc/0x150 [ 33.406660] mempool_free+0x28c/0x328 [ 33.406770] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 33.406858] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 33.407015] kunit_try_run_case+0x170/0x3f0 [ 33.407097] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.407205] kthread+0x328/0x630 [ 33.407287] ret_from_fork+0x10/0x20 [ 33.407394] [ 33.407444] The buggy address belongs to the physical page: [ 33.407515] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b94 [ 33.407613] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.407685] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.407821] page_type: f8(unknown) [ 33.407874] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.407950] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 33.408255] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.408324] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 33.408425] head: 0bfffe0000000002 ffffc1ffc326e501 00000000ffffffff 00000000ffffffff [ 33.408485] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 33.408525] page dumped because: kasan: bad access detected [ 33.408852] [ 33.408899] Memory state around the buggy address: [ 33.409012] fff00000c9b93f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.409091] fff00000c9b93f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.409180] >fff00000c9b94000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.409254] ^ [ 33.409311] fff00000c9b94080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.409481] fff00000c9b94100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.409574] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 33.347580] ================================================================== [ 33.347640] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 33.347695] Free of addr fff00000c9b90000 by task kunit_try_catch/268 [ 33.347737] [ 33.347770] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.347853] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.347881] Hardware name: linux,dummy-virt (DT) [ 33.347915] Call trace: [ 33.347938] show_stack+0x20/0x38 (C) [ 33.347988] dump_stack_lvl+0x8c/0xd0 [ 33.348033] print_report+0x118/0x5d0 [ 33.348081] kasan_report_invalid_free+0xc0/0xe8 [ 33.348131] __kasan_mempool_poison_object+0x14c/0x150 [ 33.348658] mempool_free+0x28c/0x328 [ 33.348714] mempool_double_free_helper+0x150/0x2e8 [ 33.348799] mempool_kmalloc_large_double_free+0xc0/0x118 [ 33.348855] kunit_try_run_case+0x170/0x3f0 [ 33.348906] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.348960] kthread+0x328/0x630 [ 33.349002] ret_from_fork+0x10/0x20 [ 33.349050] [ 33.349071] The buggy address belongs to the physical page: [ 33.349101] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b90 [ 33.349156] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.349203] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.349267] page_type: f8(unknown) [ 33.349308] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.349439] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 33.349621] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.349788] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 33.349906] head: 0bfffe0000000002 ffffc1ffc326e401 00000000ffffffff 00000000ffffffff [ 33.349961] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 33.350067] page dumped because: kasan: bad access detected [ 33.350098] [ 33.350160] Memory state around the buggy address: [ 33.350277] fff00000c9b8ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.350321] fff00000c9b8ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.350363] >fff00000c9b90000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.350429] ^ [ 33.350464] fff00000c9b90080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.350841] fff00000c9b90100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.350889] ================================================================== [ 33.367757] ================================================================== [ 33.367826] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 33.367883] Free of addr fff00000c9b94000 by task kunit_try_catch/270 [ 33.367925] [ 33.367957] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.368044] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.368069] Hardware name: linux,dummy-virt (DT) [ 33.368101] Call trace: [ 33.368124] show_stack+0x20/0x38 (C) [ 33.368173] dump_stack_lvl+0x8c/0xd0 [ 33.368231] print_report+0x118/0x5d0 [ 33.368280] kasan_report_invalid_free+0xc0/0xe8 [ 33.368712] __kasan_mempool_poison_pages+0xe0/0xe8 [ 33.368787] mempool_free+0x24c/0x328 [ 33.368835] mempool_double_free_helper+0x150/0x2e8 [ 33.369335] mempool_page_alloc_double_free+0xbc/0x118 [ 33.369389] kunit_try_run_case+0x170/0x3f0 [ 33.369499] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.369559] kthread+0x328/0x630 [ 33.369606] ret_from_fork+0x10/0x20 [ 33.370285] [ 33.370394] The buggy address belongs to the physical page: [ 33.370428] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b94 [ 33.370483] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.370547] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 33.370914] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.370961] page dumped because: kasan: bad access detected [ 33.370991] [ 33.371079] Memory state around the buggy address: [ 33.371113] fff00000c9b93f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.371336] fff00000c9b93f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.371384] >fff00000c9b94000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.371421] ^ [ 33.371686] fff00000c9b94080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.371829] fff00000c9b94100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.371873] ================================================================== [ 33.335484] ================================================================== [ 33.335631] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 33.335790] Free of addr fff00000c9adf300 by task kunit_try_catch/266 [ 33.335961] [ 33.336042] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.336840] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.336920] Hardware name: linux,dummy-virt (DT) [ 33.336952] Call trace: [ 33.336976] show_stack+0x20/0x38 (C) [ 33.337095] dump_stack_lvl+0x8c/0xd0 [ 33.337200] print_report+0x118/0x5d0 [ 33.337497] kasan_report_invalid_free+0xc0/0xe8 [ 33.337566] check_slab_allocation+0xd4/0x108 [ 33.337663] __kasan_mempool_poison_object+0x78/0x150 [ 33.337715] mempool_free+0x28c/0x328 [ 33.337832] mempool_double_free_helper+0x150/0x2e8 [ 33.338035] mempool_kmalloc_double_free+0xc0/0x118 [ 33.338108] kunit_try_run_case+0x170/0x3f0 [ 33.338183] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.338246] kthread+0x328/0x630 [ 33.338290] ret_from_fork+0x10/0x20 [ 33.338338] [ 33.338356] Allocated by task 266: [ 33.338387] kasan_save_stack+0x3c/0x68 [ 33.338446] kasan_save_track+0x20/0x40 [ 33.338557] kasan_save_alloc_info+0x40/0x58 [ 33.338596] __kasan_mempool_unpoison_object+0x11c/0x180 [ 33.338668] remove_element+0x130/0x1f8 [ 33.338706] mempool_alloc_preallocated+0x58/0xc0 [ 33.338777] mempool_double_free_helper+0x94/0x2e8 [ 33.338818] mempool_kmalloc_double_free+0xc0/0x118 [ 33.338874] kunit_try_run_case+0x170/0x3f0 [ 33.338912] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.338957] kthread+0x328/0x630 [ 33.338988] ret_from_fork+0x10/0x20 [ 33.339024] [ 33.339041] Freed by task 266: [ 33.339066] kasan_save_stack+0x3c/0x68 [ 33.339105] kasan_save_track+0x20/0x40 [ 33.339143] kasan_save_free_info+0x4c/0x78 [ 33.339179] __kasan_mempool_poison_object+0xc0/0x150 [ 33.339266] mempool_free+0x28c/0x328 [ 33.339379] mempool_double_free_helper+0x100/0x2e8 [ 33.339475] mempool_kmalloc_double_free+0xc0/0x118 [ 33.339524] kunit_try_run_case+0x170/0x3f0 [ 33.339600] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.339658] kthread+0x328/0x630 [ 33.339701] ret_from_fork+0x10/0x20 [ 33.339737] [ 33.339756] The buggy address belongs to the object at fff00000c9adf300 [ 33.339756] which belongs to the cache kmalloc-128 of size 128 [ 33.339815] The buggy address is located 0 bytes inside of [ 33.339815] 128-byte region [fff00000c9adf300, fff00000c9adf380) [ 33.339874] [ 33.339893] The buggy address belongs to the physical page: [ 33.339923] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109adf [ 33.340073] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.340120] page_type: f5(slab) [ 33.340164] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.340290] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.340331] page dumped because: kasan: bad access detected [ 33.340402] [ 33.340419] Memory state around the buggy address: [ 33.340450] fff00000c9adf200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.340492] fff00000c9adf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.340534] >fff00000c9adf300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.340579] ^ [ 33.340610] fff00000c9adf380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.340688] fff00000c9adf400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.341044] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 33.267172] ================================================================== [ 33.267251] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 33.267672] Read of size 1 at addr fff00000c9b90000 by task kunit_try_catch/260 [ 33.267760] [ 33.267797] CPU: 0 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.267987] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.268016] Hardware name: linux,dummy-virt (DT) [ 33.268057] Call trace: [ 33.268139] show_stack+0x20/0x38 (C) [ 33.268192] dump_stack_lvl+0x8c/0xd0 [ 33.268388] print_report+0x118/0x5d0 [ 33.268610] kasan_report+0xdc/0x128 [ 33.268777] __asan_report_load1_noabort+0x20/0x30 [ 33.268865] mempool_uaf_helper+0x314/0x340 [ 33.268973] mempool_kmalloc_large_uaf+0xc4/0x120 [ 33.269021] kunit_try_run_case+0x170/0x3f0 [ 33.269238] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.269417] kthread+0x328/0x630 [ 33.269509] ret_from_fork+0x10/0x20 [ 33.269585] [ 33.269607] The buggy address belongs to the physical page: [ 33.269641] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b90 [ 33.269711] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.269766] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.269828] page_type: f8(unknown) [ 33.269869] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.269918] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 33.269984] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.270032] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 33.270086] head: 0bfffe0000000002 ffffc1ffc326e401 00000000ffffffff 00000000ffffffff [ 33.270135] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 33.270174] page dumped because: kasan: bad access detected [ 33.270226] [ 33.270251] Memory state around the buggy address: [ 33.270300] fff00000c9b8ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.270352] fff00000c9b8ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.270405] >fff00000c9b90000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.270453] ^ [ 33.270499] fff00000c9b90080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.270550] fff00000c9b90100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.270587] ================================================================== [ 33.324105] ================================================================== [ 33.325238] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 33.325448] Read of size 1 at addr fff00000c9b90000 by task kunit_try_catch/264 [ 33.325510] [ 33.325547] CPU: 0 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.325664] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.325693] Hardware name: linux,dummy-virt (DT) [ 33.325725] Call trace: [ 33.325749] show_stack+0x20/0x38 (C) [ 33.325800] dump_stack_lvl+0x8c/0xd0 [ 33.325849] print_report+0x118/0x5d0 [ 33.325897] kasan_report+0xdc/0x128 [ 33.325943] __asan_report_load1_noabort+0x20/0x30 [ 33.325990] mempool_uaf_helper+0x314/0x340 [ 33.326037] mempool_page_alloc_uaf+0xc0/0x118 [ 33.326085] kunit_try_run_case+0x170/0x3f0 [ 33.326296] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.326436] kthread+0x328/0x630 [ 33.326603] ret_from_fork+0x10/0x20 [ 33.326657] [ 33.326762] The buggy address belongs to the physical page: [ 33.326850] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b90 [ 33.326903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.326966] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 33.327016] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.327055] page dumped because: kasan: bad access detected [ 33.327085] [ 33.327105] Memory state around the buggy address: [ 33.327135] fff00000c9b8ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.327178] fff00000c9b8ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.327229] >fff00000c9b90000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.327318] ^ [ 33.327379] fff00000c9b90080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.327476] fff00000c9b90100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 33.327580] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 33.286850] ================================================================== [ 33.286915] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 33.287004] Read of size 1 at addr fff00000c9bcb240 by task kunit_try_catch/262 [ 33.287056] [ 33.287089] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.287174] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.287200] Hardware name: linux,dummy-virt (DT) [ 33.287245] Call trace: [ 33.287270] show_stack+0x20/0x38 (C) [ 33.287328] dump_stack_lvl+0x8c/0xd0 [ 33.287376] print_report+0x118/0x5d0 [ 33.287424] kasan_report+0xdc/0x128 [ 33.287470] __asan_report_load1_noabort+0x20/0x30 [ 33.287518] mempool_uaf_helper+0x314/0x340 [ 33.287565] mempool_slab_uaf+0xc0/0x118 [ 33.287612] kunit_try_run_case+0x170/0x3f0 [ 33.287661] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.287726] kthread+0x328/0x630 [ 33.287770] ret_from_fork+0x10/0x20 [ 33.287818] [ 33.287839] Allocated by task 262: [ 33.287867] kasan_save_stack+0x3c/0x68 [ 33.287909] kasan_save_track+0x20/0x40 [ 33.287948] kasan_save_alloc_info+0x40/0x58 [ 33.287997] __kasan_mempool_unpoison_object+0xbc/0x180 [ 33.288044] remove_element+0x16c/0x1f8 [ 33.288083] mempool_alloc_preallocated+0x58/0xc0 [ 33.288123] mempool_uaf_helper+0xa4/0x340 [ 33.288161] mempool_slab_uaf+0xc0/0x118 [ 33.288215] kunit_try_run_case+0x170/0x3f0 [ 33.288442] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.288782] kthread+0x328/0x630 [ 33.289060] ret_from_fork+0x10/0x20 [ 33.289383] [ 33.289429] Freed by task 262: [ 33.289976] kasan_save_stack+0x3c/0x68 [ 33.290070] kasan_save_track+0x20/0x40 [ 33.290472] kasan_save_free_info+0x4c/0x78 [ 33.290559] __kasan_mempool_poison_object+0xc0/0x150 [ 33.290751] mempool_free+0x28c/0x328 [ 33.290803] mempool_uaf_helper+0x104/0x340 [ 33.291035] mempool_slab_uaf+0xc0/0x118 [ 33.291195] kunit_try_run_case+0x170/0x3f0 [ 33.291258] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.291446] kthread+0x328/0x630 [ 33.291637] ret_from_fork+0x10/0x20 [ 33.291799] [ 33.291944] The buggy address belongs to the object at fff00000c9bcb240 [ 33.291944] which belongs to the cache test_cache of size 123 [ 33.292175] The buggy address is located 0 bytes inside of [ 33.292175] freed 123-byte region [fff00000c9bcb240, fff00000c9bcb2bb) [ 33.292321] [ 33.292346] The buggy address belongs to the physical page: [ 33.292518] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bcb [ 33.292778] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.292896] page_type: f5(slab) [ 33.292952] raw: 0bfffe0000000000 fff00000c9ad5500 dead000000000122 0000000000000000 [ 33.293002] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 33.293349] page dumped because: kasan: bad access detected [ 33.293403] [ 33.293438] Memory state around the buggy address: [ 33.293550] fff00000c9bcb100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.293630] fff00000c9bcb180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.293691] >fff00000c9bcb200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 33.293895] ^ [ 33.294047] fff00000c9bcb280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.294260] fff00000c9bcb300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.294348] ================================================================== [ 33.246704] ================================================================== [ 33.246778] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 33.246847] Read of size 1 at addr fff00000c9a9cf00 by task kunit_try_catch/258 [ 33.246926] [ 33.246974] CPU: 0 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.247238] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.247288] Hardware name: linux,dummy-virt (DT) [ 33.247499] Call trace: [ 33.247538] show_stack+0x20/0x38 (C) [ 33.247596] dump_stack_lvl+0x8c/0xd0 [ 33.247794] print_report+0x118/0x5d0 [ 33.247934] kasan_report+0xdc/0x128 [ 33.248101] __asan_report_load1_noabort+0x20/0x30 [ 33.248224] mempool_uaf_helper+0x314/0x340 [ 33.248296] mempool_kmalloc_uaf+0xc4/0x120 [ 33.248514] kunit_try_run_case+0x170/0x3f0 [ 33.248763] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.248972] kthread+0x328/0x630 [ 33.249204] ret_from_fork+0x10/0x20 [ 33.249309] [ 33.249328] Allocated by task 258: [ 33.249392] kasan_save_stack+0x3c/0x68 [ 33.249480] kasan_save_track+0x20/0x40 [ 33.249554] kasan_save_alloc_info+0x40/0x58 [ 33.249798] __kasan_mempool_unpoison_object+0x11c/0x180 [ 33.249854] remove_element+0x130/0x1f8 [ 33.250086] mempool_alloc_preallocated+0x58/0xc0 [ 33.250315] mempool_uaf_helper+0xa4/0x340 [ 33.250648] mempool_kmalloc_uaf+0xc4/0x120 [ 33.250815] kunit_try_run_case+0x170/0x3f0 [ 33.250865] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.250941] kthread+0x328/0x630 [ 33.251260] ret_from_fork+0x10/0x20 [ 33.251395] [ 33.251444] Freed by task 258: [ 33.251632] kasan_save_stack+0x3c/0x68 [ 33.251713] kasan_save_track+0x20/0x40 [ 33.251984] kasan_save_free_info+0x4c/0x78 [ 33.252108] __kasan_mempool_poison_object+0xc0/0x150 [ 33.252184] mempool_free+0x28c/0x328 [ 33.252257] mempool_uaf_helper+0x104/0x340 [ 33.252469] mempool_kmalloc_uaf+0xc4/0x120 [ 33.252611] kunit_try_run_case+0x170/0x3f0 [ 33.252900] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.253249] kthread+0x328/0x630 [ 33.253359] ret_from_fork+0x10/0x20 [ 33.253440] [ 33.253487] The buggy address belongs to the object at fff00000c9a9cf00 [ 33.253487] which belongs to the cache kmalloc-128 of size 128 [ 33.253560] The buggy address is located 0 bytes inside of [ 33.253560] freed 128-byte region [fff00000c9a9cf00, fff00000c9a9cf80) [ 33.253825] [ 33.253939] The buggy address belongs to the physical page: [ 33.254001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a9c [ 33.254130] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.254272] page_type: f5(slab) [ 33.254318] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.254736] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000 [ 33.254794] page dumped because: kasan: bad access detected [ 33.254995] [ 33.255362] Memory state around the buggy address: [ 33.255716] fff00000c9a9ce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.255919] fff00000c9a9ce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.255988] >fff00000c9a9cf00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.256029] ^ [ 33.256077] fff00000c9a9cf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.256282] fff00000c9a9d000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.256362] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 33.180529] ================================================================== [ 33.180949] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 33.181022] Read of size 1 at addr fff00000c9b2e001 by task kunit_try_catch/254 [ 33.181112] [ 33.181146] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.181243] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.181268] Hardware name: linux,dummy-virt (DT) [ 33.181301] Call trace: [ 33.181324] show_stack+0x20/0x38 (C) [ 33.181372] dump_stack_lvl+0x8c/0xd0 [ 33.181418] print_report+0x118/0x5d0 [ 33.181641] kasan_report+0xdc/0x128 [ 33.181870] __asan_report_load1_noabort+0x20/0x30 [ 33.181924] mempool_oob_right_helper+0x2ac/0x2f0 [ 33.181972] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 33.182404] kunit_try_run_case+0x170/0x3f0 [ 33.182485] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.182760] kthread+0x328/0x630 [ 33.182989] ret_from_fork+0x10/0x20 [ 33.183315] [ 33.183471] The buggy address belongs to the physical page: [ 33.183634] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b2c [ 33.183866] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 33.184340] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 33.184406] page_type: f8(unknown) [ 33.184493] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.184544] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 33.185013] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 33.185093] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 33.185145] head: 0bfffe0000000002 ffffc1ffc326cb01 00000000ffffffff 00000000ffffffff [ 33.185193] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 33.185242] page dumped because: kasan: bad access detected [ 33.185276] [ 33.185295] Memory state around the buggy address: [ 33.185327] fff00000c9b2df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.185774] fff00000c9b2df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.186038] >fff00000c9b2e000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 33.186086] ^ [ 33.186410] fff00000c9b2e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 33.186473] fff00000c9b2e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 33.186511] ================================================================== [ 33.204005] ================================================================== [ 33.204091] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 33.204293] Read of size 1 at addr fff00000c9add2bb by task kunit_try_catch/256 [ 33.204447] [ 33.204487] CPU: 0 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.204638] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.204666] Hardware name: linux,dummy-virt (DT) [ 33.204860] Call trace: [ 33.205255] show_stack+0x20/0x38 (C) [ 33.205352] dump_stack_lvl+0x8c/0xd0 [ 33.205596] print_report+0x118/0x5d0 [ 33.205778] kasan_report+0xdc/0x128 [ 33.206002] __asan_report_load1_noabort+0x20/0x30 [ 33.206117] mempool_oob_right_helper+0x2ac/0x2f0 [ 33.206347] mempool_slab_oob_right+0xc0/0x118 [ 33.206445] kunit_try_run_case+0x170/0x3f0 [ 33.206529] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.206803] kthread+0x328/0x630 [ 33.206967] ret_from_fork+0x10/0x20 [ 33.207084] [ 33.207117] Allocated by task 256: [ 33.207154] kasan_save_stack+0x3c/0x68 [ 33.207233] kasan_save_track+0x20/0x40 [ 33.207273] kasan_save_alloc_info+0x40/0x58 [ 33.207311] __kasan_mempool_unpoison_object+0xbc/0x180 [ 33.207355] remove_element+0x16c/0x1f8 [ 33.207401] mempool_alloc_preallocated+0x58/0xc0 [ 33.207442] mempool_oob_right_helper+0x98/0x2f0 [ 33.207490] mempool_slab_oob_right+0xc0/0x118 [ 33.207532] kunit_try_run_case+0x170/0x3f0 [ 33.207579] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.207632] kthread+0x328/0x630 [ 33.207671] ret_from_fork+0x10/0x20 [ 33.207717] [ 33.207746] The buggy address belongs to the object at fff00000c9add240 [ 33.207746] which belongs to the cache test_cache of size 123 [ 33.207814] The buggy address is located 0 bytes to the right of [ 33.207814] allocated 123-byte region [fff00000c9add240, fff00000c9add2bb) [ 33.207877] [ 33.207904] The buggy address belongs to the physical page: [ 33.207954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109add [ 33.208014] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.208075] page_type: f5(slab) [ 33.208116] raw: 0bfffe0000000000 fff00000c9ad53c0 dead000000000122 0000000000000000 [ 33.208171] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 33.208401] page dumped because: kasan: bad access detected [ 33.208493] [ 33.208732] Memory state around the buggy address: [ 33.208945] fff00000c9add180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.209096] fff00000c9add200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 33.209167] >fff00000c9add280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 33.209372] ^ [ 33.209417] fff00000c9add300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.209462] fff00000c9add380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.209501] ================================================================== [ 33.171428] ================================================================== [ 33.171503] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 33.171578] Read of size 1 at addr fff00000c9a9cb73 by task kunit_try_catch/252 [ 33.171629] [ 33.171671] CPU: 0 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 33.171760] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.171786] Hardware name: linux,dummy-virt (DT) [ 33.171820] Call trace: [ 33.171846] show_stack+0x20/0x38 (C) [ 33.171899] dump_stack_lvl+0x8c/0xd0 [ 33.171949] print_report+0x118/0x5d0 [ 33.171998] kasan_report+0xdc/0x128 [ 33.172045] __asan_report_load1_noabort+0x20/0x30 [ 33.172093] mempool_oob_right_helper+0x2ac/0x2f0 [ 33.172142] mempool_kmalloc_oob_right+0xc4/0x120 [ 33.172192] kunit_try_run_case+0x170/0x3f0 [ 33.172261] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.172315] kthread+0x328/0x630 [ 33.172358] ret_from_fork+0x10/0x20 [ 33.172408] [ 33.172427] Allocated by task 252: [ 33.172458] kasan_save_stack+0x3c/0x68 [ 33.172500] kasan_save_track+0x20/0x40 [ 33.172548] kasan_save_alloc_info+0x40/0x58 [ 33.172616] __kasan_mempool_unpoison_object+0x11c/0x180 [ 33.172680] remove_element+0x130/0x1f8 [ 33.172721] mempool_alloc_preallocated+0x58/0xc0 [ 33.172762] mempool_oob_right_helper+0x98/0x2f0 [ 33.172801] mempool_kmalloc_oob_right+0xc4/0x120 [ 33.172843] kunit_try_run_case+0x170/0x3f0 [ 33.172881] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.172927] kthread+0x328/0x630 [ 33.172970] ret_from_fork+0x10/0x20 [ 33.173006] [ 33.173026] The buggy address belongs to the object at fff00000c9a9cb00 [ 33.173026] which belongs to the cache kmalloc-128 of size 128 [ 33.173086] The buggy address is located 0 bytes to the right of [ 33.173086] allocated 115-byte region [fff00000c9a9cb00, fff00000c9a9cb73) [ 33.173151] [ 33.173174] The buggy address belongs to the physical page: [ 33.173219] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a9c [ 33.173277] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.173329] page_type: f5(slab) [ 33.173372] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.173422] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.173464] page dumped because: kasan: bad access detected [ 33.173495] [ 33.173515] Memory state around the buggy address: [ 33.173547] fff00000c9a9ca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.173595] fff00000c9a9ca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.173641] >fff00000c9a9cb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 33.173680] ^ [ 33.173720] fff00000c9a9cb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.173763] fff00000c9a9cc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 33.173802] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 32.609958] ================================================================== [ 32.610038] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300 [ 32.610162] Read of size 1 at addr fff00000c9ad5000 by task kunit_try_catch/246 [ 32.610299] [ 32.610348] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 32.610441] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.610470] Hardware name: linux,dummy-virt (DT) [ 32.610502] Call trace: [ 32.610528] show_stack+0x20/0x38 (C) [ 32.610581] dump_stack_lvl+0x8c/0xd0 [ 32.610645] print_report+0x118/0x5d0 [ 32.610695] kasan_report+0xdc/0x128 [ 32.610740] __kasan_check_byte+0x54/0x70 [ 32.610787] kmem_cache_destroy+0x34/0x218 [ 32.610835] kmem_cache_double_destroy+0x174/0x300 [ 32.610884] kunit_try_run_case+0x170/0x3f0 [ 32.610937] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.611001] kthread+0x328/0x630 [ 32.611047] ret_from_fork+0x10/0x20 [ 32.611096] [ 32.611115] Allocated by task 246: [ 32.611144] kasan_save_stack+0x3c/0x68 [ 32.611187] kasan_save_track+0x20/0x40 [ 32.611666] kasan_save_alloc_info+0x40/0x58 [ 32.611730] __kasan_slab_alloc+0xa8/0xb0 [ 32.611770] kmem_cache_alloc_noprof+0x10c/0x398 [ 32.611830] __kmem_cache_create_args+0x178/0x280 [ 32.611890] kmem_cache_double_destroy+0xc0/0x300 [ 32.611947] kunit_try_run_case+0x170/0x3f0 [ 32.611994] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.612040] kthread+0x328/0x630 [ 32.612071] ret_from_fork+0x10/0x20 [ 32.612107] [ 32.612127] Freed by task 246: [ 32.612153] kasan_save_stack+0x3c/0x68 [ 32.612192] kasan_save_track+0x20/0x40 [ 32.612310] kasan_save_free_info+0x4c/0x78 [ 32.612355] __kasan_slab_free+0x6c/0x98 [ 32.612392] kmem_cache_free+0x260/0x468 [ 32.612430] slab_kmem_cache_release+0x38/0x50 [ 32.612488] kmem_cache_release+0x1c/0x30 [ 32.612526] kobject_put+0x17c/0x420 [ 32.612656] sysfs_slab_release+0x1c/0x30 [ 32.612728] kmem_cache_destroy+0x118/0x218 [ 32.612798] kmem_cache_double_destroy+0x128/0x300 [ 32.612866] kunit_try_run_case+0x170/0x3f0 [ 32.612919] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.612965] kthread+0x328/0x630 [ 32.612999] ret_from_fork+0x10/0x20 [ 32.613035] [ 32.613055] The buggy address belongs to the object at fff00000c9ad5000 [ 32.613055] which belongs to the cache kmem_cache of size 208 [ 32.613189] The buggy address is located 0 bytes inside of [ 32.613189] freed 208-byte region [fff00000c9ad5000, fff00000c9ad50d0) [ 32.613267] [ 32.613293] The buggy address belongs to the physical page: [ 32.613371] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ad5 [ 32.613459] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.613519] page_type: f5(slab) [ 32.613588] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000 [ 32.613689] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000 [ 32.613749] page dumped because: kasan: bad access detected [ 32.613821] [ 32.613914] Memory state around the buggy address: [ 32.613960] fff00000c9ad4f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.614221] fff00000c9ad4f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.614310] >fff00000c9ad5000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.614411] ^ [ 32.614471] fff00000c9ad5080: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 32.614560] fff00000c9ad5100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.614651] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 32.206453] ================================================================== [ 32.206781] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468 [ 32.206899] Read of size 1 at addr fff00000c9ad4000 by task kunit_try_catch/244 [ 32.206953] [ 32.207000] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 32.207194] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.207239] Hardware name: linux,dummy-virt (DT) [ 32.207292] Call trace: [ 32.207548] show_stack+0x20/0x38 (C) [ 32.207701] dump_stack_lvl+0x8c/0xd0 [ 32.207793] print_report+0x118/0x5d0 [ 32.207869] kasan_report+0xdc/0x128 [ 32.207918] __asan_report_load1_noabort+0x20/0x30 [ 32.208157] kmem_cache_rcu_uaf+0x388/0x468 [ 32.208304] kunit_try_run_case+0x170/0x3f0 [ 32.208371] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.208427] kthread+0x328/0x630 [ 32.208725] ret_from_fork+0x10/0x20 [ 32.208933] [ 32.208995] Allocated by task 244: [ 32.209165] kasan_save_stack+0x3c/0x68 [ 32.209303] kasan_save_track+0x20/0x40 [ 32.209372] kasan_save_alloc_info+0x40/0x58 [ 32.209435] __kasan_slab_alloc+0xa8/0xb0 [ 32.209557] kmem_cache_alloc_noprof+0x10c/0x398 [ 32.209638] kmem_cache_rcu_uaf+0x12c/0x468 [ 32.209745] kunit_try_run_case+0x170/0x3f0 [ 32.209858] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.210077] kthread+0x328/0x630 [ 32.210177] ret_from_fork+0x10/0x20 [ 32.210350] [ 32.210425] Freed by task 0: [ 32.210485] kasan_save_stack+0x3c/0x68 [ 32.210715] kasan_save_track+0x20/0x40 [ 32.210804] kasan_save_free_info+0x4c/0x78 [ 32.210953] __kasan_slab_free+0x6c/0x98 [ 32.211017] slab_free_after_rcu_debug+0xd4/0x2f8 [ 32.211147] rcu_core+0x9f4/0x1e20 [ 32.211250] rcu_core_si+0x18/0x30 [ 32.211338] handle_softirqs+0x374/0xb28 [ 32.211427] __do_softirq+0x1c/0x28 [ 32.211500] [ 32.211789] Last potentially related work creation: [ 32.211844] kasan_save_stack+0x3c/0x68 [ 32.211907] kasan_record_aux_stack+0xb4/0xc8 [ 32.212037] kmem_cache_free+0x120/0x468 [ 32.212106] kmem_cache_rcu_uaf+0x16c/0x468 [ 32.212323] kunit_try_run_case+0x170/0x3f0 [ 32.212445] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.212501] kthread+0x328/0x630 [ 32.212536] ret_from_fork+0x10/0x20 [ 32.212788] [ 32.213026] The buggy address belongs to the object at fff00000c9ad4000 [ 32.213026] which belongs to the cache test_cache of size 200 [ 32.213138] The buggy address is located 0 bytes inside of [ 32.213138] freed 200-byte region [fff00000c9ad4000, fff00000c9ad40c8) [ 32.213300] [ 32.213328] The buggy address belongs to the physical page: [ 32.213361] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ad4 [ 32.213644] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.213797] page_type: f5(slab) [ 32.213898] raw: 0bfffe0000000000 fff00000c5c50dc0 dead000000000122 0000000000000000 [ 32.214015] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 32.214076] page dumped because: kasan: bad access detected [ 32.214196] [ 32.214269] Memory state around the buggy address: [ 32.214329] fff00000c9ad3f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.214464] fff00000c9ad3f80: 00 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc [ 32.214519] >fff00000c9ad4000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.214569] ^ [ 32.214633] fff00000c9ad4080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 32.214818] fff00000c9ad4100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.214996] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 31.774822] ================================================================== [ 31.775341] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 31.775423] Free of addr fff00000c9a8a001 by task kunit_try_catch/242 [ 31.775511] [ 31.775561] CPU: 0 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 31.775655] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.775684] Hardware name: linux,dummy-virt (DT) [ 31.775738] Call trace: [ 31.775780] show_stack+0x20/0x38 (C) [ 31.775862] dump_stack_lvl+0x8c/0xd0 [ 31.775931] print_report+0x118/0x5d0 [ 31.775990] kasan_report_invalid_free+0xc0/0xe8 [ 31.776042] check_slab_allocation+0xfc/0x108 [ 31.776109] __kasan_slab_pre_free+0x2c/0x48 [ 31.776167] kmem_cache_free+0xf0/0x468 [ 31.776227] kmem_cache_invalid_free+0x184/0x3c8 [ 31.776277] kunit_try_run_case+0x170/0x3f0 [ 31.776497] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.776578] kthread+0x328/0x630 [ 31.776628] ret_from_fork+0x10/0x20 [ 31.776718] [ 31.776773] Allocated by task 242: [ 31.776817] kasan_save_stack+0x3c/0x68 [ 31.776886] kasan_save_track+0x20/0x40 [ 31.776993] kasan_save_alloc_info+0x40/0x58 [ 31.777064] __kasan_slab_alloc+0xa8/0xb0 [ 31.777134] kmem_cache_alloc_noprof+0x10c/0x398 [ 31.777251] kmem_cache_invalid_free+0x12c/0x3c8 [ 31.777319] kunit_try_run_case+0x170/0x3f0 [ 31.777432] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.777537] kthread+0x328/0x630 [ 31.777594] ret_from_fork+0x10/0x20 [ 31.777694] [ 31.777736] The buggy address belongs to the object at fff00000c9a8a000 [ 31.777736] which belongs to the cache test_cache of size 200 [ 31.777813] The buggy address is located 1 bytes inside of [ 31.777813] 200-byte region [fff00000c9a8a000, fff00000c9a8a0c8) [ 31.777883] [ 31.777903] The buggy address belongs to the physical page: [ 31.777935] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8a [ 31.778247] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.778311] page_type: f5(slab) [ 31.778354] raw: 0bfffe0000000000 fff00000c5c50c80 dead000000000122 0000000000000000 [ 31.778405] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 31.778445] page dumped because: kasan: bad access detected [ 31.778476] [ 31.778495] Memory state around the buggy address: [ 31.778525] fff00000c9a89f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.778568] fff00000c9a89f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.778610] >fff00000c9a8a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.778649] ^ [ 31.778676] fff00000c9a8a080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 31.778718] fff00000c9a8a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.778755] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 31.744375] ================================================================== [ 31.744445] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 31.744668] Free of addr fff00000c9a8c000 by task kunit_try_catch/240 [ 31.744742] [ 31.744787] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 31.744976] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.745013] Hardware name: linux,dummy-virt (DT) [ 31.745098] Call trace: [ 31.745152] show_stack+0x20/0x38 (C) [ 31.745280] dump_stack_lvl+0x8c/0xd0 [ 31.745359] print_report+0x118/0x5d0 [ 31.745408] kasan_report_invalid_free+0xc0/0xe8 [ 31.745460] check_slab_allocation+0xd4/0x108 [ 31.745510] __kasan_slab_pre_free+0x2c/0x48 [ 31.745559] kmem_cache_free+0xf0/0x468 [ 31.745609] kmem_cache_double_free+0x190/0x3c8 [ 31.745656] kunit_try_run_case+0x170/0x3f0 [ 31.745827] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.745912] kthread+0x328/0x630 [ 31.745981] ret_from_fork+0x10/0x20 [ 31.746074] [ 31.746138] Allocated by task 240: [ 31.746171] kasan_save_stack+0x3c/0x68 [ 31.746235] kasan_save_track+0x20/0x40 [ 31.746548] kasan_save_alloc_info+0x40/0x58 [ 31.746641] __kasan_slab_alloc+0xa8/0xb0 [ 31.746727] kmem_cache_alloc_noprof+0x10c/0x398 [ 31.746803] kmem_cache_double_free+0x12c/0x3c8 [ 31.746855] kunit_try_run_case+0x170/0x3f0 [ 31.746893] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.746937] kthread+0x328/0x630 [ 31.746979] ret_from_fork+0x10/0x20 [ 31.747015] [ 31.747055] Freed by task 240: [ 31.747085] kasan_save_stack+0x3c/0x68 [ 31.747137] kasan_save_track+0x20/0x40 [ 31.747173] kasan_save_free_info+0x4c/0x78 [ 31.747219] __kasan_slab_free+0x6c/0x98 [ 31.747258] kmem_cache_free+0x260/0x468 [ 31.747296] kmem_cache_double_free+0x140/0x3c8 [ 31.747336] kunit_try_run_case+0x170/0x3f0 [ 31.747375] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.747419] kthread+0x328/0x630 [ 31.747451] ret_from_fork+0x10/0x20 [ 31.747614] [ 31.747658] The buggy address belongs to the object at fff00000c9a8c000 [ 31.747658] which belongs to the cache test_cache of size 200 [ 31.747745] The buggy address is located 0 bytes inside of [ 31.747745] 200-byte region [fff00000c9a8c000, fff00000c9a8c0c8) [ 31.747858] [ 31.747888] The buggy address belongs to the physical page: [ 31.747939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8c [ 31.748169] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.748278] page_type: f5(slab) [ 31.748323] raw: 0bfffe0000000000 fff00000c5c50b40 dead000000000122 0000000000000000 [ 31.748392] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 31.748486] page dumped because: kasan: bad access detected [ 31.748584] [ 31.748631] Memory state around the buggy address: [ 31.748707] fff00000c9a8bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.748763] fff00000c9a8bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.748805] >fff00000c9a8c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.748842] ^ [ 31.748887] fff00000c9a8c080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 31.749060] fff00000c9a8c100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.749200] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 31.490649] ================================================================== [ 31.490752] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430 [ 31.490816] Read of size 1 at addr fff00000c9a8f0c8 by task kunit_try_catch/238 [ 31.490883] [ 31.490920] CPU: 0 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 31.491005] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.491041] Hardware name: linux,dummy-virt (DT) [ 31.491079] Call trace: [ 31.491135] show_stack+0x20/0x38 (C) [ 31.491186] dump_stack_lvl+0x8c/0xd0 [ 31.491263] print_report+0x118/0x5d0 [ 31.491544] kasan_report+0xdc/0x128 [ 31.491606] __asan_report_load1_noabort+0x20/0x30 [ 31.491701] kmem_cache_oob+0x344/0x430 [ 31.491793] kunit_try_run_case+0x170/0x3f0 [ 31.491847] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.491903] kthread+0x328/0x630 [ 31.491945] ret_from_fork+0x10/0x20 [ 31.491993] [ 31.492012] Allocated by task 238: [ 31.492040] kasan_save_stack+0x3c/0x68 [ 31.492092] kasan_save_track+0x20/0x40 [ 31.492130] kasan_save_alloc_info+0x40/0x58 [ 31.492169] __kasan_slab_alloc+0xa8/0xb0 [ 31.492219] kmem_cache_alloc_noprof+0x10c/0x398 [ 31.492259] kmem_cache_oob+0x12c/0x430 [ 31.492296] kunit_try_run_case+0x170/0x3f0 [ 31.492454] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.492542] kthread+0x328/0x630 [ 31.492578] ret_from_fork+0x10/0x20 [ 31.492648] [ 31.492694] The buggy address belongs to the object at fff00000c9a8f000 [ 31.492694] which belongs to the cache test_cache of size 200 [ 31.492777] The buggy address is located 0 bytes to the right of [ 31.492777] allocated 200-byte region [fff00000c9a8f000, fff00000c9a8f0c8) [ 31.492866] [ 31.492949] The buggy address belongs to the physical page: [ 31.492988] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a8f [ 31.493057] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.493166] page_type: f5(slab) [ 31.493245] raw: 0bfffe0000000000 fff00000c5c50a00 dead000000000122 0000000000000000 [ 31.493369] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 31.493438] page dumped because: kasan: bad access detected [ 31.493493] [ 31.493564] Memory state around the buggy address: [ 31.493613] fff00000c9a8ef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.493657] fff00000c9a8f000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.493727] >fff00000c9a8f080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 31.493766] ^ [ 31.493802] fff00000c9a8f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.493844] fff00000c9a8f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.493920] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 31.468260] ================================================================== [ 31.468424] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 31.468512] Read of size 8 at addr fff00000c9aa7940 by task kunit_try_catch/231 [ 31.468564] [ 31.468650] CPU: 0 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 31.468740] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.468794] Hardware name: linux,dummy-virt (DT) [ 31.468853] Call trace: [ 31.468932] show_stack+0x20/0x38 (C) [ 31.469003] dump_stack_lvl+0x8c/0xd0 [ 31.469052] print_report+0x118/0x5d0 [ 31.469100] kasan_report+0xdc/0x128 [ 31.469146] __asan_report_load8_noabort+0x20/0x30 [ 31.469345] workqueue_uaf+0x480/0x4a8 [ 31.469394] kunit_try_run_case+0x170/0x3f0 [ 31.469446] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.469501] kthread+0x328/0x630 [ 31.469543] ret_from_fork+0x10/0x20 [ 31.469590] [ 31.469655] Allocated by task 231: [ 31.469716] kasan_save_stack+0x3c/0x68 [ 31.469826] kasan_save_track+0x20/0x40 [ 31.469911] kasan_save_alloc_info+0x40/0x58 [ 31.469978] __kasan_kmalloc+0xd4/0xd8 [ 31.470047] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.470140] workqueue_uaf+0x13c/0x4a8 [ 31.470179] kunit_try_run_case+0x170/0x3f0 [ 31.470252] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.470299] kthread+0x328/0x630 [ 31.470625] ret_from_fork+0x10/0x20 [ 31.470716] [ 31.470766] Freed by task 75: [ 31.470860] kasan_save_stack+0x3c/0x68 [ 31.470921] kasan_save_track+0x20/0x40 [ 31.470992] kasan_save_free_info+0x4c/0x78 [ 31.471053] __kasan_slab_free+0x6c/0x98 [ 31.471275] kfree+0x214/0x3c8 [ 31.471465] workqueue_uaf_work+0x18/0x30 [ 31.471557] process_one_work+0x530/0xf98 [ 31.471661] worker_thread+0x618/0xf38 [ 31.471721] kthread+0x328/0x630 [ 31.471796] ret_from_fork+0x10/0x20 [ 31.471878] [ 31.471917] Last potentially related work creation: [ 31.471946] kasan_save_stack+0x3c/0x68 [ 31.472010] kasan_record_aux_stack+0xb4/0xc8 [ 31.472281] __queue_work+0x65c/0xfe0 [ 31.472352] queue_work_on+0xbc/0xf8 [ 31.472444] workqueue_uaf+0x210/0x4a8 [ 31.472517] kunit_try_run_case+0x170/0x3f0 [ 31.472645] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.472721] kthread+0x328/0x630 [ 31.472753] ret_from_fork+0x10/0x20 [ 31.472790] [ 31.472809] The buggy address belongs to the object at fff00000c9aa7940 [ 31.472809] which belongs to the cache kmalloc-32 of size 32 [ 31.472869] The buggy address is located 0 bytes inside of [ 31.472869] freed 32-byte region [fff00000c9aa7940, fff00000c9aa7960) [ 31.472968] [ 31.472989] The buggy address belongs to the physical page: [ 31.473022] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109aa7 [ 31.473076] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.473280] page_type: f5(slab) [ 31.473380] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 31.473460] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 31.473527] page dumped because: kasan: bad access detected [ 31.473590] [ 31.473640] Memory state around the buggy address: [ 31.473736] fff00000c9aa7800: 00 00 03 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 31.473791] fff00000c9aa7880: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 31.473843] >fff00000c9aa7900: 00 00 00 07 fc fc fc fc fa fb fb fb fc fc fc fc [ 31.473880] ^ [ 31.473915] fff00000c9aa7980: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.474112] fff00000c9aa7a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.474194] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[ 31.446519] ================================================================== [ 31.446657] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 31.446730] Read of size 4 at addr fff00000c9aa7740 by task swapper/0/0 [ 31.446778] [ 31.449411] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 31.451338] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.451365] Hardware name: linux,dummy-virt (DT) [ 31.451401] Call trace: [ 31.451429] show_stack+0x20/0x38 (C) [ 31.451487] dump_stack_lvl+0x8c/0xd0 [ 31.451536] print_report+0x118/0x5d0 [ 31.451584] kasan_report+0xdc/0x128 [ 31.451631] __asan_report_load4_noabort+0x20/0x30 [ 31.451678] rcu_uaf_reclaim+0x64/0x70 [ 31.451723] rcu_core+0x9f4/0x1e20 [ 31.451769] rcu_core_si+0x18/0x30 [ 31.451814] handle_softirqs+0x374/0xb28 [ 31.451861] __do_softirq+0x1c/0x28 [ 31.451903] ____do_softirq+0x18/0x30 [ 31.451948] call_on_irq_stack+0x24/0x30 [ 31.451992] do_softirq_own_stack+0x24/0x38 [ 31.452038] __irq_exit_rcu+0x1fc/0x318 [ 31.452085] irq_exit_rcu+0x1c/0x80 [ 31.452129] el1_interrupt+0x38/0x58 [ 31.452177] el1h_64_irq_handler+0x18/0x28 [ 31.452235] el1h_64_irq+0x6c/0x70 [ 31.452353] arch_local_irq_enable+0x4/0x8 (P) [ 31.452447] do_idle+0x384/0x4e8 [ 31.452514] cpu_startup_entry+0x64/0x80 [ 31.452571] rest_init+0x160/0x188 [ 31.452634] start_kernel+0x30c/0x3d0 [ 31.452885] __primary_switched+0x8c/0xa0 [ 31.453147] [ 31.453197] Allocated by task 229: [ 31.453275] kasan_save_stack+0x3c/0x68 [ 31.453334] kasan_save_track+0x20/0x40 [ 31.453374] kasan_save_alloc_info+0x40/0x58 [ 31.453422] __kasan_kmalloc+0xd4/0xd8 [ 31.453466] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.453510] rcu_uaf+0xb0/0x2d8 [ 31.453544] kunit_try_run_case+0x170/0x3f0 [ 31.453970] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.454032] kthread+0x328/0x630 [ 31.454192] ret_from_fork+0x10/0x20 [ 31.454305] [ 31.454348] Freed by task 0: [ 31.454390] kasan_save_stack+0x3c/0x68 [ 31.454461] kasan_save_track+0x20/0x40 [ 31.454531] kasan_save_free_info+0x4c/0x78 [ 31.454604] __kasan_slab_free+0x6c/0x98 [ 31.454684] kfree+0x214/0x3c8 [ 31.454753] rcu_uaf_reclaim+0x28/0x70 [ 31.454803] rcu_core+0x9f4/0x1e20 [ 31.454885] rcu_core_si+0x18/0x30 [ 31.454977] handle_softirqs+0x374/0xb28 [ 31.455043] __do_softirq+0x1c/0x28 [ 31.455079] [ 31.455242] Last potentially related work creation: [ 31.455448] kasan_save_stack+0x3c/0x68 [ 31.455500] kasan_record_aux_stack+0xb4/0xc8 [ 31.455539] __call_rcu_common.constprop.0+0x74/0x8c8 [ 31.455582] call_rcu+0x18/0x30 [ 31.455615] rcu_uaf+0x14c/0x2d8 [ 31.455769] kunit_try_run_case+0x170/0x3f0 [ 31.455852] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.455910] kthread+0x328/0x630 [ 31.455962] ret_from_fork+0x10/0x20 [ 31.456064] [ 31.456149] The buggy address belongs to the object at fff00000c9aa7740 [ 31.456149] which belongs to the cache kmalloc-32 of size 32 [ 31.456284] The buggy address is located 0 bytes inside of [ 31.456284] freed 32-byte region [fff00000c9aa7740, fff00000c9aa7760) [ 31.456362] [ 31.456416] The buggy address belongs to the physical page: [ 31.456473] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109aa7 [ 31.456556] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.456616] page_type: f5(slab) [ 31.456659] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 31.456714] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 31.456791] page dumped because: kasan: bad access detected [ 31.456845] [ 31.456876] Memory state around the buggy address: [ 31.456962] fff00000c9aa7600: 00 00 00 fc fc fc fc fc 00 00 05 fc fc fc fc fc [ 31.457027] fff00000c9aa7680: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 31.457070] >fff00000c9aa7700: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 31.457109] ^ [ 31.457143] fff00000c9aa7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.457238] fff00000c9aa7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.457424] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 31.367364] ================================================================== [ 31.367423] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 31.367471] Read of size 1 at addr fff00000c9a9c800 by task kunit_try_catch/227 [ 31.367519] [ 31.367572] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 31.367667] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.367694] Hardware name: linux,dummy-virt (DT) [ 31.367755] Call trace: [ 31.367797] show_stack+0x20/0x38 (C) [ 31.367844] dump_stack_lvl+0x8c/0xd0 [ 31.367907] print_report+0x118/0x5d0 [ 31.367954] kasan_report+0xdc/0x128 [ 31.368001] __kasan_check_byte+0x54/0x70 [ 31.368049] ksize+0x30/0x88 [ 31.368143] ksize_uaf+0x168/0x5f8 [ 31.368187] kunit_try_run_case+0x170/0x3f0 [ 31.368269] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.368333] kthread+0x328/0x630 [ 31.368383] ret_from_fork+0x10/0x20 [ 31.368430] [ 31.368447] Allocated by task 227: [ 31.368483] kasan_save_stack+0x3c/0x68 [ 31.368534] kasan_save_track+0x20/0x40 [ 31.368600] kasan_save_alloc_info+0x40/0x58 [ 31.368673] __kasan_kmalloc+0xd4/0xd8 [ 31.368713] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.368780] ksize_uaf+0xb8/0x5f8 [ 31.368817] kunit_try_run_case+0x170/0x3f0 [ 31.369019] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.369071] kthread+0x328/0x630 [ 31.369115] ret_from_fork+0x10/0x20 [ 31.369151] [ 31.369171] Freed by task 227: [ 31.369196] kasan_save_stack+0x3c/0x68 [ 31.369248] kasan_save_track+0x20/0x40 [ 31.369353] kasan_save_free_info+0x4c/0x78 [ 31.369436] __kasan_slab_free+0x6c/0x98 [ 31.369550] kfree+0x214/0x3c8 [ 31.369610] ksize_uaf+0x11c/0x5f8 [ 31.369669] kunit_try_run_case+0x170/0x3f0 [ 31.369762] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.369842] kthread+0x328/0x630 [ 31.369899] ret_from_fork+0x10/0x20 [ 31.370000] [ 31.370050] The buggy address belongs to the object at fff00000c9a9c800 [ 31.370050] which belongs to the cache kmalloc-128 of size 128 [ 31.370157] The buggy address is located 0 bytes inside of [ 31.370157] freed 128-byte region [fff00000c9a9c800, fff00000c9a9c880) [ 31.370279] [ 31.370343] The buggy address belongs to the physical page: [ 31.370419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a9c [ 31.370510] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.370559] page_type: f5(slab) [ 31.370612] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.370831] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.370878] page dumped because: kasan: bad access detected [ 31.370910] [ 31.370927] Memory state around the buggy address: [ 31.371012] fff00000c9a9c700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.371078] fff00000c9a9c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.371190] >fff00000c9a9c800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.371263] ^ [ 31.371324] fff00000c9a9c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.371391] fff00000c9a9c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.371526] ================================================================== [ 31.371991] ================================================================== [ 31.372039] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 31.372086] Read of size 1 at addr fff00000c9a9c800 by task kunit_try_catch/227 [ 31.372133] [ 31.372400] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 31.372491] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.372559] Hardware name: linux,dummy-virt (DT) [ 31.372630] Call trace: [ 31.372724] show_stack+0x20/0x38 (C) [ 31.372798] dump_stack_lvl+0x8c/0xd0 [ 31.372884] print_report+0x118/0x5d0 [ 31.372997] kasan_report+0xdc/0x128 [ 31.373076] __asan_report_load1_noabort+0x20/0x30 [ 31.373226] ksize_uaf+0x598/0x5f8 [ 31.373309] kunit_try_run_case+0x170/0x3f0 [ 31.373393] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.373456] kthread+0x328/0x630 [ 31.373499] ret_from_fork+0x10/0x20 [ 31.373677] [ 31.373696] Allocated by task 227: [ 31.373724] kasan_save_stack+0x3c/0x68 [ 31.373767] kasan_save_track+0x20/0x40 [ 31.373806] kasan_save_alloc_info+0x40/0x58 [ 31.373844] __kasan_kmalloc+0xd4/0xd8 [ 31.373971] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.374069] ksize_uaf+0xb8/0x5f8 [ 31.374134] kunit_try_run_case+0x170/0x3f0 [ 31.374230] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.374310] kthread+0x328/0x630 [ 31.374350] ret_from_fork+0x10/0x20 [ 31.374387] [ 31.374411] Freed by task 227: [ 31.374442] kasan_save_stack+0x3c/0x68 [ 31.374481] kasan_save_track+0x20/0x40 [ 31.374520] kasan_save_free_info+0x4c/0x78 [ 31.374567] __kasan_slab_free+0x6c/0x98 [ 31.374611] kfree+0x214/0x3c8 [ 31.374655] ksize_uaf+0x11c/0x5f8 [ 31.374700] kunit_try_run_case+0x170/0x3f0 [ 31.374750] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.374802] kthread+0x328/0x630 [ 31.374842] ret_from_fork+0x10/0x20 [ 31.374879] [ 31.374897] The buggy address belongs to the object at fff00000c9a9c800 [ 31.374897] which belongs to the cache kmalloc-128 of size 128 [ 31.374954] The buggy address is located 0 bytes inside of [ 31.374954] freed 128-byte region [fff00000c9a9c800, fff00000c9a9c880) [ 31.375016] [ 31.375035] The buggy address belongs to the physical page: [ 31.375066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a9c [ 31.375116] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.375174] page_type: f5(slab) [ 31.375220] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.375269] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.375307] page dumped because: kasan: bad access detected [ 31.375339] [ 31.375356] Memory state around the buggy address: [ 31.375387] fff00000c9a9c700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.375428] fff00000c9a9c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.375512] >fff00000c9a9c800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.375548] ^ [ 31.375576] fff00000c9a9c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.375618] fff00000c9a9c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.375655] ================================================================== [ 31.376173] ================================================================== [ 31.376280] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 31.376328] Read of size 1 at addr fff00000c9a9c878 by task kunit_try_catch/227 [ 31.376385] [ 31.376464] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 31.376548] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.376594] Hardware name: linux,dummy-virt (DT) [ 31.376623] Call trace: [ 31.376646] show_stack+0x20/0x38 (C) [ 31.376694] dump_stack_lvl+0x8c/0xd0 [ 31.376886] print_report+0x118/0x5d0 [ 31.377005] kasan_report+0xdc/0x128 [ 31.377098] __asan_report_load1_noabort+0x20/0x30 [ 31.377246] ksize_uaf+0x544/0x5f8 [ 31.377309] kunit_try_run_case+0x170/0x3f0 [ 31.377366] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.377444] kthread+0x328/0x630 [ 31.377579] ret_from_fork+0x10/0x20 [ 31.377657] [ 31.377704] Allocated by task 227: [ 31.377732] kasan_save_stack+0x3c/0x68 [ 31.377813] kasan_save_track+0x20/0x40 [ 31.377885] kasan_save_alloc_info+0x40/0x58 [ 31.377924] __kasan_kmalloc+0xd4/0xd8 [ 31.377976] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.378050] ksize_uaf+0xb8/0x5f8 [ 31.378103] kunit_try_run_case+0x170/0x3f0 [ 31.378143] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.378189] kthread+0x328/0x630 [ 31.378266] ret_from_fork+0x10/0x20 [ 31.378305] [ 31.378323] Freed by task 227: [ 31.378349] kasan_save_stack+0x3c/0x68 [ 31.378389] kasan_save_track+0x20/0x40 [ 31.378427] kasan_save_free_info+0x4c/0x78 [ 31.378464] __kasan_slab_free+0x6c/0x98 [ 31.378509] kfree+0x214/0x3c8 [ 31.378648] ksize_uaf+0x11c/0x5f8 [ 31.378720] kunit_try_run_case+0x170/0x3f0 [ 31.378787] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.378903] kthread+0x328/0x630 [ 31.378967] ret_from_fork+0x10/0x20 [ 31.379051] [ 31.379109] The buggy address belongs to the object at fff00000c9a9c800 [ 31.379109] which belongs to the cache kmalloc-128 of size 128 [ 31.379251] The buggy address is located 120 bytes inside of [ 31.379251] freed 128-byte region [fff00000c9a9c800, fff00000c9a9c880) [ 31.379333] [ 31.379443] The buggy address belongs to the physical page: [ 31.379490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a9c [ 31.379560] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.379623] page_type: f5(slab) [ 31.379659] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.379843] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.379883] page dumped because: kasan: bad access detected [ 31.379915] [ 31.379932] Memory state around the buggy address: [ 31.380005] fff00000c9a9c700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.380130] fff00000c9a9c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.380220] >fff00000c9a9c800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.380287] ^ [ 31.380346] fff00000c9a9c880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.380444] fff00000c9a9c900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.380492] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 31.359464] ================================================================== [ 31.359878] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 31.360023] Read of size 1 at addr fff00000c9a9c77f by task kunit_try_catch/225 [ 31.360073] [ 31.360102] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 31.360229] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.360257] Hardware name: linux,dummy-virt (DT) [ 31.360286] Call trace: [ 31.360309] show_stack+0x20/0x38 (C) [ 31.360356] dump_stack_lvl+0x8c/0xd0 [ 31.360412] print_report+0x118/0x5d0 [ 31.360459] kasan_report+0xdc/0x128 [ 31.360506] __asan_report_load1_noabort+0x20/0x30 [ 31.360569] ksize_unpoisons_memory+0x690/0x740 [ 31.360662] kunit_try_run_case+0x170/0x3f0 [ 31.360756] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.360862] kthread+0x328/0x630 [ 31.360954] ret_from_fork+0x10/0x20 [ 31.361051] [ 31.361124] Allocated by task 225: [ 31.361229] kasan_save_stack+0x3c/0x68 [ 31.361297] kasan_save_track+0x20/0x40 [ 31.361389] kasan_save_alloc_info+0x40/0x58 [ 31.361458] __kasan_kmalloc+0xd4/0xd8 [ 31.361568] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.361629] ksize_unpoisons_memory+0xc0/0x740 [ 31.361669] kunit_try_run_case+0x170/0x3f0 [ 31.361708] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.361753] kthread+0x328/0x630 [ 31.361785] ret_from_fork+0x10/0x20 [ 31.361962] [ 31.361982] The buggy address belongs to the object at fff00000c9a9c700 [ 31.361982] which belongs to the cache kmalloc-128 of size 128 [ 31.362041] The buggy address is located 12 bytes to the right of [ 31.362041] allocated 115-byte region [fff00000c9a9c700, fff00000c9a9c773) [ 31.362159] [ 31.362235] The buggy address belongs to the physical page: [ 31.362277] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a9c [ 31.362340] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.362420] page_type: f5(slab) [ 31.362520] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.362590] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.362650] page dumped because: kasan: bad access detected [ 31.362679] [ 31.362711] Memory state around the buggy address: [ 31.362760] fff00000c9a9c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.362829] fff00000c9a9c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.362912] >fff00000c9a9c700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.362983] ^ [ 31.363082] fff00000c9a9c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.363142] fff00000c9a9c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.363180] ================================================================== [ 31.352273] ================================================================== [ 31.352594] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 31.352817] Read of size 1 at addr fff00000c9a9c773 by task kunit_try_catch/225 [ 31.352893] [ 31.352955] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 31.353068] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.353117] Hardware name: linux,dummy-virt (DT) [ 31.353148] Call trace: [ 31.353172] show_stack+0x20/0x38 (C) [ 31.353352] dump_stack_lvl+0x8c/0xd0 [ 31.353403] print_report+0x118/0x5d0 [ 31.353452] kasan_report+0xdc/0x128 [ 31.353498] __asan_report_load1_noabort+0x20/0x30 [ 31.353545] ksize_unpoisons_memory+0x628/0x740 [ 31.353644] kunit_try_run_case+0x170/0x3f0 [ 31.353774] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.353829] kthread+0x328/0x630 [ 31.353871] ret_from_fork+0x10/0x20 [ 31.354063] [ 31.354084] Allocated by task 225: [ 31.354113] kasan_save_stack+0x3c/0x68 [ 31.354173] kasan_save_track+0x20/0x40 [ 31.354313] kasan_save_alloc_info+0x40/0x58 [ 31.354382] __kasan_kmalloc+0xd4/0xd8 [ 31.354461] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.354560] ksize_unpoisons_memory+0xc0/0x740 [ 31.354630] kunit_try_run_case+0x170/0x3f0 [ 31.354738] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.354807] kthread+0x328/0x630 [ 31.354885] ret_from_fork+0x10/0x20 [ 31.354988] [ 31.355038] The buggy address belongs to the object at fff00000c9a9c700 [ 31.355038] which belongs to the cache kmalloc-128 of size 128 [ 31.355273] The buggy address is located 0 bytes to the right of [ 31.355273] allocated 115-byte region [fff00000c9a9c700, fff00000c9a9c773) [ 31.355339] [ 31.355360] The buggy address belongs to the physical page: [ 31.355391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a9c [ 31.355472] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.355552] page_type: f5(slab) [ 31.355675] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.355756] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.355814] page dumped because: kasan: bad access detected [ 31.355875] [ 31.355915] Memory state around the buggy address: [ 31.356023] fff00000c9a9c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.356112] fff00000c9a9c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.356250] >fff00000c9a9c700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.356289] ^ [ 31.356373] fff00000c9a9c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.356541] fff00000c9a9c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.356581] ================================================================== [ 31.357104] ================================================================== [ 31.357160] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 31.357224] Read of size 1 at addr fff00000c9a9c778 by task kunit_try_catch/225 [ 31.357280] [ 31.357318] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 31.357439] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.357467] Hardware name: linux,dummy-virt (DT) [ 31.357515] Call trace: [ 31.357545] show_stack+0x20/0x38 (C) [ 31.357595] dump_stack_lvl+0x8c/0xd0 [ 31.357654] print_report+0x118/0x5d0 [ 31.357712] kasan_report+0xdc/0x128 [ 31.357760] __asan_report_load1_noabort+0x20/0x30 [ 31.357818] ksize_unpoisons_memory+0x618/0x740 [ 31.357873] kunit_try_run_case+0x170/0x3f0 [ 31.357930] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.357984] kthread+0x328/0x630 [ 31.358027] ret_from_fork+0x10/0x20 [ 31.358075] [ 31.358092] Allocated by task 225: [ 31.358118] kasan_save_stack+0x3c/0x68 [ 31.358158] kasan_save_track+0x20/0x40 [ 31.358202] kasan_save_alloc_info+0x40/0x58 [ 31.358251] __kasan_kmalloc+0xd4/0xd8 [ 31.358294] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.358336] ksize_unpoisons_memory+0xc0/0x740 [ 31.358375] kunit_try_run_case+0x170/0x3f0 [ 31.358420] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.358464] kthread+0x328/0x630 [ 31.358496] ret_from_fork+0x10/0x20 [ 31.358532] [ 31.358563] The buggy address belongs to the object at fff00000c9a9c700 [ 31.358563] which belongs to the cache kmalloc-128 of size 128 [ 31.358625] The buggy address is located 5 bytes to the right of [ 31.358625] allocated 115-byte region [fff00000c9a9c700, fff00000c9a9c773) [ 31.358706] [ 31.358738] The buggy address belongs to the physical page: [ 31.358769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a9c [ 31.358831] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.358878] page_type: f5(slab) [ 31.358916] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.358966] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.359006] page dumped because: kasan: bad access detected [ 31.359043] [ 31.359067] Memory state around the buggy address: [ 31.359096] fff00000c9a9c600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.359140] fff00000c9a9c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.359187] >fff00000c9a9c700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.359233] ^ [ 31.359273] fff00000c9a9c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.359314] fff00000c9a9c800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.359352] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive
[ 31.342184] ================================================================== [ 31.342299] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 31.342356] Free of addr fff00000c79816c0 by task kunit_try_catch/223 [ 31.342398] [ 31.342436] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 31.342523] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.342551] Hardware name: linux,dummy-virt (DT) [ 31.342584] Call trace: [ 31.342610] show_stack+0x20/0x38 (C) [ 31.342659] dump_stack_lvl+0x8c/0xd0 [ 31.342753] print_report+0x118/0x5d0 [ 31.342814] kasan_report_invalid_free+0xc0/0xe8 [ 31.342875] check_slab_allocation+0xd4/0x108 [ 31.342935] __kasan_slab_pre_free+0x2c/0x48 [ 31.342988] kfree+0xe8/0x3c8 [ 31.343198] kfree_sensitive+0x3c/0xb0 [ 31.343265] kmalloc_double_kzfree+0x168/0x308 [ 31.343346] kunit_try_run_case+0x170/0x3f0 [ 31.343399] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.343518] kthread+0x328/0x630 [ 31.343572] ret_from_fork+0x10/0x20 [ 31.343631] [ 31.343660] Allocated by task 223: [ 31.343692] kasan_save_stack+0x3c/0x68 [ 31.343750] kasan_save_track+0x20/0x40 [ 31.343801] kasan_save_alloc_info+0x40/0x58 [ 31.343862] __kasan_kmalloc+0xd4/0xd8 [ 31.343900] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.344052] kmalloc_double_kzfree+0xb8/0x308 [ 31.344140] kunit_try_run_case+0x170/0x3f0 [ 31.344202] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.344260] kthread+0x328/0x630 [ 31.344294] ret_from_fork+0x10/0x20 [ 31.344330] [ 31.344361] Freed by task 223: [ 31.344389] kasan_save_stack+0x3c/0x68 [ 31.344439] kasan_save_track+0x20/0x40 [ 31.344488] kasan_save_free_info+0x4c/0x78 [ 31.344527] __kasan_slab_free+0x6c/0x98 [ 31.344592] kfree+0x214/0x3c8 [ 31.344650] kfree_sensitive+0x80/0xb0 [ 31.344700] kmalloc_double_kzfree+0x11c/0x308 [ 31.344751] kunit_try_run_case+0x170/0x3f0 [ 31.344791] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.344859] kthread+0x328/0x630 [ 31.344894] ret_from_fork+0x10/0x20 [ 31.344931] [ 31.344952] The buggy address belongs to the object at fff00000c79816c0 [ 31.344952] which belongs to the cache kmalloc-16 of size 16 [ 31.345010] The buggy address is located 0 bytes inside of [ 31.345010] 16-byte region [fff00000c79816c0, fff00000c79816d0) [ 31.345072] [ 31.345300] The buggy address belongs to the physical page: [ 31.345346] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107981 [ 31.345421] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.345493] page_type: f5(slab) [ 31.345562] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 31.345685] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 31.345763] page dumped because: kasan: bad access detected [ 31.345797] [ 31.345827] Memory state around the buggy address: [ 31.345860] fff00000c7981580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.345926] fff00000c7981600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.346099] >fff00000c7981680: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc [ 31.346139] ^ [ 31.346175] fff00000c7981700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.346227] fff00000c7981780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.346277] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[ 31.328572] ================================================================== [ 31.328668] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 31.328785] Read of size 1 at addr fff00000c79816c0 by task kunit_try_catch/223 [ 31.328870] [ 31.328910] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 31.329152] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.329183] Hardware name: linux,dummy-virt (DT) [ 31.329229] Call trace: [ 31.329414] show_stack+0x20/0x38 (C) [ 31.329553] dump_stack_lvl+0x8c/0xd0 [ 31.329605] print_report+0x118/0x5d0 [ 31.329652] kasan_report+0xdc/0x128 [ 31.329743] __kasan_check_byte+0x54/0x70 [ 31.329915] kfree_sensitive+0x30/0xb0 [ 31.329965] kmalloc_double_kzfree+0x168/0x308 [ 31.330425] kunit_try_run_case+0x170/0x3f0 [ 31.330591] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.331111] kthread+0x328/0x630 [ 31.331726] ret_from_fork+0x10/0x20 [ 31.332237] [ 31.332605] Allocated by task 223: [ 31.332757] kasan_save_stack+0x3c/0x68 [ 31.332854] kasan_save_track+0x20/0x40 [ 31.332918] kasan_save_alloc_info+0x40/0x58 [ 31.332982] __kasan_kmalloc+0xd4/0xd8 [ 31.333022] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.333071] kmalloc_double_kzfree+0xb8/0x308 [ 31.333236] kunit_try_run_case+0x170/0x3f0 [ 31.333508] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.333554] kthread+0x328/0x630 [ 31.333588] ret_from_fork+0x10/0x20 [ 31.333625] [ 31.333647] Freed by task 223: [ 31.333676] kasan_save_stack+0x3c/0x68 [ 31.334799] kasan_save_track+0x20/0x40 [ 31.335384] kasan_save_free_info+0x4c/0x78 [ 31.335831] __kasan_slab_free+0x6c/0x98 [ 31.336315] kfree+0x214/0x3c8 [ 31.336464] kfree_sensitive+0x80/0xb0 [ 31.336504] kmalloc_double_kzfree+0x11c/0x308 [ 31.336949] kunit_try_run_case+0x170/0x3f0 [ 31.337016] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.337615] kthread+0x328/0x630 [ 31.338009] ret_from_fork+0x10/0x20 [ 31.338478] [ 31.338519] The buggy address belongs to the object at fff00000c79816c0 [ 31.338519] which belongs to the cache kmalloc-16 of size 16 [ 31.338811] The buggy address is located 0 bytes inside of [ 31.338811] freed 16-byte region [fff00000c79816c0, fff00000c79816d0) [ 31.338879] [ 31.338902] The buggy address belongs to the physical page: [ 31.339356] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107981 [ 31.340109] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.340905] page_type: f5(slab) [ 31.340962] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 31.341015] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 31.341056] page dumped because: kasan: bad access detected [ 31.341090] [ 31.341110] Memory state around the buggy address: [ 31.341144] fff00000c7981580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.341188] fff00000c7981600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.341245] >fff00000c7981680: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc [ 31.341286] ^ [ 31.341321] fff00000c7981700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.341366] fff00000c7981780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.341405] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[ 31.295112] ================================================================== [ 31.295489] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 31.295807] Read of size 1 at addr fff00000c9acb728 by task kunit_try_catch/219 [ 31.295860] [ 31.295899] CPU: 0 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 31.295988] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.296022] Hardware name: linux,dummy-virt (DT) [ 31.296159] Call trace: [ 31.296371] show_stack+0x20/0x38 (C) [ 31.296711] dump_stack_lvl+0x8c/0xd0 [ 31.297104] print_report+0x118/0x5d0 [ 31.297164] kasan_report+0xdc/0x128 [ 31.297226] __asan_report_load1_noabort+0x20/0x30 [ 31.297277] kmalloc_uaf2+0x3f4/0x468 [ 31.297383] kunit_try_run_case+0x170/0x3f0 [ 31.297916] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.297998] kthread+0x328/0x630 [ 31.298315] ret_from_fork+0x10/0x20 [ 31.298549] [ 31.298720] Allocated by task 219: [ 31.298775] kasan_save_stack+0x3c/0x68 [ 31.298839] kasan_save_track+0x20/0x40 [ 31.298902] kasan_save_alloc_info+0x40/0x58 [ 31.298940] __kasan_kmalloc+0xd4/0xd8 [ 31.298976] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.299017] kmalloc_uaf2+0xc4/0x468 [ 31.299054] kunit_try_run_case+0x170/0x3f0 [ 31.299390] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.299607] kthread+0x328/0x630 [ 31.299701] ret_from_fork+0x10/0x20 [ 31.299751] [ 31.299811] Freed by task 219: [ 31.299838] kasan_save_stack+0x3c/0x68 [ 31.299907] kasan_save_track+0x20/0x40 [ 31.300047] kasan_save_free_info+0x4c/0x78 [ 31.300084] __kasan_slab_free+0x6c/0x98 [ 31.300123] kfree+0x214/0x3c8 [ 31.300198] kmalloc_uaf2+0x134/0x468 [ 31.300251] kunit_try_run_case+0x170/0x3f0 [ 31.300290] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.300388] kthread+0x328/0x630 [ 31.300842] ret_from_fork+0x10/0x20 [ 31.300962] [ 31.300992] The buggy address belongs to the object at fff00000c9acb700 [ 31.300992] which belongs to the cache kmalloc-64 of size 64 [ 31.301071] The buggy address is located 40 bytes inside of [ 31.301071] freed 64-byte region [fff00000c9acb700, fff00000c9acb740) [ 31.301524] [ 31.301553] The buggy address belongs to the physical page: [ 31.301584] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109acb [ 31.301655] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.301709] page_type: f5(slab) [ 31.302086] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 31.302147] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.302231] page dumped because: kasan: bad access detected [ 31.302264] [ 31.302284] Memory state around the buggy address: [ 31.302480] fff00000c9acb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.302758] fff00000c9acb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.302803] >fff00000c9acb700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.302841] ^ [ 31.302874] fff00000c9acb780: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 31.303004] fff00000c9acb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.303266] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 31.267710] ================================================================== [ 31.267773] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 31.267832] Write of size 33 at addr fff00000c9acb580 by task kunit_try_catch/217 [ 31.267882] [ 31.267918] CPU: 0 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 31.268336] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.268376] Hardware name: linux,dummy-virt (DT) [ 31.268427] Call trace: [ 31.268452] show_stack+0x20/0x38 (C) [ 31.268520] dump_stack_lvl+0x8c/0xd0 [ 31.268583] print_report+0x118/0x5d0 [ 31.268853] kasan_report+0xdc/0x128 [ 31.269067] kasan_check_range+0x100/0x1a8 [ 31.269117] __asan_memset+0x34/0x78 [ 31.269161] kmalloc_uaf_memset+0x170/0x310 [ 31.270394] kunit_try_run_case+0x170/0x3f0 [ 31.270487] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.270544] kthread+0x328/0x630 [ 31.270588] ret_from_fork+0x10/0x20 [ 31.270777] [ 31.270797] Allocated by task 217: [ 31.270861] kasan_save_stack+0x3c/0x68 [ 31.270905] kasan_save_track+0x20/0x40 [ 31.272329] kasan_save_alloc_info+0x40/0x58 [ 31.272807] __kasan_kmalloc+0xd4/0xd8 [ 31.273662] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.274448] kmalloc_uaf_memset+0xb8/0x310 [ 31.275649] kunit_try_run_case+0x170/0x3f0 [ 31.277201] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.277742] kthread+0x328/0x630 [ 31.277777] ret_from_fork+0x10/0x20 [ 31.277815] [ 31.277840] Freed by task 217: [ 31.278787] kasan_save_stack+0x3c/0x68 [ 31.279106] kasan_save_track+0x20/0x40 [ 31.279289] kasan_save_free_info+0x4c/0x78 [ 31.279329] __kasan_slab_free+0x6c/0x98 [ 31.279368] kfree+0x214/0x3c8 [ 31.279402] kmalloc_uaf_memset+0x11c/0x310 [ 31.279572] kunit_try_run_case+0x170/0x3f0 [ 31.279897] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.280085] kthread+0x328/0x630 [ 31.280161] ret_from_fork+0x10/0x20 [ 31.280260] [ 31.280280] The buggy address belongs to the object at fff00000c9acb580 [ 31.280280] which belongs to the cache kmalloc-64 of size 64 [ 31.280340] The buggy address is located 0 bytes inside of [ 31.280340] freed 64-byte region [fff00000c9acb580, fff00000c9acb5c0) [ 31.280402] [ 31.280460] The buggy address belongs to the physical page: [ 31.280510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109acb [ 31.280766] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.281019] page_type: f5(slab) [ 31.281232] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 31.281328] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.281369] page dumped because: kasan: bad access detected [ 31.281402] [ 31.281453] Memory state around the buggy address: [ 31.281486] fff00000c9acb480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.281529] fff00000c9acb500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.281571] >fff00000c9acb580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.281609] ^ [ 31.281637] fff00000c9acb600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.282036] fff00000c9acb680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.282127] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[ 31.248205] ================================================================== [ 31.248302] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 31.248547] Read of size 1 at addr fff00000c79816a8 by task kunit_try_catch/215 [ 31.248604] [ 31.248643] CPU: 0 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 31.249088] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.249122] Hardware name: linux,dummy-virt (DT) [ 31.249314] Call trace: [ 31.249437] show_stack+0x20/0x38 (C) [ 31.249683] dump_stack_lvl+0x8c/0xd0 [ 31.249803] print_report+0x118/0x5d0 [ 31.249851] kasan_report+0xdc/0x128 [ 31.249942] __asan_report_load1_noabort+0x20/0x30 [ 31.250031] kmalloc_uaf+0x300/0x338 [ 31.250076] kunit_try_run_case+0x170/0x3f0 [ 31.250165] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.250231] kthread+0x328/0x630 [ 31.250272] ret_from_fork+0x10/0x20 [ 31.250854] [ 31.250887] Allocated by task 215: [ 31.250922] kasan_save_stack+0x3c/0x68 [ 31.250971] kasan_save_track+0x20/0x40 [ 31.251010] kasan_save_alloc_info+0x40/0x58 [ 31.251534] __kasan_kmalloc+0xd4/0xd8 [ 31.251637] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.251698] kmalloc_uaf+0xb8/0x338 [ 31.251734] kunit_try_run_case+0x170/0x3f0 [ 31.251775] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.251826] kthread+0x328/0x630 [ 31.251929] ret_from_fork+0x10/0x20 [ 31.251966] [ 31.251986] Freed by task 215: [ 31.252013] kasan_save_stack+0x3c/0x68 [ 31.252092] kasan_save_track+0x20/0x40 [ 31.252253] kasan_save_free_info+0x4c/0x78 [ 31.252303] __kasan_slab_free+0x6c/0x98 [ 31.252443] kfree+0x214/0x3c8 [ 31.252483] kmalloc_uaf+0x11c/0x338 [ 31.252866] kunit_try_run_case+0x170/0x3f0 [ 31.252916] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.252968] kthread+0x328/0x630 [ 31.253001] ret_from_fork+0x10/0x20 [ 31.253416] [ 31.253439] The buggy address belongs to the object at fff00000c79816a0 [ 31.253439] which belongs to the cache kmalloc-16 of size 16 [ 31.253711] The buggy address is located 8 bytes inside of [ 31.253711] freed 16-byte region [fff00000c79816a0, fff00000c79816b0) [ 31.253790] [ 31.253813] The buggy address belongs to the physical page: [ 31.253846] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107981 [ 31.253903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.253954] page_type: f5(slab) [ 31.253997] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 31.254047] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 31.254099] page dumped because: kasan: bad access detected [ 31.254131] [ 31.254149] Memory state around the buggy address: [ 31.254542] fff00000c7981580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.254790] fff00000c7981600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.254881] >fff00000c7981680: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 31.254954] ^ [ 31.255010] fff00000c7981700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.255051] fff00000c7981780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.255111] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 31.221765] ================================================================== [ 31.221828] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0 [ 31.221885] Read of size 64 at addr fff00000c9acb284 by task kunit_try_catch/213 [ 31.221952] [ 31.221984] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 31.222546] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.222578] Hardware name: linux,dummy-virt (DT) [ 31.222714] Call trace: [ 31.222741] show_stack+0x20/0x38 (C) [ 31.222792] dump_stack_lvl+0x8c/0xd0 [ 31.222839] print_report+0x118/0x5d0 [ 31.222886] kasan_report+0xdc/0x128 [ 31.222931] kasan_check_range+0x100/0x1a8 [ 31.222983] __asan_memmove+0x3c/0x98 [ 31.223120] kmalloc_memmove_invalid_size+0x154/0x2e0 [ 31.223222] kunit_try_run_case+0x170/0x3f0 [ 31.223273] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.223573] kthread+0x328/0x630 [ 31.223941] ret_from_fork+0x10/0x20 [ 31.224205] [ 31.224241] Allocated by task 213: [ 31.224272] kasan_save_stack+0x3c/0x68 [ 31.224315] kasan_save_track+0x20/0x40 [ 31.224553] kasan_save_alloc_info+0x40/0x58 [ 31.224744] __kasan_kmalloc+0xd4/0xd8 [ 31.224795] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.224868] kmalloc_memmove_invalid_size+0xb0/0x2e0 [ 31.224911] kunit_try_run_case+0x170/0x3f0 [ 31.224950] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.224995] kthread+0x328/0x630 [ 31.225038] ret_from_fork+0x10/0x20 [ 31.225147] [ 31.225175] The buggy address belongs to the object at fff00000c9acb280 [ 31.225175] which belongs to the cache kmalloc-64 of size 64 [ 31.225245] The buggy address is located 4 bytes inside of [ 31.225245] allocated 64-byte region [fff00000c9acb280, fff00000c9acb2c0) [ 31.225423] [ 31.225456] The buggy address belongs to the physical page: [ 31.225489] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109acb [ 31.225545] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.225595] page_type: f5(slab) [ 31.225634] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 31.225684] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.225726] page dumped because: kasan: bad access detected [ 31.225759] [ 31.226404] Memory state around the buggy address: [ 31.226468] fff00000c9acb180: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc [ 31.226513] fff00000c9acb200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.226991] >fff00000c9acb280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 31.227033] ^ [ 31.227100] fff00000c9acb300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.227154] fff00000c9acb380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.227459] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 31.204136] ================================================================== [ 31.204369] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 31.204438] Read of size 18446744073709551614 at addr fff00000c9acb084 by task kunit_try_catch/211 [ 31.204969] [ 31.205102] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 31.205190] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.205235] Hardware name: linux,dummy-virt (DT) [ 31.205267] Call trace: [ 31.205311] show_stack+0x20/0x38 (C) [ 31.205481] dump_stack_lvl+0x8c/0xd0 [ 31.205530] print_report+0x118/0x5d0 [ 31.205576] kasan_report+0xdc/0x128 [ 31.205623] kasan_check_range+0x100/0x1a8 [ 31.205669] __asan_memmove+0x3c/0x98 [ 31.205714] kmalloc_memmove_negative_size+0x154/0x2e0 [ 31.205769] kunit_try_run_case+0x170/0x3f0 [ 31.205973] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.206092] kthread+0x328/0x630 [ 31.206445] ret_from_fork+0x10/0x20 [ 31.206857] [ 31.206883] Allocated by task 211: [ 31.206963] kasan_save_stack+0x3c/0x68 [ 31.207304] kasan_save_track+0x20/0x40 [ 31.207404] kasan_save_alloc_info+0x40/0x58 [ 31.207443] __kasan_kmalloc+0xd4/0xd8 [ 31.207714] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.207819] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 31.207862] kunit_try_run_case+0x170/0x3f0 [ 31.207902] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.207947] kthread+0x328/0x630 [ 31.208226] ret_from_fork+0x10/0x20 [ 31.208272] [ 31.208292] The buggy address belongs to the object at fff00000c9acb080 [ 31.208292] which belongs to the cache kmalloc-64 of size 64 [ 31.208613] The buggy address is located 4 bytes inside of [ 31.208613] 64-byte region [fff00000c9acb080, fff00000c9acb0c0) [ 31.208815] [ 31.208837] The buggy address belongs to the physical page: [ 31.208932] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109acb [ 31.208988] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.209036] page_type: f5(slab) [ 31.209099] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 31.209201] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.209508] page dumped because: kasan: bad access detected [ 31.209650] [ 31.209726] Memory state around the buggy address: [ 31.209785] fff00000c9acaf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.209835] fff00000c9acb000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.209907] >fff00000c9acb080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 31.209945] ^ [ 31.209972] fff00000c9acb100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.210014] fff00000c9acb180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.210076] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[ 31.189688] ================================================================== [ 31.189747] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 31.190329] Write of size 16 at addr fff00000c9a9c669 by task kunit_try_catch/209 [ 31.190381] [ 31.190413] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 31.190496] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.190522] Hardware name: linux,dummy-virt (DT) [ 31.190559] Call trace: [ 31.190592] show_stack+0x20/0x38 (C) [ 31.190642] dump_stack_lvl+0x8c/0xd0 [ 31.191049] print_report+0x118/0x5d0 [ 31.191101] kasan_report+0xdc/0x128 [ 31.191147] kasan_check_range+0x100/0x1a8 [ 31.191192] __asan_memset+0x34/0x78 [ 31.191247] kmalloc_oob_memset_16+0x150/0x2f8 [ 31.191295] kunit_try_run_case+0x170/0x3f0 [ 31.191347] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.191398] kthread+0x328/0x630 [ 31.191452] ret_from_fork+0x10/0x20 [ 31.191502] [ 31.191856] Allocated by task 209: [ 31.192084] kasan_save_stack+0x3c/0x68 [ 31.192133] kasan_save_track+0x20/0x40 [ 31.192177] kasan_save_alloc_info+0x40/0x58 [ 31.192272] __kasan_kmalloc+0xd4/0xd8 [ 31.192310] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.192350] kmalloc_oob_memset_16+0xb0/0x2f8 [ 31.192388] kunit_try_run_case+0x170/0x3f0 [ 31.192428] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.192478] kthread+0x328/0x630 [ 31.192608] ret_from_fork+0x10/0x20 [ 31.192646] [ 31.192666] The buggy address belongs to the object at fff00000c9a9c600 [ 31.192666] which belongs to the cache kmalloc-128 of size 128 [ 31.193225] The buggy address is located 105 bytes inside of [ 31.193225] allocated 120-byte region [fff00000c9a9c600, fff00000c9a9c678) [ 31.193424] [ 31.193448] The buggy address belongs to the physical page: [ 31.193479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a9c [ 31.193723] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.193825] page_type: f5(slab) [ 31.193962] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.194012] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.194084] page dumped because: kasan: bad access detected [ 31.194164] [ 31.194241] Memory state around the buggy address: [ 31.194274] fff00000c9a9c500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.194316] fff00000c9a9c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.194358] >fff00000c9a9c600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 31.194395] ^ [ 31.194434] fff00000c9a9c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.194475] fff00000c9a9c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.194514] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[ 31.174544] ================================================================== [ 31.174615] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 31.174668] Write of size 8 at addr fff00000c9a9c571 by task kunit_try_catch/207 [ 31.174715] [ 31.174747] CPU: 0 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 31.174830] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.174855] Hardware name: linux,dummy-virt (DT) [ 31.174900] Call trace: [ 31.174924] show_stack+0x20/0x38 (C) [ 31.174971] dump_stack_lvl+0x8c/0xd0 [ 31.175043] print_report+0x118/0x5d0 [ 31.175090] kasan_report+0xdc/0x128 [ 31.175136] kasan_check_range+0x100/0x1a8 [ 31.175485] __asan_memset+0x34/0x78 [ 31.175858] kmalloc_oob_memset_8+0x150/0x2f8 [ 31.176015] kunit_try_run_case+0x170/0x3f0 [ 31.176157] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.176350] kthread+0x328/0x630 [ 31.176454] ret_from_fork+0x10/0x20 [ 31.176502] [ 31.176526] Allocated by task 207: [ 31.176630] kasan_save_stack+0x3c/0x68 [ 31.176675] kasan_save_track+0x20/0x40 [ 31.176734] kasan_save_alloc_info+0x40/0x58 [ 31.176773] __kasan_kmalloc+0xd4/0xd8 [ 31.176810] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.176849] kmalloc_oob_memset_8+0xb0/0x2f8 [ 31.176886] kunit_try_run_case+0x170/0x3f0 [ 31.177330] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.177447] kthread+0x328/0x630 [ 31.177489] ret_from_fork+0x10/0x20 [ 31.177621] [ 31.177671] The buggy address belongs to the object at fff00000c9a9c500 [ 31.177671] which belongs to the cache kmalloc-128 of size 128 [ 31.177728] The buggy address is located 113 bytes inside of [ 31.177728] allocated 120-byte region [fff00000c9a9c500, fff00000c9a9c578) [ 31.177788] [ 31.177862] The buggy address belongs to the physical page: [ 31.177963] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a9c [ 31.178014] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.178061] page_type: f5(slab) [ 31.178105] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.178590] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.178634] page dumped because: kasan: bad access detected [ 31.178907] [ 31.179144] Memory state around the buggy address: [ 31.179179] fff00000c9a9c400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.179233] fff00000c9a9c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.179272] >fff00000c9a9c500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 31.179481] ^ [ 31.179540] fff00000c9a9c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.179581] fff00000c9a9c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.179616] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[ 31.165833] ================================================================== [ 31.165890] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 31.165944] Write of size 4 at addr fff00000c9a9c475 by task kunit_try_catch/205 [ 31.166001] [ 31.166040] CPU: 0 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 31.166129] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.166155] Hardware name: linux,dummy-virt (DT) [ 31.166185] Call trace: [ 31.166220] show_stack+0x20/0x38 (C) [ 31.166267] dump_stack_lvl+0x8c/0xd0 [ 31.166314] print_report+0x118/0x5d0 [ 31.166366] kasan_report+0xdc/0x128 [ 31.166411] kasan_check_range+0x100/0x1a8 [ 31.166456] __asan_memset+0x34/0x78 [ 31.166502] kmalloc_oob_memset_4+0x150/0x300 [ 31.166741] kunit_try_run_case+0x170/0x3f0 [ 31.166799] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.166854] kthread+0x328/0x630 [ 31.166909] ret_from_fork+0x10/0x20 [ 31.166957] [ 31.166975] Allocated by task 205: [ 31.167002] kasan_save_stack+0x3c/0x68 [ 31.167052] kasan_save_track+0x20/0x40 [ 31.167090] kasan_save_alloc_info+0x40/0x58 [ 31.167127] __kasan_kmalloc+0xd4/0xd8 [ 31.167165] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.167203] kmalloc_oob_memset_4+0xb0/0x300 [ 31.167334] kunit_try_run_case+0x170/0x3f0 [ 31.167374] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.167531] kthread+0x328/0x630 [ 31.167576] ret_from_fork+0x10/0x20 [ 31.167629] [ 31.167658] The buggy address belongs to the object at fff00000c9a9c400 [ 31.167658] which belongs to the cache kmalloc-128 of size 128 [ 31.167740] The buggy address is located 117 bytes inside of [ 31.167740] allocated 120-byte region [fff00000c9a9c400, fff00000c9a9c478) [ 31.167809] [ 31.167838] The buggy address belongs to the physical page: [ 31.167876] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a9c [ 31.167927] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.167973] page_type: f5(slab) [ 31.168009] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.168056] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.168094] page dumped because: kasan: bad access detected [ 31.168132] [ 31.168150] Memory state around the buggy address: [ 31.168224] fff00000c9a9c300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.168272] fff00000c9a9c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.168328] >fff00000c9a9c400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 31.168365] ^ [ 31.168410] fff00000c9a9c480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.168581] fff00000c9a9c500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.168807] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[ 31.158168] ================================================================== [ 31.158260] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 31.158317] Write of size 2 at addr fff00000c9a9c377 by task kunit_try_catch/203 [ 31.158370] [ 31.158400] CPU: 0 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 31.158489] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.158515] Hardware name: linux,dummy-virt (DT) [ 31.158544] Call trace: [ 31.158575] show_stack+0x20/0x38 (C) [ 31.158630] dump_stack_lvl+0x8c/0xd0 [ 31.158677] print_report+0x118/0x5d0 [ 31.158723] kasan_report+0xdc/0x128 [ 31.158769] kasan_check_range+0x100/0x1a8 [ 31.158814] __asan_memset+0x34/0x78 [ 31.158856] kmalloc_oob_memset_2+0x150/0x2f8 [ 31.159084] kunit_try_run_case+0x170/0x3f0 [ 31.159142] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.159217] kthread+0x328/0x630 [ 31.159261] ret_from_fork+0x10/0x20 [ 31.159329] [ 31.159358] Allocated by task 203: [ 31.159386] kasan_save_stack+0x3c/0x68 [ 31.159428] kasan_save_track+0x20/0x40 [ 31.159484] kasan_save_alloc_info+0x40/0x58 [ 31.159521] __kasan_kmalloc+0xd4/0xd8 [ 31.159574] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.159633] kmalloc_oob_memset_2+0xb0/0x2f8 [ 31.159671] kunit_try_run_case+0x170/0x3f0 [ 31.159719] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.159763] kthread+0x328/0x630 [ 31.159795] ret_from_fork+0x10/0x20 [ 31.159830] [ 31.159848] The buggy address belongs to the object at fff00000c9a9c300 [ 31.159848] which belongs to the cache kmalloc-128 of size 128 [ 31.159902] The buggy address is located 119 bytes inside of [ 31.159902] allocated 120-byte region [fff00000c9a9c300, fff00000c9a9c378) [ 31.159963] [ 31.159982] The buggy address belongs to the physical page: [ 31.160011] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a9c [ 31.160083] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.160128] page_type: f5(slab) [ 31.160296] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.160376] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.160417] page dumped because: kasan: bad access detected [ 31.160449] [ 31.160483] Memory state around the buggy address: [ 31.160521] fff00000c9a9c200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.160670] fff00000c9a9c280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.160712] >fff00000c9a9c300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 31.160749] ^ [ 31.160788] fff00000c9a9c380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.160842] fff00000c9a9c400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.160904] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 31.150537] ================================================================== [ 31.150592] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 31.150641] Write of size 128 at addr fff00000c9a9c200 by task kunit_try_catch/201 [ 31.150689] [ 31.150720] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 31.150803] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.150828] Hardware name: linux,dummy-virt (DT) [ 31.150858] Call trace: [ 31.150880] show_stack+0x20/0x38 (C) [ 31.150926] dump_stack_lvl+0x8c/0xd0 [ 31.150971] print_report+0x118/0x5d0 [ 31.151016] kasan_report+0xdc/0x128 [ 31.151061] kasan_check_range+0x100/0x1a8 [ 31.151105] __asan_memset+0x34/0x78 [ 31.151147] kmalloc_oob_in_memset+0x144/0x2d0 [ 31.151193] kunit_try_run_case+0x170/0x3f0 [ 31.151284] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.151354] kthread+0x328/0x630 [ 31.151402] ret_from_fork+0x10/0x20 [ 31.151475] [ 31.151494] Allocated by task 201: [ 31.151521] kasan_save_stack+0x3c/0x68 [ 31.151561] kasan_save_track+0x20/0x40 [ 31.151599] kasan_save_alloc_info+0x40/0x58 [ 31.151635] __kasan_kmalloc+0xd4/0xd8 [ 31.151671] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.151711] kmalloc_oob_in_memset+0xb0/0x2d0 [ 31.151748] kunit_try_run_case+0x170/0x3f0 [ 31.151809] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.151853] kthread+0x328/0x630 [ 31.151885] ret_from_fork+0x10/0x20 [ 31.151920] [ 31.151939] The buggy address belongs to the object at fff00000c9a9c200 [ 31.151939] which belongs to the cache kmalloc-128 of size 128 [ 31.151993] The buggy address is located 0 bytes inside of [ 31.151993] allocated 120-byte region [fff00000c9a9c200, fff00000c9a9c278) [ 31.152051] [ 31.152071] The buggy address belongs to the physical page: [ 31.152100] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a9c [ 31.152149] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.152194] page_type: f5(slab) [ 31.152338] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.152442] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.152491] page dumped because: kasan: bad access detected [ 31.152529] [ 31.152610] Memory state around the buggy address: [ 31.152651] fff00000c9a9c100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.152695] fff00000c9a9c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.152736] >fff00000c9a9c200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 31.152772] ^ [ 31.152812] fff00000c9a9c280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.152852] fff00000c9a9c300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.152888] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[ 31.140927] ================================================================== [ 31.141019] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 31.141109] Read of size 16 at addr fff00000c7981680 by task kunit_try_catch/199 [ 31.141160] [ 31.141196] CPU: 0 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 31.141314] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.141340] Hardware name: linux,dummy-virt (DT) [ 31.141372] Call trace: [ 31.141396] show_stack+0x20/0x38 (C) [ 31.141445] dump_stack_lvl+0x8c/0xd0 [ 31.141493] print_report+0x118/0x5d0 [ 31.141540] kasan_report+0xdc/0x128 [ 31.141595] __asan_report_load16_noabort+0x20/0x30 [ 31.141679] kmalloc_uaf_16+0x3bc/0x438 [ 31.141726] kunit_try_run_case+0x170/0x3f0 [ 31.141782] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.141964] kthread+0x328/0x630 [ 31.142008] ret_from_fork+0x10/0x20 [ 31.142216] [ 31.142277] Allocated by task 199: [ 31.142593] kasan_save_stack+0x3c/0x68 [ 31.142654] kasan_save_track+0x20/0x40 [ 31.142692] kasan_save_alloc_info+0x40/0x58 [ 31.142947] __kasan_kmalloc+0xd4/0xd8 [ 31.143004] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.143065] kmalloc_uaf_16+0x140/0x438 [ 31.143136] kunit_try_run_case+0x170/0x3f0 [ 31.143194] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.143282] kthread+0x328/0x630 [ 31.143364] ret_from_fork+0x10/0x20 [ 31.143416] [ 31.143470] Freed by task 199: [ 31.143559] kasan_save_stack+0x3c/0x68 [ 31.143628] kasan_save_track+0x20/0x40 [ 31.143703] kasan_save_free_info+0x4c/0x78 [ 31.143739] __kasan_slab_free+0x6c/0x98 [ 31.143802] kfree+0x214/0x3c8 [ 31.144095] kmalloc_uaf_16+0x190/0x438 [ 31.144183] kunit_try_run_case+0x170/0x3f0 [ 31.144261] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.144329] kthread+0x328/0x630 [ 31.144400] ret_from_fork+0x10/0x20 [ 31.144436] [ 31.144455] The buggy address belongs to the object at fff00000c7981680 [ 31.144455] which belongs to the cache kmalloc-16 of size 16 [ 31.144512] The buggy address is located 0 bytes inside of [ 31.144512] freed 16-byte region [fff00000c7981680, fff00000c7981690) [ 31.144598] [ 31.144667] The buggy address belongs to the physical page: [ 31.144778] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107981 [ 31.144887] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.144957] page_type: f5(slab) [ 31.145014] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 31.145112] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 31.145170] page dumped because: kasan: bad access detected [ 31.145201] [ 31.145230] Memory state around the buggy address: [ 31.145285] fff00000c7981580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.145330] fff00000c7981600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.145372] >fff00000c7981680: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.145486] ^ [ 31.145518] fff00000c7981700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.145559] fff00000c7981780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.145595] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[ 31.098976] ================================================================== [ 31.100497] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 31.100918] Write of size 16 at addr fff00000c7981640 by task kunit_try_catch/197 [ 31.100968] [ 31.101616] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 31.102238] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.102401] Hardware name: linux,dummy-virt (DT) [ 31.102921] Call trace: [ 31.103338] show_stack+0x20/0x38 (C) [ 31.103583] dump_stack_lvl+0x8c/0xd0 [ 31.104256] print_report+0x118/0x5d0 [ 31.104327] kasan_report+0xdc/0x128 [ 31.104966] __asan_report_store16_noabort+0x20/0x30 [ 31.105414] kmalloc_oob_16+0x3a0/0x3f8 [ 31.105465] kunit_try_run_case+0x170/0x3f0 [ 31.105516] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.106344] kthread+0x328/0x630 [ 31.106720] ret_from_fork+0x10/0x20 [ 31.106813] [ 31.107332] Allocated by task 197: [ 31.108022] kasan_save_stack+0x3c/0x68 [ 31.108078] kasan_save_track+0x20/0x40 [ 31.108398] kasan_save_alloc_info+0x40/0x58 [ 31.108445] __kasan_kmalloc+0xd4/0xd8 [ 31.109062] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.109192] kmalloc_oob_16+0xb4/0x3f8 [ 31.109322] kunit_try_run_case+0x170/0x3f0 [ 31.109362] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.110364] kthread+0x328/0x630 [ 31.110558] ret_from_fork+0x10/0x20 [ 31.110788] [ 31.111303] The buggy address belongs to the object at fff00000c7981640 [ 31.111303] which belongs to the cache kmalloc-16 of size 16 [ 31.111557] The buggy address is located 0 bytes inside of [ 31.111557] allocated 13-byte region [fff00000c7981640, fff00000c798164d) [ 31.112110] [ 31.112841] The buggy address belongs to the physical page: [ 31.113091] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107981 [ 31.113150] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.113200] page_type: f5(slab) [ 31.113250] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 31.113300] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 31.114497] page dumped because: kasan: bad access detected [ 31.115024] [ 31.115334] Memory state around the buggy address: [ 31.115555] fff00000c7981500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.115975] fff00000c7981580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 31.116762] >fff00000c7981600: fa fb fc fc fa fb fc fc 00 05 fc fc 00 00 fc fc [ 31.116820] ^ [ 31.116857] fff00000c7981680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.116898] fff00000c7981700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.116935] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 31.075984] ================================================================== [ 31.076051] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 31.076105] Read of size 1 at addr fff00000c91e0600 by task kunit_try_catch/195 [ 31.076153] [ 31.076186] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 31.076286] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.076311] Hardware name: linux,dummy-virt (DT) [ 31.076342] Call trace: [ 31.076378] show_stack+0x20/0x38 (C) [ 31.076430] dump_stack_lvl+0x8c/0xd0 [ 31.076538] print_report+0x118/0x5d0 [ 31.076643] kasan_report+0xdc/0x128 [ 31.076691] __kasan_check_byte+0x54/0x70 [ 31.076782] krealloc_noprof+0x44/0x360 [ 31.076831] krealloc_uaf+0x180/0x520 [ 31.076887] kunit_try_run_case+0x170/0x3f0 [ 31.076937] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.077088] kthread+0x328/0x630 [ 31.077180] ret_from_fork+0x10/0x20 [ 31.077287] [ 31.077369] Allocated by task 195: [ 31.077400] kasan_save_stack+0x3c/0x68 [ 31.077443] kasan_save_track+0x20/0x40 [ 31.077481] kasan_save_alloc_info+0x40/0x58 [ 31.077517] __kasan_kmalloc+0xd4/0xd8 [ 31.077563] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.077602] krealloc_uaf+0xc8/0x520 [ 31.077638] kunit_try_run_case+0x170/0x3f0 [ 31.077717] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.077771] kthread+0x328/0x630 [ 31.077803] ret_from_fork+0x10/0x20 [ 31.077838] [ 31.077857] Freed by task 195: [ 31.077882] kasan_save_stack+0x3c/0x68 [ 31.077920] kasan_save_track+0x20/0x40 [ 31.077956] kasan_save_free_info+0x4c/0x78 [ 31.077992] __kasan_slab_free+0x6c/0x98 [ 31.078029] kfree+0x214/0x3c8 [ 31.078062] krealloc_uaf+0x12c/0x520 [ 31.078120] kunit_try_run_case+0x170/0x3f0 [ 31.078159] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.078225] kthread+0x328/0x630 [ 31.078316] ret_from_fork+0x10/0x20 [ 31.078351] [ 31.078370] The buggy address belongs to the object at fff00000c91e0600 [ 31.078370] which belongs to the cache kmalloc-256 of size 256 [ 31.078473] The buggy address is located 0 bytes inside of [ 31.078473] freed 256-byte region [fff00000c91e0600, fff00000c91e0700) [ 31.078535] [ 31.078781] The buggy address belongs to the physical page: [ 31.078949] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c91e0000 pfn:0x1091e0 [ 31.079015] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.079061] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.079202] page_type: f5(slab) [ 31.079402] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 31.079499] raw: fff00000c91e0000 000000008010000f 00000000f5000000 0000000000000000 [ 31.079548] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 31.079595] head: fff00000c91e0000 000000008010000f 00000000f5000000 0000000000000000 [ 31.080008] head: 0bfffe0000000001 ffffc1ffc3247801 00000000ffffffff 00000000ffffffff [ 31.080126] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 31.080194] page dumped because: kasan: bad access detected [ 31.080276] [ 31.080361] Memory state around the buggy address: [ 31.080393] fff00000c91e0500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.080441] fff00000c91e0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.080482] >fff00000c91e0600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.080519] ^ [ 31.080547] fff00000c91e0680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.080595] fff00000c91e0700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.080631] ================================================================== [ 31.081987] ================================================================== [ 31.082036] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 31.082084] Read of size 1 at addr fff00000c91e0600 by task kunit_try_catch/195 [ 31.082136] [ 31.082166] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 31.082278] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.082305] Hardware name: linux,dummy-virt (DT) [ 31.082335] Call trace: [ 31.082424] show_stack+0x20/0x38 (C) [ 31.082538] dump_stack_lvl+0x8c/0xd0 [ 31.082587] print_report+0x118/0x5d0 [ 31.083198] kasan_report+0xdc/0x128 [ 31.083417] __asan_report_load1_noabort+0x20/0x30 [ 31.083498] krealloc_uaf+0x4c8/0x520 [ 31.083737] kunit_try_run_case+0x170/0x3f0 [ 31.083786] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.083846] kthread+0x328/0x630 [ 31.083976] ret_from_fork+0x10/0x20 [ 31.084070] [ 31.084139] Allocated by task 195: [ 31.084224] kasan_save_stack+0x3c/0x68 [ 31.084266] kasan_save_track+0x20/0x40 [ 31.084303] kasan_save_alloc_info+0x40/0x58 [ 31.084339] __kasan_kmalloc+0xd4/0xd8 [ 31.084382] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.084532] krealloc_uaf+0xc8/0x520 [ 31.084892] kunit_try_run_case+0x170/0x3f0 [ 31.085227] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.085278] kthread+0x328/0x630 [ 31.085310] ret_from_fork+0x10/0x20 [ 31.085345] [ 31.085431] Freed by task 195: [ 31.085553] kasan_save_stack+0x3c/0x68 [ 31.085771] kasan_save_track+0x20/0x40 [ 31.085819] kasan_save_free_info+0x4c/0x78 [ 31.085854] __kasan_slab_free+0x6c/0x98 [ 31.085955] kfree+0x214/0x3c8 [ 31.085994] krealloc_uaf+0x12c/0x520 [ 31.086030] kunit_try_run_case+0x170/0x3f0 [ 31.086427] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.086474] kthread+0x328/0x630 [ 31.086576] ret_from_fork+0x10/0x20 [ 31.086611] [ 31.086630] The buggy address belongs to the object at fff00000c91e0600 [ 31.086630] which belongs to the cache kmalloc-256 of size 256 [ 31.086945] The buggy address is located 0 bytes inside of [ 31.086945] freed 256-byte region [fff00000c91e0600, fff00000c91e0700) [ 31.087039] [ 31.087059] The buggy address belongs to the physical page: [ 31.087109] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c91e0000 pfn:0x1091e0 [ 31.087279] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.087477] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.087629] page_type: f5(slab) [ 31.087667] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 31.087716] raw: fff00000c91e0000 000000008010000f 00000000f5000000 0000000000000000 [ 31.087770] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 31.087818] head: fff00000c91e0000 000000008010000f 00000000f5000000 0000000000000000 [ 31.087904] head: 0bfffe0000000001 ffffc1ffc3247801 00000000ffffffff 00000000ffffffff [ 31.088220] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 31.088428] page dumped because: kasan: bad access detected [ 31.088459] [ 31.088477] Memory state around the buggy address: [ 31.088554] fff00000c91e0500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.088602] fff00000c91e0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.088644] >fff00000c91e0600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.088835] ^ [ 31.089041] fff00000c91e0680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.089086] fff00000c91e0700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.089122] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 30.968921] ================================================================== [ 30.969023] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 30.969102] Write of size 1 at addr fff00000c91e04da by task kunit_try_catch/189 [ 30.969181] [ 30.969278] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 30.969373] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.969422] Hardware name: linux,dummy-virt (DT) [ 30.969452] Call trace: [ 30.969475] show_stack+0x20/0x38 (C) [ 30.969523] dump_stack_lvl+0x8c/0xd0 [ 30.969787] print_report+0x118/0x5d0 [ 30.969894] kasan_report+0xdc/0x128 [ 30.969995] __asan_report_store1_noabort+0x20/0x30 [ 30.970116] krealloc_less_oob_helper+0xa80/0xc50 [ 30.970194] krealloc_less_oob+0x20/0x38 [ 30.970273] kunit_try_run_case+0x170/0x3f0 [ 30.970531] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.970618] kthread+0x328/0x630 [ 30.970677] ret_from_fork+0x10/0x20 [ 30.970754] [ 30.970782] Allocated by task 189: [ 30.970810] kasan_save_stack+0x3c/0x68 [ 30.970851] kasan_save_track+0x20/0x40 [ 30.970906] kasan_save_alloc_info+0x40/0x58 [ 30.970943] __kasan_krealloc+0x118/0x178 [ 30.970982] krealloc_noprof+0x128/0x360 [ 30.971030] krealloc_less_oob_helper+0x168/0xc50 [ 30.971069] krealloc_less_oob+0x20/0x38 [ 30.971105] kunit_try_run_case+0x170/0x3f0 [ 30.971143] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.971202] kthread+0x328/0x630 [ 30.971243] ret_from_fork+0x10/0x20 [ 30.971278] [ 30.971296] The buggy address belongs to the object at fff00000c91e0400 [ 30.971296] which belongs to the cache kmalloc-256 of size 256 [ 30.971351] The buggy address is located 17 bytes to the right of [ 30.971351] allocated 201-byte region [fff00000c91e0400, fff00000c91e04c9) [ 30.971618] [ 30.971670] The buggy address belongs to the physical page: [ 30.971711] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c91e0000 pfn:0x1091e0 [ 30.971804] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.971926] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.971995] page_type: f5(slab) [ 30.972032] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.972081] raw: fff00000c91e0000 000000008010000f 00000000f5000000 0000000000000000 [ 30.972130] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.972271] head: fff00000c91e0000 000000008010000f 00000000f5000000 0000000000000000 [ 30.972334] head: 0bfffe0000000001 ffffc1ffc3247801 00000000ffffffff 00000000ffffffff [ 30.972459] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.972569] page dumped because: kasan: bad access detected [ 30.972640] [ 30.972732] Memory state around the buggy address: [ 30.972763] fff00000c91e0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.972804] fff00000c91e0400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.972861] >fff00000c91e0480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.972900] ^ [ 30.973099] fff00000c91e0500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.973306] fff00000c91e0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.973416] ================================================================== [ 30.962791] ================================================================== [ 30.962994] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 30.963060] Write of size 1 at addr fff00000c91e04d0 by task kunit_try_catch/189 [ 30.963118] [ 30.963157] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 30.963266] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.963293] Hardware name: linux,dummy-virt (DT) [ 30.963322] Call trace: [ 30.963353] show_stack+0x20/0x38 (C) [ 30.963408] dump_stack_lvl+0x8c/0xd0 [ 30.963454] print_report+0x118/0x5d0 [ 30.963587] kasan_report+0xdc/0x128 [ 30.963786] __asan_report_store1_noabort+0x20/0x30 [ 30.963865] krealloc_less_oob_helper+0xb9c/0xc50 [ 30.963924] krealloc_less_oob+0x20/0x38 [ 30.963971] kunit_try_run_case+0x170/0x3f0 [ 30.964045] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.964101] kthread+0x328/0x630 [ 30.964142] ret_from_fork+0x10/0x20 [ 30.964189] [ 30.964322] Allocated by task 189: [ 30.964359] kasan_save_stack+0x3c/0x68 [ 30.964494] kasan_save_track+0x20/0x40 [ 30.964551] kasan_save_alloc_info+0x40/0x58 [ 30.964591] __kasan_krealloc+0x118/0x178 [ 30.964629] krealloc_noprof+0x128/0x360 [ 30.964667] krealloc_less_oob_helper+0x168/0xc50 [ 30.964705] krealloc_less_oob+0x20/0x38 [ 30.964741] kunit_try_run_case+0x170/0x3f0 [ 30.964845] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.964923] kthread+0x328/0x630 [ 30.964954] ret_from_fork+0x10/0x20 [ 30.964989] [ 30.965032] The buggy address belongs to the object at fff00000c91e0400 [ 30.965032] which belongs to the cache kmalloc-256 of size 256 [ 30.965091] The buggy address is located 7 bytes to the right of [ 30.965091] allocated 201-byte region [fff00000c91e0400, fff00000c91e04c9) [ 30.965152] [ 30.965170] The buggy address belongs to the physical page: [ 30.965200] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c91e0000 pfn:0x1091e0 [ 30.965268] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.965314] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.965362] page_type: f5(slab) [ 30.965399] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.965585] raw: fff00000c91e0000 000000008010000f 00000000f5000000 0000000000000000 [ 30.965719] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.965788] head: fff00000c91e0000 000000008010000f 00000000f5000000 0000000000000000 [ 30.965859] head: 0bfffe0000000001 ffffc1ffc3247801 00000000ffffffff 00000000ffffffff [ 30.965929] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.966019] page dumped because: kasan: bad access detected [ 30.966080] [ 30.966131] Memory state around the buggy address: [ 30.966168] fff00000c91e0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.966246] fff00000c91e0400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.966287] >fff00000c91e0480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.966565] ^ [ 30.966653] fff00000c91e0500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.966738] fff00000c91e0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.966786] ================================================================== [ 31.010740] ================================================================== [ 31.010794] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 31.010846] Write of size 1 at addr fff00000c9a2a0c9 by task kunit_try_catch/193 [ 31.010894] [ 31.010926] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 31.011006] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.011032] Hardware name: linux,dummy-virt (DT) [ 31.011063] Call trace: [ 31.011085] show_stack+0x20/0x38 (C) [ 31.011133] dump_stack_lvl+0x8c/0xd0 [ 31.011180] print_report+0x118/0x5d0 [ 31.011254] kasan_report+0xdc/0x128 [ 31.011300] __asan_report_store1_noabort+0x20/0x30 [ 31.011348] krealloc_less_oob_helper+0xa48/0xc50 [ 31.011396] krealloc_large_less_oob+0x20/0x38 [ 31.011443] kunit_try_run_case+0x170/0x3f0 [ 31.011492] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.011545] kthread+0x328/0x630 [ 31.011586] ret_from_fork+0x10/0x20 [ 31.013292] [ 31.013328] The buggy address belongs to the physical page: [ 31.013361] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a28 [ 31.013416] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.013716] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.013771] page_type: f8(unknown) [ 31.014313] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.014364] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.014412] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.014459] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.014510] head: 0bfffe0000000002 ffffc1ffc3268a01 00000000ffffffff 00000000ffffffff [ 31.014558] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 31.014597] page dumped because: kasan: bad access detected [ 31.014628] [ 31.014646] Memory state around the buggy address: [ 31.014676] fff00000c9a29f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.014718] fff00000c9a2a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.014757] >fff00000c9a2a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 31.014793] ^ [ 31.014826] fff00000c9a2a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.014866] fff00000c9a2a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.014903] ================================================================== [ 31.021434] ================================================================== [ 31.021527] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 31.021577] Write of size 1 at addr fff00000c9a2a0d0 by task kunit_try_catch/193 [ 31.021625] [ 31.022438] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 31.022619] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.022647] Hardware name: linux,dummy-virt (DT) [ 31.023659] Call trace: [ 31.023876] show_stack+0x20/0x38 (C) [ 31.024124] dump_stack_lvl+0x8c/0xd0 [ 31.024175] print_report+0x118/0x5d0 [ 31.024233] kasan_report+0xdc/0x128 [ 31.024280] __asan_report_store1_noabort+0x20/0x30 [ 31.025509] krealloc_less_oob_helper+0xb9c/0xc50 [ 31.025855] krealloc_large_less_oob+0x20/0x38 [ 31.026635] kunit_try_run_case+0x170/0x3f0 [ 31.026699] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.027122] kthread+0x328/0x630 [ 31.027734] ret_from_fork+0x10/0x20 [ 31.028698] [ 31.029060] The buggy address belongs to the physical page: [ 31.029228] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a28 [ 31.029741] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.029978] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.030545] page_type: f8(unknown) [ 31.030781] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.031052] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.031519] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.031608] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.032101] head: 0bfffe0000000002 ffffc1ffc3268a01 00000000ffffffff 00000000ffffffff [ 31.032160] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 31.032199] page dumped because: kasan: bad access detected [ 31.032241] [ 31.032259] Memory state around the buggy address: [ 31.032290] fff00000c9a29f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.032331] fff00000c9a2a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.032377] >fff00000c9a2a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 31.032415] ^ [ 31.032451] fff00000c9a2a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.032491] fff00000c9a2a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.032528] ================================================================== [ 31.035146] ================================================================== [ 31.035645] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 31.036518] Write of size 1 at addr fff00000c9a2a0da by task kunit_try_catch/193 [ 31.037009] [ 31.037231] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 31.037471] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.037528] Hardware name: linux,dummy-virt (DT) [ 31.037560] Call trace: [ 31.037583] show_stack+0x20/0x38 (C) [ 31.037750] dump_stack_lvl+0x8c/0xd0 [ 31.037822] print_report+0x118/0x5d0 [ 31.038268] kasan_report+0xdc/0x128 [ 31.038548] __asan_report_store1_noabort+0x20/0x30 [ 31.038739] krealloc_less_oob_helper+0xa80/0xc50 [ 31.038952] krealloc_large_less_oob+0x20/0x38 [ 31.039001] kunit_try_run_case+0x170/0x3f0 [ 31.039052] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.039104] kthread+0x328/0x630 [ 31.039322] ret_from_fork+0x10/0x20 [ 31.039665] [ 31.039689] The buggy address belongs to the physical page: [ 31.040036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a28 [ 31.040478] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.040593] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.040908] page_type: f8(unknown) [ 31.040948] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.040997] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.041045] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.041479] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.041570] head: 0bfffe0000000002 ffffc1ffc3268a01 00000000ffffffff 00000000ffffffff [ 31.041771] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 31.042067] page dumped because: kasan: bad access detected [ 31.042104] [ 31.042251] Memory state around the buggy address: [ 31.042284] fff00000c9a29f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.042538] fff00000c9a2a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.042853] >fff00000c9a2a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 31.042893] ^ [ 31.042930] fff00000c9a2a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.042971] fff00000c9a2a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.043007] ================================================================== [ 30.958390] ================================================================== [ 30.958444] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 30.958515] Write of size 1 at addr fff00000c91e04c9 by task kunit_try_catch/189 [ 30.958581] [ 30.958613] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 30.958804] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.958838] Hardware name: linux,dummy-virt (DT) [ 30.959017] Call trace: [ 30.959100] show_stack+0x20/0x38 (C) [ 30.959155] dump_stack_lvl+0x8c/0xd0 [ 30.959202] print_report+0x118/0x5d0 [ 30.959261] kasan_report+0xdc/0x128 [ 30.959306] __asan_report_store1_noabort+0x20/0x30 [ 30.959362] krealloc_less_oob_helper+0xa48/0xc50 [ 30.959420] krealloc_less_oob+0x20/0x38 [ 30.959467] kunit_try_run_case+0x170/0x3f0 [ 30.959525] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.959578] kthread+0x328/0x630 [ 30.959619] ret_from_fork+0x10/0x20 [ 30.959672] [ 30.959691] Allocated by task 189: [ 30.959718] kasan_save_stack+0x3c/0x68 [ 30.959759] kasan_save_track+0x20/0x40 [ 30.959804] kasan_save_alloc_info+0x40/0x58 [ 30.959841] __kasan_krealloc+0x118/0x178 [ 30.959884] krealloc_noprof+0x128/0x360 [ 30.959922] krealloc_less_oob_helper+0x168/0xc50 [ 30.959978] krealloc_less_oob+0x20/0x38 [ 30.960015] kunit_try_run_case+0x170/0x3f0 [ 30.960062] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.960105] kthread+0x328/0x630 [ 30.960137] ret_from_fork+0x10/0x20 [ 30.960171] [ 30.960190] The buggy address belongs to the object at fff00000c91e0400 [ 30.960190] which belongs to the cache kmalloc-256 of size 256 [ 30.960665] The buggy address is located 0 bytes to the right of [ 30.960665] allocated 201-byte region [fff00000c91e0400, fff00000c91e04c9) [ 30.960768] [ 30.960790] The buggy address belongs to the physical page: [ 30.960859] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c91e0000 pfn:0x1091e0 [ 30.960916] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.961066] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.961194] page_type: f5(slab) [ 30.961244] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.961415] raw: fff00000c91e0000 000000008010000f 00000000f5000000 0000000000000000 [ 30.961517] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.961577] head: fff00000c91e0000 000000008010000f 00000000f5000000 0000000000000000 [ 30.961639] head: 0bfffe0000000001 ffffc1ffc3247801 00000000ffffffff 00000000ffffffff [ 30.961688] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.961751] page dumped because: kasan: bad access detected [ 30.961781] [ 30.961798] Memory state around the buggy address: [ 30.961829] fff00000c91e0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.961981] fff00000c91e0400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.962064] >fff00000c91e0480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.962127] ^ [ 30.962188] fff00000c91e0500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.962263] fff00000c91e0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.962323] ================================================================== [ 30.978698] ================================================================== [ 30.978864] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 30.978920] Write of size 1 at addr fff00000c91e04eb by task kunit_try_catch/189 [ 30.979122] [ 30.979219] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 30.979313] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.979410] Hardware name: linux,dummy-virt (DT) [ 30.979479] Call trace: [ 30.979508] show_stack+0x20/0x38 (C) [ 30.979558] dump_stack_lvl+0x8c/0xd0 [ 30.979613] print_report+0x118/0x5d0 [ 30.979660] kasan_report+0xdc/0x128 [ 30.979714] __asan_report_store1_noabort+0x20/0x30 [ 30.979770] krealloc_less_oob_helper+0xa58/0xc50 [ 30.979904] krealloc_less_oob+0x20/0x38 [ 30.979958] kunit_try_run_case+0x170/0x3f0 [ 30.980006] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.980120] kthread+0x328/0x630 [ 30.980182] ret_from_fork+0x10/0x20 [ 30.980305] [ 30.980366] Allocated by task 189: [ 30.980396] kasan_save_stack+0x3c/0x68 [ 30.980569] kasan_save_track+0x20/0x40 [ 30.980735] kasan_save_alloc_info+0x40/0x58 [ 30.980891] __kasan_krealloc+0x118/0x178 [ 30.980972] krealloc_noprof+0x128/0x360 [ 30.981046] krealloc_less_oob_helper+0x168/0xc50 [ 30.981129] krealloc_less_oob+0x20/0x38 [ 30.981186] kunit_try_run_case+0x170/0x3f0 [ 30.981235] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.981279] kthread+0x328/0x630 [ 30.981310] ret_from_fork+0x10/0x20 [ 30.981347] [ 30.981366] The buggy address belongs to the object at fff00000c91e0400 [ 30.981366] which belongs to the cache kmalloc-256 of size 256 [ 30.981422] The buggy address is located 34 bytes to the right of [ 30.981422] allocated 201-byte region [fff00000c91e0400, fff00000c91e04c9) [ 30.981483] [ 30.981503] The buggy address belongs to the physical page: [ 30.981532] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c91e0000 pfn:0x1091e0 [ 30.981914] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.981983] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.982071] page_type: f5(slab) [ 30.982160] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.982235] raw: fff00000c91e0000 000000008010000f 00000000f5000000 0000000000000000 [ 30.982334] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.982381] head: fff00000c91e0000 000000008010000f 00000000f5000000 0000000000000000 [ 30.982450] head: 0bfffe0000000001 ffffc1ffc3247801 00000000ffffffff 00000000ffffffff [ 30.982628] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.982690] page dumped because: kasan: bad access detected [ 30.982787] [ 30.982839] Memory state around the buggy address: [ 30.982972] fff00000c91e0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.983017] fff00000c91e0400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.983064] >fff00000c91e0480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.983122] ^ [ 30.983361] fff00000c91e0500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.983482] fff00000c91e0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.983585] ================================================================== [ 31.052816] ================================================================== [ 31.052861] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 31.053283] Write of size 1 at addr fff00000c9a2a0eb by task kunit_try_catch/193 [ 31.053562] [ 31.053802] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 31.054307] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.054350] Hardware name: linux,dummy-virt (DT) [ 31.054381] Call trace: [ 31.054416] show_stack+0x20/0x38 (C) [ 31.054568] dump_stack_lvl+0x8c/0xd0 [ 31.054842] print_report+0x118/0x5d0 [ 31.054899] kasan_report+0xdc/0x128 [ 31.055283] __asan_report_store1_noabort+0x20/0x30 [ 31.055379] krealloc_less_oob_helper+0xa58/0xc50 [ 31.055428] krealloc_large_less_oob+0x20/0x38 [ 31.055475] kunit_try_run_case+0x170/0x3f0 [ 31.055522] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.055575] kthread+0x328/0x630 [ 31.055617] ret_from_fork+0x10/0x20 [ 31.055663] [ 31.055682] The buggy address belongs to the physical page: [ 31.056494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a28 [ 31.056634] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.056907] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.057157] page_type: f8(unknown) [ 31.057201] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.057322] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.057370] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.057416] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.057463] head: 0bfffe0000000002 ffffc1ffc3268a01 00000000ffffffff 00000000ffffffff [ 31.057549] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 31.057648] page dumped because: kasan: bad access detected [ 31.057679] [ 31.057739] Memory state around the buggy address: [ 31.057800] fff00000c9a29f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.058153] fff00000c9a2a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.058482] >fff00000c9a2a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 31.058531] ^ [ 31.058654] fff00000c9a2a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.058946] fff00000c9a2a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.058983] ================================================================== [ 31.044595] ================================================================== [ 31.044642] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 31.044690] Write of size 1 at addr fff00000c9a2a0ea by task kunit_try_catch/193 [ 31.044739] [ 31.044767] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 31.044848] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.044873] Hardware name: linux,dummy-virt (DT) [ 31.045005] Call trace: [ 31.045176] show_stack+0x20/0x38 (C) [ 31.045875] dump_stack_lvl+0x8c/0xd0 [ 31.046086] print_report+0x118/0x5d0 [ 31.046174] kasan_report+0xdc/0x128 [ 31.046231] __asan_report_store1_noabort+0x20/0x30 [ 31.046279] krealloc_less_oob_helper+0xae4/0xc50 [ 31.046568] krealloc_large_less_oob+0x20/0x38 [ 31.046739] kunit_try_run_case+0x170/0x3f0 [ 31.046909] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.047309] kthread+0x328/0x630 [ 31.047622] ret_from_fork+0x10/0x20 [ 31.047948] [ 31.047977] The buggy address belongs to the physical page: [ 31.048068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a28 [ 31.048397] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.048604] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.049100] page_type: f8(unknown) [ 31.049152] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.049310] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.049362] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.049747] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.049911] head: 0bfffe0000000002 ffffc1ffc3268a01 00000000ffffffff 00000000ffffffff [ 31.050007] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 31.050052] page dumped because: kasan: bad access detected [ 31.050083] [ 31.050528] Memory state around the buggy address: [ 31.050579] fff00000c9a29f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.050624] fff00000c9a2a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.050665] >fff00000c9a2a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 31.050701] ^ [ 31.051476] fff00000c9a2a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.051754] fff00000c9a2a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.052132] ================================================================== [ 30.974536] ================================================================== [ 30.974773] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 30.974831] Write of size 1 at addr fff00000c91e04ea by task kunit_try_catch/189 [ 30.974899] [ 30.974937] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 30.975029] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.975056] Hardware name: linux,dummy-virt (DT) [ 30.975085] Call trace: [ 30.975115] show_stack+0x20/0x38 (C) [ 30.975164] dump_stack_lvl+0x8c/0xd0 [ 30.975221] print_report+0x118/0x5d0 [ 30.975357] kasan_report+0xdc/0x128 [ 30.975510] __asan_report_store1_noabort+0x20/0x30 [ 30.975637] krealloc_less_oob_helper+0xae4/0xc50 [ 30.975707] krealloc_less_oob+0x20/0x38 [ 30.975754] kunit_try_run_case+0x170/0x3f0 [ 30.975819] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.975873] kthread+0x328/0x630 [ 30.975923] ret_from_fork+0x10/0x20 [ 30.975970] [ 30.975988] Allocated by task 189: [ 30.976021] kasan_save_stack+0x3c/0x68 [ 30.976143] kasan_save_track+0x20/0x40 [ 30.976188] kasan_save_alloc_info+0x40/0x58 [ 30.976235] __kasan_krealloc+0x118/0x178 [ 30.976273] krealloc_noprof+0x128/0x360 [ 30.976310] krealloc_less_oob_helper+0x168/0xc50 [ 30.976348] krealloc_less_oob+0x20/0x38 [ 30.976384] kunit_try_run_case+0x170/0x3f0 [ 30.976421] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.976592] kthread+0x328/0x630 [ 30.976708] ret_from_fork+0x10/0x20 [ 30.976783] [ 30.976848] The buggy address belongs to the object at fff00000c91e0400 [ 30.976848] which belongs to the cache kmalloc-256 of size 256 [ 30.976928] The buggy address is located 33 bytes to the right of [ 30.976928] allocated 201-byte region [fff00000c91e0400, fff00000c91e04c9) [ 30.977011] [ 30.977031] The buggy address belongs to the physical page: [ 30.977061] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c91e0000 pfn:0x1091e0 [ 30.977115] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.977161] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.977574] page_type: f5(slab) [ 30.977645] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.977729] raw: fff00000c91e0000 000000008010000f 00000000f5000000 0000000000000000 [ 30.977835] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.977882] head: fff00000c91e0000 000000008010000f 00000000f5000000 0000000000000000 [ 30.977930] head: 0bfffe0000000001 ffffc1ffc3247801 00000000ffffffff 00000000ffffffff [ 30.977983] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.978041] page dumped because: kasan: bad access detected [ 30.978076] [ 30.978118] Memory state around the buggy address: [ 30.978150] fff00000c91e0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.978199] fff00000c91e0400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.978250] >fff00000c91e0480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.978287] ^ [ 30.978323] fff00000c91e0500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.978373] fff00000c91e0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.978409] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 30.988344] ================================================================== [ 30.988461] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 30.988670] Write of size 1 at addr fff00000c9a2a0eb by task kunit_try_catch/191 [ 30.988884] [ 30.988944] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 30.989114] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.989154] Hardware name: linux,dummy-virt (DT) [ 30.989186] Call trace: [ 30.989228] show_stack+0x20/0x38 (C) [ 30.989298] dump_stack_lvl+0x8c/0xd0 [ 30.989387] print_report+0x118/0x5d0 [ 30.989511] kasan_report+0xdc/0x128 [ 30.989608] __asan_report_store1_noabort+0x20/0x30 [ 30.989664] krealloc_more_oob_helper+0x60c/0x678 [ 30.989861] krealloc_large_more_oob+0x20/0x38 [ 30.989915] kunit_try_run_case+0x170/0x3f0 [ 30.989965] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.990624] kthread+0x328/0x630 [ 30.990676] ret_from_fork+0x10/0x20 [ 30.991130] [ 30.991678] The buggy address belongs to the physical page: [ 30.991964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a28 [ 30.992347] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.992484] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.992545] page_type: f8(unknown) [ 30.992592] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.992644] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.993200] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.993911] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.994335] head: 0bfffe0000000002 ffffc1ffc3268a01 00000000ffffffff 00000000ffffffff [ 30.994930] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.995010] page dumped because: kasan: bad access detected [ 30.995042] [ 30.995366] Memory state around the buggy address: [ 30.995752] fff00000c9a29f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.996180] fff00000c9a2a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.996911] >fff00000c9a2a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 30.996961] ^ [ 30.997381] fff00000c9a2a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.997595] fff00000c9a2a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.998076] ================================================================== [ 30.943607] ================================================================== [ 30.943662] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 30.943714] Write of size 1 at addr fff00000c91e02eb by task kunit_try_catch/187 [ 30.944048] [ 30.944137] CPU: 0 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 30.944237] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.944274] Hardware name: linux,dummy-virt (DT) [ 30.944304] Call trace: [ 30.944327] show_stack+0x20/0x38 (C) [ 30.944385] dump_stack_lvl+0x8c/0xd0 [ 30.944432] print_report+0x118/0x5d0 [ 30.944478] kasan_report+0xdc/0x128 [ 30.944532] __asan_report_store1_noabort+0x20/0x30 [ 30.944619] krealloc_more_oob_helper+0x60c/0x678 [ 30.944683] krealloc_more_oob+0x20/0x38 [ 30.944729] kunit_try_run_case+0x170/0x3f0 [ 30.944779] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.944832] kthread+0x328/0x630 [ 30.944873] ret_from_fork+0x10/0x20 [ 30.945049] [ 30.945096] Allocated by task 187: [ 30.945246] kasan_save_stack+0x3c/0x68 [ 30.945317] kasan_save_track+0x20/0x40 [ 30.945365] kasan_save_alloc_info+0x40/0x58 [ 30.945418] __kasan_krealloc+0x118/0x178 [ 30.945489] krealloc_noprof+0x128/0x360 [ 30.945608] krealloc_more_oob_helper+0x168/0x678 [ 30.945679] krealloc_more_oob+0x20/0x38 [ 30.945745] kunit_try_run_case+0x170/0x3f0 [ 30.945783] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.945839] kthread+0x328/0x630 [ 30.945900] ret_from_fork+0x10/0x20 [ 30.946033] [ 30.946075] The buggy address belongs to the object at fff00000c91e0200 [ 30.946075] which belongs to the cache kmalloc-256 of size 256 [ 30.946143] The buggy address is located 0 bytes to the right of [ 30.946143] allocated 235-byte region [fff00000c91e0200, fff00000c91e02eb) [ 30.946404] [ 30.946509] The buggy address belongs to the physical page: [ 30.946666] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c91e0000 pfn:0x1091e0 [ 30.946788] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.946869] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.946948] page_type: f5(slab) [ 30.947065] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.947133] raw: fff00000c91e0000 000000008010000f 00000000f5000000 0000000000000000 [ 30.947227] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.947336] head: fff00000c91e0000 000000008010000f 00000000f5000000 0000000000000000 [ 30.947413] head: 0bfffe0000000001 ffffc1ffc3247801 00000000ffffffff 00000000ffffffff [ 30.947461] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.947682] page dumped because: kasan: bad access detected [ 30.947849] [ 30.947891] Memory state around the buggy address: [ 30.947997] fff00000c91e0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.948062] fff00000c91e0200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.948129] >fff00000c91e0280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 30.948165] ^ [ 30.948494] fff00000c91e0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.948632] fff00000c91e0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.948774] ================================================================== [ 31.003890] ================================================================== [ 31.003943] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 31.003996] Write of size 1 at addr fff00000c9a2a0f0 by task kunit_try_catch/191 [ 31.004046] [ 31.004077] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 31.004157] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.004183] Hardware name: linux,dummy-virt (DT) [ 31.004228] Call trace: [ 31.004250] show_stack+0x20/0x38 (C) [ 31.004296] dump_stack_lvl+0x8c/0xd0 [ 31.004343] print_report+0x118/0x5d0 [ 31.004389] kasan_report+0xdc/0x128 [ 31.004435] __asan_report_store1_noabort+0x20/0x30 [ 31.004482] krealloc_more_oob_helper+0x5c0/0x678 [ 31.004530] krealloc_large_more_oob+0x20/0x38 [ 31.004592] kunit_try_run_case+0x170/0x3f0 [ 31.004640] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.004693] kthread+0x328/0x630 [ 31.004733] ret_from_fork+0x10/0x20 [ 31.004780] [ 31.004799] The buggy address belongs to the physical page: [ 31.004829] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a28 [ 31.004880] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.004926] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.004977] page_type: f8(unknown) [ 31.005014] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.005062] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.005109] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.005156] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.005203] head: 0bfffe0000000002 ffffc1ffc3268a01 00000000ffffffff 00000000ffffffff [ 31.006436] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 31.006477] page dumped because: kasan: bad access detected [ 31.006508] [ 31.006527] Memory state around the buggy address: [ 31.006558] fff00000c9a29f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.006601] fff00000c9a2a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.006732] >fff00000c9a2a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 31.007616] ^ [ 31.007670] fff00000c9a2a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.007715] fff00000c9a2a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.007752] ================================================================== [ 30.949700] ================================================================== [ 30.949747] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 30.949794] Write of size 1 at addr fff00000c91e02f0 by task kunit_try_catch/187 [ 30.949842] [ 30.949870] CPU: 0 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 30.950188] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.950240] Hardware name: linux,dummy-virt (DT) [ 30.950289] Call trace: [ 30.950345] show_stack+0x20/0x38 (C) [ 30.950413] dump_stack_lvl+0x8c/0xd0 [ 30.950504] print_report+0x118/0x5d0 [ 30.950551] kasan_report+0xdc/0x128 [ 30.950597] __asan_report_store1_noabort+0x20/0x30 [ 30.950644] krealloc_more_oob_helper+0x5c0/0x678 [ 30.950700] krealloc_more_oob+0x20/0x38 [ 30.950767] kunit_try_run_case+0x170/0x3f0 [ 30.950826] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.950879] kthread+0x328/0x630 [ 30.950938] ret_from_fork+0x10/0x20 [ 30.951032] [ 30.951050] Allocated by task 187: [ 30.951078] kasan_save_stack+0x3c/0x68 [ 30.951117] kasan_save_track+0x20/0x40 [ 30.951154] kasan_save_alloc_info+0x40/0x58 [ 30.951190] __kasan_krealloc+0x118/0x178 [ 30.951238] krealloc_noprof+0x128/0x360 [ 30.951380] krealloc_more_oob_helper+0x168/0x678 [ 30.951422] krealloc_more_oob+0x20/0x38 [ 30.951457] kunit_try_run_case+0x170/0x3f0 [ 30.951495] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.951658] kthread+0x328/0x630 [ 30.951703] ret_from_fork+0x10/0x20 [ 30.951796] [ 30.951825] The buggy address belongs to the object at fff00000c91e0200 [ 30.951825] which belongs to the cache kmalloc-256 of size 256 [ 30.951883] The buggy address is located 5 bytes to the right of [ 30.951883] allocated 235-byte region [fff00000c91e0200, fff00000c91e02eb) [ 30.951956] [ 30.951975] The buggy address belongs to the physical page: [ 30.952005] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c91e0000 pfn:0x1091e0 [ 30.952059] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.952105] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.952154] page_type: f5(slab) [ 30.952190] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.952249] raw: fff00000c91e0000 000000008010000f 00000000f5000000 0000000000000000 [ 30.952297] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.952344] head: fff00000c91e0000 000000008010000f 00000000f5000000 0000000000000000 [ 30.952391] head: 0bfffe0000000001 ffffc1ffc3247801 00000000ffffffff 00000000ffffffff [ 30.952437] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.952484] page dumped because: kasan: bad access detected [ 30.952522] [ 30.952573] Memory state around the buggy address: [ 30.952608] fff00000c91e0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.952651] fff00000c91e0200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.952692] >fff00000c91e0280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 30.952727] ^ [ 30.952984] fff00000c91e0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.953049] fff00000c91e0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.953104] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 30.935757] ================================================================== [ 30.935830] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 30.935888] Read of size 1 at addr fff00000c9ae0000 by task kunit_try_catch/185 [ 30.935939] [ 30.935979] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 30.936062] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.936088] Hardware name: linux,dummy-virt (DT) [ 30.936429] Call trace: [ 30.936493] show_stack+0x20/0x38 (C) [ 30.936601] dump_stack_lvl+0x8c/0xd0 [ 30.936680] print_report+0x118/0x5d0 [ 30.936761] kasan_report+0xdc/0x128 [ 30.936832] __asan_report_load1_noabort+0x20/0x30 [ 30.936907] page_alloc_uaf+0x328/0x350 [ 30.937005] kunit_try_run_case+0x170/0x3f0 [ 30.937095] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.937181] kthread+0x328/0x630 [ 30.937260] ret_from_fork+0x10/0x20 [ 30.937352] [ 30.937399] The buggy address belongs to the physical page: [ 30.937463] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ae0 [ 30.937534] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.937581] page_type: f0(buddy) [ 30.937618] raw: 0bfffe0000000000 fff00000ff616148 fff00000ff616148 0000000000000000 [ 30.937666] raw: 0000000000000000 0000000000000005 00000000f0000000 0000000000000000 [ 30.937705] page dumped because: kasan: bad access detected [ 30.937734] [ 30.937752] Memory state around the buggy address: [ 30.937997] fff00000c9adff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.938053] fff00000c9adff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.938112] >fff00000c9ae0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.938251] ^ [ 30.938304] fff00000c9ae0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.938397] fff00000c9ae0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.938459] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree
[ 30.923440] ================================================================== [ 30.923525] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 30.923588] Free of addr fff00000c9a24001 by task kunit_try_catch/181 [ 30.923631] [ 30.923661] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 30.923783] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.923943] Hardware name: linux,dummy-virt (DT) [ 30.923993] Call trace: [ 30.924045] show_stack+0x20/0x38 (C) [ 30.924126] dump_stack_lvl+0x8c/0xd0 [ 30.924174] print_report+0x118/0x5d0 [ 30.924242] kasan_report_invalid_free+0xc0/0xe8 [ 30.924293] __kasan_kfree_large+0x5c/0xa8 [ 30.924340] free_large_kmalloc+0x68/0x150 [ 30.924386] kfree+0x270/0x3c8 [ 30.924428] kmalloc_large_invalid_free+0x108/0x270 [ 30.924476] kunit_try_run_case+0x170/0x3f0 [ 30.924525] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.924595] kthread+0x328/0x630 [ 30.924637] ret_from_fork+0x10/0x20 [ 30.924787] [ 30.924839] The buggy address belongs to the physical page: [ 30.924933] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a24 [ 30.925013] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.925127] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.925223] page_type: f8(unknown) [ 30.925262] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.925335] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.925603] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.925658] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.925705] head: 0bfffe0000000002 ffffc1ffc3268901 00000000ffffffff 00000000ffffffff [ 30.925752] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.925790] page dumped because: kasan: bad access detected [ 30.925820] [ 30.925837] Memory state around the buggy address: [ 30.925867] fff00000c9a23f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.925943] fff00000c9a23f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.926003] >fff00000c9a24000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.926071] ^ [ 30.926099] fff00000c9a24080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.926146] fff00000c9a24100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.926235] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 30.915688] ================================================================== [ 30.915771] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 30.915823] Read of size 1 at addr fff00000c9a24000 by task kunit_try_catch/179 [ 30.915870] [ 30.915906] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 30.915988] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.916024] Hardware name: linux,dummy-virt (DT) [ 30.916054] Call trace: [ 30.916077] show_stack+0x20/0x38 (C) [ 30.916122] dump_stack_lvl+0x8c/0xd0 [ 30.916168] print_report+0x118/0x5d0 [ 30.916324] kasan_report+0xdc/0x128 [ 30.916381] __asan_report_load1_noabort+0x20/0x30 [ 30.916438] kmalloc_large_uaf+0x2cc/0x2f8 [ 30.916484] kunit_try_run_case+0x170/0x3f0 [ 30.916579] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.916697] kthread+0x328/0x630 [ 30.916741] ret_from_fork+0x10/0x20 [ 30.916798] [ 30.916825] The buggy address belongs to the physical page: [ 30.916855] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a24 [ 30.916905] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.916964] raw: 0bfffe0000000000 ffffc1ffc3268a08 fff00000da45cc40 0000000000000000 [ 30.917012] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 30.917050] page dumped because: kasan: bad access detected [ 30.917080] [ 30.917098] Memory state around the buggy address: [ 30.917127] fff00000c9a23f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.917168] fff00000c9a23f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.917220] >fff00000c9a24000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.917256] ^ [ 30.917308] fff00000c9a24080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.917349] fff00000c9a24100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.917384] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 30.909359] ================================================================== [ 30.909434] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 30.909494] Write of size 1 at addr fff00000c9a2600a by task kunit_try_catch/177 [ 30.909543] [ 30.909583] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 30.909668] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.909702] Hardware name: linux,dummy-virt (DT) [ 30.909740] Call trace: [ 30.909769] show_stack+0x20/0x38 (C) [ 30.909816] dump_stack_lvl+0x8c/0xd0 [ 30.909868] print_report+0x118/0x5d0 [ 30.909925] kasan_report+0xdc/0x128 [ 30.909971] __asan_report_store1_noabort+0x20/0x30 [ 30.910032] kmalloc_large_oob_right+0x278/0x2b8 [ 30.910080] kunit_try_run_case+0x170/0x3f0 [ 30.910128] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.910180] kthread+0x328/0x630 [ 30.910234] ret_from_fork+0x10/0x20 [ 30.910281] [ 30.910314] The buggy address belongs to the physical page: [ 30.910345] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a24 [ 30.910395] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.910439] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.910494] page_type: f8(unknown) [ 30.910532] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.910579] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.910626] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.910817] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.910886] head: 0bfffe0000000002 ffffc1ffc3268901 00000000ffffffff 00000000ffffffff [ 30.910944] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.910992] page dumped because: kasan: bad access detected [ 30.911047] [ 30.911066] Memory state around the buggy address: [ 30.911107] fff00000c9a25f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.911155] fff00000c9a25f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.911196] >fff00000c9a26000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.911256] ^ [ 30.911293] fff00000c9a26080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.911333] fff00000c9a26100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.911586] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 30.901870] ================================================================== [ 30.901929] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 30.901976] Write of size 1 at addr fff00000c6455f00 by task kunit_try_catch/175 [ 30.902023] [ 30.902065] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 30.902149] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.902174] Hardware name: linux,dummy-virt (DT) [ 30.902203] Call trace: [ 30.902248] show_stack+0x20/0x38 (C) [ 30.902295] dump_stack_lvl+0x8c/0xd0 [ 30.902341] print_report+0x118/0x5d0 [ 30.902386] kasan_report+0xdc/0x128 [ 30.902439] __asan_report_store1_noabort+0x20/0x30 [ 30.902487] kmalloc_big_oob_right+0x2a4/0x2f0 [ 30.902534] kunit_try_run_case+0x170/0x3f0 [ 30.902631] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.902702] kthread+0x328/0x630 [ 30.902749] ret_from_fork+0x10/0x20 [ 30.902796] [ 30.902813] Allocated by task 175: [ 30.902840] kasan_save_stack+0x3c/0x68 [ 30.902880] kasan_save_track+0x20/0x40 [ 30.902917] kasan_save_alloc_info+0x40/0x58 [ 30.902953] __kasan_kmalloc+0xd4/0xd8 [ 30.902990] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.903029] kmalloc_big_oob_right+0xb8/0x2f0 [ 30.903066] kunit_try_run_case+0x170/0x3f0 [ 30.903103] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.903272] kthread+0x328/0x630 [ 30.903333] ret_from_fork+0x10/0x20 [ 30.903370] [ 30.903389] The buggy address belongs to the object at fff00000c6454000 [ 30.903389] which belongs to the cache kmalloc-8k of size 8192 [ 30.903467] The buggy address is located 0 bytes to the right of [ 30.903467] allocated 7936-byte region [fff00000c6454000, fff00000c6455f00) [ 30.903538] [ 30.903567] The buggy address belongs to the physical page: [ 30.903605] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106450 [ 30.903655] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.903700] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.903748] page_type: f5(slab) [ 30.903784] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 30.903840] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 30.903888] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 30.903935] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 30.903981] head: 0bfffe0000000003 ffffc1ffc3191401 00000000ffffffff 00000000ffffffff [ 30.904027] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 30.904064] page dumped because: kasan: bad access detected [ 30.904094] [ 30.904112] Memory state around the buggy address: [ 30.904152] fff00000c6455e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.904192] fff00000c6455e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.904244] >fff00000c6455f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.904279] ^ [ 30.904305] fff00000c6455f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.904344] fff00000c6456000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.904380] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[ 30.890889] ================================================================== [ 30.890936] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488 [ 30.893442] Write of size 1 at addr fff00000c9a9c178 by task kunit_try_catch/173 [ 30.893544] [ 30.893862] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 30.894261] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.894322] Hardware name: linux,dummy-virt (DT) [ 30.894382] Call trace: [ 30.894432] show_stack+0x20/0x38 (C) [ 30.894594] dump_stack_lvl+0x8c/0xd0 [ 30.894678] print_report+0x118/0x5d0 [ 30.895057] kasan_report+0xdc/0x128 [ 30.895150] __asan_report_store1_noabort+0x20/0x30 [ 30.895306] kmalloc_track_caller_oob_right+0x418/0x488 [ 30.895407] kunit_try_run_case+0x170/0x3f0 [ 30.895547] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.895813] kthread+0x328/0x630 [ 30.895868] ret_from_fork+0x10/0x20 [ 30.896063] [ 30.896103] Allocated by task 173: [ 30.896166] kasan_save_stack+0x3c/0x68 [ 30.896260] kasan_save_track+0x20/0x40 [ 30.896323] kasan_save_alloc_info+0x40/0x58 [ 30.896440] __kasan_kmalloc+0xd4/0xd8 [ 30.896501] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 30.896545] kmalloc_track_caller_oob_right+0x184/0x488 [ 30.896593] kunit_try_run_case+0x170/0x3f0 [ 30.896650] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.896717] kthread+0x328/0x630 [ 30.896827] ret_from_fork+0x10/0x20 [ 30.896888] [ 30.896930] The buggy address belongs to the object at fff00000c9a9c100 [ 30.896930] which belongs to the cache kmalloc-128 of size 128 [ 30.897025] The buggy address is located 0 bytes to the right of [ 30.897025] allocated 120-byte region [fff00000c9a9c100, fff00000c9a9c178) [ 30.897088] [ 30.897119] The buggy address belongs to the physical page: [ 30.897152] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a9c [ 30.897202] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.897257] page_type: f5(slab) [ 30.897294] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.897343] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.897381] page dumped because: kasan: bad access detected [ 30.897411] [ 30.897428] Memory state around the buggy address: [ 30.897458] fff00000c9a9c000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.897603] fff00000c9a9c080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.897647] >fff00000c9a9c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.897736] ^ [ 30.897806] fff00000c9a9c180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.897854] fff00000c9a9c200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.897954] ================================================================== [ 30.881002] ================================================================== [ 30.881192] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 30.881323] Write of size 1 at addr fff00000c9a9c078 by task kunit_try_catch/173 [ 30.881440] [ 30.881472] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 30.881557] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.881583] Hardware name: linux,dummy-virt (DT) [ 30.881614] Call trace: [ 30.881644] show_stack+0x20/0x38 (C) [ 30.881747] dump_stack_lvl+0x8c/0xd0 [ 30.881886] print_report+0x118/0x5d0 [ 30.881934] kasan_report+0xdc/0x128 [ 30.881980] __asan_report_store1_noabort+0x20/0x30 [ 30.882028] kmalloc_track_caller_oob_right+0x40c/0x488 [ 30.882084] kunit_try_run_case+0x170/0x3f0 [ 30.882292] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.882346] kthread+0x328/0x630 [ 30.882387] ret_from_fork+0x10/0x20 [ 30.882434] [ 30.882453] Allocated by task 173: [ 30.882479] kasan_save_stack+0x3c/0x68 [ 30.882519] kasan_save_track+0x20/0x40 [ 30.882560] kasan_save_alloc_info+0x40/0x58 [ 30.882599] __kasan_kmalloc+0xd4/0xd8 [ 30.882635] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 30.882678] kmalloc_track_caller_oob_right+0xa8/0x488 [ 30.882719] kunit_try_run_case+0x170/0x3f0 [ 30.882756] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.882798] kthread+0x328/0x630 [ 30.882829] ret_from_fork+0x10/0x20 [ 30.882864] [ 30.882882] The buggy address belongs to the object at fff00000c9a9c000 [ 30.882882] which belongs to the cache kmalloc-128 of size 128 [ 30.882937] The buggy address is located 0 bytes to the right of [ 30.882937] allocated 120-byte region [fff00000c9a9c000, fff00000c9a9c078) [ 30.882997] [ 30.883020] The buggy address belongs to the physical page: [ 30.883048] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a9c [ 30.883106] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.884498] page_type: f5(slab) [ 30.885350] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.886529] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.886591] page dumped because: kasan: bad access detected [ 30.886712] [ 30.886796] Memory state around the buggy address: [ 30.887506] fff00000c9a9bf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.887729] fff00000c9a9bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.887771] >fff00000c9a9c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.888074] ^ [ 30.888291] fff00000c9a9c080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.888420] fff00000c9a9c100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.888472] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 30.867241] ================================================================== [ 30.867592] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 30.867834] Read of size 1 at addr fff00000c999f000 by task kunit_try_catch/171 [ 30.867886] [ 30.867919] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 30.868403] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.868518] Hardware name: linux,dummy-virt (DT) [ 30.868711] Call trace: [ 30.868736] show_stack+0x20/0x38 (C) [ 30.868787] dump_stack_lvl+0x8c/0xd0 [ 30.868833] print_report+0x118/0x5d0 [ 30.868903] kasan_report+0xdc/0x128 [ 30.868950] __asan_report_load1_noabort+0x20/0x30 [ 30.869023] kmalloc_node_oob_right+0x2f4/0x330 [ 30.869172] kunit_try_run_case+0x170/0x3f0 [ 30.869238] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.869291] kthread+0x328/0x630 [ 30.869332] ret_from_fork+0x10/0x20 [ 30.869379] [ 30.869397] Allocated by task 171: [ 30.869425] kasan_save_stack+0x3c/0x68 [ 30.869465] kasan_save_track+0x20/0x40 [ 30.869504] kasan_save_alloc_info+0x40/0x58 [ 30.869998] __kasan_kmalloc+0xd4/0xd8 [ 30.870123] __kmalloc_cache_node_noprof+0x178/0x3d0 [ 30.870166] kmalloc_node_oob_right+0xbc/0x330 [ 30.870474] kunit_try_run_case+0x170/0x3f0 [ 30.870600] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.870706] kthread+0x328/0x630 [ 30.870765] ret_from_fork+0x10/0x20 [ 30.870827] [ 30.871283] The buggy address belongs to the object at fff00000c999e000 [ 30.871283] which belongs to the cache kmalloc-4k of size 4096 [ 30.871450] The buggy address is located 0 bytes to the right of [ 30.871450] allocated 4096-byte region [fff00000c999e000, fff00000c999f000) [ 30.871547] [ 30.871567] The buggy address belongs to the physical page: [ 30.871675] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109998 [ 30.872196] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.872267] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.872334] page_type: f5(slab) [ 30.872372] raw: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 30.872421] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 30.872475] head: 0bfffe0000000040 fff00000c0002140 dead000000000122 0000000000000000 [ 30.872522] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 30.872659] head: 0bfffe0000000003 ffffc1ffc3266601 00000000ffffffff 00000000ffffffff [ 30.872708] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 30.872769] page dumped because: kasan: bad access detected [ 30.872801] [ 30.872819] Memory state around the buggy address: [ 30.872850] fff00000c999ef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.872891] fff00000c999ef80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.872931] >fff00000c999f000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.873387] ^ [ 30.873617] fff00000c999f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.873983] fff00000c999f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.874058] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 30.854076] ================================================================== [ 30.854174] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 30.854241] Read of size 1 at addr fff00000c798161f by task kunit_try_catch/169 [ 30.854614] [ 30.854713] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 30.855150] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.855310] Hardware name: linux,dummy-virt (DT) [ 30.855493] Call trace: [ 30.855546] show_stack+0x20/0x38 (C) [ 30.855680] dump_stack_lvl+0x8c/0xd0 [ 30.855771] print_report+0x118/0x5d0 [ 30.855818] kasan_report+0xdc/0x128 [ 30.855880] __asan_report_load1_noabort+0x20/0x30 [ 30.855927] kmalloc_oob_left+0x2ec/0x320 [ 30.856172] kunit_try_run_case+0x170/0x3f0 [ 30.856242] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.856295] kthread+0x328/0x630 [ 30.856428] ret_from_fork+0x10/0x20 [ 30.856872] [ 30.856904] Allocated by task 102: [ 30.856940] kasan_save_stack+0x3c/0x68 [ 30.856982] kasan_save_track+0x20/0x40 [ 30.857019] kasan_save_alloc_info+0x40/0x58 [ 30.857086] __kasan_kmalloc+0xd4/0xd8 [ 30.857123] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 30.857254] kvasprintf+0xe0/0x180 [ 30.857297] kasprintf+0xd0/0x110 [ 30.857331] miscdev_test_can_open+0xac/0x2c8 [ 30.857375] miscdev_test_collision+0x2f0/0x560 [ 30.857411] kunit_try_run_case+0x170/0x3f0 [ 30.857448] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.857493] kthread+0x328/0x630 [ 30.857524] ret_from_fork+0x10/0x20 [ 30.857559] [ 30.857591] Freed by task 102: [ 30.857630] kasan_save_stack+0x3c/0x68 [ 30.857668] kasan_save_track+0x20/0x40 [ 30.857705] kasan_save_free_info+0x4c/0x78 [ 30.857740] __kasan_slab_free+0x6c/0x98 [ 30.857777] kfree+0x214/0x3c8 [ 30.857810] miscdev_test_can_open+0x138/0x2c8 [ 30.857846] miscdev_test_collision+0x2f0/0x560 [ 30.857882] kunit_try_run_case+0x170/0x3f0 [ 30.858170] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.858254] kthread+0x328/0x630 [ 30.858286] ret_from_fork+0x10/0x20 [ 30.858334] [ 30.858411] The buggy address belongs to the object at fff00000c7981600 [ 30.858411] which belongs to the cache kmalloc-16 of size 16 [ 30.858596] The buggy address is located 15 bytes to the right of [ 30.858596] allocated 16-byte region [fff00000c7981600, fff00000c7981610) [ 30.858681] [ 30.858713] The buggy address belongs to the physical page: [ 30.858779] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107981 [ 30.858842] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.858888] page_type: f5(slab) [ 30.858926] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 30.859126] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 30.859217] page dumped because: kasan: bad access detected [ 30.859247] [ 30.859265] Memory state around the buggy address: [ 30.859295] fff00000c7981500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.859336] fff00000c7981580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.859378] >fff00000c7981600: fa fb fc fc 00 07 fc fc fc fc fc fc fc fc fc fc [ 30.859782] ^ [ 30.859853] fff00000c7981680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.859940] fff00000c7981700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.859978] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 30.841720] ================================================================== [ 30.841899] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 30.841958] Write of size 1 at addr fff00000c56dcf78 by task kunit_try_catch/167 [ 30.842016] [ 30.842051] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 30.842147] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.842173] Hardware name: linux,dummy-virt (DT) [ 30.842256] Call trace: [ 30.842297] show_stack+0x20/0x38 (C) [ 30.842349] dump_stack_lvl+0x8c/0xd0 [ 30.842398] print_report+0x118/0x5d0 [ 30.842683] kasan_report+0xdc/0x128 [ 30.842770] __asan_report_store1_noabort+0x20/0x30 [ 30.842839] kmalloc_oob_right+0x538/0x660 [ 30.842892] kunit_try_run_case+0x170/0x3f0 [ 30.842946] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.842999] kthread+0x328/0x630 [ 30.843041] ret_from_fork+0x10/0x20 [ 30.843087] [ 30.843114] Allocated by task 167: [ 30.843142] kasan_save_stack+0x3c/0x68 [ 30.843182] kasan_save_track+0x20/0x40 [ 30.843432] kasan_save_alloc_info+0x40/0x58 [ 30.843478] __kasan_kmalloc+0xd4/0xd8 [ 30.843514] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.843553] kmalloc_oob_right+0xb0/0x660 [ 30.843589] kunit_try_run_case+0x170/0x3f0 [ 30.843628] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.843670] kthread+0x328/0x630 [ 30.843702] ret_from_fork+0x10/0x20 [ 30.843736] [ 30.843754] The buggy address belongs to the object at fff00000c56dcf00 [ 30.843754] which belongs to the cache kmalloc-128 of size 128 [ 30.843809] The buggy address is located 5 bytes to the right of [ 30.843809] allocated 115-byte region [fff00000c56dcf00, fff00000c56dcf73) [ 30.843965] [ 30.843991] The buggy address belongs to the physical page: [ 30.844019] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056dc [ 30.844078] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.844135] page_type: f5(slab) [ 30.844182] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.844242] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.844281] page dumped because: kasan: bad access detected [ 30.844310] [ 30.844327] Memory state around the buggy address: [ 30.844357] fff00000c56dce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.844414] fff00000c56dce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.844464] >fff00000c56dcf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.844500] ^ [ 30.844566] fff00000c56dcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.844623] fff00000c56dd000: fa fb fc fc 00 05 fc fc 00 05 fc fc 00 00 fc fc [ 30.844682] ================================================================== [ 30.827318] ================================================================== [ 30.827639] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 30.828732] Write of size 1 at addr fff00000c56dcf73 by task kunit_try_catch/167 [ 30.828893] [ 30.830951] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 30.831577] Tainted: [N]=TEST [ 30.831638] Hardware name: linux,dummy-virt (DT) [ 30.832766] Call trace: [ 30.832961] show_stack+0x20/0x38 (C) [ 30.833433] dump_stack_lvl+0x8c/0xd0 [ 30.833548] print_report+0x118/0x5d0 [ 30.833636] kasan_report+0xdc/0x128 [ 30.833704] __asan_report_store1_noabort+0x20/0x30 [ 30.833806] kmalloc_oob_right+0x5a4/0x660 [ 30.833874] kunit_try_run_case+0x170/0x3f0 [ 30.833993] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.834060] kthread+0x328/0x630 [ 30.834148] ret_from_fork+0x10/0x20 [ 30.834538] [ 30.834650] Allocated by task 167: [ 30.835194] kasan_save_stack+0x3c/0x68 [ 30.835327] kasan_save_track+0x20/0x40 [ 30.835430] kasan_save_alloc_info+0x40/0x58 [ 30.835489] __kasan_kmalloc+0xd4/0xd8 [ 30.835551] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.835646] kmalloc_oob_right+0xb0/0x660 [ 30.835706] kunit_try_run_case+0x170/0x3f0 [ 30.835786] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.835844] kthread+0x328/0x630 [ 30.835905] ret_from_fork+0x10/0x20 [ 30.836018] [ 30.836103] The buggy address belongs to the object at fff00000c56dcf00 [ 30.836103] which belongs to the cache kmalloc-128 of size 128 [ 30.836200] The buggy address is located 0 bytes to the right of [ 30.836200] allocated 115-byte region [fff00000c56dcf00, fff00000c56dcf73) [ 30.836289] [ 30.836444] The buggy address belongs to the physical page: [ 30.836675] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056dc [ 30.837424] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.837746] page_type: f5(slab) [ 30.838132] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.838283] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.838483] page dumped because: kasan: bad access detected [ 30.838548] [ 30.838893] Memory state around the buggy address: [ 30.839566] fff00000c56dce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.839711] fff00000c56dce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.839805] >fff00000c56dcf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.839876] ^ [ 30.839998] fff00000c56dcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.840317] fff00000c56dd000: fa fb fc fc 00 05 fc fc 00 05 fc fc 00 00 fc fc [ 30.840449] ================================================================== [ 30.845035] ================================================================== [ 30.845080] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 30.845125] Read of size 1 at addr fff00000c56dcf80 by task kunit_try_catch/167 [ 30.845171] [ 30.845232] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 30.845316] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.845358] Hardware name: linux,dummy-virt (DT) [ 30.845396] Call trace: [ 30.845424] show_stack+0x20/0x38 (C) [ 30.845472] dump_stack_lvl+0x8c/0xd0 [ 30.845519] print_report+0x118/0x5d0 [ 30.845565] kasan_report+0xdc/0x128 [ 30.845610] __asan_report_load1_noabort+0x20/0x30 [ 30.845658] kmalloc_oob_right+0x5d0/0x660 [ 30.845703] kunit_try_run_case+0x170/0x3f0 [ 30.845750] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.845938] kthread+0x328/0x630 [ 30.845997] ret_from_fork+0x10/0x20 [ 30.846044] [ 30.846061] Allocated by task 167: [ 30.846103] kasan_save_stack+0x3c/0x68 [ 30.846152] kasan_save_track+0x20/0x40 [ 30.846199] kasan_save_alloc_info+0x40/0x58 [ 30.846254] __kasan_kmalloc+0xd4/0xd8 [ 30.846302] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.846341] kmalloc_oob_right+0xb0/0x660 [ 30.846377] kunit_try_run_case+0x170/0x3f0 [ 30.846516] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.846686] kthread+0x328/0x630 [ 30.846732] ret_from_fork+0x10/0x20 [ 30.846767] [ 30.846785] The buggy address belongs to the object at fff00000c56dcf00 [ 30.846785] which belongs to the cache kmalloc-128 of size 128 [ 30.846847] The buggy address is located 13 bytes to the right of [ 30.846847] allocated 115-byte region [fff00000c56dcf00, fff00000c56dcf73) [ 30.846909] [ 30.846927] The buggy address belongs to the physical page: [ 30.846956] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1056dc [ 30.847018] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.847063] page_type: f5(slab) [ 30.847100] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.847182] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.847442] page dumped because: kasan: bad access detected [ 30.847486] [ 30.847503] Memory state around the buggy address: [ 30.847533] fff00000c56dce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.847574] fff00000c56dcf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.847616] >fff00000c56dcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.847653] ^ [ 30.847681] fff00000c56dd000: fa fb fc fc 00 05 fc fc 00 05 fc fc 00 00 fc fc [ 30.848025] fff00000c56dd080: 00 06 fc fc 00 06 fc fc 00 00 fc fc 00 02 fc fc [ 30.848314] ==================================================================
Failure - log-parser-boot/exception-warning-libteststest_ratelimit-at-test_ratelimit_stress_child
------------[ cut here ]------------ [ 183.653943] WARNING: lib/tests/test_ratelimit.c:87 at test_ratelimit_stress_child+0x160/0x1b8, CPU#0: test_ratelimit_/1661 [ 183.655223] Modules linked in: [ 183.655475] CPU: 0 UID: 0 PID: 1661 Comm: test_ratelimit_ Tainted: G B D W N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 183.655980] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 183.656318] Hardware name: linux,dummy-virt (DT) [ 183.656845] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 183.658012] pc : test_ratelimit_stress_child+0x160/0x1b8 [ 183.658613] lr : test_ratelimit_stress_child+0x30/0x1b8 [ 183.659151] sp : ffff8000894f7d90 [ 183.659527] x29: ffff8000894f7d90 x28: 0000000000000000 x27: 0000000000000000 [ 183.660398] x26: 1ffe00001903e981 x25: 0000000000000000 x24: 0000000000000004 [ 183.661634] x23: fff00000c81f4c0c x22: fff00000cc4d67a8 x21: ffff92c7b5152a90 [ 183.662093] x20: fff00000c81f4c00 x19: fff00000cc4d67a8 x18: 00000000d454799d [ 183.662519] x17: 0000000000000000 x16: fff00000c7b4c43c x15: fff00000ff616b48 [ 183.662917] x14: 0000000000018fff x13: 1ffe00001b48f5c5 x12: fffd80001b48b041 [ 183.663741] x11: 1ffe00001b48b040 x10: fffd80001b48b040 x9 : ffff92c7b7749ffc [ 183.664624] x8 : ffff8000894f7ae8 x7 : 0000000000000001 x6 : ffff8000894f7c00 [ 183.665342] x5 : 0000000000000001 x4 : ffff92c7b9aa43e0 x3 : 0000000000000000 [ 183.665758] x2 : 1ffe00001989acf9 x1 : 0000000000000000 x0 : 0000000000000000 [ 183.666152] Call trace: [ 183.666328] test_ratelimit_stress_child+0x160/0x1b8 (P) [ 183.666614] kthread+0x328/0x630 [ 183.666821] ret_from_fork+0x10/0x20 [ 183.667045] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-libmathint_log-at-intlog10
------------[ cut here ]------------ [ 112.452503] WARNING: lib/math/int_log.c:120 at intlog10+0x38/0x48, CPU#1: kunit_try_catch/689 [ 112.454272] Modules linked in: [ 112.454619] CPU: 1 UID: 0 PID: 689 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 112.455074] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 112.455340] Hardware name: linux,dummy-virt (DT) [ 112.455547] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 112.456131] pc : intlog10+0x38/0x48 [ 112.456334] lr : intlog10_test+0xe4/0x200 [ 112.456526] sp : ffff800082237c10 [ 112.456854] x29: ffff800082237c90 x28: 0000000000000000 x27: 0000000000000000 [ 112.457363] x26: 1ffe000018e78f21 x25: 0000000000000000 x24: ffff800082237ce0 [ 112.458345] x23: ffff800082237d00 x22: 0000000000000000 x21: 1ffff00010446f82 [ 112.459289] x20: ffff92c7b7a0e2c0 x19: ffff800080087990 x18: 00000000e6d2b0d9 [ 112.460430] x17: 00000000e4ec9032 x16: fff00000c7b4c03c x15: fff00000ff616b48 [ 112.461890] x14: 0000000000018fff x13: 1ffe00001b48b1c5 x12: ffff7258f771b989 [ 112.462482] x11: 1ffff258f771b988 x10: ffff7258f771b988 x9 : ffff92c7b5044fe4 [ 112.462845] x8 : ffff92c7bb8dcc43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 112.463183] x5 : ffff700010446f82 x4 : 1ffff00010010f3b x3 : 1ffff258f6f41c58 [ 112.464406] x2 : 1ffff258f6f41c58 x1 : 0000000000000003 x0 : 0000000000000000 [ 112.465348] Call trace: [ 112.465932] intlog10+0x38/0x48 (P) [ 112.466807] kunit_try_run_case+0x170/0x3f0 [ 112.467428] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 112.467928] kthread+0x328/0x630 [ 112.468112] ret_from_fork+0x10/0x20 [ 112.468432] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-libmathint_log-at-intlog2
------------[ cut here ]------------ [ 112.406307] WARNING: lib/math/int_log.c:63 at intlog2+0xd8/0xf8, CPU#1: kunit_try_catch/671 [ 112.408186] Modules linked in: [ 112.408813] CPU: 1 UID: 0 PID: 671 Comm: kunit_try_catch Tainted: G B D N 6.16.0-rc5-next-20250708 #1 PREEMPT [ 112.409819] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 112.410044] Hardware name: linux,dummy-virt (DT) [ 112.410266] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 112.410722] pc : intlog2+0xd8/0xf8 [ 112.410942] lr : intlog2_test+0xe4/0x200 [ 112.411191] sp : ffff800082197c10 [ 112.411463] x29: ffff800082197c90 x28: 0000000000000000 x27: 0000000000000000 [ 112.411942] x26: 1ffe0000194c8f41 x25: 0000000000000000 x24: ffff800082197ce0 [ 112.412454] x23: ffff800082197d00 x22: 0000000000000000 x21: 1ffff00010432f82 [ 112.413006] x20: ffff92c7b7a0e1c0 x19: ffff800080087990 x18: 00000000c1348750 [ 112.413634] x17: 000000001a6a2a19 x16: fff00000c7b4c03c x15: fff00000ff616b48 [ 112.414118] x14: 0000000000018fff x13: 1ffe00001b48b1c5 x12: ffff7258f771b989 [ 112.414621] x11: 1ffff258f771b988 x10: ffff7258f771b988 x9 : ffff92c7b50451e4 [ 112.415093] x8 : ffff92c7bb8dcc43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 112.415863] x5 : ffff700010432f82 x4 : 1ffff00010010f3b x3 : 1ffff258f6f41c38 [ 112.416302] x2 : 1ffff258f6f41c38 x1 : 0000000000000003 x0 : 0000000000000000 [ 112.417095] Call trace: [ 112.417648] intlog2+0xd8/0xf8 (P) [ 112.418267] kunit_try_run_case+0x170/0x3f0 [ 112.418882] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 112.419616] kthread+0x328/0x630 [ 112.420111] ret_from_fork+0x10/0x20 [ 112.420796] ---[ end trace 0000000000000000 ]---