Date
July 10, 2025, 9:07 a.m.
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 31.966682] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 32.011116] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 31.961574] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 31.953999] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 31.975991] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 32.026017] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 31.948501] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[ 31.828894] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 31.859924] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0
Failure - log-parser-boot/bug-bug-kasan-slab-use-after-free-in-strlen
[ 31.774505] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0
Failure - log-parser-boot/internal-error-oops-oops-smp
[ 107.281142] Internal error: Oops: 0000000096000005 [#1] SMP [ 107.286454] Modules linked in: [ 107.287182] CPU: 1 UID: 0 PID: 563 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 107.287738] Tainted: [B]=BAD_PAGE, [N]=TEST [ 107.287966] Hardware name: linux,dummy-virt (DT) [ 107.288293] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 107.288702] pc : kunit_test_null_dereference+0x70/0x170 [ 107.289054] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 107.289413] sp : ffff800080fc7d30 [ 107.289664] x29: ffff800080fc7d90 x28: 0000000000000000 x27: 0000000000000000 [ 107.290225] x26: 1ffe00001932caa1 x25: 0000000000000000 x24: 0000000000000004 [ 107.290676] x23: fff00000c996550c x22: ffff909022035240 x21: fff00000c0b1dc08 [ 107.291297] x20: 1ffff000101f8fa6 x19: ffff800080087990 x18: 000000006fe93ee9 [ 107.291756] x17: 00000000e5a08e36 x16: 000000004c96fd91 x15: 000000003761388e [ 107.292232] x14: 00000000dbf038a3 x13: 1ffe00001b48ed99 x12: fffd8000197663a4 [ 107.292673] x11: 1ffe0000197663a3 x10: fffd8000197663a3 x9 : ffff90902202c9d0 [ 107.293194] x8 : ffff800080fc7c18 x7 : 0000000000000001 x6 : 0000000041b58ab3 [ 107.293608] x5 : ffff7000101f8fa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 107.294046] x2 : dfff800000000000 x1 : fff00000cbb31440 x0 : ffff800080087990 [ 107.294513] Call trace: [ 107.294741] kunit_test_null_dereference+0x70/0x170 (P) [ 107.295087] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 107.295436] kthread+0x328/0x630 [ 107.295689] ret_from_fork+0x10/0x20 [ 107.296238] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 107.296921] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc
[ 63.151789] ================================================================== [ 63.151862] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 63.151862] [ 63.151956] Use-after-free read at 0x00000000c6d2f91f (in kfence-#187): [ 63.152011] test_krealloc+0x51c/0x830 [ 63.152059] kunit_try_run_case+0x170/0x3f0 [ 63.152107] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.152172] kthread+0x328/0x630 [ 63.152212] ret_from_fork+0x10/0x20 [ 63.152253] [ 63.152278] kfence-#187: 0x00000000c6d2f91f-0x0000000099e89701, size=32, cache=kmalloc-32 [ 63.152278] [ 63.152334] allocated by task 368 on cpu 0 at 63.151092s (0.001239s ago): [ 63.152404] test_alloc+0x29c/0x628 [ 63.152446] test_krealloc+0xc0/0x830 [ 63.152489] kunit_try_run_case+0x170/0x3f0 [ 63.152530] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.152578] kthread+0x328/0x630 [ 63.152615] ret_from_fork+0x10/0x20 [ 63.152653] [ 63.152678] freed by task 368 on cpu 0 at 63.151379s (0.001296s ago): [ 63.152741] krealloc_noprof+0x148/0x360 [ 63.152783] test_krealloc+0x1dc/0x830 [ 63.152824] kunit_try_run_case+0x170/0x3f0 [ 63.152865] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.152911] kthread+0x328/0x630 [ 63.152947] ret_from_fork+0x10/0x20 [ 63.152989] [ 63.153036] CPU: 0 UID: 0 PID: 368 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 63.153116] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.153156] Hardware name: linux,dummy-virt (DT) [ 63.153191] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[ 63.071660] ================================================================== [ 63.071769] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 63.071769] [ 63.071874] Use-after-free read at 0x00000000f99fd16d (in kfence-#186): [ 63.071927] test_memcache_typesafe_by_rcu+0x280/0x560 [ 63.071980] kunit_try_run_case+0x170/0x3f0 [ 63.072028] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.072074] kthread+0x328/0x630 [ 63.072113] ret_from_fork+0x10/0x20 [ 63.072169] [ 63.072193] kfence-#186: 0x00000000f99fd16d-0x000000000c27551f, size=32, cache=test [ 63.072193] [ 63.072247] allocated by task 366 on cpu 1 at 63.051116s (0.021127s ago): [ 63.072317] test_alloc+0x230/0x628 [ 63.072360] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 63.072406] kunit_try_run_case+0x170/0x3f0 [ 63.072446] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.072492] kthread+0x328/0x630 [ 63.072529] ret_from_fork+0x10/0x20 [ 63.072567] [ 63.072590] freed by task 366 on cpu 1 at 63.051252s (0.021335s ago): [ 63.072648] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 63.072692] kunit_try_run_case+0x170/0x3f0 [ 63.072732] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.072777] kthread+0x328/0x630 [ 63.072813] ret_from_fork+0x10/0x20 [ 63.072852] [ 63.072901] CPU: 1 UID: 0 PID: 366 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 63.072982] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.073013] Hardware name: linux,dummy-virt (DT) [ 63.073048] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access
[ 40.291075] ================================================================== [ 40.292198] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 40.292198] [ 40.292363] Invalid read at 0x000000007466e28a: [ 40.292472] test_invalid_access+0xdc/0x1f0 [ 40.292534] kunit_try_run_case+0x170/0x3f0 [ 40.292588] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.292691] kthread+0x328/0x630 [ 40.292745] ret_from_fork+0x10/0x20 [ 40.292799] [ 40.292851] CPU: 0 UID: 0 PID: 362 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 40.292945] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.292980] Hardware name: linux,dummy-virt (DT) [ 40.293021] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[ 40.059475] ================================================================== [ 40.059588] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 40.059588] [ 40.059654] Corrupted memory at 0x00000000f514dc38 [ ! . . . . . . . . . . . . . . . ] (in kfence-#182): [ 40.059971] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 40.060022] kunit_try_run_case+0x170/0x3f0 [ 40.060069] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.060115] kthread+0x328/0x630 [ 40.060167] ret_from_fork+0x10/0x20 [ 40.060208] [ 40.060233] kfence-#182: 0x00000000933e4bdd-0x0000000086f2a264, size=73, cache=kmalloc-96 [ 40.060233] [ 40.060289] allocated by task 356 on cpu 0 at 40.059198s (0.001088s ago): [ 40.060356] test_alloc+0x29c/0x628 [ 40.060396] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 40.060441] kunit_try_run_case+0x170/0x3f0 [ 40.060481] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.060527] kthread+0x328/0x630 [ 40.060562] ret_from_fork+0x10/0x20 [ 40.060601] [ 40.060625] freed by task 356 on cpu 0 at 40.059372s (0.001249s ago): [ 40.060690] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 40.060734] kunit_try_run_case+0x170/0x3f0 [ 40.060775] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.060821] kthread+0x328/0x630 [ 40.060857] ret_from_fork+0x10/0x20 [ 40.060896] [ 40.060942] CPU: 0 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 40.061025] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.061057] Hardware name: linux,dummy-virt (DT) [ 40.061091] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[ 39.851552] ================================================================== [ 39.851660] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 39.851660] [ 39.851764] Out-of-bounds read at 0x000000008b323e30 (105B right of kfence-#180): [ 39.851825] test_kmalloc_aligned_oob_read+0x238/0x468 [ 39.851878] kunit_try_run_case+0x170/0x3f0 [ 39.851926] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.851972] kthread+0x328/0x630 [ 39.852011] ret_from_fork+0x10/0x20 [ 39.852052] [ 39.852077] kfence-#180: 0x000000007da4b9e2-0x00000000aa06dc4d, size=73, cache=kmalloc-96 [ 39.852077] [ 39.852146] allocated by task 354 on cpu 0 at 39.851255s (0.000887s ago): [ 39.852218] test_alloc+0x29c/0x628 [ 39.852261] test_kmalloc_aligned_oob_read+0x100/0x468 [ 39.852304] kunit_try_run_case+0x170/0x3f0 [ 39.852346] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.852391] kthread+0x328/0x630 [ 39.852428] ret_from_fork+0x10/0x20 [ 39.852467] [ 39.852516] CPU: 0 UID: 0 PID: 354 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 39.852599] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.852629] Hardware name: linux,dummy-virt (DT) [ 39.852664] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption
[ 35.691290] ================================================================== [ 35.691385] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 35.691385] [ 35.691446] Corrupted memory at 0x00000000d92b6c1f [ ! ] (in kfence-#140): [ 35.691569] test_corruption+0x1d8/0x378 [ 35.691618] kunit_try_run_case+0x170/0x3f0 [ 35.691663] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.691710] kthread+0x328/0x630 [ 35.691747] ret_from_fork+0x10/0x20 [ 35.691788] [ 35.691811] kfence-#140: 0x0000000086d4119b-0x00000000514a4734, size=32, cache=test [ 35.691811] [ 35.691867] allocated by task 344 on cpu 0 at 35.691145s (0.000718s ago): [ 35.691928] test_alloc+0x230/0x628 [ 35.691970] test_corruption+0x198/0x378 [ 35.692012] kunit_try_run_case+0x170/0x3f0 [ 35.692053] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.692099] kthread+0x328/0x630 [ 35.692146] ret_from_fork+0x10/0x20 [ 35.692187] [ 35.692212] freed by task 344 on cpu 0 at 35.691201s (0.001007s ago): [ 35.692274] test_corruption+0x1d8/0x378 [ 35.692315] kunit_try_run_case+0x170/0x3f0 [ 35.692356] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.692401] kthread+0x328/0x630 [ 35.692436] ret_from_fork+0x10/0x20 [ 35.692475] [ 35.692517] CPU: 0 UID: 0 PID: 344 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 35.692598] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.692629] Hardware name: linux,dummy-virt (DT) [ 35.692664] ================================================================== [ 35.067600] ================================================================== [ 35.067693] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 35.067693] [ 35.067757] Corrupted memory at 0x00000000103483ef [ ! ] (in kfence-#134): [ 35.067887] test_corruption+0x284/0x378 [ 35.067936] kunit_try_run_case+0x170/0x3f0 [ 35.067981] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.068027] kthread+0x328/0x630 [ 35.068066] ret_from_fork+0x10/0x20 [ 35.068107] [ 35.068144] kfence-#134: 0x000000000aeb8358-0x00000000ea64579f, size=32, cache=kmalloc-32 [ 35.068144] [ 35.068204] allocated by task 342 on cpu 0 at 35.067316s (0.000884s ago): [ 35.068265] test_alloc+0x29c/0x628 [ 35.068306] test_corruption+0x198/0x378 [ 35.068346] kunit_try_run_case+0x170/0x3f0 [ 35.068387] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.068432] kthread+0x328/0x630 [ 35.068467] ret_from_fork+0x10/0x20 [ 35.068508] [ 35.068531] freed by task 342 on cpu 0 at 35.067418s (0.001110s ago): [ 35.068593] test_corruption+0x284/0x378 [ 35.068633] kunit_try_run_case+0x170/0x3f0 [ 35.068674] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.068720] kthread+0x328/0x630 [ 35.068757] ret_from_fork+0x10/0x20 [ 35.068794] [ 35.068839] CPU: 0 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 35.068918] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.068953] Hardware name: linux,dummy-virt (DT) [ 35.068988] ================================================================== [ 35.379385] ================================================================== [ 35.379489] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 35.379489] [ 35.379561] Corrupted memory at 0x00000000e3b904d3 [ ! . . . . . . . . . . . . . . . ] (in kfence-#137): [ 35.379877] test_corruption+0x120/0x378 [ 35.379926] kunit_try_run_case+0x170/0x3f0 [ 35.379972] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.380018] kthread+0x328/0x630 [ 35.380058] ret_from_fork+0x10/0x20 [ 35.380099] [ 35.380122] kfence-#137: 0x000000000298bc88-0x0000000048654aaf, size=32, cache=test [ 35.380122] [ 35.380193] allocated by task 344 on cpu 0 at 35.379234s (0.000955s ago): [ 35.380256] test_alloc+0x230/0x628 [ 35.380295] test_corruption+0xdc/0x378 [ 35.380335] kunit_try_run_case+0x170/0x3f0 [ 35.380376] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.380421] kthread+0x328/0x630 [ 35.380457] ret_from_fork+0x10/0x20 [ 35.380495] [ 35.380518] freed by task 344 on cpu 0 at 35.379291s (0.001224s ago): [ 35.380580] test_corruption+0x120/0x378 [ 35.380620] kunit_try_run_case+0x170/0x3f0 [ 35.380661] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.380706] kthread+0x328/0x630 [ 35.380740] ret_from_fork+0x10/0x20 [ 35.380778] [ 35.380825] CPU: 0 UID: 0 PID: 344 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 35.380905] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.380936] Hardware name: linux,dummy-virt (DT) [ 35.380971] ================================================================== [ 34.963477] ================================================================== [ 34.963601] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 34.963601] [ 34.963670] Corrupted memory at 0x0000000080cd3fd0 [ ! . . . . . . . . . . . . . . . ] (in kfence-#133): [ 34.964810] test_corruption+0x278/0x378 [ 34.964864] kunit_try_run_case+0x170/0x3f0 [ 34.964912] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.964958] kthread+0x328/0x630 [ 34.964998] ret_from_fork+0x10/0x20 [ 34.965039] [ 34.965064] kfence-#133: 0x000000007a97edda-0x00000000c642fa10, size=32, cache=kmalloc-32 [ 34.965064] [ 34.965122] allocated by task 342 on cpu 0 at 34.963167s (0.001951s ago): [ 34.965200] test_alloc+0x29c/0x628 [ 34.965242] test_corruption+0xdc/0x378 [ 34.965283] kunit_try_run_case+0x170/0x3f0 [ 34.965324] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.965368] kthread+0x328/0x630 [ 34.965403] ret_from_fork+0x10/0x20 [ 34.965443] [ 34.965465] freed by task 342 on cpu 0 at 34.963277s (0.002185s ago): [ 34.965528] test_corruption+0x278/0x378 [ 34.965567] kunit_try_run_case+0x170/0x3f0 [ 34.965607] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.965651] kthread+0x328/0x630 [ 34.965685] ret_from_fork+0x10/0x20 [ 34.965723] [ 34.965771] CPU: 0 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 34.965852] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.965883] Hardware name: linux,dummy-virt (DT) [ 34.965916] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[ 34.651240] ================================================================== [ 34.651329] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 34.651329] [ 34.651390] Invalid free of 0x00000000d9d4c869 (in kfence-#130): [ 34.651448] test_invalid_addr_free+0x1ac/0x238 [ 34.651498] kunit_try_run_case+0x170/0x3f0 [ 34.651553] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.651599] kthread+0x328/0x630 [ 34.651640] ret_from_fork+0x10/0x20 [ 34.651681] [ 34.651706] kfence-#130: 0x00000000fee7980e-0x000000007d810949, size=32, cache=kmalloc-32 [ 34.651706] [ 34.651763] allocated by task 338 on cpu 1 at 34.651077s (0.000682s ago): [ 34.651827] test_alloc+0x29c/0x628 [ 34.651869] test_invalid_addr_free+0xd4/0x238 [ 34.651915] kunit_try_run_case+0x170/0x3f0 [ 34.651957] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.652003] kthread+0x328/0x630 [ 34.652040] ret_from_fork+0x10/0x20 [ 34.652080] [ 34.652142] CPU: 1 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 34.652224] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.652255] Hardware name: linux,dummy-virt (DT) [ 34.652289] ================================================================== [ 34.755259] ================================================================== [ 34.755350] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 34.755350] [ 34.755410] Invalid free of 0x00000000875a19a8 (in kfence-#131): [ 34.755464] test_invalid_addr_free+0xec/0x238 [ 34.755521] kunit_try_run_case+0x170/0x3f0 [ 34.755567] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.755613] kthread+0x328/0x630 [ 34.755652] ret_from_fork+0x10/0x20 [ 34.755692] [ 34.755716] kfence-#131: 0x000000000d481e21-0x000000009f59de09, size=32, cache=test [ 34.755716] [ 34.755769] allocated by task 340 on cpu 1 at 34.755112s (0.000654s ago): [ 34.755832] test_alloc+0x230/0x628 [ 34.755873] test_invalid_addr_free+0xd4/0x238 [ 34.755914] kunit_try_run_case+0x170/0x3f0 [ 34.755956] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.756000] kthread+0x328/0x630 [ 34.756036] ret_from_fork+0x10/0x20 [ 34.756074] [ 34.756117] CPU: 1 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 34.756239] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.756282] Hardware name: linux,dummy-virt (DT) [ 34.756315] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free
[ 34.443838] ================================================================== [ 34.443957] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 34.443957] [ 34.444022] Invalid free of 0x000000000009e916 (in kfence-#128): [ 34.444112] test_double_free+0x1bc/0x238 [ 34.444181] kunit_try_run_case+0x170/0x3f0 [ 34.444247] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.444311] kthread+0x328/0x630 [ 34.444358] ret_from_fork+0x10/0x20 [ 34.444405] [ 34.444451] kfence-#128: 0x000000000009e916-0x00000000b4ffe58d, size=32, cache=kmalloc-32 [ 34.444451] [ 34.444526] allocated by task 334 on cpu 0 at 34.443470s (0.001033s ago): [ 34.444594] test_alloc+0x29c/0x628 [ 34.444635] test_double_free+0xd4/0x238 [ 34.444676] kunit_try_run_case+0x170/0x3f0 [ 34.444858] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.444911] kthread+0x328/0x630 [ 34.444948] ret_from_fork+0x10/0x20 [ 34.445014] [ 34.445064] freed by task 334 on cpu 0 at 34.443587s (0.001466s ago): [ 34.445162] test_double_free+0x1ac/0x238 [ 34.445221] kunit_try_run_case+0x170/0x3f0 [ 34.445264] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.445339] kthread+0x328/0x630 [ 34.445377] ret_from_fork+0x10/0x20 [ 34.445434] [ 34.445508] CPU: 0 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 34.445593] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.445623] Hardware name: linux,dummy-virt (DT) [ 34.445763] ================================================================== [ 34.547327] ================================================================== [ 34.547426] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 34.547426] [ 34.547489] Invalid free of 0x0000000067b1f047 (in kfence-#129): [ 34.547546] test_double_free+0x100/0x238 [ 34.547595] kunit_try_run_case+0x170/0x3f0 [ 34.547640] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.547686] kthread+0x328/0x630 [ 34.547724] ret_from_fork+0x10/0x20 [ 34.547764] [ 34.547787] kfence-#129: 0x0000000067b1f047-0x00000000bc62513f, size=32, cache=test [ 34.547787] [ 34.547841] allocated by task 336 on cpu 0 at 34.547110s (0.000727s ago): [ 34.547903] test_alloc+0x230/0x628 [ 34.547945] test_double_free+0xd4/0x238 [ 34.547985] kunit_try_run_case+0x170/0x3f0 [ 34.548026] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.548071] kthread+0x328/0x630 [ 34.548106] ret_from_fork+0x10/0x20 [ 34.548159] [ 34.548181] freed by task 336 on cpu 0 at 34.547186s (0.000992s ago): [ 34.548245] test_double_free+0xf0/0x238 [ 34.548286] kunit_try_run_case+0x170/0x3f0 [ 34.548326] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.548371] kthread+0x328/0x630 [ 34.548405] ret_from_fork+0x10/0x20 [ 34.548444] [ 34.548488] CPU: 0 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 34.548569] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.548598] Hardware name: linux,dummy-virt (DT) [ 34.548631] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[ 34.019925] ================================================================== [ 34.020085] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 34.020085] [ 34.020222] Use-after-free read at 0x000000001dbcaa5c (in kfence-#124): [ 34.020276] test_use_after_free_read+0x114/0x248 [ 34.020326] kunit_try_run_case+0x170/0x3f0 [ 34.020372] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.020430] kthread+0x328/0x630 [ 34.020471] ret_from_fork+0x10/0x20 [ 34.020510] [ 34.020533] kfence-#124: 0x000000001dbcaa5c-0x000000008672e5b9, size=32, cache=kmalloc-32 [ 34.020533] [ 34.020594] allocated by task 326 on cpu 0 at 34.019568s (0.001021s ago): [ 34.020664] test_alloc+0x29c/0x628 [ 34.020703] test_use_after_free_read+0xd0/0x248 [ 34.020745] kunit_try_run_case+0x170/0x3f0 [ 34.020796] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.020842] kthread+0x328/0x630 [ 34.020877] ret_from_fork+0x10/0x20 [ 34.020938] [ 34.021083] freed by task 326 on cpu 0 at 34.019656s (0.001340s ago): [ 34.021215] test_use_after_free_read+0x1c0/0x248 [ 34.021274] kunit_try_run_case+0x170/0x3f0 [ 34.021323] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.021367] kthread+0x328/0x630 [ 34.021402] ret_from_fork+0x10/0x20 [ 34.021464] [ 34.021515] CPU: 0 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 34.021600] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.021631] Hardware name: linux,dummy-virt (DT) [ 34.021664] ================================================================== [ 34.128139] ================================================================== [ 34.128220] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 34.128220] [ 34.128514] Use-after-free read at 0x000000005ec5a4bc (in kfence-#125): [ 34.128836] test_use_after_free_read+0x114/0x248 [ 34.128959] kunit_try_run_case+0x170/0x3f0 [ 34.129014] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.129060] kthread+0x328/0x630 [ 34.129477] ret_from_fork+0x10/0x20 [ 34.129707] [ 34.129772] kfence-#125: 0x000000005ec5a4bc-0x000000002dc9fc65, size=32, cache=test [ 34.129772] [ 34.129941] allocated by task 328 on cpu 0 at 34.127845s (0.002072s ago): [ 34.130271] test_alloc+0x230/0x628 [ 34.130395] test_use_after_free_read+0xd0/0x248 [ 34.130463] kunit_try_run_case+0x170/0x3f0 [ 34.130510] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.130565] kthread+0x328/0x630 [ 34.130601] ret_from_fork+0x10/0x20 [ 34.130640] [ 34.130913] freed by task 328 on cpu 0 at 34.127930s (0.002922s ago): [ 34.131219] test_use_after_free_read+0xf0/0x248 [ 34.131316] kunit_try_run_case+0x170/0x3f0 [ 34.131426] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.131686] kthread+0x328/0x630 [ 34.131885] ret_from_fork+0x10/0x20 [ 34.132147] [ 34.132203] CPU: 0 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 34.132376] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.132496] Hardware name: linux,dummy-virt (DT) [ 34.132567] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[ 33.915527] ================================================================== [ 33.915605] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 33.915605] [ 33.915719] Out-of-bounds write at 0x0000000022b77cc3 (1B left of kfence-#123): [ 33.915878] test_out_of_bounds_write+0x100/0x240 [ 33.915952] kunit_try_run_case+0x170/0x3f0 [ 33.916002] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.916048] kthread+0x328/0x630 [ 33.916094] ret_from_fork+0x10/0x20 [ 33.916148] [ 33.916174] kfence-#123: 0x00000000d39a1f6e-0x00000000ff5f408a, size=32, cache=test [ 33.916174] [ 33.916225] allocated by task 324 on cpu 0 at 33.915427s (0.000795s ago): [ 33.916310] test_alloc+0x230/0x628 [ 33.916360] test_out_of_bounds_write+0xc8/0x240 [ 33.916403] kunit_try_run_case+0x170/0x3f0 [ 33.916444] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.916499] kthread+0x328/0x630 [ 33.916543] ret_from_fork+0x10/0x20 [ 33.916582] [ 33.916636] CPU: 0 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 33.916718] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.916750] Hardware name: linux,dummy-virt (DT) [ 33.916784] ================================================================== [ 33.807657] ================================================================== [ 33.807719] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 33.807719] [ 33.807807] Out-of-bounds write at 0x0000000041153f6e (1B left of kfence-#122): [ 33.807866] test_out_of_bounds_write+0x100/0x240 [ 33.807989] kunit_try_run_case+0x170/0x3f0 [ 33.808054] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.808217] kthread+0x328/0x630 [ 33.808354] ret_from_fork+0x10/0x20 [ 33.808446] [ 33.808549] kfence-#122: 0x0000000052eb9419-0x000000006e05797f, size=32, cache=kmalloc-32 [ 33.808549] [ 33.808653] allocated by task 322 on cpu 0 at 33.807514s (0.001129s ago): [ 33.808726] test_alloc+0x29c/0x628 [ 33.808789] test_out_of_bounds_write+0xc8/0x240 [ 33.808849] kunit_try_run_case+0x170/0x3f0 [ 33.808894] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.808939] kthread+0x328/0x630 [ 33.808976] ret_from_fork+0x10/0x20 [ 33.809020] [ 33.809067] CPU: 0 UID: 0 PID: 322 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 33.809165] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.809194] Hardware name: linux,dummy-virt (DT) [ 33.809226] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[ 33.275828] ================================================================== [ 33.275909] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 33.275909] [ 33.275994] Out-of-bounds read at 0x000000003d6ecd6f (1B left of kfence-#117): [ 33.276062] test_out_of_bounds_read+0x114/0x3e0 [ 33.276114] kunit_try_run_case+0x170/0x3f0 [ 33.276181] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.276239] kthread+0x328/0x630 [ 33.276279] ret_from_fork+0x10/0x20 [ 33.276326] [ 33.276351] kfence-#117: 0x00000000ab014227-0x0000000016865d84, size=32, cache=test [ 33.276351] [ 33.276402] allocated by task 320 on cpu 0 at 33.275743s (0.000656s ago): [ 33.276547] test_alloc+0x230/0x628 [ 33.276597] test_out_of_bounds_read+0xdc/0x3e0 [ 33.276640] kunit_try_run_case+0x170/0x3f0 [ 33.276681] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.276726] kthread+0x328/0x630 [ 33.276762] ret_from_fork+0x10/0x20 [ 33.276801] [ 33.276854] CPU: 0 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 33.276937] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.276969] Hardware name: linux,dummy-virt (DT) [ 33.277003] ================================================================== [ 32.754096] ================================================================== [ 32.754277] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 32.754277] [ 32.754728] Out-of-bounds read at 0x00000000de9418c7 (1B left of kfence-#112): [ 32.755268] test_out_of_bounds_read+0x114/0x3e0 [ 32.755337] kunit_try_run_case+0x170/0x3f0 [ 32.755403] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.755768] kthread+0x328/0x630 [ 32.755906] ret_from_fork+0x10/0x20 [ 32.755989] [ 32.756289] kfence-#112: 0x00000000afe5589f-0x00000000ad1ce973, size=32, cache=kmalloc-32 [ 32.756289] [ 32.756530] allocated by task 318 on cpu 0 at 32.751964s (0.004495s ago): [ 32.756995] test_alloc+0x29c/0x628 [ 32.757092] test_out_of_bounds_read+0xdc/0x3e0 [ 32.757156] kunit_try_run_case+0x170/0x3f0 [ 32.757209] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.757263] kthread+0x328/0x630 [ 32.757307] ret_from_fork+0x10/0x20 [ 32.757431] [ 32.757527] CPU: 0 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.757624] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.757656] Hardware name: linux,dummy-virt (DT) [ 32.757718] ================================================================== [ 32.857445] ================================================================== [ 32.857588] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 32.857588] [ 32.858345] Out-of-bounds read at 0x000000001843423f (32B right of kfence-#113): [ 32.858513] test_out_of_bounds_read+0x1c8/0x3e0 [ 32.858575] kunit_try_run_case+0x170/0x3f0 [ 32.858622] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.859011] kthread+0x328/0x630 [ 32.859167] ret_from_fork+0x10/0x20 [ 32.859283] [ 32.859322] kfence-#113: 0x00000000a0f380da-0x00000000f6024855, size=32, cache=kmalloc-32 [ 32.859322] [ 32.860377] allocated by task 318 on cpu 0 at 32.856721s (0.003639s ago): [ 32.860566] test_alloc+0x29c/0x628 [ 32.860963] test_out_of_bounds_read+0x198/0x3e0 [ 32.861051] kunit_try_run_case+0x170/0x3f0 [ 32.861196] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.861668] kthread+0x328/0x630 [ 32.861870] ret_from_fork+0x10/0x20 [ 32.862085] [ 32.862206] CPU: 0 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.862551] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.862919] Hardware name: linux,dummy-virt (DT) [ 32.862961] ================================================================== [ 33.700958] ================================================================== [ 33.701089] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 33.701089] [ 33.701500] Out-of-bounds read at 0x00000000b9f602d4 (32B right of kfence-#121): [ 33.701686] test_out_of_bounds_read+0x1c8/0x3e0 [ 33.701762] kunit_try_run_case+0x170/0x3f0 [ 33.701829] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.701882] kthread+0x328/0x630 [ 33.702200] ret_from_fork+0x10/0x20 [ 33.702339] [ 33.702388] kfence-#121: 0x00000000214c07c9-0x000000001a2e1e6c, size=32, cache=test [ 33.702388] [ 33.702464] allocated by task 320 on cpu 0 at 33.700856s (0.001586s ago): [ 33.702609] test_alloc+0x230/0x628 [ 33.702654] test_out_of_bounds_read+0x198/0x3e0 [ 33.702698] kunit_try_run_case+0x170/0x3f0 [ 33.703015] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.703156] kthread+0x328/0x630 [ 33.703245] ret_from_fork+0x10/0x20 [ 33.703378] [ 33.703446] CPU: 0 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 33.703597] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.703629] Hardware name: linux,dummy-virt (DT) [ 33.703681] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[ 32.632971] ================================================================== [ 32.633027] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 32.633080] Write of size 1 at addr fff00000c9bc2978 by task kunit_try_catch/316 [ 32.633145] [ 32.633453] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.633619] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.633680] Hardware name: linux,dummy-virt (DT) [ 32.633728] Call trace: [ 32.633753] show_stack+0x20/0x38 (C) [ 32.633808] dump_stack_lvl+0x8c/0xd0 [ 32.633910] print_report+0x118/0x5d0 [ 32.633964] kasan_report+0xdc/0x128 [ 32.634022] __asan_report_store1_noabort+0x20/0x30 [ 32.634078] strncpy_from_user+0x270/0x2a0 [ 32.634140] copy_user_test_oob+0x5c0/0xec8 [ 32.634190] kunit_try_run_case+0x170/0x3f0 [ 32.634240] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.634295] kthread+0x328/0x630 [ 32.634337] ret_from_fork+0x10/0x20 [ 32.634386] [ 32.634416] Allocated by task 316: [ 32.634446] kasan_save_stack+0x3c/0x68 [ 32.634493] kasan_save_track+0x20/0x40 [ 32.634533] kasan_save_alloc_info+0x40/0x58 [ 32.634576] __kasan_kmalloc+0xd4/0xd8 [ 32.634623] __kmalloc_noprof+0x198/0x4c8 [ 32.634664] kunit_kmalloc_array+0x34/0x88 [ 32.634943] copy_user_test_oob+0xac/0xec8 [ 32.635301] kunit_try_run_case+0x170/0x3f0 [ 32.635465] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.635550] kthread+0x328/0x630 [ 32.635595] ret_from_fork+0x10/0x20 [ 32.635634] [ 32.635883] The buggy address belongs to the object at fff00000c9bc2900 [ 32.635883] which belongs to the cache kmalloc-128 of size 128 [ 32.636076] The buggy address is located 0 bytes to the right of [ 32.636076] allocated 120-byte region [fff00000c9bc2900, fff00000c9bc2978) [ 32.636426] [ 32.636602] The buggy address belongs to the physical page: [ 32.636680] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc2 [ 32.636908] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.636970] page_type: f5(slab) [ 32.637047] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.637154] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.637277] page dumped because: kasan: bad access detected [ 32.637441] [ 32.637469] Memory state around the buggy address: [ 32.637533] fff00000c9bc2800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.637611] fff00000c9bc2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.637768] >fff00000c9bc2900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.637836] ^ [ 32.637886] fff00000c9bc2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.638117] fff00000c9bc2a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.638321] ================================================================== [ 32.626496] ================================================================== [ 32.626581] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 32.626635] Write of size 121 at addr fff00000c9bc2900 by task kunit_try_catch/316 [ 32.626688] [ 32.626749] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.626837] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.626868] Hardware name: linux,dummy-virt (DT) [ 32.626900] Call trace: [ 32.626924] show_stack+0x20/0x38 (C) [ 32.626972] dump_stack_lvl+0x8c/0xd0 [ 32.627047] print_report+0x118/0x5d0 [ 32.627093] kasan_report+0xdc/0x128 [ 32.627245] kasan_check_range+0x100/0x1a8 [ 32.627333] __kasan_check_write+0x20/0x30 [ 32.627429] strncpy_from_user+0x3c/0x2a0 [ 32.627541] copy_user_test_oob+0x5c0/0xec8 [ 32.627757] kunit_try_run_case+0x170/0x3f0 [ 32.627924] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.628006] kthread+0x328/0x630 [ 32.628073] ret_from_fork+0x10/0x20 [ 32.628275] [ 32.628388] Allocated by task 316: [ 32.628467] kasan_save_stack+0x3c/0x68 [ 32.628533] kasan_save_track+0x20/0x40 [ 32.628620] kasan_save_alloc_info+0x40/0x58 [ 32.628661] __kasan_kmalloc+0xd4/0xd8 [ 32.628841] __kmalloc_noprof+0x198/0x4c8 [ 32.629124] kunit_kmalloc_array+0x34/0x88 [ 32.629248] copy_user_test_oob+0xac/0xec8 [ 32.629573] kunit_try_run_case+0x170/0x3f0 [ 32.629638] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.629752] kthread+0x328/0x630 [ 32.629842] ret_from_fork+0x10/0x20 [ 32.629918] [ 32.630063] The buggy address belongs to the object at fff00000c9bc2900 [ 32.630063] which belongs to the cache kmalloc-128 of size 128 [ 32.630189] The buggy address is located 0 bytes inside of [ 32.630189] allocated 120-byte region [fff00000c9bc2900, fff00000c9bc2978) [ 32.630361] [ 32.630431] The buggy address belongs to the physical page: [ 32.630542] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc2 [ 32.630600] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.630653] page_type: f5(slab) [ 32.630848] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.630939] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.630993] page dumped because: kasan: bad access detected [ 32.631039] [ 32.631074] Memory state around the buggy address: [ 32.631275] fff00000c9bc2800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.631350] fff00000c9bc2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.631432] >fff00000c9bc2900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.631497] ^ [ 32.631642] fff00000c9bc2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.631726] fff00000c9bc2a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.631778] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[ 32.580904] ================================================================== [ 32.580970] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 32.581031] Read of size 121 at addr fff00000c9bc2900 by task kunit_try_catch/316 [ 32.581088] [ 32.581123] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.581231] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.581260] Hardware name: linux,dummy-virt (DT) [ 32.581293] Call trace: [ 32.581318] show_stack+0x20/0x38 (C) [ 32.584989] dump_stack_lvl+0x8c/0xd0 [ 32.586117] print_report+0x118/0x5d0 [ 32.586620] kasan_report+0xdc/0x128 [ 32.587004] kasan_check_range+0x100/0x1a8 [ 32.587592] __kasan_check_read+0x20/0x30 [ 32.588330] copy_user_test_oob+0x728/0xec8 [ 32.588398] kunit_try_run_case+0x170/0x3f0 [ 32.588449] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.588912] kthread+0x328/0x630 [ 32.589650] ret_from_fork+0x10/0x20 [ 32.589844] [ 32.590348] Allocated by task 316: [ 32.590452] kasan_save_stack+0x3c/0x68 [ 32.591048] kasan_save_track+0x20/0x40 [ 32.591105] kasan_save_alloc_info+0x40/0x58 [ 32.591802] __kasan_kmalloc+0xd4/0xd8 [ 32.591856] __kmalloc_noprof+0x198/0x4c8 [ 32.591899] kunit_kmalloc_array+0x34/0x88 [ 32.592769] copy_user_test_oob+0xac/0xec8 [ 32.593366] kunit_try_run_case+0x170/0x3f0 [ 32.593945] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.594389] kthread+0x328/0x630 [ 32.594481] ret_from_fork+0x10/0x20 [ 32.594597] [ 32.594816] The buggy address belongs to the object at fff00000c9bc2900 [ 32.594816] which belongs to the cache kmalloc-128 of size 128 [ 32.594896] The buggy address is located 0 bytes inside of [ 32.594896] allocated 120-byte region [fff00000c9bc2900, fff00000c9bc2978) [ 32.595839] [ 32.596022] The buggy address belongs to the physical page: [ 32.596224] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc2 [ 32.596865] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.597079] page_type: f5(slab) [ 32.597231] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.598023] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.598322] page dumped because: kasan: bad access detected [ 32.598358] [ 32.598885] Memory state around the buggy address: [ 32.598995] fff00000c9bc2800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.599060] fff00000c9bc2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.599108] >fff00000c9bc2900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.599159] ^ [ 32.599205] fff00000c9bc2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.600009] fff00000c9bc2a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.600247] ================================================================== [ 32.622985] ================================================================== [ 32.623052] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 32.623103] Read of size 121 at addr fff00000c9bc2900 by task kunit_try_catch/316 [ 32.623265] [ 32.623313] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.623448] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.623476] Hardware name: linux,dummy-virt (DT) [ 32.623533] Call trace: [ 32.623558] show_stack+0x20/0x38 (C) [ 32.623627] dump_stack_lvl+0x8c/0xd0 [ 32.623691] print_report+0x118/0x5d0 [ 32.623763] kasan_report+0xdc/0x128 [ 32.623806] kasan_check_range+0x100/0x1a8 [ 32.623854] __kasan_check_read+0x20/0x30 [ 32.623916] copy_user_test_oob+0x4a0/0xec8 [ 32.624012] kunit_try_run_case+0x170/0x3f0 [ 32.624069] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.624144] kthread+0x328/0x630 [ 32.624188] ret_from_fork+0x10/0x20 [ 32.624235] [ 32.624255] Allocated by task 316: [ 32.624305] kasan_save_stack+0x3c/0x68 [ 32.624347] kasan_save_track+0x20/0x40 [ 32.624388] kasan_save_alloc_info+0x40/0x58 [ 32.624426] __kasan_kmalloc+0xd4/0xd8 [ 32.624466] __kmalloc_noprof+0x198/0x4c8 [ 32.624506] kunit_kmalloc_array+0x34/0x88 [ 32.624547] copy_user_test_oob+0xac/0xec8 [ 32.624588] kunit_try_run_case+0x170/0x3f0 [ 32.624835] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.624890] kthread+0x328/0x630 [ 32.624968] ret_from_fork+0x10/0x20 [ 32.625016] [ 32.625045] The buggy address belongs to the object at fff00000c9bc2900 [ 32.625045] which belongs to the cache kmalloc-128 of size 128 [ 32.625112] The buggy address is located 0 bytes inside of [ 32.625112] allocated 120-byte region [fff00000c9bc2900, fff00000c9bc2978) [ 32.625205] [ 32.625245] The buggy address belongs to the physical page: [ 32.625280] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc2 [ 32.625342] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.625542] page_type: f5(slab) [ 32.625590] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.625708] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.625773] page dumped because: kasan: bad access detected [ 32.625809] [ 32.625830] Memory state around the buggy address: [ 32.625863] fff00000c9bc2800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.625910] fff00000c9bc2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.625966] >fff00000c9bc2900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.626009] ^ [ 32.626051] fff00000c9bc2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.626105] fff00000c9bc2a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.626193] ================================================================== [ 32.609807] ================================================================== [ 32.610042] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 32.610119] Write of size 121 at addr fff00000c9bc2900 by task kunit_try_catch/316 [ 32.610228] [ 32.610268] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.610523] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.610555] Hardware name: linux,dummy-virt (DT) [ 32.610588] Call trace: [ 32.610615] show_stack+0x20/0x38 (C) [ 32.610665] dump_stack_lvl+0x8c/0xd0 [ 32.610816] print_report+0x118/0x5d0 [ 32.610874] kasan_report+0xdc/0x128 [ 32.610917] kasan_check_range+0x100/0x1a8 [ 32.610964] __kasan_check_write+0x20/0x30 [ 32.611011] copy_user_test_oob+0x35c/0xec8 [ 32.611061] kunit_try_run_case+0x170/0x3f0 [ 32.611155] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.611211] kthread+0x328/0x630 [ 32.611254] ret_from_fork+0x10/0x20 [ 32.611341] [ 32.611405] Allocated by task 316: [ 32.611463] kasan_save_stack+0x3c/0x68 [ 32.611592] kasan_save_track+0x20/0x40 [ 32.611659] kasan_save_alloc_info+0x40/0x58 [ 32.611752] __kasan_kmalloc+0xd4/0xd8 [ 32.611831] __kmalloc_noprof+0x198/0x4c8 [ 32.611929] kunit_kmalloc_array+0x34/0x88 [ 32.612020] copy_user_test_oob+0xac/0xec8 [ 32.612073] kunit_try_run_case+0x170/0x3f0 [ 32.612142] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.612191] kthread+0x328/0x630 [ 32.612226] ret_from_fork+0x10/0x20 [ 32.612263] [ 32.612284] The buggy address belongs to the object at fff00000c9bc2900 [ 32.612284] which belongs to the cache kmalloc-128 of size 128 [ 32.612347] The buggy address is located 0 bytes inside of [ 32.612347] allocated 120-byte region [fff00000c9bc2900, fff00000c9bc2978) [ 32.612441] [ 32.612463] The buggy address belongs to the physical page: [ 32.612538] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc2 [ 32.612636] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.612724] page_type: f5(slab) [ 32.612834] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.612924] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.612996] page dumped because: kasan: bad access detected [ 32.613069] [ 32.613153] Memory state around the buggy address: [ 32.613229] fff00000c9bc2800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.613324] fff00000c9bc2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.613414] >fff00000c9bc2900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.613540] ^ [ 32.613616] fff00000c9bc2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.613663] fff00000c9bc2a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.613851] ================================================================== [ 32.543440] ================================================================== [ 32.543554] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 32.543654] Write of size 121 at addr fff00000c9bc2900 by task kunit_try_catch/316 [ 32.543709] [ 32.543756] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.543854] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.543883] Hardware name: linux,dummy-virt (DT) [ 32.544471] Call trace: [ 32.545536] show_stack+0x20/0x38 (C) [ 32.546014] dump_stack_lvl+0x8c/0xd0 [ 32.546073] print_report+0x118/0x5d0 [ 32.546121] kasan_report+0xdc/0x128 [ 32.546177] kasan_check_range+0x100/0x1a8 [ 32.546227] __kasan_check_write+0x20/0x30 [ 32.546276] copy_user_test_oob+0x234/0xec8 [ 32.546326] kunit_try_run_case+0x170/0x3f0 [ 32.546382] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.546438] kthread+0x328/0x630 [ 32.546483] ret_from_fork+0x10/0x20 [ 32.546535] [ 32.546556] Allocated by task 316: [ 32.546589] kasan_save_stack+0x3c/0x68 [ 32.549477] kasan_save_track+0x20/0x40 [ 32.549913] kasan_save_alloc_info+0x40/0x58 [ 32.550027] __kasan_kmalloc+0xd4/0xd8 [ 32.550099] __kmalloc_noprof+0x198/0x4c8 [ 32.550752] kunit_kmalloc_array+0x34/0x88 [ 32.550811] copy_user_test_oob+0xac/0xec8 [ 32.551582] kunit_try_run_case+0x170/0x3f0 [ 32.551697] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.552036] kthread+0x328/0x630 [ 32.553264] ret_from_fork+0x10/0x20 [ 32.553314] [ 32.553994] The buggy address belongs to the object at fff00000c9bc2900 [ 32.553994] which belongs to the cache kmalloc-128 of size 128 [ 32.554233] The buggy address is located 0 bytes inside of [ 32.554233] allocated 120-byte region [fff00000c9bc2900, fff00000c9bc2978) [ 32.554533] [ 32.554560] The buggy address belongs to the physical page: [ 32.555221] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc2 [ 32.555348] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.555408] page_type: f5(slab) [ 32.555454] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.556174] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.556948] page dumped because: kasan: bad access detected [ 32.556989] [ 32.557011] Memory state around the buggy address: [ 32.557647] fff00000c9bc2800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.557765] fff00000c9bc2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.557994] >fff00000c9bc2900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.558189] ^ [ 32.558338] fff00000c9bc2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.559653] fff00000c9bc2a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.560451] ================================================================== [ 32.614582] ================================================================== [ 32.614656] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 32.614874] Read of size 121 at addr fff00000c9bc2900 by task kunit_try_catch/316 [ 32.614929] [ 32.614960] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.615065] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.615093] Hardware name: linux,dummy-virt (DT) [ 32.615181] Call trace: [ 32.615251] show_stack+0x20/0x38 (C) [ 32.615373] dump_stack_lvl+0x8c/0xd0 [ 32.615450] print_report+0x118/0x5d0 [ 32.615510] kasan_report+0xdc/0x128 [ 32.615583] kasan_check_range+0x100/0x1a8 [ 32.615642] __kasan_check_read+0x20/0x30 [ 32.615709] copy_user_test_oob+0x3c8/0xec8 [ 32.615899] kunit_try_run_case+0x170/0x3f0 [ 32.616044] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.616153] kthread+0x328/0x630 [ 32.616196] ret_from_fork+0x10/0x20 [ 32.616245] [ 32.616274] Allocated by task 316: [ 32.616303] kasan_save_stack+0x3c/0x68 [ 32.616346] kasan_save_track+0x20/0x40 [ 32.616395] kasan_save_alloc_info+0x40/0x58 [ 32.616458] __kasan_kmalloc+0xd4/0xd8 [ 32.616516] __kmalloc_noprof+0x198/0x4c8 [ 32.616557] kunit_kmalloc_array+0x34/0x88 [ 32.616598] copy_user_test_oob+0xac/0xec8 [ 32.616644] kunit_try_run_case+0x170/0x3f0 [ 32.616685] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.616732] kthread+0x328/0x630 [ 32.616766] ret_from_fork+0x10/0x20 [ 32.616803] [ 32.616834] The buggy address belongs to the object at fff00000c9bc2900 [ 32.616834] which belongs to the cache kmalloc-128 of size 128 [ 32.616896] The buggy address is located 0 bytes inside of [ 32.616896] allocated 120-byte region [fff00000c9bc2900, fff00000c9bc2978) [ 32.616963] [ 32.616987] The buggy address belongs to the physical page: [ 32.617022] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc2 [ 32.617085] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.617152] page_type: f5(slab) [ 32.617192] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.617245] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.617291] page dumped because: kasan: bad access detected [ 32.617325] [ 32.617366] Memory state around the buggy address: [ 32.617403] fff00000c9bc2800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.617450] fff00000c9bc2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.617496] >fff00000c9bc2900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.617538] ^ [ 32.617603] fff00000c9bc2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.617647] fff00000c9bc2a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.617702] ================================================================== [ 32.618022] ================================================================== [ 32.618072] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 32.618148] Write of size 121 at addr fff00000c9bc2900 by task kunit_try_catch/316 [ 32.618203] [ 32.618258] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.618346] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.618374] Hardware name: linux,dummy-virt (DT) [ 32.618408] Call trace: [ 32.618433] show_stack+0x20/0x38 (C) [ 32.618481] dump_stack_lvl+0x8c/0xd0 [ 32.618527] print_report+0x118/0x5d0 [ 32.618571] kasan_report+0xdc/0x128 [ 32.618788] kasan_check_range+0x100/0x1a8 [ 32.618840] __kasan_check_write+0x20/0x30 [ 32.618888] copy_user_test_oob+0x434/0xec8 [ 32.618936] kunit_try_run_case+0x170/0x3f0 [ 32.618985] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.619040] kthread+0x328/0x630 [ 32.619206] ret_from_fork+0x10/0x20 [ 32.619334] [ 32.619437] Allocated by task 316: [ 32.619496] kasan_save_stack+0x3c/0x68 [ 32.619594] kasan_save_track+0x20/0x40 [ 32.619788] kasan_save_alloc_info+0x40/0x58 [ 32.619847] __kasan_kmalloc+0xd4/0xd8 [ 32.619887] __kmalloc_noprof+0x198/0x4c8 [ 32.619938] kunit_kmalloc_array+0x34/0x88 [ 32.620035] copy_user_test_oob+0xac/0xec8 [ 32.620113] kunit_try_run_case+0x170/0x3f0 [ 32.620237] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.620325] kthread+0x328/0x630 [ 32.620390] ret_from_fork+0x10/0x20 [ 32.620512] [ 32.620533] The buggy address belongs to the object at fff00000c9bc2900 [ 32.620533] which belongs to the cache kmalloc-128 of size 128 [ 32.620596] The buggy address is located 0 bytes inside of [ 32.620596] allocated 120-byte region [fff00000c9bc2900, fff00000c9bc2978) [ 32.620682] [ 32.620703] The buggy address belongs to the physical page: [ 32.620964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc2 [ 32.621083] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.621227] page_type: f5(slab) [ 32.621295] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.621408] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.621584] page dumped because: kasan: bad access detected [ 32.621642] [ 32.621662] Memory state around the buggy address: [ 32.621697] fff00000c9bc2800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.621762] fff00000c9bc2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.621848] >fff00000c9bc2900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.621917] ^ [ 32.622045] fff00000c9bc2980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.622176] fff00000c9bc2a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.622300] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[ 32.494722] ================================================================== [ 32.494913] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 32.495067] Write of size 8 at addr fff00000c9bc2878 by task kunit_try_catch/312 [ 32.495165] [ 32.495254] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.495475] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.495512] Hardware name: linux,dummy-virt (DT) [ 32.496151] Call trace: [ 32.496269] show_stack+0x20/0x38 (C) [ 32.496377] dump_stack_lvl+0x8c/0xd0 [ 32.496454] print_report+0x118/0x5d0 [ 32.496557] kasan_report+0xdc/0x128 [ 32.496601] kasan_check_range+0x100/0x1a8 [ 32.496650] __kasan_check_write+0x20/0x30 [ 32.496739] copy_to_kernel_nofault+0x8c/0x250 [ 32.496981] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 32.497088] kunit_try_run_case+0x170/0x3f0 [ 32.497224] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.497281] kthread+0x328/0x630 [ 32.497365] ret_from_fork+0x10/0x20 [ 32.497578] [ 32.497672] Allocated by task 312: [ 32.497721] kasan_save_stack+0x3c/0x68 [ 32.497805] kasan_save_track+0x20/0x40 [ 32.497866] kasan_save_alloc_info+0x40/0x58 [ 32.497906] __kasan_kmalloc+0xd4/0xd8 [ 32.497945] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.497987] copy_to_kernel_nofault_oob+0xc8/0x418 [ 32.498030] kunit_try_run_case+0x170/0x3f0 [ 32.498072] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.498120] kthread+0x328/0x630 [ 32.498162] ret_from_fork+0x10/0x20 [ 32.498201] [ 32.498222] The buggy address belongs to the object at fff00000c9bc2800 [ 32.498222] which belongs to the cache kmalloc-128 of size 128 [ 32.498285] The buggy address is located 0 bytes to the right of [ 32.498285] allocated 120-byte region [fff00000c9bc2800, fff00000c9bc2878) [ 32.498353] [ 32.498423] The buggy address belongs to the physical page: [ 32.498702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc2 [ 32.499011] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.499365] page_type: f5(slab) [ 32.499602] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.499953] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.500185] page dumped because: kasan: bad access detected [ 32.500418] [ 32.500441] Memory state around the buggy address: [ 32.500487] fff00000c9bc2700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.500538] fff00000c9bc2780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.500585] >fff00000c9bc2800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.500877] ^ [ 32.500942] fff00000c9bc2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.501125] fff00000c9bc2900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.501252] ================================================================== [ 32.487731] ================================================================== [ 32.487800] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 32.487870] Read of size 8 at addr fff00000c9bc2878 by task kunit_try_catch/312 [ 32.488108] [ 32.488263] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.488460] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.488515] Hardware name: linux,dummy-virt (DT) [ 32.488672] Call trace: [ 32.488743] show_stack+0x20/0x38 (C) [ 32.488796] dump_stack_lvl+0x8c/0xd0 [ 32.488843] print_report+0x118/0x5d0 [ 32.488888] kasan_report+0xdc/0x128 [ 32.488931] __asan_report_load8_noabort+0x20/0x30 [ 32.488981] copy_to_kernel_nofault+0x204/0x250 [ 32.489037] copy_to_kernel_nofault_oob+0x158/0x418 [ 32.489425] kunit_try_run_case+0x170/0x3f0 [ 32.489571] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.489915] kthread+0x328/0x630 [ 32.489965] ret_from_fork+0x10/0x20 [ 32.490016] [ 32.490523] Allocated by task 312: [ 32.490644] kasan_save_stack+0x3c/0x68 [ 32.490756] kasan_save_track+0x20/0x40 [ 32.490811] kasan_save_alloc_info+0x40/0x58 [ 32.490850] __kasan_kmalloc+0xd4/0xd8 [ 32.490891] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.490933] copy_to_kernel_nofault_oob+0xc8/0x418 [ 32.490977] kunit_try_run_case+0x170/0x3f0 [ 32.491072] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.491183] kthread+0x328/0x630 [ 32.491368] ret_from_fork+0x10/0x20 [ 32.491471] [ 32.491530] The buggy address belongs to the object at fff00000c9bc2800 [ 32.491530] which belongs to the cache kmalloc-128 of size 128 [ 32.491644] The buggy address is located 0 bytes to the right of [ 32.491644] allocated 120-byte region [fff00000c9bc2800, fff00000c9bc2878) [ 32.491719] [ 32.491742] The buggy address belongs to the physical page: [ 32.491781] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc2 [ 32.491838] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.491893] page_type: f5(slab) [ 32.491948] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.492152] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.492437] page dumped because: kasan: bad access detected [ 32.492478] [ 32.492500] Memory state around the buggy address: [ 32.492541] fff00000c9bc2700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.492603] fff00000c9bc2780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.492650] >fff00000c9bc2800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.493072] ^ [ 32.493238] fff00000c9bc2880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.493319] fff00000c9bc2900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.493362] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 32.429638] ================================================================== [ 32.430265] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 32.430330] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/300 [ 32.430384] [ 32.430423] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.430521] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.430660] Hardware name: linux,dummy-virt (DT) [ 32.430808] Call trace: [ 32.430937] show_stack+0x20/0x38 (C) [ 32.431022] dump_stack_lvl+0x8c/0xd0 [ 32.431076] print_report+0x310/0x5d0 [ 32.431122] kasan_report+0xdc/0x128 [ 32.431175] __asan_report_load1_noabort+0x20/0x30 [ 32.431225] vmalloc_oob+0x578/0x5d0 [ 32.431271] kunit_try_run_case+0x170/0x3f0 [ 32.431717] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.431779] kthread+0x328/0x630 [ 32.431825] ret_from_fork+0x10/0x20 [ 32.432312] [ 32.432730] The buggy address ffff8000800fe7f3 belongs to a vmalloc virtual mapping [ 32.432863] The buggy address belongs to the physical page: [ 32.432901] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b09 [ 32.433018] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.433289] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 32.433610] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.433919] page dumped because: kasan: bad access detected [ 32.434066] [ 32.434101] Memory state around the buggy address: [ 32.434152] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.434200] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.434246] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 32.434289] ^ [ 32.434359] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 32.434693] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 32.435114] ================================================================== [ 32.436366] ================================================================== [ 32.436451] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 32.436500] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/300 [ 32.436561] [ 32.436714] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.436920] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.436950] Hardware name: linux,dummy-virt (DT) [ 32.436991] Call trace: [ 32.437101] show_stack+0x20/0x38 (C) [ 32.437333] dump_stack_lvl+0x8c/0xd0 [ 32.437694] print_report+0x310/0x5d0 [ 32.437967] kasan_report+0xdc/0x128 [ 32.438065] __asan_report_load1_noabort+0x20/0x30 [ 32.438330] vmalloc_oob+0x51c/0x5d0 [ 32.438521] kunit_try_run_case+0x170/0x3f0 [ 32.438795] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.439030] kthread+0x328/0x630 [ 32.439075] ret_from_fork+0x10/0x20 [ 32.439181] [ 32.439220] The buggy address ffff8000800fe7f8 belongs to a vmalloc virtual mapping [ 32.439266] The buggy address belongs to the physical page: [ 32.439321] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b09 [ 32.439375] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.439587] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 32.439749] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.439794] page dumped because: kasan: bad access detected [ 32.439840] [ 32.439860] Memory state around the buggy address: [ 32.439896] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.440170] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.440219] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 32.440527] ^ [ 32.440741] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 32.441007] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 32.441054] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 32.264606] ================================================================== [ 32.265329] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 32.265384] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.265526] [ 32.265581] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.265790] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.265827] Hardware name: linux,dummy-virt (DT) [ 32.266242] Call trace: [ 32.266272] show_stack+0x20/0x38 (C) [ 32.266411] dump_stack_lvl+0x8c/0xd0 [ 32.266936] print_report+0x118/0x5d0 [ 32.267276] kasan_report+0xdc/0x128 [ 32.267337] kasan_check_range+0x100/0x1a8 [ 32.267387] __kasan_check_write+0x20/0x30 [ 32.267435] kasan_atomics_helper+0xff0/0x4858 [ 32.267842] kasan_atomics+0x198/0x2e0 [ 32.268183] kunit_try_run_case+0x170/0x3f0 [ 32.268283] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.268689] kthread+0x328/0x630 [ 32.268742] ret_from_fork+0x10/0x20 [ 32.268793] [ 32.269426] Allocated by task 296: [ 32.269610] kasan_save_stack+0x3c/0x68 [ 32.269863] kasan_save_track+0x20/0x40 [ 32.269909] kasan_save_alloc_info+0x40/0x58 [ 32.269952] __kasan_kmalloc+0xd4/0xd8 [ 32.270544] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.270601] kasan_atomics+0xb8/0x2e0 [ 32.271148] kunit_try_run_case+0x170/0x3f0 [ 32.271235] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.271358] kthread+0x328/0x630 [ 32.271401] ret_from_fork+0x10/0x20 [ 32.271439] [ 32.271464] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.271464] which belongs to the cache kmalloc-64 of size 64 [ 32.271725] The buggy address is located 0 bytes to the right of [ 32.271725] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.271804] [ 32.271826] The buggy address belongs to the physical page: [ 32.271859] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.271943] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.272145] page_type: f5(slab) [ 32.272204] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.272386] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.272430] page dumped because: kasan: bad access detected [ 32.272513] [ 32.273034] Memory state around the buggy address: [ 32.273069] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.273116] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.273171] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.273214] ^ [ 32.273248] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.273344] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.273387] ================================================================== [ 32.288007] ================================================================== [ 32.288058] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 32.288107] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.288170] [ 32.288201] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.288481] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.288532] Hardware name: linux,dummy-virt (DT) [ 32.288865] Call trace: [ 32.288915] show_stack+0x20/0x38 (C) [ 32.288966] dump_stack_lvl+0x8c/0xd0 [ 32.289031] print_report+0x118/0x5d0 [ 32.289076] kasan_report+0xdc/0x128 [ 32.289122] kasan_check_range+0x100/0x1a8 [ 32.289180] __kasan_check_write+0x20/0x30 [ 32.289228] kasan_atomics_helper+0x1190/0x4858 [ 32.289283] kasan_atomics+0x198/0x2e0 [ 32.289334] kunit_try_run_case+0x170/0x3f0 [ 32.289387] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.289447] kthread+0x328/0x630 [ 32.289491] ret_from_fork+0x10/0x20 [ 32.289540] [ 32.289569] Allocated by task 296: [ 32.289700] kasan_save_stack+0x3c/0x68 [ 32.289816] kasan_save_track+0x20/0x40 [ 32.289878] kasan_save_alloc_info+0x40/0x58 [ 32.290076] __kasan_kmalloc+0xd4/0xd8 [ 32.290276] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.290322] kasan_atomics+0xb8/0x2e0 [ 32.290369] kunit_try_run_case+0x170/0x3f0 [ 32.290462] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.290577] kthread+0x328/0x630 [ 32.291017] ret_from_fork+0x10/0x20 [ 32.291526] [ 32.291554] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.291554] which belongs to the cache kmalloc-64 of size 64 [ 32.291687] The buggy address is located 0 bytes to the right of [ 32.291687] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.291849] [ 32.291873] The buggy address belongs to the physical page: [ 32.291962] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.292033] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.292122] page_type: f5(slab) [ 32.292225] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.292524] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.292732] page dumped because: kasan: bad access detected [ 32.292773] [ 32.292800] Memory state around the buggy address: [ 32.293095] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.293363] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.293418] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.293464] ^ [ 32.293661] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.293942] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.293994] ================================================================== [ 32.139954] ================================================================== [ 32.140161] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 32.140370] Write of size 4 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.140618] [ 32.140675] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.140769] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.140962] Hardware name: linux,dummy-virt (DT) [ 32.141251] Call trace: [ 32.141302] show_stack+0x20/0x38 (C) [ 32.141359] dump_stack_lvl+0x8c/0xd0 [ 32.141408] print_report+0x118/0x5d0 [ 32.141453] kasan_report+0xdc/0x128 [ 32.141648] kasan_check_range+0x100/0x1a8 [ 32.141894] __kasan_check_write+0x20/0x30 [ 32.142220] kasan_atomics_helper+0xb70/0x4858 [ 32.142313] kasan_atomics+0x198/0x2e0 [ 32.142535] kunit_try_run_case+0x170/0x3f0 [ 32.142602] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.142980] kthread+0x328/0x630 [ 32.143107] ret_from_fork+0x10/0x20 [ 32.143213] [ 32.143349] Allocated by task 296: [ 32.143459] kasan_save_stack+0x3c/0x68 [ 32.143703] kasan_save_track+0x20/0x40 [ 32.143872] kasan_save_alloc_info+0x40/0x58 [ 32.144000] __kasan_kmalloc+0xd4/0xd8 [ 32.144079] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.144238] kasan_atomics+0xb8/0x2e0 [ 32.144327] kunit_try_run_case+0x170/0x3f0 [ 32.144372] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.144424] kthread+0x328/0x630 [ 32.144676] ret_from_fork+0x10/0x20 [ 32.144732] [ 32.144862] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.144862] which belongs to the cache kmalloc-64 of size 64 [ 32.144945] The buggy address is located 0 bytes to the right of [ 32.144945] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.145020] [ 32.145061] The buggy address belongs to the physical page: [ 32.145096] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.145312] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.145459] page_type: f5(slab) [ 32.146220] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.146716] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.146771] page dumped because: kasan: bad access detected [ 32.147057] [ 32.148317] ^ [ 32.150822] kasan_atomics_helper+0x3dbc/0x4858 [ 32.153050] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.155387] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.161953] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.164687] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.166689] kasan_save_track+0x20/0x40 [ 32.169920] page_type: f5(slab) [ 32.170292] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.171791] ^ [ 32.173896] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 32.175306] kasan_report+0xdc/0x128 [ 32.177616] Allocated by task 296: [ 32.179762] [ 32.180396] page_type: f5(slab) [ 32.180498] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.180567] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.180612] page dumped because: kasan: bad access detected [ 32.180792] [ 32.181153] Memory state around the buggy address: [ 32.181225] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.181455] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.181535] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.181578] ^ [ 32.182024] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.182078] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.182120] ================================================================== [ 32.209251] ================================================================== [ 32.209358] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 32.209485] Read of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.209579] [ 32.209773] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.210006] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.210036] Hardware name: linux,dummy-virt (DT) [ 32.210069] Call trace: [ 32.210092] show_stack+0x20/0x38 (C) [ 32.210157] dump_stack_lvl+0x8c/0xd0 [ 32.210204] print_report+0x118/0x5d0 [ 32.210250] kasan_report+0xdc/0x128 [ 32.211124] kasan_check_range+0x100/0x1a8 [ 32.211215] __kasan_check_read+0x20/0x30 [ 32.211416] kasan_atomics_helper+0xdd4/0x4858 [ 32.211717] kasan_atomics+0x198/0x2e0 [ 32.211778] kunit_try_run_case+0x170/0x3f0 [ 32.211829] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.211894] kthread+0x328/0x630 [ 32.211938] ret_from_fork+0x10/0x20 [ 32.211988] [ 32.212008] Allocated by task 296: [ 32.212039] kasan_save_stack+0x3c/0x68 [ 32.212084] kasan_save_track+0x20/0x40 [ 32.212466] kasan_save_alloc_info+0x40/0x58 [ 32.212509] __kasan_kmalloc+0xd4/0xd8 [ 32.212731] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.212972] kasan_atomics+0xb8/0x2e0 [ 32.213018] kunit_try_run_case+0x170/0x3f0 [ 32.213061] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.213216] kthread+0x328/0x630 [ 32.213262] ret_from_fork+0x10/0x20 [ 32.213302] [ 32.213803] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.213803] which belongs to the cache kmalloc-64 of size 64 [ 32.214275] The buggy address is located 0 bytes to the right of [ 32.214275] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.214467] [ 32.214618] The buggy address belongs to the physical page: [ 32.214655] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.214723] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.215239] page_type: f5(slab) [ 32.215390] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.215446] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.215490] page dumped because: kasan: bad access detected [ 32.215773] [ 32.215798] Memory state around the buggy address: [ 32.215834] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.215881] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.215965] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.216007] ^ [ 32.216043] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.216271] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.216404] ================================================================== [ 32.192375] ================================================================== [ 32.192447] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 32.192783] Write of size 4 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.193104] [ 32.193623] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.193949] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.193985] Hardware name: linux,dummy-virt (DT) [ 32.194019] Call trace: [ 32.194313] show_stack+0x20/0x38 (C) [ 32.194375] dump_stack_lvl+0x8c/0xd0 [ 32.194529] print_report+0x118/0x5d0 [ 32.194575] kasan_report+0xdc/0x128 [ 32.194812] kasan_check_range+0x100/0x1a8 [ 32.195027] __kasan_check_write+0x20/0x30 [ 32.195234] kasan_atomics_helper+0xd3c/0x4858 [ 32.195296] kasan_atomics+0x198/0x2e0 [ 32.195345] kunit_try_run_case+0x170/0x3f0 [ 32.195404] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.195867] kthread+0x328/0x630 [ 32.196154] ret_from_fork+0x10/0x20 [ 32.196518] [ 32.196545] Allocated by task 296: [ 32.196578] kasan_save_stack+0x3c/0x68 [ 32.196625] kasan_save_track+0x20/0x40 [ 32.196751] kasan_save_alloc_info+0x40/0x58 [ 32.196792] __kasan_kmalloc+0xd4/0xd8 [ 32.197054] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.197100] kasan_atomics+0xb8/0x2e0 [ 32.197150] kunit_try_run_case+0x170/0x3f0 [ 32.197455] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.197681] kthread+0x328/0x630 [ 32.197717] ret_from_fork+0x10/0x20 [ 32.197754] [ 32.197784] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.197784] which belongs to the cache kmalloc-64 of size 64 [ 32.197987] The buggy address is located 0 bytes to the right of [ 32.197987] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.198264] [ 32.198288] The buggy address belongs to the physical page: [ 32.198322] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.198565] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.198772] page_type: f5(slab) [ 32.198970] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.199031] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.199076] page dumped because: kasan: bad access detected [ 32.199119] [ 32.199166] Memory state around the buggy address: [ 32.199206] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.199253] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.199298] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.199606] ^ [ 32.199649] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.199695] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.199969] ================================================================== [ 32.325160] ================================================================== [ 32.325463] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 32.325516] Read of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.325576] [ 32.325710] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.325904] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.326036] Hardware name: linux,dummy-virt (DT) [ 32.326112] Call trace: [ 32.326186] show_stack+0x20/0x38 (C) [ 32.326265] dump_stack_lvl+0x8c/0xd0 [ 32.326312] print_report+0x118/0x5d0 [ 32.326364] kasan_report+0xdc/0x128 [ 32.326545] __asan_report_load8_noabort+0x20/0x30 [ 32.326595] kasan_atomics_helper+0x3f04/0x4858 [ 32.327068] kasan_atomics+0x198/0x2e0 [ 32.327433] kunit_try_run_case+0x170/0x3f0 [ 32.327565] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.327761] kthread+0x328/0x630 [ 32.327809] ret_from_fork+0x10/0x20 [ 32.327910] [ 32.327934] Allocated by task 296: [ 32.328088] kasan_save_stack+0x3c/0x68 [ 32.328211] kasan_save_track+0x20/0x40 [ 32.328259] kasan_save_alloc_info+0x40/0x58 [ 32.328396] __kasan_kmalloc+0xd4/0xd8 [ 32.328826] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.328912] kasan_atomics+0xb8/0x2e0 [ 32.328952] kunit_try_run_case+0x170/0x3f0 [ 32.328994] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.329043] kthread+0x328/0x630 [ 32.329156] ret_from_fork+0x10/0x20 [ 32.329197] [ 32.329218] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.329218] which belongs to the cache kmalloc-64 of size 64 [ 32.329283] The buggy address is located 0 bytes to the right of [ 32.329283] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.329356] [ 32.329378] The buggy address belongs to the physical page: [ 32.329412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.329468] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.329518] page_type: f5(slab) [ 32.329558] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.329610] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.329655] page dumped because: kasan: bad access detected [ 32.329690] [ 32.329711] Memory state around the buggy address: [ 32.329745] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.329791] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.329837] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.329877] ^ [ 32.329913] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.329959] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.330001] ================================================================== [ 32.096319] ================================================================== [ 32.096384] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 32.096667] Write of size 4 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.096747] [ 32.096898] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.097276] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.097337] Hardware name: linux,dummy-virt (DT) [ 32.097372] Call trace: [ 32.097398] show_stack+0x20/0x38 (C) [ 32.097648] dump_stack_lvl+0x8c/0xd0 [ 32.097714] print_report+0x118/0x5d0 [ 32.097760] kasan_report+0xdc/0x128 [ 32.097806] kasan_check_range+0x100/0x1a8 [ 32.097993] __kasan_check_write+0x20/0x30 [ 32.098073] kasan_atomics_helper+0x99c/0x4858 [ 32.098565] kasan_atomics+0x198/0x2e0 [ 32.098736] kunit_try_run_case+0x170/0x3f0 [ 32.098832] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.099021] kthread+0x328/0x630 [ 32.099069] ret_from_fork+0x10/0x20 [ 32.099118] [ 32.099149] Allocated by task 296: [ 32.099179] kasan_save_stack+0x3c/0x68 [ 32.099225] kasan_save_track+0x20/0x40 [ 32.099374] kasan_save_alloc_info+0x40/0x58 [ 32.099573] __kasan_kmalloc+0xd4/0xd8 [ 32.099644] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.099990] kasan_atomics+0xb8/0x2e0 [ 32.100205] kunit_try_run_case+0x170/0x3f0 [ 32.100260] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.100310] kthread+0x328/0x630 [ 32.100698] ret_from_fork+0x10/0x20 [ 32.101045] [ 32.101086] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.101086] which belongs to the cache kmalloc-64 of size 64 [ 32.101163] The buggy address is located 0 bytes to the right of [ 32.101163] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.101426] [ 32.101559] The buggy address belongs to the physical page: [ 32.101923] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.101987] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.102038] page_type: f5(slab) [ 32.102078] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.102220] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.102280] page dumped because: kasan: bad access detected [ 32.102317] [ 32.102348] Memory state around the buggy address: [ 32.102393] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.102450] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.102497] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.102539] ^ [ 32.102575] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.102622] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.102664] ================================================================== [ 32.183657] ================================================================== [ 32.183850] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 32.183904] Read of size 4 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.183958] [ 32.184419] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.184576] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.184606] Hardware name: linux,dummy-virt (DT) [ 32.184902] Call trace: [ 32.184931] show_stack+0x20/0x38 (C) [ 32.184985] dump_stack_lvl+0x8c/0xd0 [ 32.185032] print_report+0x118/0x5d0 [ 32.185429] kasan_report+0xdc/0x128 [ 32.185493] __asan_report_load4_noabort+0x20/0x30 [ 32.185548] kasan_atomics_helper+0x3dd8/0x4858 [ 32.185611] kasan_atomics+0x198/0x2e0 [ 32.186079] kunit_try_run_case+0x170/0x3f0 [ 32.186162] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.186377] kthread+0x328/0x630 [ 32.186435] ret_from_fork+0x10/0x20 [ 32.186487] [ 32.186518] Allocated by task 296: [ 32.186748] kasan_save_stack+0x3c/0x68 [ 32.186822] kasan_save_track+0x20/0x40 [ 32.186960] kasan_save_alloc_info+0x40/0x58 [ 32.187000] __kasan_kmalloc+0xd4/0xd8 [ 32.187038] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.187234] kasan_atomics+0xb8/0x2e0 [ 32.187286] kunit_try_run_case+0x170/0x3f0 [ 32.187328] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.187415] kthread+0x328/0x630 [ 32.187592] ret_from_fork+0x10/0x20 [ 32.187890] [ 32.187915] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.187915] which belongs to the cache kmalloc-64 of size 64 [ 32.187980] The buggy address is located 0 bytes to the right of [ 32.187980] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.188629] [ 32.188780] The buggy address belongs to the physical page: [ 32.188816] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.189173] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.189244] page_type: f5(slab) [ 32.189290] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.189344] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.189391] page dumped because: kasan: bad access detected [ 32.189423] [ 32.189445] Memory state around the buggy address: [ 32.189985] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.190537] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.190620] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.190763] ^ [ 32.190958] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.191147] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.191192] ================================================================== [ 32.374313] ================================================================== [ 32.374365] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 32.374417] Read of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.374469] [ 32.374499] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.374587] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.374616] Hardware name: linux,dummy-virt (DT) [ 32.374649] Call trace: [ 32.374671] show_stack+0x20/0x38 (C) [ 32.374790] dump_stack_lvl+0x8c/0xd0 [ 32.374840] print_report+0x118/0x5d0 [ 32.375248] kasan_report+0xdc/0x128 [ 32.375844] __asan_report_load8_noabort+0x20/0x30 [ 32.375911] kasan_atomics_helper+0x3df4/0x4858 [ 32.376216] kasan_atomics+0x198/0x2e0 [ 32.376311] kunit_try_run_case+0x170/0x3f0 [ 32.376363] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.376421] kthread+0x328/0x630 [ 32.376499] ret_from_fork+0x10/0x20 [ 32.376549] [ 32.376579] Allocated by task 296: [ 32.376634] kasan_save_stack+0x3c/0x68 [ 32.376678] kasan_save_track+0x20/0x40 [ 32.376718] kasan_save_alloc_info+0x40/0x58 [ 32.376759] __kasan_kmalloc+0xd4/0xd8 [ 32.376819] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.377011] kasan_atomics+0xb8/0x2e0 [ 32.377057] kunit_try_run_case+0x170/0x3f0 [ 32.377517] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.377936] kthread+0x328/0x630 [ 32.377973] ret_from_fork+0x10/0x20 [ 32.378162] [ 32.378191] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.378191] which belongs to the cache kmalloc-64 of size 64 [ 32.378256] The buggy address is located 0 bytes to the right of [ 32.378256] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.378326] [ 32.378348] The buggy address belongs to the physical page: [ 32.378638] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.378809] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.379243] page_type: f5(slab) [ 32.379288] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.379614] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.379663] page dumped because: kasan: bad access detected [ 32.379697] [ 32.379717] Memory state around the buggy address: [ 32.379750] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.379796] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.379890] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.379933] ^ [ 32.380203] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.380314] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.380391] ================================================================== [ 32.408050] ================================================================== [ 32.408274] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 32.408325] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.408377] [ 32.408407] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.408568] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.408603] Hardware name: linux,dummy-virt (DT) [ 32.408755] Call trace: [ 32.408788] show_stack+0x20/0x38 (C) [ 32.408902] dump_stack_lvl+0x8c/0xd0 [ 32.408949] print_report+0x118/0x5d0 [ 32.408992] kasan_report+0xdc/0x128 [ 32.409037] kasan_check_range+0x100/0x1a8 [ 32.411145] __kasan_check_write+0x20/0x30 [ 32.411498] kasan_atomics_helper+0x17ec/0x4858 [ 32.411557] kasan_atomics+0x198/0x2e0 [ 32.411613] kunit_try_run_case+0x170/0x3f0 [ 32.411664] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.411722] kthread+0x328/0x630 [ 32.411766] ret_from_fork+0x10/0x20 [ 32.411815] [ 32.411837] Allocated by task 296: [ 32.411868] kasan_save_stack+0x3c/0x68 [ 32.411913] kasan_save_track+0x20/0x40 [ 32.411954] kasan_save_alloc_info+0x40/0x58 [ 32.411994] __kasan_kmalloc+0xd4/0xd8 [ 32.412033] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.412075] kasan_atomics+0xb8/0x2e0 [ 32.412114] kunit_try_run_case+0x170/0x3f0 [ 32.412170] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.412218] kthread+0x328/0x630 [ 32.412254] ret_from_fork+0x10/0x20 [ 32.412292] [ 32.412315] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.412315] which belongs to the cache kmalloc-64 of size 64 [ 32.412377] The buggy address is located 0 bytes to the right of [ 32.412377] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.412445] [ 32.412468] The buggy address belongs to the physical page: [ 32.412501] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.412555] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.412606] page_type: f5(slab) [ 32.412645] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.412696] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.412741] page dumped because: kasan: bad access detected [ 32.412775] [ 32.412796] Memory state around the buggy address: [ 32.412830] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.412874] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.412921] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.412962] ^ [ 32.412997] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.413042] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.413084] ================================================================== [ 32.217501] ================================================================== [ 32.217555] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 32.217607] Read of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.217661] [ 32.217695] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.217785] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.217816] Hardware name: linux,dummy-virt (DT) [ 32.217850] Call trace: [ 32.217873] show_stack+0x20/0x38 (C) [ 32.217923] dump_stack_lvl+0x8c/0xd0 [ 32.217971] print_report+0x118/0x5d0 [ 32.218016] kasan_report+0xdc/0x128 [ 32.218060] __asan_report_load8_noabort+0x20/0x30 [ 32.218111] kasan_atomics_helper+0x3f58/0x4858 [ 32.218178] kasan_atomics+0x198/0x2e0 [ 32.218227] kunit_try_run_case+0x170/0x3f0 [ 32.218278] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.218334] kthread+0x328/0x630 [ 32.218750] ret_from_fork+0x10/0x20 [ 32.218818] [ 32.218841] Allocated by task 296: [ 32.218872] kasan_save_stack+0x3c/0x68 [ 32.219542] kasan_save_track+0x20/0x40 [ 32.219591] kasan_save_alloc_info+0x40/0x58 [ 32.219633] __kasan_kmalloc+0xd4/0xd8 [ 32.219681] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.219724] kasan_atomics+0xb8/0x2e0 [ 32.219914] kunit_try_run_case+0x170/0x3f0 [ 32.219967] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.220014] kthread+0x328/0x630 [ 32.220047] ret_from_fork+0x10/0x20 [ 32.220095] [ 32.220117] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.220117] which belongs to the cache kmalloc-64 of size 64 [ 32.220191] The buggy address is located 0 bytes to the right of [ 32.220191] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.220931] [ 32.220972] The buggy address belongs to the physical page: [ 32.221139] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.221269] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.221494] page_type: f5(slab) [ 32.221643] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.221699] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.222003] page dumped because: kasan: bad access detected [ 32.222273] [ 32.222343] Memory state around the buggy address: [ 32.222489] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.222537] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.222583] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.222625] ^ [ 32.223458] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.223769] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.224057] ================================================================== [ 32.224488] ================================================================== [ 32.224592] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 32.224666] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.224719] [ 32.224753] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.224844] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.224874] Hardware name: linux,dummy-virt (DT) [ 32.225354] Call trace: [ 32.225392] show_stack+0x20/0x38 (C) [ 32.225445] dump_stack_lvl+0x8c/0xd0 [ 32.225491] print_report+0x118/0x5d0 [ 32.225751] kasan_report+0xdc/0x128 [ 32.225807] kasan_check_range+0x100/0x1a8 [ 32.225855] __kasan_check_write+0x20/0x30 [ 32.225903] kasan_atomics_helper+0xe44/0x4858 [ 32.225952] kasan_atomics+0x198/0x2e0 [ 32.226416] kunit_try_run_case+0x170/0x3f0 [ 32.226488] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.226546] kthread+0x328/0x630 [ 32.226662] ret_from_fork+0x10/0x20 [ 32.226807] [ 32.227196] Allocated by task 296: [ 32.227426] kasan_save_stack+0x3c/0x68 [ 32.227482] kasan_save_track+0x20/0x40 [ 32.227528] kasan_save_alloc_info+0x40/0x58 [ 32.227578] __kasan_kmalloc+0xd4/0xd8 [ 32.227641] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.227684] kasan_atomics+0xb8/0x2e0 [ 32.228103] kunit_try_run_case+0x170/0x3f0 [ 32.228260] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.228725] kthread+0x328/0x630 [ 32.228985] ret_from_fork+0x10/0x20 [ 32.229200] [ 32.229227] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.229227] which belongs to the cache kmalloc-64 of size 64 [ 32.229291] The buggy address is located 0 bytes to the right of [ 32.229291] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.229359] [ 32.229380] The buggy address belongs to the physical page: [ 32.229414] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.229890] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.229947] page_type: f5(slab) [ 32.229987] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.230198] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.230245] page dumped because: kasan: bad access detected [ 32.230732] [ 32.231061] Memory state around the buggy address: [ 32.231108] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.231169] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.231238] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.231285] ^ [ 32.231321] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.231367] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.231409] ================================================================== [ 32.303267] ================================================================== [ 32.303322] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 32.303642] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.303989] [ 32.304026] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.304234] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.304270] Hardware name: linux,dummy-virt (DT) [ 32.304333] Call trace: [ 32.304356] show_stack+0x20/0x38 (C) [ 32.304463] dump_stack_lvl+0x8c/0xd0 [ 32.304803] print_report+0x118/0x5d0 [ 32.304851] kasan_report+0xdc/0x128 [ 32.305111] kasan_check_range+0x100/0x1a8 [ 32.305255] __kasan_check_write+0x20/0x30 [ 32.305306] kasan_atomics_helper+0x126c/0x4858 [ 32.305661] kasan_atomics+0x198/0x2e0 [ 32.305808] kunit_try_run_case+0x170/0x3f0 [ 32.305859] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.305915] kthread+0x328/0x630 [ 32.305958] ret_from_fork+0x10/0x20 [ 32.306457] [ 32.306573] Allocated by task 296: [ 32.306604] kasan_save_stack+0x3c/0x68 [ 32.307030] kasan_save_track+0x20/0x40 [ 32.307078] kasan_save_alloc_info+0x40/0x58 [ 32.307143] __kasan_kmalloc+0xd4/0xd8 [ 32.307185] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.307227] kasan_atomics+0xb8/0x2e0 [ 32.307307] kunit_try_run_case+0x170/0x3f0 [ 32.307433] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.307507] kthread+0x328/0x630 [ 32.307683] ret_from_fork+0x10/0x20 [ 32.307742] [ 32.307832] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.307832] which belongs to the cache kmalloc-64 of size 64 [ 32.307895] The buggy address is located 0 bytes to the right of [ 32.307895] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.308012] [ 32.308059] The buggy address belongs to the physical page: [ 32.308117] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.308499] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.308564] page_type: f5(slab) [ 32.308821] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.309007] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.309319] page dumped because: kasan: bad access detected [ 32.309361] [ 32.309381] Memory state around the buggy address: [ 32.309464] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.309996] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.310143] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.310187] ^ [ 32.310224] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.310418] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.310521] ================================================================== [ 32.387752] ================================================================== [ 32.387858] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 32.388008] Read of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.388067] [ 32.388098] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.388212] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.388307] Hardware name: linux,dummy-virt (DT) [ 32.388580] Call trace: [ 32.388722] show_stack+0x20/0x38 (C) [ 32.388775] dump_stack_lvl+0x8c/0xd0 [ 32.388823] print_report+0x118/0x5d0 [ 32.389066] kasan_report+0xdc/0x128 [ 32.389189] __asan_report_load8_noabort+0x20/0x30 [ 32.389243] kasan_atomics_helper+0x3e10/0x4858 [ 32.389300] kasan_atomics+0x198/0x2e0 [ 32.389458] kunit_try_run_case+0x170/0x3f0 [ 32.389572] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.389706] kthread+0x328/0x630 [ 32.389851] ret_from_fork+0x10/0x20 [ 32.389900] [ 32.389928] Allocated by task 296: [ 32.390053] kasan_save_stack+0x3c/0x68 [ 32.390097] kasan_save_track+0x20/0x40 [ 32.390157] kasan_save_alloc_info+0x40/0x58 [ 32.390197] __kasan_kmalloc+0xd4/0xd8 [ 32.390236] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.390278] kasan_atomics+0xb8/0x2e0 [ 32.390601] kunit_try_run_case+0x170/0x3f0 [ 32.390645] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.390692] kthread+0x328/0x630 [ 32.391985] ret_from_fork+0x10/0x20 [ 32.392043] [ 32.392100] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.392100] which belongs to the cache kmalloc-64 of size 64 [ 32.392307] The buggy address is located 0 bytes to the right of [ 32.392307] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.392391] [ 32.392416] The buggy address belongs to the physical page: [ 32.392450] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.392512] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.392945] page_type: f5(slab) [ 32.393333] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.393543] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.393589] page dumped because: kasan: bad access detected [ 32.393626] [ 32.393646] Memory state around the buggy address: [ 32.393680] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.393771] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.393985] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.394172] ^ [ 32.394270] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.394365] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.394408] ================================================================== [ 32.311520] ================================================================== [ 32.311687] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 32.311739] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.311791] [ 32.311821] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.311911] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.311939] Hardware name: linux,dummy-virt (DT) [ 32.311971] Call trace: [ 32.312005] show_stack+0x20/0x38 (C) [ 32.312054] dump_stack_lvl+0x8c/0xd0 [ 32.312313] print_report+0x118/0x5d0 [ 32.312715] kasan_report+0xdc/0x128 [ 32.312978] kasan_check_range+0x100/0x1a8 [ 32.313065] __kasan_check_write+0x20/0x30 [ 32.313112] kasan_atomics_helper+0x12d8/0x4858 [ 32.313173] kasan_atomics+0x198/0x2e0 [ 32.313222] kunit_try_run_case+0x170/0x3f0 [ 32.313273] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.313329] kthread+0x328/0x630 [ 32.313373] ret_from_fork+0x10/0x20 [ 32.313421] [ 32.313451] Allocated by task 296: [ 32.313588] kasan_save_stack+0x3c/0x68 [ 32.313646] kasan_save_track+0x20/0x40 [ 32.313752] kasan_save_alloc_info+0x40/0x58 [ 32.313935] __kasan_kmalloc+0xd4/0xd8 [ 32.314120] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.314171] kasan_atomics+0xb8/0x2e0 [ 32.314210] kunit_try_run_case+0x170/0x3f0 [ 32.314276] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.314325] kthread+0x328/0x630 [ 32.314360] ret_from_fork+0x10/0x20 [ 32.314739] [ 32.314761] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.314761] which belongs to the cache kmalloc-64 of size 64 [ 32.315140] The buggy address is located 0 bytes to the right of [ 32.315140] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.315217] [ 32.315542] The buggy address belongs to the physical page: [ 32.315582] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.315639] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.315741] page_type: f5(slab) [ 32.315885] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.315993] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.316052] page dumped because: kasan: bad access detected [ 32.316095] [ 32.316115] Memory state around the buggy address: [ 32.316222] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.316276] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.316321] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.316434] ^ [ 32.316752] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.316927] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.317022] ================================================================== [ 32.361928] ================================================================== [ 32.362011] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 32.362062] Read of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.362114] [ 32.362156] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.362254] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.362285] Hardware name: linux,dummy-virt (DT) [ 32.362316] Call trace: [ 32.362527] show_stack+0x20/0x38 (C) [ 32.362581] dump_stack_lvl+0x8c/0xd0 [ 32.362973] print_report+0x118/0x5d0 [ 32.363029] kasan_report+0xdc/0x128 [ 32.363073] __asan_report_load8_noabort+0x20/0x30 [ 32.363123] kasan_atomics_helper+0x3db0/0x4858 [ 32.363185] kasan_atomics+0x198/0x2e0 [ 32.363240] kunit_try_run_case+0x170/0x3f0 [ 32.363480] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.363744] kthread+0x328/0x630 [ 32.363866] ret_from_fork+0x10/0x20 [ 32.363938] [ 32.363959] Allocated by task 296: [ 32.363988] kasan_save_stack+0x3c/0x68 [ 32.364031] kasan_save_track+0x20/0x40 [ 32.364078] kasan_save_alloc_info+0x40/0x58 [ 32.364165] __kasan_kmalloc+0xd4/0xd8 [ 32.364205] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.364246] kasan_atomics+0xb8/0x2e0 [ 32.364335] kunit_try_run_case+0x170/0x3f0 [ 32.364811] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.364872] kthread+0x328/0x630 [ 32.364908] ret_from_fork+0x10/0x20 [ 32.364946] [ 32.365162] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.365162] which belongs to the cache kmalloc-64 of size 64 [ 32.365429] The buggy address is located 0 bytes to the right of [ 32.365429] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.365567] [ 32.365634] The buggy address belongs to the physical page: [ 32.365669] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.365725] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.365773] page_type: f5(slab) [ 32.366038] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.366170] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.366216] page dumped because: kasan: bad access detected [ 32.366251] [ 32.366270] Memory state around the buggy address: [ 32.366304] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.366725] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.366779] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.366820] ^ [ 32.367103] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.367166] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.367208] ================================================================== [ 32.367458] ================================================================== [ 32.367515] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 32.367566] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.367618] [ 32.367649] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.367737] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.367765] Hardware name: linux,dummy-virt (DT) [ 32.367798] Call trace: [ 32.367821] show_stack+0x20/0x38 (C) [ 32.368275] dump_stack_lvl+0x8c/0xd0 [ 32.368767] print_report+0x118/0x5d0 [ 32.368818] kasan_report+0xdc/0x128 [ 32.369426] kasan_check_range+0x100/0x1a8 [ 32.369654] __kasan_check_write+0x20/0x30 [ 32.369803] kasan_atomics_helper+0x1644/0x4858 [ 32.369909] kasan_atomics+0x198/0x2e0 [ 32.369957] kunit_try_run_case+0x170/0x3f0 [ 32.370008] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.370064] kthread+0x328/0x630 [ 32.370118] ret_from_fork+0x10/0x20 [ 32.370369] [ 32.370392] Allocated by task 296: [ 32.370421] kasan_save_stack+0x3c/0x68 [ 32.370465] kasan_save_track+0x20/0x40 [ 32.370506] kasan_save_alloc_info+0x40/0x58 [ 32.370546] __kasan_kmalloc+0xd4/0xd8 [ 32.370586] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.370630] kasan_atomics+0xb8/0x2e0 [ 32.370672] kunit_try_run_case+0x170/0x3f0 [ 32.370727] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.370777] kthread+0x328/0x630 [ 32.371259] ret_from_fork+0x10/0x20 [ 32.371309] [ 32.371528] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.371528] which belongs to the cache kmalloc-64 of size 64 [ 32.371619] The buggy address is located 0 bytes to the right of [ 32.371619] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.371713] [ 32.371735] The buggy address belongs to the physical page: [ 32.371770] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.371824] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.371873] page_type: f5(slab) [ 32.371913] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.371966] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.372365] page dumped because: kasan: bad access detected [ 32.372406] [ 32.372447] Memory state around the buggy address: [ 32.372718] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.372877] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.372924] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.373045] ^ [ 32.373083] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.373142] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.373730] ================================================================== [ 32.201815] ================================================================== [ 32.201931] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 32.201983] Read of size 4 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.202037] [ 32.202069] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.202487] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.202537] Hardware name: linux,dummy-virt (DT) [ 32.202585] Call trace: [ 32.202617] show_stack+0x20/0x38 (C) [ 32.203194] dump_stack_lvl+0x8c/0xd0 [ 32.203265] print_report+0x118/0x5d0 [ 32.203674] kasan_report+0xdc/0x128 [ 32.203742] __asan_report_load4_noabort+0x20/0x30 [ 32.203840] kasan_atomics_helper+0x3e04/0x4858 [ 32.203894] kasan_atomics+0x198/0x2e0 [ 32.203943] kunit_try_run_case+0x170/0x3f0 [ 32.203994] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.204146] kthread+0x328/0x630 [ 32.204192] ret_from_fork+0x10/0x20 [ 32.204556] [ 32.204579] Allocated by task 296: [ 32.204609] kasan_save_stack+0x3c/0x68 [ 32.205000] kasan_save_track+0x20/0x40 [ 32.205052] kasan_save_alloc_info+0x40/0x58 [ 32.205092] __kasan_kmalloc+0xd4/0xd8 [ 32.205277] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.205320] kasan_atomics+0xb8/0x2e0 [ 32.205358] kunit_try_run_case+0x170/0x3f0 [ 32.205513] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.205563] kthread+0x328/0x630 [ 32.205850] ret_from_fork+0x10/0x20 [ 32.205897] [ 32.205919] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.205919] which belongs to the cache kmalloc-64 of size 64 [ 32.205989] The buggy address is located 0 bytes to the right of [ 32.205989] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.206117] [ 32.206320] The buggy address belongs to the physical page: [ 32.206355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.206411] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.206828] page_type: f5(slab) [ 32.206874] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.206928] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.206980] page dumped because: kasan: bad access detected [ 32.207084] [ 32.207105] Memory state around the buggy address: [ 32.207148] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.207310] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.207373] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.207414] ^ [ 32.207451] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.207605] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.207648] ================================================================== [ 32.394661] ================================================================== [ 32.394904] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 32.394967] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.395021] [ 32.395053] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.395153] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.395181] Hardware name: linux,dummy-virt (DT) [ 32.395214] Call trace: [ 32.395237] show_stack+0x20/0x38 (C) [ 32.395287] dump_stack_lvl+0x8c/0xd0 [ 32.395784] print_report+0x118/0x5d0 [ 32.395841] kasan_report+0xdc/0x128 [ 32.395886] kasan_check_range+0x100/0x1a8 [ 32.396145] __kasan_check_write+0x20/0x30 [ 32.396250] kasan_atomics_helper+0x175c/0x4858 [ 32.396379] kasan_atomics+0x198/0x2e0 [ 32.396427] kunit_try_run_case+0x170/0x3f0 [ 32.396477] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.396532] kthread+0x328/0x630 [ 32.396576] ret_from_fork+0x10/0x20 [ 32.396631] [ 32.396743] Allocated by task 296: [ 32.396817] kasan_save_stack+0x3c/0x68 [ 32.396936] kasan_save_track+0x20/0x40 [ 32.397027] kasan_save_alloc_info+0x40/0x58 [ 32.397101] __kasan_kmalloc+0xd4/0xd8 [ 32.397151] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.397193] kasan_atomics+0xb8/0x2e0 [ 32.397233] kunit_try_run_case+0x170/0x3f0 [ 32.397274] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.397699] kthread+0x328/0x630 [ 32.397752] ret_from_fork+0x10/0x20 [ 32.398276] [ 32.398335] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.398335] which belongs to the cache kmalloc-64 of size 64 [ 32.398402] The buggy address is located 0 bytes to the right of [ 32.398402] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.398474] [ 32.398497] The buggy address belongs to the physical page: [ 32.398735] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.398822] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.399370] page_type: f5(slab) [ 32.399410] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.399702] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.399883] page dumped because: kasan: bad access detected [ 32.399921] [ 32.400003] Memory state around the buggy address: [ 32.400222] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.400269] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.400316] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.400358] ^ [ 32.400393] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.400438] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.400480] ================================================================== [ 32.240677] ================================================================== [ 32.240763] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 32.240814] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.240869] [ 32.240902] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.240993] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.241022] Hardware name: linux,dummy-virt (DT) [ 32.241055] Call trace: [ 32.241078] show_stack+0x20/0x38 (C) [ 32.241138] dump_stack_lvl+0x8c/0xd0 [ 32.241556] print_report+0x118/0x5d0 [ 32.241620] kasan_report+0xdc/0x128 [ 32.241751] kasan_check_range+0x100/0x1a8 [ 32.242085] __kasan_check_write+0x20/0x30 [ 32.242281] kasan_atomics_helper+0xeb8/0x4858 [ 32.242501] kasan_atomics+0x198/0x2e0 [ 32.242551] kunit_try_run_case+0x170/0x3f0 [ 32.242601] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.242657] kthread+0x328/0x630 [ 32.242701] ret_from_fork+0x10/0x20 [ 32.243170] [ 32.243197] Allocated by task 296: [ 32.243230] kasan_save_stack+0x3c/0x68 [ 32.243277] kasan_save_track+0x20/0x40 [ 32.243325] kasan_save_alloc_info+0x40/0x58 [ 32.243427] __kasan_kmalloc+0xd4/0xd8 [ 32.243527] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.243634] kasan_atomics+0xb8/0x2e0 [ 32.243696] kunit_try_run_case+0x170/0x3f0 [ 32.243860] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.244153] kthread+0x328/0x630 [ 32.244384] ret_from_fork+0x10/0x20 [ 32.244458] [ 32.244587] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.244587] which belongs to the cache kmalloc-64 of size 64 [ 32.244668] The buggy address is located 0 bytes to the right of [ 32.244668] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.244735] [ 32.245255] The buggy address belongs to the physical page: [ 32.245304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.245360] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.245422] page_type: f5(slab) [ 32.245464] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.245552] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.245620] page dumped because: kasan: bad access detected [ 32.245957] [ 32.246066] Memory state around the buggy address: [ 32.246105] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.246162] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.246305] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.246589] ^ [ 32.246638] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.246684] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.246726] ================================================================== [ 32.279284] ================================================================== [ 32.279334] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 32.279481] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.279556] [ 32.279592] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.279841] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.279869] Hardware name: linux,dummy-virt (DT) [ 32.279902] Call trace: [ 32.279925] show_stack+0x20/0x38 (C) [ 32.279973] dump_stack_lvl+0x8c/0xd0 [ 32.280119] print_report+0x118/0x5d0 [ 32.280173] kasan_report+0xdc/0x128 [ 32.280223] kasan_check_range+0x100/0x1a8 [ 32.280355] __kasan_check_write+0x20/0x30 [ 32.280449] kasan_atomics_helper+0x10c0/0x4858 [ 32.280643] kasan_atomics+0x198/0x2e0 [ 32.280691] kunit_try_run_case+0x170/0x3f0 [ 32.280742] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.280798] kthread+0x328/0x630 [ 32.280840] ret_from_fork+0x10/0x20 [ 32.280889] [ 32.280909] Allocated by task 296: [ 32.280937] kasan_save_stack+0x3c/0x68 [ 32.280980] kasan_save_track+0x20/0x40 [ 32.281021] kasan_save_alloc_info+0x40/0x58 [ 32.281060] __kasan_kmalloc+0xd4/0xd8 [ 32.281099] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.281150] kasan_atomics+0xb8/0x2e0 [ 32.281189] kunit_try_run_case+0x170/0x3f0 [ 32.281232] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.281279] kthread+0x328/0x630 [ 32.281339] ret_from_fork+0x10/0x20 [ 32.281378] [ 32.281398] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.281398] which belongs to the cache kmalloc-64 of size 64 [ 32.281460] The buggy address is located 0 bytes to the right of [ 32.281460] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.281530] [ 32.281550] The buggy address belongs to the physical page: [ 32.281584] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.281635] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.281979] page_type: f5(slab) [ 32.282124] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.282188] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.282337] page dumped because: kasan: bad access detected [ 32.282422] [ 32.282442] Memory state around the buggy address: [ 32.282476] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.282521] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.282567] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.282608] ^ [ 32.282643] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.282688] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.282739] ================================================================== [ 32.121027] ================================================================== [ 32.121081] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 32.121351] Write of size 4 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.121722] [ 32.121900] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.122209] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.122254] Hardware name: linux,dummy-virt (DT) [ 32.122421] Call trace: [ 32.122457] show_stack+0x20/0x38 (C) [ 32.122692] dump_stack_lvl+0x8c/0xd0 [ 32.122760] print_report+0x118/0x5d0 [ 32.123161] kasan_report+0xdc/0x128 [ 32.123266] kasan_check_range+0x100/0x1a8 [ 32.123323] __kasan_check_write+0x20/0x30 [ 32.123655] kasan_atomics_helper+0xad4/0x4858 [ 32.123752] kasan_atomics+0x198/0x2e0 [ 32.124106] kunit_try_run_case+0x170/0x3f0 [ 32.124221] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.124383] kthread+0x328/0x630 [ 32.124470] ret_from_fork+0x10/0x20 [ 32.124782] [ 32.124931] Allocated by task 296: [ 32.125021] kasan_save_stack+0x3c/0x68 [ 32.125148] kasan_save_track+0x20/0x40 [ 32.125207] kasan_save_alloc_info+0x40/0x58 [ 32.125320] __kasan_kmalloc+0xd4/0xd8 [ 32.125362] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.125435] kasan_atomics+0xb8/0x2e0 [ 32.125627] kunit_try_run_case+0x170/0x3f0 [ 32.125994] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.126210] kthread+0x328/0x630 [ 32.126280] ret_from_fork+0x10/0x20 [ 32.126380] [ 32.126460] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.126460] which belongs to the cache kmalloc-64 of size 64 [ 32.126537] The buggy address is located 0 bytes to the right of [ 32.126537] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.126901] [ 32.126954] The buggy address belongs to the physical page: [ 32.127284] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.127380] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.127484] page_type: f5(slab) [ 32.127580] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.127695] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.127744] page dumped because: kasan: bad access detected [ 32.127778] [ 32.127800] Memory state around the buggy address: [ 32.127835] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.127880] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.128187] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.128519] ^ [ 32.128706] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.128821] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.128865] ================================================================== [ 32.077640] ================================================================== [ 32.077863] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 32.077958] Read of size 4 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.078110] [ 32.078157] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.078246] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.078277] Hardware name: linux,dummy-virt (DT) [ 32.078311] Call trace: [ 32.078563] show_stack+0x20/0x38 (C) [ 32.079178] dump_stack_lvl+0x8c/0xd0 [ 32.079343] print_report+0x118/0x5d0 [ 32.079430] kasan_report+0xdc/0x128 [ 32.079675] __asan_report_load4_noabort+0x20/0x30 [ 32.079892] kasan_atomics_helper+0x42d8/0x4858 [ 32.079980] kasan_atomics+0x198/0x2e0 [ 32.080104] kunit_try_run_case+0x170/0x3f0 [ 32.080170] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.080379] kthread+0x328/0x630 [ 32.081213] kasan_save_stack+0x3c/0x68 [ 32.082418] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.083591] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.083691] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.084426] page dumped because: kasan: bad access detected [ 32.084628] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.087208] [ 32.088013] __kasan_check_write+0x20/0x30 [ 32.089593] [ 32.089688] kasan_save_stack+0x3c/0x68 [ 32.090022] kasan_save_track+0x20/0x40 [ 32.090078] kasan_save_alloc_info+0x40/0x58 [ 32.090245] __kasan_kmalloc+0xd4/0xd8 [ 32.090460] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.090725] kasan_atomics+0xb8/0x2e0 [ 32.090870] kunit_try_run_case+0x170/0x3f0 [ 32.090918] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.091068] kthread+0x328/0x630 [ 32.091110] ret_from_fork+0x10/0x20 [ 32.091162] [ 32.091404] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.091404] which belongs to the cache kmalloc-64 of size 64 [ 32.091779] The buggy address is located 0 bytes to the right of [ 32.091779] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.091960] [ 32.092009] The buggy address belongs to the physical page: [ 32.092044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.092419] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.092507] page_type: f5(slab) [ 32.092969] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.093186] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.093461] page dumped because: kasan: bad access detected [ 32.093559] [ 32.093629] Memory state around the buggy address: [ 32.093875] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.094076] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.094140] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.094182] ^ [ 32.094220] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.094516] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.094804] ================================================================== [ 32.282933] ================================================================== [ 32.283006] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 32.283172] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.283242] [ 32.283293] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.283567] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.283608] Hardware name: linux,dummy-virt (DT) [ 32.283641] Call trace: [ 32.283698] show_stack+0x20/0x38 (C) [ 32.283791] dump_stack_lvl+0x8c/0xd0 [ 32.283995] print_report+0x118/0x5d0 [ 32.284145] kasan_report+0xdc/0x128 [ 32.284189] kasan_check_range+0x100/0x1a8 [ 32.284500] __kasan_check_write+0x20/0x30 [ 32.284705] kasan_atomics_helper+0x1128/0x4858 [ 32.284883] kasan_atomics+0x198/0x2e0 [ 32.284931] kunit_try_run_case+0x170/0x3f0 [ 32.284982] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.285045] kthread+0x328/0x630 [ 32.285295] ret_from_fork+0x10/0x20 [ 32.285357] [ 32.285385] Allocated by task 296: [ 32.285521] kasan_save_stack+0x3c/0x68 [ 32.285573] kasan_save_track+0x20/0x40 [ 32.285742] kasan_save_alloc_info+0x40/0x58 [ 32.285844] __kasan_kmalloc+0xd4/0xd8 [ 32.285960] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.286110] kasan_atomics+0xb8/0x2e0 [ 32.286158] kunit_try_run_case+0x170/0x3f0 [ 32.286199] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.286246] kthread+0x328/0x630 [ 32.286282] ret_from_fork+0x10/0x20 [ 32.286320] [ 32.286341] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.286341] which belongs to the cache kmalloc-64 of size 64 [ 32.286599] The buggy address is located 0 bytes to the right of [ 32.286599] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.286676] [ 32.286720] The buggy address belongs to the physical page: [ 32.286756] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.286904] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.287095] page_type: f5(slab) [ 32.287144] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.287197] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.287254] page dumped because: kasan: bad access detected [ 32.287301] [ 32.287357] Memory state around the buggy address: [ 32.287390] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.287437] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.287591] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.287633] ^ [ 32.287668] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.287714] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.287755] ================================================================== [ 32.247560] ================================================================== [ 32.247615] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 32.247885] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.247959] [ 32.248351] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.248673] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.248704] Hardware name: linux,dummy-virt (DT) [ 32.248738] Call trace: [ 32.248764] show_stack+0x20/0x38 (C) [ 32.249102] dump_stack_lvl+0x8c/0xd0 [ 32.249390] print_report+0x118/0x5d0 [ 32.249452] kasan_report+0xdc/0x128 [ 32.249499] kasan_check_range+0x100/0x1a8 [ 32.249597] __kasan_check_write+0x20/0x30 [ 32.249696] kasan_atomics_helper+0xf20/0x4858 [ 32.250046] kasan_atomics+0x198/0x2e0 [ 32.250110] kunit_try_run_case+0x170/0x3f0 [ 32.250171] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.250487] kthread+0x328/0x630 [ 32.250788] ret_from_fork+0x10/0x20 [ 32.250839] [ 32.251043] Allocated by task 296: [ 32.251074] kasan_save_stack+0x3c/0x68 [ 32.251212] kasan_save_track+0x20/0x40 [ 32.251272] kasan_save_alloc_info+0x40/0x58 [ 32.251313] __kasan_kmalloc+0xd4/0xd8 [ 32.251353] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.251827] kasan_atomics+0xb8/0x2e0 [ 32.251898] kunit_try_run_case+0x170/0x3f0 [ 32.251943] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.252649] kthread+0x328/0x630 [ 32.252708] ret_from_fork+0x10/0x20 [ 32.252749] [ 32.252771] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.252771] which belongs to the cache kmalloc-64 of size 64 [ 32.252838] The buggy address is located 0 bytes to the right of [ 32.252838] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.253348] [ 32.253376] The buggy address belongs to the physical page: [ 32.253409] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.253467] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.253791] page_type: f5(slab) [ 32.253832] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.253888] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.253934] page dumped because: kasan: bad access detected [ 32.254511] [ 32.254536] Memory state around the buggy address: [ 32.254573] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.254621] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.254676] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.254794] ^ [ 32.255022] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.255069] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.255111] ================================================================== [ 32.400735] ================================================================== [ 32.400983] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 32.401644] Read of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.401704] [ 32.401906] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.402000] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.402035] Hardware name: linux,dummy-virt (DT) [ 32.402199] Call trace: [ 32.402223] show_stack+0x20/0x38 (C) [ 32.402274] dump_stack_lvl+0x8c/0xd0 [ 32.402320] print_report+0x118/0x5d0 [ 32.402366] kasan_report+0xdc/0x128 [ 32.402409] __asan_report_load8_noabort+0x20/0x30 [ 32.402461] kasan_atomics_helper+0x3e20/0x4858 [ 32.402511] kasan_atomics+0x198/0x2e0 [ 32.402558] kunit_try_run_case+0x170/0x3f0 [ 32.402615] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.403018] kthread+0x328/0x630 [ 32.403618] ret_from_fork+0x10/0x20 [ 32.403679] [ 32.403705] Allocated by task 296: [ 32.403736] kasan_save_stack+0x3c/0x68 [ 32.403780] kasan_save_track+0x20/0x40 [ 32.403821] kasan_save_alloc_info+0x40/0x58 [ 32.403862] __kasan_kmalloc+0xd4/0xd8 [ 32.403904] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.403947] kasan_atomics+0xb8/0x2e0 [ 32.404139] kunit_try_run_case+0x170/0x3f0 [ 32.404494] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.404582] kthread+0x328/0x630 [ 32.404618] ret_from_fork+0x10/0x20 [ 32.404656] [ 32.404678] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.404678] which belongs to the cache kmalloc-64 of size 64 [ 32.405057] The buggy address is located 0 bytes to the right of [ 32.405057] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.405145] [ 32.405168] The buggy address belongs to the physical page: [ 32.405208] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.405459] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.405833] page_type: f5(slab) [ 32.405873] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.405926] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.405997] page dumped because: kasan: bad access detected [ 32.406562] [ 32.406748] Memory state around the buggy address: [ 32.406786] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.406920] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.407077] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.407286] ^ [ 32.407341] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.407387] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.407430] ================================================================== [ 32.273664] ================================================================== [ 32.273715] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 32.273764] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.273816] [ 32.273848] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.274211] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.274350] Hardware name: linux,dummy-virt (DT) [ 32.274390] Call trace: [ 32.274624] show_stack+0x20/0x38 (C) [ 32.274863] dump_stack_lvl+0x8c/0xd0 [ 32.274922] print_report+0x118/0x5d0 [ 32.275101] kasan_report+0xdc/0x128 [ 32.275225] kasan_check_range+0x100/0x1a8 [ 32.275294] __kasan_check_write+0x20/0x30 [ 32.275433] kasan_atomics_helper+0x1058/0x4858 [ 32.275767] kasan_atomics+0x198/0x2e0 [ 32.275823] kunit_try_run_case+0x170/0x3f0 [ 32.275874] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.275933] kthread+0x328/0x630 [ 32.276016] ret_from_fork+0x10/0x20 [ 32.276065] [ 32.276088] Allocated by task 296: [ 32.276119] kasan_save_stack+0x3c/0x68 [ 32.276173] kasan_save_track+0x20/0x40 [ 32.276214] kasan_save_alloc_info+0x40/0x58 [ 32.276262] __kasan_kmalloc+0xd4/0xd8 [ 32.276304] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.276346] kasan_atomics+0xb8/0x2e0 [ 32.276438] kunit_try_run_case+0x170/0x3f0 [ 32.276488] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.276660] kthread+0x328/0x630 [ 32.276825] ret_from_fork+0x10/0x20 [ 32.276993] [ 32.277014] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.277014] which belongs to the cache kmalloc-64 of size 64 [ 32.277077] The buggy address is located 0 bytes to the right of [ 32.277077] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.277299] [ 32.277349] The buggy address belongs to the physical page: [ 32.277919] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.278047] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.278108] page_type: f5(slab) [ 32.278191] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.278273] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.278317] page dumped because: kasan: bad access detected [ 32.278350] [ 32.278371] Memory state around the buggy address: [ 32.278404] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.278450] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.278745] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.278790] ^ [ 32.278864] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.278909] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.279008] ================================================================== [ 32.232008] ================================================================== [ 32.232355] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 32.232408] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.232461] [ 32.232492] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.233254] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.233521] Hardware name: linux,dummy-virt (DT) [ 32.233633] Call trace: [ 32.233757] show_stack+0x20/0x38 (C) [ 32.233811] dump_stack_lvl+0x8c/0xd0 [ 32.234032] print_report+0x118/0x5d0 [ 32.234083] kasan_report+0xdc/0x128 [ 32.234141] __asan_report_store8_noabort+0x20/0x30 [ 32.234431] kasan_atomics_helper+0x3e5c/0x4858 [ 32.234646] kasan_atomics+0x198/0x2e0 [ 32.234696] kunit_try_run_case+0x170/0x3f0 [ 32.234782] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.235067] kthread+0x328/0x630 [ 32.235402] ret_from_fork+0x10/0x20 [ 32.235490] [ 32.235515] Allocated by task 296: [ 32.235834] kasan_save_stack+0x3c/0x68 [ 32.235929] kasan_save_track+0x20/0x40 [ 32.235979] kasan_save_alloc_info+0x40/0x58 [ 32.236019] __kasan_kmalloc+0xd4/0xd8 [ 32.236356] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.236774] kasan_atomics+0xb8/0x2e0 [ 32.236818] kunit_try_run_case+0x170/0x3f0 [ 32.236860] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.237057] kthread+0x328/0x630 [ 32.237101] ret_from_fork+0x10/0x20 [ 32.237410] [ 32.237436] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.237436] which belongs to the cache kmalloc-64 of size 64 [ 32.237654] The buggy address is located 0 bytes to the right of [ 32.237654] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.237730] [ 32.237832] The buggy address belongs to the physical page: [ 32.238089] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.238202] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.238363] page_type: f5(slab) [ 32.238470] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.238525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.238787] page dumped because: kasan: bad access detected [ 32.238826] [ 32.238847] Memory state around the buggy address: [ 32.238882] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.238994] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.239193] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.239335] ^ [ 32.239376] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.239422] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.239471] ================================================================== [ 32.334233] ================================================================== [ 32.334283] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 32.334330] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.334381] [ 32.334411] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.334499] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.334529] Hardware name: linux,dummy-virt (DT) [ 32.334560] Call trace: [ 32.334585] show_stack+0x20/0x38 (C) [ 32.334632] dump_stack_lvl+0x8c/0xd0 [ 32.334678] print_report+0x118/0x5d0 [ 32.334734] kasan_report+0xdc/0x128 [ 32.334777] kasan_check_range+0x100/0x1a8 [ 32.334823] __kasan_check_write+0x20/0x30 [ 32.334938] kasan_atomics_helper+0x147c/0x4858 [ 32.335707] kasan_atomics+0x198/0x2e0 [ 32.335976] kunit_try_run_case+0x170/0x3f0 [ 32.336274] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.336801] kthread+0x328/0x630 [ 32.336862] ret_from_fork+0x10/0x20 [ 32.336918] [ 32.337339] Allocated by task 296: [ 32.337560] kasan_save_stack+0x3c/0x68 [ 32.337680] kasan_save_track+0x20/0x40 [ 32.337760] kasan_save_alloc_info+0x40/0x58 [ 32.337806] __kasan_kmalloc+0xd4/0xd8 [ 32.337886] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.337980] kasan_atomics+0xb8/0x2e0 [ 32.338040] kunit_try_run_case+0x170/0x3f0 [ 32.338599] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.338737] kthread+0x328/0x630 [ 32.338918] ret_from_fork+0x10/0x20 [ 32.338962] [ 32.339110] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.339110] which belongs to the cache kmalloc-64 of size 64 [ 32.339195] The buggy address is located 0 bytes to the right of [ 32.339195] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.339433] [ 32.339562] The buggy address belongs to the physical page: [ 32.339603] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.339658] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.339709] page_type: f5(slab) [ 32.339798] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.340012] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.340082] page dumped because: kasan: bad access detected [ 32.340147] [ 32.340167] Memory state around the buggy address: [ 32.340210] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.340293] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.340372] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.340414] ^ [ 32.340566] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.340820] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.340865] ================================================================== [ 32.112536] ================================================================== [ 32.112590] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 32.112639] Write of size 4 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.112694] [ 32.112727] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.112828] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.112857] Hardware name: linux,dummy-virt (DT) [ 32.112888] Call trace: [ 32.112921] show_stack+0x20/0x38 (C) [ 32.112980] dump_stack_lvl+0x8c/0xd0 [ 32.113027] print_report+0x118/0x5d0 [ 32.113071] kasan_report+0xdc/0x128 [ 32.113114] kasan_check_range+0x100/0x1a8 [ 32.113582] __kasan_check_write+0x20/0x30 [ 32.114001] kasan_atomics_helper+0xa6c/0x4858 [ 32.114068] kasan_atomics+0x198/0x2e0 [ 32.114146] kunit_try_run_case+0x170/0x3f0 [ 32.114199] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.114256] kthread+0x328/0x630 [ 32.114306] ret_from_fork+0x10/0x20 [ 32.114781] [ 32.114843] Allocated by task 296: [ 32.114897] kasan_save_stack+0x3c/0x68 [ 32.115008] kasan_save_track+0x20/0x40 [ 32.115074] kasan_save_alloc_info+0x40/0x58 [ 32.115201] __kasan_kmalloc+0xd4/0xd8 [ 32.115290] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.115560] kasan_atomics+0xb8/0x2e0 [ 32.115720] kunit_try_run_case+0x170/0x3f0 [ 32.115826] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.115948] kthread+0x328/0x630 [ 32.116027] ret_from_fork+0x10/0x20 [ 32.116360] [ 32.116435] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.116435] which belongs to the cache kmalloc-64 of size 64 [ 32.116592] The buggy address is located 0 bytes to the right of [ 32.116592] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.116678] [ 32.116700] The buggy address belongs to the physical page: [ 32.116735] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.117323] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.117439] page_type: f5(slab) [ 32.117533] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.117716] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.117955] page dumped because: kasan: bad access detected [ 32.118019] [ 32.118385] Memory state around the buggy address: [ 32.118485] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.118553] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.118710] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.118926] ^ [ 32.119180] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.119349] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.119693] ================================================================== [ 32.380939] ================================================================== [ 32.380994] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 32.381045] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.381382] [ 32.381433] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.381609] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.381729] Hardware name: linux,dummy-virt (DT) [ 32.381762] Call trace: [ 32.381794] show_stack+0x20/0x38 (C) [ 32.381977] dump_stack_lvl+0x8c/0xd0 [ 32.382051] print_report+0x118/0x5d0 [ 32.382095] kasan_report+0xdc/0x128 [ 32.382151] kasan_check_range+0x100/0x1a8 [ 32.382198] __kasan_check_write+0x20/0x30 [ 32.382244] kasan_atomics_helper+0x16d0/0x4858 [ 32.382294] kasan_atomics+0x198/0x2e0 [ 32.382340] kunit_try_run_case+0x170/0x3f0 [ 32.382390] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.382446] kthread+0x328/0x630 [ 32.382489] ret_from_fork+0x10/0x20 [ 32.382537] [ 32.382559] Allocated by task 296: [ 32.382588] kasan_save_stack+0x3c/0x68 [ 32.382630] kasan_save_track+0x20/0x40 [ 32.382679] kasan_save_alloc_info+0x40/0x58 [ 32.384816] __kasan_kmalloc+0xd4/0xd8 [ 32.384956] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.384999] kasan_atomics+0xb8/0x2e0 [ 32.385039] kunit_try_run_case+0x170/0x3f0 [ 32.385081] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.385138] kthread+0x328/0x630 [ 32.385526] ret_from_fork+0x10/0x20 [ 32.385576] [ 32.385600] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.385600] which belongs to the cache kmalloc-64 of size 64 [ 32.385663] The buggy address is located 0 bytes to the right of [ 32.385663] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.385745] [ 32.385767] The buggy address belongs to the physical page: [ 32.385802] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.386157] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.386218] page_type: f5(slab) [ 32.386257] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.386310] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.386356] page dumped because: kasan: bad access detected [ 32.386629] [ 32.386663] Memory state around the buggy address: [ 32.386803] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.386963] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.387008] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.387050] ^ [ 32.387085] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.387470] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.387574] ================================================================== [ 32.354790] ================================================================== [ 32.354996] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 32.355047] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.355100] [ 32.355144] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.355233] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.355274] Hardware name: linux,dummy-virt (DT) [ 32.355306] Call trace: [ 32.355331] show_stack+0x20/0x38 (C) [ 32.356029] dump_stack_lvl+0x8c/0xd0 [ 32.356203] print_report+0x118/0x5d0 [ 32.356257] kasan_report+0xdc/0x128 [ 32.356312] kasan_check_range+0x100/0x1a8 [ 32.356545] __kasan_check_write+0x20/0x30 [ 32.356607] kasan_atomics_helper+0x15b4/0x4858 [ 32.356659] kasan_atomics+0x198/0x2e0 [ 32.356708] kunit_try_run_case+0x170/0x3f0 [ 32.356758] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.357040] kthread+0x328/0x630 [ 32.357289] ret_from_fork+0x10/0x20 [ 32.357339] [ 32.357571] Allocated by task 296: [ 32.357686] kasan_save_stack+0x3c/0x68 [ 32.357740] kasan_save_track+0x20/0x40 [ 32.357782] kasan_save_alloc_info+0x40/0x58 [ 32.357861] __kasan_kmalloc+0xd4/0xd8 [ 32.357921] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.358095] kasan_atomics+0xb8/0x2e0 [ 32.358783] kunit_try_run_case+0x170/0x3f0 [ 32.359041] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.359095] kthread+0x328/0x630 [ 32.359143] ret_from_fork+0x10/0x20 [ 32.359239] [ 32.359263] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.359263] which belongs to the cache kmalloc-64 of size 64 [ 32.359333] The buggy address is located 0 bytes to the right of [ 32.359333] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.359402] [ 32.359531] The buggy address belongs to the physical page: [ 32.359817] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.359876] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.359926] page_type: f5(slab) [ 32.359970] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.360486] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.360539] page dumped because: kasan: bad access detected [ 32.360803] [ 32.360850] Memory state around the buggy address: [ 32.360914] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.361027] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.361073] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.361114] ^ [ 32.361163] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.361208] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.361250] ================================================================== [ 32.130091] ================================================================== [ 32.130162] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 32.130234] Read of size 4 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.130291] [ 32.130323] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.130413] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.130442] Hardware name: linux,dummy-virt (DT) [ 32.130476] Call trace: [ 32.130510] show_stack+0x20/0x38 (C) [ 32.130570] dump_stack_lvl+0x8c/0xd0 [ 32.130619] print_report+0x118/0x5d0 [ 32.130678] kasan_report+0xdc/0x128 [ 32.130998] __asan_report_load4_noabort+0x20/0x30 [ 32.131429] kasan_atomics_helper+0x3dcc/0x4858 [ 32.131523] kasan_atomics+0x198/0x2e0 [ 32.131595] kunit_try_run_case+0x170/0x3f0 [ 32.132019] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.132279] kthread+0x328/0x630 [ 32.132457] ret_from_fork+0x10/0x20 [ 32.132874] [ 32.132915] Allocated by task 296: [ 32.133073] kasan_save_stack+0x3c/0x68 [ 32.133181] kasan_save_track+0x20/0x40 [ 32.133486] kasan_save_alloc_info+0x40/0x58 [ 32.133653] __kasan_kmalloc+0xd4/0xd8 [ 32.133722] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.134135] kasan_atomics+0xb8/0x2e0 [ 32.134248] kunit_try_run_case+0x170/0x3f0 [ 32.134359] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.134446] kthread+0x328/0x630 [ 32.134651] ret_from_fork+0x10/0x20 [ 32.134847] [ 32.134904] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.134904] which belongs to the cache kmalloc-64 of size 64 [ 32.135207] The buggy address is located 0 bytes to the right of [ 32.135207] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.135582] [ 32.135919] The buggy address belongs to the physical page: [ 32.136103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.136221] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.136362] page_type: f5(slab) [ 32.136433] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.136515] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.136560] page dumped because: kasan: bad access detected [ 32.136749] [ 32.136942] Memory state around the buggy address: [ 32.137184] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.137425] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.137509] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.137612] ^ [ 32.137721] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.137788] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.137832] ================================================================== [ 32.348690] ================================================================== [ 32.348743] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 32.348793] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.349535] [ 32.349640] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.349813] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.349844] Hardware name: linux,dummy-virt (DT) [ 32.349876] Call trace: [ 32.349907] show_stack+0x20/0x38 (C) [ 32.350140] dump_stack_lvl+0x8c/0xd0 [ 32.350188] print_report+0x118/0x5d0 [ 32.350234] kasan_report+0xdc/0x128 [ 32.350755] kasan_check_range+0x100/0x1a8 [ 32.350961] __kasan_check_write+0x20/0x30 [ 32.351075] kasan_atomics_helper+0x154c/0x4858 [ 32.351208] kasan_atomics+0x198/0x2e0 [ 32.351259] kunit_try_run_case+0x170/0x3f0 [ 32.351310] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.351367] kthread+0x328/0x630 [ 32.351411] ret_from_fork+0x10/0x20 [ 32.351482] [ 32.351509] Allocated by task 296: [ 32.351540] kasan_save_stack+0x3c/0x68 [ 32.351588] kasan_save_track+0x20/0x40 [ 32.351657] kasan_save_alloc_info+0x40/0x58 [ 32.351698] __kasan_kmalloc+0xd4/0xd8 [ 32.351779] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.351983] kasan_atomics+0xb8/0x2e0 [ 32.352034] kunit_try_run_case+0x170/0x3f0 [ 32.352077] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.352135] kthread+0x328/0x630 [ 32.352170] ret_from_fork+0x10/0x20 [ 32.352209] [ 32.352230] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.352230] which belongs to the cache kmalloc-64 of size 64 [ 32.352745] The buggy address is located 0 bytes to the right of [ 32.352745] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.352822] [ 32.352896] The buggy address belongs to the physical page: [ 32.353058] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.353173] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.353223] page_type: f5(slab) [ 32.353261] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.353315] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.353361] page dumped because: kasan: bad access detected [ 32.353395] [ 32.353418] Memory state around the buggy address: [ 32.353453] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.353500] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.353547] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.353588] ^ [ 32.353624] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.353669] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.353712] ================================================================== [ 32.255968] ================================================================== [ 32.256162] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 32.256215] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.256599] [ 32.256667] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.256971] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.257014] Hardware name: linux,dummy-virt (DT) [ 32.257225] Call trace: [ 32.257400] show_stack+0x20/0x38 (C) [ 32.257456] dump_stack_lvl+0x8c/0xd0 [ 32.257504] print_report+0x118/0x5d0 [ 32.257548] kasan_report+0xdc/0x128 [ 32.257594] kasan_check_range+0x100/0x1a8 [ 32.257641] __kasan_check_write+0x20/0x30 [ 32.258300] kasan_atomics_helper+0xf88/0x4858 [ 32.258371] kasan_atomics+0x198/0x2e0 [ 32.258420] kunit_try_run_case+0x170/0x3f0 [ 32.258715] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.258835] kthread+0x328/0x630 [ 32.259012] ret_from_fork+0x10/0x20 [ 32.259187] [ 32.259676] Allocated by task 296: [ 32.260112] kasan_save_stack+0x3c/0x68 [ 32.260258] kasan_save_track+0x20/0x40 [ 32.260526] kasan_save_alloc_info+0x40/0x58 [ 32.260693] __kasan_kmalloc+0xd4/0xd8 [ 32.260735] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.260992] kasan_atomics+0xb8/0x2e0 [ 32.261121] kunit_try_run_case+0x170/0x3f0 [ 32.261193] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.261542] kthread+0x328/0x630 [ 32.261583] ret_from_fork+0x10/0x20 [ 32.261972] [ 32.262038] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.262038] which belongs to the cache kmalloc-64 of size 64 [ 32.262615] The buggy address is located 0 bytes to the right of [ 32.262615] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.262821] [ 32.262853] The buggy address belongs to the physical page: [ 32.262938] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.262995] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.263053] page_type: f5(slab) [ 32.263092] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.263700] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.263876] page dumped because: kasan: bad access detected [ 32.263924] [ 32.263999] Memory state around the buggy address: [ 32.264032] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.264204] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.264252] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.264293] ^ [ 32.264327] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.264373] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.264414] ================================================================== [ 32.317679] ================================================================== [ 32.318049] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 32.318172] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.318346] [ 32.318416] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.318506] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.318540] Hardware name: linux,dummy-virt (DT) [ 32.318691] Call trace: [ 32.318728] show_stack+0x20/0x38 (C) [ 32.318778] dump_stack_lvl+0x8c/0xd0 [ 32.318824] print_report+0x118/0x5d0 [ 32.318960] kasan_report+0xdc/0x128 [ 32.319493] kasan_check_range+0x100/0x1a8 [ 32.319604] __kasan_check_write+0x20/0x30 [ 32.319686] kasan_atomics_helper+0x1384/0x4858 [ 32.319738] kasan_atomics+0x198/0x2e0 [ 32.319786] kunit_try_run_case+0x170/0x3f0 [ 32.319968] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.320027] kthread+0x328/0x630 [ 32.320293] ret_from_fork+0x10/0x20 [ 32.320460] [ 32.320485] Allocated by task 296: [ 32.320514] kasan_save_stack+0x3c/0x68 [ 32.320559] kasan_save_track+0x20/0x40 [ 32.320773] kasan_save_alloc_info+0x40/0x58 [ 32.320940] __kasan_kmalloc+0xd4/0xd8 [ 32.320982] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.321025] kasan_atomics+0xb8/0x2e0 [ 32.321443] kunit_try_run_case+0x170/0x3f0 [ 32.321496] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.321564] kthread+0x328/0x630 [ 32.321668] ret_from_fork+0x10/0x20 [ 32.321706] [ 32.321728] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.321728] which belongs to the cache kmalloc-64 of size 64 [ 32.321963] The buggy address is located 0 bytes to the right of [ 32.321963] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.322033] [ 32.322054] The buggy address belongs to the physical page: [ 32.322095] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.322453] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.322509] page_type: f5(slab) [ 32.322547] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.322601] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.323105] page dumped because: kasan: bad access detected [ 32.323156] [ 32.323177] Memory state around the buggy address: [ 32.323486] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.323670] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.323741] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.323796] ^ [ 32.323895] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.323940] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.323982] ================================================================== [ 32.341181] ================================================================== [ 32.341254] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 32.341304] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.341538] [ 32.341954] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.342247] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.342277] Hardware name: linux,dummy-virt (DT) [ 32.342309] Call trace: [ 32.342334] show_stack+0x20/0x38 (C) [ 32.342384] dump_stack_lvl+0x8c/0xd0 [ 32.342432] print_report+0x118/0x5d0 [ 32.342477] kasan_report+0xdc/0x128 [ 32.342520] kasan_check_range+0x100/0x1a8 [ 32.342565] __kasan_check_write+0x20/0x30 [ 32.342613] kasan_atomics_helper+0x14e4/0x4858 [ 32.342664] kasan_atomics+0x198/0x2e0 [ 32.342713] kunit_try_run_case+0x170/0x3f0 [ 32.342770] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.342970] kthread+0x328/0x630 [ 32.343014] ret_from_fork+0x10/0x20 [ 32.343399] [ 32.343532] Allocated by task 296: [ 32.343565] kasan_save_stack+0x3c/0x68 [ 32.343952] kasan_save_track+0x20/0x40 [ 32.344120] kasan_save_alloc_info+0x40/0x58 [ 32.344346] __kasan_kmalloc+0xd4/0xd8 [ 32.344393] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.344436] kasan_atomics+0xb8/0x2e0 [ 32.344477] kunit_try_run_case+0x170/0x3f0 [ 32.344520] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.344567] kthread+0x328/0x630 [ 32.344893] ret_from_fork+0x10/0x20 [ 32.345406] [ 32.345548] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.345548] which belongs to the cache kmalloc-64 of size 64 [ 32.345614] The buggy address is located 0 bytes to the right of [ 32.345614] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.345684] [ 32.345712] The buggy address belongs to the physical page: [ 32.345866] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.346099] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.346175] page_type: f5(slab) [ 32.346215] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.346363] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.346462] page dumped because: kasan: bad access detected [ 32.346574] [ 32.346594] Memory state around the buggy address: [ 32.346629] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.346675] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.346721] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.346762] ^ [ 32.346799] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.346975] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.347325] ================================================================== [ 32.330860] ================================================================== [ 32.330987] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 32.331053] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.331106] [ 32.331158] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.331384] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.331444] Hardware name: linux,dummy-virt (DT) [ 32.331489] Call trace: [ 32.331517] show_stack+0x20/0x38 (C) [ 32.331569] dump_stack_lvl+0x8c/0xd0 [ 32.331614] print_report+0x118/0x5d0 [ 32.331660] kasan_report+0xdc/0x128 [ 32.331704] kasan_check_range+0x100/0x1a8 [ 32.331750] __kasan_check_write+0x20/0x30 [ 32.331796] kasan_atomics_helper+0x1414/0x4858 [ 32.331847] kasan_atomics+0x198/0x2e0 [ 32.331895] kunit_try_run_case+0x170/0x3f0 [ 32.331946] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.332001] kthread+0x328/0x630 [ 32.332045] ret_from_fork+0x10/0x20 [ 32.332093] [ 32.332114] Allocated by task 296: [ 32.332151] kasan_save_stack+0x3c/0x68 [ 32.332195] kasan_save_track+0x20/0x40 [ 32.332272] kasan_save_alloc_info+0x40/0x58 [ 32.332353] __kasan_kmalloc+0xd4/0xd8 [ 32.332472] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.332515] kasan_atomics+0xb8/0x2e0 [ 32.332554] kunit_try_run_case+0x170/0x3f0 [ 32.332866] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.332946] kthread+0x328/0x630 [ 32.332984] ret_from_fork+0x10/0x20 [ 32.333022] [ 32.333044] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.333044] which belongs to the cache kmalloc-64 of size 64 [ 32.333106] The buggy address is located 0 bytes to the right of [ 32.333106] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.333187] [ 32.333209] The buggy address belongs to the physical page: [ 32.333243] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.333296] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.333346] page_type: f5(slab) [ 32.333385] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.333439] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.333483] page dumped because: kasan: bad access detected [ 32.333517] [ 32.333536] Memory state around the buggy address: [ 32.333570] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.333615] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.333660] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.333702] ^ [ 32.333737] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.333783] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.333824] ================================================================== [ 32.294206] ================================================================== [ 32.294456] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 32.294846] Write of size 8 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.295340] [ 32.295376] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.295634] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.295668] Hardware name: linux,dummy-virt (DT) [ 32.295884] Call trace: [ 32.296013] show_stack+0x20/0x38 (C) [ 32.296305] dump_stack_lvl+0x8c/0xd0 [ 32.296410] print_report+0x118/0x5d0 [ 32.296564] kasan_report+0xdc/0x128 [ 32.296635] kasan_check_range+0x100/0x1a8 [ 32.296684] __kasan_check_write+0x20/0x30 [ 32.296822] kasan_atomics_helper+0x11f8/0x4858 [ 32.296904] kasan_atomics+0x198/0x2e0 [ 32.296954] kunit_try_run_case+0x170/0x3f0 [ 32.297007] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.297068] kthread+0x328/0x630 [ 32.297399] ret_from_fork+0x10/0x20 [ 32.297465] [ 32.297488] Allocated by task 296: [ 32.298157] kasan_save_stack+0x3c/0x68 [ 32.298499] kasan_save_track+0x20/0x40 [ 32.298544] kasan_save_alloc_info+0x40/0x58 [ 32.298719] __kasan_kmalloc+0xd4/0xd8 [ 32.298903] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.299001] kasan_atomics+0xb8/0x2e0 [ 32.299045] kunit_try_run_case+0x170/0x3f0 [ 32.299089] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.299239] kthread+0x328/0x630 [ 32.299445] ret_from_fork+0x10/0x20 [ 32.299585] [ 32.299608] The buggy address belongs to the object at fff00000c9bc6c80 [ 32.299608] which belongs to the cache kmalloc-64 of size 64 [ 32.299677] The buggy address is located 0 bytes to the right of [ 32.299677] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.299746] [ 32.299768] The buggy address belongs to the physical page: [ 32.299988] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.300490] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.300549] page_type: f5(slab) [ 32.300770] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.301300] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.301434] page dumped because: kasan: bad access detected [ 32.301479] [ 32.301592] Memory state around the buggy address: [ 32.301629] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.301677] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.301912] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.302267] ^ [ 32.302347] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.302396] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.302437] ================================================================== [ 32.103789] ================================================================== [ 32.104211] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 32.104384] Write of size 4 at addr fff00000c9bc6cb0 by task kunit_try_catch/296 [ 32.104709] [ 32.104761] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 32.106207] kasan_atomics_helper+0xa04/0x4858 [ 32.107167] ret_from_fork+0x10/0x20 [ 32.109901] The buggy address is located 0 bytes to the right of [ 32.109901] allocated 48-byte region [fff00000c9bc6c80, fff00000c9bc6cb0) [ 32.110004] [ 32.110058] The buggy address belongs to the physical page: [ 32.110094] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc6 [ 32.110353] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.110855] page_type: f5(slab) [ 32.110934] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.111066] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.111114] page dumped because: kasan: bad access detected [ 32.111261] [ 32.111287] Memory state around the buggy address: [ 32.111363] fff00000c9bc6b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.111610] fff00000c9bc6c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.111688] >fff00000c9bc6c80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.111757] ^ [ 32.111796] fff00000c9bc6d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.111854] fff00000c9bc6d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.111896] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[ 31.725527] ================================================================== [ 31.725592] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340 [ 31.725647] Read of size 1 at addr ffff800080b17b4a by task kunit_try_catch/284 [ 31.725867] [ 31.725992] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 31.726106] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.726154] Hardware name: linux,dummy-virt (DT) [ 31.726188] Call trace: [ 31.726375] show_stack+0x20/0x38 (C) [ 31.726524] dump_stack_lvl+0x8c/0xd0 [ 31.726576] print_report+0x310/0x5d0 [ 31.726747] kasan_report+0xdc/0x128 [ 31.726920] __asan_report_load1_noabort+0x20/0x30 [ 31.727005] kasan_alloca_oob_right+0x2dc/0x340 [ 31.727155] kunit_try_run_case+0x170/0x3f0 [ 31.727211] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.727385] kthread+0x328/0x630 [ 31.727576] ret_from_fork+0x10/0x20 [ 31.727671] [ 31.727760] The buggy address belongs to stack of task kunit_try_catch/284 [ 31.727837] [ 31.727878] The buggy address ffff800080b17b4a belongs to a vmalloc virtual mapping [ 31.728111] The buggy address belongs to the physical page: [ 31.728271] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b00 [ 31.728436] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.728525] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 31.728708] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 31.728812] page dumped because: kasan: bad access detected [ 31.728963] [ 31.729023] Memory state around the buggy address: [ 31.729153] ffff800080b17a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.729220] ffff800080b17a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.729326] >ffff800080b17b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 31.729368] ^ [ 31.729575] ffff800080b17b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 31.729794] ffff800080b17c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 31.745513] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[ 31.713487] ================================================================== [ 31.713757] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 31.713831] Read of size 1 at addr ffff800080b37b5f by task kunit_try_catch/282 [ 31.713931] [ 31.713967] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 31.714378] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.714439] Hardware name: linux,dummy-virt (DT) [ 31.714488] Call trace: [ 31.714551] show_stack+0x20/0x38 (C) [ 31.714626] dump_stack_lvl+0x8c/0xd0 [ 31.714674] print_report+0x310/0x5d0 [ 31.715017] kasan_report+0xdc/0x128 [ 31.715312] __asan_report_load1_noabort+0x20/0x30 [ 31.715535] kasan_alloca_oob_left+0x2b8/0x310 [ 31.715613] kunit_try_run_case+0x170/0x3f0 [ 31.715723] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.715821] kthread+0x328/0x630 [ 31.715952] ret_from_fork+0x10/0x20 [ 31.716153] [ 31.716242] The buggy address belongs to stack of task kunit_try_catch/282 [ 31.716322] [ 31.716350] The buggy address ffff800080b37b5f belongs to a vmalloc virtual mapping [ 31.716399] The buggy address belongs to the physical page: [ 31.716433] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bd1 [ 31.716540] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.716638] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 31.716945] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 31.717022] page dumped because: kasan: bad access detected [ 31.717075] [ 31.717138] Memory state around the buggy address: [ 31.717186] ffff800080b37a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.717233] ffff800080b37a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.717296] >ffff800080b37b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 31.717339] ^ [ 31.717380] ffff800080b37b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 31.717428] ffff800080b37c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 31.717470] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 31.701466] ================================================================== [ 31.701557] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 31.701614] Read of size 1 at addr ffff800080a97c2a by task kunit_try_catch/280 [ 31.701669] [ 31.701701] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 31.701792] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.701822] Hardware name: linux,dummy-virt (DT) [ 31.701855] Call trace: [ 31.701881] show_stack+0x20/0x38 (C) [ 31.701931] dump_stack_lvl+0x8c/0xd0 [ 31.701979] print_report+0x310/0x5d0 [ 31.702033] kasan_report+0xdc/0x128 [ 31.702092] __asan_report_load1_noabort+0x20/0x30 [ 31.702170] kasan_stack_oob+0x238/0x270 [ 31.702229] kunit_try_run_case+0x170/0x3f0 [ 31.702281] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.702337] kthread+0x328/0x630 [ 31.702390] ret_from_fork+0x10/0x20 [ 31.702447] [ 31.702508] The buggy address belongs to stack of task kunit_try_catch/280 [ 31.702614] and is located at offset 138 in frame: [ 31.702652] kasan_stack_oob+0x0/0x270 [ 31.703081] [ 31.703536] This frame has 4 objects: [ 31.703865] [48, 49) '__assertion' [ 31.704006] [64, 72) 'array' [ 31.704075] [96, 112) '__assertion' [ 31.704120] [128, 138) 'stack_array' [ 31.704454] [ 31.704528] The buggy address ffff800080a97c2a belongs to a vmalloc virtual mapping [ 31.704595] The buggy address belongs to the physical page: [ 31.704692] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xfff00000c3f530c8 pfn:0x103f53 [ 31.704781] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.704944] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 31.705022] raw: fff00000c3f530c8 0000000000000000 00000001ffffffff 0000000000000000 [ 31.705154] page dumped because: kasan: bad access detected [ 31.705191] [ 31.705429] Memory state around the buggy address: [ 31.705595] ffff800080a97b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.705685] ffff800080a97b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 31.705830] >ffff800080a97c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 31.705908] ^ [ 31.706032] ffff800080a97c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 [ 31.706198] ffff800080a97d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 31.706244] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 31.684970] ================================================================== [ 31.685034] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 31.685268] Read of size 1 at addr ffff90902893b6cd by task kunit_try_catch/276 [ 31.685402] [ 31.685447] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 31.685536] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.685728] Hardware name: linux,dummy-virt (DT) [ 31.685855] Call trace: [ 31.685888] show_stack+0x20/0x38 (C) [ 31.685941] dump_stack_lvl+0x8c/0xd0 [ 31.685986] print_report+0x310/0x5d0 [ 31.686065] kasan_report+0xdc/0x128 [ 31.686112] __asan_report_load1_noabort+0x20/0x30 [ 31.686171] kasan_global_oob_right+0x230/0x270 [ 31.686363] kunit_try_run_case+0x170/0x3f0 [ 31.686494] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.686558] kthread+0x328/0x630 [ 31.686607] ret_from_fork+0x10/0x20 [ 31.686710] [ 31.686794] The buggy address belongs to the variable: [ 31.686842] global_array+0xd/0x40 [ 31.687026] [ 31.687088] The buggy address ffff90902893b6cd belongs to a vmalloc virtual mapping [ 31.687566] The buggy address belongs to the physical page: [ 31.687693] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47d3b [ 31.687963] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 31.688103] raw: 03fffe0000002000 ffffc1ffc01f4ec8 ffffc1ffc01f4ec8 0000000000000000 [ 31.688250] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 31.688349] page dumped because: kasan: bad access detected [ 31.688422] [ 31.688722] Memory state around the buggy address: [ 31.688862] ffff90902893b580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.688930] ffff90902893b600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.689046] >ffff90902893b680: 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 [ 31.689126] ^ [ 31.689268] ffff90902893b700: 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 [ 31.689315] ffff90902893b780: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00 [ 31.689531] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 31.673442] ================================================================== [ 31.673779] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 31.673862] Free of addr fff00000c9b8c001 by task kunit_try_catch/274 [ 31.673908] [ 31.673949] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 31.674037] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.674065] Hardware name: linux,dummy-virt (DT) [ 31.674193] Call trace: [ 31.674219] show_stack+0x20/0x38 (C) [ 31.674299] dump_stack_lvl+0x8c/0xd0 [ 31.674462] print_report+0x118/0x5d0 [ 31.674508] kasan_report_invalid_free+0xc0/0xe8 [ 31.674583] __kasan_mempool_poison_object+0xfc/0x150 [ 31.674859] mempool_free+0x28c/0x328 [ 31.674942] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 31.675013] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 31.675173] kunit_try_run_case+0x170/0x3f0 [ 31.675271] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.675463] kthread+0x328/0x630 [ 31.675630] ret_from_fork+0x10/0x20 [ 31.675720] [ 31.675740] The buggy address belongs to the physical page: [ 31.675780] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8c [ 31.675834] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.676488] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.676704] page_type: f8(unknown) [ 31.676829] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.676886] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.677078] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.677260] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.677339] head: 0bfffe0000000002 ffffc1ffc326e301 00000000ffffffff 00000000ffffffff [ 31.677471] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 31.677561] page dumped because: kasan: bad access detected [ 31.677671] [ 31.677732] Memory state around the buggy address: [ 31.677790] fff00000c9b8bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.677889] fff00000c9b8bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.677935] >fff00000c9b8c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.678155] ^ [ 31.678279] fff00000c9b8c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.678399] fff00000c9b8c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.678491] ================================================================== [ 31.661570] ================================================================== [ 31.661628] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 31.661680] Free of addr fff00000c9bc2401 by task kunit_try_catch/272 [ 31.661939] [ 31.661980] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 31.662264] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.662293] Hardware name: linux,dummy-virt (DT) [ 31.662341] Call trace: [ 31.662436] show_stack+0x20/0x38 (C) [ 31.662490] dump_stack_lvl+0x8c/0xd0 [ 31.662535] print_report+0x118/0x5d0 [ 31.662633] kasan_report_invalid_free+0xc0/0xe8 [ 31.662681] check_slab_allocation+0xfc/0x108 [ 31.662880] __kasan_mempool_poison_object+0x78/0x150 [ 31.662943] mempool_free+0x28c/0x328 [ 31.663042] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 31.663099] mempool_kmalloc_invalid_free+0xc0/0x118 [ 31.663497] kunit_try_run_case+0x170/0x3f0 [ 31.663587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.663686] kthread+0x328/0x630 [ 31.663830] ret_from_fork+0x10/0x20 [ 31.663918] [ 31.664051] Allocated by task 272: [ 31.664083] kasan_save_stack+0x3c/0x68 [ 31.664502] kasan_save_track+0x20/0x40 [ 31.664583] kasan_save_alloc_info+0x40/0x58 [ 31.664647] __kasan_mempool_unpoison_object+0x11c/0x180 [ 31.664806] remove_element+0x130/0x1f8 [ 31.664894] mempool_alloc_preallocated+0x58/0xc0 [ 31.665055] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 31.665197] mempool_kmalloc_invalid_free+0xc0/0x118 [ 31.665289] kunit_try_run_case+0x170/0x3f0 [ 31.665330] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.665666] kthread+0x328/0x630 [ 31.665740] ret_from_fork+0x10/0x20 [ 31.665818] [ 31.665872] The buggy address belongs to the object at fff00000c9bc2400 [ 31.665872] which belongs to the cache kmalloc-128 of size 128 [ 31.665979] The buggy address is located 1 bytes inside of [ 31.665979] 128-byte region [fff00000c9bc2400, fff00000c9bc2480) [ 31.666108] [ 31.666158] The buggy address belongs to the physical page: [ 31.666229] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc2 [ 31.666432] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.666526] page_type: f5(slab) [ 31.666588] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.666728] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.666793] page dumped because: kasan: bad access detected [ 31.666979] [ 31.667002] Memory state around the buggy address: [ 31.667037] fff00000c9bc2300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.667083] fff00000c9bc2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.667197] >fff00000c9bc2400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.667263] ^ [ 31.667328] fff00000c9bc2480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.667429] fff00000c9bc2500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.667554] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 31.630504] ================================================================== [ 31.630564] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 31.630617] Free of addr fff00000c9b8c000 by task kunit_try_catch/268 [ 31.630660] [ 31.630692] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 31.633909] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.633941] Hardware name: linux,dummy-virt (DT) [ 31.634532] Call trace: [ 31.634562] show_stack+0x20/0x38 (C) [ 31.634786] dump_stack_lvl+0x8c/0xd0 [ 31.635238] print_report+0x118/0x5d0 [ 31.635296] kasan_report_invalid_free+0xc0/0xe8 [ 31.635345] __kasan_mempool_poison_object+0x14c/0x150 [ 31.635399] mempool_free+0x28c/0x328 [ 31.635448] mempool_double_free_helper+0x150/0x2e8 [ 31.635506] mempool_kmalloc_large_double_free+0xc0/0x118 [ 31.635559] kunit_try_run_case+0x170/0x3f0 [ 31.635607] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.635661] kthread+0x328/0x630 [ 31.635701] ret_from_fork+0x10/0x20 [ 31.635749] [ 31.635772] The buggy address belongs to the physical page: [ 31.635805] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8c [ 31.635860] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.635909] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.635963] page_type: f8(unknown) [ 31.636004] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.636056] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.636106] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.636167] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.636218] head: 0bfffe0000000002 ffffc1ffc326e301 00000000ffffffff 00000000ffffffff [ 31.636308] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 31.636350] page dumped because: kasan: bad access detected [ 31.636383] [ 31.636442] Memory state around the buggy address: [ 31.636547] fff00000c9b8bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.636593] fff00000c9b8bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.636674] >fff00000c9b8c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.636856] ^ [ 31.636923] fff00000c9b8c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.636972] fff00000c9b8c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.637012] ================================================================== [ 31.651355] ================================================================== [ 31.651546] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 31.651671] Free of addr fff00000c9b8c000 by task kunit_try_catch/270 [ 31.651994] [ 31.652046] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 31.652295] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.652404] Hardware name: linux,dummy-virt (DT) [ 31.652606] Call trace: [ 31.652655] show_stack+0x20/0x38 (C) [ 31.652923] dump_stack_lvl+0x8c/0xd0 [ 31.653049] print_report+0x118/0x5d0 [ 31.653422] kasan_report_invalid_free+0xc0/0xe8 [ 31.653661] __kasan_mempool_poison_pages+0xe0/0xe8 [ 31.653725] mempool_free+0x24c/0x328 [ 31.653779] mempool_double_free_helper+0x150/0x2e8 [ 31.653855] mempool_page_alloc_double_free+0xbc/0x118 [ 31.653908] kunit_try_run_case+0x170/0x3f0 [ 31.653976] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.654503] kthread+0x328/0x630 [ 31.654737] ret_from_fork+0x10/0x20 [ 31.654829] [ 31.654850] The buggy address belongs to the physical page: [ 31.655180] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8c [ 31.655260] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.655591] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 31.655666] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 31.655710] page dumped because: kasan: bad access detected [ 31.655742] [ 31.655761] Memory state around the buggy address: [ 31.655808] fff00000c9b8bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.655857] fff00000c9b8bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.655901] >fff00000c9b8c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.656216] ^ [ 31.656260] fff00000c9b8c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.656306] fff00000c9b8c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.656356] ================================================================== [ 31.615828] ================================================================== [ 31.615950] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 31.616039] Free of addr fff00000c9bc2000 by task kunit_try_catch/266 [ 31.618196] [ 31.618232] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 31.618320] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.618346] Hardware name: linux,dummy-virt (DT) [ 31.618378] Call trace: [ 31.618399] show_stack+0x20/0x38 (C) [ 31.618451] dump_stack_lvl+0x8c/0xd0 [ 31.618495] print_report+0x118/0x5d0 [ 31.618539] kasan_report_invalid_free+0xc0/0xe8 [ 31.618585] check_slab_allocation+0xd4/0x108 [ 31.618634] __kasan_mempool_poison_object+0x78/0x150 [ 31.618687] mempool_free+0x28c/0x328 [ 31.618740] mempool_double_free_helper+0x150/0x2e8 [ 31.618790] mempool_kmalloc_double_free+0xc0/0x118 [ 31.618839] kunit_try_run_case+0x170/0x3f0 [ 31.618889] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.618943] kthread+0x328/0x630 [ 31.618984] ret_from_fork+0x10/0x20 [ 31.619029] [ 31.619047] Allocated by task 266: [ 31.619076] kasan_save_stack+0x3c/0x68 [ 31.619116] kasan_save_track+0x20/0x40 [ 31.619200] kasan_save_alloc_info+0x40/0x58 [ 31.619279] __kasan_mempool_unpoison_object+0x11c/0x180 [ 31.619325] remove_element+0x130/0x1f8 [ 31.619483] mempool_alloc_preallocated+0x58/0xc0 [ 31.619528] mempool_double_free_helper+0x94/0x2e8 [ 31.619568] mempool_kmalloc_double_free+0xc0/0x118 [ 31.619609] kunit_try_run_case+0x170/0x3f0 [ 31.619858] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.622194] kthread+0x328/0x630 [ 31.622228] ret_from_fork+0x10/0x20 [ 31.622263] [ 31.622282] Freed by task 266: [ 31.622312] kasan_save_stack+0x3c/0x68 [ 31.622352] kasan_save_track+0x20/0x40 [ 31.622388] kasan_save_free_info+0x4c/0x78 [ 31.622425] __kasan_mempool_poison_object+0xc0/0x150 [ 31.622466] mempool_free+0x28c/0x328 [ 31.622502] mempool_double_free_helper+0x100/0x2e8 [ 31.622543] mempool_kmalloc_double_free+0xc0/0x118 [ 31.622582] kunit_try_run_case+0x170/0x3f0 [ 31.622621] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.622665] kthread+0x328/0x630 [ 31.622703] ret_from_fork+0x10/0x20 [ 31.622739] [ 31.622757] The buggy address belongs to the object at fff00000c9bc2000 [ 31.622757] which belongs to the cache kmalloc-128 of size 128 [ 31.622817] The buggy address is located 0 bytes inside of [ 31.622817] 128-byte region [fff00000c9bc2000, fff00000c9bc2080) [ 31.622879] [ 31.622899] The buggy address belongs to the physical page: [ 31.622930] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc2 [ 31.622983] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.623033] page_type: f5(slab) [ 31.623069] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.623120] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.623173] page dumped because: kasan: bad access detected [ 31.623205] [ 31.623222] Memory state around the buggy address: [ 31.623254] fff00000c9bc1f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.623297] fff00000c9bc1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.623341] >fff00000c9bc2000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.623382] ^ [ 31.623410] fff00000c9bc2080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.623453] fff00000c9bc2100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.623492] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 31.608829] ================================================================== [ 31.608912] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 31.609092] Read of size 1 at addr fff00000c9b88000 by task kunit_try_catch/264 [ 31.609156] [ 31.609210] CPU: 0 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 31.609301] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.609359] Hardware name: linux,dummy-virt (DT) [ 31.609397] Call trace: [ 31.609437] show_stack+0x20/0x38 (C) [ 31.609490] dump_stack_lvl+0x8c/0xd0 [ 31.609535] print_report+0x118/0x5d0 [ 31.609577] kasan_report+0xdc/0x128 [ 31.609635] __asan_report_load1_noabort+0x20/0x30 [ 31.609685] mempool_uaf_helper+0x314/0x340 [ 31.609732] mempool_page_alloc_uaf+0xc0/0x118 [ 31.609780] kunit_try_run_case+0x170/0x3f0 [ 31.609830] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.609884] kthread+0x328/0x630 [ 31.609926] ret_from_fork+0x10/0x20 [ 31.609973] [ 31.610012] The buggy address belongs to the physical page: [ 31.610047] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b88 [ 31.610119] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.610192] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 31.610261] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 31.610334] page dumped because: kasan: bad access detected [ 31.610384] [ 31.610423] Memory state around the buggy address: [ 31.610472] fff00000c9b87f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.610516] fff00000c9b87f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.610578] >fff00000c9b88000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.610635] ^ [ 31.610662] fff00000c9b88080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.610767] fff00000c9b88100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.610889] ================================================================== [ 31.575942] ================================================================== [ 31.576008] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 31.576061] Read of size 1 at addr fff00000c9b88000 by task kunit_try_catch/260 [ 31.576113] [ 31.576185] CPU: 0 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 31.576276] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.576303] Hardware name: linux,dummy-virt (DT) [ 31.576376] Call trace: [ 31.576402] show_stack+0x20/0x38 (C) [ 31.576470] dump_stack_lvl+0x8c/0xd0 [ 31.576568] print_report+0x118/0x5d0 [ 31.576613] kasan_report+0xdc/0x128 [ 31.576661] __asan_report_load1_noabort+0x20/0x30 [ 31.576733] mempool_uaf_helper+0x314/0x340 [ 31.576800] mempool_kmalloc_large_uaf+0xc4/0x120 [ 31.576857] kunit_try_run_case+0x170/0x3f0 [ 31.576906] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.576960] kthread+0x328/0x630 [ 31.577205] ret_from_fork+0x10/0x20 [ 31.577294] [ 31.577334] The buggy address belongs to the physical page: [ 31.577368] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b88 [ 31.577423] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.577511] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.577563] page_type: f8(unknown) [ 31.577602] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.577675] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.577763] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.577830] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.577886] head: 0bfffe0000000002 ffffc1ffc326e201 00000000ffffffff 00000000ffffffff [ 31.577937] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 31.578014] page dumped because: kasan: bad access detected [ 31.578063] [ 31.578091] Memory state around the buggy address: [ 31.578124] fff00000c9b87f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.578181] fff00000c9b87f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.578390] >fff00000c9b88000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.578452] ^ [ 31.578481] fff00000c9b88080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.578530] fff00000c9b88100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.578587] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 31.567240] ================================================================== [ 31.567413] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 31.567476] Read of size 1 at addr fff00000c9af0c00 by task kunit_try_catch/258 [ 31.567563] [ 31.567601] CPU: 0 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 31.567692] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.567737] Hardware name: linux,dummy-virt (DT) [ 31.567797] Call trace: [ 31.567885] show_stack+0x20/0x38 (C) [ 31.567954] dump_stack_lvl+0x8c/0xd0 [ 31.568019] print_report+0x118/0x5d0 [ 31.568061] kasan_report+0xdc/0x128 [ 31.568122] __asan_report_load1_noabort+0x20/0x30 [ 31.568185] mempool_uaf_helper+0x314/0x340 [ 31.568231] mempool_kmalloc_uaf+0xc4/0x120 [ 31.568278] kunit_try_run_case+0x170/0x3f0 [ 31.568345] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.568437] kthread+0x328/0x630 [ 31.568496] ret_from_fork+0x10/0x20 [ 31.568552] [ 31.568626] Allocated by task 258: [ 31.568655] kasan_save_stack+0x3c/0x68 [ 31.568696] kasan_save_track+0x20/0x40 [ 31.568744] kasan_save_alloc_info+0x40/0x58 [ 31.568783] __kasan_mempool_unpoison_object+0x11c/0x180 [ 31.568829] remove_element+0x130/0x1f8 [ 31.568869] mempool_alloc_preallocated+0x58/0xc0 [ 31.568907] mempool_uaf_helper+0xa4/0x340 [ 31.568945] mempool_kmalloc_uaf+0xc4/0x120 [ 31.569090] kunit_try_run_case+0x170/0x3f0 [ 31.569167] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.569234] kthread+0x328/0x630 [ 31.569269] ret_from_fork+0x10/0x20 [ 31.569325] [ 31.569386] Freed by task 258: [ 31.569415] kasan_save_stack+0x3c/0x68 [ 31.569471] kasan_save_track+0x20/0x40 [ 31.569528] kasan_save_free_info+0x4c/0x78 [ 31.569613] __kasan_mempool_poison_object+0xc0/0x150 [ 31.569657] mempool_free+0x28c/0x328 [ 31.569694] mempool_uaf_helper+0x104/0x340 [ 31.569733] mempool_kmalloc_uaf+0xc4/0x120 [ 31.569778] kunit_try_run_case+0x170/0x3f0 [ 31.569836] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.569902] kthread+0x328/0x630 [ 31.569934] ret_from_fork+0x10/0x20 [ 31.569968] [ 31.570000] The buggy address belongs to the object at fff00000c9af0c00 [ 31.570000] which belongs to the cache kmalloc-128 of size 128 [ 31.570245] The buggy address is located 0 bytes inside of [ 31.570245] freed 128-byte region [fff00000c9af0c00, fff00000c9af0c80) [ 31.570344] [ 31.570384] The buggy address belongs to the physical page: [ 31.570434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109af0 [ 31.570508] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.570565] page_type: f5(slab) [ 31.570622] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.570689] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.570819] page dumped because: kasan: bad access detected [ 31.570879] [ 31.570932] Memory state around the buggy address: [ 31.570964] fff00000c9af0b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.571008] fff00000c9af0b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.571072] >fff00000c9af0c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.571111] ^ [ 31.571147] fff00000c9af0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.571190] fff00000c9af0d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.571230] ================================================================== [ 31.585869] ================================================================== [ 31.585934] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 31.586002] Read of size 1 at addr fff00000c9bc0240 by task kunit_try_catch/262 [ 31.586054] [ 31.586301] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 31.586412] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.586439] Hardware name: linux,dummy-virt (DT) [ 31.586491] Call trace: [ 31.586530] show_stack+0x20/0x38 (C) [ 31.586610] dump_stack_lvl+0x8c/0xd0 [ 31.586662] print_report+0x118/0x5d0 [ 31.586802] kasan_report+0xdc/0x128 [ 31.586848] __asan_report_load1_noabort+0x20/0x30 [ 31.586895] mempool_uaf_helper+0x314/0x340 [ 31.586942] mempool_slab_uaf+0xc0/0x118 [ 31.586988] kunit_try_run_case+0x170/0x3f0 [ 31.587037] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.587198] kthread+0x328/0x630 [ 31.587245] ret_from_fork+0x10/0x20 [ 31.587292] [ 31.587311] Allocated by task 262: [ 31.587339] kasan_save_stack+0x3c/0x68 [ 31.587383] kasan_save_track+0x20/0x40 [ 31.587442] kasan_save_alloc_info+0x40/0x58 [ 31.587536] __kasan_mempool_unpoison_object+0xbc/0x180 [ 31.587630] remove_element+0x16c/0x1f8 [ 31.587709] mempool_alloc_preallocated+0x58/0xc0 [ 31.587806] mempool_uaf_helper+0xa4/0x340 [ 31.587886] mempool_slab_uaf+0xc0/0x118 [ 31.587973] kunit_try_run_case+0x170/0x3f0 [ 31.588060] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.588108] kthread+0x328/0x630 [ 31.588150] ret_from_fork+0x10/0x20 [ 31.588186] [ 31.588206] Freed by task 262: [ 31.588232] kasan_save_stack+0x3c/0x68 [ 31.588388] kasan_save_track+0x20/0x40 [ 31.588449] kasan_save_free_info+0x4c/0x78 [ 31.588528] __kasan_mempool_poison_object+0xc0/0x150 [ 31.588595] mempool_free+0x28c/0x328 [ 31.588667] mempool_uaf_helper+0x104/0x340 [ 31.588707] mempool_slab_uaf+0xc0/0x118 [ 31.588939] kunit_try_run_case+0x170/0x3f0 [ 31.589029] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.589145] kthread+0x328/0x630 [ 31.589215] ret_from_fork+0x10/0x20 [ 31.589318] [ 31.589368] The buggy address belongs to the object at fff00000c9bc0240 [ 31.589368] which belongs to the cache test_cache of size 123 [ 31.589450] The buggy address is located 0 bytes inside of [ 31.589450] freed 123-byte region [fff00000c9bc0240, fff00000c9bc02bb) [ 31.589711] [ 31.589771] The buggy address belongs to the physical page: [ 31.589809] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109bc0 [ 31.589869] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.589933] page_type: f5(slab) [ 31.589972] raw: 0bfffe0000000000 fff00000ffed2f00 dead000000000122 0000000000000000 [ 31.590023] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 31.590075] page dumped because: kasan: bad access detected [ 31.590116] [ 31.590155] Memory state around the buggy address: [ 31.590204] fff00000c9bc0100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.590248] fff00000c9bc0180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.590301] >fff00000c9bc0200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 31.590351] ^ [ 31.590397] fff00000c9bc0280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.590458] fff00000c9bc0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.590499] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 31.543025] ================================================================== [ 31.544086] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 31.544675] Read of size 1 at addr fff00000c9b022bb by task kunit_try_catch/256 [ 31.545169] [ 31.545208] CPU: 0 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 31.545428] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.545684] Hardware name: linux,dummy-virt (DT) [ 31.545724] Call trace: [ 31.545749] show_stack+0x20/0x38 (C) [ 31.545977] dump_stack_lvl+0x8c/0xd0 [ 31.546255] print_report+0x118/0x5d0 [ 31.546312] kasan_report+0xdc/0x128 [ 31.546592] __asan_report_load1_noabort+0x20/0x30 [ 31.546740] mempool_oob_right_helper+0x2ac/0x2f0 [ 31.547025] mempool_slab_oob_right+0xc0/0x118 [ 31.547241] kunit_try_run_case+0x170/0x3f0 [ 31.547315] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.548237] kthread+0x328/0x630 [ 31.548298] ret_from_fork+0x10/0x20 [ 31.548921] [ 31.549355] Allocated by task 256: [ 31.549396] kasan_save_stack+0x3c/0x68 [ 31.549474] kasan_save_track+0x20/0x40 [ 31.549892] kasan_save_alloc_info+0x40/0x58 [ 31.549992] __kasan_mempool_unpoison_object+0xbc/0x180 [ 31.550313] remove_element+0x16c/0x1f8 [ 31.550735] mempool_alloc_preallocated+0x58/0xc0 [ 31.550792] mempool_oob_right_helper+0x98/0x2f0 [ 31.550833] mempool_slab_oob_right+0xc0/0x118 [ 31.550874] kunit_try_run_case+0x170/0x3f0 [ 31.550912] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.550959] kthread+0x328/0x630 [ 31.550991] ret_from_fork+0x10/0x20 [ 31.551027] [ 31.551050] The buggy address belongs to the object at fff00000c9b02240 [ 31.551050] which belongs to the cache test_cache of size 123 [ 31.551113] The buggy address is located 0 bytes to the right of [ 31.551113] allocated 123-byte region [fff00000c9b02240, fff00000c9b022bb) [ 31.551274] [ 31.551298] The buggy address belongs to the physical page: [ 31.551329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b02 [ 31.551384] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.551435] page_type: f5(slab) [ 31.551476] raw: 0bfffe0000000000 fff00000c582fa00 dead000000000122 0000000000000000 [ 31.551533] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 31.551575] page dumped because: kasan: bad access detected [ 31.551607] [ 31.551626] Memory state around the buggy address: [ 31.551658] fff00000c9b02180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.551702] fff00000c9b02200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 31.551745] >fff00000c9b02280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 31.551784] ^ [ 31.551818] fff00000c9b02300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.551861] fff00000c9b02380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.551903] ================================================================== [ 31.508684] ================================================================== [ 31.508755] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 31.508828] Read of size 1 at addr fff00000c9af0873 by task kunit_try_catch/252 [ 31.508880] [ 31.508924] CPU: 0 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 31.509016] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.509046] Hardware name: linux,dummy-virt (DT) [ 31.509080] Call trace: [ 31.509106] show_stack+0x20/0x38 (C) [ 31.509173] dump_stack_lvl+0x8c/0xd0 [ 31.509222] print_report+0x118/0x5d0 [ 31.509266] kasan_report+0xdc/0x128 [ 31.509307] __asan_report_load1_noabort+0x20/0x30 [ 31.509356] mempool_oob_right_helper+0x2ac/0x2f0 [ 31.509404] mempool_kmalloc_oob_right+0xc4/0x120 [ 31.509453] kunit_try_run_case+0x170/0x3f0 [ 31.509505] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.509558] kthread+0x328/0x630 [ 31.509602] ret_from_fork+0x10/0x20 [ 31.509651] [ 31.509671] Allocated by task 252: [ 31.509701] kasan_save_stack+0x3c/0x68 [ 31.509744] kasan_save_track+0x20/0x40 [ 31.509782] kasan_save_alloc_info+0x40/0x58 [ 31.509820] __kasan_mempool_unpoison_object+0x11c/0x180 [ 31.509865] remove_element+0x130/0x1f8 [ 31.509903] mempool_alloc_preallocated+0x58/0xc0 [ 31.509944] mempool_oob_right_helper+0x98/0x2f0 [ 31.509983] mempool_kmalloc_oob_right+0xc4/0x120 [ 31.510025] kunit_try_run_case+0x170/0x3f0 [ 31.510063] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.510108] kthread+0x328/0x630 [ 31.510151] ret_from_fork+0x10/0x20 [ 31.510186] [ 31.510206] The buggy address belongs to the object at fff00000c9af0800 [ 31.510206] which belongs to the cache kmalloc-128 of size 128 [ 31.510267] The buggy address is located 0 bytes to the right of [ 31.510267] allocated 115-byte region [fff00000c9af0800, fff00000c9af0873) [ 31.510336] [ 31.510358] The buggy address belongs to the physical page: [ 31.510394] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109af0 [ 31.510449] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.510502] page_type: f5(slab) [ 31.510545] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.510599] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.510642] page dumped because: kasan: bad access detected [ 31.510674] [ 31.510692] Memory state around the buggy address: [ 31.510743] fff00000c9af0700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.510789] fff00000c9af0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.510834] >fff00000c9af0800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.510876] ^ [ 31.510918] fff00000c9af0880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.510962] fff00000c9af0900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.511003] ================================================================== [ 31.525774] ================================================================== [ 31.525836] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 31.526816] Read of size 1 at addr fff00000c9b56001 by task kunit_try_catch/254 [ 31.526940] [ 31.526974] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 31.527063] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.527244] Hardware name: linux,dummy-virt (DT) [ 31.527765] Call trace: [ 31.527831] show_stack+0x20/0x38 (C) [ 31.527900] dump_stack_lvl+0x8c/0xd0 [ 31.528109] print_report+0x118/0x5d0 [ 31.528200] kasan_report+0xdc/0x128 [ 31.528263] __asan_report_load1_noabort+0x20/0x30 [ 31.528421] mempool_oob_right_helper+0x2ac/0x2f0 [ 31.528754] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 31.529053] kunit_try_run_case+0x170/0x3f0 [ 31.529259] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.529394] kthread+0x328/0x630 [ 31.529767] ret_from_fork+0x10/0x20 [ 31.529967] [ 31.530474] The buggy address belongs to the physical page: [ 31.530742] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b54 [ 31.530815] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.530871] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.530928] page_type: f8(unknown) [ 31.530969] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.531666] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.531892] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.532183] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.532240] head: 0bfffe0000000002 ffffc1ffc326d501 00000000ffffffff 00000000ffffffff [ 31.532337] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 31.532658] page dumped because: kasan: bad access detected [ 31.532924] [ 31.533601] Memory state around the buggy address: [ 31.533640] fff00000c9b55f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.533687] fff00000c9b55f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.533731] >fff00000c9b56000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.533772] ^ [ 31.533800] fff00000c9b56080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.533844] fff00000c9b56100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.533885] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 30.937961] ================================================================== [ 30.938038] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300 [ 30.938116] Read of size 1 at addr fff00000c3e37640 by task kunit_try_catch/246 [ 30.938182] [ 30.938228] CPU: 1 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 30.938322] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.938350] Hardware name: linux,dummy-virt (DT) [ 30.939203] Call trace: [ 30.939257] show_stack+0x20/0x38 (C) [ 30.939380] dump_stack_lvl+0x8c/0xd0 [ 30.939443] print_report+0x118/0x5d0 [ 30.939503] kasan_report+0xdc/0x128 [ 30.939670] __kasan_check_byte+0x54/0x70 [ 30.940173] kmem_cache_destroy+0x34/0x218 [ 30.940449] kmem_cache_double_destroy+0x174/0x300 [ 30.940586] kunit_try_run_case+0x170/0x3f0 [ 30.940671] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.940944] kthread+0x328/0x630 [ 30.941017] ret_from_fork+0x10/0x20 [ 30.941097] [ 30.941116] Allocated by task 246: [ 30.941156] kasan_save_stack+0x3c/0x68 [ 30.941202] kasan_save_track+0x20/0x40 [ 30.941267] kasan_save_alloc_info+0x40/0x58 [ 30.941316] __kasan_slab_alloc+0xa8/0xb0 [ 30.941360] kmem_cache_alloc_noprof+0x10c/0x398 [ 30.941403] __kmem_cache_create_args+0x178/0x280 [ 30.941444] kmem_cache_double_destroy+0xc0/0x300 [ 30.941494] kunit_try_run_case+0x170/0x3f0 [ 30.941541] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.941587] kthread+0x328/0x630 [ 30.941620] ret_from_fork+0x10/0x20 [ 30.941656] [ 30.941692] Freed by task 246: [ 30.941726] kasan_save_stack+0x3c/0x68 [ 30.941767] kasan_save_track+0x20/0x40 [ 30.941805] kasan_save_free_info+0x4c/0x78 [ 30.941864] __kasan_slab_free+0x6c/0x98 [ 30.941912] kmem_cache_free+0x260/0x468 [ 30.941951] slab_kmem_cache_release+0x38/0x50 [ 30.941991] kmem_cache_release+0x1c/0x30 [ 30.942038] kobject_put+0x17c/0x420 [ 30.942075] sysfs_slab_release+0x1c/0x30 [ 30.942125] kmem_cache_destroy+0x118/0x218 [ 30.942196] kmem_cache_double_destroy+0x128/0x300 [ 30.942237] kunit_try_run_case+0x170/0x3f0 [ 30.942276] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.942321] kthread+0x328/0x630 [ 30.942363] ret_from_fork+0x10/0x20 [ 30.942397] [ 30.942426] The buggy address belongs to the object at fff00000c3e37640 [ 30.942426] which belongs to the cache kmem_cache of size 208 [ 30.942495] The buggy address is located 0 bytes inside of [ 30.942495] freed 208-byte region [fff00000c3e37640, fff00000c3e37710) [ 30.942559] [ 30.942583] The buggy address belongs to the physical page: [ 30.942627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e37 [ 30.942841] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.943333] page_type: f5(slab) [ 30.943570] raw: 0bfffe0000000000 fff00000c0001000 dead000000000100 dead000000000122 [ 30.943726] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000 [ 30.943811] page dumped because: kasan: bad access detected [ 30.943882] [ 30.944023] Memory state around the buggy address: [ 30.944062] fff00000c3e37500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.944119] fff00000c3e37580: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 30.944419] >fff00000c3e37600: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 30.944537] ^ [ 30.944607] fff00000c3e37680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.944690] fff00000c3e37700: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.944833] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 30.672209] ================================================================== [ 30.672328] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468 [ 30.672410] Read of size 1 at addr fff00000c9974000 by task kunit_try_catch/244 [ 30.672475] [ 30.672521] CPU: 1 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 30.672638] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.672671] Hardware name: linux,dummy-virt (DT) [ 30.672711] Call trace: [ 30.672737] show_stack+0x20/0x38 (C) [ 30.672793] dump_stack_lvl+0x8c/0xd0 [ 30.672846] print_report+0x118/0x5d0 [ 30.672893] kasan_report+0xdc/0x128 [ 30.672937] __asan_report_load1_noabort+0x20/0x30 [ 30.672993] kmem_cache_rcu_uaf+0x388/0x468 [ 30.673044] kunit_try_run_case+0x170/0x3f0 [ 30.673102] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.673176] kthread+0x328/0x630 [ 30.673222] ret_from_fork+0x10/0x20 [ 30.673275] [ 30.673294] Allocated by task 244: [ 30.673327] kasan_save_stack+0x3c/0x68 [ 30.673375] kasan_save_track+0x20/0x40 [ 30.673416] kasan_save_alloc_info+0x40/0x58 [ 30.673454] __kasan_slab_alloc+0xa8/0xb0 [ 30.673493] kmem_cache_alloc_noprof+0x10c/0x398 [ 30.673537] kmem_cache_rcu_uaf+0x12c/0x468 [ 30.673576] kunit_try_run_case+0x170/0x3f0 [ 30.673614] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.673659] kthread+0x328/0x630 [ 30.673690] ret_from_fork+0x10/0x20 [ 30.673726] [ 30.673745] Freed by task 0: [ 30.673771] kasan_save_stack+0x3c/0x68 [ 30.673807] kasan_save_track+0x20/0x40 [ 30.673845] kasan_save_free_info+0x4c/0x78 [ 30.673880] __kasan_slab_free+0x6c/0x98 [ 30.673918] slab_free_after_rcu_debug+0xd4/0x2f8 [ 30.673960] rcu_core+0x9f4/0x1e20 [ 30.673997] rcu_core_si+0x18/0x30 [ 30.674032] handle_softirqs+0x374/0xb28 [ 30.674069] __do_softirq+0x1c/0x28 [ 30.674103] [ 30.674121] Last potentially related work creation: [ 30.674340] kasan_save_stack+0x3c/0x68 [ 30.674447] kasan_record_aux_stack+0xb4/0xc8 [ 30.674499] kmem_cache_free+0x120/0x468 [ 30.674538] kmem_cache_rcu_uaf+0x16c/0x468 [ 30.674575] kunit_try_run_case+0x170/0x3f0 [ 30.674614] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.674660] kthread+0x328/0x630 [ 30.674693] ret_from_fork+0x10/0x20 [ 30.675199] [ 30.675220] The buggy address belongs to the object at fff00000c9974000 [ 30.675220] which belongs to the cache test_cache of size 200 [ 30.675285] The buggy address is located 0 bytes inside of [ 30.675285] freed 200-byte region [fff00000c9974000, fff00000c99740c8) [ 30.675349] [ 30.675371] The buggy address belongs to the physical page: [ 30.675407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109974 [ 30.675465] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.675527] page_type: f5(slab) [ 30.675572] raw: 0bfffe0000000000 fff00000c3e37500 dead000000000122 0000000000000000 [ 30.675626] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 30.675672] page dumped because: kasan: bad access detected [ 30.675705] [ 30.675724] Memory state around the buggy address: [ 30.675758] fff00000c9973f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.675804] fff00000c9973f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.675849] >fff00000c9974000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.675890] ^ [ 30.675918] fff00000c9974080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 30.675962] fff00000c9974100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.676003] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 30.288574] ================================================================== [ 30.288665] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 30.288738] Free of addr fff00000c9978001 by task kunit_try_catch/242 [ 30.288792] [ 30.288832] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 30.288948] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.288979] Hardware name: linux,dummy-virt (DT) [ 30.289021] Call trace: [ 30.289046] show_stack+0x20/0x38 (C) [ 30.289101] dump_stack_lvl+0x8c/0xd0 [ 30.289169] print_report+0x118/0x5d0 [ 30.289216] kasan_report_invalid_free+0xc0/0xe8 [ 30.289310] check_slab_allocation+0xfc/0x108 [ 30.289395] __kasan_slab_pre_free+0x2c/0x48 [ 30.289919] kmem_cache_free+0xf0/0x468 [ 30.290007] kmem_cache_invalid_free+0x184/0x3c8 [ 30.290066] kunit_try_run_case+0x170/0x3f0 [ 30.290161] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.290227] kthread+0x328/0x630 [ 30.290272] ret_from_fork+0x10/0x20 [ 30.290325] [ 30.290343] Allocated by task 242: [ 30.290375] kasan_save_stack+0x3c/0x68 [ 30.290422] kasan_save_track+0x20/0x40 [ 30.290602] kasan_save_alloc_info+0x40/0x58 [ 30.290654] __kasan_slab_alloc+0xa8/0xb0 [ 30.290708] kmem_cache_alloc_noprof+0x10c/0x398 [ 30.290794] kmem_cache_invalid_free+0x12c/0x3c8 [ 30.290879] kunit_try_run_case+0x170/0x3f0 [ 30.290946] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.291011] kthread+0x328/0x630 [ 30.291070] ret_from_fork+0x10/0x20 [ 30.291117] [ 30.291147] The buggy address belongs to the object at fff00000c9978000 [ 30.291147] which belongs to the cache test_cache of size 200 [ 30.291350] The buggy address is located 1 bytes inside of [ 30.291350] 200-byte region [fff00000c9978000, fff00000c99780c8) [ 30.291436] [ 30.291458] The buggy address belongs to the physical page: [ 30.291506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109978 [ 30.291579] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.291642] page_type: f5(slab) [ 30.291742] raw: 0bfffe0000000000 fff00000c3e373c0 dead000000000122 0000000000000000 [ 30.291872] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 30.291983] page dumped because: kasan: bad access detected [ 30.292094] [ 30.292162] Memory state around the buggy address: [ 30.292271] fff00000c9977f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.292329] fff00000c9977f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.292634] >fff00000c9978000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.292748] ^ [ 30.292849] fff00000c9978080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 30.292939] fff00000c9978100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.293044] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 30.241616] ================================================================== [ 30.241885] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 30.242622] Free of addr fff00000c99aa000 by task kunit_try_catch/240 [ 30.242670] [ 30.243108] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 30.243716] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.243760] Hardware name: linux,dummy-virt (DT) [ 30.243883] Call trace: [ 30.244007] show_stack+0x20/0x38 (C) [ 30.244347] dump_stack_lvl+0x8c/0xd0 [ 30.244538] print_report+0x118/0x5d0 [ 30.244593] kasan_report_invalid_free+0xc0/0xe8 [ 30.245060] check_slab_allocation+0xd4/0x108 [ 30.245285] __kasan_slab_pre_free+0x2c/0x48 [ 30.245344] kmem_cache_free+0xf0/0x468 [ 30.245715] kmem_cache_double_free+0x190/0x3c8 [ 30.246097] kunit_try_run_case+0x170/0x3f0 [ 30.246432] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.246731] kthread+0x328/0x630 [ 30.246787] ret_from_fork+0x10/0x20 [ 30.247142] [ 30.247174] Allocated by task 240: [ 30.247324] kasan_save_stack+0x3c/0x68 [ 30.247377] kasan_save_track+0x20/0x40 [ 30.247441] kasan_save_alloc_info+0x40/0x58 [ 30.247647] __kasan_slab_alloc+0xa8/0xb0 [ 30.247820] kmem_cache_alloc_noprof+0x10c/0x398 [ 30.248052] kmem_cache_double_free+0x12c/0x3c8 [ 30.248095] kunit_try_run_case+0x170/0x3f0 [ 30.248439] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.248623] kthread+0x328/0x630 [ 30.248661] ret_from_fork+0x10/0x20 [ 30.248698] [ 30.248914] Freed by task 240: [ 30.249194] kasan_save_stack+0x3c/0x68 [ 30.249259] kasan_save_track+0x20/0x40 [ 30.249448] kasan_save_free_info+0x4c/0x78 [ 30.249487] __kasan_slab_free+0x6c/0x98 [ 30.249694] kmem_cache_free+0x260/0x468 [ 30.249842] kmem_cache_double_free+0x140/0x3c8 [ 30.250249] kunit_try_run_case+0x170/0x3f0 [ 30.250301] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.250357] kthread+0x328/0x630 [ 30.250389] ret_from_fork+0x10/0x20 [ 30.250426] [ 30.250445] The buggy address belongs to the object at fff00000c99aa000 [ 30.250445] which belongs to the cache test_cache of size 200 [ 30.251161] The buggy address is located 0 bytes inside of [ 30.251161] 200-byte region [fff00000c99aa000, fff00000c99aa0c8) [ 30.251233] [ 30.251264] The buggy address belongs to the physical page: [ 30.251309] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099aa [ 30.251469] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.251548] page_type: f5(slab) [ 30.251591] raw: 0bfffe0000000000 fff00000c582f8c0 dead000000000122 0000000000000000 [ 30.251990] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 30.252102] page dumped because: kasan: bad access detected [ 30.252386] [ 30.252693] Memory state around the buggy address: [ 30.252729] fff00000c99a9f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.253052] fff00000c99a9f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.253119] >fff00000c99aa000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.253323] ^ [ 30.253455] fff00000c99aa080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 30.253559] fff00000c99aa100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.253613] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 29.949051] ================================================================== [ 29.949143] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430 [ 29.949219] Read of size 1 at addr fff00000c99ac0c8 by task kunit_try_catch/238 [ 29.949311] [ 29.949358] CPU: 0 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 29.949447] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.949494] Hardware name: linux,dummy-virt (DT) [ 29.949711] Call trace: [ 29.949759] show_stack+0x20/0x38 (C) [ 29.949815] dump_stack_lvl+0x8c/0xd0 [ 29.949860] print_report+0x118/0x5d0 [ 29.949925] kasan_report+0xdc/0x128 [ 29.949973] __asan_report_load1_noabort+0x20/0x30 [ 29.950033] kmem_cache_oob+0x344/0x430 [ 29.950080] kunit_try_run_case+0x170/0x3f0 [ 29.950144] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.950217] kthread+0x328/0x630 [ 29.950283] ret_from_fork+0x10/0x20 [ 29.950488] [ 29.950515] Allocated by task 238: [ 29.950548] kasan_save_stack+0x3c/0x68 [ 29.950610] kasan_save_track+0x20/0x40 [ 29.950765] kasan_save_alloc_info+0x40/0x58 [ 29.950808] __kasan_slab_alloc+0xa8/0xb0 [ 29.950846] kmem_cache_alloc_noprof+0x10c/0x398 [ 29.950963] kmem_cache_oob+0x12c/0x430 [ 29.951023] kunit_try_run_case+0x170/0x3f0 [ 29.951118] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.951271] kthread+0x328/0x630 [ 29.951353] ret_from_fork+0x10/0x20 [ 29.951424] [ 29.951470] The buggy address belongs to the object at fff00000c99ac000 [ 29.951470] which belongs to the cache test_cache of size 200 [ 29.951536] The buggy address is located 0 bytes to the right of [ 29.951536] allocated 200-byte region [fff00000c99ac000, fff00000c99ac0c8) [ 29.951624] [ 29.951644] The buggy address belongs to the physical page: [ 29.951676] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099ac [ 29.951829] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.951887] page_type: f5(slab) [ 29.951926] raw: 0bfffe0000000000 fff00000c582f780 dead000000000122 0000000000000000 [ 29.951978] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 29.952062] page dumped because: kasan: bad access detected [ 29.952144] [ 29.952186] Memory state around the buggy address: [ 29.952230] fff00000c99abf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.952302] fff00000c99ac000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.952377] >fff00000c99ac080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 29.952416] ^ [ 29.952480] fff00000c99ac100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.952571] fff00000c99ac180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.952646] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 29.926630] ================================================================== [ 29.926727] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 29.926811] Read of size 8 at addr fff00000c999de80 by task kunit_try_catch/231 [ 29.926932] [ 29.926991] CPU: 0 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 29.927182] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.927244] Hardware name: linux,dummy-virt (DT) [ 29.927322] Call trace: [ 29.927380] show_stack+0x20/0x38 (C) [ 29.927433] dump_stack_lvl+0x8c/0xd0 [ 29.927479] print_report+0x118/0x5d0 [ 29.927528] kasan_report+0xdc/0x128 [ 29.927571] __asan_report_load8_noabort+0x20/0x30 [ 29.927878] workqueue_uaf+0x480/0x4a8 [ 29.928008] kunit_try_run_case+0x170/0x3f0 [ 29.928106] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.928252] kthread+0x328/0x630 [ 29.928320] ret_from_fork+0x10/0x20 [ 29.928416] [ 29.928523] Allocated by task 231: [ 29.928601] kasan_save_stack+0x3c/0x68 [ 29.928699] kasan_save_track+0x20/0x40 [ 29.928793] kasan_save_alloc_info+0x40/0x58 [ 29.928869] __kasan_kmalloc+0xd4/0xd8 [ 29.928910] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.929169] workqueue_uaf+0x13c/0x4a8 [ 29.929292] kunit_try_run_case+0x170/0x3f0 [ 29.929384] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.929507] kthread+0x328/0x630 [ 29.929577] ret_from_fork+0x10/0x20 [ 29.929616] [ 29.929637] Freed by task 75: [ 29.929673] kasan_save_stack+0x3c/0x68 [ 29.929713] kasan_save_track+0x20/0x40 [ 29.929751] kasan_save_free_info+0x4c/0x78 [ 29.929789] __kasan_slab_free+0x6c/0x98 [ 29.929826] kfree+0x214/0x3c8 [ 29.929861] workqueue_uaf_work+0x18/0x30 [ 29.929900] process_one_work+0x530/0xf98 [ 29.929939] worker_thread+0x618/0xf38 [ 29.929975] kthread+0x328/0x630 [ 29.930008] ret_from_fork+0x10/0x20 [ 29.930054] [ 29.930073] Last potentially related work creation: [ 29.930101] kasan_save_stack+0x3c/0x68 [ 29.930160] kasan_record_aux_stack+0xb4/0xc8 [ 29.930209] __queue_work+0x65c/0xfe0 [ 29.930249] queue_work_on+0xbc/0xf8 [ 29.930285] workqueue_uaf+0x210/0x4a8 [ 29.930321] kunit_try_run_case+0x170/0x3f0 [ 29.930369] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.930422] kthread+0x328/0x630 [ 29.930469] ret_from_fork+0x10/0x20 [ 29.930514] [ 29.930533] The buggy address belongs to the object at fff00000c999de80 [ 29.930533] which belongs to the cache kmalloc-32 of size 32 [ 29.930598] The buggy address is located 0 bytes inside of [ 29.930598] freed 32-byte region [fff00000c999de80, fff00000c999dea0) [ 29.930681] [ 29.930701] The buggy address belongs to the physical page: [ 29.930734] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10999d [ 29.930785] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.930833] page_type: f5(slab) [ 29.930877] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 29.930933] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 29.930981] page dumped because: kasan: bad access detected [ 29.931023] [ 29.931043] Memory state around the buggy address: [ 29.931083] fff00000c999dd80: 00 00 03 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 29.931607] fff00000c999de00: 00 00 00 fc fc fc fc fc 00 00 00 07 fc fc fc fc [ 29.931666] >fff00000c999de80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 29.931706] ^ [ 29.931735] fff00000c999df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.931780] fff00000c999df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.931820] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[ 29.911954] ================================================================== [ 29.912164] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 29.912237] Read of size 4 at addr fff00000c999dc80 by task ksoftirqd/0/15 [ 29.912287] [ 29.912328] CPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 29.912421] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.912458] Hardware name: linux,dummy-virt (DT) [ 29.912493] Call trace: [ 29.912516] show_stack+0x20/0x38 (C) [ 29.912568] dump_stack_lvl+0x8c/0xd0 [ 29.912620] print_report+0x118/0x5d0 [ 29.912669] kasan_report+0xdc/0x128 [ 29.912712] __asan_report_load4_noabort+0x20/0x30 [ 29.912759] rcu_uaf_reclaim+0x64/0x70 [ 29.912814] rcu_core+0x9f4/0x1e20 [ 29.912860] rcu_core_si+0x18/0x30 [ 29.912904] handle_softirqs+0x374/0xb28 [ 29.912950] run_ksoftirqd+0x80/0xb0 [ 29.913004] smpboot_thread_fn+0x2e8/0x760 [ 29.913052] kthread+0x328/0x630 [ 29.913100] ret_from_fork+0x10/0x20 [ 29.913171] [ 29.913192] Allocated by task 229: [ 29.913221] kasan_save_stack+0x3c/0x68 [ 29.913263] kasan_save_track+0x20/0x40 [ 29.913311] kasan_save_alloc_info+0x40/0x58 [ 29.913350] __kasan_kmalloc+0xd4/0xd8 [ 29.913388] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.913429] rcu_uaf+0xb0/0x2d8 [ 29.913464] kunit_try_run_case+0x170/0x3f0 [ 29.913506] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.913551] kthread+0x328/0x630 [ 29.913591] ret_from_fork+0x10/0x20 [ 29.913628] [ 29.913647] Freed by task 15: [ 29.913684] kasan_save_stack+0x3c/0x68 [ 29.913723] kasan_save_track+0x20/0x40 [ 29.913763] kasan_save_free_info+0x4c/0x78 [ 29.913799] __kasan_slab_free+0x6c/0x98 [ 29.913838] kfree+0x214/0x3c8 [ 29.913872] rcu_uaf_reclaim+0x28/0x70 [ 29.913908] rcu_core+0x9f4/0x1e20 [ 29.913951] rcu_core_si+0x18/0x30 [ 29.913997] handle_softirqs+0x374/0xb28 [ 29.914035] run_ksoftirqd+0x80/0xb0 [ 29.914084] smpboot_thread_fn+0x2e8/0x760 [ 29.914125] kthread+0x328/0x630 [ 29.914691] ret_from_fork+0x10/0x20 [ 29.914742] [ 29.914777] Last potentially related work creation: [ 29.914812] kasan_save_stack+0x3c/0x68 [ 29.914975] kasan_record_aux_stack+0xb4/0xc8 [ 29.915045] __call_rcu_common.constprop.0+0x74/0x8c8 [ 29.915121] call_rcu+0x18/0x30 [ 29.915167] rcu_uaf+0x14c/0x2d8 [ 29.915242] kunit_try_run_case+0x170/0x3f0 [ 29.915310] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.915537] kthread+0x328/0x630 [ 29.915575] ret_from_fork+0x10/0x20 [ 29.915622] [ 29.915690] The buggy address belongs to the object at fff00000c999dc80 [ 29.915690] which belongs to the cache kmalloc-32 of size 32 [ 29.915795] The buggy address is located 0 bytes inside of [ 29.915795] freed 32-byte region [fff00000c999dc80, fff00000c999dca0) [ 29.915926] [ 29.915987] The buggy address belongs to the physical page: [ 29.916032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10999d [ 29.916105] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.916204] page_type: f5(slab) [ 29.916257] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 29.916344] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 29.916407] page dumped because: kasan: bad access detected [ 29.916466] [ 29.916516] Memory state around the buggy address: [ 29.916584] fff00000c999db80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 29.916646] fff00000c999dc00: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 29.916709] >fff00000c999dc80: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 29.916773] ^ [ 29.916802] fff00000c999dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.916861] fff00000c999dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.916900] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 29.711176] ================================================================== [ 29.711227] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 29.711272] Read of size 1 at addr fff00000c9af0500 by task kunit_try_catch/227 [ 29.711321] [ 29.711380] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 29.711469] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.711494] Hardware name: linux,dummy-virt (DT) [ 29.711530] Call trace: [ 29.711551] show_stack+0x20/0x38 (C) [ 29.711597] dump_stack_lvl+0x8c/0xd0 [ 29.711640] print_report+0x118/0x5d0 [ 29.711683] kasan_report+0xdc/0x128 [ 29.711725] __asan_report_load1_noabort+0x20/0x30 [ 29.711771] ksize_uaf+0x598/0x5f8 [ 29.711814] kunit_try_run_case+0x170/0x3f0 [ 29.711862] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.711914] kthread+0x328/0x630 [ 29.711967] ret_from_fork+0x10/0x20 [ 29.712014] [ 29.712031] Allocated by task 227: [ 29.712057] kasan_save_stack+0x3c/0x68 [ 29.712098] kasan_save_track+0x20/0x40 [ 29.712147] kasan_save_alloc_info+0x40/0x58 [ 29.712185] __kasan_kmalloc+0xd4/0xd8 [ 29.712271] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.712372] ksize_uaf+0xb8/0x5f8 [ 29.712406] kunit_try_run_case+0x170/0x3f0 [ 29.712643] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.712692] kthread+0x328/0x630 [ 29.712725] ret_from_fork+0x10/0x20 [ 29.712761] [ 29.712780] Freed by task 227: [ 29.712806] kasan_save_stack+0x3c/0x68 [ 29.712844] kasan_save_track+0x20/0x40 [ 29.712882] kasan_save_free_info+0x4c/0x78 [ 29.712919] __kasan_slab_free+0x6c/0x98 [ 29.712956] kfree+0x214/0x3c8 [ 29.712990] ksize_uaf+0x11c/0x5f8 [ 29.713034] kunit_try_run_case+0x170/0x3f0 [ 29.713223] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.713424] kthread+0x328/0x630 [ 29.713536] ret_from_fork+0x10/0x20 [ 29.713572] [ 29.713660] The buggy address belongs to the object at fff00000c9af0500 [ 29.713660] which belongs to the cache kmalloc-128 of size 128 [ 29.713922] The buggy address is located 0 bytes inside of [ 29.713922] freed 128-byte region [fff00000c9af0500, fff00000c9af0580) [ 29.715250] [ 29.715281] The buggy address belongs to the physical page: [ 29.715315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109af0 [ 29.715367] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.715416] page_type: f5(slab) [ 29.715454] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.715508] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.715550] page dumped because: kasan: bad access detected [ 29.715581] [ 29.715600] Memory state around the buggy address: [ 29.715630] fff00000c9af0400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.715674] fff00000c9af0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.715718] >fff00000c9af0500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.715758] ^ [ 29.715783] fff00000c9af0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.715826] fff00000c9af0600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.715866] ================================================================== [ 29.706215] ================================================================== [ 29.706272] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 29.706318] Read of size 1 at addr fff00000c9af0500 by task kunit_try_catch/227 [ 29.706373] [ 29.706401] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 29.706617] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.706694] Hardware name: linux,dummy-virt (DT) [ 29.706861] Call trace: [ 29.706918] show_stack+0x20/0x38 (C) [ 29.706985] dump_stack_lvl+0x8c/0xd0 [ 29.707029] print_report+0x118/0x5d0 [ 29.707124] kasan_report+0xdc/0x128 [ 29.707179] __kasan_check_byte+0x54/0x70 [ 29.707227] ksize+0x30/0x88 [ 29.707269] ksize_uaf+0x168/0x5f8 [ 29.707313] kunit_try_run_case+0x170/0x3f0 [ 29.707359] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.707412] kthread+0x328/0x630 [ 29.707454] ret_from_fork+0x10/0x20 [ 29.707504] [ 29.707522] Allocated by task 227: [ 29.707550] kasan_save_stack+0x3c/0x68 [ 29.707590] kasan_save_track+0x20/0x40 [ 29.707640] kasan_save_alloc_info+0x40/0x58 [ 29.707678] __kasan_kmalloc+0xd4/0xd8 [ 29.707716] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.707755] ksize_uaf+0xb8/0x5f8 [ 29.707792] kunit_try_run_case+0x170/0x3f0 [ 29.707830] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.707882] kthread+0x328/0x630 [ 29.708014] ret_from_fork+0x10/0x20 [ 29.708096] [ 29.708153] Freed by task 227: [ 29.708181] kasan_save_stack+0x3c/0x68 [ 29.708325] kasan_save_track+0x20/0x40 [ 29.708364] kasan_save_free_info+0x4c/0x78 [ 29.708402] __kasan_slab_free+0x6c/0x98 [ 29.708439] kfree+0x214/0x3c8 [ 29.708472] ksize_uaf+0x11c/0x5f8 [ 29.708547] kunit_try_run_case+0x170/0x3f0 [ 29.708720] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.708794] kthread+0x328/0x630 [ 29.708827] ret_from_fork+0x10/0x20 [ 29.708903] [ 29.708992] The buggy address belongs to the object at fff00000c9af0500 [ 29.708992] which belongs to the cache kmalloc-128 of size 128 [ 29.709053] The buggy address is located 0 bytes inside of [ 29.709053] freed 128-byte region [fff00000c9af0500, fff00000c9af0580) [ 29.709550] [ 29.709709] The buggy address belongs to the physical page: [ 29.709745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109af0 [ 29.709800] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.709848] page_type: f5(slab) [ 29.709886] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.709938] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.709980] page dumped because: kasan: bad access detected [ 29.710012] [ 29.710031] Memory state around the buggy address: [ 29.710062] fff00000c9af0400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.710107] fff00000c9af0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.710169] >fff00000c9af0500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.710289] ^ [ 29.710349] fff00000c9af0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.710417] fff00000c9af0600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.710476] ================================================================== [ 29.716100] ================================================================== [ 29.716161] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 29.716216] Read of size 1 at addr fff00000c9af0578 by task kunit_try_catch/227 [ 29.716450] [ 29.716478] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 29.716564] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.716598] Hardware name: linux,dummy-virt (DT) [ 29.716735] Call trace: [ 29.716791] show_stack+0x20/0x38 (C) [ 29.716885] dump_stack_lvl+0x8c/0xd0 [ 29.716994] print_report+0x118/0x5d0 [ 29.717138] kasan_report+0xdc/0x128 [ 29.717186] __asan_report_load1_noabort+0x20/0x30 [ 29.717234] ksize_uaf+0x544/0x5f8 [ 29.717277] kunit_try_run_case+0x170/0x3f0 [ 29.717325] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.717379] kthread+0x328/0x630 [ 29.717420] ret_from_fork+0x10/0x20 [ 29.717464] [ 29.717482] Allocated by task 227: [ 29.717507] kasan_save_stack+0x3c/0x68 [ 29.717549] kasan_save_track+0x20/0x40 [ 29.717588] kasan_save_alloc_info+0x40/0x58 [ 29.717626] __kasan_kmalloc+0xd4/0xd8 [ 29.717664] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.717705] ksize_uaf+0xb8/0x5f8 [ 29.717738] kunit_try_run_case+0x170/0x3f0 [ 29.717778] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.717824] kthread+0x328/0x630 [ 29.717856] ret_from_fork+0x10/0x20 [ 29.717892] [ 29.717910] Freed by task 227: [ 29.717935] kasan_save_stack+0x3c/0x68 [ 29.717973] kasan_save_track+0x20/0x40 [ 29.718017] kasan_save_free_info+0x4c/0x78 [ 29.718762] __kasan_slab_free+0x6c/0x98 [ 29.718957] kfree+0x214/0x3c8 [ 29.719022] ksize_uaf+0x11c/0x5f8 [ 29.719075] kunit_try_run_case+0x170/0x3f0 [ 29.719115] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.719172] kthread+0x328/0x630 [ 29.719203] ret_from_fork+0x10/0x20 [ 29.719239] [ 29.719258] The buggy address belongs to the object at fff00000c9af0500 [ 29.719258] which belongs to the cache kmalloc-128 of size 128 [ 29.719343] The buggy address is located 120 bytes inside of [ 29.719343] freed 128-byte region [fff00000c9af0500, fff00000c9af0580) [ 29.719409] [ 29.719428] The buggy address belongs to the physical page: [ 29.719458] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109af0 [ 29.719514] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.719562] page_type: f5(slab) [ 29.719596] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.719771] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.719872] page dumped because: kasan: bad access detected [ 29.719905] [ 29.719922] Memory state around the buggy address: [ 29.719971] fff00000c9af0400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.720016] fff00000c9af0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.720060] >fff00000c9af0500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.720099] ^ [ 29.720151] fff00000c9af0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.720207] fff00000c9af0600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.720248] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 29.692591] ================================================================== [ 29.692649] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 29.692800] Read of size 1 at addr fff00000c9af0478 by task kunit_try_catch/225 [ 29.692886] [ 29.692913] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 29.693002] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.693027] Hardware name: linux,dummy-virt (DT) [ 29.693058] Call trace: [ 29.693080] show_stack+0x20/0x38 (C) [ 29.693139] dump_stack_lvl+0x8c/0xd0 [ 29.693184] print_report+0x118/0x5d0 [ 29.693226] kasan_report+0xdc/0x128 [ 29.693269] __asan_report_load1_noabort+0x20/0x30 [ 29.693327] ksize_unpoisons_memory+0x618/0x740 [ 29.693375] kunit_try_run_case+0x170/0x3f0 [ 29.693424] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.693478] kthread+0x328/0x630 [ 29.693518] ret_from_fork+0x10/0x20 [ 29.693564] [ 29.693582] Allocated by task 225: [ 29.693608] kasan_save_stack+0x3c/0x68 [ 29.693648] kasan_save_track+0x20/0x40 [ 29.693686] kasan_save_alloc_info+0x40/0x58 [ 29.693764] __kasan_kmalloc+0xd4/0xd8 [ 29.693918] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.694114] ksize_unpoisons_memory+0xc0/0x740 [ 29.694165] kunit_try_run_case+0x170/0x3f0 [ 29.694513] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.694718] kthread+0x328/0x630 [ 29.694755] ret_from_fork+0x10/0x20 [ 29.694797] [ 29.694860] The buggy address belongs to the object at fff00000c9af0400 [ 29.694860] which belongs to the cache kmalloc-128 of size 128 [ 29.695098] The buggy address is located 5 bytes to the right of [ 29.695098] allocated 115-byte region [fff00000c9af0400, fff00000c9af0473) [ 29.695176] [ 29.695196] The buggy address belongs to the physical page: [ 29.695227] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109af0 [ 29.695282] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.695330] page_type: f5(slab) [ 29.695373] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.695631] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.695790] page dumped because: kasan: bad access detected [ 29.695822] [ 29.695904] Memory state around the buggy address: [ 29.696059] fff00000c9af0300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.696554] fff00000c9af0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.696623] >fff00000c9af0400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.696663] ^ [ 29.696705] fff00000c9af0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.696802] fff00000c9af0500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.696843] ================================================================== [ 29.686679] ================================================================== [ 29.686785] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 29.686839] Read of size 1 at addr fff00000c9af0473 by task kunit_try_catch/225 [ 29.686891] [ 29.687247] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 29.687335] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.687407] Hardware name: linux,dummy-virt (DT) [ 29.687472] Call trace: [ 29.687603] show_stack+0x20/0x38 (C) [ 29.687674] dump_stack_lvl+0x8c/0xd0 [ 29.687720] print_report+0x118/0x5d0 [ 29.687771] kasan_report+0xdc/0x128 [ 29.687873] __asan_report_load1_noabort+0x20/0x30 [ 29.687998] ksize_unpoisons_memory+0x628/0x740 [ 29.688458] kunit_try_run_case+0x170/0x3f0 [ 29.688539] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.688595] kthread+0x328/0x630 [ 29.688638] ret_from_fork+0x10/0x20 [ 29.688685] [ 29.688703] Allocated by task 225: [ 29.688732] kasan_save_stack+0x3c/0x68 [ 29.688775] kasan_save_track+0x20/0x40 [ 29.688817] kasan_save_alloc_info+0x40/0x58 [ 29.688854] __kasan_kmalloc+0xd4/0xd8 [ 29.688901] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.689027] ksize_unpoisons_memory+0xc0/0x740 [ 29.689116] kunit_try_run_case+0x170/0x3f0 [ 29.689164] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.689208] kthread+0x328/0x630 [ 29.689239] ret_from_fork+0x10/0x20 [ 29.689274] [ 29.689292] The buggy address belongs to the object at fff00000c9af0400 [ 29.689292] which belongs to the cache kmalloc-128 of size 128 [ 29.689351] The buggy address is located 0 bytes to the right of [ 29.689351] allocated 115-byte region [fff00000c9af0400, fff00000c9af0473) [ 29.689418] [ 29.689437] The buggy address belongs to the physical page: [ 29.689475] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109af0 [ 29.689530] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.689577] page_type: f5(slab) [ 29.689614] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.689665] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.689734] page dumped because: kasan: bad access detected [ 29.689813] [ 29.689892] Memory state around the buggy address: [ 29.689949] fff00000c9af0300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.690048] fff00000c9af0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.690210] >fff00000c9af0400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.690251] ^ [ 29.690297] fff00000c9af0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.690498] fff00000c9af0500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.690682] ================================================================== [ 29.697298] ================================================================== [ 29.697347] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 29.697469] Read of size 1 at addr fff00000c9af047f by task kunit_try_catch/225 [ 29.697582] [ 29.697680] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 29.697789] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.697816] Hardware name: linux,dummy-virt (DT) [ 29.697847] Call trace: [ 29.697867] show_stack+0x20/0x38 (C) [ 29.697914] dump_stack_lvl+0x8c/0xd0 [ 29.697957] print_report+0x118/0x5d0 [ 29.697999] kasan_report+0xdc/0x128 [ 29.698068] __asan_report_load1_noabort+0x20/0x30 [ 29.698203] ksize_unpoisons_memory+0x690/0x740 [ 29.698411] kunit_try_run_case+0x170/0x3f0 [ 29.698463] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.698518] kthread+0x328/0x630 [ 29.698559] ret_from_fork+0x10/0x20 [ 29.698606] [ 29.698633] Allocated by task 225: [ 29.698710] kasan_save_stack+0x3c/0x68 [ 29.698809] kasan_save_track+0x20/0x40 [ 29.698848] kasan_save_alloc_info+0x40/0x58 [ 29.698884] __kasan_kmalloc+0xd4/0xd8 [ 29.698921] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.698959] ksize_unpoisons_memory+0xc0/0x740 [ 29.698998] kunit_try_run_case+0x170/0x3f0 [ 29.699036] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.699087] kthread+0x328/0x630 [ 29.699120] ret_from_fork+0x10/0x20 [ 29.699190] [ 29.699210] The buggy address belongs to the object at fff00000c9af0400 [ 29.699210] which belongs to the cache kmalloc-128 of size 128 [ 29.699268] The buggy address is located 12 bytes to the right of [ 29.699268] allocated 115-byte region [fff00000c9af0400, fff00000c9af0473) [ 29.699453] [ 29.699560] The buggy address belongs to the physical page: [ 29.699702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109af0 [ 29.699776] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.699824] page_type: f5(slab) [ 29.699865] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.699962] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.700117] page dumped because: kasan: bad access detected [ 29.700162] [ 29.700243] Memory state around the buggy address: [ 29.700278] fff00000c9af0300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.700324] fff00000c9af0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.700406] >fff00000c9af0400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.700593] ^ [ 29.700636] fff00000c9af0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.700843] fff00000c9af0500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.700931] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive
[ 29.665584] ================================================================== [ 29.665669] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 29.665720] Free of addr fff00000c8686b20 by task kunit_try_catch/223 [ 29.665762] [ 29.665792] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 29.665881] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.666708] Hardware name: linux,dummy-virt (DT) [ 29.667083] Call trace: [ 29.667110] show_stack+0x20/0x38 (C) [ 29.667481] dump_stack_lvl+0x8c/0xd0 [ 29.667889] print_report+0x118/0x5d0 [ 29.667979] kasan_report_invalid_free+0xc0/0xe8 [ 29.668027] check_slab_allocation+0xd4/0x108 [ 29.668569] __kasan_slab_pre_free+0x2c/0x48 [ 29.668871] kfree+0xe8/0x3c8 [ 29.668923] kfree_sensitive+0x3c/0xb0 [ 29.669142] kmalloc_double_kzfree+0x168/0x308 [ 29.669225] kunit_try_run_case+0x170/0x3f0 [ 29.669272] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.669327] kthread+0x328/0x630 [ 29.669369] ret_from_fork+0x10/0x20 [ 29.670350] [ 29.670765] Allocated by task 223: [ 29.670801] kasan_save_stack+0x3c/0x68 [ 29.670849] kasan_save_track+0x20/0x40 [ 29.670889] kasan_save_alloc_info+0x40/0x58 [ 29.670996] __kasan_kmalloc+0xd4/0xd8 [ 29.671160] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.671201] kmalloc_double_kzfree+0xb8/0x308 [ 29.671515] kunit_try_run_case+0x170/0x3f0 [ 29.671568] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.672046] kthread+0x328/0x630 [ 29.672083] ret_from_fork+0x10/0x20 [ 29.672353] [ 29.672375] Freed by task 223: [ 29.672790] kasan_save_stack+0x3c/0x68 [ 29.673091] kasan_save_track+0x20/0x40 [ 29.673225] kasan_save_free_info+0x4c/0x78 [ 29.673552] __kasan_slab_free+0x6c/0x98 [ 29.673598] kfree+0x214/0x3c8 [ 29.673631] kfree_sensitive+0x80/0xb0 [ 29.673669] kmalloc_double_kzfree+0x11c/0x308 [ 29.673712] kunit_try_run_case+0x170/0x3f0 [ 29.673796] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.673845] kthread+0x328/0x630 [ 29.673877] ret_from_fork+0x10/0x20 [ 29.674047] [ 29.674070] The buggy address belongs to the object at fff00000c8686b20 [ 29.674070] which belongs to the cache kmalloc-16 of size 16 [ 29.674224] The buggy address is located 0 bytes inside of [ 29.674224] 16-byte region [fff00000c8686b20, fff00000c8686b30) [ 29.674314] [ 29.674335] The buggy address belongs to the physical page: [ 29.674577] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c8686a40 pfn:0x108686 [ 29.674834] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.675182] page_type: f5(slab) [ 29.675354] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 29.675422] raw: fff00000c8686a40 000000008080007f 00000000f5000000 0000000000000000 [ 29.675464] page dumped because: kasan: bad access detected [ 29.675497] [ 29.675707] Memory state around the buggy address: [ 29.675994] fff00000c8686a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.676043] fff00000c8686a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.676143] >fff00000c8686b00: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 29.676184] ^ [ 29.676264] fff00000c8686b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.676509] fff00000c8686c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.676551] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[ 29.656575] ================================================================== [ 29.656799] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 29.656978] Read of size 1 at addr fff00000c8686b20 by task kunit_try_catch/223 [ 29.657685] [ 29.657767] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 29.658057] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.658085] Hardware name: linux,dummy-virt (DT) [ 29.658172] Call trace: [ 29.658196] show_stack+0x20/0x38 (C) [ 29.658489] dump_stack_lvl+0x8c/0xd0 [ 29.658693] print_report+0x118/0x5d0 [ 29.658839] kasan_report+0xdc/0x128 [ 29.658994] __kasan_check_byte+0x54/0x70 [ 29.659111] kfree_sensitive+0x30/0xb0 [ 29.659228] kmalloc_double_kzfree+0x168/0x308 [ 29.659277] kunit_try_run_case+0x170/0x3f0 [ 29.659615] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.659669] kthread+0x328/0x630 [ 29.659818] ret_from_fork+0x10/0x20 [ 29.659938] [ 29.660002] Allocated by task 223: [ 29.660055] kasan_save_stack+0x3c/0x68 [ 29.660098] kasan_save_track+0x20/0x40 [ 29.660145] kasan_save_alloc_info+0x40/0x58 [ 29.660183] __kasan_kmalloc+0xd4/0xd8 [ 29.660220] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.660261] kmalloc_double_kzfree+0xb8/0x308 [ 29.660299] kunit_try_run_case+0x170/0x3f0 [ 29.660339] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.660416] kthread+0x328/0x630 [ 29.660450] ret_from_fork+0x10/0x20 [ 29.660498] [ 29.660518] Freed by task 223: [ 29.660588] kasan_save_stack+0x3c/0x68 [ 29.660629] kasan_save_track+0x20/0x40 [ 29.660667] kasan_save_free_info+0x4c/0x78 [ 29.660705] __kasan_slab_free+0x6c/0x98 [ 29.660743] kfree+0x214/0x3c8 [ 29.660787] kfree_sensitive+0x80/0xb0 [ 29.660940] kmalloc_double_kzfree+0x11c/0x308 [ 29.661022] kunit_try_run_case+0x170/0x3f0 [ 29.661101] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.661155] kthread+0x328/0x630 [ 29.661186] ret_from_fork+0x10/0x20 [ 29.661223] [ 29.661241] The buggy address belongs to the object at fff00000c8686b20 [ 29.661241] which belongs to the cache kmalloc-16 of size 16 [ 29.661301] The buggy address is located 0 bytes inside of [ 29.661301] freed 16-byte region [fff00000c8686b20, fff00000c8686b30) [ 29.661365] [ 29.661385] The buggy address belongs to the physical page: [ 29.661479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c8686a40 pfn:0x108686 [ 29.661743] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.661981] page_type: f5(slab) [ 29.662110] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 29.662316] raw: fff00000c8686a40 000000008080007f 00000000f5000000 0000000000000000 [ 29.662364] page dumped because: kasan: bad access detected [ 29.662634] [ 29.662652] Memory state around the buggy address: [ 29.662686] fff00000c8686a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.662730] fff00000c8686a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.662774] >fff00000c8686b00: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 29.663002] ^ [ 29.663043] fff00000c8686b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.663089] fff00000c8686c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.663196] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[ 29.626094] ================================================================== [ 29.626169] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 29.626221] Read of size 1 at addr fff00000c99b0ca8 by task kunit_try_catch/219 [ 29.626272] [ 29.626304] CPU: 0 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 29.626390] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.626419] Hardware name: linux,dummy-virt (DT) [ 29.626449] Call trace: [ 29.626473] show_stack+0x20/0x38 (C) [ 29.626520] dump_stack_lvl+0x8c/0xd0 [ 29.626676] print_report+0x118/0x5d0 [ 29.626916] kasan_report+0xdc/0x128 [ 29.627356] __asan_report_load1_noabort+0x20/0x30 [ 29.627418] kmalloc_uaf2+0x3f4/0x468 [ 29.627463] kunit_try_run_case+0x170/0x3f0 [ 29.627526] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.627581] kthread+0x328/0x630 [ 29.627623] ret_from_fork+0x10/0x20 [ 29.628437] [ 29.628457] Allocated by task 219: [ 29.628486] kasan_save_stack+0x3c/0x68 [ 29.628627] kasan_save_track+0x20/0x40 [ 29.628989] kasan_save_alloc_info+0x40/0x58 [ 29.629251] __kasan_kmalloc+0xd4/0xd8 [ 29.629631] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.629674] kmalloc_uaf2+0xc4/0x468 [ 29.629811] kunit_try_run_case+0x170/0x3f0 [ 29.629869] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.630503] kthread+0x328/0x630 [ 29.630991] ret_from_fork+0x10/0x20 [ 29.631064] [ 29.631083] Freed by task 219: [ 29.631111] kasan_save_stack+0x3c/0x68 [ 29.631165] kasan_save_track+0x20/0x40 [ 29.631202] kasan_save_free_info+0x4c/0x78 [ 29.631241] __kasan_slab_free+0x6c/0x98 [ 29.631280] kfree+0x214/0x3c8 [ 29.631313] kmalloc_uaf2+0x134/0x468 [ 29.631351] kunit_try_run_case+0x170/0x3f0 [ 29.632124] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.632626] kthread+0x328/0x630 [ 29.632661] ret_from_fork+0x10/0x20 [ 29.632697] [ 29.632716] The buggy address belongs to the object at fff00000c99b0c80 [ 29.632716] which belongs to the cache kmalloc-64 of size 64 [ 29.633296] The buggy address is located 40 bytes inside of [ 29.633296] freed 64-byte region [fff00000c99b0c80, fff00000c99b0cc0) [ 29.633481] [ 29.633502] The buggy address belongs to the physical page: [ 29.633904] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099b0 [ 29.633977] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.634140] page_type: f5(slab) [ 29.634261] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.634524] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.634724] page dumped because: kasan: bad access detected [ 29.634758] [ 29.634777] Memory state around the buggy address: [ 29.634809] fff00000c99b0b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.635034] fff00000c99b0c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.635082] >fff00000c99b0c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.635388] ^ [ 29.635642] fff00000c99b0d00: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 29.635689] fff00000c99b0d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.636212] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 29.605399] ================================================================== [ 29.605863] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 29.605930] Write of size 33 at addr fff00000c99b0b00 by task kunit_try_catch/217 [ 29.605994] [ 29.606035] CPU: 0 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 29.606402] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.606642] Hardware name: linux,dummy-virt (DT) [ 29.606715] Call trace: [ 29.607027] show_stack+0x20/0x38 (C) [ 29.607329] dump_stack_lvl+0x8c/0xd0 [ 29.607388] print_report+0x118/0x5d0 [ 29.607434] kasan_report+0xdc/0x128 [ 29.607518] kasan_check_range+0x100/0x1a8 [ 29.607566] __asan_memset+0x34/0x78 [ 29.607796] kmalloc_uaf_memset+0x170/0x310 [ 29.607846] kunit_try_run_case+0x170/0x3f0 [ 29.608213] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.608520] kthread+0x328/0x630 [ 29.608669] ret_from_fork+0x10/0x20 [ 29.608719] [ 29.608738] Allocated by task 217: [ 29.609199] kasan_save_stack+0x3c/0x68 [ 29.609252] kasan_save_track+0x20/0x40 [ 29.609292] kasan_save_alloc_info+0x40/0x58 [ 29.609328] __kasan_kmalloc+0xd4/0xd8 [ 29.609366] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.610055] kmalloc_uaf_memset+0xb8/0x310 [ 29.610108] kunit_try_run_case+0x170/0x3f0 [ 29.610159] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.610206] kthread+0x328/0x630 [ 29.610749] ret_from_fork+0x10/0x20 [ 29.610797] [ 29.610817] Freed by task 217: [ 29.610844] kasan_save_stack+0x3c/0x68 [ 29.610930] kasan_save_track+0x20/0x40 [ 29.610975] kasan_save_free_info+0x4c/0x78 [ 29.611024] __kasan_slab_free+0x6c/0x98 [ 29.611098] kfree+0x214/0x3c8 [ 29.611238] kmalloc_uaf_memset+0x11c/0x310 [ 29.611565] kunit_try_run_case+0x170/0x3f0 [ 29.611614] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.611660] kthread+0x328/0x630 [ 29.611715] ret_from_fork+0x10/0x20 [ 29.611752] [ 29.611837] The buggy address belongs to the object at fff00000c99b0b00 [ 29.611837] which belongs to the cache kmalloc-64 of size 64 [ 29.612384] The buggy address is located 0 bytes inside of [ 29.612384] freed 64-byte region [fff00000c99b0b00, fff00000c99b0b40) [ 29.612568] [ 29.612589] The buggy address belongs to the physical page: [ 29.612869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099b0 [ 29.613423] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.613489] page_type: f5(slab) [ 29.613783] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.613850] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.614355] page dumped because: kasan: bad access detected [ 29.614393] [ 29.614637] Memory state around the buggy address: [ 29.614688] fff00000c99b0a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.614743] fff00000c99b0a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.615102] >fff00000c99b0b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.615155] ^ [ 29.615185] fff00000c99b0b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.615229] fff00000c99b0c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.615269] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[ 29.583466] ================================================================== [ 29.583535] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 29.583682] Read of size 1 at addr fff00000c8686b08 by task kunit_try_catch/215 [ 29.584159] [ 29.584469] CPU: 0 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 29.584566] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.584593] Hardware name: linux,dummy-virt (DT) [ 29.584625] Call trace: [ 29.585343] show_stack+0x20/0x38 (C) [ 29.585492] dump_stack_lvl+0x8c/0xd0 [ 29.585985] print_report+0x118/0x5d0 [ 29.586152] kasan_report+0xdc/0x128 [ 29.586199] __asan_report_load1_noabort+0x20/0x30 [ 29.586249] kmalloc_uaf+0x300/0x338 [ 29.586292] kunit_try_run_case+0x170/0x3f0 [ 29.586736] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.586809] kthread+0x328/0x630 [ 29.586880] ret_from_fork+0x10/0x20 [ 29.587250] [ 29.587269] Allocated by task 215: [ 29.587317] kasan_save_stack+0x3c/0x68 [ 29.587370] kasan_save_track+0x20/0x40 [ 29.587417] kasan_save_alloc_info+0x40/0x58 [ 29.587456] __kasan_kmalloc+0xd4/0xd8 [ 29.587904] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.587946] kmalloc_uaf+0xb8/0x338 [ 29.588199] kunit_try_run_case+0x170/0x3f0 [ 29.588248] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.588353] kthread+0x328/0x630 [ 29.588389] ret_from_fork+0x10/0x20 [ 29.588424] [ 29.588818] Freed by task 215: [ 29.588846] kasan_save_stack+0x3c/0x68 [ 29.589328] kasan_save_track+0x20/0x40 [ 29.589481] kasan_save_free_info+0x4c/0x78 [ 29.589518] __kasan_slab_free+0x6c/0x98 [ 29.589846] kfree+0x214/0x3c8 [ 29.589888] kmalloc_uaf+0x11c/0x338 [ 29.590259] kunit_try_run_case+0x170/0x3f0 [ 29.590305] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.590677] kthread+0x328/0x630 [ 29.590722] ret_from_fork+0x10/0x20 [ 29.590770] [ 29.590825] The buggy address belongs to the object at fff00000c8686b00 [ 29.590825] which belongs to the cache kmalloc-16 of size 16 [ 29.591026] The buggy address is located 8 bytes inside of [ 29.591026] freed 16-byte region [fff00000c8686b00, fff00000c8686b10) [ 29.591091] [ 29.591392] The buggy address belongs to the physical page: [ 29.591560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c8686a40 pfn:0x108686 [ 29.591621] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.591672] page_type: f5(slab) [ 29.591711] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 29.591762] raw: fff00000c8686a40 000000008080007f 00000000f5000000 0000000000000000 [ 29.591807] page dumped because: kasan: bad access detected [ 29.591840] [ 29.592767] Memory state around the buggy address: [ 29.592995] fff00000c8686a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.593048] fff00000c8686a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.593094] >fff00000c8686b00: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.593210] ^ [ 29.593243] fff00000c8686b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.593288] fff00000c8686c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.593644] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 29.556465] ================================================================== [ 29.556532] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0 [ 29.556590] Read of size 64 at addr fff00000c99b0884 by task kunit_try_catch/213 [ 29.556641] [ 29.556675] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 29.557748] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.558158] Hardware name: linux,dummy-virt (DT) [ 29.558231] Call trace: [ 29.558253] show_stack+0x20/0x38 (C) [ 29.558309] dump_stack_lvl+0x8c/0xd0 [ 29.558356] print_report+0x118/0x5d0 [ 29.558761] kasan_report+0xdc/0x128 [ 29.559040] kasan_check_range+0x100/0x1a8 [ 29.559507] __asan_memmove+0x3c/0x98 [ 29.559555] kmalloc_memmove_invalid_size+0x154/0x2e0 [ 29.559791] kunit_try_run_case+0x170/0x3f0 [ 29.559849] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.560025] kthread+0x328/0x630 [ 29.560192] ret_from_fork+0x10/0x20 [ 29.560278] [ 29.560430] Allocated by task 213: [ 29.560459] kasan_save_stack+0x3c/0x68 [ 29.560759] kasan_save_track+0x20/0x40 [ 29.560806] kasan_save_alloc_info+0x40/0x58 [ 29.560860] __kasan_kmalloc+0xd4/0xd8 [ 29.560951] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.561414] kmalloc_memmove_invalid_size+0xb0/0x2e0 [ 29.561528] kunit_try_run_case+0x170/0x3f0 [ 29.561747] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.561798] kthread+0x328/0x630 [ 29.561832] ret_from_fork+0x10/0x20 [ 29.561869] [ 29.561889] The buggy address belongs to the object at fff00000c99b0880 [ 29.561889] which belongs to the cache kmalloc-64 of size 64 [ 29.562173] The buggy address is located 4 bytes inside of [ 29.562173] allocated 64-byte region [fff00000c99b0880, fff00000c99b08c0) [ 29.562685] [ 29.562710] The buggy address belongs to the physical page: [ 29.562745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099b0 [ 29.563348] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.563418] page_type: f5(slab) [ 29.563460] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.563516] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.563557] page dumped because: kasan: bad access detected [ 29.563590] [ 29.563609] Memory state around the buggy address: [ 29.564544] fff00000c99b0780: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc [ 29.564819] fff00000c99b0800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.564985] >fff00000c99b0880: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 29.565040] ^ [ 29.565078] fff00000c99b0900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.565396] fff00000c99b0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.565441] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 29.537434] ================================================================== [ 29.537508] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 29.537846] Read of size 18446744073709551614 at addr fff00000c99b0684 by task kunit_try_catch/211 [ 29.538051] [ 29.538318] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 29.538757] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.538788] Hardware name: linux,dummy-virt (DT) [ 29.538821] Call trace: [ 29.538844] show_stack+0x20/0x38 (C) [ 29.538898] dump_stack_lvl+0x8c/0xd0 [ 29.538947] print_report+0x118/0x5d0 [ 29.538989] kasan_report+0xdc/0x128 [ 29.539377] kasan_check_range+0x100/0x1a8 [ 29.539424] __asan_memmove+0x3c/0x98 [ 29.539710] kmalloc_memmove_negative_size+0x154/0x2e0 [ 29.539779] kunit_try_run_case+0x170/0x3f0 [ 29.540066] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.540415] kthread+0x328/0x630 [ 29.540467] ret_from_fork+0x10/0x20 [ 29.540516] [ 29.540535] Allocated by task 211: [ 29.540983] kasan_save_stack+0x3c/0x68 [ 29.541097] kasan_save_track+0x20/0x40 [ 29.541153] kasan_save_alloc_info+0x40/0x58 [ 29.541469] __kasan_kmalloc+0xd4/0xd8 [ 29.541515] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.541555] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 29.542006] kunit_try_run_case+0x170/0x3f0 [ 29.542367] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.542624] kthread+0x328/0x630 [ 29.542798] ret_from_fork+0x10/0x20 [ 29.542836] [ 29.542857] The buggy address belongs to the object at fff00000c99b0680 [ 29.542857] which belongs to the cache kmalloc-64 of size 64 [ 29.542918] The buggy address is located 4 bytes inside of [ 29.542918] 64-byte region [fff00000c99b0680, fff00000c99b06c0) [ 29.542981] [ 29.543001] The buggy address belongs to the physical page: [ 29.543034] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099b0 [ 29.543172] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.543228] page_type: f5(slab) [ 29.543582] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.543853] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.544332] page dumped because: kasan: bad access detected [ 29.544366] [ 29.544385] Memory state around the buggy address: [ 29.544419] fff00000c99b0580: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc [ 29.544464] fff00000c99b0600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.544508] >fff00000c99b0680: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 29.544551] ^ [ 29.544578] fff00000c99b0700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.544622] fff00000c99b0780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.544661] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[ 29.509211] ================================================================== [ 29.509293] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 29.509344] Write of size 16 at addr fff00000c9af0369 by task kunit_try_catch/209 [ 29.509433] [ 29.509476] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 29.509786] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.509823] Hardware name: linux,dummy-virt (DT) [ 29.510096] Call trace: [ 29.510177] show_stack+0x20/0x38 (C) [ 29.510432] dump_stack_lvl+0x8c/0xd0 [ 29.510523] print_report+0x118/0x5d0 [ 29.510565] kasan_report+0xdc/0x128 [ 29.510607] kasan_check_range+0x100/0x1a8 [ 29.510651] __asan_memset+0x34/0x78 [ 29.510693] kmalloc_oob_memset_16+0x150/0x2f8 [ 29.510903] kunit_try_run_case+0x170/0x3f0 [ 29.511002] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.511070] kthread+0x328/0x630 [ 29.511111] ret_from_fork+0x10/0x20 [ 29.511568] [ 29.511589] Allocated by task 209: [ 29.511896] kasan_save_stack+0x3c/0x68 [ 29.511978] kasan_save_track+0x20/0x40 [ 29.512499] kasan_save_alloc_info+0x40/0x58 [ 29.512884] __kasan_kmalloc+0xd4/0xd8 [ 29.513187] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.513245] kmalloc_oob_memset_16+0xb0/0x2f8 [ 29.513911] kunit_try_run_case+0x170/0x3f0 [ 29.514393] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.514459] kthread+0x328/0x630 [ 29.514493] ret_from_fork+0x10/0x20 [ 29.514661] [ 29.514749] The buggy address belongs to the object at fff00000c9af0300 [ 29.514749] which belongs to the cache kmalloc-128 of size 128 [ 29.514814] The buggy address is located 105 bytes inside of [ 29.514814] allocated 120-byte region [fff00000c9af0300, fff00000c9af0378) [ 29.514880] [ 29.514900] The buggy address belongs to the physical page: [ 29.514933] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109af0 [ 29.514987] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.515034] page_type: f5(slab) [ 29.516043] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.516374] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.516420] page dumped because: kasan: bad access detected [ 29.516843] [ 29.517054] Memory state around the buggy address: [ 29.517337] fff00000c9af0200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.517602] fff00000c9af0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.517697] >fff00000c9af0300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.517738] ^ [ 29.518046] fff00000c9af0380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.518373] fff00000c9af0400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.518425] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[ 29.496573] ================================================================== [ 29.496627] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 29.496673] Write of size 8 at addr fff00000c9af0271 by task kunit_try_catch/207 [ 29.496731] [ 29.496873] CPU: 0 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 29.496958] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.496984] Hardware name: linux,dummy-virt (DT) [ 29.497013] Call trace: [ 29.497035] show_stack+0x20/0x38 (C) [ 29.497082] dump_stack_lvl+0x8c/0xd0 [ 29.497125] print_report+0x118/0x5d0 [ 29.497180] kasan_report+0xdc/0x128 [ 29.497221] kasan_check_range+0x100/0x1a8 [ 29.497265] __asan_memset+0x34/0x78 [ 29.497307] kmalloc_oob_memset_8+0x150/0x2f8 [ 29.497353] kunit_try_run_case+0x170/0x3f0 [ 29.497398] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.497450] kthread+0x328/0x630 [ 29.497490] ret_from_fork+0x10/0x20 [ 29.497535] [ 29.497553] Allocated by task 207: [ 29.497578] kasan_save_stack+0x3c/0x68 [ 29.497617] kasan_save_track+0x20/0x40 [ 29.497655] kasan_save_alloc_info+0x40/0x58 [ 29.497691] __kasan_kmalloc+0xd4/0xd8 [ 29.497727] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.497766] kmalloc_oob_memset_8+0xb0/0x2f8 [ 29.497804] kunit_try_run_case+0x170/0x3f0 [ 29.497860] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.497905] kthread+0x328/0x630 [ 29.497949] ret_from_fork+0x10/0x20 [ 29.497993] [ 29.498011] The buggy address belongs to the object at fff00000c9af0200 [ 29.498011] which belongs to the cache kmalloc-128 of size 128 [ 29.498103] The buggy address is located 113 bytes inside of [ 29.498103] allocated 120-byte region [fff00000c9af0200, fff00000c9af0278) [ 29.498175] [ 29.498217] The buggy address belongs to the physical page: [ 29.498247] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109af0 [ 29.498297] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.498342] page_type: f5(slab) [ 29.498387] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.498447] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.498566] page dumped because: kasan: bad access detected [ 29.498668] [ 29.498686] Memory state around the buggy address: [ 29.498722] fff00000c9af0100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.498824] fff00000c9af0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.498903] >fff00000c9af0200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.498941] ^ [ 29.498999] fff00000c9af0280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.499068] fff00000c9af0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.499107] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[ 29.489394] ================================================================== [ 29.489467] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 29.489519] Write of size 4 at addr fff00000c9af0175 by task kunit_try_catch/205 [ 29.489577] [ 29.489608] CPU: 0 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 29.489693] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.489719] Hardware name: linux,dummy-virt (DT) [ 29.489748] Call trace: [ 29.489770] show_stack+0x20/0x38 (C) [ 29.489817] dump_stack_lvl+0x8c/0xd0 [ 29.489931] print_report+0x118/0x5d0 [ 29.489975] kasan_report+0xdc/0x128 [ 29.490016] kasan_check_range+0x100/0x1a8 [ 29.490060] __asan_memset+0x34/0x78 [ 29.490101] kmalloc_oob_memset_4+0x150/0x300 [ 29.490158] kunit_try_run_case+0x170/0x3f0 [ 29.490205] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.490257] kthread+0x328/0x630 [ 29.490297] ret_from_fork+0x10/0x20 [ 29.490342] [ 29.490360] Allocated by task 205: [ 29.490395] kasan_save_stack+0x3c/0x68 [ 29.490435] kasan_save_track+0x20/0x40 [ 29.490472] kasan_save_alloc_info+0x40/0x58 [ 29.490509] __kasan_kmalloc+0xd4/0xd8 [ 29.490556] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.490608] kmalloc_oob_memset_4+0xb0/0x300 [ 29.490662] kunit_try_run_case+0x170/0x3f0 [ 29.490843] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.490890] kthread+0x328/0x630 [ 29.490922] ret_from_fork+0x10/0x20 [ 29.490957] [ 29.491020] The buggy address belongs to the object at fff00000c9af0100 [ 29.491020] which belongs to the cache kmalloc-128 of size 128 [ 29.491079] The buggy address is located 117 bytes inside of [ 29.491079] allocated 120-byte region [fff00000c9af0100, fff00000c9af0178) [ 29.491160] [ 29.491180] The buggy address belongs to the physical page: [ 29.491210] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109af0 [ 29.491272] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.491319] page_type: f5(slab) [ 29.491355] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.491419] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.491460] page dumped because: kasan: bad access detected [ 29.491521] [ 29.491539] Memory state around the buggy address: [ 29.491569] fff00000c9af0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.491612] fff00000c9af0080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.491711] >fff00000c9af0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.491889] ^ [ 29.491985] fff00000c9af0180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.492072] fff00000c9af0200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.492147] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[ 29.480198] ================================================================== [ 29.480362] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 29.480413] Write of size 2 at addr fff00000c9af0077 by task kunit_try_catch/203 [ 29.480628] [ 29.480711] CPU: 0 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 29.480981] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.481058] Hardware name: linux,dummy-virt (DT) [ 29.481089] Call trace: [ 29.481201] show_stack+0x20/0x38 (C) [ 29.481282] dump_stack_lvl+0x8c/0xd0 [ 29.481381] print_report+0x118/0x5d0 [ 29.481424] kasan_report+0xdc/0x128 [ 29.481471] kasan_check_range+0x100/0x1a8 [ 29.481567] __asan_memset+0x34/0x78 [ 29.481699] kmalloc_oob_memset_2+0x150/0x2f8 [ 29.481897] kunit_try_run_case+0x170/0x3f0 [ 29.481944] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.481997] kthread+0x328/0x630 [ 29.482037] ret_from_fork+0x10/0x20 [ 29.482082] [ 29.482100] Allocated by task 203: [ 29.482835] kasan_save_stack+0x3c/0x68 [ 29.482908] kasan_save_track+0x20/0x40 [ 29.482978] kasan_save_alloc_info+0x40/0x58 [ 29.483015] __kasan_kmalloc+0xd4/0xd8 [ 29.483070] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.483110] kmalloc_oob_memset_2+0xb0/0x2f8 [ 29.483157] kunit_try_run_case+0x170/0x3f0 [ 29.483195] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.483240] kthread+0x328/0x630 [ 29.483271] ret_from_fork+0x10/0x20 [ 29.483305] [ 29.483324] The buggy address belongs to the object at fff00000c9af0000 [ 29.483324] which belongs to the cache kmalloc-128 of size 128 [ 29.483381] The buggy address is located 119 bytes inside of [ 29.483381] allocated 120-byte region [fff00000c9af0000, fff00000c9af0078) [ 29.483461] [ 29.483568] The buggy address belongs to the physical page: [ 29.483623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109af0 [ 29.483711] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.483842] page_type: f5(slab) [ 29.483880] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.483930] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.483983] page dumped because: kasan: bad access detected [ 29.484014] [ 29.484031] Memory state around the buggy address: [ 29.484062] fff00000c9aeff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.484105] fff00000c9aeff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.484156] >fff00000c9af0000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.484194] ^ [ 29.484288] fff00000c9af0080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.484337] fff00000c9af0100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.484375] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 29.470115] ================================================================== [ 29.470191] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 29.470243] Write of size 128 at addr fff00000c5a4df00 by task kunit_try_catch/201 [ 29.470293] [ 29.470403] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 29.470731] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.470818] Hardware name: linux,dummy-virt (DT) [ 29.470854] Call trace: [ 29.470894] show_stack+0x20/0x38 (C) [ 29.471002] dump_stack_lvl+0x8c/0xd0 [ 29.471047] print_report+0x118/0x5d0 [ 29.471088] kasan_report+0xdc/0x128 [ 29.471139] kasan_check_range+0x100/0x1a8 [ 29.471183] __asan_memset+0x34/0x78 [ 29.471235] kmalloc_oob_in_memset+0x144/0x2d0 [ 29.471292] kunit_try_run_case+0x170/0x3f0 [ 29.471340] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.471409] kthread+0x328/0x630 [ 29.471449] ret_from_fork+0x10/0x20 [ 29.471497] [ 29.471523] Allocated by task 201: [ 29.471550] kasan_save_stack+0x3c/0x68 [ 29.471684] kasan_save_track+0x20/0x40 [ 29.471724] kasan_save_alloc_info+0x40/0x58 [ 29.472152] __kasan_kmalloc+0xd4/0xd8 [ 29.472197] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.472236] kmalloc_oob_in_memset+0xb0/0x2d0 [ 29.472274] kunit_try_run_case+0x170/0x3f0 [ 29.472312] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.472395] kthread+0x328/0x630 [ 29.472547] ret_from_fork+0x10/0x20 [ 29.472697] [ 29.472718] The buggy address belongs to the object at fff00000c5a4df00 [ 29.472718] which belongs to the cache kmalloc-128 of size 128 [ 29.472821] The buggy address is located 0 bytes inside of [ 29.472821] allocated 120-byte region [fff00000c5a4df00, fff00000c5a4df78) [ 29.472991] [ 29.473094] The buggy address belongs to the physical page: [ 29.473125] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a4d [ 29.473187] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.473235] page_type: f5(slab) [ 29.473273] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.473322] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.473373] page dumped because: kasan: bad access detected [ 29.473403] [ 29.473422] Memory state around the buggy address: [ 29.473464] fff00000c5a4de00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.473507] fff00000c5a4de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.473549] >fff00000c5a4df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.473587] ^ [ 29.473626] fff00000c5a4df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.473678] fff00000c5a4e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.473717] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[ 29.460815] ================================================================== [ 29.460873] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 29.460944] Read of size 16 at addr fff00000c8686ae0 by task kunit_try_catch/199 [ 29.461173] [ 29.461208] CPU: 0 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 29.461295] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.461320] Hardware name: linux,dummy-virt (DT) [ 29.461350] Call trace: [ 29.461371] show_stack+0x20/0x38 (C) [ 29.461420] dump_stack_lvl+0x8c/0xd0 [ 29.461464] print_report+0x118/0x5d0 [ 29.461507] kasan_report+0xdc/0x128 [ 29.461551] __asan_report_load16_noabort+0x20/0x30 [ 29.461600] kmalloc_uaf_16+0x3bc/0x438 [ 29.461644] kunit_try_run_case+0x170/0x3f0 [ 29.461692] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.461745] kthread+0x328/0x630 [ 29.461786] ret_from_fork+0x10/0x20 [ 29.461832] [ 29.461849] Allocated by task 199: [ 29.461875] kasan_save_stack+0x3c/0x68 [ 29.461914] kasan_save_track+0x20/0x40 [ 29.461951] kasan_save_alloc_info+0x40/0x58 [ 29.461987] __kasan_kmalloc+0xd4/0xd8 [ 29.462023] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.462061] kmalloc_uaf_16+0x140/0x438 [ 29.462096] kunit_try_run_case+0x170/0x3f0 [ 29.462145] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.462205] kthread+0x328/0x630 [ 29.462238] ret_from_fork+0x10/0x20 [ 29.462272] [ 29.462290] Freed by task 199: [ 29.462314] kasan_save_stack+0x3c/0x68 [ 29.462351] kasan_save_track+0x20/0x40 [ 29.462394] kasan_save_free_info+0x4c/0x78 [ 29.462443] __kasan_slab_free+0x6c/0x98 [ 29.462537] kfree+0x214/0x3c8 [ 29.462575] kmalloc_uaf_16+0x190/0x438 [ 29.462617] kunit_try_run_case+0x170/0x3f0 [ 29.462724] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.462767] kthread+0x328/0x630 [ 29.462798] ret_from_fork+0x10/0x20 [ 29.462832] [ 29.462860] The buggy address belongs to the object at fff00000c8686ae0 [ 29.462860] which belongs to the cache kmalloc-16 of size 16 [ 29.462928] The buggy address is located 0 bytes inside of [ 29.462928] freed 16-byte region [fff00000c8686ae0, fff00000c8686af0) [ 29.462995] [ 29.463015] The buggy address belongs to the physical page: [ 29.463116] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c8686a40 pfn:0x108686 [ 29.463183] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.463232] page_type: f5(slab) [ 29.463269] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 29.463360] raw: fff00000c8686a40 000000008080007f 00000000f5000000 0000000000000000 [ 29.463419] page dumped because: kasan: bad access detected [ 29.463449] [ 29.463466] Memory state around the buggy address: [ 29.463495] fff00000c8686980: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.463544] fff00000c8686a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.463586] >fff00000c8686a80: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 29.463624] ^ [ 29.463671] fff00000c8686b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.463727] fff00000c8686b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.463781] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[ 29.449947] ================================================================== [ 29.450019] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 29.450110] Write of size 16 at addr fff00000c8686a80 by task kunit_try_catch/197 [ 29.450280] [ 29.450399] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 29.450675] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.450740] Hardware name: linux,dummy-virt (DT) [ 29.450822] Call trace: [ 29.450843] show_stack+0x20/0x38 (C) [ 29.450892] dump_stack_lvl+0x8c/0xd0 [ 29.451055] print_report+0x118/0x5d0 [ 29.451100] kasan_report+0xdc/0x128 [ 29.451162] __asan_report_store16_noabort+0x20/0x30 [ 29.451211] kmalloc_oob_16+0x3a0/0x3f8 [ 29.451364] kunit_try_run_case+0x170/0x3f0 [ 29.451508] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.451562] kthread+0x328/0x630 [ 29.451648] ret_from_fork+0x10/0x20 [ 29.451704] [ 29.451760] Allocated by task 197: [ 29.451788] kasan_save_stack+0x3c/0x68 [ 29.451855] kasan_save_track+0x20/0x40 [ 29.452034] kasan_save_alloc_info+0x40/0x58 [ 29.452164] __kasan_kmalloc+0xd4/0xd8 [ 29.452201] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.452240] kmalloc_oob_16+0xb4/0x3f8 [ 29.452275] kunit_try_run_case+0x170/0x3f0 [ 29.452322] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.452366] kthread+0x328/0x630 [ 29.452483] ret_from_fork+0x10/0x20 [ 29.452519] [ 29.452538] The buggy address belongs to the object at fff00000c8686a80 [ 29.452538] which belongs to the cache kmalloc-16 of size 16 [ 29.452596] The buggy address is located 0 bytes inside of [ 29.452596] allocated 13-byte region [fff00000c8686a80, fff00000c8686a8d) [ 29.452789] [ 29.452812] The buggy address belongs to the physical page: [ 29.452843] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c8686a40 pfn:0x108686 [ 29.452966] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.453015] page_type: f5(slab) [ 29.453054] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 29.453105] raw: fff00000c8686a40 000000008080007f 00000000f5000000 0000000000000000 [ 29.453165] page dumped because: kasan: bad access detected [ 29.453280] [ 29.453329] Memory state around the buggy address: [ 29.453359] fff00000c8686980: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.453520] fff00000c8686a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.453581] >fff00000c8686a80: 00 05 fc fc 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.453619] ^ [ 29.453684] fff00000c8686b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.453946] fff00000c8686b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.453986] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 29.439652] ================================================================== [ 29.439702] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 29.439760] Read of size 1 at addr fff00000c83c9c00 by task kunit_try_catch/195 [ 29.439857] [ 29.439914] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 29.440039] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.440079] Hardware name: linux,dummy-virt (DT) [ 29.440109] Call trace: [ 29.440151] show_stack+0x20/0x38 (C) [ 29.440228] dump_stack_lvl+0x8c/0xd0 [ 29.440383] print_report+0x118/0x5d0 [ 29.440506] kasan_report+0xdc/0x128 [ 29.440548] __asan_report_load1_noabort+0x20/0x30 [ 29.440596] krealloc_uaf+0x4c8/0x520 [ 29.440642] kunit_try_run_case+0x170/0x3f0 [ 29.440689] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.440742] kthread+0x328/0x630 [ 29.440791] ret_from_fork+0x10/0x20 [ 29.440838] [ 29.440855] Allocated by task 195: [ 29.440882] kasan_save_stack+0x3c/0x68 [ 29.441077] kasan_save_track+0x20/0x40 [ 29.441116] kasan_save_alloc_info+0x40/0x58 [ 29.441162] __kasan_kmalloc+0xd4/0xd8 [ 29.441198] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.441236] krealloc_uaf+0xc8/0x520 [ 29.441271] kunit_try_run_case+0x170/0x3f0 [ 29.441318] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.441362] kthread+0x328/0x630 [ 29.441412] ret_from_fork+0x10/0x20 [ 29.441446] [ 29.441464] Freed by task 195: [ 29.441489] kasan_save_stack+0x3c/0x68 [ 29.441614] kasan_save_track+0x20/0x40 [ 29.441783] kasan_save_free_info+0x4c/0x78 [ 29.441964] __kasan_slab_free+0x6c/0x98 [ 29.442068] kfree+0x214/0x3c8 [ 29.442100] krealloc_uaf+0x12c/0x520 [ 29.442144] kunit_try_run_case+0x170/0x3f0 [ 29.442184] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.442227] kthread+0x328/0x630 [ 29.442423] ret_from_fork+0x10/0x20 [ 29.442605] [ 29.442624] The buggy address belongs to the object at fff00000c83c9c00 [ 29.442624] which belongs to the cache kmalloc-256 of size 256 [ 29.442683] The buggy address is located 0 bytes inside of [ 29.442683] freed 256-byte region [fff00000c83c9c00, fff00000c83c9d00) [ 29.442744] [ 29.442762] The buggy address belongs to the physical page: [ 29.442793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1083c8 [ 29.442854] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.442901] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.442972] page_type: f5(slab) [ 29.443010] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.443068] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.443123] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.443184] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.443261] head: 0bfffe0000000001 ffffc1ffc320f201 00000000ffffffff 00000000ffffffff [ 29.443370] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 29.443478] page dumped because: kasan: bad access detected [ 29.443582] [ 29.443599] Memory state around the buggy address: [ 29.443630] fff00000c83c9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.443672] fff00000c83c9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.443713] >fff00000c83c9c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.443917] ^ [ 29.443947] fff00000c83c9c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.444085] fff00000c83c9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.444135] ================================================================== [ 29.434557] ================================================================== [ 29.434619] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 29.434674] Read of size 1 at addr fff00000c83c9c00 by task kunit_try_catch/195 [ 29.434756] [ 29.434788] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 29.434899] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.434925] Hardware name: linux,dummy-virt (DT) [ 29.434968] Call trace: [ 29.435021] show_stack+0x20/0x38 (C) [ 29.435071] dump_stack_lvl+0x8c/0xd0 [ 29.435126] print_report+0x118/0x5d0 [ 29.435179] kasan_report+0xdc/0x128 [ 29.435220] __kasan_check_byte+0x54/0x70 [ 29.435266] krealloc_noprof+0x44/0x360 [ 29.435313] krealloc_uaf+0x180/0x520 [ 29.435357] kunit_try_run_case+0x170/0x3f0 [ 29.435424] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.435476] kthread+0x328/0x630 [ 29.435603] ret_from_fork+0x10/0x20 [ 29.435682] [ 29.435707] Allocated by task 195: [ 29.435734] kasan_save_stack+0x3c/0x68 [ 29.435776] kasan_save_track+0x20/0x40 [ 29.435823] kasan_save_alloc_info+0x40/0x58 [ 29.435860] __kasan_kmalloc+0xd4/0xd8 [ 29.435926] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.435968] krealloc_uaf+0xc8/0x520 [ 29.436014] kunit_try_run_case+0x170/0x3f0 [ 29.436158] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.436228] kthread+0x328/0x630 [ 29.436259] ret_from_fork+0x10/0x20 [ 29.436294] [ 29.436328] Freed by task 195: [ 29.436401] kasan_save_stack+0x3c/0x68 [ 29.436453] kasan_save_track+0x20/0x40 [ 29.436584] kasan_save_free_info+0x4c/0x78 [ 29.436730] __kasan_slab_free+0x6c/0x98 [ 29.436845] kfree+0x214/0x3c8 [ 29.436879] krealloc_uaf+0x12c/0x520 [ 29.436977] kunit_try_run_case+0x170/0x3f0 [ 29.437016] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.437061] kthread+0x328/0x630 [ 29.437099] ret_from_fork+0x10/0x20 [ 29.437211] [ 29.437278] The buggy address belongs to the object at fff00000c83c9c00 [ 29.437278] which belongs to the cache kmalloc-256 of size 256 [ 29.437601] The buggy address is located 0 bytes inside of [ 29.437601] freed 256-byte region [fff00000c83c9c00, fff00000c83c9d00) [ 29.437813] [ 29.437840] The buggy address belongs to the physical page: [ 29.437960] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1083c8 [ 29.438013] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.438104] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.438184] page_type: f5(slab) [ 29.438222] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.438308] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.438395] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.438444] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.438504] head: 0bfffe0000000001 ffffc1ffc320f201 00000000ffffffff 00000000ffffffff [ 29.438552] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 29.438592] page dumped because: kasan: bad access detected [ 29.438623] [ 29.438642] Memory state around the buggy address: [ 29.438672] fff00000c83c9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.438742] fff00000c83c9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.438784] >fff00000c83c9c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.438822] ^ [ 29.438849] fff00000c83c9c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.438890] fff00000c83c9d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.438928] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 29.373149] ================================================================== [ 29.373206] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 29.373262] Write of size 1 at addr fff00000c83c9ac9 by task kunit_try_catch/189 [ 29.373352] [ 29.373395] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 29.373485] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.373608] Hardware name: linux,dummy-virt (DT) [ 29.373751] Call trace: [ 29.373833] show_stack+0x20/0x38 (C) [ 29.373880] dump_stack_lvl+0x8c/0xd0 [ 29.373929] print_report+0x118/0x5d0 [ 29.374145] kasan_report+0xdc/0x128 [ 29.374191] __asan_report_store1_noabort+0x20/0x30 [ 29.374245] krealloc_less_oob_helper+0xa48/0xc50 [ 29.374471] krealloc_less_oob+0x20/0x38 [ 29.374638] kunit_try_run_case+0x170/0x3f0 [ 29.374685] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.374747] kthread+0x328/0x630 [ 29.374788] ret_from_fork+0x10/0x20 [ 29.374834] [ 29.374852] Allocated by task 189: [ 29.374878] kasan_save_stack+0x3c/0x68 [ 29.374928] kasan_save_track+0x20/0x40 [ 29.374966] kasan_save_alloc_info+0x40/0x58 [ 29.375014] __kasan_krealloc+0x118/0x178 [ 29.375053] krealloc_noprof+0x128/0x360 [ 29.375089] krealloc_less_oob_helper+0x168/0xc50 [ 29.375139] krealloc_less_oob+0x20/0x38 [ 29.375175] kunit_try_run_case+0x170/0x3f0 [ 29.375281] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.375424] kthread+0x328/0x630 [ 29.375455] ret_from_fork+0x10/0x20 [ 29.375490] [ 29.375514] The buggy address belongs to the object at fff00000c83c9a00 [ 29.375514] which belongs to the cache kmalloc-256 of size 256 [ 29.375572] The buggy address is located 0 bytes to the right of [ 29.375572] allocated 201-byte region [fff00000c83c9a00, fff00000c83c9ac9) [ 29.375637] [ 29.375656] The buggy address belongs to the physical page: [ 29.375687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1083c8 [ 29.375750] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.375807] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.375857] page_type: f5(slab) [ 29.375894] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.375955] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.376078] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.376195] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.376365] head: 0bfffe0000000001 ffffc1ffc320f201 00000000ffffffff 00000000ffffffff [ 29.376487] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 29.376607] page dumped because: kasan: bad access detected [ 29.376677] [ 29.376788] Memory state around the buggy address: [ 29.376818] fff00000c83c9980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.376874] fff00000c83c9a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.376915] >fff00000c83c9a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 29.376952] ^ [ 29.376987] fff00000c83c9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.377041] fff00000c83c9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.377079] ================================================================== [ 29.379314] ================================================================== [ 29.379419] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 29.379584] Write of size 1 at addr fff00000c83c9ad0 by task kunit_try_catch/189 [ 29.379698] [ 29.379767] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 29.379851] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.379877] Hardware name: linux,dummy-virt (DT) [ 29.379917] Call trace: [ 29.379938] show_stack+0x20/0x38 (C) [ 29.379997] dump_stack_lvl+0x8c/0xd0 [ 29.380041] print_report+0x118/0x5d0 [ 29.380083] kasan_report+0xdc/0x128 [ 29.380126] __asan_report_store1_noabort+0x20/0x30 [ 29.380182] krealloc_less_oob_helper+0xb9c/0xc50 [ 29.380275] krealloc_less_oob+0x20/0x38 [ 29.380484] kunit_try_run_case+0x170/0x3f0 [ 29.380725] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.380871] kthread+0x328/0x630 [ 29.380999] ret_from_fork+0x10/0x20 [ 29.381148] [ 29.381167] Allocated by task 189: [ 29.381193] kasan_save_stack+0x3c/0x68 [ 29.381233] kasan_save_track+0x20/0x40 [ 29.381282] kasan_save_alloc_info+0x40/0x58 [ 29.381318] __kasan_krealloc+0x118/0x178 [ 29.381381] krealloc_noprof+0x128/0x360 [ 29.381420] krealloc_less_oob_helper+0x168/0xc50 [ 29.381517] krealloc_less_oob+0x20/0x38 [ 29.381608] kunit_try_run_case+0x170/0x3f0 [ 29.381681] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.381800] kthread+0x328/0x630 [ 29.381856] ret_from_fork+0x10/0x20 [ 29.381924] [ 29.381942] The buggy address belongs to the object at fff00000c83c9a00 [ 29.381942] which belongs to the cache kmalloc-256 of size 256 [ 29.382011] The buggy address is located 7 bytes to the right of [ 29.382011] allocated 201-byte region [fff00000c83c9a00, fff00000c83c9ac9) [ 29.382077] [ 29.382096] The buggy address belongs to the physical page: [ 29.382141] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1083c8 [ 29.382203] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.382306] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.382464] page_type: f5(slab) [ 29.382513] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.382575] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.382624] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.382672] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.382730] head: 0bfffe0000000001 ffffc1ffc320f201 00000000ffffffff 00000000ffffffff [ 29.382779] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 29.382818] page dumped because: kasan: bad access detected [ 29.382858] [ 29.382875] Memory state around the buggy address: [ 29.382911] fff00000c83c9980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.383082] fff00000c83c9a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.383199] >fff00000c83c9a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 29.383238] ^ [ 29.383274] fff00000c83c9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.383316] fff00000c83c9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.383428] ================================================================== [ 29.426795] ================================================================== [ 29.426837] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 29.426892] Write of size 1 at addr fff00000c9a560eb by task kunit_try_catch/193 [ 29.426942] [ 29.426969] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 29.427050] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.427075] Hardware name: linux,dummy-virt (DT) [ 29.427105] Call trace: [ 29.427125] show_stack+0x20/0x38 (C) [ 29.427182] dump_stack_lvl+0x8c/0xd0 [ 29.427303] print_report+0x118/0x5d0 [ 29.427400] kasan_report+0xdc/0x128 [ 29.427554] __asan_report_store1_noabort+0x20/0x30 [ 29.427711] krealloc_less_oob_helper+0xa58/0xc50 [ 29.427761] krealloc_large_less_oob+0x20/0x38 [ 29.427809] kunit_try_run_case+0x170/0x3f0 [ 29.427855] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.427909] kthread+0x328/0x630 [ 29.427948] ret_from_fork+0x10/0x20 [ 29.427994] [ 29.428012] The buggy address belongs to the physical page: [ 29.428051] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a54 [ 29.428135] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.428224] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.428272] page_type: f8(unknown) [ 29.428331] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.428391] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.428512] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.428567] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.428701] head: 0bfffe0000000002 ffffc1ffc3269501 00000000ffffffff 00000000ffffffff [ 29.428820] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 29.428859] page dumped because: kasan: bad access detected [ 29.428889] [ 29.428906] Memory state around the buggy address: [ 29.428967] fff00000c9a55f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.429020] fff00000c9a56000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.429062] >fff00000c9a56080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 29.429100] ^ [ 29.429208] fff00000c9a56100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.429319] fff00000c9a56180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.429357] ================================================================== [ 29.384366] ================================================================== [ 29.384413] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 29.384459] Write of size 1 at addr fff00000c83c9ada by task kunit_try_catch/189 [ 29.384508] [ 29.384537] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 29.384620] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.384656] Hardware name: linux,dummy-virt (DT) [ 29.384798] Call trace: [ 29.384892] show_stack+0x20/0x38 (C) [ 29.385105] dump_stack_lvl+0x8c/0xd0 [ 29.385227] print_report+0x118/0x5d0 [ 29.385349] kasan_report+0xdc/0x128 [ 29.385542] __asan_report_store1_noabort+0x20/0x30 [ 29.385591] krealloc_less_oob_helper+0xa80/0xc50 [ 29.385639] krealloc_less_oob+0x20/0x38 [ 29.385684] kunit_try_run_case+0x170/0x3f0 [ 29.385731] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.385784] kthread+0x328/0x630 [ 29.385831] ret_from_fork+0x10/0x20 [ 29.386038] [ 29.386112] Allocated by task 189: [ 29.386148] kasan_save_stack+0x3c/0x68 [ 29.386188] kasan_save_track+0x20/0x40 [ 29.386225] kasan_save_alloc_info+0x40/0x58 [ 29.386261] __kasan_krealloc+0x118/0x178 [ 29.386298] krealloc_noprof+0x128/0x360 [ 29.386335] krealloc_less_oob_helper+0x168/0xc50 [ 29.386374] krealloc_less_oob+0x20/0x38 [ 29.386410] kunit_try_run_case+0x170/0x3f0 [ 29.386447] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.386490] kthread+0x328/0x630 [ 29.386521] ret_from_fork+0x10/0x20 [ 29.386555] [ 29.386572] The buggy address belongs to the object at fff00000c83c9a00 [ 29.386572] which belongs to the cache kmalloc-256 of size 256 [ 29.386629] The buggy address is located 17 bytes to the right of [ 29.386629] allocated 201-byte region [fff00000c83c9a00, fff00000c83c9ac9) [ 29.386694] [ 29.386712] The buggy address belongs to the physical page: [ 29.386742] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1083c8 [ 29.386792] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.386852] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.386902] page_type: f5(slab) [ 29.386950] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.386999] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.387049] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.387105] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.387168] head: 0bfffe0000000001 ffffc1ffc320f201 00000000ffffffff 00000000ffffffff [ 29.387216] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 29.387256] page dumped because: kasan: bad access detected [ 29.387286] [ 29.387312] Memory state around the buggy address: [ 29.387342] fff00000c83c9980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.387384] fff00000c83c9a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.387441] >fff00000c83c9a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 29.387479] ^ [ 29.387520] fff00000c83c9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.387562] fff00000c83c9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.387601] ================================================================== [ 29.392534] ================================================================== [ 29.392948] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 29.392998] Write of size 1 at addr fff00000c83c9aeb by task kunit_try_catch/189 [ 29.393046] [ 29.393075] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 29.393168] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.393203] Hardware name: linux,dummy-virt (DT) [ 29.393234] Call trace: [ 29.393254] show_stack+0x20/0x38 (C) [ 29.393304] dump_stack_lvl+0x8c/0xd0 [ 29.393349] print_report+0x118/0x5d0 [ 29.393393] kasan_report+0xdc/0x128 [ 29.393457] __asan_report_store1_noabort+0x20/0x30 [ 29.393617] krealloc_less_oob_helper+0xa58/0xc50 [ 29.393741] krealloc_less_oob+0x20/0x38 [ 29.393829] kunit_try_run_case+0x170/0x3f0 [ 29.393877] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.393939] kthread+0x328/0x630 [ 29.393979] ret_from_fork+0x10/0x20 [ 29.394036] [ 29.394053] Allocated by task 189: [ 29.394080] kasan_save_stack+0x3c/0x68 [ 29.394159] kasan_save_track+0x20/0x40 [ 29.394309] kasan_save_alloc_info+0x40/0x58 [ 29.394404] __kasan_krealloc+0x118/0x178 [ 29.394497] krealloc_noprof+0x128/0x360 [ 29.394545] krealloc_less_oob_helper+0x168/0xc50 [ 29.394631] krealloc_less_oob+0x20/0x38 [ 29.394899] kunit_try_run_case+0x170/0x3f0 [ 29.394960] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.395044] kthread+0x328/0x630 [ 29.395182] ret_from_fork+0x10/0x20 [ 29.395252] [ 29.395270] The buggy address belongs to the object at fff00000c83c9a00 [ 29.395270] which belongs to the cache kmalloc-256 of size 256 [ 29.395329] The buggy address is located 34 bytes to the right of [ 29.395329] allocated 201-byte region [fff00000c83c9a00, fff00000c83c9ac9) [ 29.395396] [ 29.395415] The buggy address belongs to the physical page: [ 29.395446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1083c8 [ 29.395497] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.395549] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.395626] page_type: f5(slab) [ 29.395661] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.395741] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.395791] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.395872] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.395984] head: 0bfffe0000000001 ffffc1ffc320f201 00000000ffffffff 00000000ffffffff [ 29.396081] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 29.396122] page dumped because: kasan: bad access detected [ 29.396163] [ 29.396214] Memory state around the buggy address: [ 29.396243] fff00000c83c9980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.396287] fff00000c83c9a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.396330] >fff00000c83c9a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 29.396378] ^ [ 29.396427] fff00000c83c9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.396537] fff00000c83c9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.396727] ================================================================== [ 29.417014] ================================================================== [ 29.417058] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 29.417103] Write of size 1 at addr fff00000c9a560d0 by task kunit_try_catch/193 [ 29.417165] [ 29.417201] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 29.417426] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.417561] Hardware name: linux,dummy-virt (DT) [ 29.417592] Call trace: [ 29.417619] show_stack+0x20/0x38 (C) [ 29.417819] dump_stack_lvl+0x8c/0xd0 [ 29.417863] print_report+0x118/0x5d0 [ 29.417905] kasan_report+0xdc/0x128 [ 29.417946] __asan_report_store1_noabort+0x20/0x30 [ 29.418000] krealloc_less_oob_helper+0xb9c/0xc50 [ 29.418158] krealloc_large_less_oob+0x20/0x38 [ 29.418205] kunit_try_run_case+0x170/0x3f0 [ 29.418252] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.418304] kthread+0x328/0x630 [ 29.418344] ret_from_fork+0x10/0x20 [ 29.418399] [ 29.418418] The buggy address belongs to the physical page: [ 29.418448] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a54 [ 29.418512] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.418557] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.418606] page_type: f8(unknown) [ 29.418661] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.418739] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.418839] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.418959] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.419017] head: 0bfffe0000000002 ffffc1ffc3269501 00000000ffffffff 00000000ffffffff [ 29.419107] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 29.419156] page dumped because: kasan: bad access detected [ 29.419187] [ 29.419204] Memory state around the buggy address: [ 29.419235] fff00000c9a55f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.419278] fff00000c9a56000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.419322] >fff00000c9a56080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 29.419369] ^ [ 29.419404] fff00000c9a56100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.419460] fff00000c9a56180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.419575] ================================================================== [ 29.414042] ================================================================== [ 29.414096] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 29.414161] Write of size 1 at addr fff00000c9a560c9 by task kunit_try_catch/193 [ 29.414210] [ 29.414239] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 29.414322] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.414348] Hardware name: linux,dummy-virt (DT) [ 29.414398] Call trace: [ 29.414419] show_stack+0x20/0x38 (C) [ 29.414487] dump_stack_lvl+0x8c/0xd0 [ 29.414531] print_report+0x118/0x5d0 [ 29.414584] kasan_report+0xdc/0x128 [ 29.414625] __asan_report_store1_noabort+0x20/0x30 [ 29.414673] krealloc_less_oob_helper+0xa48/0xc50 [ 29.414722] krealloc_large_less_oob+0x20/0x38 [ 29.414793] kunit_try_run_case+0x170/0x3f0 [ 29.414957] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.415029] kthread+0x328/0x630 [ 29.415071] ret_from_fork+0x10/0x20 [ 29.415145] [ 29.415165] The buggy address belongs to the physical page: [ 29.415221] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a54 [ 29.415274] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.415320] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.415370] page_type: f8(unknown) [ 29.415414] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.415465] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.415522] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.415581] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.415641] head: 0bfffe0000000002 ffffc1ffc3269501 00000000ffffffff 00000000ffffffff [ 29.415690] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 29.415730] page dumped because: kasan: bad access detected [ 29.415760] [ 29.415779] Memory state around the buggy address: [ 29.415809] fff00000c9a55f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.415909] fff00000c9a56000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.415953] >fff00000c9a56080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 29.415991] ^ [ 29.416064] fff00000c9a56100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.416264] fff00000c9a56180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.416302] ================================================================== [ 29.423965] ================================================================== [ 29.424001] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 29.424042] Write of size 1 at addr fff00000c9a560ea by task kunit_try_catch/193 [ 29.424090] [ 29.424118] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 29.424234] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.424292] Hardware name: linux,dummy-virt (DT) [ 29.424363] Call trace: [ 29.424389] show_stack+0x20/0x38 (C) [ 29.424520] dump_stack_lvl+0x8c/0xd0 [ 29.424610] print_report+0x118/0x5d0 [ 29.424652] kasan_report+0xdc/0x128 [ 29.424699] __asan_report_store1_noabort+0x20/0x30 [ 29.424810] krealloc_less_oob_helper+0xae4/0xc50 [ 29.424961] krealloc_large_less_oob+0x20/0x38 [ 29.425087] kunit_try_run_case+0x170/0x3f0 [ 29.425146] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.425200] kthread+0x328/0x630 [ 29.425246] ret_from_fork+0x10/0x20 [ 29.425398] [ 29.425417] The buggy address belongs to the physical page: [ 29.425519] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a54 [ 29.425778] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.425824] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.425873] page_type: f8(unknown) [ 29.425909] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.425958] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.426007] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.426062] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.426165] head: 0bfffe0000000002 ffffc1ffc3269501 00000000ffffffff 00000000ffffffff [ 29.426213] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 29.426253] page dumped because: kasan: bad access detected [ 29.426283] [ 29.426300] Memory state around the buggy address: [ 29.426329] fff00000c9a55f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.426371] fff00000c9a56000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.426472] >fff00000c9a56080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 29.426522] ^ [ 29.426560] fff00000c9a56100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.426602] fff00000c9a56180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.426640] ================================================================== [ 29.420163] ================================================================== [ 29.420207] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 29.420493] Write of size 1 at addr fff00000c9a560da by task kunit_try_catch/193 [ 29.420555] [ 29.420631] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 29.420713] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.420773] Hardware name: linux,dummy-virt (DT) [ 29.420803] Call trace: [ 29.420829] show_stack+0x20/0x38 (C) [ 29.420968] dump_stack_lvl+0x8c/0xd0 [ 29.421011] print_report+0x118/0x5d0 [ 29.421053] kasan_report+0xdc/0x128 [ 29.421095] __asan_report_store1_noabort+0x20/0x30 [ 29.421152] krealloc_less_oob_helper+0xa80/0xc50 [ 29.421201] krealloc_large_less_oob+0x20/0x38 [ 29.421248] kunit_try_run_case+0x170/0x3f0 [ 29.421303] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.421544] kthread+0x328/0x630 [ 29.421591] ret_from_fork+0x10/0x20 [ 29.421763] [ 29.421781] The buggy address belongs to the physical page: [ 29.421811] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a54 [ 29.421863] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.421914] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.422159] page_type: f8(unknown) [ 29.422338] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.422432] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.422608] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.422681] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.423489] head: 0bfffe0000000002 ffffc1ffc3269501 00000000ffffffff 00000000ffffffff [ 29.423557] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 29.423597] page dumped because: kasan: bad access detected [ 29.423628] [ 29.423646] Memory state around the buggy address: [ 29.423676] fff00000c9a55f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.423718] fff00000c9a56000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.423760] >fff00000c9a56080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 29.423798] ^ [ 29.423834] fff00000c9a56100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.423876] fff00000c9a56180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.423913] ================================================================== [ 29.388463] ================================================================== [ 29.388516] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 29.388726] Write of size 1 at addr fff00000c83c9aea by task kunit_try_catch/189 [ 29.388974] [ 29.389103] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 29.389231] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.389257] Hardware name: linux,dummy-virt (DT) [ 29.389286] Call trace: [ 29.389306] show_stack+0x20/0x38 (C) [ 29.389352] dump_stack_lvl+0x8c/0xd0 [ 29.389395] print_report+0x118/0x5d0 [ 29.389437] kasan_report+0xdc/0x128 [ 29.389479] __asan_report_store1_noabort+0x20/0x30 [ 29.389527] krealloc_less_oob_helper+0xae4/0xc50 [ 29.389583] krealloc_less_oob+0x20/0x38 [ 29.389791] kunit_try_run_case+0x170/0x3f0 [ 29.390010] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.390070] kthread+0x328/0x630 [ 29.390143] ret_from_fork+0x10/0x20 [ 29.390188] [ 29.390205] Allocated by task 189: [ 29.390232] kasan_save_stack+0x3c/0x68 [ 29.390271] kasan_save_track+0x20/0x40 [ 29.390308] kasan_save_alloc_info+0x40/0x58 [ 29.390344] __kasan_krealloc+0x118/0x178 [ 29.390381] krealloc_noprof+0x128/0x360 [ 29.390418] krealloc_less_oob_helper+0x168/0xc50 [ 29.390457] krealloc_less_oob+0x20/0x38 [ 29.390492] kunit_try_run_case+0x170/0x3f0 [ 29.390529] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.390572] kthread+0x328/0x630 [ 29.390603] ret_from_fork+0x10/0x20 [ 29.390637] [ 29.390654] The buggy address belongs to the object at fff00000c83c9a00 [ 29.390654] which belongs to the cache kmalloc-256 of size 256 [ 29.390710] The buggy address is located 33 bytes to the right of [ 29.390710] allocated 201-byte region [fff00000c83c9a00, fff00000c83c9ac9) [ 29.390787] [ 29.390806] The buggy address belongs to the physical page: [ 29.390877] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1083c8 [ 29.391083] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.391138] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.391200] page_type: f5(slab) [ 29.391255] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.391308] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.391375] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.391423] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.391472] head: 0bfffe0000000001 ffffc1ffc320f201 00000000ffffffff 00000000ffffffff [ 29.391537] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 29.391577] page dumped because: kasan: bad access detected [ 29.391618] [ 29.391636] Memory state around the buggy address: [ 29.391666] fff00000c83c9980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.391715] fff00000c83c9a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.391769] >fff00000c83c9a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 29.391885] ^ [ 29.391924] fff00000c83c9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.391985] fff00000c83c9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.392024] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 29.363701] ================================================================== [ 29.363750] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 29.363797] Write of size 1 at addr fff00000c83c98f0 by task kunit_try_catch/187 [ 29.363846] [ 29.363875] CPU: 0 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 29.363957] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.363983] Hardware name: linux,dummy-virt (DT) [ 29.364012] Call trace: [ 29.364032] show_stack+0x20/0x38 (C) [ 29.364077] dump_stack_lvl+0x8c/0xd0 [ 29.364121] print_report+0x118/0x5d0 [ 29.364176] kasan_report+0xdc/0x128 [ 29.364259] __asan_report_store1_noabort+0x20/0x30 [ 29.364369] krealloc_more_oob_helper+0x5c0/0x678 [ 29.364419] krealloc_more_oob+0x20/0x38 [ 29.364464] kunit_try_run_case+0x170/0x3f0 [ 29.364511] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.364572] kthread+0x328/0x630 [ 29.364624] ret_from_fork+0x10/0x20 [ 29.364671] [ 29.364688] Allocated by task 187: [ 29.364725] kasan_save_stack+0x3c/0x68 [ 29.364771] kasan_save_track+0x20/0x40 [ 29.364808] kasan_save_alloc_info+0x40/0x58 [ 29.364866] __kasan_krealloc+0x118/0x178 [ 29.364904] krealloc_noprof+0x128/0x360 [ 29.364947] krealloc_more_oob_helper+0x168/0x678 [ 29.365031] krealloc_more_oob+0x20/0x38 [ 29.365172] kunit_try_run_case+0x170/0x3f0 [ 29.365227] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.365299] kthread+0x328/0x630 [ 29.365375] ret_from_fork+0x10/0x20 [ 29.365409] [ 29.365427] The buggy address belongs to the object at fff00000c83c9800 [ 29.365427] which belongs to the cache kmalloc-256 of size 256 [ 29.365483] The buggy address is located 5 bytes to the right of [ 29.365483] allocated 235-byte region [fff00000c83c9800, fff00000c83c98eb) [ 29.365557] [ 29.365587] The buggy address belongs to the physical page: [ 29.365617] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1083c8 [ 29.365686] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.365874] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.365931] page_type: f5(slab) [ 29.366028] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.366110] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.366268] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.366377] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.366427] head: 0bfffe0000000001 ffffc1ffc320f201 00000000ffffffff 00000000ffffffff [ 29.366476] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 29.366515] page dumped because: kasan: bad access detected [ 29.366552] [ 29.366626] Memory state around the buggy address: [ 29.366673] fff00000c83c9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.366728] fff00000c83c9800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.366770] >fff00000c83c9880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 29.366808] ^ [ 29.366846] fff00000c83c9900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.366888] fff00000c83c9980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.366926] ================================================================== [ 29.405437] ================================================================== [ 29.405506] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 29.405556] Write of size 1 at addr fff00000c9a560f0 by task kunit_try_catch/191 [ 29.405627] [ 29.405655] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 29.405913] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.405967] Hardware name: linux,dummy-virt (DT) [ 29.405997] Call trace: [ 29.406031] show_stack+0x20/0x38 (C) [ 29.406084] dump_stack_lvl+0x8c/0xd0 [ 29.406185] print_report+0x118/0x5d0 [ 29.406319] kasan_report+0xdc/0x128 [ 29.406368] __asan_report_store1_noabort+0x20/0x30 [ 29.406417] krealloc_more_oob_helper+0x5c0/0x678 [ 29.406465] krealloc_large_more_oob+0x20/0x38 [ 29.406512] kunit_try_run_case+0x170/0x3f0 [ 29.406558] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.406611] kthread+0x328/0x630 [ 29.406651] ret_from_fork+0x10/0x20 [ 29.406698] [ 29.406726] The buggy address belongs to the physical page: [ 29.406757] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a54 [ 29.406808] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.406854] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.406903] page_type: f8(unknown) [ 29.406949] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.406999] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.407059] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.407108] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.407168] head: 0bfffe0000000002 ffffc1ffc3269501 00000000ffffffff 00000000ffffffff [ 29.407263] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 29.407349] page dumped because: kasan: bad access detected [ 29.407385] [ 29.407430] Memory state around the buggy address: [ 29.407523] fff00000c9a55f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.407566] fff00000c9a56000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.407608] >fff00000c9a56080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 29.407655] ^ [ 29.407693] fff00000c9a56100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.407735] fff00000c9a56180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.407782] ================================================================== [ 29.401654] ================================================================== [ 29.401709] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 29.401765] Write of size 1 at addr fff00000c9a560eb by task kunit_try_catch/191 [ 29.401816] [ 29.401847] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 29.401933] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.401959] Hardware name: linux,dummy-virt (DT) [ 29.401989] Call trace: [ 29.402019] show_stack+0x20/0x38 (C) [ 29.402612] dump_stack_lvl+0x8c/0xd0 [ 29.402721] print_report+0x118/0x5d0 [ 29.402792] kasan_report+0xdc/0x128 [ 29.402833] __asan_report_store1_noabort+0x20/0x30 [ 29.402881] krealloc_more_oob_helper+0x60c/0x678 [ 29.402930] krealloc_large_more_oob+0x20/0x38 [ 29.402977] kunit_try_run_case+0x170/0x3f0 [ 29.403025] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.403078] kthread+0x328/0x630 [ 29.403121] ret_from_fork+0x10/0x20 [ 29.403176] [ 29.403195] The buggy address belongs to the physical page: [ 29.403226] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a54 [ 29.403281] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.403345] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.403551] page_type: f8(unknown) [ 29.403598] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.403784] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.403848] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.403980] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.404058] head: 0bfffe0000000002 ffffc1ffc3269501 00000000ffffffff 00000000ffffffff [ 29.404173] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 29.404214] page dumped because: kasan: bad access detected [ 29.404332] [ 29.404349] Memory state around the buggy address: [ 29.404380] fff00000c9a55f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.404461] fff00000c9a56000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.404647] >fff00000c9a56080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 29.404691] ^ [ 29.404842] fff00000c9a56100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.404923] fff00000c9a56180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.404962] ================================================================== [ 29.358363] ================================================================== [ 29.358417] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 29.358469] Write of size 1 at addr fff00000c83c98eb by task kunit_try_catch/187 [ 29.358519] [ 29.358547] CPU: 0 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 29.358630] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.358657] Hardware name: linux,dummy-virt (DT) [ 29.358711] Call trace: [ 29.358733] show_stack+0x20/0x38 (C) [ 29.358795] dump_stack_lvl+0x8c/0xd0 [ 29.358863] print_report+0x118/0x5d0 [ 29.358906] kasan_report+0xdc/0x128 [ 29.359008] __asan_report_store1_noabort+0x20/0x30 [ 29.359056] krealloc_more_oob_helper+0x60c/0x678 [ 29.359105] krealloc_more_oob+0x20/0x38 [ 29.359160] kunit_try_run_case+0x170/0x3f0 [ 29.359216] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.359269] kthread+0x328/0x630 [ 29.359310] ret_from_fork+0x10/0x20 [ 29.359366] [ 29.359384] Allocated by task 187: [ 29.359423] kasan_save_stack+0x3c/0x68 [ 29.359465] kasan_save_track+0x20/0x40 [ 29.359511] kasan_save_alloc_info+0x40/0x58 [ 29.359549] __kasan_krealloc+0x118/0x178 [ 29.359588] krealloc_noprof+0x128/0x360 [ 29.359638] krealloc_more_oob_helper+0x168/0x678 [ 29.359759] krealloc_more_oob+0x20/0x38 [ 29.359797] kunit_try_run_case+0x170/0x3f0 [ 29.359835] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.359887] kthread+0x328/0x630 [ 29.359965] ret_from_fork+0x10/0x20 [ 29.360000] [ 29.360018] The buggy address belongs to the object at fff00000c83c9800 [ 29.360018] which belongs to the cache kmalloc-256 of size 256 [ 29.360339] The buggy address is located 0 bytes to the right of [ 29.360339] allocated 235-byte region [fff00000c83c9800, fff00000c83c98eb) [ 29.360409] [ 29.360429] The buggy address belongs to the physical page: [ 29.360463] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1083c8 [ 29.360568] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.360779] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.360860] page_type: f5(slab) [ 29.361039] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.361568] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.361629] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.361701] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.361750] head: 0bfffe0000000001 ffffc1ffc320f201 00000000ffffffff 00000000ffffffff [ 29.361799] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 29.361849] page dumped because: kasan: bad access detected [ 29.361890] [ 29.361962] Memory state around the buggy address: [ 29.362018] fff00000c83c9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.362063] fff00000c83c9800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.362158] >fff00000c83c9880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 29.362215] ^ [ 29.362284] fff00000c83c9900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.362474] fff00000c83c9980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.362618] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 29.350058] ================================================================== [ 29.350117] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 29.350184] Read of size 1 at addr fff00000c9ac0000 by task kunit_try_catch/185 [ 29.350240] [ 29.350269] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 29.350605] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.350634] Hardware name: linux,dummy-virt (DT) [ 29.350673] Call trace: [ 29.350710] show_stack+0x20/0x38 (C) [ 29.350763] dump_stack_lvl+0x8c/0xd0 [ 29.350817] print_report+0x118/0x5d0 [ 29.351050] kasan_report+0xdc/0x128 [ 29.351097] __asan_report_load1_noabort+0x20/0x30 [ 29.351159] page_alloc_uaf+0x328/0x350 [ 29.351206] kunit_try_run_case+0x170/0x3f0 [ 29.351255] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.351320] kthread+0x328/0x630 [ 29.351536] ret_from_fork+0x10/0x20 [ 29.351639] [ 29.351672] The buggy address belongs to the physical page: [ 29.351828] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ac0 [ 29.352028] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.352683] page_type: f0(buddy) [ 29.352774] raw: 0bfffe0000000000 fff00000ff6161b0 fff00000ff6161b0 0000000000000000 [ 29.352825] raw: 0000000000000000 0000000000000006 00000000f0000000 0000000000000000 [ 29.352894] page dumped because: kasan: bad access detected [ 29.352935] [ 29.352959] Memory state around the buggy address: [ 29.353048] fff00000c9abff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.353091] fff00000c9abff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.353141] >fff00000c9ac0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.353180] ^ [ 29.353227] fff00000c9ac0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.353271] fff00000c9ac0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.353312] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree
[ 29.335662] ================================================================== [ 29.335750] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 29.335812] Free of addr fff00000c9a50001 by task kunit_try_catch/181 [ 29.335960] [ 29.336073] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 29.336218] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.336247] Hardware name: linux,dummy-virt (DT) [ 29.336302] Call trace: [ 29.336361] show_stack+0x20/0x38 (C) [ 29.336469] dump_stack_lvl+0x8c/0xd0 [ 29.336515] print_report+0x118/0x5d0 [ 29.336587] kasan_report_invalid_free+0xc0/0xe8 [ 29.336922] __kasan_kfree_large+0x5c/0xa8 [ 29.337067] free_large_kmalloc+0x68/0x150 [ 29.337193] kfree+0x270/0x3c8 [ 29.337270] kmalloc_large_invalid_free+0x108/0x270 [ 29.337322] kunit_try_run_case+0x170/0x3f0 [ 29.337371] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.337428] kthread+0x328/0x630 [ 29.337471] ret_from_fork+0x10/0x20 [ 29.337529] [ 29.337560] The buggy address belongs to the physical page: [ 29.337595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a50 [ 29.337703] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.337755] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.337810] page_type: f8(unknown) [ 29.337848] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.337904] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.338121] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.338289] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.338457] head: 0bfffe0000000002 ffffc1ffc3269401 00000000ffffffff 00000000ffffffff [ 29.338551] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 29.338637] page dumped because: kasan: bad access detected [ 29.338699] [ 29.338716] Memory state around the buggy address: [ 29.338749] fff00000c9a4ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.338814] fff00000c9a4ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.338863] >fff00000c9a50000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.338906] ^ [ 29.338965] fff00000c9a50080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.339013] fff00000c9a50100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.339074] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 29.328615] ================================================================== [ 29.328792] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 29.328850] Read of size 1 at addr fff00000c9a50000 by task kunit_try_catch/179 [ 29.328899] [ 29.329153] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 29.329295] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.329323] Hardware name: linux,dummy-virt (DT) [ 29.329371] Call trace: [ 29.329410] show_stack+0x20/0x38 (C) [ 29.329475] dump_stack_lvl+0x8c/0xd0 [ 29.329520] print_report+0x118/0x5d0 [ 29.329581] kasan_report+0xdc/0x128 [ 29.329639] __asan_report_load1_noabort+0x20/0x30 [ 29.329692] kmalloc_large_uaf+0x2cc/0x2f8 [ 29.329748] kunit_try_run_case+0x170/0x3f0 [ 29.329813] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.329866] kthread+0x328/0x630 [ 29.329923] ret_from_fork+0x10/0x20 [ 29.329969] [ 29.330008] The buggy address belongs to the physical page: [ 29.330054] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a50 [ 29.330117] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.330280] raw: 0bfffe0000000000 ffffc1ffc3269508 fff00000da458d00 0000000000000000 [ 29.330385] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 29.330426] page dumped because: kasan: bad access detected [ 29.330464] [ 29.330482] Memory state around the buggy address: [ 29.330531] fff00000c9a4ff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.330635] fff00000c9a4ff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.330692] >fff00000c9a50000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.330790] ^ [ 29.330892] fff00000c9a50080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.330960] fff00000c9a50100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.331035] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 29.320524] ================================================================== [ 29.320591] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 29.320708] Write of size 1 at addr fff00000c9a5200a by task kunit_try_catch/177 [ 29.320871] [ 29.320924] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 29.321021] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.321057] Hardware name: linux,dummy-virt (DT) [ 29.321097] Call trace: [ 29.321120] show_stack+0x20/0x38 (C) [ 29.321179] dump_stack_lvl+0x8c/0xd0 [ 29.321222] print_report+0x118/0x5d0 [ 29.321275] kasan_report+0xdc/0x128 [ 29.321320] __asan_report_store1_noabort+0x20/0x30 [ 29.321367] kmalloc_large_oob_right+0x278/0x2b8 [ 29.321414] kunit_try_run_case+0x170/0x3f0 [ 29.321461] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.321513] kthread+0x328/0x630 [ 29.321554] ret_from_fork+0x10/0x20 [ 29.321606] [ 29.321640] The buggy address belongs to the physical page: [ 29.321681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a50 [ 29.321733] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.321779] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.321834] page_type: f8(unknown) [ 29.321872] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.321921] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.321971] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.322019] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.322067] head: 0bfffe0000000002 ffffc1ffc3269401 00000000ffffffff 00000000ffffffff [ 29.322121] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 29.322710] page dumped because: kasan: bad access detected [ 29.322755] [ 29.322818] Memory state around the buggy address: [ 29.322913] fff00000c9a51f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.323002] fff00000c9a51f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.323064] >fff00000c9a52000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.323160] ^ [ 29.323208] fff00000c9a52080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.323257] fff00000c9a52100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.323296] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 29.312197] ================================================================== [ 29.312256] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 29.312306] Write of size 1 at addr fff00000c64a5f00 by task kunit_try_catch/175 [ 29.312356] [ 29.312385] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 29.312470] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.312495] Hardware name: linux,dummy-virt (DT) [ 29.312525] Call trace: [ 29.312584] show_stack+0x20/0x38 (C) [ 29.312649] dump_stack_lvl+0x8c/0xd0 [ 29.312928] print_report+0x118/0x5d0 [ 29.312972] kasan_report+0xdc/0x128 [ 29.313032] __asan_report_store1_noabort+0x20/0x30 [ 29.313088] kmalloc_big_oob_right+0x2a4/0x2f0 [ 29.313167] kunit_try_run_case+0x170/0x3f0 [ 29.313234] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.313287] kthread+0x328/0x630 [ 29.313343] ret_from_fork+0x10/0x20 [ 29.313389] [ 29.313407] Allocated by task 175: [ 29.313433] kasan_save_stack+0x3c/0x68 [ 29.313474] kasan_save_track+0x20/0x40 [ 29.313636] kasan_save_alloc_info+0x40/0x58 [ 29.313679] __kasan_kmalloc+0xd4/0xd8 [ 29.313771] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.313847] kmalloc_big_oob_right+0xb8/0x2f0 [ 29.313905] kunit_try_run_case+0x170/0x3f0 [ 29.313962] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.314006] kthread+0x328/0x630 [ 29.314057] ret_from_fork+0x10/0x20 [ 29.314092] [ 29.314110] The buggy address belongs to the object at fff00000c64a4000 [ 29.314110] which belongs to the cache kmalloc-8k of size 8192 [ 29.314197] The buggy address is located 0 bytes to the right of [ 29.314197] allocated 7936-byte region [fff00000c64a4000, fff00000c64a5f00) [ 29.314282] [ 29.314321] The buggy address belongs to the physical page: [ 29.314368] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064a0 [ 29.314420] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.314663] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.314728] page_type: f5(slab) [ 29.314783] raw: 0bfffe0000000040 fff00000c0002280 dead000000000100 dead000000000122 [ 29.314870] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 29.314981] head: 0bfffe0000000040 fff00000c0002280 dead000000000100 dead000000000122 [ 29.315074] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 29.315156] head: 0bfffe0000000003 ffffc1ffc3192801 00000000ffffffff 00000000ffffffff [ 29.315277] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 29.315329] page dumped because: kasan: bad access detected [ 29.315359] [ 29.315377] Memory state around the buggy address: [ 29.315434] fff00000c64a5e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.315477] fff00000c64a5e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.315522] >fff00000c64a5f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.315560] ^ [ 29.315586] fff00000c64a5f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.315627] fff00000c64a6000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.315664] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[ 29.304094] ================================================================== [ 29.304153] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488 [ 29.304200] Write of size 1 at addr fff00000c5a4de78 by task kunit_try_catch/173 [ 29.304268] [ 29.304318] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 29.304421] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.304448] Hardware name: linux,dummy-virt (DT) [ 29.304508] Call trace: [ 29.304547] show_stack+0x20/0x38 (C) [ 29.304613] dump_stack_lvl+0x8c/0xd0 [ 29.304690] print_report+0x118/0x5d0 [ 29.304735] kasan_report+0xdc/0x128 [ 29.304794] __asan_report_store1_noabort+0x20/0x30 [ 29.304888] kmalloc_track_caller_oob_right+0x418/0x488 [ 29.304943] kunit_try_run_case+0x170/0x3f0 [ 29.304990] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.305043] kthread+0x328/0x630 [ 29.305182] ret_from_fork+0x10/0x20 [ 29.305233] [ 29.305349] Allocated by task 173: [ 29.305377] kasan_save_stack+0x3c/0x68 [ 29.305417] kasan_save_track+0x20/0x40 [ 29.305454] kasan_save_alloc_info+0x40/0x58 [ 29.305490] __kasan_kmalloc+0xd4/0xd8 [ 29.305526] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 29.305569] kmalloc_track_caller_oob_right+0x184/0x488 [ 29.305611] kunit_try_run_case+0x170/0x3f0 [ 29.305648] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.305691] kthread+0x328/0x630 [ 29.305722] ret_from_fork+0x10/0x20 [ 29.305756] [ 29.305774] The buggy address belongs to the object at fff00000c5a4de00 [ 29.305774] which belongs to the cache kmalloc-128 of size 128 [ 29.305831] The buggy address is located 0 bytes to the right of [ 29.305831] allocated 120-byte region [fff00000c5a4de00, fff00000c5a4de78) [ 29.305895] [ 29.305914] The buggy address belongs to the physical page: [ 29.305943] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a4d [ 29.305994] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.306040] page_type: f5(slab) [ 29.306075] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.306125] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.306177] page dumped because: kasan: bad access detected [ 29.306207] [ 29.306267] Memory state around the buggy address: [ 29.306314] fff00000c5a4dd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.306358] fff00000c5a4dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.306423] >fff00000c5a4de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.306462] ^ [ 29.306510] fff00000c5a4de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.306569] fff00000c5a4df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.306614] ================================================================== [ 29.298183] ================================================================== [ 29.298261] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 29.298314] Write of size 1 at addr fff00000c5a4dd78 by task kunit_try_catch/173 [ 29.298382] [ 29.298458] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 29.298563] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.298590] Hardware name: linux,dummy-virt (DT) [ 29.298626] Call trace: [ 29.298664] show_stack+0x20/0x38 (C) [ 29.298957] dump_stack_lvl+0x8c/0xd0 [ 29.299004] print_report+0x118/0x5d0 [ 29.299046] kasan_report+0xdc/0x128 [ 29.299117] __asan_report_store1_noabort+0x20/0x30 [ 29.299176] kmalloc_track_caller_oob_right+0x40c/0x488 [ 29.299229] kunit_try_run_case+0x170/0x3f0 [ 29.299276] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.299391] kthread+0x328/0x630 [ 29.299458] ret_from_fork+0x10/0x20 [ 29.299529] [ 29.299612] Allocated by task 173: [ 29.299672] kasan_save_stack+0x3c/0x68 [ 29.299779] kasan_save_track+0x20/0x40 [ 29.299924] kasan_save_alloc_info+0x40/0x58 [ 29.300010] __kasan_kmalloc+0xd4/0xd8 [ 29.300084] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 29.300195] kmalloc_track_caller_oob_right+0xa8/0x488 [ 29.300237] kunit_try_run_case+0x170/0x3f0 [ 29.300303] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.300387] kthread+0x328/0x630 [ 29.300688] ret_from_fork+0x10/0x20 [ 29.300751] [ 29.300848] The buggy address belongs to the object at fff00000c5a4dd00 [ 29.300848] which belongs to the cache kmalloc-128 of size 128 [ 29.300945] The buggy address is located 0 bytes to the right of [ 29.300945] allocated 120-byte region [fff00000c5a4dd00, fff00000c5a4dd78) [ 29.301103] [ 29.301151] The buggy address belongs to the physical page: [ 29.301201] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a4d [ 29.301286] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.301411] page_type: f5(slab) [ 29.301488] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.301560] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.301743] page dumped because: kasan: bad access detected [ 29.301997] [ 29.302069] Memory state around the buggy address: [ 29.302191] fff00000c5a4dc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.302265] fff00000c5a4dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.302335] >fff00000c5a4dd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.302457] ^ [ 29.302535] fff00000c5a4dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.302601] fff00000c5a4de00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.302746] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 29.280144] ================================================================== [ 29.280207] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 29.280259] Read of size 1 at addr fff00000c9957000 by task kunit_try_catch/171 [ 29.280311] [ 29.280341] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 29.280425] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.280451] Hardware name: linux,dummy-virt (DT) [ 29.280481] Call trace: [ 29.280501] show_stack+0x20/0x38 (C) [ 29.280549] dump_stack_lvl+0x8c/0xd0 [ 29.280593] print_report+0x118/0x5d0 [ 29.280635] kasan_report+0xdc/0x128 [ 29.280722] __asan_report_load1_noabort+0x20/0x30 [ 29.280789] kmalloc_node_oob_right+0x2f4/0x330 [ 29.280846] kunit_try_run_case+0x170/0x3f0 [ 29.280895] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.281082] kthread+0x328/0x630 [ 29.281243] ret_from_fork+0x10/0x20 [ 29.281293] [ 29.281327] Allocated by task 171: [ 29.281386] kasan_save_stack+0x3c/0x68 [ 29.281445] kasan_save_track+0x20/0x40 [ 29.281503] kasan_save_alloc_info+0x40/0x58 [ 29.281557] __kasan_kmalloc+0xd4/0xd8 [ 29.281642] __kmalloc_cache_node_noprof+0x178/0x3d0 [ 29.281700] kmalloc_node_oob_right+0xbc/0x330 [ 29.281757] kunit_try_run_case+0x170/0x3f0 [ 29.281801] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.281883] kthread+0x328/0x630 [ 29.281922] ret_from_fork+0x10/0x20 [ 29.281956] [ 29.281974] The buggy address belongs to the object at fff00000c9956000 [ 29.281974] which belongs to the cache kmalloc-4k of size 4096 [ 29.282031] The buggy address is located 0 bytes to the right of [ 29.282031] allocated 4096-byte region [fff00000c9956000, fff00000c9957000) [ 29.282213] [ 29.282239] The buggy address belongs to the physical page: [ 29.282435] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109950 [ 29.282634] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.282695] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.282784] page_type: f5(slab) [ 29.282877] raw: 0bfffe0000000040 fff00000c0002140 dead000000000100 dead000000000122 [ 29.282975] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 29.283114] head: 0bfffe0000000040 fff00000c0002140 dead000000000100 dead000000000122 [ 29.283216] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 29.283357] head: 0bfffe0000000003 ffffc1ffc3265401 00000000ffffffff 00000000ffffffff [ 29.283454] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 29.283551] page dumped because: kasan: bad access detected [ 29.283582] [ 29.283600] Memory state around the buggy address: [ 29.283630] fff00000c9956f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.283674] fff00000c9956f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.283716] >fff00000c9957000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.284203] ^ [ 29.285152] fff00000c9957080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.286470] fff00000c9957100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.289546] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 29.272478] ================================================================== [ 29.272591] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 29.272642] Read of size 1 at addr fff00000c8686a5f by task kunit_try_catch/169 [ 29.272691] [ 29.272721] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 29.272810] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.272837] Hardware name: linux,dummy-virt (DT) [ 29.272868] Call trace: [ 29.272890] show_stack+0x20/0x38 (C) [ 29.272936] dump_stack_lvl+0x8c/0xd0 [ 29.272990] print_report+0x118/0x5d0 [ 29.273034] kasan_report+0xdc/0x128 [ 29.273075] __asan_report_load1_noabort+0x20/0x30 [ 29.273122] kmalloc_oob_left+0x2ec/0x320 [ 29.273180] kunit_try_run_case+0x170/0x3f0 [ 29.273227] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.273280] kthread+0x328/0x630 [ 29.273321] ret_from_fork+0x10/0x20 [ 29.273367] [ 29.273384] Allocated by task 110: [ 29.273412] kasan_save_stack+0x3c/0x68 [ 29.273452] kasan_save_track+0x20/0x40 [ 29.273490] kasan_save_alloc_info+0x40/0x58 [ 29.273539] __kasan_kmalloc+0xd4/0xd8 [ 29.273582] __kmalloc_noprof+0x198/0x4c8 [ 29.273620] kunit_kmalloc_array+0x34/0x88 [ 29.273657] test_readerwriter+0x3b0/0x948 [ 29.273696] kunit_try_run_case+0x170/0x3f0 [ 29.273733] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.273777] kthread+0x328/0x630 [ 29.273807] ret_from_fork+0x10/0x20 [ 29.273841] [ 29.273859] The buggy address belongs to the object at fff00000c8686a40 [ 29.273859] which belongs to the cache kmalloc-16 of size 16 [ 29.273916] The buggy address is located 15 bytes to the right of [ 29.273916] allocated 16-byte region [fff00000c8686a40, fff00000c8686a50) [ 29.273981] [ 29.274007] The buggy address belongs to the physical page: [ 29.274304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c8686a40 pfn:0x108686 [ 29.274363] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.274427] page_type: f5(slab) [ 29.274464] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 29.274514] raw: fff00000c8686a40 000000008080007f 00000000f5000000 0000000000000000 [ 29.274557] page dumped because: kasan: bad access detected [ 29.274588] [ 29.274605] Memory state around the buggy address: [ 29.274635] fff00000c8686900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.274677] fff00000c8686980: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.274718] >fff00000c8686a00: fa fb fc fc fa fb fc fc fa fb fc fc 00 07 fc fc [ 29.274756] ^ [ 29.274802] fff00000c8686a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.274900] fff00000c8686b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.274991] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 29.246113] ================================================================== [ 29.246459] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 29.247327] Write of size 1 at addr fff00000c5a4dc73 by task kunit_try_catch/167 [ 29.247433] [ 29.248465] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 29.248644] Tainted: [N]=TEST [ 29.248693] Hardware name: linux,dummy-virt (DT) [ 29.248964] Call trace: [ 29.249182] show_stack+0x20/0x38 (C) [ 29.249547] dump_stack_lvl+0x8c/0xd0 [ 29.249643] print_report+0x118/0x5d0 [ 29.249718] kasan_report+0xdc/0x128 [ 29.249821] __asan_report_store1_noabort+0x20/0x30 [ 29.249883] kmalloc_oob_right+0x5a4/0x660 [ 29.249929] kunit_try_run_case+0x170/0x3f0 [ 29.250228] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.250298] kthread+0x328/0x630 [ 29.250376] ret_from_fork+0x10/0x20 [ 29.251478] [ 29.251609] Allocated by task 167: [ 29.252024] kasan_save_stack+0x3c/0x68 [ 29.252097] kasan_save_track+0x20/0x40 [ 29.252289] kasan_save_alloc_info+0x40/0x58 [ 29.252333] __kasan_kmalloc+0xd4/0xd8 [ 29.252370] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.252459] kmalloc_oob_right+0xb0/0x660 [ 29.252518] kunit_try_run_case+0x170/0x3f0 [ 29.252579] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.252643] kthread+0x328/0x630 [ 29.252675] ret_from_fork+0x10/0x20 [ 29.252978] [ 29.253233] The buggy address belongs to the object at fff00000c5a4dc00 [ 29.253233] which belongs to the cache kmalloc-128 of size 128 [ 29.253406] The buggy address is located 0 bytes to the right of [ 29.253406] allocated 115-byte region [fff00000c5a4dc00, fff00000c5a4dc73) [ 29.253512] [ 29.253778] The buggy address belongs to the physical page: [ 29.254692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a4d [ 29.254993] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.255590] page_type: f5(slab) [ 29.256140] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.256220] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.256356] page dumped because: kasan: bad access detected [ 29.256488] [ 29.256562] Memory state around the buggy address: [ 29.257288] fff00000c5a4db00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.257373] fff00000c5a4db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.257446] >fff00000c5a4dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.257502] ^ [ 29.257637] fff00000c5a4dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.257688] fff00000c5a4dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.257767] ================================================================== [ 29.258269] ================================================================== [ 29.258349] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 29.258430] Write of size 1 at addr fff00000c5a4dc78 by task kunit_try_catch/167 [ 29.258500] [ 29.258570] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 29.258662] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.258688] Hardware name: linux,dummy-virt (DT) [ 29.258930] Call trace: [ 29.258953] show_stack+0x20/0x38 (C) [ 29.259007] dump_stack_lvl+0x8c/0xd0 [ 29.259051] print_report+0x118/0x5d0 [ 29.259099] kasan_report+0xdc/0x128 [ 29.259153] __asan_report_store1_noabort+0x20/0x30 [ 29.259243] kmalloc_oob_right+0x538/0x660 [ 29.259330] kunit_try_run_case+0x170/0x3f0 [ 29.259435] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.259544] kthread+0x328/0x630 [ 29.259676] ret_from_fork+0x10/0x20 [ 29.259736] [ 29.259754] Allocated by task 167: [ 29.259780] kasan_save_stack+0x3c/0x68 [ 29.259819] kasan_save_track+0x20/0x40 [ 29.259857] kasan_save_alloc_info+0x40/0x58 [ 29.259893] __kasan_kmalloc+0xd4/0xd8 [ 29.259929] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.259968] kmalloc_oob_right+0xb0/0x660 [ 29.260004] kunit_try_run_case+0x170/0x3f0 [ 29.260042] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.260119] kthread+0x328/0x630 [ 29.260225] ret_from_fork+0x10/0x20 [ 29.260348] [ 29.260428] The buggy address belongs to the object at fff00000c5a4dc00 [ 29.260428] which belongs to the cache kmalloc-128 of size 128 [ 29.260557] The buggy address is located 5 bytes to the right of [ 29.260557] allocated 115-byte region [fff00000c5a4dc00, fff00000c5a4dc73) [ 29.260671] [ 29.260745] The buggy address belongs to the physical page: [ 29.260785] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a4d [ 29.260868] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.261181] page_type: f5(slab) [ 29.261238] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.261354] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.261433] page dumped because: kasan: bad access detected [ 29.261498] [ 29.261528] Memory state around the buggy address: [ 29.261621] fff00000c5a4db00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.261675] fff00000c5a4db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.261717] >fff00000c5a4dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.261993] ^ [ 29.262057] fff00000c5a4dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.262145] fff00000c5a4dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.262249] ================================================================== [ 29.262711] ================================================================== [ 29.262774] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 29.262876] Read of size 1 at addr fff00000c5a4dc80 by task kunit_try_catch/167 [ 29.262924] [ 29.262952] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 29.263034] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.263069] Hardware name: linux,dummy-virt (DT) [ 29.263100] Call trace: [ 29.263152] show_stack+0x20/0x38 (C) [ 29.263201] dump_stack_lvl+0x8c/0xd0 [ 29.263244] print_report+0x118/0x5d0 [ 29.263642] kasan_report+0xdc/0x128 [ 29.263687] __asan_report_load1_noabort+0x20/0x30 [ 29.263735] kmalloc_oob_right+0x5d0/0x660 [ 29.263781] kunit_try_run_case+0x170/0x3f0 [ 29.263830] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.263883] kthread+0x328/0x630 [ 29.263925] ret_from_fork+0x10/0x20 [ 29.263970] [ 29.264044] Allocated by task 167: [ 29.264108] kasan_save_stack+0x3c/0x68 [ 29.264244] kasan_save_track+0x20/0x40 [ 29.264344] kasan_save_alloc_info+0x40/0x58 [ 29.264438] __kasan_kmalloc+0xd4/0xd8 [ 29.264500] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.264539] kmalloc_oob_right+0xb0/0x660 [ 29.264849] kunit_try_run_case+0x170/0x3f0 [ 29.264919] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.264987] kthread+0x328/0x630 [ 29.265066] ret_from_fork+0x10/0x20 [ 29.265841] [ 29.265863] The buggy address belongs to the object at fff00000c5a4dc00 [ 29.265863] which belongs to the cache kmalloc-128 of size 128 [ 29.265930] The buggy address is located 13 bytes to the right of [ 29.265930] allocated 115-byte region [fff00000c5a4dc00, fff00000c5a4dc73) [ 29.265995] [ 29.266014] The buggy address belongs to the physical page: [ 29.266043] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a4d [ 29.266094] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.266150] page_type: f5(slab) [ 29.266185] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.266236] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.266276] page dumped because: kasan: bad access detected [ 29.266306] [ 29.266323] Memory state around the buggy address: [ 29.266353] fff00000c5a4db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.266395] fff00000c5a4dc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.266437] >fff00000c5a4dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.266474] ^ [ 29.266500] fff00000c5a4dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.266542] fff00000c5a4dd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.266580] ==================================================================
Failure - log-parser-boot/exception-warning-libmathint_log-at-intlog10
------------[ cut here ]------------ [ 108.203706] WARNING: lib/math/int_log.c:120 at intlog10+0x38/0x48, CPU#0: kunit_try_catch/689 [ 108.204737] Modules linked in: [ 108.204945] CPU: 0 UID: 0 PID: 689 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 108.205926] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 108.206180] Hardware name: linux,dummy-virt (DT) [ 108.206396] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 108.207248] pc : intlog10+0x38/0x48 [ 108.207667] lr : intlog10_test+0xe4/0x200 [ 108.208063] sp : ffff800082127c10 [ 108.208273] x29: ffff800082127c90 x28: 0000000000000000 x27: 0000000000000000 [ 108.208709] x26: 1ffe0000193905c1 x25: 0000000000000000 x24: ffff800082127ce0 [ 108.209469] x23: ffff800082127d00 x22: 0000000000000000 x21: 1ffff00010424f82 [ 108.209924] x20: ffff909024a1f0a0 x19: ffff800080087990 x18: 0000000039f1ead1 [ 108.210529] x17: 00000000a8ad3369 x16: fff00000c457b43c x15: 00000000831fe234 [ 108.211203] x14: 000000008155a86c x13: 1ffe00001b48eddd x12: ffff721205120b89 [ 108.211863] x11: 1ffff21205120b88 x10: ffff721205120b88 x9 : ffff9090220487b4 [ 108.212335] x8 : ffff909028905c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 108.214937] x5 : ffff700010424f82 x4 : 1ffff00010010f3b x3 : 1ffff21204943e14 [ 108.215650] x2 : 1ffff21204943e14 x1 : 0000000000000003 x0 : 0000000000000000 [ 108.216341] Call trace: [ 108.216675] intlog10+0x38/0x48 (P) [ 108.216880] kunit_try_run_case+0x170/0x3f0 [ 108.217123] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 108.217598] kthread+0x328/0x630 [ 108.217837] ret_from_fork+0x10/0x20 [ 108.218034] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-libmathint_log-at-intlog2
------------[ cut here ]------------ [ 108.153181] WARNING: lib/math/int_log.c:63 at intlog2+0xd8/0xf8, CPU#0: kunit_try_catch/671 [ 108.157356] Modules linked in: [ 108.158217] CPU: 0 UID: 0 PID: 671 Comm: kunit_try_catch Tainted: G B D N 6.16.0-rc5-next-20250710 #1 PREEMPT [ 108.159767] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 108.160495] Hardware name: linux,dummy-virt (DT) [ 108.160970] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 108.161275] pc : intlog2+0xd8/0xf8 [ 108.161459] lr : intlog2_test+0xe4/0x200 [ 108.161647] sp : ffff800082187c10 [ 108.161803] x29: ffff800082187c90 x28: 0000000000000000 x27: 0000000000000000 [ 108.162167] x26: 1ffe000019390421 x25: 0000000000000000 x24: ffff800082187ce0 [ 108.162513] x23: ffff800082187d00 x22: 0000000000000000 x21: 1ffff00010430f82 [ 108.162979] x20: ffff909024a1efa0 x19: ffff800080087990 x18: 00000000be0ef0b4 [ 108.163890] x17: 00000000529f3baa x16: fff00000c457b43c x15: fff00000ff616b48 [ 108.164863] x14: 0000000000018fff x13: 1ffe00001b48eddd x12: ffff721205120b89 [ 108.165602] x11: 1ffff21205120b88 x10: ffff721205120b88 x9 : ffff9090220489b4 [ 108.166337] x8 : ffff909028905c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 108.167199] x5 : ffff700010430f82 x4 : 1ffff00010010f3b x3 : 1ffff21204943df4 [ 108.168030] x2 : 1ffff21204943df4 x1 : 0000000000000003 x0 : 0000000000000000 [ 108.168779] Call trace: [ 108.169064] intlog2+0xd8/0xf8 (P) [ 108.169463] kunit_try_run_case+0x170/0x3f0 [ 108.169903] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 108.170449] kthread+0x328/0x630 [ 108.170840] ret_from_fork+0x10/0x20 [ 108.171323] ---[ end trace 0000000000000000 ]---