Date
July 11, 2025, 10:11 a.m.
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 32.894383] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 32.967232] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[ 32.730107] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc
[ 62.710487] ================================================================== [ 62.710577] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 62.710577] [ 62.710673] Use-after-free read at 0x00000000689434cb (in kfence-#191): [ 62.710726] test_krealloc+0x51c/0x830 [ 62.710774] kunit_try_run_case+0x170/0x3f0 [ 62.710824] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.710865] kthread+0x328/0x630 [ 62.710905] ret_from_fork+0x10/0x20 [ 62.710945] [ 62.710969] kfence-#191: 0x00000000689434cb-0x00000000f55c9cd4, size=32, cache=kmalloc-32 [ 62.710969] [ 62.711030] allocated by task 368 on cpu 1 at 62.709782s (0.001244s ago): [ 62.711102] test_alloc+0x29c/0x628 [ 62.711142] test_krealloc+0xc0/0x830 [ 62.711183] kunit_try_run_case+0x170/0x3f0 [ 62.711224] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.711266] kthread+0x328/0x630 [ 62.711303] ret_from_fork+0x10/0x20 [ 62.711357] [ 62.711380] freed by task 368 on cpu 1 at 62.710045s (0.001331s ago): [ 62.711445] krealloc_noprof+0x148/0x360 [ 62.711486] test_krealloc+0x1dc/0x830 [ 62.711527] kunit_try_run_case+0x170/0x3f0 [ 62.711568] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.711609] kthread+0x328/0x630 [ 62.711645] ret_from_fork+0x10/0x20 [ 62.711683] [ 62.711731] CPU: 1 UID: 0 PID: 368 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 62.711812] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.711843] Hardware name: linux,dummy-virt (DT) [ 62.711878] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[ 62.621873] ================================================================== [ 62.621982] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 62.621982] [ 62.622085] Use-after-free read at 0x000000001d7255a7 (in kfence-#190): [ 62.622141] test_memcache_typesafe_by_rcu+0x280/0x560 [ 62.622192] kunit_try_run_case+0x170/0x3f0 [ 62.622238] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.622281] kthread+0x328/0x630 [ 62.622339] ret_from_fork+0x10/0x20 [ 62.622384] [ 62.622409] kfence-#190: 0x000000001d7255a7-0x00000000d2d60b17, size=32, cache=test [ 62.622409] [ 62.622464] allocated by task 366 on cpu 0 at 62.609844s (0.012616s ago): [ 62.622537] test_alloc+0x230/0x628 [ 62.622579] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 62.622622] kunit_try_run_case+0x170/0x3f0 [ 62.622663] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.622703] kthread+0x328/0x630 [ 62.622738] ret_from_fork+0x10/0x20 [ 62.622778] [ 62.622801] freed by task 366 on cpu 0 at 62.609966s (0.012832s ago): [ 62.622859] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 62.622903] kunit_try_run_case+0x170/0x3f0 [ 62.622944] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.622985] kthread+0x328/0x630 [ 62.623026] ret_from_fork+0x10/0x20 [ 62.623064] [ 62.623110] CPU: 0 UID: 0 PID: 366 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 62.623192] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.623223] Hardware name: linux,dummy-virt (DT) [ 62.623256] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access
[ 40.479271] ================================================================== [ 40.479444] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 40.479444] [ 40.479557] Invalid read at 0x000000004b20b36f: [ 40.479745] test_invalid_access+0xdc/0x1f0 [ 40.479820] kunit_try_run_case+0x170/0x3f0 [ 40.479910] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.479962] kthread+0x328/0x630 [ 40.480673] ret_from_fork+0x10/0x20 [ 40.480772] [ 40.480829] CPU: 0 UID: 0 PID: 362 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 40.481013] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.481056] Hardware name: linux,dummy-virt (DT) [ 40.481539] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[ 40.246172] ================================================================== [ 40.246270] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 40.246270] [ 40.246354] Corrupted memory at 0x00000000ec2ad28b [ ! . . . . . . . . . . . . . . . ] (in kfence-#186): [ 40.246677] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 40.246729] kunit_try_run_case+0x170/0x3f0 [ 40.246774] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.246815] kthread+0x328/0x630 [ 40.246852] ret_from_fork+0x10/0x20 [ 40.246892] [ 40.246916] kfence-#186: 0x00000000d25665fd-0x000000008fcc53a5, size=73, cache=kmalloc-96 [ 40.246916] [ 40.246972] allocated by task 356 on cpu 1 at 40.245901s (0.001068s ago): [ 40.247043] test_alloc+0x29c/0x628 [ 40.247086] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 40.247131] kunit_try_run_case+0x170/0x3f0 [ 40.247172] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.247214] kthread+0x328/0x630 [ 40.247249] ret_from_fork+0x10/0x20 [ 40.247288] [ 40.247313] freed by task 356 on cpu 1 at 40.246078s (0.001231s ago): [ 40.247389] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 40.247435] kunit_try_run_case+0x170/0x3f0 [ 40.247477] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.247520] kthread+0x328/0x630 [ 40.247555] ret_from_fork+0x10/0x20 [ 40.247595] [ 40.247639] CPU: 1 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 40.247719] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.247749] Hardware name: linux,dummy-virt (DT) [ 40.247784] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[ 40.142288] ================================================================== [ 40.142407] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 40.142407] [ 40.142513] Out-of-bounds read at 0x0000000085951910 (105B right of kfence-#185): [ 40.142578] test_kmalloc_aligned_oob_read+0x238/0x468 [ 40.142646] kunit_try_run_case+0x170/0x3f0 [ 40.142695] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.142738] kthread+0x328/0x630 [ 40.142780] ret_from_fork+0x10/0x20 [ 40.142821] [ 40.142845] kfence-#185: 0x000000002a3ca38a-0x00000000dd544513, size=73, cache=kmalloc-96 [ 40.142845] [ 40.142901] allocated by task 354 on cpu 1 at 40.142012s (0.000885s ago): [ 40.142974] test_alloc+0x29c/0x628 [ 40.143016] test_kmalloc_aligned_oob_read+0x100/0x468 [ 40.143071] kunit_try_run_case+0x170/0x3f0 [ 40.143113] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.143154] kthread+0x328/0x630 [ 40.143193] ret_from_fork+0x10/0x20 [ 40.143233] [ 40.143282] CPU: 1 UID: 0 PID: 354 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 40.143376] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.143407] Hardware name: linux,dummy-virt (DT) [ 40.143443] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption
[ 36.398030] ================================================================== [ 36.398126] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 36.398126] [ 36.398192] Corrupted memory at 0x000000002dddf327 [ ! ] (in kfence-#149): [ 36.398311] test_corruption+0x1d8/0x378 [ 36.398375] kunit_try_run_case+0x170/0x3f0 [ 36.398419] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.398461] kthread+0x328/0x630 [ 36.398503] ret_from_fork+0x10/0x20 [ 36.398548] [ 36.398574] kfence-#149: 0x0000000035a7a9f0-0x00000000e77ebb00, size=32, cache=test [ 36.398574] [ 36.398637] allocated by task 344 on cpu 0 at 36.397873s (0.000759s ago): [ 36.398707] test_alloc+0x230/0x628 [ 36.398750] test_corruption+0x198/0x378 [ 36.398793] kunit_try_run_case+0x170/0x3f0 [ 36.398837] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.398878] kthread+0x328/0x630 [ 36.398915] ret_from_fork+0x10/0x20 [ 36.398954] [ 36.398977] freed by task 344 on cpu 0 at 36.397934s (0.001040s ago): [ 36.399048] test_corruption+0x1d8/0x378 [ 36.399090] kunit_try_run_case+0x170/0x3f0 [ 36.399131] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.399172] kthread+0x328/0x630 [ 36.399209] ret_from_fork+0x10/0x20 [ 36.399247] [ 36.399290] CPU: 0 UID: 0 PID: 344 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 36.399381] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.399412] Hardware name: linux,dummy-virt (DT) [ 36.399446] ================================================================== [ 35.982152] ================================================================== [ 35.982246] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 35.982246] [ 35.982313] Corrupted memory at 0x0000000099b8baa9 [ ! ] (in kfence-#145): [ 35.982466] test_corruption+0x284/0x378 [ 35.982516] kunit_try_run_case+0x170/0x3f0 [ 35.982561] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.982602] kthread+0x328/0x630 [ 35.982642] ret_from_fork+0x10/0x20 [ 35.982682] [ 35.982707] kfence-#145: 0x00000000e0489fb1-0x000000004acda954, size=32, cache=kmalloc-32 [ 35.982707] [ 35.982764] allocated by task 342 on cpu 0 at 35.981861s (0.000899s ago): [ 35.982828] test_alloc+0x29c/0x628 [ 35.982870] test_corruption+0x198/0x378 [ 35.982912] kunit_try_run_case+0x170/0x3f0 [ 35.982952] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.982994] kthread+0x328/0x630 [ 35.983289] ret_from_fork+0x10/0x20 [ 35.983340] [ 35.983363] freed by task 342 on cpu 0 at 35.981971s (0.001389s ago): [ 35.983428] test_corruption+0x284/0x378 [ 35.983468] kunit_try_run_case+0x170/0x3f0 [ 35.983510] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.983551] kthread+0x328/0x630 [ 35.983588] ret_from_fork+0x10/0x20 [ 35.983627] [ 35.983672] CPU: 0 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 35.983752] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.983781] Hardware name: linux,dummy-virt (DT) [ 35.983815] ================================================================== [ 36.190034] ================================================================== [ 36.190136] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 36.190136] [ 36.190201] Corrupted memory at 0x00000000c78f1d34 [ ! . . . . . . . . . . . . . . . ] (in kfence-#147): [ 36.190529] test_corruption+0x120/0x378 [ 36.190578] kunit_try_run_case+0x170/0x3f0 [ 36.190625] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.190667] kthread+0x328/0x630 [ 36.190707] ret_from_fork+0x10/0x20 [ 36.190749] [ 36.190775] kfence-#147: 0x00000000887355bd-0x00000000f5e32572, size=32, cache=test [ 36.190775] [ 36.190832] allocated by task 344 on cpu 0 at 36.189880s (0.000948s ago): [ 36.190896] test_alloc+0x230/0x628 [ 36.190937] test_corruption+0xdc/0x378 [ 36.190977] kunit_try_run_case+0x170/0x3f0 [ 36.191019] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.191063] kthread+0x328/0x630 [ 36.191100] ret_from_fork+0x10/0x20 [ 36.191138] [ 36.191161] freed by task 344 on cpu 0 at 36.189940s (0.001218s ago): [ 36.191224] test_corruption+0x120/0x378 [ 36.191266] kunit_try_run_case+0x170/0x3f0 [ 36.191306] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.191358] kthread+0x328/0x630 [ 36.191394] ret_from_fork+0x10/0x20 [ 36.191434] [ 36.191478] CPU: 0 UID: 0 PID: 344 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 36.191560] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.191588] Hardware name: linux,dummy-virt (DT) [ 36.191621] ================================================================== [ 35.878176] ================================================================== [ 35.878299] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 35.878299] [ 35.878392] Corrupted memory at 0x000000007a63092a [ ! . . . . . . . . . . . . . . . ] (in kfence-#144): [ 35.879552] test_corruption+0x278/0x378 [ 35.879609] kunit_try_run_case+0x170/0x3f0 [ 35.879658] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.879702] kthread+0x328/0x630 [ 35.879742] ret_from_fork+0x10/0x20 [ 35.879785] [ 35.879809] kfence-#144: 0x00000000f87c5ec7-0x0000000073755430, size=32, cache=kmalloc-32 [ 35.879809] [ 35.879870] allocated by task 342 on cpu 0 at 35.877882s (0.001985s ago): [ 35.879937] test_alloc+0x29c/0x628 [ 35.879981] test_corruption+0xdc/0x378 [ 35.880024] kunit_try_run_case+0x170/0x3f0 [ 35.880065] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.880107] kthread+0x328/0x630 [ 35.880143] ret_from_fork+0x10/0x20 [ 35.880182] [ 35.880206] freed by task 342 on cpu 0 at 35.877989s (0.002213s ago): [ 35.880270] test_corruption+0x278/0x378 [ 35.880310] kunit_try_run_case+0x170/0x3f0 [ 35.880364] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.880403] kthread+0x328/0x630 [ 35.880438] ret_from_fork+0x10/0x20 [ 35.880478] [ 35.880527] CPU: 0 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 35.880606] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.880636] Hardware name: linux,dummy-virt (DT) [ 35.880671] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[ 35.254469] ================================================================== [ 35.254825] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 35.254825] [ 35.254949] Invalid free of 0x00000000f666ee47 (in kfence-#138): [ 35.255050] test_invalid_addr_free+0x1ac/0x238 [ 35.255114] kunit_try_run_case+0x170/0x3f0 [ 35.255372] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.255553] kthread+0x328/0x630 [ 35.255616] ret_from_fork+0x10/0x20 [ 35.255681] [ 35.255726] kfence-#138: 0x000000001727de11-0x00000000aceca602, size=32, cache=kmalloc-32 [ 35.255726] [ 35.255812] allocated by task 338 on cpu 0 at 35.254306s (0.001495s ago): [ 35.255895] test_alloc+0x29c/0x628 [ 35.255938] test_invalid_addr_free+0xd4/0x238 [ 35.255998] kunit_try_run_case+0x170/0x3f0 [ 35.256061] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.256122] kthread+0x328/0x630 [ 35.256179] ret_from_fork+0x10/0x20 [ 35.256222] [ 35.256269] CPU: 0 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 35.256509] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.256561] Hardware name: linux,dummy-virt (DT) [ 35.256595] ================================================================== [ 35.360165] ================================================================== [ 35.360256] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 35.360256] [ 35.360318] Invalid free of 0x000000004a76aaa3 (in kfence-#139): [ 35.360742] test_invalid_addr_free+0xec/0x238 [ 35.360819] kunit_try_run_case+0x170/0x3f0 [ 35.360913] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.360966] kthread+0x328/0x630 [ 35.361006] ret_from_fork+0x10/0x20 [ 35.361056] [ 35.361083] kfence-#139: 0x000000003fbfb905-0x00000000c143fdf3, size=32, cache=test [ 35.361083] [ 35.361139] allocated by task 340 on cpu 0 at 35.359694s (0.001441s ago): [ 35.361208] test_alloc+0x230/0x628 [ 35.361252] test_invalid_addr_free+0xd4/0x238 [ 35.361293] kunit_try_run_case+0x170/0x3f0 [ 35.361345] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.361864] kthread+0x328/0x630 [ 35.362055] ret_from_fork+0x10/0x20 [ 35.362180] [ 35.362414] CPU: 0 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 35.362568] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.362602] Hardware name: linux,dummy-virt (DT) [ 35.362637] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free
[ 35.046721] ================================================================== [ 35.046827] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 35.046827] [ 35.046980] Invalid free of 0x00000000eecc345f (in kfence-#136): [ 35.047146] test_double_free+0x1bc/0x238 [ 35.047226] kunit_try_run_case+0x170/0x3f0 [ 35.047281] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.047359] kthread+0x328/0x630 [ 35.047402] ret_from_fork+0x10/0x20 [ 35.047460] [ 35.047494] kfence-#136: 0x00000000eecc345f-0x0000000030a7a33e, size=32, cache=kmalloc-32 [ 35.047494] [ 35.047554] allocated by task 334 on cpu 0 at 35.046106s (0.001443s ago): [ 35.047618] test_alloc+0x29c/0x628 [ 35.047661] test_double_free+0xd4/0x238 [ 35.047775] kunit_try_run_case+0x170/0x3f0 [ 35.047818] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.047860] kthread+0x328/0x630 [ 35.047898] ret_from_fork+0x10/0x20 [ 35.047937] [ 35.047967] freed by task 334 on cpu 0 at 35.046432s (0.001530s ago): [ 35.048031] test_double_free+0x1ac/0x238 [ 35.048073] kunit_try_run_case+0x170/0x3f0 [ 35.048114] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.048155] kthread+0x328/0x630 [ 35.048191] ret_from_fork+0x10/0x20 [ 35.048241] [ 35.048288] CPU: 0 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 35.048380] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.048408] Hardware name: linux,dummy-virt (DT) [ 35.048441] ================================================================== [ 35.150669] ================================================================== [ 35.150745] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 35.150745] [ 35.150831] Invalid free of 0x0000000027293636 (in kfence-#137): [ 35.150924] test_double_free+0x100/0x238 [ 35.150970] kunit_try_run_case+0x170/0x3f0 [ 35.151016] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.151068] kthread+0x328/0x630 [ 35.151134] ret_from_fork+0x10/0x20 [ 35.151175] [ 35.151201] kfence-#137: 0x0000000027293636-0x00000000c117db09, size=32, cache=test [ 35.151201] [ 35.151531] allocated by task 336 on cpu 0 at 35.150431s (0.000976s ago): [ 35.151628] test_alloc+0x230/0x628 [ 35.151748] test_double_free+0xd4/0x238 [ 35.151811] kunit_try_run_case+0x170/0x3f0 [ 35.151854] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.151911] kthread+0x328/0x630 [ 35.151969] ret_from_fork+0x10/0x20 [ 35.152024] [ 35.152095] freed by task 336 on cpu 0 at 35.150516s (0.001569s ago): [ 35.152179] test_double_free+0xf0/0x238 [ 35.152222] kunit_try_run_case+0x170/0x3f0 [ 35.152265] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.152544] kthread+0x328/0x630 [ 35.152611] ret_from_fork+0x10/0x20 [ 35.152670] [ 35.152752] CPU: 0 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 35.152844] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.152874] Hardware name: linux,dummy-virt (DT) [ 35.152907] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[ 34.618749] ================================================================== [ 34.618826] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 34.618826] [ 34.618938] Use-after-free read at 0x0000000014593da9 (in kfence-#132): [ 34.619010] test_use_after_free_read+0x114/0x248 [ 34.619073] kunit_try_run_case+0x170/0x3f0 [ 34.619140] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.619181] kthread+0x328/0x630 [ 34.619221] ret_from_fork+0x10/0x20 [ 34.619259] [ 34.619454] kfence-#132: 0x0000000014593da9-0x0000000024053a75, size=32, cache=kmalloc-32 [ 34.619454] [ 34.619534] allocated by task 326 on cpu 0 at 34.618442s (0.001081s ago): [ 34.619687] test_alloc+0x29c/0x628 [ 34.619749] test_use_after_free_read+0xd0/0x248 [ 34.619793] kunit_try_run_case+0x170/0x3f0 [ 34.619838] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.619896] kthread+0x328/0x630 [ 34.619948] ret_from_fork+0x10/0x20 [ 34.620013] [ 34.620037] freed by task 326 on cpu 0 at 34.618534s (0.001499s ago): [ 34.620102] test_use_after_free_read+0x1c0/0x248 [ 34.620147] kunit_try_run_case+0x170/0x3f0 [ 34.620283] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.620332] kthread+0x328/0x630 [ 34.620387] ret_from_fork+0x10/0x20 [ 34.620445] [ 34.620512] CPU: 0 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 34.620606] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.620656] Hardware name: linux,dummy-virt (DT) [ 34.620720] ================================================================== [ 34.726614] ================================================================== [ 34.726710] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 34.726710] [ 34.726858] Use-after-free read at 0x000000006e4a0e1c (in kfence-#133): [ 34.726911] test_use_after_free_read+0x114/0x248 [ 34.726979] kunit_try_run_case+0x170/0x3f0 [ 34.727049] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.727109] kthread+0x328/0x630 [ 34.727167] ret_from_fork+0x10/0x20 [ 34.727210] [ 34.727242] kfence-#133: 0x000000006e4a0e1c-0x00000000a9991e0b, size=32, cache=test [ 34.727242] [ 34.727371] allocated by task 328 on cpu 0 at 34.726369s (0.000980s ago): [ 34.727442] test_alloc+0x230/0x628 [ 34.727494] test_use_after_free_read+0xd0/0x248 [ 34.727558] kunit_try_run_case+0x170/0x3f0 [ 34.727748] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.727819] kthread+0x328/0x630 [ 34.727856] ret_from_fork+0x10/0x20 [ 34.727966] [ 34.728051] freed by task 328 on cpu 0 at 34.726432s (0.001597s ago): [ 34.728172] test_use_after_free_read+0xf0/0x248 [ 34.728224] kunit_try_run_case+0x170/0x3f0 [ 34.728292] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.728350] kthread+0x328/0x630 [ 34.728407] ret_from_fork+0x10/0x20 [ 34.728447] [ 34.728492] CPU: 0 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 34.728592] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.728631] Hardware name: linux,dummy-virt (DT) [ 34.728680] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[ 34.406508] ================================================================== [ 34.406604] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 34.406604] [ 34.406805] Out-of-bounds write at 0x0000000053304692 (1B left of kfence-#130): [ 34.406907] test_out_of_bounds_write+0x100/0x240 [ 34.407010] kunit_try_run_case+0x170/0x3f0 [ 34.407067] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.407108] kthread+0x328/0x630 [ 34.407165] ret_from_fork+0x10/0x20 [ 34.407225] [ 34.407260] kfence-#130: 0x0000000032f2e0d9-0x0000000063cfa4a3, size=32, cache=kmalloc-32 [ 34.407260] [ 34.407340] allocated by task 322 on cpu 0 at 34.406286s (0.001033s ago): [ 34.407413] test_alloc+0x29c/0x628 [ 34.407456] test_out_of_bounds_write+0xc8/0x240 [ 34.407607] kunit_try_run_case+0x170/0x3f0 [ 34.407653] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.407700] kthread+0x328/0x630 [ 34.407768] ret_from_fork+0x10/0x20 [ 34.407809] [ 34.407934] CPU: 0 UID: 0 PID: 322 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 34.408075] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.408124] Hardware name: linux,dummy-virt (DT) [ 34.408253] ================================================================== [ 34.510317] ================================================================== [ 34.510408] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 34.510408] [ 34.510545] Out-of-bounds write at 0x00000000a9236e87 (1B left of kfence-#131): [ 34.510618] test_out_of_bounds_write+0x100/0x240 [ 34.510691] kunit_try_run_case+0x170/0x3f0 [ 34.510748] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.510791] kthread+0x328/0x630 [ 34.510847] ret_from_fork+0x10/0x20 [ 34.510890] [ 34.510966] kfence-#131: 0x00000000149145d4-0x000000003c87ab66, size=32, cache=test [ 34.510966] [ 34.511188] allocated by task 324 on cpu 0 at 34.510213s (0.000960s ago): [ 34.511261] test_alloc+0x230/0x628 [ 34.511303] test_out_of_bounds_write+0xc8/0x240 [ 34.511374] kunit_try_run_case+0x170/0x3f0 [ 34.511504] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.511547] kthread+0x328/0x630 [ 34.511582] ret_from_fork+0x10/0x20 [ 34.511620] [ 34.511666] CPU: 0 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 34.511753] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.511844] Hardware name: linux,dummy-virt (DT) [ 34.511898] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[ 33.974472] ================================================================== [ 33.974570] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 33.974570] [ 33.974686] Out-of-bounds read at 0x000000002cfb0207 (32B right of kfence-#126): [ 33.974783] test_out_of_bounds_read+0x1c8/0x3e0 [ 33.974836] kunit_try_run_case+0x170/0x3f0 [ 33.974899] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.974942] kthread+0x328/0x630 [ 33.975340] ret_from_fork+0x10/0x20 [ 33.975413] [ 33.975495] kfence-#126: 0x0000000035b2aa23-0x00000000a2d8c65b, size=32, cache=kmalloc-32 [ 33.975495] [ 33.975569] allocated by task 318 on cpu 0 at 33.974123s (0.001425s ago): [ 33.975660] test_alloc+0x29c/0x628 [ 33.975740] test_out_of_bounds_read+0x198/0x3e0 [ 33.975784] kunit_try_run_case+0x170/0x3f0 [ 33.975843] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.975907] kthread+0x328/0x630 [ 33.975944] ret_from_fork+0x10/0x20 [ 33.975981] [ 33.976131] CPU: 0 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.976214] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.976404] Hardware name: linux,dummy-virt (DT) [ 33.976501] ================================================================== [ 34.190524] ================================================================== [ 34.190625] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 34.190625] [ 34.190721] Out-of-bounds read at 0x00000000ffcb1350 (1B left of kfence-#128): [ 34.190779] test_out_of_bounds_read+0x114/0x3e0 [ 34.191032] kunit_try_run_case+0x170/0x3f0 [ 34.191105] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.191186] kthread+0x328/0x630 [ 34.191250] ret_from_fork+0x10/0x20 [ 34.191308] [ 34.191364] kfence-#128: 0x00000000e4dc167d-0x00000000e2de8d29, size=32, cache=test [ 34.191364] [ 34.191474] allocated by task 320 on cpu 0 at 34.190420s (0.001032s ago): [ 34.191712] test_alloc+0x230/0x628 [ 34.191914] test_out_of_bounds_read+0xdc/0x3e0 [ 34.191996] kunit_try_run_case+0x170/0x3f0 [ 34.192039] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.192162] kthread+0x328/0x630 [ 34.192229] ret_from_fork+0x10/0x20 [ 34.192422] [ 34.192511] CPU: 0 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 34.192613] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.192660] Hardware name: linux,dummy-virt (DT) [ 34.192693] ================================================================== [ 33.650687] ================================================================== [ 33.651010] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 33.651010] [ 33.651254] Out-of-bounds read at 0x0000000060d011b6 (1B left of kfence-#123): [ 33.651413] test_out_of_bounds_read+0x114/0x3e0 [ 33.651477] kunit_try_run_case+0x170/0x3f0 [ 33.651525] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.651593] kthread+0x328/0x630 [ 33.651815] ret_from_fork+0x10/0x20 [ 33.651857] [ 33.651882] kfence-#123: 0x000000004a9ab046-0x00000000fdb335e4, size=32, cache=kmalloc-32 [ 33.651882] [ 33.652181] allocated by task 318 on cpu 0 at 33.650230s (0.001944s ago): [ 33.652266] test_alloc+0x29c/0x628 [ 33.652311] test_out_of_bounds_read+0xdc/0x3e0 [ 33.652362] kunit_try_run_case+0x170/0x3f0 [ 33.652405] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.652471] kthread+0x328/0x630 [ 33.652667] ret_from_fork+0x10/0x20 [ 33.652793] [ 33.652844] CPU: 0 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.653043] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.653573] Hardware name: linux,dummy-virt (DT) [ 33.654048] ================================================================== [ 34.298233] ================================================================== [ 34.298344] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 34.298344] [ 34.298433] Out-of-bounds read at 0x000000005c2fbc9d (32B right of kfence-#129): [ 34.298520] test_out_of_bounds_read+0x1c8/0x3e0 [ 34.298596] kunit_try_run_case+0x170/0x3f0 [ 34.298641] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.298688] kthread+0x328/0x630 [ 34.298751] ret_from_fork+0x10/0x20 [ 34.298798] [ 34.298858] kfence-#129: 0x00000000a91cbf5a-0x000000006ffdf3c5, size=32, cache=test [ 34.298858] [ 34.298912] allocated by task 320 on cpu 0 at 34.298143s (0.000765s ago): [ 34.298983] test_alloc+0x230/0x628 [ 34.299030] test_out_of_bounds_read+0x198/0x3e0 [ 34.299280] kunit_try_run_case+0x170/0x3f0 [ 34.299348] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.299397] kthread+0x328/0x630 [ 34.299433] ret_from_fork+0x10/0x20 [ 34.299485] [ 34.299529] CPU: 0 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 34.299686] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.299845] Hardware name: linux,dummy-virt (DT) [ 34.300016] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-kmalloc_uaf_16
[ 30.347487] ================================================================== [ 30.347591] BUG: KFENCE: use-after-free read in kmalloc_uaf_16+0x1fc/0x438 [ 30.347591] [ 30.347677] Use-after-free read at 0x00000000ad07e3e8 (in kfence-#98): [ 30.347878] kmalloc_uaf_16+0x1fc/0x438 [ 30.347919] kunit_try_run_case+0x170/0x3f0 [ 30.347959] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.347997] kthread+0x328/0x630 [ 30.348031] ret_from_fork+0x10/0x20 [ 30.348070] [ 30.348232] kfence-#98: 0x00000000ad07e3e8-0x00000000d9f8c6bb, size=16, cache=kmalloc-16 [ 30.348232] [ 30.348536] allocated by task 199 on cpu 1 at 30.346060s (0.002374s ago): [ 30.349797] kmalloc_uaf_16+0x140/0x438 [ 30.349865] kunit_try_run_case+0x170/0x3f0 [ 30.350621] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.350674] kthread+0x328/0x630 [ 30.350707] ret_from_fork+0x10/0x20 [ 30.350925] [ 30.351825] freed by task 199 on cpu 1 at 30.346424s (0.004550s ago): [ 30.352171] kmalloc_uaf_16+0x190/0x438 [ 30.352215] kunit_try_run_case+0x170/0x3f0 [ 30.352491] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.352548] kthread+0x328/0x630 [ 30.352581] ret_from_fork+0x10/0x20 [ 30.352639] [ 30.353150] CPU: 1 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.353557] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.353710] Hardware name: linux,dummy-virt (DT) [ 30.353882] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[ 33.527222] ================================================================== [ 33.527293] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 33.527433] Write of size 121 at addr fff00000c91a7600 by task kunit_try_catch/316 [ 33.527506] [ 33.527574] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.527737] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.527770] Hardware name: linux,dummy-virt (DT) [ 33.527804] Call trace: [ 33.527845] show_stack+0x20/0x38 (C) [ 33.528046] dump_stack_lvl+0x8c/0xd0 [ 33.528398] print_report+0x118/0x5d0 [ 33.528639] kasan_report+0xdc/0x128 [ 33.528744] kasan_check_range+0x100/0x1a8 [ 33.528930] __kasan_check_write+0x20/0x30 [ 33.529003] strncpy_from_user+0x3c/0x2a0 [ 33.529190] copy_user_test_oob+0x5c0/0xec8 [ 33.529336] kunit_try_run_case+0x170/0x3f0 [ 33.529518] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.529853] kthread+0x328/0x630 [ 33.529911] ret_from_fork+0x10/0x20 [ 33.529979] [ 33.530022] Allocated by task 316: [ 33.530076] kasan_save_stack+0x3c/0x68 [ 33.530121] kasan_save_track+0x20/0x40 [ 33.530163] kasan_save_alloc_info+0x40/0x58 [ 33.530511] __kasan_kmalloc+0xd4/0xd8 [ 33.530848] __kmalloc_noprof+0x198/0x4c8 [ 33.531106] kunit_kmalloc_array+0x34/0x88 [ 33.531408] copy_user_test_oob+0xac/0xec8 [ 33.531573] kunit_try_run_case+0x170/0x3f0 [ 33.531710] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.531785] kthread+0x328/0x630 [ 33.531822] ret_from_fork+0x10/0x20 [ 33.531888] [ 33.532190] The buggy address belongs to the object at fff00000c91a7600 [ 33.532190] which belongs to the cache kmalloc-128 of size 128 [ 33.532608] The buggy address is located 0 bytes inside of [ 33.532608] allocated 120-byte region [fff00000c91a7600, fff00000c91a7678) [ 33.532698] [ 33.532857] The buggy address belongs to the physical page: [ 33.532902] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a7 [ 33.533127] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.533410] page_type: f5(slab) [ 33.533467] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.533610] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.533654] page dumped because: kasan: bad access detected [ 33.533946] [ 33.533998] Memory state around the buggy address: [ 33.534109] fff00000c91a7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.534186] fff00000c91a7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.534275] >fff00000c91a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.534514] ^ [ 33.534713] fff00000c91a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.534840] fff00000c91a7700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.534883] ================================================================== [ 33.536419] ================================================================== [ 33.536764] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 33.537138] Write of size 1 at addr fff00000c91a7678 by task kunit_try_catch/316 [ 33.537209] [ 33.537245] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.537389] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.537420] Hardware name: linux,dummy-virt (DT) [ 33.537453] Call trace: [ 33.537476] show_stack+0x20/0x38 (C) [ 33.537529] dump_stack_lvl+0x8c/0xd0 [ 33.537886] print_report+0x118/0x5d0 [ 33.538221] kasan_report+0xdc/0x128 [ 33.538388] __asan_report_store1_noabort+0x20/0x30 [ 33.538676] strncpy_from_user+0x270/0x2a0 [ 33.538877] copy_user_test_oob+0x5c0/0xec8 [ 33.539219] kunit_try_run_case+0x170/0x3f0 [ 33.539346] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.539444] kthread+0x328/0x630 [ 33.539523] ret_from_fork+0x10/0x20 [ 33.539707] [ 33.539770] Allocated by task 316: [ 33.539827] kasan_save_stack+0x3c/0x68 [ 33.540021] kasan_save_track+0x20/0x40 [ 33.540239] kasan_save_alloc_info+0x40/0x58 [ 33.540317] __kasan_kmalloc+0xd4/0xd8 [ 33.540539] __kmalloc_noprof+0x198/0x4c8 [ 33.540750] kunit_kmalloc_array+0x34/0x88 [ 33.540869] copy_user_test_oob+0xac/0xec8 [ 33.541023] kunit_try_run_case+0x170/0x3f0 [ 33.541104] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.541150] kthread+0x328/0x630 [ 33.541207] ret_from_fork+0x10/0x20 [ 33.541509] [ 33.541775] The buggy address belongs to the object at fff00000c91a7600 [ 33.541775] which belongs to the cache kmalloc-128 of size 128 [ 33.542006] The buggy address is located 0 bytes to the right of [ 33.542006] allocated 120-byte region [fff00000c91a7600, fff00000c91a7678) [ 33.542083] [ 33.542108] The buggy address belongs to the physical page: [ 33.542149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a7 [ 33.542522] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.542669] page_type: f5(slab) [ 33.542725] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.542779] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.542822] page dumped because: kasan: bad access detected [ 33.542943] [ 33.542974] Memory state around the buggy address: [ 33.543037] fff00000c91a7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.543087] fff00000c91a7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.543130] >fff00000c91a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.543177] ^ [ 33.543221] fff00000c91a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.543265] fff00000c91a7700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.543304] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[ 33.461115] ================================================================== [ 33.461842] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 33.462376] Write of size 121 at addr fff00000c91a7600 by task kunit_try_catch/316 [ 33.462468] [ 33.462624] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.462745] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.462853] Hardware name: linux,dummy-virt (DT) [ 33.462969] Call trace: [ 33.463018] show_stack+0x20/0x38 (C) [ 33.463164] dump_stack_lvl+0x8c/0xd0 [ 33.463551] print_report+0x118/0x5d0 [ 33.463705] kasan_report+0xdc/0x128 [ 33.463791] kasan_check_range+0x100/0x1a8 [ 33.463965] __kasan_check_write+0x20/0x30 [ 33.464053] copy_user_test_oob+0x234/0xec8 [ 33.464365] kunit_try_run_case+0x170/0x3f0 [ 33.464473] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.464528] kthread+0x328/0x630 [ 33.464873] ret_from_fork+0x10/0x20 [ 33.464965] [ 33.465135] Allocated by task 316: [ 33.465203] kasan_save_stack+0x3c/0x68 [ 33.465347] kasan_save_track+0x20/0x40 [ 33.465441] kasan_save_alloc_info+0x40/0x58 [ 33.465513] __kasan_kmalloc+0xd4/0xd8 [ 33.465857] __kmalloc_noprof+0x198/0x4c8 [ 33.465957] kunit_kmalloc_array+0x34/0x88 [ 33.466094] copy_user_test_oob+0xac/0xec8 [ 33.466173] kunit_try_run_case+0x170/0x3f0 [ 33.466299] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.466378] kthread+0x328/0x630 [ 33.466519] ret_from_fork+0x10/0x20 [ 33.466619] [ 33.466643] The buggy address belongs to the object at fff00000c91a7600 [ 33.466643] which belongs to the cache kmalloc-128 of size 128 [ 33.466726] The buggy address is located 0 bytes inside of [ 33.466726] allocated 120-byte region [fff00000c91a7600, fff00000c91a7678) [ 33.467191] [ 33.467254] The buggy address belongs to the physical page: [ 33.467617] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a7 [ 33.467800] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.468093] page_type: f5(slab) [ 33.468162] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.468299] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.468372] page dumped because: kasan: bad access detected [ 33.468418] [ 33.468448] Memory state around the buggy address: [ 33.468486] fff00000c91a7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.468539] fff00000c91a7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.468594] >fff00000c91a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.468650] ^ [ 33.468693] fff00000c91a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.468739] fff00000c91a7700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.468798] ================================================================== [ 33.511571] ================================================================== [ 33.511700] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 33.511773] Write of size 121 at addr fff00000c91a7600 by task kunit_try_catch/316 [ 33.511828] [ 33.511899] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.511998] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.512028] Hardware name: linux,dummy-virt (DT) [ 33.512061] Call trace: [ 33.512099] show_stack+0x20/0x38 (C) [ 33.512150] dump_stack_lvl+0x8c/0xd0 [ 33.512209] print_report+0x118/0x5d0 [ 33.512254] kasan_report+0xdc/0x128 [ 33.512299] kasan_check_range+0x100/0x1a8 [ 33.512364] __kasan_check_write+0x20/0x30 [ 33.512413] copy_user_test_oob+0x434/0xec8 [ 33.512468] kunit_try_run_case+0x170/0x3f0 [ 33.512520] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.512570] kthread+0x328/0x630 [ 33.512619] ret_from_fork+0x10/0x20 [ 33.512669] [ 33.512689] Allocated by task 316: [ 33.512720] kasan_save_stack+0x3c/0x68 [ 33.512764] kasan_save_track+0x20/0x40 [ 33.512805] kasan_save_alloc_info+0x40/0x58 [ 33.512855] __kasan_kmalloc+0xd4/0xd8 [ 33.512903] __kmalloc_noprof+0x198/0x4c8 [ 33.512946] kunit_kmalloc_array+0x34/0x88 [ 33.512985] copy_user_test_oob+0xac/0xec8 [ 33.513025] kunit_try_run_case+0x170/0x3f0 [ 33.513075] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.513118] kthread+0x328/0x630 [ 33.513151] ret_from_fork+0x10/0x20 [ 33.513189] [ 33.513211] The buggy address belongs to the object at fff00000c91a7600 [ 33.513211] which belongs to the cache kmalloc-128 of size 128 [ 33.513273] The buggy address is located 0 bytes inside of [ 33.513273] allocated 120-byte region [fff00000c91a7600, fff00000c91a7678) [ 33.513659] [ 33.513685] The buggy address belongs to the physical page: [ 33.514100] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a7 [ 33.514187] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.514260] page_type: f5(slab) [ 33.514630] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.514705] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.514915] page dumped because: kasan: bad access detected [ 33.514955] [ 33.515102] Memory state around the buggy address: [ 33.515368] fff00000c91a7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.515708] fff00000c91a7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.515762] >fff00000c91a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.515867] ^ [ 33.515913] fff00000c91a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.515959] fff00000c91a7700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.516270] ================================================================== [ 33.494013] ================================================================== [ 33.494092] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 33.494175] Write of size 121 at addr fff00000c91a7600 by task kunit_try_catch/316 [ 33.494245] [ 33.494288] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.494400] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.494433] Hardware name: linux,dummy-virt (DT) [ 33.494471] Call trace: [ 33.494498] show_stack+0x20/0x38 (C) [ 33.494555] dump_stack_lvl+0x8c/0xd0 [ 33.494606] print_report+0x118/0x5d0 [ 33.494653] kasan_report+0xdc/0x128 [ 33.494707] kasan_check_range+0x100/0x1a8 [ 33.494753] __kasan_check_write+0x20/0x30 [ 33.494801] copy_user_test_oob+0x35c/0xec8 [ 33.494849] kunit_try_run_case+0x170/0x3f0 [ 33.494903] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.494964] kthread+0x328/0x630 [ 33.495008] ret_from_fork+0x10/0x20 [ 33.495073] [ 33.495093] Allocated by task 316: [ 33.495133] kasan_save_stack+0x3c/0x68 [ 33.495191] kasan_save_track+0x20/0x40 [ 33.495235] kasan_save_alloc_info+0x40/0x58 [ 33.495274] __kasan_kmalloc+0xd4/0xd8 [ 33.495314] __kmalloc_noprof+0x198/0x4c8 [ 33.496222] kunit_kmalloc_array+0x34/0x88 [ 33.496398] copy_user_test_oob+0xac/0xec8 [ 33.496589] kunit_try_run_case+0x170/0x3f0 [ 33.496723] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.496820] kthread+0x328/0x630 [ 33.496880] ret_from_fork+0x10/0x20 [ 33.496937] [ 33.497099] The buggy address belongs to the object at fff00000c91a7600 [ 33.497099] which belongs to the cache kmalloc-128 of size 128 [ 33.497317] The buggy address is located 0 bytes inside of [ 33.497317] allocated 120-byte region [fff00000c91a7600, fff00000c91a7678) [ 33.497699] [ 33.497839] The buggy address belongs to the physical page: [ 33.497917] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a7 [ 33.498100] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.498161] page_type: f5(slab) [ 33.498371] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.498545] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.498822] page dumped because: kasan: bad access detected [ 33.498992] [ 33.499035] Memory state around the buggy address: [ 33.499110] fff00000c91a7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.499236] fff00000c91a7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.499283] >fff00000c91a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.499525] ^ [ 33.499965] fff00000c91a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.500042] fff00000c91a7700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.500163] ================================================================== [ 33.476409] ================================================================== [ 33.476505] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 33.476582] Read of size 121 at addr fff00000c91a7600 by task kunit_try_catch/316 [ 33.476646] [ 33.476684] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.476791] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.476824] Hardware name: linux,dummy-virt (DT) [ 33.476867] Call trace: [ 33.476898] show_stack+0x20/0x38 (C) [ 33.476949] dump_stack_lvl+0x8c/0xd0 [ 33.477004] print_report+0x118/0x5d0 [ 33.477050] kasan_report+0xdc/0x128 [ 33.477094] kasan_check_range+0x100/0x1a8 [ 33.477141] __kasan_check_read+0x20/0x30 [ 33.477187] copy_user_test_oob+0x728/0xec8 [ 33.477241] kunit_try_run_case+0x170/0x3f0 [ 33.477292] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.477354] kthread+0x328/0x630 [ 33.478008] ret_from_fork+0x10/0x20 [ 33.478153] [ 33.478195] Allocated by task 316: [ 33.478515] kasan_save_stack+0x3c/0x68 [ 33.478603] kasan_save_track+0x20/0x40 [ 33.478702] kasan_save_alloc_info+0x40/0x58 [ 33.478960] __kasan_kmalloc+0xd4/0xd8 [ 33.479132] __kmalloc_noprof+0x198/0x4c8 [ 33.479209] kunit_kmalloc_array+0x34/0x88 [ 33.479385] copy_user_test_oob+0xac/0xec8 [ 33.479617] kunit_try_run_case+0x170/0x3f0 [ 33.479916] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.480036] kthread+0x328/0x630 [ 33.480214] ret_from_fork+0x10/0x20 [ 33.480260] [ 33.480521] The buggy address belongs to the object at fff00000c91a7600 [ 33.480521] which belongs to the cache kmalloc-128 of size 128 [ 33.480740] The buggy address is located 0 bytes inside of [ 33.480740] allocated 120-byte region [fff00000c91a7600, fff00000c91a7678) [ 33.481011] [ 33.481085] The buggy address belongs to the physical page: [ 33.481255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a7 [ 33.481665] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.481841] page_type: f5(slab) [ 33.482090] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.482218] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.482275] page dumped because: kasan: bad access detected [ 33.482436] [ 33.482630] Memory state around the buggy address: [ 33.482715] fff00000c91a7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.482843] fff00000c91a7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.482919] >fff00000c91a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.483239] ^ [ 33.483372] fff00000c91a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.483423] fff00000c91a7700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.483912] ================================================================== [ 33.517096] ================================================================== [ 33.517150] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 33.517493] Read of size 121 at addr fff00000c91a7600 by task kunit_try_catch/316 [ 33.517629] [ 33.517711] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.517803] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.517839] Hardware name: linux,dummy-virt (DT) [ 33.518024] Call trace: [ 33.518157] show_stack+0x20/0x38 (C) [ 33.518297] dump_stack_lvl+0x8c/0xd0 [ 33.518402] print_report+0x118/0x5d0 [ 33.518731] kasan_report+0xdc/0x128 [ 33.518805] kasan_check_range+0x100/0x1a8 [ 33.518914] __kasan_check_read+0x20/0x30 [ 33.519068] copy_user_test_oob+0x4a0/0xec8 [ 33.519185] kunit_try_run_case+0x170/0x3f0 [ 33.519235] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.519603] kthread+0x328/0x630 [ 33.519699] ret_from_fork+0x10/0x20 [ 33.520177] [ 33.520263] Allocated by task 316: [ 33.520348] kasan_save_stack+0x3c/0x68 [ 33.520455] kasan_save_track+0x20/0x40 [ 33.520500] kasan_save_alloc_info+0x40/0x58 [ 33.520539] __kasan_kmalloc+0xd4/0xd8 [ 33.520735] __kmalloc_noprof+0x198/0x4c8 [ 33.520926] kunit_kmalloc_array+0x34/0x88 [ 33.521011] copy_user_test_oob+0xac/0xec8 [ 33.521186] kunit_try_run_case+0x170/0x3f0 [ 33.521389] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.521540] kthread+0x328/0x630 [ 33.521630] ret_from_fork+0x10/0x20 [ 33.521746] [ 33.521793] The buggy address belongs to the object at fff00000c91a7600 [ 33.521793] which belongs to the cache kmalloc-128 of size 128 [ 33.521872] The buggy address is located 0 bytes inside of [ 33.521872] allocated 120-byte region [fff00000c91a7600, fff00000c91a7678) [ 33.521951] [ 33.522236] The buggy address belongs to the physical page: [ 33.522372] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a7 [ 33.522733] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.522920] page_type: f5(slab) [ 33.522966] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.523348] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.523418] page dumped because: kasan: bad access detected [ 33.523471] [ 33.523722] Memory state around the buggy address: [ 33.523916] fff00000c91a7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.524011] fff00000c91a7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.524217] >fff00000c91a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.524418] ^ [ 33.524731] fff00000c91a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.524957] fff00000c91a7700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.525138] ================================================================== [ 33.501215] ================================================================== [ 33.501304] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 33.501552] Read of size 121 at addr fff00000c91a7600 by task kunit_try_catch/316 [ 33.501798] [ 33.501841] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.501938] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.501966] Hardware name: linux,dummy-virt (DT) [ 33.502301] Call trace: [ 33.502737] show_stack+0x20/0x38 (C) [ 33.502838] dump_stack_lvl+0x8c/0xd0 [ 33.502990] print_report+0x118/0x5d0 [ 33.503080] kasan_report+0xdc/0x128 [ 33.503132] kasan_check_range+0x100/0x1a8 [ 33.503409] __kasan_check_read+0x20/0x30 [ 33.503608] copy_user_test_oob+0x3c8/0xec8 [ 33.503805] kunit_try_run_case+0x170/0x3f0 [ 33.504009] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.504165] kthread+0x328/0x630 [ 33.504253] ret_from_fork+0x10/0x20 [ 33.504642] [ 33.504687] Allocated by task 316: [ 33.504737] kasan_save_stack+0x3c/0x68 [ 33.505067] kasan_save_track+0x20/0x40 [ 33.505283] kasan_save_alloc_info+0x40/0x58 [ 33.505465] __kasan_kmalloc+0xd4/0xd8 [ 33.505549] __kmalloc_noprof+0x198/0x4c8 [ 33.505630] kunit_kmalloc_array+0x34/0x88 [ 33.505743] copy_user_test_oob+0xac/0xec8 [ 33.505786] kunit_try_run_case+0x170/0x3f0 [ 33.505830] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.505872] kthread+0x328/0x630 [ 33.505908] ret_from_fork+0x10/0x20 [ 33.505947] [ 33.505970] The buggy address belongs to the object at fff00000c91a7600 [ 33.505970] which belongs to the cache kmalloc-128 of size 128 [ 33.506291] The buggy address is located 0 bytes inside of [ 33.506291] allocated 120-byte region [fff00000c91a7600, fff00000c91a7678) [ 33.506776] [ 33.506847] The buggy address belongs to the physical page: [ 33.507174] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a7 [ 33.507506] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.507602] page_type: f5(slab) [ 33.507683] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.507741] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.507784] page dumped because: kasan: bad access detected [ 33.508104] [ 33.508427] Memory state around the buggy address: [ 33.508507] fff00000c91a7500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.508941] fff00000c91a7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.509270] >fff00000c91a7600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.509407] ^ [ 33.509499] fff00000c91a7680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.509613] fff00000c91a7700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.509654] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[ 33.416820] ================================================================== [ 33.416882] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 33.417875] Write of size 8 at addr fff00000c91a7578 by task kunit_try_catch/312 [ 33.417968] [ 33.418320] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.418809] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.418894] Hardware name: linux,dummy-virt (DT) [ 33.419172] Call trace: [ 33.419252] show_stack+0x20/0x38 (C) [ 33.419373] dump_stack_lvl+0x8c/0xd0 [ 33.419478] print_report+0x118/0x5d0 [ 33.419565] kasan_report+0xdc/0x128 [ 33.419680] kasan_check_range+0x100/0x1a8 [ 33.419755] __kasan_check_write+0x20/0x30 [ 33.420061] copy_to_kernel_nofault+0x8c/0x250 [ 33.420399] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 33.420519] kunit_try_run_case+0x170/0x3f0 [ 33.420625] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.420787] kthread+0x328/0x630 [ 33.420903] ret_from_fork+0x10/0x20 [ 33.420990] [ 33.421079] Allocated by task 312: [ 33.421150] kasan_save_stack+0x3c/0x68 [ 33.421268] kasan_save_track+0x20/0x40 [ 33.421334] kasan_save_alloc_info+0x40/0x58 [ 33.421374] __kasan_kmalloc+0xd4/0xd8 [ 33.421573] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.421824] copy_to_kernel_nofault_oob+0xc8/0x418 [ 33.421898] kunit_try_run_case+0x170/0x3f0 [ 33.421950] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.422162] kthread+0x328/0x630 [ 33.422363] ret_from_fork+0x10/0x20 [ 33.422505] [ 33.422575] The buggy address belongs to the object at fff00000c91a7500 [ 33.422575] which belongs to the cache kmalloc-128 of size 128 [ 33.422886] The buggy address is located 0 bytes to the right of [ 33.422886] allocated 120-byte region [fff00000c91a7500, fff00000c91a7578) [ 33.422997] [ 33.423349] The buggy address belongs to the physical page: [ 33.423483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a7 [ 33.423588] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.423799] page_type: f5(slab) [ 33.424004] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.424207] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.424337] page dumped because: kasan: bad access detected [ 33.424475] [ 33.424851] Memory state around the buggy address: [ 33.424944] fff00000c91a7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.425013] fff00000c91a7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.425276] >fff00000c91a7500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.425467] ^ [ 33.425519] fff00000c91a7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.425750] fff00000c91a7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.425841] ================================================================== [ 33.408048] ================================================================== [ 33.408131] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 33.408286] Read of size 8 at addr fff00000c91a7578 by task kunit_try_catch/312 [ 33.408367] [ 33.408437] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.408583] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.408612] Hardware name: linux,dummy-virt (DT) [ 33.408666] Call trace: [ 33.408704] show_stack+0x20/0x38 (C) [ 33.409068] dump_stack_lvl+0x8c/0xd0 [ 33.409147] print_report+0x118/0x5d0 [ 33.409290] kasan_report+0xdc/0x128 [ 33.409386] __asan_report_load8_noabort+0x20/0x30 [ 33.409637] copy_to_kernel_nofault+0x204/0x250 [ 33.409693] copy_to_kernel_nofault_oob+0x158/0x418 [ 33.409745] kunit_try_run_case+0x170/0x3f0 [ 33.410199] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.410358] kthread+0x328/0x630 [ 33.410414] ret_from_fork+0x10/0x20 [ 33.410499] [ 33.410851] Allocated by task 312: [ 33.410952] kasan_save_stack+0x3c/0x68 [ 33.411046] kasan_save_track+0x20/0x40 [ 33.411180] kasan_save_alloc_info+0x40/0x58 [ 33.411269] __kasan_kmalloc+0xd4/0xd8 [ 33.411344] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.411544] copy_to_kernel_nofault_oob+0xc8/0x418 [ 33.411752] kunit_try_run_case+0x170/0x3f0 [ 33.411840] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.411984] kthread+0x328/0x630 [ 33.412061] ret_from_fork+0x10/0x20 [ 33.412142] [ 33.412349] The buggy address belongs to the object at fff00000c91a7500 [ 33.412349] which belongs to the cache kmalloc-128 of size 128 [ 33.412529] The buggy address is located 0 bytes to the right of [ 33.412529] allocated 120-byte region [fff00000c91a7500, fff00000c91a7578) [ 33.412688] [ 33.412770] The buggy address belongs to the physical page: [ 33.412915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a7 [ 33.413018] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.413372] page_type: f5(slab) [ 33.413468] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.413577] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.413715] page dumped because: kasan: bad access detected [ 33.413777] [ 33.413954] Memory state around the buggy address: [ 33.414142] fff00000c91a7400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.414227] fff00000c91a7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.414431] >fff00000c91a7500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.414510] ^ [ 33.414674] fff00000c91a7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.414748] fff00000c91a7600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.414891] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 33.357055] ================================================================== [ 33.357113] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 33.357545] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/300 [ 33.357652] [ 33.357732] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.357903] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.357932] Hardware name: linux,dummy-virt (DT) [ 33.357966] Call trace: [ 33.358285] show_stack+0x20/0x38 (C) [ 33.358420] dump_stack_lvl+0x8c/0xd0 [ 33.358793] print_report+0x310/0x5d0 [ 33.358955] kasan_report+0xdc/0x128 [ 33.359277] __asan_report_load1_noabort+0x20/0x30 [ 33.359488] vmalloc_oob+0x51c/0x5d0 [ 33.359841] kunit_try_run_case+0x170/0x3f0 [ 33.359963] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.360078] kthread+0x328/0x630 [ 33.360157] ret_from_fork+0x10/0x20 [ 33.360577] [ 33.360635] The buggy address ffff8000800fe7f8 belongs to a vmalloc virtual mapping [ 33.360785] The buggy address belongs to the physical page: [ 33.360843] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091c8 [ 33.361206] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.361308] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 33.361477] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.361540] page dumped because: kasan: bad access detected [ 33.361663] [ 33.361685] Memory state around the buggy address: [ 33.361722] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.361775] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.361821] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 33.362158] ^ [ 33.362349] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 33.362575] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 33.362697] ================================================================== [ 33.348944] ================================================================== [ 33.349036] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 33.349111] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/300 [ 33.349165] [ 33.349208] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.349310] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.350311] Hardware name: linux,dummy-virt (DT) [ 33.350746] Call trace: [ 33.350860] show_stack+0x20/0x38 (C) [ 33.350930] dump_stack_lvl+0x8c/0xd0 [ 33.351030] print_report+0x310/0x5d0 [ 33.351221] kasan_report+0xdc/0x128 [ 33.351420] __asan_report_load1_noabort+0x20/0x30 [ 33.351719] vmalloc_oob+0x578/0x5d0 [ 33.351926] kunit_try_run_case+0x170/0x3f0 [ 33.352275] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.352435] kthread+0x328/0x630 [ 33.352523] ret_from_fork+0x10/0x20 [ 33.352712] [ 33.352742] The buggy address ffff8000800fe7f3 belongs to a vmalloc virtual mapping [ 33.352804] The buggy address belongs to the physical page: [ 33.353152] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091c8 [ 33.353414] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.353594] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 33.353687] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.353734] page dumped because: kasan: bad access detected [ 33.353769] [ 33.353804] Memory state around the buggy address: [ 33.354127] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.354280] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.354616] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 33.354680] ^ [ 33.354820] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 33.354893] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 33.355289] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 33.016890] ================================================================== [ 33.017156] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 33.017485] Write of size 4 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.017590] [ 33.017692] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.018111] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.018230] Hardware name: linux,dummy-virt (DT) [ 33.018285] Call trace: [ 33.018310] show_stack+0x20/0x38 (C) [ 33.018618] dump_stack_lvl+0x8c/0xd0 [ 33.018721] print_report+0x118/0x5d0 [ 33.018833] kasan_report+0xdc/0x128 [ 33.018920] kasan_check_range+0x100/0x1a8 [ 33.019225] __kasan_check_write+0x20/0x30 [ 33.019300] kasan_atomics_helper+0xa6c/0x4858 [ 33.019628] kasan_atomics+0x198/0x2e0 [ 33.019783] kunit_try_run_case+0x170/0x3f0 [ 33.019889] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.020227] kthread+0x328/0x630 [ 33.020305] ret_from_fork+0x10/0x20 [ 33.020364] [ 33.020754] Allocated by task 296: [ 33.020841] kasan_save_stack+0x3c/0x68 [ 33.021223] kasan_save_track+0x20/0x40 [ 33.021343] kasan_save_alloc_info+0x40/0x58 [ 33.021452] __kasan_kmalloc+0xd4/0xd8 [ 33.021541] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.021845] kasan_atomics+0xb8/0x2e0 [ 33.021944] kunit_try_run_case+0x170/0x3f0 [ 33.022035] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.022128] kthread+0x328/0x630 [ 33.022264] ret_from_fork+0x10/0x20 [ 33.022460] [ 33.022487] The buggy address belongs to the object at fff00000c91a4d80 [ 33.022487] which belongs to the cache kmalloc-64 of size 64 [ 33.022657] The buggy address is located 0 bytes to the right of [ 33.022657] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.022813] [ 33.022876] The buggy address belongs to the physical page: [ 33.022955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.023162] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.023219] page_type: f5(slab) [ 33.023611] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.023708] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.024083] page dumped because: kasan: bad access detected [ 33.024181] [ 33.024240] Memory state around the buggy address: [ 33.024359] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.024446] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.024529] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.024567] ^ [ 33.024645] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.024875] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.025041] ================================================================== [ 33.272430] ================================================================== [ 33.272749] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 33.272820] Read of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.273057] [ 33.273133] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.273319] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.273371] Hardware name: linux,dummy-virt (DT) [ 33.273422] Call trace: [ 33.273461] show_stack+0x20/0x38 (C) [ 33.273518] dump_stack_lvl+0x8c/0xd0 [ 33.273565] print_report+0x118/0x5d0 [ 33.273821] kasan_report+0xdc/0x128 [ 33.273988] __asan_report_load8_noabort+0x20/0x30 [ 33.274345] kasan_atomics_helper+0x3db0/0x4858 [ 33.274654] kasan_atomics+0x198/0x2e0 [ 33.274751] kunit_try_run_case+0x170/0x3f0 [ 33.275134] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.275196] kthread+0x328/0x630 [ 33.275270] ret_from_fork+0x10/0x20 [ 33.275944] [ 33.275986] Allocated by task 296: [ 33.276123] kasan_save_stack+0x3c/0x68 [ 33.276175] kasan_save_track+0x20/0x40 [ 33.276266] kasan_save_alloc_info+0x40/0x58 [ 33.276357] __kasan_kmalloc+0xd4/0xd8 [ 33.276716] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.276885] kasan_atomics+0xb8/0x2e0 [ 33.277040] kunit_try_run_case+0x170/0x3f0 [ 33.277400] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.277475] kthread+0x328/0x630 [ 33.277553] ret_from_fork+0x10/0x20 [ 33.277943] [ 33.278180] The buggy address belongs to the object at fff00000c91a4d80 [ 33.278180] which belongs to the cache kmalloc-64 of size 64 [ 33.278275] The buggy address is located 0 bytes to the right of [ 33.278275] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.278469] [ 33.278597] The buggy address belongs to the physical page: [ 33.278884] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.279077] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.279184] page_type: f5(slab) [ 33.279238] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.279291] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.279521] page dumped because: kasan: bad access detected [ 33.279590] [ 33.279621] Memory state around the buggy address: [ 33.279670] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.279718] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.279777] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.279831] ^ [ 33.279868] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.279923] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.279964] ================================================================== [ 33.242283] ================================================================== [ 33.242409] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 33.242495] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.242549] [ 33.242917] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.243054] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.243119] Hardware name: linux,dummy-virt (DT) [ 33.243154] Call trace: [ 33.243195] show_stack+0x20/0x38 (C) [ 33.243251] dump_stack_lvl+0x8c/0xd0 [ 33.243607] print_report+0x118/0x5d0 [ 33.243677] kasan_report+0xdc/0x128 [ 33.243723] kasan_check_range+0x100/0x1a8 [ 33.243769] __kasan_check_write+0x20/0x30 [ 33.243815] kasan_atomics_helper+0x147c/0x4858 [ 33.243918] kasan_atomics+0x198/0x2e0 [ 33.244008] kunit_try_run_case+0x170/0x3f0 [ 33.244061] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.244448] kthread+0x328/0x630 [ 33.244501] ret_from_fork+0x10/0x20 [ 33.244561] [ 33.244716] Allocated by task 296: [ 33.244758] kasan_save_stack+0x3c/0x68 [ 33.244921] kasan_save_track+0x20/0x40 [ 33.244976] kasan_save_alloc_info+0x40/0x58 [ 33.245018] __kasan_kmalloc+0xd4/0xd8 [ 33.245059] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.245390] kasan_atomics+0xb8/0x2e0 [ 33.245593] kunit_try_run_case+0x170/0x3f0 [ 33.245821] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.245955] kthread+0x328/0x630 [ 33.246056] ret_from_fork+0x10/0x20 [ 33.246209] [ 33.246233] The buggy address belongs to the object at fff00000c91a4d80 [ 33.246233] which belongs to the cache kmalloc-64 of size 64 [ 33.246302] The buggy address is located 0 bytes to the right of [ 33.246302] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.246379] [ 33.246401] The buggy address belongs to the physical page: [ 33.246435] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.246911] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.247081] page_type: f5(slab) [ 33.247129] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.247182] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.247226] page dumped because: kasan: bad access detected [ 33.247305] [ 33.247365] Memory state around the buggy address: [ 33.247417] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.247464] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.247517] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.247563] ^ [ 33.247599] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.247653] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.247701] ================================================================== [ 33.248705] ================================================================== [ 33.248794] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 33.249194] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.249276] [ 33.249314] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.249492] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.249616] Hardware name: linux,dummy-virt (DT) [ 33.249684] Call trace: [ 33.249716] show_stack+0x20/0x38 (C) [ 33.249960] dump_stack_lvl+0x8c/0xd0 [ 33.250125] print_report+0x118/0x5d0 [ 33.250388] kasan_report+0xdc/0x128 [ 33.250545] kasan_check_range+0x100/0x1a8 [ 33.250618] __kasan_check_write+0x20/0x30 [ 33.250766] kasan_atomics_helper+0x14e4/0x4858 [ 33.250842] kasan_atomics+0x198/0x2e0 [ 33.250989] kunit_try_run_case+0x170/0x3f0 [ 33.251092] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.251163] kthread+0x328/0x630 [ 33.251208] ret_from_fork+0x10/0x20 [ 33.251817] [ 33.252049] Allocated by task 296: [ 33.252115] kasan_save_stack+0x3c/0x68 [ 33.252472] kasan_save_track+0x20/0x40 [ 33.252550] kasan_save_alloc_info+0x40/0x58 [ 33.252774] __kasan_kmalloc+0xd4/0xd8 [ 33.252899] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.253219] kasan_atomics+0xb8/0x2e0 [ 33.253413] kunit_try_run_case+0x170/0x3f0 [ 33.253560] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.253678] kthread+0x328/0x630 [ 33.253882] ret_from_fork+0x10/0x20 [ 33.254155] [ 33.254320] The buggy address belongs to the object at fff00000c91a4d80 [ 33.254320] which belongs to the cache kmalloc-64 of size 64 [ 33.254519] The buggy address is located 0 bytes to the right of [ 33.254519] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.254908] [ 33.254952] The buggy address belongs to the physical page: [ 33.255008] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.255079] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.255315] page_type: f5(slab) [ 33.255513] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.255634] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.255703] page dumped because: kasan: bad access detected [ 33.255745] [ 33.255767] Memory state around the buggy address: [ 33.255807] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.255864] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.255909] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.255948] ^ [ 33.255993] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.256045] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.256100] ================================================================== [ 33.086567] ================================================================== [ 33.086627] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 33.086684] Write of size 4 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.086736] [ 33.086897] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.087026] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.087197] Hardware name: linux,dummy-virt (DT) [ 33.087234] Call trace: [ 33.087261] show_stack+0x20/0x38 (C) [ 33.087355] dump_stack_lvl+0x8c/0xd0 [ 33.087417] print_report+0x118/0x5d0 [ 33.087470] kasan_report+0xdc/0x128 [ 33.087515] kasan_check_range+0x100/0x1a8 [ 33.087563] __kasan_check_write+0x20/0x30 [ 33.087610] kasan_atomics_helper+0xd3c/0x4858 [ 33.087661] kasan_atomics+0x198/0x2e0 [ 33.087710] kunit_try_run_case+0x170/0x3f0 [ 33.087760] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.087812] kthread+0x328/0x630 [ 33.087856] ret_from_fork+0x10/0x20 [ 33.087916] [ 33.087937] Allocated by task 296: [ 33.087969] kasan_save_stack+0x3c/0x68 [ 33.088022] kasan_save_track+0x20/0x40 [ 33.088064] kasan_save_alloc_info+0x40/0x58 [ 33.088104] __kasan_kmalloc+0xd4/0xd8 [ 33.088144] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.088188] kasan_atomics+0xb8/0x2e0 [ 33.088227] kunit_try_run_case+0x170/0x3f0 [ 33.088268] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.088312] kthread+0x328/0x630 [ 33.089056] ret_from_fork+0x10/0x20 [ 33.089109] [ 33.089133] The buggy address belongs to the object at fff00000c91a4d80 [ 33.089133] which belongs to the cache kmalloc-64 of size 64 [ 33.089194] The buggy address is located 0 bytes to the right of [ 33.089194] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.089258] [ 33.089527] The buggy address belongs to the physical page: [ 33.089742] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.089803] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.089863] page_type: f5(slab) [ 33.089906] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.090293] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.090586] page dumped because: kasan: bad access detected [ 33.090652] [ 33.090723] Memory state around the buggy address: [ 33.090826] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.090949] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.091030] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.091112] ^ [ 33.091222] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.091284] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.091615] ================================================================== [ 33.208972] ================================================================== [ 33.209131] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 33.209190] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.209242] [ 33.209279] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.209612] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.210058] Hardware name: linux,dummy-virt (DT) [ 33.210148] Call trace: [ 33.210206] show_stack+0x20/0x38 (C) [ 33.210376] dump_stack_lvl+0x8c/0xd0 [ 33.210487] print_report+0x118/0x5d0 [ 33.210552] kasan_report+0xdc/0x128 [ 33.210894] kasan_check_range+0x100/0x1a8 [ 33.210979] __kasan_check_write+0x20/0x30 [ 33.211057] kasan_atomics_helper+0x12d8/0x4858 [ 33.211310] kasan_atomics+0x198/0x2e0 [ 33.211508] kunit_try_run_case+0x170/0x3f0 [ 33.211668] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.211772] kthread+0x328/0x630 [ 33.211856] ret_from_fork+0x10/0x20 [ 33.212030] [ 33.212094] Allocated by task 296: [ 33.212174] kasan_save_stack+0x3c/0x68 [ 33.212318] kasan_save_track+0x20/0x40 [ 33.212371] kasan_save_alloc_info+0x40/0x58 [ 33.212418] __kasan_kmalloc+0xd4/0xd8 [ 33.212479] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.212601] kasan_atomics+0xb8/0x2e0 [ 33.212669] kunit_try_run_case+0x170/0x3f0 [ 33.212721] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.212775] kthread+0x328/0x630 [ 33.212812] ret_from_fork+0x10/0x20 [ 33.212850] [ 33.212873] The buggy address belongs to the object at fff00000c91a4d80 [ 33.212873] which belongs to the cache kmalloc-64 of size 64 [ 33.212935] The buggy address is located 0 bytes to the right of [ 33.212935] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.213011] [ 33.213053] The buggy address belongs to the physical page: [ 33.213093] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.213157] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.213208] page_type: f5(slab) [ 33.213250] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.213302] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.213357] page dumped because: kasan: bad access detected [ 33.213390] [ 33.213720] Memory state around the buggy address: [ 33.214031] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.214105] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.214162] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.214435] ^ [ 33.214581] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.214654] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.214785] ================================================================== [ 33.216120] ================================================================== [ 33.216621] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 33.216885] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.217150] [ 33.217294] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.217405] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.217535] Hardware name: linux,dummy-virt (DT) [ 33.217684] Call trace: [ 33.217807] show_stack+0x20/0x38 (C) [ 33.217897] dump_stack_lvl+0x8c/0xd0 [ 33.217977] print_report+0x118/0x5d0 [ 33.218305] kasan_report+0xdc/0x128 [ 33.218625] kasan_check_range+0x100/0x1a8 [ 33.218790] __kasan_check_write+0x20/0x30 [ 33.219050] kasan_atomics_helper+0x1384/0x4858 [ 33.219243] kasan_atomics+0x198/0x2e0 [ 33.219315] kunit_try_run_case+0x170/0x3f0 [ 33.219662] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.219719] kthread+0x328/0x630 [ 33.220093] ret_from_fork+0x10/0x20 [ 33.220205] [ 33.220483] Allocated by task 296: [ 33.220619] kasan_save_stack+0x3c/0x68 [ 33.220671] kasan_save_track+0x20/0x40 [ 33.221371] kasan_save_alloc_info+0x40/0x58 [ 33.221600] __kasan_kmalloc+0xd4/0xd8 [ 33.221839] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.222037] kasan_atomics+0xb8/0x2e0 [ 33.222108] kunit_try_run_case+0x170/0x3f0 [ 33.222260] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.222560] kthread+0x328/0x630 [ 33.222633] ret_from_fork+0x10/0x20 [ 33.222787] [ 33.222850] The buggy address belongs to the object at fff00000c91a4d80 [ 33.222850] which belongs to the cache kmalloc-64 of size 64 [ 33.222942] The buggy address is located 0 bytes to the right of [ 33.222942] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.223010] [ 33.223400] The buggy address belongs to the physical page: [ 33.223629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.223825] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.223883] page_type: f5(slab) [ 33.224082] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.224256] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.224335] page dumped because: kasan: bad access detected [ 33.224617] [ 33.224723] Memory state around the buggy address: [ 33.224786] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.224910] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.224976] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.225035] ^ [ 33.225072] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.225117] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.225166] ================================================================== [ 33.110316] ================================================================== [ 33.110430] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 33.110650] Read of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.110745] [ 33.111051] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.111205] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.111240] Hardware name: linux,dummy-virt (DT) [ 33.111277] Call trace: [ 33.111632] show_stack+0x20/0x38 (C) [ 33.111796] dump_stack_lvl+0x8c/0xd0 [ 33.111873] print_report+0x118/0x5d0 [ 33.112070] kasan_report+0xdc/0x128 [ 33.112243] __asan_report_load8_noabort+0x20/0x30 [ 33.112319] kasan_atomics_helper+0x3f58/0x4858 [ 33.112387] kasan_atomics+0x198/0x2e0 [ 33.112438] kunit_try_run_case+0x170/0x3f0 [ 33.112719] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.112812] kthread+0x328/0x630 [ 33.113070] ret_from_fork+0x10/0x20 [ 33.113183] [ 33.113217] Allocated by task 296: [ 33.113252] kasan_save_stack+0x3c/0x68 [ 33.113309] kasan_save_track+0x20/0x40 [ 33.113364] kasan_save_alloc_info+0x40/0x58 [ 33.113623] __kasan_kmalloc+0xd4/0xd8 [ 33.113677] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.113834] kasan_atomics+0xb8/0x2e0 [ 33.113920] kunit_try_run_case+0x170/0x3f0 [ 33.114036] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.114254] kthread+0x328/0x630 [ 33.114417] ret_from_fork+0x10/0x20 [ 33.114495] [ 33.114595] The buggy address belongs to the object at fff00000c91a4d80 [ 33.114595] which belongs to the cache kmalloc-64 of size 64 [ 33.114673] The buggy address is located 0 bytes to the right of [ 33.114673] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.115245] [ 33.115380] The buggy address belongs to the physical page: [ 33.115717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.115832] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.115895] page_type: f5(slab) [ 33.115936] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.116013] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.116066] page dumped because: kasan: bad access detected [ 33.116120] [ 33.116146] Memory state around the buggy address: [ 33.116201] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.116264] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.116316] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.116383] ^ [ 33.116420] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.116473] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.116520] ================================================================== [ 32.987833] ================================================================== [ 32.987886] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 32.987940] Read of size 4 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 32.987991] [ 32.988022] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 32.988210] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.988246] Hardware name: linux,dummy-virt (DT) [ 32.988295] Call trace: [ 32.988365] show_stack+0x20/0x38 (C) [ 32.988420] dump_stack_lvl+0x8c/0xd0 [ 32.988479] print_report+0x118/0x5d0 [ 32.988535] kasan_report+0xdc/0x128 [ 32.988580] __asan_report_load4_noabort+0x20/0x30 [ 32.988687] kasan_atomics_helper+0x42d8/0x4858 [ 32.988763] kasan_atomics+0x198/0x2e0 [ 32.988867] kunit_try_run_case+0x170/0x3f0 [ 32.988921] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.989241] kthread+0x328/0x630 [ 32.989319] ret_from_fork+0x10/0x20 [ 32.989380] [ 32.989491] Allocated by task 296: [ 32.989528] kasan_save_stack+0x3c/0x68 [ 32.989574] kasan_save_track+0x20/0x40 [ 32.989713] kasan_save_alloc_info+0x40/0x58 [ 32.989799] __kasan_kmalloc+0xd4/0xd8 [ 32.989940] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.990036] kasan_atomics+0xb8/0x2e0 [ 32.990143] kunit_try_run_case+0x170/0x3f0 [ 32.990187] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.990231] kthread+0x328/0x630 [ 32.990274] ret_from_fork+0x10/0x20 [ 32.990312] [ 32.990343] The buggy address belongs to the object at fff00000c91a4d80 [ 32.990343] which belongs to the cache kmalloc-64 of size 64 [ 32.990933] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 32.991080] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.991841] Memory state around the buggy address: [ 32.992438] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.992911] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.996041] kasan_check_range+0x100/0x1a8 [ 32.996969] Allocated by task 296: [ 32.997020] kasan_save_stack+0x3c/0x68 [ 32.997158] kasan_save_track+0x20/0x40 [ 32.997420] kasan_save_alloc_info+0x40/0x58 [ 32.997607] __kasan_kmalloc+0xd4/0xd8 [ 32.997649] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.997695] kasan_atomics+0xb8/0x2e0 [ 32.997762] kunit_try_run_case+0x170/0x3f0 [ 32.997808] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.997853] kthread+0x328/0x630 [ 32.998220] ret_from_fork+0x10/0x20 [ 32.998301] [ 32.998408] The buggy address belongs to the object at fff00000c91a4d80 [ 32.998408] which belongs to the cache kmalloc-64 of size 64 [ 32.998522] The buggy address is located 0 bytes to the right of [ 32.998522] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 32.998842] [ 32.998895] The buggy address belongs to the physical page: [ 32.998966] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 32.999032] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.999085] page_type: f5(slab) [ 32.999135] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.999188] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.999231] page dumped because: kasan: bad access detected [ 32.999584] [ 32.999655] Memory state around the buggy address: [ 32.999748] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.000029] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.000209] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.000454] ^ [ 33.000499] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.000652] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.000722] ================================================================== [ 33.226115] ================================================================== [ 33.226356] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 33.226578] Read of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.226639] [ 33.226675] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.226971] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.227016] Hardware name: linux,dummy-virt (DT) [ 33.227081] Call trace: [ 33.227108] show_stack+0x20/0x38 (C) [ 33.227162] dump_stack_lvl+0x8c/0xd0 [ 33.227209] print_report+0x118/0x5d0 [ 33.227423] kasan_report+0xdc/0x128 [ 33.228147] __asan_report_load8_noabort+0x20/0x30 [ 33.228288] kasan_atomics_helper+0x3f04/0x4858 [ 33.228505] kasan_atomics+0x198/0x2e0 [ 33.228583] kunit_try_run_case+0x170/0x3f0 [ 33.228736] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.228941] kthread+0x328/0x630 [ 33.229405] ret_from_fork+0x10/0x20 [ 33.229793] [ 33.229821] Allocated by task 296: [ 33.229872] kasan_save_stack+0x3c/0x68 [ 33.229921] kasan_save_track+0x20/0x40 [ 33.229963] kasan_save_alloc_info+0x40/0x58 [ 33.230262] __kasan_kmalloc+0xd4/0xd8 [ 33.230401] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.230583] kasan_atomics+0xb8/0x2e0 [ 33.230654] kunit_try_run_case+0x170/0x3f0 [ 33.230997] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.231242] kthread+0x328/0x630 [ 33.231578] ret_from_fork+0x10/0x20 [ 33.231765] [ 33.231821] The buggy address belongs to the object at fff00000c91a4d80 [ 33.231821] which belongs to the cache kmalloc-64 of size 64 [ 33.232135] The buggy address is located 0 bytes to the right of [ 33.232135] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.232430] [ 33.232625] The buggy address belongs to the physical page: [ 33.232693] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.233032] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.233211] page_type: f5(slab) [ 33.233287] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.233357] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.233401] page dumped because: kasan: bad access detected [ 33.233434] [ 33.233466] Memory state around the buggy address: [ 33.233501] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.233558] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.233602] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.233642] ^ [ 33.233686] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.233753] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.233804] ================================================================== [ 33.317646] ================================================================== [ 33.317708] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 33.317763] Read of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.317971] [ 33.318045] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.318405] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.318467] Hardware name: linux,dummy-virt (DT) [ 33.318501] Call trace: [ 33.318582] show_stack+0x20/0x38 (C) [ 33.318669] dump_stack_lvl+0x8c/0xd0 [ 33.318722] print_report+0x118/0x5d0 [ 33.318829] kasan_report+0xdc/0x128 [ 33.318895] __asan_report_load8_noabort+0x20/0x30 [ 33.318946] kasan_atomics_helper+0x3e20/0x4858 [ 33.319280] kasan_atomics+0x198/0x2e0 [ 33.319357] kunit_try_run_case+0x170/0x3f0 [ 33.319523] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.319591] kthread+0x328/0x630 [ 33.319636] ret_from_fork+0x10/0x20 [ 33.319921] [ 33.320044] Allocated by task 296: [ 33.320249] kasan_save_stack+0x3c/0x68 [ 33.320444] kasan_save_track+0x20/0x40 [ 33.320500] kasan_save_alloc_info+0x40/0x58 [ 33.320572] __kasan_kmalloc+0xd4/0xd8 [ 33.320621] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.320802] kasan_atomics+0xb8/0x2e0 [ 33.320858] kunit_try_run_case+0x170/0x3f0 [ 33.321008] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.321062] kthread+0x328/0x630 [ 33.321230] ret_from_fork+0x10/0x20 [ 33.321285] [ 33.321461] The buggy address belongs to the object at fff00000c91a4d80 [ 33.321461] which belongs to the cache kmalloc-64 of size 64 [ 33.321580] The buggy address is located 0 bytes to the right of [ 33.321580] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.321872] [ 33.321923] The buggy address belongs to the physical page: [ 33.321977] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.322090] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.322178] page_type: f5(slab) [ 33.322545] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.322647] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.322753] page dumped because: kasan: bad access detected [ 33.322786] [ 33.322806] Memory state around the buggy address: [ 33.323026] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.323215] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.323272] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.323313] ^ [ 33.323357] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.323435] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.323493] ================================================================== [ 33.162193] ================================================================== [ 33.162252] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 33.162304] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.162378] [ 33.162411] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.162508] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.162539] Hardware name: linux,dummy-virt (DT) [ 33.162573] Call trace: [ 33.162596] show_stack+0x20/0x38 (C) [ 33.162647] dump_stack_lvl+0x8c/0xd0 [ 33.162694] print_report+0x118/0x5d0 [ 33.162740] kasan_report+0xdc/0x128 [ 33.162786] kasan_check_range+0x100/0x1a8 [ 33.162833] __kasan_check_write+0x20/0x30 [ 33.162901] kasan_atomics_helper+0x1058/0x4858 [ 33.162956] kasan_atomics+0x198/0x2e0 [ 33.163003] kunit_try_run_case+0x170/0x3f0 [ 33.163059] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.163116] kthread+0x328/0x630 [ 33.163159] ret_from_fork+0x10/0x20 [ 33.163209] [ 33.163240] Allocated by task 296: [ 33.163270] kasan_save_stack+0x3c/0x68 [ 33.163316] kasan_save_track+0x20/0x40 [ 33.163523] kasan_save_alloc_info+0x40/0x58 [ 33.163699] __kasan_kmalloc+0xd4/0xd8 [ 33.163751] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.164179] kasan_atomics+0xb8/0x2e0 [ 33.164247] kunit_try_run_case+0x170/0x3f0 [ 33.164301] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.164637] kthread+0x328/0x630 [ 33.164706] ret_from_fork+0x10/0x20 [ 33.164749] [ 33.164955] The buggy address belongs to the object at fff00000c91a4d80 [ 33.164955] which belongs to the cache kmalloc-64 of size 64 [ 33.165045] The buggy address is located 0 bytes to the right of [ 33.165045] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.165125] [ 33.165559] The buggy address belongs to the physical page: [ 33.165654] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.165734] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.165792] page_type: f5(slab) [ 33.165835] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.165894] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.166388] page dumped because: kasan: bad access detected [ 33.166531] [ 33.166569] Memory state around the buggy address: [ 33.166854] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.167179] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.167417] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.167541] ^ [ 33.167616] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.167759] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.167814] ================================================================== [ 33.076348] ================================================================== [ 33.076410] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 33.076739] Read of size 4 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.076820] [ 33.077277] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.077654] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.077709] Hardware name: linux,dummy-virt (DT) [ 33.077763] Call trace: [ 33.078201] show_stack+0x20/0x38 (C) [ 33.078319] dump_stack_lvl+0x8c/0xd0 [ 33.078579] print_report+0x118/0x5d0 [ 33.078668] kasan_report+0xdc/0x128 [ 33.078740] __asan_report_load4_noabort+0x20/0x30 [ 33.078877] kasan_atomics_helper+0x3dd8/0x4858 [ 33.078940] kasan_atomics+0x198/0x2e0 [ 33.079255] kunit_try_run_case+0x170/0x3f0 [ 33.079576] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.079743] kthread+0x328/0x630 [ 33.079832] ret_from_fork+0x10/0x20 [ 33.080241] [ 33.080305] Allocated by task 296: [ 33.080570] kasan_save_stack+0x3c/0x68 [ 33.080781] kasan_save_track+0x20/0x40 [ 33.080861] kasan_save_alloc_info+0x40/0x58 [ 33.081127] __kasan_kmalloc+0xd4/0xd8 [ 33.081211] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.081523] kasan_atomics+0xb8/0x2e0 [ 33.081663] kunit_try_run_case+0x170/0x3f0 [ 33.081750] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.081898] kthread+0x328/0x630 [ 33.081939] ret_from_fork+0x10/0x20 [ 33.081978] [ 33.082133] The buggy address belongs to the object at fff00000c91a4d80 [ 33.082133] which belongs to the cache kmalloc-64 of size 64 [ 33.082343] The buggy address is located 0 bytes to the right of [ 33.082343] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.082512] [ 33.082572] The buggy address belongs to the physical page: [ 33.082852] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.083006] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.083117] page_type: f5(slab) [ 33.083236] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.083639] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.083735] page dumped because: kasan: bad access detected [ 33.083807] [ 33.083916] Memory state around the buggy address: [ 33.083994] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.084061] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.084106] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.084454] ^ [ 33.084532] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.084851] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.084980] ================================================================== [ 33.002857] ================================================================== [ 33.002923] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 33.003080] Write of size 4 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.003142] [ 33.003178] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.003264] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.003291] Hardware name: linux,dummy-virt (DT) [ 33.003553] Call trace: [ 33.003747] show_stack+0x20/0x38 (C) [ 33.003929] dump_stack_lvl+0x8c/0xd0 [ 33.003993] print_report+0x118/0x5d0 [ 33.004038] kasan_report+0xdc/0x128 [ 33.004083] kasan_check_range+0x100/0x1a8 [ 33.004129] __kasan_check_write+0x20/0x30 [ 33.004252] kasan_atomics_helper+0x99c/0x4858 [ 33.004578] kasan_atomics+0x198/0x2e0 [ 33.004698] kunit_try_run_case+0x170/0x3f0 [ 33.004755] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.004808] kthread+0x328/0x630 [ 33.004885] ret_from_fork+0x10/0x20 [ 33.004947] [ 33.004969] Allocated by task 296: [ 33.005002] kasan_save_stack+0x3c/0x68 [ 33.005046] kasan_save_track+0x20/0x40 [ 33.005098] kasan_save_alloc_info+0x40/0x58 [ 33.005138] __kasan_kmalloc+0xd4/0xd8 [ 33.005187] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.005232] kasan_atomics+0xb8/0x2e0 [ 33.005281] kunit_try_run_case+0x170/0x3f0 [ 33.005340] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.005690] kthread+0x328/0x630 [ 33.005771] ret_from_fork+0x10/0x20 [ 33.005849] [ 33.005910] The buggy address belongs to the object at fff00000c91a4d80 [ 33.005910] which belongs to the cache kmalloc-64 of size 64 [ 33.006017] The buggy address is located 0 bytes to the right of [ 33.006017] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.006085] [ 33.006107] The buggy address belongs to the physical page: [ 33.006142] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.006197] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.006600] page_type: f5(slab) [ 33.006922] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.007055] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.007139] page dumped because: kasan: bad access detected [ 33.007221] [ 33.007264] Memory state around the buggy address: [ 33.007307] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.007592] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.007911] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.007987] ^ [ 33.008093] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.008203] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.008320] ================================================================== [ 33.010510] ================================================================== [ 33.010710] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 33.010784] Write of size 4 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.010838] [ 33.011232] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.011357] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.011388] Hardware name: linux,dummy-virt (DT) [ 33.011420] Call trace: [ 33.011456] show_stack+0x20/0x38 (C) [ 33.011660] kasan_check_range+0x100/0x1a8 [ 33.011956] kthread+0x328/0x630 [ 33.013145] kunit_try_run_case+0x170/0x3f0 [ 33.013472] The buggy address is located 0 bytes to the right of [ 33.013472] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.013538] [ 33.013559] The buggy address belongs to the physical page: [ 33.013596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.013873] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.014021] page_type: f5(slab) [ 33.014435] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.014613] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.014704] page dumped because: kasan: bad access detected [ 33.014800] [ 33.014870] Memory state around the buggy address: [ 33.014934] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.014982] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.015031] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.015373] ^ [ 33.015825] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.016194] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.016242] ================================================================== [ 33.092698] ================================================================== [ 33.092891] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 33.092960] Read of size 4 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.093481] [ 33.093757] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.093886] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.093919] Hardware name: linux,dummy-virt (DT) [ 33.093987] Call trace: [ 33.094410] show_stack+0x20/0x38 (C) [ 33.094729] dump_stack_lvl+0x8c/0xd0 [ 33.094829] print_report+0x118/0x5d0 [ 33.094930] kasan_report+0xdc/0x128 [ 33.094981] __asan_report_load4_noabort+0x20/0x30 [ 33.095220] kasan_atomics_helper+0x3e04/0x4858 [ 33.095426] kasan_atomics+0x198/0x2e0 [ 33.095706] kunit_try_run_case+0x170/0x3f0 [ 33.095879] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.095942] kthread+0x328/0x630 [ 33.095989] ret_from_fork+0x10/0x20 [ 33.096234] [ 33.096358] Allocated by task 296: [ 33.096660] kasan_save_stack+0x3c/0x68 [ 33.096781] kasan_save_track+0x20/0x40 [ 33.096829] kasan_save_alloc_info+0x40/0x58 [ 33.096903] __kasan_kmalloc+0xd4/0xd8 [ 33.097354] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.097523] kasan_atomics+0xb8/0x2e0 [ 33.097606] kunit_try_run_case+0x170/0x3f0 [ 33.097748] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.097818] kthread+0x328/0x630 [ 33.098147] ret_from_fork+0x10/0x20 [ 33.098228] [ 33.098317] The buggy address belongs to the object at fff00000c91a4d80 [ 33.098317] which belongs to the cache kmalloc-64 of size 64 [ 33.098585] The buggy address is located 0 bytes to the right of [ 33.098585] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.098789] [ 33.098833] The buggy address belongs to the physical page: [ 33.098912] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.099031] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.099090] page_type: f5(slab) [ 33.099245] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.099459] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.099811] page dumped because: kasan: bad access detected [ 33.099857] [ 33.099878] Memory state around the buggy address: [ 33.099929] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.099993] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.100054] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.100100] ^ [ 33.100139] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.100191] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.100238] ================================================================== [ 33.324390] ================================================================== [ 33.324447] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 33.324500] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.324559] [ 33.324594] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.324823] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.324920] Hardware name: linux,dummy-virt (DT) [ 33.324967] Call trace: [ 33.325186] show_stack+0x20/0x38 (C) [ 33.325257] dump_stack_lvl+0x8c/0xd0 [ 33.325307] print_report+0x118/0x5d0 [ 33.325364] kasan_report+0xdc/0x128 [ 33.325410] kasan_check_range+0x100/0x1a8 [ 33.325612] __kasan_check_write+0x20/0x30 [ 33.325777] kasan_atomics_helper+0x17ec/0x4858 [ 33.325839] kasan_atomics+0x198/0x2e0 [ 33.325887] kunit_try_run_case+0x170/0x3f0 [ 33.325936] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.325988] kthread+0x328/0x630 [ 33.326033] ret_from_fork+0x10/0x20 [ 33.326416] [ 33.326484] Allocated by task 296: [ 33.326672] kasan_save_stack+0x3c/0x68 [ 33.326848] kasan_save_track+0x20/0x40 [ 33.326932] kasan_save_alloc_info+0x40/0x58 [ 33.327109] __kasan_kmalloc+0xd4/0xd8 [ 33.327294] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.327371] kasan_atomics+0xb8/0x2e0 [ 33.327544] kunit_try_run_case+0x170/0x3f0 [ 33.327712] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.327764] kthread+0x328/0x630 [ 33.327951] ret_from_fork+0x10/0x20 [ 33.328137] [ 33.328191] The buggy address belongs to the object at fff00000c91a4d80 [ 33.328191] which belongs to the cache kmalloc-64 of size 64 [ 33.328285] The buggy address is located 0 bytes to the right of [ 33.328285] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.328362] [ 33.328386] The buggy address belongs to the physical page: [ 33.328419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.328475] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.328526] page_type: f5(slab) [ 33.328567] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.328619] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.328673] page dumped because: kasan: bad access detected [ 33.328705] [ 33.328736] Memory state around the buggy address: [ 33.328781] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.328825] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.328869] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.328924] ^ [ 33.328958] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.329026] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.329083] ================================================================== [ 33.177998] ================================================================== [ 33.178221] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 33.178488] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.178585] [ 33.178624] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.178904] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.179080] Hardware name: linux,dummy-virt (DT) [ 33.179125] Call trace: [ 33.179151] show_stack+0x20/0x38 (C) [ 33.179204] dump_stack_lvl+0x8c/0xd0 [ 33.179436] print_report+0x118/0x5d0 [ 33.179500] kasan_report+0xdc/0x128 [ 33.179547] kasan_check_range+0x100/0x1a8 [ 33.179601] __kasan_check_write+0x20/0x30 [ 33.179804] kasan_atomics_helper+0x1128/0x4858 [ 33.179889] kasan_atomics+0x198/0x2e0 [ 33.179939] kunit_try_run_case+0x170/0x3f0 [ 33.179999] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.180051] kthread+0x328/0x630 [ 33.180148] ret_from_fork+0x10/0x20 [ 33.180201] [ 33.180226] Allocated by task 296: [ 33.180259] kasan_save_stack+0x3c/0x68 [ 33.180306] kasan_save_track+0x20/0x40 [ 33.180358] kasan_save_alloc_info+0x40/0x58 [ 33.180398] __kasan_kmalloc+0xd4/0xd8 [ 33.180447] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.180502] kasan_atomics+0xb8/0x2e0 [ 33.180547] kunit_try_run_case+0x170/0x3f0 [ 33.180589] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.180632] kthread+0x328/0x630 [ 33.180677] ret_from_fork+0x10/0x20 [ 33.180739] [ 33.180769] The buggy address belongs to the object at fff00000c91a4d80 [ 33.180769] which belongs to the cache kmalloc-64 of size 64 [ 33.180837] The buggy address is located 0 bytes to the right of [ 33.180837] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.180903] [ 33.180926] The buggy address belongs to the physical page: [ 33.180958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.181012] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.181062] page_type: f5(slab) [ 33.181101] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.181153] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.181192] page dumped because: kasan: bad access detected [ 33.181242] [ 33.181262] Memory state around the buggy address: [ 33.181296] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.182178] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.182244] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.182307] ^ [ 33.182364] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.182439] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.182480] ================================================================== [ 33.264902] ================================================================== [ 33.264967] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 33.265045] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.265099] [ 33.265277] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.265674] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.265744] Hardware name: linux,dummy-virt (DT) [ 33.266124] Call trace: [ 33.266176] show_stack+0x20/0x38 (C) [ 33.266251] dump_stack_lvl+0x8c/0xd0 [ 33.266384] print_report+0x118/0x5d0 [ 33.266433] kasan_report+0xdc/0x128 [ 33.266479] kasan_check_range+0x100/0x1a8 [ 33.266526] __kasan_check_write+0x20/0x30 [ 33.266573] kasan_atomics_helper+0x15b4/0x4858 [ 33.266624] kasan_atomics+0x198/0x2e0 [ 33.267034] kunit_try_run_case+0x170/0x3f0 [ 33.267225] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.267427] kthread+0x328/0x630 [ 33.267620] ret_from_fork+0x10/0x20 [ 33.267692] [ 33.267748] Allocated by task 296: [ 33.267932] kasan_save_stack+0x3c/0x68 [ 33.268215] kasan_save_track+0x20/0x40 [ 33.268395] kasan_save_alloc_info+0x40/0x58 [ 33.268574] __kasan_kmalloc+0xd4/0xd8 [ 33.268619] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.268697] kasan_atomics+0xb8/0x2e0 [ 33.269000] kunit_try_run_case+0x170/0x3f0 [ 33.269396] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.269554] kthread+0x328/0x630 [ 33.269677] ret_from_fork+0x10/0x20 [ 33.269816] [ 33.269841] The buggy address belongs to the object at fff00000c91a4d80 [ 33.269841] which belongs to the cache kmalloc-64 of size 64 [ 33.269904] The buggy address is located 0 bytes to the right of [ 33.269904] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.269971] [ 33.270129] The buggy address belongs to the physical page: [ 33.270273] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.270593] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.270976] page_type: f5(slab) [ 33.271131] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.271184] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.271358] page dumped because: kasan: bad access detected [ 33.271409] [ 33.271447] Memory state around the buggy address: [ 33.271485] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.271542] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.271586] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.271632] ^ [ 33.271669] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.271722] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.271771] ================================================================== [ 33.140195] ================================================================== [ 33.140366] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 33.140441] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.140502] [ 33.140598] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.140715] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.140748] Hardware name: linux,dummy-virt (DT) [ 33.140781] Call trace: [ 33.140959] show_stack+0x20/0x38 (C) [ 33.141029] dump_stack_lvl+0x8c/0xd0 [ 33.141087] print_report+0x118/0x5d0 [ 33.141419] kasan_report+0xdc/0x128 [ 33.141493] kasan_check_range+0x100/0x1a8 [ 33.141731] __kasan_check_write+0x20/0x30 [ 33.142082] kasan_atomics_helper+0xf20/0x4858 [ 33.142175] kasan_atomics+0x198/0x2e0 [ 33.142358] kunit_try_run_case+0x170/0x3f0 [ 33.142416] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.142758] kthread+0x328/0x630 [ 33.142843] ret_from_fork+0x10/0x20 [ 33.143139] [ 33.143232] Allocated by task 296: [ 33.143347] kasan_save_stack+0x3c/0x68 [ 33.143437] kasan_save_track+0x20/0x40 [ 33.143500] kasan_save_alloc_info+0x40/0x58 [ 33.143811] __kasan_kmalloc+0xd4/0xd8 [ 33.143886] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.143985] kasan_atomics+0xb8/0x2e0 [ 33.144174] kunit_try_run_case+0x170/0x3f0 [ 33.144348] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.144479] kthread+0x328/0x630 [ 33.144593] ret_from_fork+0x10/0x20 [ 33.144634] [ 33.144802] The buggy address belongs to the object at fff00000c91a4d80 [ 33.144802] which belongs to the cache kmalloc-64 of size 64 [ 33.145028] The buggy address is located 0 bytes to the right of [ 33.145028] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.145402] [ 33.145465] The buggy address belongs to the physical page: [ 33.145586] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.145651] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.145834] page_type: f5(slab) [ 33.145882] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.146103] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.146208] page dumped because: kasan: bad access detected [ 33.146275] [ 33.146616] Memory state around the buggy address: [ 33.146716] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.146799] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.146934] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.147026] ^ [ 33.147084] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.147179] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.147255] ================================================================== [ 33.295634] ================================================================== [ 33.295976] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 33.296159] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.296223] [ 33.296259] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.296535] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.296703] Hardware name: linux,dummy-virt (DT) [ 33.296843] Call trace: [ 33.296871] show_stack+0x20/0x38 (C) [ 33.297045] dump_stack_lvl+0x8c/0xd0 [ 33.297108] print_report+0x118/0x5d0 [ 33.297155] kasan_report+0xdc/0x128 [ 33.297199] kasan_check_range+0x100/0x1a8 [ 33.297389] __kasan_check_write+0x20/0x30 [ 33.297493] kasan_atomics_helper+0x16d0/0x4858 [ 33.297715] kasan_atomics+0x198/0x2e0 [ 33.297777] kunit_try_run_case+0x170/0x3f0 [ 33.298127] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.298208] kthread+0x328/0x630 [ 33.298461] ret_from_fork+0x10/0x20 [ 33.298655] [ 33.298714] Allocated by task 296: [ 33.298848] kasan_save_stack+0x3c/0x68 [ 33.298899] kasan_save_track+0x20/0x40 [ 33.298941] kasan_save_alloc_info+0x40/0x58 [ 33.298992] __kasan_kmalloc+0xd4/0xd8 [ 33.299038] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.299084] kasan_atomics+0xb8/0x2e0 [ 33.299133] kunit_try_run_case+0x170/0x3f0 [ 33.299176] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.299229] kthread+0x328/0x630 [ 33.299274] ret_from_fork+0x10/0x20 [ 33.299344] [ 33.299366] The buggy address belongs to the object at fff00000c91a4d80 [ 33.299366] which belongs to the cache kmalloc-64 of size 64 [ 33.299637] The buggy address is located 0 bytes to the right of [ 33.299637] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.300001] [ 33.300039] The buggy address belongs to the physical page: [ 33.300095] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.300400] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.300501] page_type: f5(slab) [ 33.300739] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.300812] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.300885] page dumped because: kasan: bad access detected [ 33.300919] [ 33.301363] Memory state around the buggy address: [ 33.301433] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.301769] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.301915] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.302032] ^ [ 33.302099] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.302163] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.302318] ================================================================== [ 33.256978] ================================================================== [ 33.257091] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 33.257301] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.257450] [ 33.257513] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.257685] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.257734] Hardware name: linux,dummy-virt (DT) [ 33.257802] Call trace: [ 33.257844] show_stack+0x20/0x38 (C) [ 33.258126] dump_stack_lvl+0x8c/0xd0 [ 33.258286] print_report+0x118/0x5d0 [ 33.258550] kasan_report+0xdc/0x128 [ 33.258640] kasan_check_range+0x100/0x1a8 [ 33.258697] __kasan_check_write+0x20/0x30 [ 33.259140] kasan_atomics_helper+0x154c/0x4858 [ 33.259374] kasan_atomics+0x198/0x2e0 [ 33.259568] kunit_try_run_case+0x170/0x3f0 [ 33.259629] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.259998] kthread+0x328/0x630 [ 33.260091] ret_from_fork+0x10/0x20 [ 33.260577] [ 33.260611] Allocated by task 296: [ 33.260809] kasan_save_stack+0x3c/0x68 [ 33.261178] kasan_save_track+0x20/0x40 [ 33.262347] kasan_save_alloc_info+0x40/0x58 [ 33.262412] __kasan_kmalloc+0xd4/0xd8 [ 33.262455] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.262502] kasan_atomics+0xb8/0x2e0 [ 33.262543] kunit_try_run_case+0x170/0x3f0 [ 33.262586] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.262630] kthread+0x328/0x630 [ 33.262666] ret_from_fork+0x10/0x20 [ 33.262706] [ 33.262729] The buggy address belongs to the object at fff00000c91a4d80 [ 33.262729] which belongs to the cache kmalloc-64 of size 64 [ 33.262792] The buggy address is located 0 bytes to the right of [ 33.262792] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.262861] [ 33.262884] The buggy address belongs to the physical page: [ 33.262920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.262975] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.263031] page_type: f5(slab) [ 33.263074] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.263124] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.263167] page dumped because: kasan: bad access detected [ 33.263200] [ 33.263220] Memory state around the buggy address: [ 33.263256] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.263300] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.263414] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.263481] ^ [ 33.263713] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.263774] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.263814] ================================================================== [ 33.119050] ================================================================== [ 33.119140] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 33.119211] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.119281] [ 33.119317] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.119427] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.119565] Hardware name: linux,dummy-virt (DT) [ 33.119663] Call trace: [ 33.120105] show_stack+0x20/0x38 (C) [ 33.120194] dump_stack_lvl+0x8c/0xd0 [ 33.120247] print_report+0x118/0x5d0 [ 33.120378] kasan_report+0xdc/0x128 [ 33.120432] kasan_check_range+0x100/0x1a8 [ 33.120483] __kasan_check_write+0x20/0x30 [ 33.120693] kasan_atomics_helper+0xe44/0x4858 [ 33.120764] kasan_atomics+0x198/0x2e0 [ 33.121151] kunit_try_run_case+0x170/0x3f0 [ 33.121238] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.121296] kthread+0x328/0x630 [ 33.121352] ret_from_fork+0x10/0x20 [ 33.121511] [ 33.121717] Allocated by task 296: [ 33.121783] kasan_save_stack+0x3c/0x68 [ 33.122112] kasan_save_track+0x20/0x40 [ 33.122236] kasan_save_alloc_info+0x40/0x58 [ 33.122294] __kasan_kmalloc+0xd4/0xd8 [ 33.122450] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.122505] kasan_atomics+0xb8/0x2e0 [ 33.122615] kunit_try_run_case+0x170/0x3f0 [ 33.122797] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.122906] kthread+0x328/0x630 [ 33.123198] ret_from_fork+0x10/0x20 [ 33.123279] [ 33.123350] The buggy address belongs to the object at fff00000c91a4d80 [ 33.123350] which belongs to the cache kmalloc-64 of size 64 [ 33.123434] The buggy address is located 0 bytes to the right of [ 33.123434] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.123519] [ 33.123813] The buggy address belongs to the physical page: [ 33.123876] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.124258] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.124379] page_type: f5(slab) [ 33.124494] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.124592] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.124960] page dumped because: kasan: bad access detected [ 33.125020] [ 33.125071] Memory state around the buggy address: [ 33.125116] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.125177] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.125239] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.125285] ^ [ 33.125344] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.125634] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.125985] ================================================================== [ 33.287822] ================================================================== [ 33.288021] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 33.288190] Read of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.288253] [ 33.288290] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.288511] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.288546] Hardware name: linux,dummy-virt (DT) [ 33.288597] Call trace: [ 33.288624] show_stack+0x20/0x38 (C) [ 33.288846] dump_stack_lvl+0x8c/0xd0 [ 33.288926] print_report+0x118/0x5d0 [ 33.288982] kasan_report+0xdc/0x128 [ 33.289029] __asan_report_load8_noabort+0x20/0x30 [ 33.289080] kasan_atomics_helper+0x3df4/0x4858 [ 33.289489] kasan_atomics+0x198/0x2e0 [ 33.289583] kunit_try_run_case+0x170/0x3f0 [ 33.289656] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.289854] kthread+0x328/0x630 [ 33.289952] ret_from_fork+0x10/0x20 [ 33.290033] [ 33.290229] Allocated by task 296: [ 33.290412] kasan_save_stack+0x3c/0x68 [ 33.290682] kasan_save_track+0x20/0x40 [ 33.290843] kasan_save_alloc_info+0x40/0x58 [ 33.290926] __kasan_kmalloc+0xd4/0xd8 [ 33.291153] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.291330] kasan_atomics+0xb8/0x2e0 [ 33.291403] kunit_try_run_case+0x170/0x3f0 [ 33.291755] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.291848] kthread+0x328/0x630 [ 33.292054] ret_from_fork+0x10/0x20 [ 33.292175] [ 33.292295] The buggy address belongs to the object at fff00000c91a4d80 [ 33.292295] which belongs to the cache kmalloc-64 of size 64 [ 33.292530] The buggy address is located 0 bytes to the right of [ 33.292530] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.292605] [ 33.292629] The buggy address belongs to the physical page: [ 33.292807] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.293150] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.293309] page_type: f5(slab) [ 33.293503] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.293706] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.293772] page dumped because: kasan: bad access detected [ 33.293807] [ 33.293841] Memory state around the buggy address: [ 33.293884] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.294243] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.294334] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.294391] ^ [ 33.294442] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.294849] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.295005] ================================================================== [ 33.101559] ================================================================== [ 33.101682] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 33.101817] Read of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.101984] [ 33.102023] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.102391] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.102449] Hardware name: linux,dummy-virt (DT) [ 33.102520] Call trace: [ 33.102592] show_stack+0x20/0x38 (C) [ 33.102669] dump_stack_lvl+0x8c/0xd0 [ 33.102976] print_report+0x118/0x5d0 [ 33.103069] kasan_report+0xdc/0x128 [ 33.103130] kasan_check_range+0x100/0x1a8 [ 33.103180] __kasan_check_read+0x20/0x30 [ 33.103535] kasan_atomics_helper+0xdd4/0x4858 [ 33.103847] kasan_atomics+0x198/0x2e0 [ 33.104011] kunit_try_run_case+0x170/0x3f0 [ 33.104088] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.104428] kthread+0x328/0x630 [ 33.104507] ret_from_fork+0x10/0x20 [ 33.104820] [ 33.104872] Allocated by task 296: [ 33.105002] kasan_save_stack+0x3c/0x68 [ 33.105057] kasan_save_track+0x20/0x40 [ 33.105126] kasan_save_alloc_info+0x40/0x58 [ 33.105169] __kasan_kmalloc+0xd4/0xd8 [ 33.105212] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.105575] kasan_atomics+0xb8/0x2e0 [ 33.105849] kunit_try_run_case+0x170/0x3f0 [ 33.105905] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.105955] kthread+0x328/0x630 [ 33.106004] ret_from_fork+0x10/0x20 [ 33.106198] [ 33.106248] The buggy address belongs to the object at fff00000c91a4d80 [ 33.106248] which belongs to the cache kmalloc-64 of size 64 [ 33.106418] The buggy address is located 0 bytes to the right of [ 33.106418] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.106536] [ 33.106796] The buggy address belongs to the physical page: [ 33.106888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.107109] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.107278] page_type: f5(slab) [ 33.107637] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.107780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.107868] page dumped because: kasan: bad access detected [ 33.107956] [ 33.107979] Memory state around the buggy address: [ 33.108028] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.108084] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.108137] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.108184] ^ [ 33.108221] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.108272] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.108338] ================================================================== [ 33.280380] ================================================================== [ 33.280461] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 33.280516] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.280576] [ 33.280611] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.280698] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.280733] Hardware name: linux,dummy-virt (DT) [ 33.280765] Call trace: [ 33.280792] show_stack+0x20/0x38 (C) [ 33.280846] dump_stack_lvl+0x8c/0xd0 [ 33.280896] print_report+0x118/0x5d0 [ 33.280942] kasan_report+0xdc/0x128 [ 33.280987] kasan_check_range+0x100/0x1a8 [ 33.281044] __kasan_check_write+0x20/0x30 [ 33.281091] kasan_atomics_helper+0x1644/0x4858 [ 33.281142] kasan_atomics+0x198/0x2e0 [ 33.281189] kunit_try_run_case+0x170/0x3f0 [ 33.281248] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.281306] kthread+0x328/0x630 [ 33.281362] ret_from_fork+0x10/0x20 [ 33.282397] [ 33.282453] Allocated by task 296: [ 33.282531] kasan_save_stack+0x3c/0x68 [ 33.282580] kasan_save_track+0x20/0x40 [ 33.282631] kasan_save_alloc_info+0x40/0x58 [ 33.282672] __kasan_kmalloc+0xd4/0xd8 [ 33.282762] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.283063] kasan_atomics+0xb8/0x2e0 [ 33.283184] kunit_try_run_case+0x170/0x3f0 [ 33.283596] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.283659] kthread+0x328/0x630 [ 33.283697] ret_from_fork+0x10/0x20 [ 33.284016] [ 33.284227] The buggy address belongs to the object at fff00000c91a4d80 [ 33.284227] which belongs to the cache kmalloc-64 of size 64 [ 33.284400] The buggy address is located 0 bytes to the right of [ 33.284400] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.284539] [ 33.284757] The buggy address belongs to the physical page: [ 33.284918] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.285048] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.285136] page_type: f5(slab) [ 33.285442] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.285604] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.285911] page dumped because: kasan: bad access detected [ 33.286002] [ 33.286051] Memory state around the buggy address: [ 33.286165] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.286270] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.286376] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.286734] ^ [ 33.286882] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.287077] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.287168] ================================================================== [ 33.302747] ================================================================== [ 33.302883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 33.302946] Read of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.303289] [ 33.303477] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.303680] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.303751] Hardware name: linux,dummy-virt (DT) [ 33.303786] Call trace: [ 33.303834] show_stack+0x20/0x38 (C) [ 33.303889] dump_stack_lvl+0x8c/0xd0 [ 33.304176] print_report+0x118/0x5d0 [ 33.304335] kasan_report+0xdc/0x128 [ 33.304403] __asan_report_load8_noabort+0x20/0x30 [ 33.304624] kasan_atomics_helper+0x3e10/0x4858 [ 33.304693] kasan_atomics+0x198/0x2e0 [ 33.304742] kunit_try_run_case+0x170/0x3f0 [ 33.304805] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.305031] kthread+0x328/0x630 [ 33.305092] ret_from_fork+0x10/0x20 [ 33.305143] [ 33.305165] Allocated by task 296: [ 33.305195] kasan_save_stack+0x3c/0x68 [ 33.305240] kasan_save_track+0x20/0x40 [ 33.305281] kasan_save_alloc_info+0x40/0x58 [ 33.305341] __kasan_kmalloc+0xd4/0xd8 [ 33.305608] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.305691] kasan_atomics+0xb8/0x2e0 [ 33.305899] kunit_try_run_case+0x170/0x3f0 [ 33.305952] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.305997] kthread+0x328/0x630 [ 33.306492] ret_from_fork+0x10/0x20 [ 33.306634] [ 33.306702] The buggy address belongs to the object at fff00000c91a4d80 [ 33.306702] which belongs to the cache kmalloc-64 of size 64 [ 33.306811] The buggy address is located 0 bytes to the right of [ 33.306811] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.306929] [ 33.307572] The buggy address belongs to the physical page: [ 33.307628] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.307710] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.307764] page_type: f5(slab) [ 33.307807] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.308035] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.308083] page dumped because: kasan: bad access detected [ 33.308395] [ 33.308571] Memory state around the buggy address: [ 33.308635] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.308691] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.308811] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.308926] ^ [ 33.309235] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.309415] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.309491] ================================================================== [ 33.147869] ================================================================== [ 33.148042] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 33.148126] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.148187] [ 33.148219] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.148335] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.148375] Hardware name: linux,dummy-virt (DT) [ 33.148412] Call trace: [ 33.148435] show_stack+0x20/0x38 (C) [ 33.148486] dump_stack_lvl+0x8c/0xd0 [ 33.148546] print_report+0x118/0x5d0 [ 33.148592] kasan_report+0xdc/0x128 [ 33.148636] kasan_check_range+0x100/0x1a8 [ 33.148686] __kasan_check_write+0x20/0x30 [ 33.148742] kasan_atomics_helper+0xf88/0x4858 [ 33.148801] kasan_atomics+0x198/0x2e0 [ 33.148851] kunit_try_run_case+0x170/0x3f0 [ 33.148903] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.148959] kthread+0x328/0x630 [ 33.149014] ret_from_fork+0x10/0x20 [ 33.149063] [ 33.149085] Allocated by task 296: [ 33.149115] kasan_save_stack+0x3c/0x68 [ 33.149161] kasan_save_track+0x20/0x40 [ 33.149204] kasan_save_alloc_info+0x40/0x58 [ 33.149246] __kasan_kmalloc+0xd4/0xd8 [ 33.149286] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.149343] kasan_atomics+0xb8/0x2e0 [ 33.150104] kunit_try_run_case+0x170/0x3f0 [ 33.150165] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.150215] kthread+0x328/0x630 [ 33.150252] ret_from_fork+0x10/0x20 [ 33.150314] [ 33.150514] The buggy address belongs to the object at fff00000c91a4d80 [ 33.150514] which belongs to the cache kmalloc-64 of size 64 [ 33.150769] The buggy address is located 0 bytes to the right of [ 33.150769] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.151176] [ 33.151219] The buggy address belongs to the physical page: [ 33.151259] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.151728] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.152187] page_type: f5(slab) [ 33.152441] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.152524] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.152759] page dumped because: kasan: bad access detected [ 33.152894] [ 33.152940] Memory state around the buggy address: [ 33.153051] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.153136] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.153525] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.153597] ^ [ 33.153697] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.153780] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.153850] ================================================================== [ 33.133773] ================================================================== [ 33.133838] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 33.133894] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.133953] [ 33.134277] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.134637] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.134800] Hardware name: linux,dummy-virt (DT) [ 33.134845] Call trace: [ 33.134872] show_stack+0x20/0x38 (C) [ 33.134928] dump_stack_lvl+0x8c/0xd0 [ 33.135074] print_report+0x118/0x5d0 [ 33.135128] kasan_report+0xdc/0x128 [ 33.135240] kasan_check_range+0x100/0x1a8 [ 33.135295] __kasan_check_write+0x20/0x30 [ 33.135356] kasan_atomics_helper+0xeb8/0x4858 [ 33.135427] kasan_atomics+0x198/0x2e0 [ 33.135479] kunit_try_run_case+0x170/0x3f0 [ 33.135804] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.136177] kthread+0x328/0x630 [ 33.136248] ret_from_fork+0x10/0x20 [ 33.136668] [ 33.136706] Allocated by task 296: [ 33.136742] kasan_save_stack+0x3c/0x68 [ 33.136793] kasan_save_track+0x20/0x40 [ 33.136853] kasan_save_alloc_info+0x40/0x58 [ 33.136898] __kasan_kmalloc+0xd4/0xd8 [ 33.137085] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.137264] kasan_atomics+0xb8/0x2e0 [ 33.137320] kunit_try_run_case+0x170/0x3f0 [ 33.137376] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.137424] kthread+0x328/0x630 [ 33.137460] ret_from_fork+0x10/0x20 [ 33.137500] [ 33.137525] The buggy address belongs to the object at fff00000c91a4d80 [ 33.137525] which belongs to the cache kmalloc-64 of size 64 [ 33.137660] The buggy address is located 0 bytes to the right of [ 33.137660] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.137744] [ 33.137768] The buggy address belongs to the physical page: [ 33.137804] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.137875] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.137930] page_type: f5(slab) [ 33.137989] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.138058] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.138114] page dumped because: kasan: bad access detected [ 33.138152] [ 33.138178] Memory state around the buggy address: [ 33.138215] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.138267] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.138317] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.138973] ^ [ 33.139081] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.139174] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.139222] ================================================================== [ 33.310031] ================================================================== [ 33.310084] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 33.310373] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.310768] [ 33.310814] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.310905] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.310933] Hardware name: linux,dummy-virt (DT) [ 33.311082] Call trace: [ 33.311141] show_stack+0x20/0x38 (C) [ 33.311195] dump_stack_lvl+0x8c/0xd0 [ 33.311610] print_report+0x118/0x5d0 [ 33.311677] kasan_report+0xdc/0x128 [ 33.311995] kasan_check_range+0x100/0x1a8 [ 33.312073] __kasan_check_write+0x20/0x30 [ 33.312349] kasan_atomics_helper+0x175c/0x4858 [ 33.312522] kasan_atomics+0x198/0x2e0 [ 33.312759] kunit_try_run_case+0x170/0x3f0 [ 33.313004] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.313095] kthread+0x328/0x630 [ 33.313283] ret_from_fork+0x10/0x20 [ 33.313358] [ 33.313380] Allocated by task 296: [ 33.313547] kasan_save_stack+0x3c/0x68 [ 33.313702] kasan_save_track+0x20/0x40 [ 33.313779] kasan_save_alloc_info+0x40/0x58 [ 33.313935] __kasan_kmalloc+0xd4/0xd8 [ 33.314122] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.314176] kasan_atomics+0xb8/0x2e0 [ 33.314218] kunit_try_run_case+0x170/0x3f0 [ 33.314262] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.314307] kthread+0x328/0x630 [ 33.314648] ret_from_fork+0x10/0x20 [ 33.314748] [ 33.314809] The buggy address belongs to the object at fff00000c91a4d80 [ 33.314809] which belongs to the cache kmalloc-64 of size 64 [ 33.315031] The buggy address is located 0 bytes to the right of [ 33.315031] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.315354] [ 33.315561] The buggy address belongs to the physical page: [ 33.315613] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.315797] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.315987] page_type: f5(slab) [ 33.316035] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.316199] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.316245] page dumped because: kasan: bad access detected [ 33.316279] [ 33.316434] Memory state around the buggy address: [ 33.316477] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.316560] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.316614] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.316672] ^ [ 33.316709] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.316761] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.316811] ================================================================== [ 33.154923] ================================================================== [ 33.155018] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 33.155202] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.155401] [ 33.155447] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.155859] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.155994] Hardware name: linux,dummy-virt (DT) [ 33.156060] Call trace: [ 33.156108] show_stack+0x20/0x38 (C) [ 33.156172] dump_stack_lvl+0x8c/0xd0 [ 33.156502] print_report+0x118/0x5d0 [ 33.156633] kasan_report+0xdc/0x128 [ 33.156711] kasan_check_range+0x100/0x1a8 [ 33.156813] __kasan_check_write+0x20/0x30 [ 33.156868] kasan_atomics_helper+0xff0/0x4858 [ 33.156956] kasan_atomics+0x198/0x2e0 [ 33.157013] kunit_try_run_case+0x170/0x3f0 [ 33.157065] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.157531] kthread+0x328/0x630 [ 33.157719] ret_from_fork+0x10/0x20 [ 33.157868] [ 33.157895] Allocated by task 296: [ 33.157928] kasan_save_stack+0x3c/0x68 [ 33.157997] kasan_save_track+0x20/0x40 [ 33.158047] kasan_save_alloc_info+0x40/0x58 [ 33.158348] __kasan_kmalloc+0xd4/0xd8 [ 33.158529] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.158705] kasan_atomics+0xb8/0x2e0 [ 33.158782] kunit_try_run_case+0x170/0x3f0 [ 33.158918] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.158990] kthread+0x328/0x630 [ 33.159034] ret_from_fork+0x10/0x20 [ 33.159336] [ 33.159414] The buggy address belongs to the object at fff00000c91a4d80 [ 33.159414] which belongs to the cache kmalloc-64 of size 64 [ 33.159621] The buggy address is located 0 bytes to the right of [ 33.159621] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.159847] [ 33.159892] The buggy address belongs to the physical page: [ 33.159931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.159997] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.160394] page_type: f5(slab) [ 33.160448] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.160742] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.160885] page dumped because: kasan: bad access detected [ 33.160958] [ 33.161064] Memory state around the buggy address: [ 33.161147] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.161233] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.161579] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.161719] ^ [ 33.161802] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.161868] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.161952] ================================================================== [ 33.026543] ================================================================== [ 33.026663] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 33.026725] Write of size 4 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.026793] [ 33.027002] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.027118] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.027268] Hardware name: linux,dummy-virt (DT) [ 33.027312] Call trace: [ 33.027349] show_stack+0x20/0x38 (C) [ 33.027404] dump_stack_lvl+0x8c/0xd0 [ 33.027453] print_report+0x118/0x5d0 [ 33.027507] kasan_report+0xdc/0x128 [ 33.027664] kasan_atomics_helper+0xad4/0x4858 [ 33.028050] kasan_save_stack+0x3c/0x68 [ 33.028571] The buggy address is located 0 bytes to the right of [ 33.028571] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.028644] [ 33.028668] The buggy address belongs to the physical page: [ 33.028708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.028761] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.028821] page_type: f5(slab) [ 33.028862] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.028916] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.028967] page dumped because: kasan: bad access detected [ 33.029001] [ 33.029020] Memory state around the buggy address: [ 33.029052] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.029106] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.029152] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.029195] ^ [ 33.029230] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.029274] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.030589] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 33.031375] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.032917] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.034616] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.035613] [ 33.035658] The buggy address belongs to the physical page: [ 33.036427] page dumped because: kasan: bad access detected [ 33.036909] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.037587] ================================================================== [ 33.183537] ================================================================== [ 33.183592] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 33.183718] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.183794] [ 33.183839] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.184212] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.184274] Hardware name: linux,dummy-virt (DT) [ 33.184310] Call trace: [ 33.184344] show_stack+0x20/0x38 (C) [ 33.184400] dump_stack_lvl+0x8c/0xd0 [ 33.184445] print_report+0x118/0x5d0 [ 33.184490] kasan_report+0xdc/0x128 [ 33.184797] kasan_check_range+0x100/0x1a8 [ 33.184947] __kasan_check_write+0x20/0x30 [ 33.185044] kasan_atomics_helper+0x1190/0x4858 [ 33.185109] kasan_atomics+0x198/0x2e0 [ 33.185160] kunit_try_run_case+0x170/0x3f0 [ 33.185454] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.185611] kthread+0x328/0x630 [ 33.186047] ret_from_fork+0x10/0x20 [ 33.186183] [ 33.186208] Allocated by task 296: [ 33.186240] kasan_save_stack+0x3c/0x68 [ 33.186469] kasan_save_track+0x20/0x40 [ 33.186651] kasan_save_alloc_info+0x40/0x58 [ 33.186735] __kasan_kmalloc+0xd4/0xd8 [ 33.186933] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.187105] kasan_atomics+0xb8/0x2e0 [ 33.187188] kunit_try_run_case+0x170/0x3f0 [ 33.187261] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.187475] kthread+0x328/0x630 [ 33.187645] ret_from_fork+0x10/0x20 [ 33.187721] [ 33.187908] The buggy address belongs to the object at fff00000c91a4d80 [ 33.187908] which belongs to the cache kmalloc-64 of size 64 [ 33.188018] The buggy address is located 0 bytes to the right of [ 33.188018] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.188204] [ 33.188533] The buggy address belongs to the physical page: [ 33.188602] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.188825] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.189051] page_type: f5(slab) [ 33.189110] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.189488] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.189647] page dumped because: kasan: bad access detected [ 33.189717] [ 33.190006] Memory state around the buggy address: [ 33.190053] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.190237] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.190425] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.190815] ^ [ 33.190922] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.191086] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.191156] ================================================================== [ 33.168707] ================================================================== [ 33.169063] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 33.169220] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.169306] [ 33.169352] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.169580] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.169718] Hardware name: linux,dummy-virt (DT) [ 33.169795] Call trace: [ 33.169828] show_stack+0x20/0x38 (C) [ 33.170058] dump_stack_lvl+0x8c/0xd0 [ 33.170229] print_report+0x118/0x5d0 [ 33.170459] kasan_report+0xdc/0x128 [ 33.170636] kasan_check_range+0x100/0x1a8 [ 33.170720] __kasan_check_write+0x20/0x30 [ 33.170911] kasan_atomics_helper+0x10c0/0x4858 [ 33.171104] kasan_atomics+0x198/0x2e0 [ 33.171185] kunit_try_run_case+0x170/0x3f0 [ 33.171541] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.171635] kthread+0x328/0x630 [ 33.171831] ret_from_fork+0x10/0x20 [ 33.172045] [ 33.172089] Allocated by task 296: [ 33.172381] kasan_save_stack+0x3c/0x68 [ 33.172489] kasan_save_track+0x20/0x40 [ 33.172815] kasan_save_alloc_info+0x40/0x58 [ 33.173053] __kasan_kmalloc+0xd4/0xd8 [ 33.173196] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.173368] kasan_atomics+0xb8/0x2e0 [ 33.173803] kunit_try_run_case+0x170/0x3f0 [ 33.173899] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.174007] kthread+0x328/0x630 [ 33.174293] ret_from_fork+0x10/0x20 [ 33.174378] [ 33.174560] The buggy address belongs to the object at fff00000c91a4d80 [ 33.174560] which belongs to the cache kmalloc-64 of size 64 [ 33.174821] The buggy address is located 0 bytes to the right of [ 33.174821] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.175237] [ 33.175274] The buggy address belongs to the physical page: [ 33.175464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.175542] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.175651] page_type: f5(slab) [ 33.175736] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.176197] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.176345] page dumped because: kasan: bad access detected [ 33.176421] [ 33.176475] Memory state around the buggy address: [ 33.176710] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.176951] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.177036] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.177137] ^ [ 33.177180] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.177240] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.177293] ================================================================== [ 33.200245] ================================================================== [ 33.200308] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 33.200378] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.200630] [ 33.200803] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.200903] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.201219] Hardware name: linux,dummy-virt (DT) [ 33.201335] Call trace: [ 33.201449] show_stack+0x20/0x38 (C) [ 33.201514] dump_stack_lvl+0x8c/0xd0 [ 33.201563] print_report+0x118/0x5d0 [ 33.201640] kasan_report+0xdc/0x128 [ 33.201769] kasan_check_range+0x100/0x1a8 [ 33.201820] __kasan_check_write+0x20/0x30 [ 33.201867] kasan_atomics_helper+0x126c/0x4858 [ 33.201925] kasan_atomics+0x198/0x2e0 [ 33.201972] kunit_try_run_case+0x170/0x3f0 [ 33.202420] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.202528] kthread+0x328/0x630 [ 33.202908] ret_from_fork+0x10/0x20 [ 33.203376] [ 33.203427] Allocated by task 296: [ 33.203491] kasan_save_stack+0x3c/0x68 [ 33.203719] kasan_save_track+0x20/0x40 [ 33.203889] kasan_save_alloc_info+0x40/0x58 [ 33.204188] __kasan_kmalloc+0xd4/0xd8 [ 33.204361] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.204618] kasan_atomics+0xb8/0x2e0 [ 33.204827] kunit_try_run_case+0x170/0x3f0 [ 33.204958] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.205137] kthread+0x328/0x630 [ 33.205523] ret_from_fork+0x10/0x20 [ 33.205733] [ 33.205785] The buggy address belongs to the object at fff00000c91a4d80 [ 33.205785] which belongs to the cache kmalloc-64 of size 64 [ 33.206029] The buggy address is located 0 bytes to the right of [ 33.206029] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.206109] [ 33.206140] The buggy address belongs to the physical page: [ 33.206175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.206234] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.206506] page_type: f5(slab) [ 33.206593] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.206967] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.207050] page dumped because: kasan: bad access detected [ 33.207192] [ 33.207227] Memory state around the buggy address: [ 33.207262] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.207342] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.207398] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.207439] ^ [ 33.207475] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.207520] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.207627] ================================================================== [ 33.234714] ================================================================== [ 33.234778] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 33.234865] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.235181] [ 33.235311] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.235483] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.235517] Hardware name: linux,dummy-virt (DT) [ 33.235595] Call trace: [ 33.235654] show_stack+0x20/0x38 (C) [ 33.235728] dump_stack_lvl+0x8c/0xd0 [ 33.235821] print_report+0x118/0x5d0 [ 33.236005] kasan_report+0xdc/0x128 [ 33.236070] kasan_check_range+0x100/0x1a8 [ 33.236356] __kasan_check_write+0x20/0x30 [ 33.236427] kasan_atomics_helper+0x1414/0x4858 [ 33.236680] kasan_atomics+0x198/0x2e0 [ 33.236871] kunit_try_run_case+0x170/0x3f0 [ 33.236934] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.237292] kthread+0x328/0x630 [ 33.237370] ret_from_fork+0x10/0x20 [ 33.237424] [ 33.237446] Allocated by task 296: [ 33.237478] kasan_save_stack+0x3c/0x68 [ 33.237864] kasan_save_track+0x20/0x40 [ 33.238001] kasan_save_alloc_info+0x40/0x58 [ 33.238096] __kasan_kmalloc+0xd4/0xd8 [ 33.238344] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.238497] kasan_atomics+0xb8/0x2e0 [ 33.238690] kunit_try_run_case+0x170/0x3f0 [ 33.238867] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.238939] kthread+0x328/0x630 [ 33.239351] ret_from_fork+0x10/0x20 [ 33.239437] [ 33.239498] The buggy address belongs to the object at fff00000c91a4d80 [ 33.239498] which belongs to the cache kmalloc-64 of size 64 [ 33.239565] The buggy address is located 0 bytes to the right of [ 33.239565] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.239868] [ 33.240143] The buggy address belongs to the physical page: [ 33.240276] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.240454] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.240508] page_type: f5(slab) [ 33.240816] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.240889] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.240935] page dumped because: kasan: bad access detected [ 33.240982] [ 33.241015] Memory state around the buggy address: [ 33.241052] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.241108] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.241197] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.241235] ^ [ 33.241272] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.241317] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.241373] ================================================================== [ 33.126611] ================================================================== [ 33.126678] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 33.126734] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.126986] [ 33.127141] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.127270] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.127330] Hardware name: linux,dummy-virt (DT) [ 33.127366] Call trace: [ 33.127523] show_stack+0x20/0x38 (C) [ 33.127704] dump_stack_lvl+0x8c/0xd0 [ 33.127767] print_report+0x118/0x5d0 [ 33.127860] kasan_report+0xdc/0x128 [ 33.127937] __asan_report_store8_noabort+0x20/0x30 [ 33.128063] kasan_atomics_helper+0x3e5c/0x4858 [ 33.128124] kasan_atomics+0x198/0x2e0 [ 33.128177] kunit_try_run_case+0x170/0x3f0 [ 33.128386] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.128589] kthread+0x328/0x630 [ 33.128653] ret_from_fork+0x10/0x20 [ 33.128705] [ 33.128765] Allocated by task 296: [ 33.128796] kasan_save_stack+0x3c/0x68 [ 33.128853] kasan_save_track+0x20/0x40 [ 33.128896] kasan_save_alloc_info+0x40/0x58 [ 33.128938] __kasan_kmalloc+0xd4/0xd8 [ 33.128979] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.129029] kasan_atomics+0xb8/0x2e0 [ 33.129078] kunit_try_run_case+0x170/0x3f0 [ 33.129143] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.129197] kthread+0x328/0x630 [ 33.129234] ret_from_fork+0x10/0x20 [ 33.129273] [ 33.129295] The buggy address belongs to the object at fff00000c91a4d80 [ 33.129295] which belongs to the cache kmalloc-64 of size 64 [ 33.129521] The buggy address is located 0 bytes to the right of [ 33.129521] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.130167] [ 33.130229] The buggy address belongs to the physical page: [ 33.130339] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.130606] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.130808] page_type: f5(slab) [ 33.130999] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.131225] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.131502] page dumped because: kasan: bad access detected [ 33.131665] [ 33.131950] Memory state around the buggy address: [ 33.132149] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.132267] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.132362] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.132419] ^ [ 33.132459] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.132663] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.132838] ================================================================== [ 33.192154] ================================================================== [ 33.192400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 33.192506] Write of size 8 at addr fff00000c91a4db0 by task kunit_try_catch/296 [ 33.192842] [ 33.192904] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 33.193013] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.193043] Hardware name: linux,dummy-virt (DT) [ 33.193076] Call trace: [ 33.193260] show_stack+0x20/0x38 (C) [ 33.193369] dump_stack_lvl+0x8c/0xd0 [ 33.193525] print_report+0x118/0x5d0 [ 33.193577] kasan_report+0xdc/0x128 [ 33.193623] kasan_check_range+0x100/0x1a8 [ 33.193884] __kasan_check_write+0x20/0x30 [ 33.194045] kasan_atomics_helper+0x11f8/0x4858 [ 33.194419] kasan_atomics+0x198/0x2e0 [ 33.194507] kunit_try_run_case+0x170/0x3f0 [ 33.194680] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.194739] kthread+0x328/0x630 [ 33.195391] ret_from_fork+0x10/0x20 [ 33.195577] [ 33.195629] Allocated by task 296: [ 33.195663] kasan_save_stack+0x3c/0x68 [ 33.195746] kasan_save_track+0x20/0x40 [ 33.196108] kasan_save_alloc_info+0x40/0x58 [ 33.196542] __kasan_kmalloc+0xd4/0xd8 [ 33.196643] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.196692] kasan_atomics+0xb8/0x2e0 [ 33.196742] kunit_try_run_case+0x170/0x3f0 [ 33.196785] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.196840] kthread+0x328/0x630 [ 33.196888] ret_from_fork+0x10/0x20 [ 33.196932] [ 33.196957] The buggy address belongs to the object at fff00000c91a4d80 [ 33.196957] which belongs to the cache kmalloc-64 of size 64 [ 33.197045] The buggy address is located 0 bytes to the right of [ 33.197045] allocated 48-byte region [fff00000c91a4d80, fff00000c91a4db0) [ 33.197128] [ 33.197151] The buggy address belongs to the physical page: [ 33.197194] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a4 [ 33.197262] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.197316] page_type: f5(slab) [ 33.197372] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.197443] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.197487] page dumped because: kasan: bad access detected [ 33.197521] [ 33.197541] Memory state around the buggy address: [ 33.198197] fff00000c91a4c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.198274] fff00000c91a4d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.198347] >fff00000c91a4d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.198590] ^ [ 33.198699] fff00000c91a4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.198783] fff00000c91a4e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.198969] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 32.775843] ================================================================== [ 32.775925] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 32.776620] show_stack+0x20/0x38 (C) [ 32.777060] kunit_try_run_case+0x170/0x3f0 [ 32.777957] kasan_save_alloc_info+0x40/0x58 [ 32.779516] The buggy address is located 8 bytes inside of [ 32.779516] allocated 9-byte region [fff00000c63ef120, fff00000c63ef129) [ 32.781633] >fff00000c63ef100: fa fb fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 32.783922] Write of size 8 at addr fff00000c63ef128 by task kunit_try_catch/292 [ 32.784813] kasan_check_range+0x100/0x1a8 [ 32.785071] kunit_try_run_case+0x170/0x3f0 [ 32.786720] kasan_bitops_generic+0xa0/0x1c8 [ 32.787923] [ 32.788475] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.789472] fff00000c63ef080: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.791990] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 32.793269] kasan_report+0xdc/0x128 [ 32.793581] kasan_bitops_generic+0x11c/0x1c8 [ 32.794000] kasan_save_track+0x20/0x40 [ 32.794523] The buggy address is located 8 bytes inside of [ 32.794523] allocated 9-byte region [fff00000c63ef120, fff00000c63ef129) [ 32.796270] fff00000c63ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.797977] [ 32.798284] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.799922] __kasan_check_write+0x20/0x30 [ 32.800455] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.801744] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.803584] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063ef [ 32.804881] ^ [ 32.806191] ================================================================== [ 32.768128] ================================================================== [ 32.768619] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 32.769270] Hardware name: linux,dummy-virt (DT) [ 32.769889] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 32.770353] kasan_save_track+0x20/0x40 [ 32.771944] [ 32.772189] The buggy address is located 8 bytes inside of [ 32.772189] allocated 9-byte region [fff00000c63ef120, fff00000c63ef129) [ 32.774417] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[ 32.735381] ================================================================== [ 32.735996] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 32.736406] dump_stack_lvl+0x8c/0xd0 [ 32.736718] kunit_try_run_case+0x170/0x3f0 [ 32.736950] Allocated by task 292: [ 32.737149] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.737860] The buggy address belongs to the object at fff00000c63ef120 [ 32.737860] which belongs to the cache kmalloc-16 of size 16 [ 32.740457] ^ [ 32.741313] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 32.742448] [ 32.742669] show_stack+0x20/0x38 (C) [ 32.743067] kunit_try_run_case+0x170/0x3f0 [ 32.743536] kasan_bitops_generic+0xa0/0x1c8 [ 32.743735] [ 32.744081] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 32.748779] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp
[ 32.660206] ================================================================== [ 32.660462] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 [ 32.660567] Read of size 1 at addr fff00000c99f7010 by task kunit_try_catch/290 [ 32.660684] [ 32.660755] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 32.660991] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.661088] Hardware name: linux,dummy-virt (DT) [ 32.661127] Call trace: [ 32.661175] show_stack+0x20/0x38 (C) [ 32.661249] dump_stack_lvl+0x8c/0xd0 [ 32.661395] print_report+0x118/0x5d0 [ 32.661464] kasan_report+0xdc/0x128 [ 32.662165] kunit_try_run_case+0x170/0x3f0 [ 32.663687] kthread+0x328/0x630 [ 32.664945] kunit_try_run_case+0x170/0x3f0 [ 32.665081] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.665175] kthread+0x328/0x630 [ 32.665587] The buggy address is located 16 bytes inside of [ 32.665587] freed 32-byte region [fff00000c99f7000, fff00000c99f7020) [ 32.666958] fff00000c99f6f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.670451] Hardware name: linux,dummy-virt (DT) [ 32.670907] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.672186] kthread+0x328/0x630 [ 32.672221] ret_from_fork+0x10/0x20 [ 32.672313] [ 32.672348] Freed by task 290: [ 32.672580] __kasan_slab_free+0x6c/0x98 [ 32.673226] [ 32.673575] [ 32.674389] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 32.676550] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[ 32.642611] ================================================================== [ 32.642919] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 32.643048] Read of size 1 at addr fff00000c9acbe58 by task kunit_try_catch/288 [ 32.643107] [ 32.643181] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 32.643280] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.643521] Hardware name: linux,dummy-virt (DT) [ 32.643592] Call trace: [ 32.643885] show_stack+0x20/0x38 (C) [ 32.643969] dump_stack_lvl+0x8c/0xd0 [ 32.644105] print_report+0x118/0x5d0 [ 32.644160] kasan_report+0xdc/0x128 [ 32.644205] __asan_report_load1_noabort+0x20/0x30 [ 32.644468] memcmp+0x198/0x1d8 [ 32.644550] kasan_memcmp+0x16c/0x300 [ 32.644610] kunit_try_run_case+0x170/0x3f0 [ 32.644709] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.644795] kthread+0x328/0x630 [ 32.645001] ret_from_fork+0x10/0x20 [ 32.645084] [ 32.645125] Allocated by task 288: [ 32.645160] kasan_save_stack+0x3c/0x68 [ 32.645206] kasan_save_track+0x20/0x40 [ 32.645341] kasan_save_alloc_info+0x40/0x58 [ 32.645476] __kasan_kmalloc+0xd4/0xd8 [ 32.645601] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.645649] kasan_memcmp+0xbc/0x300 [ 32.645690] kunit_try_run_case+0x170/0x3f0 [ 32.646032] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.646118] kthread+0x328/0x630 [ 32.646267] ret_from_fork+0x10/0x20 [ 32.646379] [ 32.646471] The buggy address belongs to the object at fff00000c9acbe40 [ 32.646471] which belongs to the cache kmalloc-32 of size 32 [ 32.646553] The buggy address is located 0 bytes to the right of [ 32.646553] allocated 24-byte region [fff00000c9acbe40, fff00000c9acbe58) [ 32.646731] [ 32.646798] The buggy address belongs to the physical page: [ 32.646835] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109acb [ 32.646925] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.647049] page_type: f5(slab) [ 32.647137] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 32.647282] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 32.647359] page dumped because: kasan: bad access detected [ 32.647606] [ 32.647780] Memory state around the buggy address: [ 32.647860] fff00000c9acbd00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 32.647944] fff00000c9acbd80: 00 00 00 fc fc fc fc fc 00 00 00 04 fc fc fc fc [ 32.648215] >fff00000c9acbe00: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 32.648283] ^ [ 32.648421] fff00000c9acbe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.648505] fff00000c9acbf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.648590] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[ 32.621018] ================================================================== [ 32.621082] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340 [ 32.621166] Read of size 1 at addr ffff800080b27b4a by task kunit_try_catch/284 [ 32.621220] [ 32.621260] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 32.622269] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.622373] Hardware name: linux,dummy-virt (DT) [ 32.622420] Call trace: [ 32.622502] show_stack+0x20/0x38 (C) [ 32.622601] dump_stack_lvl+0x8c/0xd0 [ 32.622883] print_report+0x310/0x5d0 [ 32.622944] kasan_report+0xdc/0x128 [ 32.622995] __asan_report_load1_noabort+0x20/0x30 [ 32.623171] kasan_alloca_oob_right+0x2dc/0x340 [ 32.623340] kunit_try_run_case+0x170/0x3f0 [ 32.623435] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.623526] kthread+0x328/0x630 [ 32.623667] ret_from_fork+0x10/0x20 [ 32.623774] [ 32.623884] The buggy address belongs to stack of task kunit_try_catch/284 [ 32.623974] [ 32.624021] The buggy address ffff800080b27b4a belongs to a vmalloc virtual mapping [ 32.624205] The buggy address belongs to the physical page: [ 32.624248] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a5e [ 32.624384] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.624511] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 32.624671] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.624782] page dumped because: kasan: bad access detected [ 32.624863] [ 32.624913] Memory state around the buggy address: [ 32.625017] ffff800080b27a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.625064] ffff800080b27a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.625134] >ffff800080b27b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 32.625317] ^ [ 32.625430] ffff800080b27b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 32.625507] ffff800080b27c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 32.625574] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[ 32.609890] ================================================================== [ 32.610094] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 32.610172] Read of size 1 at addr ffff800080b47b5f by task kunit_try_catch/282 [ 32.610226] [ 32.610441] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 32.610640] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.610701] Hardware name: linux,dummy-virt (DT) [ 32.610807] Call trace: [ 32.610855] show_stack+0x20/0x38 (C) [ 32.610951] dump_stack_lvl+0x8c/0xd0 [ 32.611060] print_report+0x310/0x5d0 [ 32.611300] kasan_report+0xdc/0x128 [ 32.611369] __asan_report_load1_noabort+0x20/0x30 [ 32.611814] kasan_alloca_oob_left+0x2b8/0x310 [ 32.611900] kunit_try_run_case+0x170/0x3f0 [ 32.612044] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.612160] kthread+0x328/0x630 [ 32.612293] ret_from_fork+0x10/0x20 [ 32.612403] [ 32.612458] The buggy address belongs to stack of task kunit_try_catch/282 [ 32.612712] [ 32.612744] The buggy address ffff800080b47b5f belongs to a vmalloc virtual mapping [ 32.612824] The buggy address belongs to the physical page: [ 32.612945] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ad7 [ 32.613381] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.613513] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 32.613679] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.613775] page dumped because: kasan: bad access detected [ 32.613844] [ 32.613894] Memory state around the buggy address: [ 32.613961] ffff800080b47a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.614008] ffff800080b47a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.614062] >ffff800080b47b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 32.614111] ^ [ 32.614160] ffff800080b47b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 32.614214] ffff800080b47c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 32.614254] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 32.595252] ================================================================== [ 32.595500] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 32.595725] Read of size 1 at addr ffff800080b47c2a by task kunit_try_catch/280 [ 32.595788] [ 32.595849] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 32.595948] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.595976] Hardware name: linux,dummy-virt (DT) [ 32.596011] Call trace: [ 32.596040] show_stack+0x20/0x38 (C) [ 32.596150] dump_stack_lvl+0x8c/0xd0 [ 32.596206] print_report+0x310/0x5d0 [ 32.596250] kasan_report+0xdc/0x128 [ 32.596295] __asan_report_load1_noabort+0x20/0x30 [ 32.596538] kasan_stack_oob+0x238/0x270 [ 32.596669] kunit_try_run_case+0x170/0x3f0 [ 32.596757] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.596812] kthread+0x328/0x630 [ 32.596924] ret_from_fork+0x10/0x20 [ 32.596979] [ 32.597141] The buggy address belongs to stack of task kunit_try_catch/280 [ 32.597510] and is located at offset 138 in frame: [ 32.597605] kasan_stack_oob+0x0/0x270 [ 32.597970] [ 32.598014] This frame has 4 objects: [ 32.598472] [48, 49) '__assertion' [ 32.598671] [64, 72) 'array' [ 32.598742] [96, 112) '__assertion' [ 32.598989] [128, 138) 'stack_array' [ 32.599275] [ 32.599318] The buggy address ffff800080b47c2a belongs to a vmalloc virtual mapping [ 32.599569] The buggy address belongs to the physical page: [ 32.599635] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ad7 [ 32.599785] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.599868] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 32.599997] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.600087] page dumped because: kasan: bad access detected [ 32.600167] [ 32.600193] Memory state around the buggy address: [ 32.600616] ffff800080b47b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.600671] ffff800080b47b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 32.600749] >ffff800080b47c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 32.600829] ^ [ 32.600954] ffff800080b47c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 [ 32.601005] ffff800080b47d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 32.601242] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 32.563951] ================================================================== [ 32.564062] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 32.564199] Read of size 1 at addr ffff93639574d6cd by task kunit_try_catch/276 [ 32.564422] [ 32.564661] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 32.564761] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.564788] Hardware name: linux,dummy-virt (DT) [ 32.564869] Call trace: [ 32.564896] show_stack+0x20/0x38 (C) [ 32.564981] dump_stack_lvl+0x8c/0xd0 [ 32.565253] print_report+0x310/0x5d0 [ 32.565335] kasan_report+0xdc/0x128 [ 32.566150] __asan_report_load1_noabort+0x20/0x30 [ 32.566253] kasan_global_oob_right+0x230/0x270 [ 32.566404] kunit_try_run_case+0x170/0x3f0 [ 32.566548] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.566606] kthread+0x328/0x630 [ 32.566653] ret_from_fork+0x10/0x20 [ 32.567148] [ 32.567553] The buggy address belongs to the variable: [ 32.567731] global_array+0xd/0x40 [ 32.568238] [ 32.568402] The buggy address ffff93639574d6cd belongs to a vmalloc virtual mapping [ 32.568619] The buggy address belongs to the physical page: [ 32.568865] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47d4d [ 32.569353] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 32.569544] raw: 03fffe0000002000 ffffc1ffc01f5348 ffffc1ffc01f5348 0000000000000000 [ 32.569631] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.569729] page dumped because: kasan: bad access detected [ 32.569781] [ 32.569830] Memory state around the buggy address: [ 32.569938] ffff93639574d580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.570024] ffff93639574d600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.570139] >ffff93639574d680: 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 [ 32.570200] ^ [ 32.570240] ffff93639574d700: 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 [ 32.570549] ffff93639574d780: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00 [ 32.570610] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 32.543440] ================================================================== [ 32.543755] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 32.543860] Free of addr fff00000c9b68001 by task kunit_try_catch/274 [ 32.543906] [ 32.544035] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 32.544126] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.544153] Hardware name: linux,dummy-virt (DT) [ 32.544317] Call trace: [ 32.544423] show_stack+0x20/0x38 (C) [ 32.544486] dump_stack_lvl+0x8c/0xd0 [ 32.544553] print_report+0x118/0x5d0 [ 32.544598] kasan_report_invalid_free+0xc0/0xe8 [ 32.544662] __kasan_mempool_poison_object+0xfc/0x150 [ 32.544715] mempool_free+0x28c/0x328 [ 32.544900] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 32.544960] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 32.545013] kunit_try_run_case+0x170/0x3f0 [ 32.545081] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.545136] kthread+0x328/0x630 [ 32.545180] ret_from_fork+0x10/0x20 [ 32.545248] [ 32.545291] The buggy address belongs to the physical page: [ 32.545334] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b68 [ 32.545433] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.545485] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.545694] page_type: f8(unknown) [ 32.545788] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.545909] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.545994] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.546042] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.546131] head: 0bfffe0000000002 ffffc1ffc326da01 00000000ffffffff 00000000ffffffff [ 32.546254] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.546388] page dumped because: kasan: bad access detected [ 32.546470] [ 32.546518] Memory state around the buggy address: [ 32.546552] fff00000c9b67f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.546832] fff00000c9b67f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.546924] >fff00000c9b68000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.547012] ^ [ 32.547077] fff00000c9b68080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.547117] fff00000c9b68100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.547213] ================================================================== [ 32.532365] ================================================================== [ 32.532558] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 32.532651] Free of addr fff00000c91a7101 by task kunit_try_catch/272 [ 32.532703] [ 32.532742] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 32.532830] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.532867] Hardware name: linux,dummy-virt (DT) [ 32.532908] Call trace: [ 32.532932] show_stack+0x20/0x38 (C) [ 32.532984] dump_stack_lvl+0x8c/0xd0 [ 32.533031] print_report+0x118/0x5d0 [ 32.533092] kasan_report_invalid_free+0xc0/0xe8 [ 32.533139] check_slab_allocation+0xfc/0x108 [ 32.533198] __kasan_mempool_poison_object+0x78/0x150 [ 32.533251] mempool_free+0x28c/0x328 [ 32.533297] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 32.533598] mempool_kmalloc_invalid_free+0xc0/0x118 [ 32.534117] kunit_try_run_case+0x170/0x3f0 [ 32.534219] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.534284] kthread+0x328/0x630 [ 32.534343] ret_from_fork+0x10/0x20 [ 32.534393] [ 32.534411] Allocated by task 272: [ 32.534442] kasan_save_stack+0x3c/0x68 [ 32.534485] kasan_save_track+0x20/0x40 [ 32.534525] kasan_save_alloc_info+0x40/0x58 [ 32.534563] __kasan_mempool_unpoison_object+0x11c/0x180 [ 32.534828] remove_element+0x130/0x1f8 [ 32.534906] mempool_alloc_preallocated+0x58/0xc0 [ 32.534979] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 32.535053] mempool_kmalloc_invalid_free+0xc0/0x118 [ 32.535105] kunit_try_run_case+0x170/0x3f0 [ 32.535174] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.535255] kthread+0x328/0x630 [ 32.535319] ret_from_fork+0x10/0x20 [ 32.535416] [ 32.535487] The buggy address belongs to the object at fff00000c91a7100 [ 32.535487] which belongs to the cache kmalloc-128 of size 128 [ 32.535575] The buggy address is located 1 bytes inside of [ 32.535575] 128-byte region [fff00000c91a7100, fff00000c91a7180) [ 32.535656] [ 32.535676] The buggy address belongs to the physical page: [ 32.535911] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091a7 [ 32.536019] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.536108] page_type: f5(slab) [ 32.536169] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.536254] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.536336] page dumped because: kasan: bad access detected [ 32.536713] [ 32.536753] Memory state around the buggy address: [ 32.536805] fff00000c91a7000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.536849] fff00000c91a7080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.537067] >fff00000c91a7100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.537220] ^ [ 32.537294] fff00000c91a7180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.537441] fff00000c91a7200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.537525] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 32.506805] ================================================================== [ 32.507177] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 32.507285] Free of addr fff00000c9b68000 by task kunit_try_catch/268 [ 32.507345] [ 32.507403] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 32.507492] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.507518] Hardware name: linux,dummy-virt (DT) [ 32.507560] Call trace: [ 32.507586] show_stack+0x20/0x38 (C) [ 32.507657] dump_stack_lvl+0x8c/0xd0 [ 32.507705] print_report+0x118/0x5d0 [ 32.507750] kasan_report_invalid_free+0xc0/0xe8 [ 32.507993] __kasan_mempool_poison_object+0x14c/0x150 [ 32.508056] mempool_free+0x28c/0x328 [ 32.508109] mempool_double_free_helper+0x150/0x2e8 [ 32.508179] mempool_kmalloc_large_double_free+0xc0/0x118 [ 32.508232] kunit_try_run_case+0x170/0x3f0 [ 32.508297] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.508361] kthread+0x328/0x630 [ 32.508404] ret_from_fork+0x10/0x20 [ 32.508614] [ 32.508702] The buggy address belongs to the physical page: [ 32.508753] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b68 [ 32.508828] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.508879] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.508941] page_type: f8(unknown) [ 32.509018] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.509083] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.509164] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.509217] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.509266] head: 0bfffe0000000002 ffffc1ffc326da01 00000000ffffffff 00000000ffffffff [ 32.509673] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.509798] page dumped because: kasan: bad access detected [ 32.509843] [ 32.509861] Memory state around the buggy address: [ 32.509897] fff00000c9b67f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.509962] fff00000c9b67f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.510006] >fff00000c9b68000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.510385] ^ [ 32.510462] fff00000c9b68080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.510541] fff00000c9b68100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.510652] ================================================================== [ 32.492990] ================================================================== [ 32.493185] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 32.493255] Free of addr fff00000c99f0d00 by task kunit_try_catch/266 [ 32.493469] [ 32.493551] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 32.493675] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.493735] Hardware name: linux,dummy-virt (DT) [ 32.493822] Call trace: [ 32.493882] show_stack+0x20/0x38 (C) [ 32.494006] dump_stack_lvl+0x8c/0xd0 [ 32.494095] print_report+0x118/0x5d0 [ 32.494152] kasan_report_invalid_free+0xc0/0xe8 [ 32.494200] check_slab_allocation+0xd4/0x108 [ 32.494413] __kasan_mempool_poison_object+0x78/0x150 [ 32.494468] mempool_free+0x28c/0x328 [ 32.494581] mempool_double_free_helper+0x150/0x2e8 [ 32.494667] mempool_kmalloc_double_free+0xc0/0x118 [ 32.494770] kunit_try_run_case+0x170/0x3f0 [ 32.494844] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.494946] kthread+0x328/0x630 [ 32.495009] ret_from_fork+0x10/0x20 [ 32.495066] [ 32.495084] Allocated by task 266: [ 32.495267] kasan_save_stack+0x3c/0x68 [ 32.495337] kasan_save_track+0x20/0x40 [ 32.495398] kasan_save_alloc_info+0x40/0x58 [ 32.495504] __kasan_mempool_unpoison_object+0x11c/0x180 [ 32.495590] remove_element+0x130/0x1f8 [ 32.495637] mempool_alloc_preallocated+0x58/0xc0 [ 32.495676] mempool_double_free_helper+0x94/0x2e8 [ 32.495902] mempool_kmalloc_double_free+0xc0/0x118 [ 32.495990] kunit_try_run_case+0x170/0x3f0 [ 32.496032] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.496305] kthread+0x328/0x630 [ 32.496429] ret_from_fork+0x10/0x20 [ 32.496517] [ 32.496597] Freed by task 266: [ 32.496637] kasan_save_stack+0x3c/0x68 [ 32.496675] kasan_save_track+0x20/0x40 [ 32.496751] kasan_save_free_info+0x4c/0x78 [ 32.496966] __kasan_mempool_poison_object+0xc0/0x150 [ 32.497084] mempool_free+0x28c/0x328 [ 32.497192] mempool_double_free_helper+0x100/0x2e8 [ 32.497271] mempool_kmalloc_double_free+0xc0/0x118 [ 32.497342] kunit_try_run_case+0x170/0x3f0 [ 32.497531] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.497714] kthread+0x328/0x630 [ 32.497855] ret_from_fork+0x10/0x20 [ 32.497913] [ 32.497956] The buggy address belongs to the object at fff00000c99f0d00 [ 32.497956] which belongs to the cache kmalloc-128 of size 128 [ 32.498062] The buggy address is located 0 bytes inside of [ 32.498062] 128-byte region [fff00000c99f0d00, fff00000c99f0d80) [ 32.498125] [ 32.498146] The buggy address belongs to the physical page: [ 32.498186] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099f0 [ 32.498503] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.498625] page_type: f5(slab) [ 32.498683] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.498781] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.498858] page dumped because: kasan: bad access detected [ 32.498957] [ 32.499019] Memory state around the buggy address: [ 32.499062] fff00000c99f0c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.499125] fff00000c99f0c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.499381] >fff00000c99f0d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.499580] ^ [ 32.499658] fff00000c99f0d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.499751] fff00000c99f0e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.499825] ================================================================== [ 32.520295] ================================================================== [ 32.520368] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 32.520458] Free of addr fff00000c9b68000 by task kunit_try_catch/270 [ 32.520502] [ 32.520540] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 32.520772] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.520941] Hardware name: linux,dummy-virt (DT) [ 32.520987] Call trace: [ 32.521081] show_stack+0x20/0x38 (C) [ 32.521149] dump_stack_lvl+0x8c/0xd0 [ 32.521198] print_report+0x118/0x5d0 [ 32.521260] kasan_report_invalid_free+0xc0/0xe8 [ 32.521520] __kasan_mempool_poison_pages+0xe0/0xe8 [ 32.521638] mempool_free+0x24c/0x328 [ 32.521769] mempool_double_free_helper+0x150/0x2e8 [ 32.521860] mempool_page_alloc_double_free+0xbc/0x118 [ 32.521964] kunit_try_run_case+0x170/0x3f0 [ 32.522056] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.522132] kthread+0x328/0x630 [ 32.522195] ret_from_fork+0x10/0x20 [ 32.522295] [ 32.522378] The buggy address belongs to the physical page: [ 32.522423] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b68 [ 32.522479] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.522570] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 32.522621] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.522705] page dumped because: kasan: bad access detected [ 32.522738] [ 32.522975] Memory state around the buggy address: [ 32.523059] fff00000c9b67f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.523134] fff00000c9b67f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.523250] >fff00000c9b68000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.523363] ^ [ 32.523477] fff00000c9b68080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.523557] fff00000c9b68100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.523633] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 32.441177] ================================================================== [ 32.441243] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 32.441314] Read of size 1 at addr fff00000c9b64000 by task kunit_try_catch/260 [ 32.441381] [ 32.441416] CPU: 0 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 32.441768] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.441803] Hardware name: linux,dummy-virt (DT) [ 32.441836] Call trace: [ 32.441861] show_stack+0x20/0x38 (C) [ 32.441964] dump_stack_lvl+0x8c/0xd0 [ 32.442128] print_report+0x118/0x5d0 [ 32.442216] kasan_report+0xdc/0x128 [ 32.442289] __asan_report_load1_noabort+0x20/0x30 [ 32.442387] mempool_uaf_helper+0x314/0x340 [ 32.442469] mempool_kmalloc_large_uaf+0xc4/0x120 [ 32.442576] kunit_try_run_case+0x170/0x3f0 [ 32.442627] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.442812] kthread+0x328/0x630 [ 32.442890] ret_from_fork+0x10/0x20 [ 32.442988] [ 32.443069] The buggy address belongs to the physical page: [ 32.443139] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b64 [ 32.443238] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.443353] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.443419] page_type: f8(unknown) [ 32.443486] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.443549] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.443743] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.443866] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.443937] head: 0bfffe0000000002 ffffc1ffc326d901 00000000ffffffff 00000000ffffffff [ 32.443986] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.444026] page dumped because: kasan: bad access detected [ 32.444235] [ 32.444329] Memory state around the buggy address: [ 32.444406] fff00000c9b63f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.444536] fff00000c9b63f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.444580] >fff00000c9b64000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.444652] ^ [ 32.444800] fff00000c9b64080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.444961] fff00000c9b64100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.445074] ================================================================== [ 32.483685] ================================================================== [ 32.483769] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 32.483857] Read of size 1 at addr fff00000c9b68000 by task kunit_try_catch/264 [ 32.484036] [ 32.484132] CPU: 0 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 32.484250] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.484302] Hardware name: linux,dummy-virt (DT) [ 32.484428] Call trace: [ 32.484477] show_stack+0x20/0x38 (C) [ 32.484552] dump_stack_lvl+0x8c/0xd0 [ 32.484634] print_report+0x118/0x5d0 [ 32.484680] kasan_report+0xdc/0x128 [ 32.484721] __asan_report_load1_noabort+0x20/0x30 [ 32.484769] mempool_uaf_helper+0x314/0x340 [ 32.484815] mempool_page_alloc_uaf+0xc0/0x118 [ 32.484911] kunit_try_run_case+0x170/0x3f0 [ 32.484979] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.485030] kthread+0x328/0x630 [ 32.485073] ret_from_fork+0x10/0x20 [ 32.485285] [ 32.485320] The buggy address belongs to the physical page: [ 32.485555] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b68 [ 32.485683] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.485787] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 32.485896] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.485984] page dumped because: kasan: bad access detected [ 32.486076] [ 32.486140] Memory state around the buggy address: [ 32.486199] fff00000c9b67f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.486269] fff00000c9b67f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.486394] >fff00000c9b68000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.486482] ^ [ 32.486540] fff00000c9b68080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.486622] fff00000c9b68100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.486672] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 32.452574] ================================================================== [ 32.452670] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 32.452756] Read of size 1 at addr fff00000c9ace240 by task kunit_try_catch/262 [ 32.452808] [ 32.452845] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 32.452949] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.452975] Hardware name: linux,dummy-virt (DT) [ 32.453027] Call trace: [ 32.453086] show_stack+0x20/0x38 (C) [ 32.453334] dump_stack_lvl+0x8c/0xd0 [ 32.453403] print_report+0x118/0x5d0 [ 32.453543] kasan_report+0xdc/0x128 [ 32.453639] __asan_report_load1_noabort+0x20/0x30 [ 32.453689] mempool_uaf_helper+0x314/0x340 [ 32.453737] mempool_slab_uaf+0xc0/0x118 [ 32.453879] kunit_try_run_case+0x170/0x3f0 [ 32.453931] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.454130] kthread+0x328/0x630 [ 32.454218] ret_from_fork+0x10/0x20 [ 32.454299] [ 32.454337] Allocated by task 262: [ 32.454367] kasan_save_stack+0x3c/0x68 [ 32.454410] kasan_save_track+0x20/0x40 [ 32.454459] kasan_save_alloc_info+0x40/0x58 [ 32.454498] __kasan_mempool_unpoison_object+0xbc/0x180 [ 32.454543] remove_element+0x16c/0x1f8 [ 32.454583] mempool_alloc_preallocated+0x58/0xc0 [ 32.454624] mempool_uaf_helper+0xa4/0x340 [ 32.454661] mempool_slab_uaf+0xc0/0x118 [ 32.454700] kunit_try_run_case+0x170/0x3f0 [ 32.454739] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.454780] kthread+0x328/0x630 [ 32.454812] ret_from_fork+0x10/0x20 [ 32.454850] [ 32.454869] Freed by task 262: [ 32.454917] kasan_save_stack+0x3c/0x68 [ 32.454967] kasan_save_track+0x20/0x40 [ 32.455011] kasan_save_free_info+0x4c/0x78 [ 32.455058] __kasan_mempool_poison_object+0xc0/0x150 [ 32.455111] mempool_free+0x28c/0x328 [ 32.455154] mempool_uaf_helper+0x104/0x340 [ 32.455200] mempool_slab_uaf+0xc0/0x118 [ 32.455237] kunit_try_run_case+0x170/0x3f0 [ 32.455286] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.455338] kthread+0x328/0x630 [ 32.455372] ret_from_fork+0x10/0x20 [ 32.455406] [ 32.455426] The buggy address belongs to the object at fff00000c9ace240 [ 32.455426] which belongs to the cache test_cache of size 123 [ 32.455486] The buggy address is located 0 bytes inside of [ 32.455486] freed 123-byte region [fff00000c9ace240, fff00000c9ace2bb) [ 32.455798] [ 32.455919] The buggy address belongs to the physical page: [ 32.455955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ace [ 32.456158] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.456245] page_type: f5(slab) [ 32.456297] raw: 0bfffe0000000000 fff00000c5d1fa00 dead000000000122 0000000000000000 [ 32.456378] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 32.456422] page dumped because: kasan: bad access detected [ 32.456665] [ 32.456719] Memory state around the buggy address: [ 32.456824] fff00000c9ace100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.456939] fff00000c9ace180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.457012] >fff00000c9ace200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 32.457068] ^ [ 32.457125] fff00000c9ace280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.457188] fff00000c9ace300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.457225] ================================================================== [ 32.429262] ================================================================== [ 32.429369] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 32.429465] Read of size 1 at addr fff00000c99f0900 by task kunit_try_catch/258 [ 32.429516] [ 32.429569] CPU: 0 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 32.429666] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.429692] Hardware name: linux,dummy-virt (DT) [ 32.429751] Call trace: [ 32.429777] show_stack+0x20/0x38 (C) [ 32.429945] dump_stack_lvl+0x8c/0xd0 [ 32.430069] print_report+0x118/0x5d0 [ 32.430157] kasan_report+0xdc/0x128 [ 32.430245] __asan_report_load1_noabort+0x20/0x30 [ 32.430342] mempool_uaf_helper+0x314/0x340 [ 32.430427] mempool_kmalloc_uaf+0xc4/0x120 [ 32.430553] kunit_try_run_case+0x170/0x3f0 [ 32.430620] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.430695] kthread+0x328/0x630 [ 32.430795] ret_from_fork+0x10/0x20 [ 32.430893] [ 32.430912] Allocated by task 258: [ 32.430943] kasan_save_stack+0x3c/0x68 [ 32.431275] kasan_save_track+0x20/0x40 [ 32.431372] kasan_save_alloc_info+0x40/0x58 [ 32.431509] __kasan_mempool_unpoison_object+0x11c/0x180 [ 32.431605] remove_element+0x130/0x1f8 [ 32.431733] mempool_alloc_preallocated+0x58/0xc0 [ 32.431833] mempool_uaf_helper+0xa4/0x340 [ 32.431928] mempool_kmalloc_uaf+0xc4/0x120 [ 32.432058] kunit_try_run_case+0x170/0x3f0 [ 32.432109] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.432152] kthread+0x328/0x630 [ 32.432481] ret_from_fork+0x10/0x20 [ 32.432580] [ 32.432706] Freed by task 258: [ 32.432757] kasan_save_stack+0x3c/0x68 [ 32.432798] kasan_save_track+0x20/0x40 [ 32.433110] kasan_save_free_info+0x4c/0x78 [ 32.433212] __kasan_mempool_poison_object+0xc0/0x150 [ 32.433349] mempool_free+0x28c/0x328 [ 32.433397] mempool_uaf_helper+0x104/0x340 [ 32.433459] mempool_kmalloc_uaf+0xc4/0x120 [ 32.433566] kunit_try_run_case+0x170/0x3f0 [ 32.433647] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.433742] kthread+0x328/0x630 [ 32.433855] ret_from_fork+0x10/0x20 [ 32.433931] [ 32.433981] The buggy address belongs to the object at fff00000c99f0900 [ 32.433981] which belongs to the cache kmalloc-128 of size 128 [ 32.434045] The buggy address is located 0 bytes inside of [ 32.434045] freed 128-byte region [fff00000c99f0900, fff00000c99f0980) [ 32.434202] [ 32.434224] The buggy address belongs to the physical page: [ 32.434258] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099f0 [ 32.434527] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.434614] page_type: f5(slab) [ 32.434688] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.434821] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.434892] page dumped because: kasan: bad access detected [ 32.434946] [ 32.435054] Memory state around the buggy address: [ 32.435124] fff00000c99f0800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.435207] fff00000c99f0880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.435249] >fff00000c99f0900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.435542] ^ [ 32.435623] fff00000c99f0980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.435779] fff00000c99f0a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.435849] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 32.364085] ================================================================== [ 32.364167] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 32.364253] Read of size 1 at addr fff00000c99f0573 by task kunit_try_catch/252 [ 32.364307] [ 32.364369] CPU: 0 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 32.364463] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.364491] Hardware name: linux,dummy-virt (DT) [ 32.364525] Call trace: [ 32.364552] show_stack+0x20/0x38 (C) [ 32.364605] dump_stack_lvl+0x8c/0xd0 [ 32.364655] print_report+0x118/0x5d0 [ 32.364699] kasan_report+0xdc/0x128 [ 32.364742] __asan_report_load1_noabort+0x20/0x30 [ 32.364791] mempool_oob_right_helper+0x2ac/0x2f0 [ 32.364840] mempool_kmalloc_oob_right+0xc4/0x120 [ 32.364889] kunit_try_run_case+0x170/0x3f0 [ 32.364941] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.364991] kthread+0x328/0x630 [ 32.365035] ret_from_fork+0x10/0x20 [ 32.365085] [ 32.365104] Allocated by task 252: [ 32.365134] kasan_save_stack+0x3c/0x68 [ 32.365179] kasan_save_track+0x20/0x40 [ 32.365220] kasan_save_alloc_info+0x40/0x58 [ 32.365260] __kasan_mempool_unpoison_object+0x11c/0x180 [ 32.365306] remove_element+0x130/0x1f8 [ 32.365358] mempool_alloc_preallocated+0x58/0xc0 [ 32.365621] mempool_oob_right_helper+0x98/0x2f0 [ 32.365672] mempool_kmalloc_oob_right+0xc4/0x120 [ 32.365712] kunit_try_run_case+0x170/0x3f0 [ 32.365751] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.365794] kthread+0x328/0x630 [ 32.365828] ret_from_fork+0x10/0x20 [ 32.365864] [ 32.365885] The buggy address belongs to the object at fff00000c99f0500 [ 32.365885] which belongs to the cache kmalloc-128 of size 128 [ 32.365945] The buggy address is located 0 bytes to the right of [ 32.365945] allocated 115-byte region [fff00000c99f0500, fff00000c99f0573) [ 32.366009] [ 32.366030] The buggy address belongs to the physical page: [ 32.366065] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099f0 [ 32.366124] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.366177] page_type: f5(slab) [ 32.366221] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.366270] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.366312] page dumped because: kasan: bad access detected [ 32.366360] [ 32.366378] Memory state around the buggy address: [ 32.366415] fff00000c99f0400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.366459] fff00000c99f0480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.366503] >fff00000c99f0500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.366539] ^ [ 32.366580] fff00000c99f0580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.366620] fff00000c99f0600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.366659] ================================================================== [ 32.388103] ================================================================== [ 32.388174] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 32.388236] Read of size 1 at addr fff00000c9ad12bb by task kunit_try_catch/256 [ 32.388288] [ 32.388343] CPU: 0 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 32.388431] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.388457] Hardware name: linux,dummy-virt (DT) [ 32.388487] Call trace: [ 32.388512] show_stack+0x20/0x38 (C) [ 32.388561] dump_stack_lvl+0x8c/0xd0 [ 32.388608] print_report+0x118/0x5d0 [ 32.388650] kasan_report+0xdc/0x128 [ 32.388694] __asan_report_load1_noabort+0x20/0x30 [ 32.388743] mempool_oob_right_helper+0x2ac/0x2f0 [ 32.388791] mempool_slab_oob_right+0xc0/0x118 [ 32.388838] kunit_try_run_case+0x170/0x3f0 [ 32.388888] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.388936] kthread+0x328/0x630 [ 32.388979] ret_from_fork+0x10/0x20 [ 32.389025] [ 32.389044] Allocated by task 256: [ 32.389076] kasan_save_stack+0x3c/0x68 [ 32.389118] kasan_save_track+0x20/0x40 [ 32.389155] kasan_save_alloc_info+0x40/0x58 [ 32.389193] __kasan_mempool_unpoison_object+0xbc/0x180 [ 32.389237] remove_element+0x16c/0x1f8 [ 32.389277] mempool_alloc_preallocated+0x58/0xc0 [ 32.389317] mempool_oob_right_helper+0x98/0x2f0 [ 32.389396] mempool_slab_oob_right+0xc0/0x118 [ 32.389508] kunit_try_run_case+0x170/0x3f0 [ 32.389548] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.389589] kthread+0x328/0x630 [ 32.389622] ret_from_fork+0x10/0x20 [ 32.389668] [ 32.389689] The buggy address belongs to the object at fff00000c9ad1240 [ 32.389689] which belongs to the cache test_cache of size 123 [ 32.389749] The buggy address is located 0 bytes to the right of [ 32.389749] allocated 123-byte region [fff00000c9ad1240, fff00000c9ad12bb) [ 32.389961] [ 32.389985] The buggy address belongs to the physical page: [ 32.390031] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ad1 [ 32.390239] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.390422] page_type: f5(slab) [ 32.390482] raw: 0bfffe0000000000 fff00000c5d1f8c0 dead000000000122 0000000000000000 [ 32.390531] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 32.390573] page dumped because: kasan: bad access detected [ 32.390614] [ 32.390632] Memory state around the buggy address: [ 32.390664] fff00000c9ad1180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.390777] fff00000c9ad1200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 32.390822] >fff00000c9ad1280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 32.390912] ^ [ 32.390945] fff00000c9ad1300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.391084] fff00000c9ad1380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.391123] ================================================================== [ 32.376400] ================================================================== [ 32.376478] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 32.376544] Read of size 1 at addr fff00000c9b66001 by task kunit_try_catch/254 [ 32.376595] [ 32.376633] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 32.376831] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.377111] Hardware name: linux,dummy-virt (DT) [ 32.377150] Call trace: [ 32.377182] show_stack+0x20/0x38 (C) [ 32.377284] dump_stack_lvl+0x8c/0xd0 [ 32.377350] print_report+0x118/0x5d0 [ 32.377396] kasan_report+0xdc/0x128 [ 32.377438] __asan_report_load1_noabort+0x20/0x30 [ 32.377493] mempool_oob_right_helper+0x2ac/0x2f0 [ 32.377603] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 32.377767] kunit_try_run_case+0x170/0x3f0 [ 32.377843] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.377893] kthread+0x328/0x630 [ 32.377943] ret_from_fork+0x10/0x20 [ 32.378160] [ 32.378211] The buggy address belongs to the physical page: [ 32.378269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b64 [ 32.378336] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.378386] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.378442] page_type: f8(unknown) [ 32.378486] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.378988] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.379107] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.379226] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.379292] head: 0bfffe0000000002 ffffc1ffc326d901 00000000ffffffff 00000000ffffffff [ 32.379350] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.379391] page dumped because: kasan: bad access detected [ 32.379437] [ 32.379456] Memory state around the buggy address: [ 32.379490] fff00000c9b65f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.379775] fff00000c9b65f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.379861] >fff00000c9b66000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.379899] ^ [ 32.379954] fff00000c9b66080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.380046] fff00000c9b66100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.380085] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 31.775311] ================================================================== [ 31.775426] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300 [ 31.775509] Read of size 1 at addr fff00000c3e188c0 by task kunit_try_catch/246 [ 31.775562] [ 31.775608] CPU: 1 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 31.775700] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.776482] Hardware name: linux,dummy-virt (DT) [ 31.776537] Call trace: [ 31.776581] show_stack+0x20/0x38 (C) [ 31.776701] dump_stack_lvl+0x8c/0xd0 [ 31.776917] print_report+0x118/0x5d0 [ 31.777353] kasan_report+0xdc/0x128 [ 31.777550] __kasan_check_byte+0x54/0x70 [ 31.778009] kmem_cache_destroy+0x34/0x218 [ 31.778194] kmem_cache_double_destroy+0x174/0x300 [ 31.778354] kunit_try_run_case+0x170/0x3f0 [ 31.778415] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.778790] kthread+0x328/0x630 [ 31.779059] ret_from_fork+0x10/0x20 [ 31.779115] [ 31.779135] Allocated by task 246: [ 31.779539] kasan_save_stack+0x3c/0x68 [ 31.779595] kasan_save_track+0x20/0x40 [ 31.780071] kasan_save_alloc_info+0x40/0x58 [ 31.780113] __kasan_slab_alloc+0xa8/0xb0 [ 31.780555] kmem_cache_alloc_noprof+0x10c/0x398 [ 31.780860] __kmem_cache_create_args+0x178/0x280 [ 31.780907] kmem_cache_double_destroy+0xc0/0x300 [ 31.780950] kunit_try_run_case+0x170/0x3f0 [ 31.781694] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.781821] kthread+0x328/0x630 [ 31.781939] ret_from_fork+0x10/0x20 [ 31.782113] [ 31.782140] Freed by task 246: [ 31.782168] kasan_save_stack+0x3c/0x68 [ 31.782213] kasan_save_track+0x20/0x40 [ 31.782306] kasan_save_free_info+0x4c/0x78 [ 31.782435] __kasan_slab_free+0x6c/0x98 [ 31.782549] kmem_cache_free+0x260/0x468 [ 31.782787] slab_kmem_cache_release+0x38/0x50 [ 31.782828] kmem_cache_release+0x1c/0x30 [ 31.782870] kobject_put+0x17c/0x420 [ 31.782908] sysfs_slab_release+0x1c/0x30 [ 31.782950] kmem_cache_destroy+0x118/0x218 [ 31.782989] kmem_cache_double_destroy+0x128/0x300 [ 31.783209] kunit_try_run_case+0x170/0x3f0 [ 31.783256] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.783679] kthread+0x328/0x630 [ 31.783735] ret_from_fork+0x10/0x20 [ 31.783855] [ 31.784122] The buggy address belongs to the object at fff00000c3e188c0 [ 31.784122] which belongs to the cache kmem_cache of size 208 [ 31.784239] The buggy address is located 0 bytes inside of [ 31.784239] freed 208-byte region [fff00000c3e188c0, fff00000c3e18990) [ 31.784682] [ 31.784738] The buggy address belongs to the physical page: [ 31.784774] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103e18 [ 31.785190] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.785346] page_type: f5(slab) [ 31.785452] raw: 0bfffe0000000000 fff00000c0001000 dead000000000100 dead000000000122 [ 31.785523] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000 [ 31.785575] page dumped because: kasan: bad access detected [ 31.785683] [ 31.785704] Memory state around the buggy address: [ 31.785905] fff00000c3e18780: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.785994] fff00000c3e18800: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 31.786105] >fff00000c3e18880: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 31.786147] ^ [ 31.786558] fff00000c3e18900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.786675] fff00000c3e18980: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.786920] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 31.574754] ================================================================== [ 31.575311] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468 [ 31.576268] Read of size 1 at addr fff00000c9ad8000 by task kunit_try_catch/244 [ 31.576334] [ 31.576381] CPU: 1 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 31.576606] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.576657] Hardware name: linux,dummy-virt (DT) [ 31.577268] Call trace: [ 31.577299] show_stack+0x20/0x38 (C) [ 31.577368] dump_stack_lvl+0x8c/0xd0 [ 31.578058] print_report+0x118/0x5d0 [ 31.578110] kasan_report+0xdc/0x128 [ 31.578258] __asan_report_load1_noabort+0x20/0x30 [ 31.578346] kmem_cache_rcu_uaf+0x388/0x468 [ 31.578860] kunit_try_run_case+0x170/0x3f0 [ 31.579283] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.579489] kthread+0x328/0x630 [ 31.580552] ret_from_fork+0x10/0x20 [ 31.580670] [ 31.580691] Allocated by task 244: [ 31.580725] kasan_save_stack+0x3c/0x68 [ 31.581439] kasan_save_track+0x20/0x40 [ 31.581491] kasan_save_alloc_info+0x40/0x58 [ 31.581797] __kasan_slab_alloc+0xa8/0xb0 [ 31.581865] kmem_cache_alloc_noprof+0x10c/0x398 [ 31.581914] kmem_cache_rcu_uaf+0x12c/0x468 [ 31.582076] kunit_try_run_case+0x170/0x3f0 [ 31.582127] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.582180] kthread+0x328/0x630 [ 31.582228] ret_from_fork+0x10/0x20 [ 31.582319] [ 31.582490] Freed by task 0: [ 31.582700] kasan_save_stack+0x3c/0x68 [ 31.582977] kasan_save_track+0x20/0x40 [ 31.583217] kasan_save_free_info+0x4c/0x78 [ 31.583444] __kasan_slab_free+0x6c/0x98 [ 31.583588] slab_free_after_rcu_debug+0xd4/0x2f8 [ 31.583631] rcu_core+0x9f4/0x1e20 [ 31.583671] rcu_core_si+0x18/0x30 [ 31.583708] handle_softirqs+0x374/0xb28 [ 31.583746] __do_softirq+0x1c/0x28 [ 31.584134] [ 31.584180] Last potentially related work creation: [ 31.584209] kasan_save_stack+0x3c/0x68 [ 31.584457] kasan_record_aux_stack+0xb4/0xc8 [ 31.584502] kmem_cache_free+0x120/0x468 [ 31.584901] kmem_cache_rcu_uaf+0x16c/0x468 [ 31.585088] kunit_try_run_case+0x170/0x3f0 [ 31.585131] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.585263] kthread+0x328/0x630 [ 31.585303] ret_from_fork+0x10/0x20 [ 31.585391] [ 31.585540] The buggy address belongs to the object at fff00000c9ad8000 [ 31.585540] which belongs to the cache test_cache of size 200 [ 31.585682] The buggy address is located 0 bytes inside of [ 31.585682] freed 200-byte region [fff00000c9ad8000, fff00000c9ad80c8) [ 31.585940] [ 31.586143] The buggy address belongs to the physical page: [ 31.586269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ad8 [ 31.586750] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.587087] page_type: f5(slab) [ 31.587146] raw: 0bfffe0000000000 fff00000c3e18780 dead000000000122 0000000000000000 [ 31.587199] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 31.587392] page dumped because: kasan: bad access detected [ 31.587428] [ 31.587462] Memory state around the buggy address: [ 31.587497] fff00000c9ad7f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.587549] fff00000c9ad7f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.587592] >fff00000c9ad8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.587630] ^ [ 31.587658] fff00000c9ad8080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 31.587700] fff00000c9ad8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.588146] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 31.053386] ================================================================== [ 31.053531] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 31.053614] Free of addr fff00000c99ff001 by task kunit_try_catch/242 [ 31.053660] [ 31.053704] CPU: 1 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 31.054218] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.054256] Hardware name: linux,dummy-virt (DT) [ 31.054607] Call trace: [ 31.054689] show_stack+0x20/0x38 (C) [ 31.055041] dump_stack_lvl+0x8c/0xd0 [ 31.055112] print_report+0x118/0x5d0 [ 31.055545] kasan_report_invalid_free+0xc0/0xe8 [ 31.055607] check_slab_allocation+0xfc/0x108 [ 31.055670] __kasan_slab_pre_free+0x2c/0x48 [ 31.055721] kmem_cache_free+0xf0/0x468 [ 31.055771] kmem_cache_invalid_free+0x184/0x3c8 [ 31.055822] kunit_try_run_case+0x170/0x3f0 [ 31.056385] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.056446] kthread+0x328/0x630 [ 31.056957] ret_from_fork+0x10/0x20 [ 31.057015] [ 31.057036] Allocated by task 242: [ 31.057075] kasan_save_stack+0x3c/0x68 [ 31.057120] kasan_save_track+0x20/0x40 [ 31.057589] kasan_save_alloc_info+0x40/0x58 [ 31.057851] __kasan_slab_alloc+0xa8/0xb0 [ 31.057999] kmem_cache_alloc_noprof+0x10c/0x398 [ 31.058386] kmem_cache_invalid_free+0x12c/0x3c8 [ 31.058567] kunit_try_run_case+0x170/0x3f0 [ 31.058620] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.058864] kthread+0x328/0x630 [ 31.059285] ret_from_fork+0x10/0x20 [ 31.059361] [ 31.059382] The buggy address belongs to the object at fff00000c99ff000 [ 31.059382] which belongs to the cache test_cache of size 200 [ 31.059445] The buggy address is located 1 bytes inside of [ 31.059445] 200-byte region [fff00000c99ff000, fff00000c99ff0c8) [ 31.060050] [ 31.060088] The buggy address belongs to the physical page: [ 31.060203] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1099ff [ 31.060462] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.060922] page_type: f5(slab) [ 31.061042] raw: 0bfffe0000000000 fff00000c3e18640 dead000000000122 0000000000000000 [ 31.061418] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 31.061502] page dumped because: kasan: bad access detected [ 31.061698] [ 31.061722] Memory state around the buggy address: [ 31.061758] fff00000c99fef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.061804] fff00000c99fef80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.061848] >fff00000c99ff000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.062359] ^ [ 31.062435] fff00000c99ff080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 31.062814] fff00000c99ff100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.062862] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 30.982789] ================================================================== [ 30.982883] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 30.982962] Free of addr fff00000c9a00000 by task kunit_try_catch/240 [ 30.983006] [ 30.983054] CPU: 1 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.983235] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.983553] Hardware name: linux,dummy-virt (DT) [ 30.984034] Call trace: [ 30.984075] show_stack+0x20/0x38 (C) [ 30.984517] dump_stack_lvl+0x8c/0xd0 [ 30.984578] print_report+0x118/0x5d0 [ 30.984972] kasan_report_invalid_free+0xc0/0xe8 [ 30.985056] check_slab_allocation+0xd4/0x108 [ 30.985222] __kasan_slab_pre_free+0x2c/0x48 [ 30.985608] kmem_cache_free+0xf0/0x468 [ 30.985750] kmem_cache_double_free+0x190/0x3c8 [ 30.985807] kunit_try_run_case+0x170/0x3f0 [ 30.985861] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.985914] kthread+0x328/0x630 [ 30.985959] ret_from_fork+0x10/0x20 [ 30.986703] [ 30.986727] Allocated by task 240: [ 30.986764] kasan_save_stack+0x3c/0x68 [ 30.986990] kasan_save_track+0x20/0x40 [ 30.987182] kasan_save_alloc_info+0x40/0x58 [ 30.987453] __kasan_slab_alloc+0xa8/0xb0 [ 30.987496] kmem_cache_alloc_noprof+0x10c/0x398 [ 30.987538] kmem_cache_double_free+0x12c/0x3c8 [ 30.987582] kunit_try_run_case+0x170/0x3f0 [ 30.988254] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.988372] kthread+0x328/0x630 [ 30.988469] ret_from_fork+0x10/0x20 [ 30.988742] [ 30.988765] Freed by task 240: [ 30.989035] kasan_save_stack+0x3c/0x68 [ 30.989083] kasan_save_track+0x20/0x40 [ 30.989504] kasan_save_free_info+0x4c/0x78 [ 30.989665] __kasan_slab_free+0x6c/0x98 [ 30.989753] kmem_cache_free+0x260/0x468 [ 30.990038] kmem_cache_double_free+0x140/0x3c8 [ 30.990088] kunit_try_run_case+0x170/0x3f0 [ 30.990232] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.990282] kthread+0x328/0x630 [ 30.990494] ret_from_fork+0x10/0x20 [ 30.990716] [ 30.990737] The buggy address belongs to the object at fff00000c9a00000 [ 30.990737] which belongs to the cache test_cache of size 200 [ 30.991160] The buggy address is located 0 bytes inside of [ 30.991160] 200-byte region [fff00000c9a00000, fff00000c9a000c8) [ 30.991238] [ 30.991264] The buggy address belongs to the physical page: [ 30.991536] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a00 [ 30.991863] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.991926] page_type: f5(slab) [ 30.991979] raw: 0bfffe0000000000 fff00000c3e18500 dead000000000122 0000000000000000 [ 30.992031] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 30.992074] page dumped because: kasan: bad access detected [ 30.992107] [ 30.992124] Memory state around the buggy address: [ 30.992157] fff00000c99fff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.992200] fff00000c99fff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.993257] >fff00000c9a00000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.993412] ^ [ 30.993463] fff00000c9a00080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 30.993698] fff00000c9a00100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.993901] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 30.864154] ================================================================== [ 30.864344] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430 [ 30.864416] Read of size 1 at addr fff00000c9a000c8 by task kunit_try_catch/238 [ 30.864482] [ 30.864521] CPU: 1 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.864619] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.864648] Hardware name: linux,dummy-virt (DT) [ 30.864683] Call trace: [ 30.864716] show_stack+0x20/0x38 (C) [ 30.864769] dump_stack_lvl+0x8c/0xd0 [ 30.864816] print_report+0x118/0x5d0 [ 30.864860] kasan_report+0xdc/0x128 [ 30.864910] __asan_report_load1_noabort+0x20/0x30 [ 30.864967] kmem_cache_oob+0x344/0x430 [ 30.865017] kunit_try_run_case+0x170/0x3f0 [ 30.865069] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.865133] kthread+0x328/0x630 [ 30.865177] ret_from_fork+0x10/0x20 [ 30.865228] [ 30.865246] Allocated by task 238: [ 30.865276] kasan_save_stack+0x3c/0x68 [ 30.865330] kasan_save_track+0x20/0x40 [ 30.865370] kasan_save_alloc_info+0x40/0x58 [ 30.865410] __kasan_slab_alloc+0xa8/0xb0 [ 30.865450] kmem_cache_alloc_noprof+0x10c/0x398 [ 30.865496] kmem_cache_oob+0x12c/0x430 [ 30.865534] kunit_try_run_case+0x170/0x3f0 [ 30.865598] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.865666] kthread+0x328/0x630 [ 30.865700] ret_from_fork+0x10/0x20 [ 30.865737] [ 30.865756] The buggy address belongs to the object at fff00000c9a00000 [ 30.865756] which belongs to the cache test_cache of size 200 [ 30.865825] The buggy address is located 0 bytes to the right of [ 30.865825] allocated 200-byte region [fff00000c9a00000, fff00000c9a000c8) [ 30.865902] [ 30.865923] The buggy address belongs to the physical page: [ 30.865974] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a00 [ 30.866066] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.866135] page_type: f5(slab) [ 30.866177] raw: 0bfffe0000000000 fff00000c3e183c0 dead000000000122 0000000000000000 [ 30.866235] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 30.866282] page dumped because: kasan: bad access detected [ 30.866316] [ 30.866345] Memory state around the buggy address: [ 30.866379] fff00000c99fff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.866463] fff00000c9a00000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.866528] >fff00000c9a00080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 30.866628] ^ [ 30.866730] fff00000c9a00100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.866824] fff00000c9a00180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.866920] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 30.844460] ================================================================== [ 30.844540] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 30.844609] Read of size 8 at addr fff00000c9a4d880 by task kunit_try_catch/231 [ 30.844678] [ 30.844719] CPU: 1 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.845069] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.845144] Hardware name: linux,dummy-virt (DT) [ 30.845186] Call trace: [ 30.845213] show_stack+0x20/0x38 (C) [ 30.845281] dump_stack_lvl+0x8c/0xd0 [ 30.845369] print_report+0x118/0x5d0 [ 30.845453] kasan_report+0xdc/0x128 [ 30.845526] __asan_report_load8_noabort+0x20/0x30 [ 30.845618] workqueue_uaf+0x480/0x4a8 [ 30.845686] kunit_try_run_case+0x170/0x3f0 [ 30.845808] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.845897] kthread+0x328/0x630 [ 30.845982] ret_from_fork+0x10/0x20 [ 30.846109] [ 30.846158] Allocated by task 231: [ 30.846186] kasan_save_stack+0x3c/0x68 [ 30.846229] kasan_save_track+0x20/0x40 [ 30.847181] kasan_save_alloc_info+0x40/0x58 [ 30.847259] __kasan_kmalloc+0xd4/0xd8 [ 30.847404] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.847515] workqueue_uaf+0x13c/0x4a8 [ 30.847588] kunit_try_run_case+0x170/0x3f0 [ 30.847696] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.847740] kthread+0x328/0x630 [ 30.847772] ret_from_fork+0x10/0x20 [ 30.847817] [ 30.847896] Freed by task 52: [ 30.847974] kasan_save_stack+0x3c/0x68 [ 30.848091] kasan_save_track+0x20/0x40 [ 30.848150] kasan_save_free_info+0x4c/0x78 [ 30.848196] __kasan_slab_free+0x6c/0x98 [ 30.848235] kfree+0x214/0x3c8 [ 30.848269] workqueue_uaf_work+0x18/0x30 [ 30.848306] process_one_work+0x530/0xf98 [ 30.848355] worker_thread+0x618/0xf38 [ 30.848389] kthread+0x328/0x630 [ 30.848423] ret_from_fork+0x10/0x20 [ 30.848459] [ 30.848478] Last potentially related work creation: [ 30.848505] kasan_save_stack+0x3c/0x68 [ 30.848583] kasan_record_aux_stack+0xb4/0xc8 [ 30.848678] __queue_work+0x65c/0xfe0 [ 30.848729] queue_work_on+0xbc/0xf8 [ 30.848806] workqueue_uaf+0x210/0x4a8 [ 30.848884] kunit_try_run_case+0x170/0x3f0 [ 30.848985] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.849052] kthread+0x328/0x630 [ 30.849136] ret_from_fork+0x10/0x20 [ 30.849206] [ 30.849310] The buggy address belongs to the object at fff00000c9a4d880 [ 30.849310] which belongs to the cache kmalloc-32 of size 32 [ 30.849406] The buggy address is located 0 bytes inside of [ 30.849406] freed 32-byte region [fff00000c9a4d880, fff00000c9a4d8a0) [ 30.849496] [ 30.849517] The buggy address belongs to the physical page: [ 30.849558] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a4d [ 30.849621] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.849945] page_type: f5(slab) [ 30.849995] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 30.850053] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 30.850100] page dumped because: kasan: bad access detected [ 30.850135] [ 30.850154] Memory state around the buggy address: [ 30.850189] fff00000c9a4d780: 00 00 03 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 30.850237] fff00000c9a4d800: 00 00 00 fc fc fc fc fc 00 00 00 07 fc fc fc fc [ 30.850403] >fff00000c9a4d880: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 30.850461] ^ [ 30.850509] fff00000c9a4d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.850556] fff00000c9a4d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.850634] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[ 30.814771] ================================================================== [ 30.814950] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 30.816666] Read of size 4 at addr fff00000c9a4d680 by task swapper/1/0 [ 30.817430] [ 30.817482] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.818672] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.818705] Hardware name: linux,dummy-virt (DT) [ 30.818742] Call trace: [ 30.819006] show_stack+0x20/0x38 (C) [ 30.819897] dump_stack_lvl+0x8c/0xd0 [ 30.820655] print_report+0x118/0x5d0 [ 30.820759] kasan_report+0xdc/0x128 [ 30.820832] __asan_report_load4_noabort+0x20/0x30 [ 30.821422] rcu_uaf_reclaim+0x64/0x70 [ 30.821551] rcu_core+0x9f4/0x1e20 [ 30.821916] rcu_core_si+0x18/0x30 [ 30.822920] handle_softirqs+0x374/0xb28 [ 30.823121] __do_softirq+0x1c/0x28 [ 30.823247] ____do_softirq+0x18/0x30 [ 30.823292] call_on_irq_stack+0x24/0x30 [ 30.824177] do_softirq_own_stack+0x24/0x38 [ 30.824254] __irq_exit_rcu+0x1fc/0x318 [ 30.824301] irq_exit_rcu+0x1c/0x80 [ 30.825235] el1_interrupt+0x38/0x58 [ 30.825854] el1h_64_irq_handler+0x18/0x28 [ 30.825975] el1h_64_irq+0x6c/0x70 [ 30.826706] arch_local_irq_enable+0x4/0x8 (P) [ 30.827761] do_idle+0x384/0x4e8 [ 30.828060] cpu_startup_entry+0x64/0x80 [ 30.828636] secondary_start_kernel+0x28c/0x340 [ 30.829203] __secondary_switched+0xc0/0xc8 [ 30.829652] [ 30.830048] Allocated by task 229: [ 30.830568] kasan_save_stack+0x3c/0x68 [ 30.830891] kasan_save_track+0x20/0x40 [ 30.831217] kasan_save_alloc_info+0x40/0x58 [ 30.831567] __kasan_kmalloc+0xd4/0xd8 [ 30.831887] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.832241] rcu_uaf+0xb0/0x2d8 [ 30.832388] kunit_try_run_case+0x170/0x3f0 [ 30.832452] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.832495] kthread+0x328/0x630 [ 30.832530] ret_from_fork+0x10/0x20 [ 30.832567] [ 30.832587] Freed by task 0: [ 30.832613] kasan_save_stack+0x3c/0x68 [ 30.832653] kasan_save_track+0x20/0x40 [ 30.832690] kasan_save_free_info+0x4c/0x78 [ 30.832728] __kasan_slab_free+0x6c/0x98 [ 30.832767] kfree+0x214/0x3c8 [ 30.832804] rcu_uaf_reclaim+0x28/0x70 [ 30.832840] rcu_core+0x9f4/0x1e20 [ 30.832875] rcu_core_si+0x18/0x30 [ 30.832911] handle_softirqs+0x374/0xb28 [ 30.832948] __do_softirq+0x1c/0x28 [ 30.832983] [ 30.833018] Last potentially related work creation: [ 30.833053] kasan_save_stack+0x3c/0x68 [ 30.833094] kasan_record_aux_stack+0xb4/0xc8 [ 30.833131] __call_rcu_common.constprop.0+0x74/0x8c8 [ 30.833173] call_rcu+0x18/0x30 [ 30.833206] rcu_uaf+0x14c/0x2d8 [ 30.833241] kunit_try_run_case+0x170/0x3f0 [ 30.833281] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.833331] kthread+0x328/0x630 [ 30.833366] ret_from_fork+0x10/0x20 [ 30.833406] [ 30.833433] The buggy address belongs to the object at fff00000c9a4d680 [ 30.833433] which belongs to the cache kmalloc-32 of size 32 [ 30.833494] The buggy address is located 0 bytes inside of [ 30.833494] freed 32-byte region [fff00000c9a4d680, fff00000c9a4d6a0) [ 30.833555] [ 30.833577] The buggy address belongs to the physical page: [ 30.833623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a4d [ 30.833715] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.833819] page_type: f5(slab) [ 30.833898] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 30.833997] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 30.834086] page dumped because: kasan: bad access detected [ 30.834130] [ 30.834148] Memory state around the buggy address: [ 30.834181] fff00000c9a4d580: 00 00 00 fc fc fc fc fc 00 00 05 fc fc fc fc fc [ 30.834224] fff00000c9a4d600: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 30.834273] >fff00000c9a4d680: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 30.834311] ^ [ 30.834472] fff00000c9a4d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.834612] fff00000c9a4d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.834712] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 30.719097] ================================================================== [ 30.719297] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 30.719380] Read of size 1 at addr fff00000c91b3d00 by task kunit_try_catch/227 [ 30.719433] [ 30.719469] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.719667] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.719697] Hardware name: linux,dummy-virt (DT) [ 30.719730] Call trace: [ 30.719756] show_stack+0x20/0x38 (C) [ 30.719822] dump_stack_lvl+0x8c/0xd0 [ 30.719918] print_report+0x118/0x5d0 [ 30.719963] kasan_report+0xdc/0x128 [ 30.720022] __kasan_check_byte+0x54/0x70 [ 30.720073] ksize+0x30/0x88 [ 30.720145] ksize_uaf+0x168/0x5f8 [ 30.720189] kunit_try_run_case+0x170/0x3f0 [ 30.720257] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.721456] kthread+0x328/0x630 [ 30.721512] ret_from_fork+0x10/0x20 [ 30.721564] [ 30.721582] Allocated by task 227: [ 30.721611] kasan_save_stack+0x3c/0x68 [ 30.721654] kasan_save_track+0x20/0x40 [ 30.721692] kasan_save_alloc_info+0x40/0x58 [ 30.721730] __kasan_kmalloc+0xd4/0xd8 [ 30.721768] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.721810] ksize_uaf+0xb8/0x5f8 [ 30.721845] kunit_try_run_case+0x170/0x3f0 [ 30.721884] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.721924] kthread+0x328/0x630 [ 30.721957] ret_from_fork+0x10/0x20 [ 30.721992] [ 30.722012] Freed by task 227: [ 30.722039] kasan_save_stack+0x3c/0x68 [ 30.722077] kasan_save_track+0x20/0x40 [ 30.722115] kasan_save_free_info+0x4c/0x78 [ 30.722152] __kasan_slab_free+0x6c/0x98 [ 30.722190] kfree+0x214/0x3c8 [ 30.722225] ksize_uaf+0x11c/0x5f8 [ 30.722260] kunit_try_run_case+0x170/0x3f0 [ 30.722300] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.722396] kthread+0x328/0x630 [ 30.722454] ret_from_fork+0x10/0x20 [ 30.722500] [ 30.722519] The buggy address belongs to the object at fff00000c91b3d00 [ 30.722519] which belongs to the cache kmalloc-128 of size 128 [ 30.722584] The buggy address is located 0 bytes inside of [ 30.722584] freed 128-byte region [fff00000c91b3d00, fff00000c91b3d80) [ 30.722695] [ 30.722779] The buggy address belongs to the physical page: [ 30.722858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b3 [ 30.722913] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.722963] page_type: f5(slab) [ 30.723015] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.723073] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.723318] page dumped because: kasan: bad access detected [ 30.723362] [ 30.723380] Memory state around the buggy address: [ 30.723425] fff00000c91b3c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.723467] fff00000c91b3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.723520] >fff00000c91b3d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.723557] ^ [ 30.723591] fff00000c91b3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.723635] fff00000c91b3e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.723674] ================================================================== [ 30.724610] ================================================================== [ 30.724666] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 30.724718] Read of size 1 at addr fff00000c91b3d00 by task kunit_try_catch/227 [ 30.724767] [ 30.724797] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.724910] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.724957] Hardware name: linux,dummy-virt (DT) [ 30.725016] Call trace: [ 30.725055] show_stack+0x20/0x38 (C) [ 30.725110] dump_stack_lvl+0x8c/0xd0 [ 30.725158] print_report+0x118/0x5d0 [ 30.725200] kasan_report+0xdc/0x128 [ 30.725243] __asan_report_load1_noabort+0x20/0x30 [ 30.725291] ksize_uaf+0x598/0x5f8 [ 30.725365] kunit_try_run_case+0x170/0x3f0 [ 30.725429] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.725479] kthread+0x328/0x630 [ 30.725604] ret_from_fork+0x10/0x20 [ 30.725731] [ 30.725789] Allocated by task 227: [ 30.725831] kasan_save_stack+0x3c/0x68 [ 30.725907] kasan_save_track+0x20/0x40 [ 30.726000] kasan_save_alloc_info+0x40/0x58 [ 30.726055] __kasan_kmalloc+0xd4/0xd8 [ 30.726134] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.726188] ksize_uaf+0xb8/0x5f8 [ 30.726235] kunit_try_run_case+0x170/0x3f0 [ 30.726365] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.726446] kthread+0x328/0x630 [ 30.726506] ret_from_fork+0x10/0x20 [ 30.726629] [ 30.726668] Freed by task 227: [ 30.726694] kasan_save_stack+0x3c/0x68 [ 30.726733] kasan_save_track+0x20/0x40 [ 30.726770] kasan_save_free_info+0x4c/0x78 [ 30.726809] __kasan_slab_free+0x6c/0x98 [ 30.726872] kfree+0x214/0x3c8 [ 30.726907] ksize_uaf+0x11c/0x5f8 [ 30.726943] kunit_try_run_case+0x170/0x3f0 [ 30.726981] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.727027] kthread+0x328/0x630 [ 30.727058] ret_from_fork+0x10/0x20 [ 30.727101] [ 30.727119] The buggy address belongs to the object at fff00000c91b3d00 [ 30.727119] which belongs to the cache kmalloc-128 of size 128 [ 30.727177] The buggy address is located 0 bytes inside of [ 30.727177] freed 128-byte region [fff00000c91b3d00, fff00000c91b3d80) [ 30.727237] [ 30.727269] The buggy address belongs to the physical page: [ 30.727348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b3 [ 30.727413] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.727516] page_type: f5(slab) [ 30.727564] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.727660] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.727766] page dumped because: kasan: bad access detected [ 30.727845] [ 30.727900] Memory state around the buggy address: [ 30.727989] fff00000c91b3c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.728340] fff00000c91b3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.728385] >fff00000c91b3d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.728557] ^ [ 30.728584] fff00000c91b3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.728626] fff00000c91b3e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.728747] ================================================================== [ 30.729997] ================================================================== [ 30.730053] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 30.730104] Read of size 1 at addr fff00000c91b3d78 by task kunit_try_catch/227 [ 30.730155] [ 30.730196] CPU: 1 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.730305] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.730349] Hardware name: linux,dummy-virt (DT) [ 30.730398] Call trace: [ 30.730438] show_stack+0x20/0x38 (C) [ 30.730536] dump_stack_lvl+0x8c/0xd0 [ 30.730602] print_report+0x118/0x5d0 [ 30.730646] kasan_report+0xdc/0x128 [ 30.730724] __asan_report_load1_noabort+0x20/0x30 [ 30.730791] ksize_uaf+0x544/0x5f8 [ 30.730857] kunit_try_run_case+0x170/0x3f0 [ 30.730949] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.731002] kthread+0x328/0x630 [ 30.731079] ret_from_fork+0x10/0x20 [ 30.731129] [ 30.731180] Allocated by task 227: [ 30.731227] kasan_save_stack+0x3c/0x68 [ 30.731274] kasan_save_track+0x20/0x40 [ 30.731330] kasan_save_alloc_info+0x40/0x58 [ 30.731408] __kasan_kmalloc+0xd4/0xd8 [ 30.731454] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.731497] ksize_uaf+0xb8/0x5f8 [ 30.731533] kunit_try_run_case+0x170/0x3f0 [ 30.731591] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.731734] kthread+0x328/0x630 [ 30.731823] ret_from_fork+0x10/0x20 [ 30.731902] [ 30.731941] Freed by task 227: [ 30.732006] kasan_save_stack+0x3c/0x68 [ 30.732066] kasan_save_track+0x20/0x40 [ 30.732118] kasan_save_free_info+0x4c/0x78 [ 30.732157] __kasan_slab_free+0x6c/0x98 [ 30.732195] kfree+0x214/0x3c8 [ 30.732239] ksize_uaf+0x11c/0x5f8 [ 30.732274] kunit_try_run_case+0x170/0x3f0 [ 30.732314] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.732366] kthread+0x328/0x630 [ 30.732398] ret_from_fork+0x10/0x20 [ 30.732434] [ 30.732452] The buggy address belongs to the object at fff00000c91b3d00 [ 30.732452] which belongs to the cache kmalloc-128 of size 128 [ 30.732509] The buggy address is located 120 bytes inside of [ 30.732509] freed 128-byte region [fff00000c91b3d00, fff00000c91b3d80) [ 30.732570] [ 30.732589] The buggy address belongs to the physical page: [ 30.732629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b3 [ 30.732680] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.732740] page_type: f5(slab) [ 30.732779] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.732829] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.732867] page dumped because: kasan: bad access detected [ 30.732908] [ 30.732926] Memory state around the buggy address: [ 30.732957] fff00000c91b3c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.733000] fff00000c91b3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.733042] >fff00000c91b3d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.733087] ^ [ 30.733128] fff00000c91b3d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.733169] fff00000c91b3e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.733207] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 30.707156] ================================================================== [ 30.707204] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 30.707254] Read of size 1 at addr fff00000c91b3c78 by task kunit_try_catch/225 [ 30.707303] [ 30.707349] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.707433] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.707479] Hardware name: linux,dummy-virt (DT) [ 30.707511] Call trace: [ 30.707533] show_stack+0x20/0x38 (C) [ 30.707582] dump_stack_lvl+0x8c/0xd0 [ 30.707639] print_report+0x118/0x5d0 [ 30.707692] kasan_report+0xdc/0x128 [ 30.707746] __asan_report_load1_noabort+0x20/0x30 [ 30.707798] ksize_unpoisons_memory+0x618/0x740 [ 30.707848] kunit_try_run_case+0x170/0x3f0 [ 30.707898] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.707948] kthread+0x328/0x630 [ 30.707991] ret_from_fork+0x10/0x20 [ 30.708045] [ 30.708065] Allocated by task 225: [ 30.708102] kasan_save_stack+0x3c/0x68 [ 30.708145] kasan_save_track+0x20/0x40 [ 30.708189] kasan_save_alloc_info+0x40/0x58 [ 30.708233] __kasan_kmalloc+0xd4/0xd8 [ 30.708270] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.708311] ksize_unpoisons_memory+0xc0/0x740 [ 30.708361] kunit_try_run_case+0x170/0x3f0 [ 30.708398] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.708447] kthread+0x328/0x630 [ 30.708480] ret_from_fork+0x10/0x20 [ 30.708515] [ 30.708533] The buggy address belongs to the object at fff00000c91b3c00 [ 30.708533] which belongs to the cache kmalloc-128 of size 128 [ 30.708600] The buggy address is located 5 bytes to the right of [ 30.708600] allocated 115-byte region [fff00000c91b3c00, fff00000c91b3c73) [ 30.708665] [ 30.708684] The buggy address belongs to the physical page: [ 30.708719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b3 [ 30.708772] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.708830] page_type: f5(slab) [ 30.708869] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.708919] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.708968] page dumped because: kasan: bad access detected [ 30.709000] [ 30.709033] Memory state around the buggy address: [ 30.709076] fff00000c91b3b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.709121] fff00000c91b3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.709161] >fff00000c91b3c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.709199] ^ [ 30.709248] fff00000c91b3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.709297] fff00000c91b3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.709346] ================================================================== [ 30.702370] ================================================================== [ 30.702444] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 30.702524] Read of size 1 at addr fff00000c91b3c73 by task kunit_try_catch/225 [ 30.702604] [ 30.702651] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.702778] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.702826] Hardware name: linux,dummy-virt (DT) [ 30.702862] Call trace: [ 30.702890] show_stack+0x20/0x38 (C) [ 30.702962] dump_stack_lvl+0x8c/0xd0 [ 30.703021] print_report+0x118/0x5d0 [ 30.703082] kasan_report+0xdc/0x128 [ 30.703127] __asan_report_load1_noabort+0x20/0x30 [ 30.703187] ksize_unpoisons_memory+0x628/0x740 [ 30.703237] kunit_try_run_case+0x170/0x3f0 [ 30.705340] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.705419] kthread+0x328/0x630 [ 30.705467] ret_from_fork+0x10/0x20 [ 30.705518] [ 30.705536] Allocated by task 225: [ 30.705567] kasan_save_stack+0x3c/0x68 [ 30.705609] kasan_save_track+0x20/0x40 [ 30.705648] kasan_save_alloc_info+0x40/0x58 [ 30.705686] __kasan_kmalloc+0xd4/0xd8 [ 30.705724] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.705764] ksize_unpoisons_memory+0xc0/0x740 [ 30.705803] kunit_try_run_case+0x170/0x3f0 [ 30.705842] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.705884] kthread+0x328/0x630 [ 30.705917] ret_from_fork+0x10/0x20 [ 30.705953] [ 30.705972] The buggy address belongs to the object at fff00000c91b3c00 [ 30.705972] which belongs to the cache kmalloc-128 of size 128 [ 30.706032] The buggy address is located 0 bytes to the right of [ 30.706032] allocated 115-byte region [fff00000c91b3c00, fff00000c91b3c73) [ 30.706096] [ 30.706118] The buggy address belongs to the physical page: [ 30.706151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b3 [ 30.706206] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.706255] page_type: f5(slab) [ 30.706300] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.706360] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.706399] page dumped because: kasan: bad access detected [ 30.706430] [ 30.706449] Memory state around the buggy address: [ 30.706480] fff00000c91b3b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.706521] fff00000c91b3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.706564] >fff00000c91b3c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.706600] ^ [ 30.706640] fff00000c91b3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.706681] fff00000c91b3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.706719] ================================================================== [ 30.709474] ================================================================== [ 30.709513] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 30.709559] Read of size 1 at addr fff00000c91b3c7f by task kunit_try_catch/225 [ 30.709610] [ 30.709637] CPU: 1 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.709732] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.709759] Hardware name: linux,dummy-virt (DT) [ 30.709789] Call trace: [ 30.709812] show_stack+0x20/0x38 (C) [ 30.709860] dump_stack_lvl+0x8c/0xd0 [ 30.709905] print_report+0x118/0x5d0 [ 30.709949] kasan_report+0xdc/0x128 [ 30.709992] __asan_report_load1_noabort+0x20/0x30 [ 30.710043] ksize_unpoisons_memory+0x690/0x740 [ 30.710091] kunit_try_run_case+0x170/0x3f0 [ 30.710140] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.710252] kthread+0x328/0x630 [ 30.710296] ret_from_fork+0x10/0x20 [ 30.710357] [ 30.710377] Allocated by task 225: [ 30.710403] kasan_save_stack+0x3c/0x68 [ 30.710444] kasan_save_track+0x20/0x40 [ 30.710481] kasan_save_alloc_info+0x40/0x58 [ 30.710519] __kasan_kmalloc+0xd4/0xd8 [ 30.710555] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.710596] ksize_unpoisons_memory+0xc0/0x740 [ 30.710634] kunit_try_run_case+0x170/0x3f0 [ 30.710685] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.710727] kthread+0x328/0x630 [ 30.710804] ret_from_fork+0x10/0x20 [ 30.710873] [ 30.710964] The buggy address belongs to the object at fff00000c91b3c00 [ 30.710964] which belongs to the cache kmalloc-128 of size 128 [ 30.711056] The buggy address is located 12 bytes to the right of [ 30.711056] allocated 115-byte region [fff00000c91b3c00, fff00000c91b3c73) [ 30.711140] [ 30.711192] The buggy address belongs to the physical page: [ 30.711250] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b3 [ 30.711313] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.711370] page_type: f5(slab) [ 30.711405] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.711457] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.711496] page dumped because: kasan: bad access detected [ 30.711527] [ 30.711544] Memory state around the buggy address: [ 30.711574] fff00000c91b3b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.711630] fff00000c91b3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.711734] >fff00000c91b3c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.711813] ^ [ 30.711908] fff00000c91b3c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.711997] fff00000c91b3d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.712114] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive
[ 30.688877] ================================================================== [ 30.689133] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 30.689185] Free of addr fff00000c918c680 by task kunit_try_catch/223 [ 30.689244] [ 30.689276] CPU: 1 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.689433] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.689489] Hardware name: linux,dummy-virt (DT) [ 30.689568] Call trace: [ 30.689669] show_stack+0x20/0x38 (C) [ 30.689755] dump_stack_lvl+0x8c/0xd0 [ 30.689843] print_report+0x118/0x5d0 [ 30.689933] kasan_report_invalid_free+0xc0/0xe8 [ 30.690047] check_slab_allocation+0xd4/0x108 [ 30.690147] __kasan_slab_pre_free+0x2c/0x48 [ 30.690255] kfree+0xe8/0x3c8 [ 30.690342] kfree_sensitive+0x3c/0xb0 [ 30.690413] kmalloc_double_kzfree+0x168/0x308 [ 30.690481] kunit_try_run_case+0x170/0x3f0 [ 30.690529] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.690577] kthread+0x328/0x630 [ 30.690619] ret_from_fork+0x10/0x20 [ 30.690668] [ 30.690976] Allocated by task 223: [ 30.691053] kasan_save_stack+0x3c/0x68 [ 30.691147] kasan_save_track+0x20/0x40 [ 30.691254] kasan_save_alloc_info+0x40/0x58 [ 30.691341] __kasan_kmalloc+0xd4/0xd8 [ 30.691438] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.691543] kmalloc_double_kzfree+0xb8/0x308 [ 30.691630] kunit_try_run_case+0x170/0x3f0 [ 30.691757] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.691826] kthread+0x328/0x630 [ 30.691861] ret_from_fork+0x10/0x20 [ 30.691905] [ 30.691959] Freed by task 223: [ 30.692195] kasan_save_stack+0x3c/0x68 [ 30.692247] kasan_save_track+0x20/0x40 [ 30.692286] kasan_save_free_info+0x4c/0x78 [ 30.692558] __kasan_slab_free+0x6c/0x98 [ 30.692717] kfree+0x214/0x3c8 [ 30.692859] kfree_sensitive+0x80/0xb0 [ 30.692940] kmalloc_double_kzfree+0x11c/0x308 [ 30.692993] kunit_try_run_case+0x170/0x3f0 [ 30.693040] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.693082] kthread+0x328/0x630 [ 30.693114] ret_from_fork+0x10/0x20 [ 30.693159] [ 30.693180] The buggy address belongs to the object at fff00000c918c680 [ 30.693180] which belongs to the cache kmalloc-16 of size 16 [ 30.693244] The buggy address is located 0 bytes inside of [ 30.693244] 16-byte region [fff00000c918c680, fff00000c918c690) [ 30.693307] [ 30.693341] The buggy address belongs to the physical page: [ 30.693372] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10918c [ 30.693426] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.693477] page_type: f5(slab) [ 30.693516] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 30.693566] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 30.693606] page dumped because: kasan: bad access detected [ 30.693636] [ 30.693654] Memory state around the buggy address: [ 30.693687] fff00000c918c580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.693756] fff00000c918c600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.693852] >fff00000c918c680: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.694001] ^ [ 30.694082] fff00000c918c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.694135] fff00000c918c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.694198] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[ 30.683787] ================================================================== [ 30.683851] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 30.683921] Read of size 1 at addr fff00000c918c680 by task kunit_try_catch/223 [ 30.683971] [ 30.684010] CPU: 1 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.684098] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.684124] Hardware name: linux,dummy-virt (DT) [ 30.684157] Call trace: [ 30.684204] show_stack+0x20/0x38 (C) [ 30.684258] dump_stack_lvl+0x8c/0xd0 [ 30.684305] print_report+0x118/0x5d0 [ 30.684804] kasan_report+0xdc/0x128 [ 30.684847] __kasan_check_byte+0x54/0x70 [ 30.684896] kfree_sensitive+0x30/0xb0 [ 30.685004] kmalloc_double_kzfree+0x168/0x308 [ 30.685070] kunit_try_run_case+0x170/0x3f0 [ 30.685138] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.685190] kthread+0x328/0x630 [ 30.685236] ret_from_fork+0x10/0x20 [ 30.685284] [ 30.685302] Allocated by task 223: [ 30.685340] kasan_save_stack+0x3c/0x68 [ 30.685382] kasan_save_track+0x20/0x40 [ 30.685451] kasan_save_alloc_info+0x40/0x58 [ 30.685491] __kasan_kmalloc+0xd4/0xd8 [ 30.685529] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.685571] kmalloc_double_kzfree+0xb8/0x308 [ 30.685611] kunit_try_run_case+0x170/0x3f0 [ 30.685650] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.685690] kthread+0x328/0x630 [ 30.685724] ret_from_fork+0x10/0x20 [ 30.685760] [ 30.685779] Freed by task 223: [ 30.685804] kasan_save_stack+0x3c/0x68 [ 30.685843] kasan_save_track+0x20/0x40 [ 30.685880] kasan_save_free_info+0x4c/0x78 [ 30.685916] __kasan_slab_free+0x6c/0x98 [ 30.685955] kfree+0x214/0x3c8 [ 30.685990] kfree_sensitive+0x80/0xb0 [ 30.686028] kmalloc_double_kzfree+0x11c/0x308 [ 30.686068] kunit_try_run_case+0x170/0x3f0 [ 30.686107] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.686148] kthread+0x328/0x630 [ 30.686204] ret_from_fork+0x10/0x20 [ 30.686272] [ 30.686383] The buggy address belongs to the object at fff00000c918c680 [ 30.686383] which belongs to the cache kmalloc-16 of size 16 [ 30.686469] The buggy address is located 0 bytes inside of [ 30.686469] freed 16-byte region [fff00000c918c680, fff00000c918c690) [ 30.686602] [ 30.686662] The buggy address belongs to the physical page: [ 30.686723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10918c [ 30.686855] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.686922] page_type: f5(slab) [ 30.686994] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 30.687130] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 30.687207] page dumped because: kasan: bad access detected [ 30.687276] [ 30.687314] Memory state around the buggy address: [ 30.687358] fff00000c918c580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.687668] fff00000c918c600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.687787] >fff00000c918c680: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.687874] ^ [ 30.687910] fff00000c918c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.687996] fff00000c918c780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.688086] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[ 30.621818] ================================================================== [ 30.621921] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 30.623896] Read of size 1 at addr fff00000c9ac9ba8 by task kunit_try_catch/219 [ 30.624263] [ 30.624418] CPU: 1 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.625426] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.625509] Hardware name: linux,dummy-virt (DT) [ 30.626292] Call trace: [ 30.626334] show_stack+0x20/0x38 (C) [ 30.626725] dump_stack_lvl+0x8c/0xd0 [ 30.627277] print_report+0x118/0x5d0 [ 30.627677] kasan_report+0xdc/0x128 [ 30.628340] __asan_report_load1_noabort+0x20/0x30 [ 30.629117] kmalloc_uaf2+0x3f4/0x468 [ 30.629820] kunit_try_run_case+0x170/0x3f0 [ 30.630083] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.630652] kthread+0x328/0x630 [ 30.631072] ret_from_fork+0x10/0x20 [ 30.631672] [ 30.631820] Allocated by task 219: [ 30.632084] kasan_save_stack+0x3c/0x68 [ 30.632434] kasan_save_track+0x20/0x40 [ 30.632477] kasan_save_alloc_info+0x40/0x58 [ 30.633137] __kasan_kmalloc+0xd4/0xd8 [ 30.633654] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.634280] kmalloc_uaf2+0xc4/0x468 [ 30.634696] kunit_try_run_case+0x170/0x3f0 [ 30.635085] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.635819] kthread+0x328/0x630 [ 30.635989] ret_from_fork+0x10/0x20 [ 30.636421] [ 30.636444] Freed by task 219: [ 30.636819] kasan_save_stack+0x3c/0x68 [ 30.636871] kasan_save_track+0x20/0x40 [ 30.637654] kasan_save_free_info+0x4c/0x78 [ 30.638151] __kasan_slab_free+0x6c/0x98 [ 30.638446] kfree+0x214/0x3c8 [ 30.638568] kmalloc_uaf2+0x134/0x468 [ 30.639122] kunit_try_run_case+0x170/0x3f0 [ 30.639180] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.639223] kthread+0x328/0x630 [ 30.639899] ret_from_fork+0x10/0x20 [ 30.640438] [ 30.640464] The buggy address belongs to the object at fff00000c9ac9b80 [ 30.640464] which belongs to the cache kmalloc-64 of size 64 [ 30.640919] The buggy address is located 40 bytes inside of [ 30.640919] freed 64-byte region [fff00000c9ac9b80, fff00000c9ac9bc0) [ 30.640990] [ 30.641012] The buggy address belongs to the physical page: [ 30.641046] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ac9 [ 30.641107] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.641161] page_type: f5(slab) [ 30.642661] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.643477] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.643767] page dumped because: kasan: bad access detected [ 30.643840] [ 30.643859] Memory state around the buggy address: [ 30.644535] fff00000c9ac9a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.644594] fff00000c9ac9b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.645253] >fff00000c9ac9b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.645494] ^ [ 30.645803] fff00000c9ac9c00: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 30.645872] fff00000c9ac9c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.645945] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 30.543270] ================================================================== [ 30.543378] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 30.543455] Write of size 33 at addr fff00000c9ac9a80 by task kunit_try_catch/217 [ 30.545884] [ 30.545948] CPU: 1 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.546241] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.546268] Hardware name: linux,dummy-virt (DT) [ 30.548068] Call trace: [ 30.548169] show_stack+0x20/0x38 (C) [ 30.548237] dump_stack_lvl+0x8c/0xd0 [ 30.548715] print_report+0x118/0x5d0 [ 30.549225] kasan_report+0xdc/0x128 [ 30.549940] kasan_check_range+0x100/0x1a8 [ 30.550215] __asan_memset+0x34/0x78 [ 30.550348] kmalloc_uaf_memset+0x170/0x310 [ 30.551001] kunit_try_run_case+0x170/0x3f0 [ 30.551635] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.551698] kthread+0x328/0x630 [ 30.552619] ret_from_fork+0x10/0x20 [ 30.552685] [ 30.552705] Allocated by task 217: [ 30.552736] kasan_save_stack+0x3c/0x68 [ 30.553537] kasan_save_track+0x20/0x40 [ 30.553920] kasan_save_alloc_info+0x40/0x58 [ 30.553967] __kasan_kmalloc+0xd4/0xd8 [ 30.554004] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.554726] kmalloc_uaf_memset+0xb8/0x310 [ 30.554779] kunit_try_run_case+0x170/0x3f0 [ 30.555440] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.556164] kthread+0x328/0x630 [ 30.556238] ret_from_fork+0x10/0x20 [ 30.557066] [ 30.557091] Freed by task 217: [ 30.557122] kasan_save_stack+0x3c/0x68 [ 30.557792] kasan_save_track+0x20/0x40 [ 30.558723] kasan_save_free_info+0x4c/0x78 [ 30.558898] __kasan_slab_free+0x6c/0x98 [ 30.559504] kfree+0x214/0x3c8 [ 30.559662] kmalloc_uaf_memset+0x11c/0x310 [ 30.559710] kunit_try_run_case+0x170/0x3f0 [ 30.559982] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.560319] kthread+0x328/0x630 [ 30.560692] ret_from_fork+0x10/0x20 [ 30.560734] [ 30.561572] The buggy address belongs to the object at fff00000c9ac9a80 [ 30.561572] which belongs to the cache kmalloc-64 of size 64 [ 30.561661] The buggy address is located 0 bytes inside of [ 30.561661] freed 64-byte region [fff00000c9ac9a80, fff00000c9ac9ac0) [ 30.561724] [ 30.562726] The buggy address belongs to the physical page: [ 30.562770] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ac9 [ 30.562835] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.562891] page_type: f5(slab) [ 30.562936] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.562989] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.564619] page dumped because: kasan: bad access detected [ 30.565160] [ 30.565341] Memory state around the buggy address: [ 30.565422] fff00000c9ac9980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.566012] fff00000c9ac9a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.567055] >fff00000c9ac9a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.567270] ^ [ 30.567315] fff00000c9ac9b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.567381] fff00000c9ac9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.567422] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[ 30.499132] ================================================================== [ 30.499335] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 30.499925] Read of size 1 at addr fff00000c918c668 by task kunit_try_catch/215 [ 30.499991] [ 30.500149] CPU: 1 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.500239] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.500266] Hardware name: linux,dummy-virt (DT) [ 30.500304] Call trace: [ 30.500563] show_stack+0x20/0x38 (C) [ 30.500712] dump_stack_lvl+0x8c/0xd0 [ 30.500800] print_report+0x118/0x5d0 [ 30.501103] kasan_report+0xdc/0x128 [ 30.501203] __asan_report_load1_noabort+0x20/0x30 [ 30.501468] kmalloc_uaf+0x300/0x338 [ 30.501673] kunit_try_run_case+0x170/0x3f0 [ 30.501727] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.501779] kthread+0x328/0x630 [ 30.501959] ret_from_fork+0x10/0x20 [ 30.502025] [ 30.502043] Allocated by task 215: [ 30.502143] kasan_save_stack+0x3c/0x68 [ 30.502189] kasan_save_track+0x20/0x40 [ 30.502228] kasan_save_alloc_info+0x40/0x58 [ 30.502270] __kasan_kmalloc+0xd4/0xd8 [ 30.502388] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.502464] kmalloc_uaf+0xb8/0x338 [ 30.502622] kunit_try_run_case+0x170/0x3f0 [ 30.502707] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.502748] kthread+0x328/0x630 [ 30.502780] ret_from_fork+0x10/0x20 [ 30.502856] [ 30.502936] Freed by task 215: [ 30.503053] kasan_save_stack+0x3c/0x68 [ 30.503119] kasan_save_track+0x20/0x40 [ 30.503217] kasan_save_free_info+0x4c/0x78 [ 30.503265] __kasan_slab_free+0x6c/0x98 [ 30.503303] kfree+0x214/0x3c8 [ 30.503660] kmalloc_uaf+0x11c/0x338 [ 30.504041] kunit_try_run_case+0x170/0x3f0 [ 30.504091] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.504285] kthread+0x328/0x630 [ 30.504339] ret_from_fork+0x10/0x20 [ 30.504471] [ 30.504491] The buggy address belongs to the object at fff00000c918c660 [ 30.504491] which belongs to the cache kmalloc-16 of size 16 [ 30.504550] The buggy address is located 8 bytes inside of [ 30.504550] freed 16-byte region [fff00000c918c660, fff00000c918c670) [ 30.504905] [ 30.504936] The buggy address belongs to the physical page: [ 30.505028] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10918c [ 30.505105] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.505184] page_type: f5(slab) [ 30.505276] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 30.505339] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 30.505569] page dumped because: kasan: bad access detected [ 30.505674] [ 30.505697] Memory state around the buggy address: [ 30.505730] fff00000c918c500: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 30.505772] fff00000c918c580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.505814] >fff00000c918c600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.506036] ^ [ 30.506142] fff00000c918c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.506224] fff00000c918c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.506263] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 30.473136] ================================================================== [ 30.473205] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0 [ 30.473875] Read of size 64 at addr fff00000c9ac9784 by task kunit_try_catch/213 [ 30.473928] [ 30.474112] CPU: 1 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.474226] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.474337] Hardware name: linux,dummy-virt (DT) [ 30.474396] Call trace: [ 30.474420] show_stack+0x20/0x38 (C) [ 30.474510] dump_stack_lvl+0x8c/0xd0 [ 30.474907] print_report+0x118/0x5d0 [ 30.475003] kasan_report+0xdc/0x128 [ 30.475056] kasan_check_range+0x100/0x1a8 [ 30.475101] __asan_memmove+0x3c/0x98 [ 30.475355] kmalloc_memmove_invalid_size+0x154/0x2e0 [ 30.475492] kunit_try_run_case+0x170/0x3f0 [ 30.475543] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.475592] kthread+0x328/0x630 [ 30.475635] ret_from_fork+0x10/0x20 [ 30.475960] [ 30.475982] Allocated by task 213: [ 30.476069] kasan_save_stack+0x3c/0x68 [ 30.476140] kasan_save_track+0x20/0x40 [ 30.476198] kasan_save_alloc_info+0x40/0x58 [ 30.476504] __kasan_kmalloc+0xd4/0xd8 [ 30.476777] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.476831] kmalloc_memmove_invalid_size+0xb0/0x2e0 [ 30.476911] kunit_try_run_case+0x170/0x3f0 [ 30.477138] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.477247] kthread+0x328/0x630 [ 30.477279] ret_from_fork+0x10/0x20 [ 30.477348] [ 30.477432] The buggy address belongs to the object at fff00000c9ac9780 [ 30.477432] which belongs to the cache kmalloc-64 of size 64 [ 30.477492] The buggy address is located 4 bytes inside of [ 30.477492] allocated 64-byte region [fff00000c9ac9780, fff00000c9ac97c0) [ 30.477563] [ 30.477627] The buggy address belongs to the physical page: [ 30.477660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ac9 [ 30.477737] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.477788] page_type: f5(slab) [ 30.477868] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.478077] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.478217] page dumped because: kasan: bad access detected [ 30.478284] [ 30.478301] Memory state around the buggy address: [ 30.478349] fff00000c9ac9680: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc [ 30.478393] fff00000c9ac9700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.478445] >fff00000c9ac9780: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 30.478482] ^ [ 30.478516] fff00000c9ac9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.478926] fff00000c9ac9880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.479156] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 30.453675] ================================================================== [ 30.454252] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 30.454375] Read of size 18446744073709551614 at addr fff00000c9ac9584 by task kunit_try_catch/211 [ 30.454468] [ 30.454507] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.454985] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.455067] Hardware name: linux,dummy-virt (DT) [ 30.455099] Call trace: [ 30.455131] show_stack+0x20/0x38 (C) [ 30.455299] dump_stack_lvl+0x8c/0xd0 [ 30.455357] print_report+0x118/0x5d0 [ 30.455401] kasan_report+0xdc/0x128 [ 30.455442] kasan_check_range+0x100/0x1a8 [ 30.455487] __asan_memmove+0x3c/0x98 [ 30.455541] kmalloc_memmove_negative_size+0x154/0x2e0 [ 30.455591] kunit_try_run_case+0x170/0x3f0 [ 30.455990] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.456096] kthread+0x328/0x630 [ 30.456314] ret_from_fork+0x10/0x20 [ 30.456445] [ 30.456463] Allocated by task 211: [ 30.456592] kasan_save_stack+0x3c/0x68 [ 30.456635] kasan_save_track+0x20/0x40 [ 30.457009] kasan_save_alloc_info+0x40/0x58 [ 30.457106] __kasan_kmalloc+0xd4/0xd8 [ 30.457199] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.457242] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 30.457284] kunit_try_run_case+0x170/0x3f0 [ 30.457343] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.457468] kthread+0x328/0x630 [ 30.457500] ret_from_fork+0x10/0x20 [ 30.457535] [ 30.457557] The buggy address belongs to the object at fff00000c9ac9580 [ 30.457557] which belongs to the cache kmalloc-64 of size 64 [ 30.457742] The buggy address is located 4 bytes inside of [ 30.457742] 64-byte region [fff00000c9ac9580, fff00000c9ac95c0) [ 30.457802] [ 30.457825] The buggy address belongs to the physical page: [ 30.457855] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ac9 [ 30.458257] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.458311] page_type: f5(slab) [ 30.458364] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.458745] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.458790] page dumped because: kasan: bad access detected [ 30.458822] [ 30.458840] Memory state around the buggy address: [ 30.458874] fff00000c9ac9480: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc [ 30.458916] fff00000c9ac9500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.459197] >fff00000c9ac9580: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 30.459241] ^ [ 30.459281] fff00000c9ac9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.459511] fff00000c9ac9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.459577] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[ 30.438751] ================================================================== [ 30.438860] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 30.438935] Write of size 16 at addr fff00000c91b3b69 by task kunit_try_catch/209 [ 30.438986] [ 30.439033] CPU: 1 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.439300] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.439398] Hardware name: linux,dummy-virt (DT) [ 30.439511] Call trace: [ 30.439537] show_stack+0x20/0x38 (C) [ 30.439589] dump_stack_lvl+0x8c/0xd0 [ 30.439942] print_report+0x118/0x5d0 [ 30.440024] kasan_report+0xdc/0x128 [ 30.440067] kasan_check_range+0x100/0x1a8 [ 30.440111] __asan_memset+0x34/0x78 [ 30.440153] kmalloc_oob_memset_16+0x150/0x2f8 [ 30.440199] kunit_try_run_case+0x170/0x3f0 [ 30.440289] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.440494] kthread+0x328/0x630 [ 30.440544] ret_from_fork+0x10/0x20 [ 30.440763] [ 30.440851] Allocated by task 209: [ 30.440903] kasan_save_stack+0x3c/0x68 [ 30.441030] kasan_save_track+0x20/0x40 [ 30.441074] kasan_save_alloc_info+0x40/0x58 [ 30.441111] __kasan_kmalloc+0xd4/0xd8 [ 30.441154] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.441226] kmalloc_oob_memset_16+0xb0/0x2f8 [ 30.441338] kunit_try_run_case+0x170/0x3f0 [ 30.441401] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.441447] kthread+0x328/0x630 [ 30.441481] ret_from_fork+0x10/0x20 [ 30.441518] [ 30.441541] The buggy address belongs to the object at fff00000c91b3b00 [ 30.441541] which belongs to the cache kmalloc-128 of size 128 [ 30.441599] The buggy address is located 105 bytes inside of [ 30.441599] allocated 120-byte region [fff00000c91b3b00, fff00000c91b3b78) [ 30.442009] [ 30.442033] The buggy address belongs to the physical page: [ 30.442101] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b3 [ 30.442389] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.442672] page_type: f5(slab) [ 30.442731] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.442983] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.443155] page dumped because: kasan: bad access detected [ 30.443373] [ 30.443398] Memory state around the buggy address: [ 30.443436] fff00000c91b3a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.443481] fff00000c91b3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.443775] >fff00000c91b3b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.443884] ^ [ 30.443986] fff00000c91b3b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.444028] fff00000c91b3c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.444068] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[ 30.419916] ================================================================== [ 30.420165] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 30.420332] Write of size 8 at addr fff00000c91b3a71 by task kunit_try_catch/207 [ 30.420382] [ 30.420418] CPU: 1 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.420502] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.420527] Hardware name: linux,dummy-virt (DT) [ 30.420557] Call trace: [ 30.420579] show_stack+0x20/0x38 (C) [ 30.420626] dump_stack_lvl+0x8c/0xd0 [ 30.420670] print_report+0x118/0x5d0 [ 30.421138] kasan_report+0xdc/0x128 [ 30.421541] kasan_check_range+0x100/0x1a8 [ 30.421695] __asan_memset+0x34/0x78 [ 30.421738] kmalloc_oob_memset_8+0x150/0x2f8 [ 30.421784] kunit_try_run_case+0x170/0x3f0 [ 30.421832] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.421880] kthread+0x328/0x630 [ 30.421922] ret_from_fork+0x10/0x20 [ 30.421969] [ 30.421986] Allocated by task 207: [ 30.422536] kasan_save_stack+0x3c/0x68 [ 30.422589] kasan_save_track+0x20/0x40 [ 30.422954] kasan_save_alloc_info+0x40/0x58 [ 30.422992] __kasan_kmalloc+0xd4/0xd8 [ 30.423033] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.423077] kmalloc_oob_memset_8+0xb0/0x2f8 [ 30.423115] kunit_try_run_case+0x170/0x3f0 [ 30.423154] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.423205] kthread+0x328/0x630 [ 30.423238] ret_from_fork+0x10/0x20 [ 30.423272] [ 30.423610] The buggy address belongs to the object at fff00000c91b3a00 [ 30.423610] which belongs to the cache kmalloc-128 of size 128 [ 30.423669] The buggy address is located 113 bytes inside of [ 30.423669] allocated 120-byte region [fff00000c91b3a00, fff00000c91b3a78) [ 30.423731] [ 30.423754] The buggy address belongs to the physical page: [ 30.424116] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b3 [ 30.424205] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.424257] page_type: f5(slab) [ 30.424299] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.424632] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.424829] page dumped because: kasan: bad access detected [ 30.424863] [ 30.424911] Memory state around the buggy address: [ 30.424945] fff00000c91b3900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.425031] fff00000c91b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.425193] >fff00000c91b3a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.425229] ^ [ 30.425267] fff00000c91b3a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.425345] fff00000c91b3b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.425407] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[ 30.405175] ================================================================== [ 30.405511] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 30.405591] Write of size 4 at addr fff00000c91b3975 by task kunit_try_catch/205 [ 30.405648] [ 30.405686] CPU: 1 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.405771] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.405822] Hardware name: linux,dummy-virt (DT) [ 30.405855] Call trace: [ 30.405878] show_stack+0x20/0x38 (C) [ 30.405984] dump_stack_lvl+0x8c/0xd0 [ 30.406371] print_report+0x118/0x5d0 [ 30.406458] kasan_report+0xdc/0x128 [ 30.406499] kasan_check_range+0x100/0x1a8 [ 30.406622] __asan_memset+0x34/0x78 [ 30.406666] kmalloc_oob_memset_4+0x150/0x300 [ 30.406711] kunit_try_run_case+0x170/0x3f0 [ 30.406759] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.406829] kthread+0x328/0x630 [ 30.407032] ret_from_fork+0x10/0x20 [ 30.407107] [ 30.407195] Allocated by task 205: [ 30.407224] kasan_save_stack+0x3c/0x68 [ 30.407265] kasan_save_track+0x20/0x40 [ 30.407302] kasan_save_alloc_info+0x40/0x58 [ 30.407349] __kasan_kmalloc+0xd4/0xd8 [ 30.407393] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.407582] kmalloc_oob_memset_4+0xb0/0x300 [ 30.407669] kunit_try_run_case+0x170/0x3f0 [ 30.407776] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.407971] kthread+0x328/0x630 [ 30.408004] ret_from_fork+0x10/0x20 [ 30.408079] [ 30.408174] The buggy address belongs to the object at fff00000c91b3900 [ 30.408174] which belongs to the cache kmalloc-128 of size 128 [ 30.408275] The buggy address is located 117 bytes inside of [ 30.408275] allocated 120-byte region [fff00000c91b3900, fff00000c91b3978) [ 30.408344] [ 30.408365] The buggy address belongs to the physical page: [ 30.408395] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b3 [ 30.408447] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.408495] page_type: f5(slab) [ 30.408536] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.408613] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.408652] page dumped because: kasan: bad access detected [ 30.408965] [ 30.409245] Memory state around the buggy address: [ 30.409355] fff00000c91b3800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.409676] fff00000c91b3880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.409808] >fff00000c91b3900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.409990] ^ [ 30.410057] fff00000c91b3980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.410201] fff00000c91b3a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.410243] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[ 30.386771] ================================================================== [ 30.386854] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 30.386924] Write of size 2 at addr fff00000c91b3877 by task kunit_try_catch/203 [ 30.386974] [ 30.387013] CPU: 1 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.387345] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.387378] Hardware name: linux,dummy-virt (DT) [ 30.387409] Call trace: [ 30.387433] show_stack+0x20/0x38 (C) [ 30.387484] dump_stack_lvl+0x8c/0xd0 [ 30.388278] print_report+0x118/0x5d0 [ 30.388372] kasan_report+0xdc/0x128 [ 30.388414] kasan_check_range+0x100/0x1a8 [ 30.388457] __asan_memset+0x34/0x78 [ 30.388809] kmalloc_oob_memset_2+0x150/0x2f8 [ 30.389034] kunit_try_run_case+0x170/0x3f0 [ 30.389274] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.389701] kthread+0x328/0x630 [ 30.389764] ret_from_fork+0x10/0x20 [ 30.389813] [ 30.389955] Allocated by task 203: [ 30.389984] kasan_save_stack+0x3c/0x68 [ 30.390183] kasan_save_track+0x20/0x40 [ 30.390392] kasan_save_alloc_info+0x40/0x58 [ 30.390491] __kasan_kmalloc+0xd4/0xd8 [ 30.390536] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.390600] kmalloc_oob_memset_2+0xb0/0x2f8 [ 30.391042] kunit_try_run_case+0x170/0x3f0 [ 30.391095] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.391176] kthread+0x328/0x630 [ 30.391334] ret_from_fork+0x10/0x20 [ 30.391371] [ 30.391392] The buggy address belongs to the object at fff00000c91b3800 [ 30.391392] which belongs to the cache kmalloc-128 of size 128 [ 30.391503] The buggy address is located 119 bytes inside of [ 30.391503] allocated 120-byte region [fff00000c91b3800, fff00000c91b3878) [ 30.391758] [ 30.391806] The buggy address belongs to the physical page: [ 30.392055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b3 [ 30.392144] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.392293] page_type: f5(slab) [ 30.392498] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.392555] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.392595] page dumped because: kasan: bad access detected [ 30.392638] [ 30.392656] Memory state around the buggy address: [ 30.392688] fff00000c91b3700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.392812] fff00000c91b3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.393039] >fff00000c91b3800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.393223] ^ [ 30.393510] fff00000c91b3880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.393559] fff00000c91b3900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.393595] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 30.367754] ================================================================== [ 30.367820] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 30.367887] Write of size 128 at addr fff00000c91b3700 by task kunit_try_catch/201 [ 30.367938] [ 30.367988] CPU: 1 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.368414] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.368447] Hardware name: linux,dummy-virt (DT) [ 30.368478] Call trace: [ 30.368591] show_stack+0x20/0x38 (C) [ 30.368641] dump_stack_lvl+0x8c/0xd0 [ 30.368687] print_report+0x118/0x5d0 [ 30.368728] kasan_report+0xdc/0x128 [ 30.368769] kasan_check_range+0x100/0x1a8 [ 30.368812] __asan_memset+0x34/0x78 [ 30.368853] kmalloc_oob_in_memset+0x144/0x2d0 [ 30.368905] kunit_try_run_case+0x170/0x3f0 [ 30.369035] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.369203] kthread+0x328/0x630 [ 30.369679] ret_from_fork+0x10/0x20 [ 30.370371] [ 30.370400] Allocated by task 201: [ 30.370431] kasan_save_stack+0x3c/0x68 [ 30.370538] kasan_save_track+0x20/0x40 [ 30.370917] kasan_save_alloc_info+0x40/0x58 [ 30.371050] __kasan_kmalloc+0xd4/0xd8 [ 30.371130] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.371202] kmalloc_oob_in_memset+0xb0/0x2d0 [ 30.371302] kunit_try_run_case+0x170/0x3f0 [ 30.371416] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.371462] kthread+0x328/0x630 [ 30.371494] ret_from_fork+0x10/0x20 [ 30.371529] [ 30.371551] The buggy address belongs to the object at fff00000c91b3700 [ 30.371551] which belongs to the cache kmalloc-128 of size 128 [ 30.371608] The buggy address is located 0 bytes inside of [ 30.371608] allocated 120-byte region [fff00000c91b3700, fff00000c91b3778) [ 30.371667] [ 30.371688] The buggy address belongs to the physical page: [ 30.372149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b3 [ 30.372273] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.372750] page_type: f5(slab) [ 30.372803] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.372852] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.372890] page dumped because: kasan: bad access detected [ 30.373277] [ 30.373300] Memory state around the buggy address: [ 30.373483] fff00000c91b3600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.373536] fff00000c91b3680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.373606] >fff00000c91b3700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.373693] ^ [ 30.373739] fff00000c91b3780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.373778] fff00000c91b3800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.373815] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[ 30.327769] ================================================================== [ 30.328010] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 30.328185] Write of size 16 at addr fff00000c918c600 by task kunit_try_catch/197 [ 30.328235] [ 30.328273] CPU: 1 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.328367] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.328393] Hardware name: linux,dummy-virt (DT) [ 30.328576] Call trace: [ 30.328818] show_stack+0x20/0x38 (C) [ 30.329450] dump_stack_lvl+0x8c/0xd0 [ 30.329766] print_report+0x118/0x5d0 [ 30.329814] kasan_report+0xdc/0x128 [ 30.329880] __asan_report_store16_noabort+0x20/0x30 [ 30.329928] kmalloc_oob_16+0x3a0/0x3f8 [ 30.329973] kunit_try_run_case+0x170/0x3f0 [ 30.330021] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.330070] kthread+0x328/0x630 [ 30.330113] ret_from_fork+0x10/0x20 [ 30.330162] [ 30.330180] Allocated by task 197: [ 30.330208] kasan_save_stack+0x3c/0x68 [ 30.330531] kasan_save_track+0x20/0x40 [ 30.330609] kasan_save_alloc_info+0x40/0x58 [ 30.330646] __kasan_kmalloc+0xd4/0xd8 [ 30.330685] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.330923] kmalloc_oob_16+0xb4/0x3f8 [ 30.330960] kunit_try_run_case+0x170/0x3f0 [ 30.331402] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.331454] kthread+0x328/0x630 [ 30.331554] ret_from_fork+0x10/0x20 [ 30.331637] [ 30.331702] The buggy address belongs to the object at fff00000c918c600 [ 30.331702] which belongs to the cache kmalloc-16 of size 16 [ 30.331758] The buggy address is located 0 bytes inside of [ 30.331758] allocated 13-byte region [fff00000c918c600, fff00000c918c60d) [ 30.331860] [ 30.331993] The buggy address belongs to the physical page: [ 30.332145] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10918c [ 30.332408] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.332471] page_type: f5(slab) [ 30.332819] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 30.332928] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 30.333030] page dumped because: kasan: bad access detected [ 30.333161] [ 30.333179] Memory state around the buggy address: [ 30.333210] fff00000c918c500: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 30.333355] fff00000c918c580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.333430] >fff00000c918c600: 00 05 fc fc 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.333550] ^ [ 30.333579] fff00000c918c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.333619] fff00000c918c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.333655] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 30.298998] ================================================================== [ 30.299096] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 30.299220] Read of size 1 at addr fff00000c9554c00 by task kunit_try_catch/195 [ 30.299364] [ 30.299483] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.299858] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.299884] Hardware name: linux,dummy-virt (DT) [ 30.299990] Call trace: [ 30.300115] show_stack+0x20/0x38 (C) [ 30.300166] dump_stack_lvl+0x8c/0xd0 [ 30.300218] print_report+0x118/0x5d0 [ 30.300597] kasan_report+0xdc/0x128 [ 30.300983] __kasan_check_byte+0x54/0x70 [ 30.301127] krealloc_noprof+0x44/0x360 [ 30.301354] krealloc_uaf+0x180/0x520 [ 30.301462] kunit_try_run_case+0x170/0x3f0 [ 30.301707] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.301768] kthread+0x328/0x630 [ 30.301810] ret_from_fork+0x10/0x20 [ 30.301986] [ 30.302007] Allocated by task 195: [ 30.302036] kasan_save_stack+0x3c/0x68 [ 30.302080] kasan_save_track+0x20/0x40 [ 30.302117] kasan_save_alloc_info+0x40/0x58 [ 30.302179] __kasan_kmalloc+0xd4/0xd8 [ 30.302291] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.302354] krealloc_uaf+0xc8/0x520 [ 30.302399] kunit_try_run_case+0x170/0x3f0 [ 30.302520] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.302559] kthread+0x328/0x630 [ 30.302591] ret_from_fork+0x10/0x20 [ 30.302625] [ 30.302644] Freed by task 195: [ 30.302893] kasan_save_stack+0x3c/0x68 [ 30.302970] kasan_save_track+0x20/0x40 [ 30.303055] kasan_save_free_info+0x4c/0x78 [ 30.303172] __kasan_slab_free+0x6c/0x98 [ 30.303227] kfree+0x214/0x3c8 [ 30.303270] krealloc_uaf+0x12c/0x520 [ 30.303481] kunit_try_run_case+0x170/0x3f0 [ 30.303520] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.303559] kthread+0x328/0x630 [ 30.303597] ret_from_fork+0x10/0x20 [ 30.303869] [ 30.303892] The buggy address belongs to the object at fff00000c9554c00 [ 30.303892] which belongs to the cache kmalloc-256 of size 256 [ 30.304218] The buggy address is located 0 bytes inside of [ 30.304218] freed 256-byte region [fff00000c9554c00, fff00000c9554d00) [ 30.304280] [ 30.304313] The buggy address belongs to the physical page: [ 30.304392] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109554 [ 30.304819] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.305075] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.305135] page_type: f5(slab) [ 30.305178] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.305238] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.305285] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.305457] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.305541] head: 0bfffe0000000001 ffffc1ffc3255501 00000000ffffffff 00000000ffffffff [ 30.305677] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.305717] page dumped because: kasan: bad access detected [ 30.305784] [ 30.306008] Memory state around the buggy address: [ 30.306121] fff00000c9554b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.306163] fff00000c9554b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.306209] >fff00000c9554c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.306456] ^ [ 30.306636] fff00000c9554c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.306684] fff00000c9554d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.306720] ================================================================== [ 30.307742] ================================================================== [ 30.307794] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 30.308072] Read of size 1 at addr fff00000c9554c00 by task kunit_try_catch/195 [ 30.308405] [ 30.308449] CPU: 1 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.308534] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.308566] Hardware name: linux,dummy-virt (DT) [ 30.308721] Call trace: [ 30.308743] show_stack+0x20/0x38 (C) [ 30.308793] dump_stack_lvl+0x8c/0xd0 [ 30.308841] print_report+0x118/0x5d0 [ 30.308883] kasan_report+0xdc/0x128 [ 30.308925] __asan_report_load1_noabort+0x20/0x30 [ 30.308972] krealloc_uaf+0x4c8/0x520 [ 30.309016] kunit_try_run_case+0x170/0x3f0 [ 30.309063] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.309113] kthread+0x328/0x630 [ 30.309153] ret_from_fork+0x10/0x20 [ 30.309199] [ 30.309224] Allocated by task 195: [ 30.309556] kasan_save_stack+0x3c/0x68 [ 30.309827] kasan_save_track+0x20/0x40 [ 30.309870] kasan_save_alloc_info+0x40/0x58 [ 30.309906] __kasan_kmalloc+0xd4/0xd8 [ 30.310115] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.310184] krealloc_uaf+0xc8/0x520 [ 30.310256] kunit_try_run_case+0x170/0x3f0 [ 30.310295] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.310347] kthread+0x328/0x630 [ 30.310380] ret_from_fork+0x10/0x20 [ 30.310415] [ 30.310434] Freed by task 195: [ 30.310467] kasan_save_stack+0x3c/0x68 [ 30.310648] kasan_save_track+0x20/0x40 [ 30.310774] kasan_save_free_info+0x4c/0x78 [ 30.310810] __kasan_slab_free+0x6c/0x98 [ 30.310947] kfree+0x214/0x3c8 [ 30.310981] krealloc_uaf+0x12c/0x520 [ 30.311031] kunit_try_run_case+0x170/0x3f0 [ 30.311231] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.311297] kthread+0x328/0x630 [ 30.311345] ret_from_fork+0x10/0x20 [ 30.311379] [ 30.311398] The buggy address belongs to the object at fff00000c9554c00 [ 30.311398] which belongs to the cache kmalloc-256 of size 256 [ 30.311621] The buggy address is located 0 bytes inside of [ 30.311621] freed 256-byte region [fff00000c9554c00, fff00000c9554d00) [ 30.311687] [ 30.311706] The buggy address belongs to the physical page: [ 30.311955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109554 [ 30.312289] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.312626] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.312702] page_type: f5(slab) [ 30.313066] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.313677] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.313781] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.313828] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.313896] head: 0bfffe0000000001 ffffc1ffc3255501 00000000ffffffff 00000000ffffffff [ 30.313943] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.314077] page dumped because: kasan: bad access detected [ 30.314795] [ 30.314846] Memory state around the buggy address: [ 30.314943] fff00000c9554b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.315009] fff00000c9554b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.315059] >fff00000c9554c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.315095] ^ [ 30.315124] fff00000c9554c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.315164] fff00000c9554d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.315199] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 30.218360] ================================================================== [ 30.218410] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 30.218533] Write of size 1 at addr fff00000c9554aea by task kunit_try_catch/189 [ 30.218920] [ 30.218956] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.219048] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.219073] Hardware name: linux,dummy-virt (DT) [ 30.219103] Call trace: [ 30.219125] show_stack+0x20/0x38 (C) [ 30.219175] dump_stack_lvl+0x8c/0xd0 [ 30.219219] print_report+0x118/0x5d0 [ 30.219835] kasan_report+0xdc/0x128 [ 30.219879] __asan_report_store1_noabort+0x20/0x30 [ 30.220298] krealloc_less_oob_helper+0xae4/0xc50 [ 30.220452] krealloc_less_oob+0x20/0x38 [ 30.220498] kunit_try_run_case+0x170/0x3f0 [ 30.220774] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.220884] kthread+0x328/0x630 [ 30.220935] ret_from_fork+0x10/0x20 [ 30.221084] [ 30.221104] Allocated by task 189: [ 30.221132] kasan_save_stack+0x3c/0x68 [ 30.221172] kasan_save_track+0x20/0x40 [ 30.221443] kasan_save_alloc_info+0x40/0x58 [ 30.221485] __kasan_krealloc+0x118/0x178 [ 30.221523] krealloc_noprof+0x128/0x360 [ 30.221585] krealloc_less_oob_helper+0x168/0xc50 [ 30.221665] krealloc_less_oob+0x20/0x38 [ 30.221702] kunit_try_run_case+0x170/0x3f0 [ 30.221876] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.221917] kthread+0x328/0x630 [ 30.222269] ret_from_fork+0x10/0x20 [ 30.222315] [ 30.222353] The buggy address belongs to the object at fff00000c9554a00 [ 30.222353] which belongs to the cache kmalloc-256 of size 256 [ 30.222421] The buggy address is located 33 bytes to the right of [ 30.222421] allocated 201-byte region [fff00000c9554a00, fff00000c9554ac9) [ 30.222538] [ 30.222648] The buggy address belongs to the physical page: [ 30.222712] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109554 [ 30.222782] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.222884] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.222938] page_type: f5(slab) [ 30.222977] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.223090] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.223168] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.223350] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.223398] head: 0bfffe0000000001 ffffc1ffc3255501 00000000ffffffff 00000000ffffffff [ 30.223444] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.223481] page dumped because: kasan: bad access detected [ 30.223511] [ 30.223528] Memory state around the buggy address: [ 30.223758] fff00000c9554980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.224144] fff00000c9554a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.224188] >fff00000c9554a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.224256] ^ [ 30.224447] fff00000c9554b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.224511] fff00000c9554b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.224547] ================================================================== [ 30.282887] ================================================================== [ 30.282987] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 30.283059] Write of size 1 at addr fff00000c9a660eb by task kunit_try_catch/193 [ 30.283120] [ 30.283381] CPU: 1 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.283473] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.283499] Hardware name: linux,dummy-virt (DT) [ 30.283528] Call trace: [ 30.283909] show_stack+0x20/0x38 (C) [ 30.284035] dump_stack_lvl+0x8c/0xd0 [ 30.284081] print_report+0x118/0x5d0 [ 30.284124] kasan_report+0xdc/0x128 [ 30.284165] __asan_report_store1_noabort+0x20/0x30 [ 30.284218] krealloc_less_oob_helper+0xa58/0xc50 [ 30.284554] krealloc_large_less_oob+0x20/0x38 [ 30.284698] kunit_try_run_case+0x170/0x3f0 [ 30.285088] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.285207] kthread+0x328/0x630 [ 30.285639] ret_from_fork+0x10/0x20 [ 30.285721] [ 30.285742] The buggy address belongs to the physical page: [ 30.285773] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a64 [ 30.285833] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.285879] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.286090] page_type: f8(unknown) [ 30.286266] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.286316] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.286376] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.286423] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.286470] head: 0bfffe0000000002 ffffc1ffc3269901 00000000ffffffff 00000000ffffffff [ 30.286516] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.286567] page dumped because: kasan: bad access detected [ 30.286596] [ 30.286614] Memory state around the buggy address: [ 30.286839] fff00000c9a65f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.286938] fff00000c9a66000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.287048] >fff00000c9a66080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.287400] ^ [ 30.287626] fff00000c9a66100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.287677] fff00000c9a66180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.288041] ================================================================== [ 30.276514] ================================================================== [ 30.276819] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 30.277108] Write of size 1 at addr fff00000c9a660ea by task kunit_try_catch/193 [ 30.277164] [ 30.277295] CPU: 1 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.277640] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.277682] Hardware name: linux,dummy-virt (DT) [ 30.277712] Call trace: [ 30.277734] show_stack+0x20/0x38 (C) [ 30.277784] dump_stack_lvl+0x8c/0xd0 [ 30.277832] print_report+0x118/0x5d0 [ 30.278098] kasan_report+0xdc/0x128 [ 30.278278] __asan_report_store1_noabort+0x20/0x30 [ 30.278339] krealloc_less_oob_helper+0xae4/0xc50 [ 30.278388] krealloc_large_less_oob+0x20/0x38 [ 30.278446] kunit_try_run_case+0x170/0x3f0 [ 30.278493] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.278717] kthread+0x328/0x630 [ 30.278997] ret_from_fork+0x10/0x20 [ 30.279059] [ 30.279109] The buggy address belongs to the physical page: [ 30.279138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a64 [ 30.279260] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.279342] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.279393] page_type: f8(unknown) [ 30.279443] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.279492] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.279909] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.280106] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.280205] head: 0bfffe0000000002 ffffc1ffc3269901 00000000ffffffff 00000000ffffffff [ 30.280305] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.280354] page dumped because: kasan: bad access detected [ 30.280384] [ 30.280401] Memory state around the buggy address: [ 30.280441] fff00000c9a65f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.280483] fff00000c9a66000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.281261] >fff00000c9a66080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.281435] ^ [ 30.281475] fff00000c9a66100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.281516] fff00000c9a66180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.281552] ================================================================== [ 30.271493] ================================================================== [ 30.271628] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 30.271805] Write of size 1 at addr fff00000c9a660da by task kunit_try_catch/193 [ 30.271853] [ 30.271880] CPU: 1 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.271961] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.271985] Hardware name: linux,dummy-virt (DT) [ 30.272288] Call trace: [ 30.272443] show_stack+0x20/0x38 (C) [ 30.272631] dump_stack_lvl+0x8c/0xd0 [ 30.272719] print_report+0x118/0x5d0 [ 30.272811] kasan_report+0xdc/0x128 [ 30.272914] __asan_report_store1_noabort+0x20/0x30 [ 30.272961] krealloc_less_oob_helper+0xa80/0xc50 [ 30.273015] krealloc_large_less_oob+0x20/0x38 [ 30.273206] kunit_try_run_case+0x170/0x3f0 [ 30.273277] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.273368] kthread+0x328/0x630 [ 30.273409] ret_from_fork+0x10/0x20 [ 30.274010] [ 30.274098] The buggy address belongs to the physical page: [ 30.274152] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a64 [ 30.274206] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.274263] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.274316] page_type: f8(unknown) [ 30.274365] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.274413] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.274593] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.275077] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.275132] head: 0bfffe0000000002 ffffc1ffc3269901 00000000ffffffff 00000000ffffffff [ 30.275212] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.275249] page dumped because: kasan: bad access detected [ 30.275278] [ 30.275296] Memory state around the buggy address: [ 30.275499] fff00000c9a65f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.275549] fff00000c9a66000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.275697] >fff00000c9a66080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.275733] ^ [ 30.275788] fff00000c9a66100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.275936] fff00000c9a66180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.275972] ================================================================== [ 30.225307] ================================================================== [ 30.225516] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 30.225763] Write of size 1 at addr fff00000c9554aeb by task kunit_try_catch/189 [ 30.225820] [ 30.225863] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.226052] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.226078] Hardware name: linux,dummy-virt (DT) [ 30.226108] Call trace: [ 30.226183] show_stack+0x20/0x38 (C) [ 30.226336] dump_stack_lvl+0x8c/0xd0 [ 30.226406] print_report+0x118/0x5d0 [ 30.226529] kasan_report+0xdc/0x128 [ 30.226628] __asan_report_store1_noabort+0x20/0x30 [ 30.226717] krealloc_less_oob_helper+0xa58/0xc50 [ 30.226845] krealloc_less_oob+0x20/0x38 [ 30.226924] kunit_try_run_case+0x170/0x3f0 [ 30.227150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.227203] kthread+0x328/0x630 [ 30.227245] ret_from_fork+0x10/0x20 [ 30.227602] [ 30.227624] Allocated by task 189: [ 30.227652] kasan_save_stack+0x3c/0x68 [ 30.227792] kasan_save_track+0x20/0x40 [ 30.227926] kasan_save_alloc_info+0x40/0x58 [ 30.227990] __kasan_krealloc+0x118/0x178 [ 30.228153] krealloc_noprof+0x128/0x360 [ 30.228191] krealloc_less_oob_helper+0x168/0xc50 [ 30.228232] krealloc_less_oob+0x20/0x38 [ 30.228275] kunit_try_run_case+0x170/0x3f0 [ 30.228578] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.228733] kthread+0x328/0x630 [ 30.229110] ret_from_fork+0x10/0x20 [ 30.229150] [ 30.229245] The buggy address belongs to the object at fff00000c9554a00 [ 30.229245] which belongs to the cache kmalloc-256 of size 256 [ 30.229348] The buggy address is located 34 bytes to the right of [ 30.229348] allocated 201-byte region [fff00000c9554a00, fff00000c9554ac9) [ 30.229421] [ 30.229497] The buggy address belongs to the physical page: [ 30.229586] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109554 [ 30.229660] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.229706] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.229758] page_type: f5(slab) [ 30.229796] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.229844] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.229892] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.229949] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.230239] head: 0bfffe0000000001 ffffc1ffc3255501 00000000ffffffff 00000000ffffffff [ 30.230290] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.230338] page dumped because: kasan: bad access detected [ 30.230660] [ 30.230681] Memory state around the buggy address: [ 30.230714] fff00000c9554980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.230756] fff00000c9554a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.230796] >fff00000c9554a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.230831] ^ [ 30.231196] fff00000c9554b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.231275] fff00000c9554b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.231346] ================================================================== [ 30.192556] ================================================================== [ 30.193034] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 30.193114] Write of size 1 at addr fff00000c9554ac9 by task kunit_try_catch/189 [ 30.193172] [ 30.193226] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.193313] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.193351] Hardware name: linux,dummy-virt (DT) [ 30.193389] Call trace: [ 30.193415] show_stack+0x20/0x38 (C) [ 30.193465] dump_stack_lvl+0x8c/0xd0 [ 30.194107] print_report+0x118/0x5d0 [ 30.194356] kasan_report+0xdc/0x128 [ 30.194454] __asan_report_store1_noabort+0x20/0x30 [ 30.194716] krealloc_less_oob_helper+0xa48/0xc50 [ 30.194791] krealloc_less_oob+0x20/0x38 [ 30.194968] kunit_try_run_case+0x170/0x3f0 [ 30.195019] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.195074] kthread+0x328/0x630 [ 30.195157] ret_from_fork+0x10/0x20 [ 30.195396] [ 30.195453] Allocated by task 189: [ 30.195481] kasan_save_stack+0x3c/0x68 [ 30.195524] kasan_save_track+0x20/0x40 [ 30.195561] kasan_save_alloc_info+0x40/0x58 [ 30.195637] __kasan_krealloc+0x118/0x178 [ 30.195693] krealloc_noprof+0x128/0x360 [ 30.195836] krealloc_less_oob_helper+0x168/0xc50 [ 30.196010] krealloc_less_oob+0x20/0x38 [ 30.196176] kunit_try_run_case+0x170/0x3f0 [ 30.196231] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.196311] kthread+0x328/0x630 [ 30.196516] ret_from_fork+0x10/0x20 [ 30.196758] [ 30.196779] The buggy address belongs to the object at fff00000c9554a00 [ 30.196779] which belongs to the cache kmalloc-256 of size 256 [ 30.196836] The buggy address is located 0 bytes to the right of [ 30.196836] allocated 201-byte region [fff00000c9554a00, fff00000c9554ac9) [ 30.197224] [ 30.197441] The buggy address belongs to the physical page: [ 30.197564] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109554 [ 30.197641] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.197794] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.197874] page_type: f5(slab) [ 30.197957] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.198076] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.198241] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.198337] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.198386] head: 0bfffe0000000001 ffffc1ffc3255501 00000000ffffffff 00000000ffffffff [ 30.198598] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.198656] page dumped because: kasan: bad access detected [ 30.198784] [ 30.198877] Memory state around the buggy address: [ 30.198910] fff00000c9554980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.198951] fff00000c9554a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.198994] >fff00000c9554a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.199037] ^ [ 30.199071] fff00000c9554b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.199507] fff00000c9554b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.199891] ================================================================== [ 30.267620] ================================================================== [ 30.267669] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 30.267722] Write of size 1 at addr fff00000c9a660d0 by task kunit_try_catch/193 [ 30.267769] [ 30.267801] CPU: 1 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.267881] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.267906] Hardware name: linux,dummy-virt (DT) [ 30.267934] Call trace: [ 30.267956] show_stack+0x20/0x38 (C) [ 30.268002] dump_stack_lvl+0x8c/0xd0 [ 30.268057] print_report+0x118/0x5d0 [ 30.268187] kasan_report+0xdc/0x128 [ 30.268299] __asan_report_store1_noabort+0x20/0x30 [ 30.268376] krealloc_less_oob_helper+0xb9c/0xc50 [ 30.268426] krealloc_large_less_oob+0x20/0x38 [ 30.268472] kunit_try_run_case+0x170/0x3f0 [ 30.268519] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.268766] kthread+0x328/0x630 [ 30.269081] ret_from_fork+0x10/0x20 [ 30.269387] [ 30.269467] The buggy address belongs to the physical page: [ 30.269737] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a64 [ 30.269858] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.269912] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.270006] page_type: f8(unknown) [ 30.270131] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.270251] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.270299] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.270356] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.270403] head: 0bfffe0000000002 ffffc1ffc3269901 00000000ffffffff 00000000ffffffff [ 30.270471] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.270508] page dumped because: kasan: bad access detected [ 30.270590] [ 30.270610] Memory state around the buggy address: [ 30.270832] fff00000c9a65f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.270911] fff00000c9a66000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.270953] >fff00000c9a66080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.271075] ^ [ 30.271212] fff00000c9a66100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.271252] fff00000c9a66180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.271288] ================================================================== [ 30.210549] ================================================================== [ 30.210603] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 30.210662] Write of size 1 at addr fff00000c9554ada by task kunit_try_catch/189 [ 30.210901] [ 30.210936] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.211016] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.211056] Hardware name: linux,dummy-virt (DT) [ 30.211193] Call trace: [ 30.211302] show_stack+0x20/0x38 (C) [ 30.211471] dump_stack_lvl+0x8c/0xd0 [ 30.211594] print_report+0x118/0x5d0 [ 30.211687] kasan_report+0xdc/0x128 [ 30.211803] __asan_report_store1_noabort+0x20/0x30 [ 30.211877] krealloc_less_oob_helper+0xa80/0xc50 [ 30.211952] krealloc_less_oob+0x20/0x38 [ 30.211997] kunit_try_run_case+0x170/0x3f0 [ 30.212049] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.212216] kthread+0x328/0x630 [ 30.212309] ret_from_fork+0x10/0x20 [ 30.212704] [ 30.212735] Allocated by task 189: [ 30.212767] kasan_save_stack+0x3c/0x68 [ 30.212965] kasan_save_track+0x20/0x40 [ 30.213025] kasan_save_alloc_info+0x40/0x58 [ 30.213061] __kasan_krealloc+0x118/0x178 [ 30.213382] krealloc_noprof+0x128/0x360 [ 30.213741] krealloc_less_oob_helper+0x168/0xc50 [ 30.213794] krealloc_less_oob+0x20/0x38 [ 30.214047] kunit_try_run_case+0x170/0x3f0 [ 30.214148] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.214195] kthread+0x328/0x630 [ 30.214591] ret_from_fork+0x10/0x20 [ 30.214675] [ 30.214696] The buggy address belongs to the object at fff00000c9554a00 [ 30.214696] which belongs to the cache kmalloc-256 of size 256 [ 30.214752] The buggy address is located 17 bytes to the right of [ 30.214752] allocated 201-byte region [fff00000c9554a00, fff00000c9554ac9) [ 30.214814] [ 30.214834] The buggy address belongs to the physical page: [ 30.215035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109554 [ 30.215408] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.215565] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.215641] page_type: f5(slab) [ 30.215917] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.215968] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.216016] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.216062] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.216109] head: 0bfffe0000000001 ffffc1ffc3255501 00000000ffffffff 00000000ffffffff [ 30.216155] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.216194] page dumped because: kasan: bad access detected [ 30.216280] [ 30.216300] Memory state around the buggy address: [ 30.216535] fff00000c9554980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.216914] fff00000c9554a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.217049] >fff00000c9554a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.217092] ^ [ 30.217129] fff00000c9554b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.217354] fff00000c9554b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.217485] ================================================================== [ 30.201100] ================================================================== [ 30.201150] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 30.201203] Write of size 1 at addr fff00000c9554ad0 by task kunit_try_catch/189 [ 30.201250] [ 30.201283] CPU: 1 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.201380] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.201406] Hardware name: linux,dummy-virt (DT) [ 30.201435] Call trace: [ 30.201458] show_stack+0x20/0x38 (C) [ 30.201506] dump_stack_lvl+0x8c/0xd0 [ 30.201678] print_report+0x118/0x5d0 [ 30.202446] kasan_report+0xdc/0x128 [ 30.202623] __asan_report_store1_noabort+0x20/0x30 [ 30.202774] krealloc_less_oob_helper+0xb9c/0xc50 [ 30.202853] krealloc_less_oob+0x20/0x38 [ 30.202906] kunit_try_run_case+0x170/0x3f0 [ 30.203507] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.203831] kthread+0x328/0x630 [ 30.204146] ret_from_fork+0x10/0x20 [ 30.204477] [ 30.204498] Allocated by task 189: [ 30.204598] kasan_save_stack+0x3c/0x68 [ 30.204800] kasan_save_track+0x20/0x40 [ 30.204867] kasan_save_alloc_info+0x40/0x58 [ 30.204979] __kasan_krealloc+0x118/0x178 [ 30.205034] krealloc_noprof+0x128/0x360 [ 30.205079] krealloc_less_oob_helper+0x168/0xc50 [ 30.205228] krealloc_less_oob+0x20/0x38 [ 30.205270] kunit_try_run_case+0x170/0x3f0 [ 30.205358] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.205397] kthread+0x328/0x630 [ 30.205428] ret_from_fork+0x10/0x20 [ 30.205462] [ 30.205481] The buggy address belongs to the object at fff00000c9554a00 [ 30.205481] which belongs to the cache kmalloc-256 of size 256 [ 30.205537] The buggy address is located 7 bytes to the right of [ 30.205537] allocated 201-byte region [fff00000c9554a00, fff00000c9554ac9) [ 30.206045] [ 30.206143] The buggy address belongs to the physical page: [ 30.206222] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109554 [ 30.206304] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.206364] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.206683] page_type: f5(slab) [ 30.206738] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.206842] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.206891] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.207186] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.207425] head: 0bfffe0000000001 ffffc1ffc3255501 00000000ffffffff 00000000ffffffff [ 30.207475] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.207514] page dumped because: kasan: bad access detected [ 30.207544] [ 30.207562] Memory state around the buggy address: [ 30.207749] fff00000c9554980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.207948] fff00000c9554a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.207991] >fff00000c9554a80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.208026] ^ [ 30.208062] fff00000c9554b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.208494] fff00000c9554b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.208536] ================================================================== [ 30.260097] ================================================================== [ 30.260548] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 30.260908] Write of size 1 at addr fff00000c9a660c9 by task kunit_try_catch/193 [ 30.260961] [ 30.260997] CPU: 1 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.261405] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.261440] Hardware name: linux,dummy-virt (DT) [ 30.261472] Call trace: [ 30.261494] show_stack+0x20/0x38 (C) [ 30.262023] dump_stack_lvl+0x8c/0xd0 [ 30.262104] print_report+0x118/0x5d0 [ 30.262148] kasan_report+0xdc/0x128 [ 30.262192] __asan_report_store1_noabort+0x20/0x30 [ 30.262241] krealloc_less_oob_helper+0xa48/0xc50 [ 30.262289] krealloc_large_less_oob+0x20/0x38 [ 30.262348] kunit_try_run_case+0x170/0x3f0 [ 30.262620] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.262701] kthread+0x328/0x630 [ 30.262828] ret_from_fork+0x10/0x20 [ 30.262925] [ 30.262946] The buggy address belongs to the physical page: [ 30.262995] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a64 [ 30.263222] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.263271] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.263349] page_type: f8(unknown) [ 30.263390] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.263599] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.263687] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.263842] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.263890] head: 0bfffe0000000002 ffffc1ffc3269901 00000000ffffffff 00000000ffffffff [ 30.263937] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.264033] page dumped because: kasan: bad access detected [ 30.264100] [ 30.264118] Memory state around the buggy address: [ 30.264156] fff00000c9a65f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.264422] fff00000c9a66000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.264582] >fff00000c9a66080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.264819] ^ [ 30.264859] fff00000c9a66100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.264980] fff00000c9a66180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.265064] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 30.239735] ================================================================== [ 30.240069] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 30.240268] Write of size 1 at addr fff00000c9a660eb by task kunit_try_catch/191 [ 30.240409] [ 30.240448] CPU: 1 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.240531] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.240557] Hardware name: linux,dummy-virt (DT) [ 30.240816] Call trace: [ 30.240851] show_stack+0x20/0x38 (C) [ 30.240906] dump_stack_lvl+0x8c/0xd0 [ 30.240953] print_report+0x118/0x5d0 [ 30.241332] kasan_report+0xdc/0x128 [ 30.241836] __asan_report_store1_noabort+0x20/0x30 [ 30.242287] krealloc_more_oob_helper+0x60c/0x678 [ 30.242352] krealloc_large_more_oob+0x20/0x38 [ 30.242401] kunit_try_run_case+0x170/0x3f0 [ 30.242448] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.242496] kthread+0x328/0x630 [ 30.243254] ret_from_fork+0x10/0x20 [ 30.243452] [ 30.243486] The buggy address belongs to the physical page: [ 30.243519] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a64 [ 30.243604] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.243652] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.243865] page_type: f8(unknown) [ 30.243912] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.243961] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.244008] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.244055] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.244634] head: 0bfffe0000000002 ffffc1ffc3269901 00000000ffffffff 00000000ffffffff [ 30.244887] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.244954] page dumped because: kasan: bad access detected [ 30.245060] [ 30.245078] Memory state around the buggy address: [ 30.245111] fff00000c9a65f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.245152] fff00000c9a66000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.245248] >fff00000c9a66080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 30.245821] ^ [ 30.245868] fff00000c9a66100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.245909] fff00000c9a66180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.246015] ================================================================== [ 30.174536] ================================================================== [ 30.174583] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 30.174745] Write of size 1 at addr fff00000c95548f0 by task kunit_try_catch/187 [ 30.174796] [ 30.174824] CPU: 1 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.174926] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.174961] Hardware name: linux,dummy-virt (DT) [ 30.174990] Call trace: [ 30.175012] show_stack+0x20/0x38 (C) [ 30.175066] dump_stack_lvl+0x8c/0xd0 [ 30.175112] print_report+0x118/0x5d0 [ 30.175179] kasan_report+0xdc/0x128 [ 30.175244] __asan_report_store1_noabort+0x20/0x30 [ 30.175310] krealloc_more_oob_helper+0x5c0/0x678 [ 30.175399] krealloc_more_oob+0x20/0x38 [ 30.175445] kunit_try_run_case+0x170/0x3f0 [ 30.175493] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.175803] kthread+0x328/0x630 [ 30.175846] ret_from_fork+0x10/0x20 [ 30.175892] [ 30.175910] Allocated by task 187: [ 30.175937] kasan_save_stack+0x3c/0x68 [ 30.176038] kasan_save_track+0x20/0x40 [ 30.176077] kasan_save_alloc_info+0x40/0x58 [ 30.176113] __kasan_krealloc+0x118/0x178 [ 30.176152] krealloc_noprof+0x128/0x360 [ 30.176207] krealloc_more_oob_helper+0x168/0x678 [ 30.176267] krealloc_more_oob+0x20/0x38 [ 30.176304] kunit_try_run_case+0x170/0x3f0 [ 30.176369] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.176416] kthread+0x328/0x630 [ 30.176451] ret_from_fork+0x10/0x20 [ 30.176504] [ 30.176551] The buggy address belongs to the object at fff00000c9554800 [ 30.176551] which belongs to the cache kmalloc-256 of size 256 [ 30.176607] The buggy address is located 5 bytes to the right of [ 30.176607] allocated 235-byte region [fff00000c9554800, fff00000c95548eb) [ 30.176669] [ 30.176688] The buggy address belongs to the physical page: [ 30.176717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109554 [ 30.176785] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.176849] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.177193] page_type: f5(slab) [ 30.177251] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.177316] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.177407] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.177503] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.177565] head: 0bfffe0000000001 ffffc1ffc3255501 00000000ffffffff 00000000ffffffff [ 30.177629] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.177667] page dumped because: kasan: bad access detected [ 30.177770] [ 30.177811] Memory state around the buggy address: [ 30.177888] fff00000c9554780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.177948] fff00000c9554800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.178012] >fff00000c9554880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 30.178047] ^ [ 30.178084] fff00000c9554900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.178124] fff00000c9554980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.178159] ================================================================== [ 30.247686] ================================================================== [ 30.247734] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 30.247786] Write of size 1 at addr fff00000c9a660f0 by task kunit_try_catch/191 [ 30.247834] [ 30.247867] CPU: 1 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.247948] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.247974] Hardware name: linux,dummy-virt (DT) [ 30.248005] Call trace: [ 30.248027] show_stack+0x20/0x38 (C) [ 30.248074] dump_stack_lvl+0x8c/0xd0 [ 30.248120] print_report+0x118/0x5d0 [ 30.248162] kasan_report+0xdc/0x128 [ 30.248204] __asan_report_store1_noabort+0x20/0x30 [ 30.248253] krealloc_more_oob_helper+0x5c0/0x678 [ 30.248312] krealloc_large_more_oob+0x20/0x38 [ 30.248384] kunit_try_run_case+0x170/0x3f0 [ 30.248562] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.248621] kthread+0x328/0x630 [ 30.248934] ret_from_fork+0x10/0x20 [ 30.249221] [ 30.249247] The buggy address belongs to the physical page: [ 30.249500] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a64 [ 30.249708] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.249892] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.250270] page_type: f8(unknown) [ 30.250339] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.250390] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.250438] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.250681] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.250734] head: 0bfffe0000000002 ffffc1ffc3269901 00000000ffffffff 00000000ffffffff [ 30.250781] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.250818] page dumped because: kasan: bad access detected [ 30.250925] [ 30.250945] Memory state around the buggy address: [ 30.251035] fff00000c9a65f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.251077] fff00000c9a66000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.251673] >fff00000c9a66080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 30.251789] ^ [ 30.251874] fff00000c9a66100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.251916] fff00000c9a66180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.251952] ================================================================== [ 30.168845] ================================================================== [ 30.168911] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 30.168973] Write of size 1 at addr fff00000c95548eb by task kunit_try_catch/187 [ 30.169104] [ 30.169173] CPU: 1 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.169352] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.169581] Hardware name: linux,dummy-virt (DT) [ 30.169628] Call trace: [ 30.169652] show_stack+0x20/0x38 (C) [ 30.169707] dump_stack_lvl+0x8c/0xd0 [ 30.169763] print_report+0x118/0x5d0 [ 30.169806] kasan_report+0xdc/0x128 [ 30.169850] __asan_report_store1_noabort+0x20/0x30 [ 30.169900] krealloc_more_oob_helper+0x60c/0x678 [ 30.170066] krealloc_more_oob+0x20/0x38 [ 30.170144] kunit_try_run_case+0x170/0x3f0 [ 30.170306] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.170411] kthread+0x328/0x630 [ 30.170565] ret_from_fork+0x10/0x20 [ 30.170921] [ 30.170966] Allocated by task 187: [ 30.171018] kasan_save_stack+0x3c/0x68 [ 30.171142] kasan_save_track+0x20/0x40 [ 30.171207] kasan_save_alloc_info+0x40/0x58 [ 30.171245] __kasan_krealloc+0x118/0x178 [ 30.171595] krealloc_noprof+0x128/0x360 [ 30.171697] krealloc_more_oob_helper+0x168/0x678 [ 30.171821] krealloc_more_oob+0x20/0x38 [ 30.171910] kunit_try_run_case+0x170/0x3f0 [ 30.171948] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.172240] kthread+0x328/0x630 [ 30.172314] ret_from_fork+0x10/0x20 [ 30.172361] [ 30.172381] The buggy address belongs to the object at fff00000c9554800 [ 30.172381] which belongs to the cache kmalloc-256 of size 256 [ 30.172594] The buggy address is located 0 bytes to the right of [ 30.172594] allocated 235-byte region [fff00000c9554800, fff00000c95548eb) [ 30.172691] [ 30.172773] The buggy address belongs to the physical page: [ 30.172830] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109554 [ 30.172940] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.172997] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.173065] page_type: f5(slab) [ 30.173218] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.173313] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.173460] head: 0bfffe0000000040 fff00000c0001b40 dead000000000100 dead000000000122 [ 30.173509] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.173556] head: 0bfffe0000000001 ffffc1ffc3255501 00000000ffffffff 00000000ffffffff [ 30.173602] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.173640] page dumped because: kasan: bad access detected [ 30.173670] [ 30.173687] Memory state around the buggy address: [ 30.173719] fff00000c9554780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.173760] fff00000c9554800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.173800] >fff00000c9554880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 30.173835] ^ [ 30.173872] fff00000c9554900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.173912] fff00000c9554980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.173948] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 30.157464] ================================================================== [ 30.157590] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 30.157661] Read of size 1 at addr fff00000c9aa0000 by task kunit_try_catch/185 [ 30.157720] [ 30.157760] CPU: 1 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.158061] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.158175] Hardware name: linux,dummy-virt (DT) [ 30.158286] Call trace: [ 30.158435] show_stack+0x20/0x38 (C) [ 30.158594] dump_stack_lvl+0x8c/0xd0 [ 30.158673] print_report+0x118/0x5d0 [ 30.158782] kasan_report+0xdc/0x128 [ 30.158881] __asan_report_load1_noabort+0x20/0x30 [ 30.159154] page_alloc_uaf+0x328/0x350 [ 30.159282] kunit_try_run_case+0x170/0x3f0 [ 30.159386] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.159525] kthread+0x328/0x630 [ 30.159621] ret_from_fork+0x10/0x20 [ 30.159982] [ 30.160030] The buggy address belongs to the physical page: [ 30.160168] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109aa0 [ 30.160282] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.160351] page_type: f0(buddy) [ 30.160546] raw: 0bfffe0000000000 fff00000ff616148 fff00000ff616148 0000000000000000 [ 30.160636] raw: 0000000000000000 0000000000000005 00000000f0000000 0000000000000000 [ 30.160749] page dumped because: kasan: bad access detected [ 30.160809] [ 30.160928] Memory state around the buggy address: [ 30.160966] fff00000c9a9ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.161041] fff00000c9a9ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.161280] >fff00000c9aa0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.161458] ^ [ 30.161515] fff00000c9aa0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.161592] fff00000c9aa0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.161670] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree
[ 30.137282] ================================================================== [ 30.137395] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 30.137551] Free of addr fff00000c91b4001 by task kunit_try_catch/181 [ 30.137650] [ 30.137688] CPU: 1 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.137772] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.137798] Hardware name: linux,dummy-virt (DT) [ 30.137829] Call trace: [ 30.137852] show_stack+0x20/0x38 (C) [ 30.137903] dump_stack_lvl+0x8c/0xd0 [ 30.137971] print_report+0x118/0x5d0 [ 30.138016] kasan_report_invalid_free+0xc0/0xe8 [ 30.138062] __kasan_kfree_large+0x5c/0xa8 [ 30.138110] free_large_kmalloc+0x68/0x150 [ 30.138157] kfree+0x270/0x3c8 [ 30.138199] kmalloc_large_invalid_free+0x108/0x270 [ 30.138247] kunit_try_run_case+0x170/0x3f0 [ 30.138296] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.138370] kthread+0x328/0x630 [ 30.138447] ret_from_fork+0x10/0x20 [ 30.138575] [ 30.138630] The buggy address belongs to the physical page: [ 30.138678] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b4 [ 30.138779] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.138897] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.139013] page_type: f8(unknown) [ 30.139131] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.139183] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.139495] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.139610] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.139739] head: 0bfffe0000000002 ffffc1ffc3246d01 00000000ffffffff 00000000ffffffff [ 30.139837] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.139966] page dumped because: kasan: bad access detected [ 30.139997] [ 30.140015] Memory state around the buggy address: [ 30.140046] fff00000c91b3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.140129] fff00000c91b3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.140338] >fff00000c91b4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.140549] ^ [ 30.140606] fff00000c91b4080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.140646] fff00000c91b4100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.140762] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 30.129762] ================================================================== [ 30.129829] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 30.129890] Read of size 1 at addr fff00000c91b4000 by task kunit_try_catch/179 [ 30.129939] [ 30.129977] CPU: 1 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.130061] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.130088] Hardware name: linux,dummy-virt (DT) [ 30.130134] Call trace: [ 30.130190] show_stack+0x20/0x38 (C) [ 30.130242] dump_stack_lvl+0x8c/0xd0 [ 30.130289] print_report+0x118/0x5d0 [ 30.130344] kasan_report+0xdc/0x128 [ 30.130385] __asan_report_load1_noabort+0x20/0x30 [ 30.130432] kmalloc_large_uaf+0x2cc/0x2f8 [ 30.130476] kunit_try_run_case+0x170/0x3f0 [ 30.130524] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.130592] kthread+0x328/0x630 [ 30.130644] ret_from_fork+0x10/0x20 [ 30.130699] [ 30.130736] The buggy address belongs to the physical page: [ 30.130774] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b4 [ 30.130827] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.130904] raw: 0bfffe0000000000 fff00000da478d00 fff00000da478d00 0000000000000000 [ 30.130962] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 30.131000] page dumped because: kasan: bad access detected [ 30.131047] [ 30.131065] Memory state around the buggy address: [ 30.131097] fff00000c91b3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.131137] fff00000c91b3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.131177] >fff00000c91b4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.131213] ^ [ 30.131265] fff00000c91b4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.131305] fff00000c91b4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.131350] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 30.119275] ================================================================== [ 30.119936] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 30.120025] Write of size 1 at addr fff00000c9a0e00a by task kunit_try_catch/177 [ 30.120180] [ 30.120225] CPU: 1 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.120369] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.120429] Hardware name: linux,dummy-virt (DT) [ 30.120463] Call trace: [ 30.120488] show_stack+0x20/0x38 (C) [ 30.120698] dump_stack_lvl+0x8c/0xd0 [ 30.120767] print_report+0x118/0x5d0 [ 30.120863] kasan_report+0xdc/0x128 [ 30.120930] __asan_report_store1_noabort+0x20/0x30 [ 30.121030] kmalloc_large_oob_right+0x278/0x2b8 [ 30.121098] kunit_try_run_case+0x170/0x3f0 [ 30.121147] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.121213] kthread+0x328/0x630 [ 30.121258] ret_from_fork+0x10/0x20 [ 30.121520] [ 30.121727] The buggy address belongs to the physical page: [ 30.121776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a0c [ 30.121893] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.121960] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.122026] page_type: f8(unknown) [ 30.122192] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.122241] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.122448] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.122582] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.122677] head: 0bfffe0000000002 ffffc1ffc3268301 00000000ffffffff 00000000ffffffff [ 30.122805] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.122843] page dumped because: kasan: bad access detected [ 30.123020] [ 30.123053] Memory state around the buggy address: [ 30.123087] fff00000c9a0df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.123130] fff00000c9a0df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.123226] >fff00000c9a0e000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.123309] ^ [ 30.123426] fff00000c9a0e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.123478] fff00000c9a0e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.123743] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 30.105280] ================================================================== [ 30.105386] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 30.105571] Write of size 1 at addr fff00000c9a71f00 by task kunit_try_catch/175 [ 30.105677] [ 30.105789] CPU: 1 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.105914] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.105946] Hardware name: linux,dummy-virt (DT) [ 30.105981] Call trace: [ 30.106005] show_stack+0x20/0x38 (C) [ 30.106058] dump_stack_lvl+0x8c/0xd0 [ 30.106107] print_report+0x118/0x5d0 [ 30.106151] kasan_report+0xdc/0x128 [ 30.106194] __asan_report_store1_noabort+0x20/0x30 [ 30.106244] kmalloc_big_oob_right+0x2a4/0x2f0 [ 30.106292] kunit_try_run_case+0x170/0x3f0 [ 30.106353] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.106449] kthread+0x328/0x630 [ 30.106533] ret_from_fork+0x10/0x20 [ 30.106711] [ 30.106764] Allocated by task 175: [ 30.106831] kasan_save_stack+0x3c/0x68 [ 30.106959] kasan_save_track+0x20/0x40 [ 30.107047] kasan_save_alloc_info+0x40/0x58 [ 30.107145] __kasan_kmalloc+0xd4/0xd8 [ 30.107257] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.107418] kmalloc_big_oob_right+0xb8/0x2f0 [ 30.107468] kunit_try_run_case+0x170/0x3f0 [ 30.107549] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.107630] kthread+0x328/0x630 [ 30.107943] ret_from_fork+0x10/0x20 [ 30.108082] [ 30.108112] The buggy address belongs to the object at fff00000c9a70000 [ 30.108112] which belongs to the cache kmalloc-8k of size 8192 [ 30.108222] The buggy address is located 0 bytes to the right of [ 30.108222] allocated 7936-byte region [fff00000c9a70000, fff00000c9a71f00) [ 30.108347] [ 30.108402] The buggy address belongs to the physical page: [ 30.108459] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a70 [ 30.108546] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.108855] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.108962] page_type: f5(slab) [ 30.109419] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 30.109488] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 30.109565] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 30.109652] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 30.109737] head: 0bfffe0000000003 ffffc1ffc3269c01 00000000ffffffff 00000000ffffffff [ 30.109784] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 30.109848] page dumped because: kasan: bad access detected [ 30.109879] [ 30.109897] Memory state around the buggy address: [ 30.109930] fff00000c9a71e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.110125] fff00000c9a71e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.110299] >fff00000c9a71f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.110398] ^ [ 30.110467] fff00000c9a71f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.110553] fff00000c9a72000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.110614] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[ 30.091483] ================================================================== [ 30.091548] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 30.091611] Write of size 1 at addr fff00000c91b3478 by task kunit_try_catch/173 [ 30.091661] [ 30.091699] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.091781] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.091807] Hardware name: linux,dummy-virt (DT) [ 30.091838] Call trace: [ 30.091861] show_stack+0x20/0x38 (C) [ 30.091910] dump_stack_lvl+0x8c/0xd0 [ 30.091956] print_report+0x118/0x5d0 [ 30.091999] kasan_report+0xdc/0x128 [ 30.092041] __asan_report_store1_noabort+0x20/0x30 [ 30.092132] kmalloc_track_caller_oob_right+0x40c/0x488 [ 30.092186] kunit_try_run_case+0x170/0x3f0 [ 30.092301] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.092371] kthread+0x328/0x630 [ 30.092432] ret_from_fork+0x10/0x20 [ 30.092493] [ 30.092512] Allocated by task 173: [ 30.092559] kasan_save_stack+0x3c/0x68 [ 30.092628] kasan_save_track+0x20/0x40 [ 30.092667] kasan_save_alloc_info+0x40/0x58 [ 30.092703] __kasan_kmalloc+0xd4/0xd8 [ 30.092739] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 30.092800] kmalloc_track_caller_oob_right+0xa8/0x488 [ 30.092869] kunit_try_run_case+0x170/0x3f0 [ 30.092926] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.092994] kthread+0x328/0x630 [ 30.093060] ret_from_fork+0x10/0x20 [ 30.093095] [ 30.093113] The buggy address belongs to the object at fff00000c91b3400 [ 30.093113] which belongs to the cache kmalloc-128 of size 128 [ 30.093185] The buggy address is located 0 bytes to the right of [ 30.093185] allocated 120-byte region [fff00000c91b3400, fff00000c91b3478) [ 30.093466] [ 30.093596] The buggy address belongs to the physical page: [ 30.093706] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b3 [ 30.093822] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.093892] page_type: f5(slab) [ 30.093970] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.094020] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.094058] page dumped because: kasan: bad access detected [ 30.094112] [ 30.094130] Memory state around the buggy address: [ 30.094162] fff00000c91b3300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.094203] fff00000c91b3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.094243] >fff00000c91b3400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.094279] ^ [ 30.094317] fff00000c91b3480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.094367] fff00000c91b3500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.094403] ================================================================== [ 30.095650] ================================================================== [ 30.095714] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488 [ 30.095771] Write of size 1 at addr fff00000c91b3578 by task kunit_try_catch/173 [ 30.095966] [ 30.096035] CPU: 1 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.096117] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.096205] Hardware name: linux,dummy-virt (DT) [ 30.096255] Call trace: [ 30.096293] show_stack+0x20/0x38 (C) [ 30.096373] dump_stack_lvl+0x8c/0xd0 [ 30.096440] print_report+0x118/0x5d0 [ 30.096485] kasan_report+0xdc/0x128 [ 30.096529] __asan_report_store1_noabort+0x20/0x30 [ 30.096603] kmalloc_track_caller_oob_right+0x418/0x488 [ 30.096670] kunit_try_run_case+0x170/0x3f0 [ 30.096737] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.096786] kthread+0x328/0x630 [ 30.096842] ret_from_fork+0x10/0x20 [ 30.096909] [ 30.096928] Allocated by task 173: [ 30.096955] kasan_save_stack+0x3c/0x68 [ 30.097011] kasan_save_track+0x20/0x40 [ 30.097073] kasan_save_alloc_info+0x40/0x58 [ 30.097110] __kasan_kmalloc+0xd4/0xd8 [ 30.097157] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 30.097207] kmalloc_track_caller_oob_right+0x184/0x488 [ 30.097252] kunit_try_run_case+0x170/0x3f0 [ 30.097397] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.097524] kthread+0x328/0x630 [ 30.097602] ret_from_fork+0x10/0x20 [ 30.097756] [ 30.097857] The buggy address belongs to the object at fff00000c91b3500 [ 30.097857] which belongs to the cache kmalloc-128 of size 128 [ 30.097963] The buggy address is located 0 bytes to the right of [ 30.097963] allocated 120-byte region [fff00000c91b3500, fff00000c91b3578) [ 30.098114] [ 30.098193] The buggy address belongs to the physical page: [ 30.098291] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b3 [ 30.098406] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.098460] page_type: f5(slab) [ 30.098502] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.098557] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.098603] page dumped because: kasan: bad access detected [ 30.098840] [ 30.098952] Memory state around the buggy address: [ 30.099101] fff00000c91b3400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.099168] fff00000c91b3480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.099214] >fff00000c91b3500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.099257] ^ [ 30.099303] fff00000c91b3580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.099359] fff00000c91b3600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.099401] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 30.082538] ================================================================== [ 30.082613] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 30.082677] Read of size 1 at addr fff00000c984f000 by task kunit_try_catch/171 [ 30.082727] [ 30.082764] CPU: 1 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.082930] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.083003] Hardware name: linux,dummy-virt (DT) [ 30.083059] Call trace: [ 30.083100] show_stack+0x20/0x38 (C) [ 30.083167] dump_stack_lvl+0x8c/0xd0 [ 30.083222] print_report+0x118/0x5d0 [ 30.083290] kasan_report+0xdc/0x128 [ 30.083344] __asan_report_load1_noabort+0x20/0x30 [ 30.083392] kmalloc_node_oob_right+0x2f4/0x330 [ 30.083446] kunit_try_run_case+0x170/0x3f0 [ 30.083513] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.083582] kthread+0x328/0x630 [ 30.083641] ret_from_fork+0x10/0x20 [ 30.083734] [ 30.083753] Allocated by task 171: [ 30.083781] kasan_save_stack+0x3c/0x68 [ 30.083829] kasan_save_track+0x20/0x40 [ 30.083875] kasan_save_alloc_info+0x40/0x58 [ 30.084156] __kasan_kmalloc+0xd4/0xd8 [ 30.084231] __kmalloc_cache_node_noprof+0x178/0x3d0 [ 30.084292] kmalloc_node_oob_right+0xbc/0x330 [ 30.084359] kunit_try_run_case+0x170/0x3f0 [ 30.084403] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.084475] kthread+0x328/0x630 [ 30.084523] ret_from_fork+0x10/0x20 [ 30.084558] [ 30.084577] The buggy address belongs to the object at fff00000c984e000 [ 30.084577] which belongs to the cache kmalloc-4k of size 4096 [ 30.084651] The buggy address is located 0 bytes to the right of [ 30.084651] allocated 4096-byte region [fff00000c984e000, fff00000c984f000) [ 30.084730] [ 30.084769] The buggy address belongs to the physical page: [ 30.084844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109848 [ 30.085001] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.085050] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.085221] page_type: f5(slab) [ 30.085335] raw: 0bfffe0000000040 fff00000c0002140 dead000000000100 dead000000000122 [ 30.085424] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 30.085484] head: 0bfffe0000000040 fff00000c0002140 dead000000000100 dead000000000122 [ 30.085610] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 30.085692] head: 0bfffe0000000003 ffffc1ffc3261201 00000000ffffffff 00000000ffffffff [ 30.085842] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 30.085933] page dumped because: kasan: bad access detected [ 30.086042] [ 30.086114] Memory state around the buggy address: [ 30.086199] fff00000c984ef00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.087019] fff00000c984ef80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.087073] >fff00000c984f000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.087109] ^ [ 30.087137] fff00000c984f080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.087177] fff00000c984f100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.087213] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 30.072525] ================================================================== [ 30.072697] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 30.072764] Read of size 1 at addr fff00000c918c5df by task kunit_try_catch/169 [ 30.072839] [ 30.072878] CPU: 1 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.073068] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.073138] Hardware name: linux,dummy-virt (DT) [ 30.073206] Call trace: [ 30.073281] show_stack+0x20/0x38 (C) [ 30.073363] dump_stack_lvl+0x8c/0xd0 [ 30.073529] print_report+0x118/0x5d0 [ 30.073651] kasan_report+0xdc/0x128 [ 30.073726] __asan_report_load1_noabort+0x20/0x30 [ 30.073774] kmalloc_oob_left+0x2ec/0x320 [ 30.073819] kunit_try_run_case+0x170/0x3f0 [ 30.073888] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.073938] kthread+0x328/0x630 [ 30.073981] ret_from_fork+0x10/0x20 [ 30.074036] [ 30.074054] Allocated by task 21: [ 30.074084] kasan_save_stack+0x3c/0x68 [ 30.074125] kasan_save_track+0x20/0x40 [ 30.074162] kasan_save_alloc_info+0x40/0x58 [ 30.074198] __kasan_kmalloc+0xd4/0xd8 [ 30.074234] __kmalloc_cache_node_noprof+0x178/0x3d0 [ 30.074276] build_sched_domains+0x32c/0x3768 [ 30.074318] partition_sched_domains+0x79c/0x1098 [ 30.074369] rebuild_sched_domains_locked+0x494/0xde0 [ 30.074424] cpuset_handle_hotplug+0xab0/0x1480 [ 30.074501] cpuset_update_active_cpus+0x18/0x30 [ 30.074581] sched_cpu_activate+0x2d0/0x388 [ 30.074655] cpuhp_invoke_callback+0x5b8/0x1620 [ 30.074746] cpuhp_thread_fun+0x230/0x5d8 [ 30.074804] smpboot_thread_fn+0x2e8/0x760 [ 30.074915] kthread+0x328/0x630 [ 30.074967] ret_from_fork+0x10/0x20 [ 30.075003] [ 30.075057] Freed by task 21: [ 30.075294] kasan_save_stack+0x3c/0x68 [ 30.075383] kasan_save_track+0x20/0x40 [ 30.075523] kasan_save_free_info+0x4c/0x78 [ 30.075619] __kasan_slab_free+0x6c/0x98 [ 30.075706] kfree+0x214/0x3c8 [ 30.075797] build_sched_domains+0x1c64/0x3768 [ 30.075844] partition_sched_domains+0x79c/0x1098 [ 30.075884] rebuild_sched_domains_locked+0x494/0xde0 [ 30.075968] cpuset_handle_hotplug+0xab0/0x1480 [ 30.076214] cpuset_update_active_cpus+0x18/0x30 [ 30.076252] sched_cpu_activate+0x2d0/0x388 [ 30.076289] cpuhp_invoke_callback+0x5b8/0x1620 [ 30.076342] cpuhp_thread_fun+0x230/0x5d8 [ 30.076383] smpboot_thread_fn+0x2e8/0x760 [ 30.076422] kthread+0x328/0x630 [ 30.076454] ret_from_fork+0x10/0x20 [ 30.076503] [ 30.076529] The buggy address belongs to the object at fff00000c918c5c0 [ 30.076529] which belongs to the cache kmalloc-16 of size 16 [ 30.076596] The buggy address is located 15 bytes to the right of [ 30.076596] allocated 16-byte region [fff00000c918c5c0, fff00000c918c5d0) [ 30.076668] [ 30.076689] The buggy address belongs to the physical page: [ 30.076719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10918c [ 30.076780] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.076838] page_type: f5(slab) [ 30.076880] raw: 0bfffe0000000000 fff00000c0001640 dead000000000100 dead000000000122 [ 30.076929] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 30.076979] page dumped because: kasan: bad access detected [ 30.077014] [ 30.077032] Memory state around the buggy address: [ 30.077080] fff00000c918c480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.077123] fff00000c918c500: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 30.077172] >fff00000c918c580: fa fb fc fc fa fb fc fc fa fb fc fc 00 07 fc fc [ 30.077219] ^ [ 30.077271] fff00000c918c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.077310] fff00000c918c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.077355] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 30.047575] ================================================================== [ 30.047918] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 30.048739] Write of size 1 at addr fff00000c91b3373 by task kunit_try_catch/167 [ 30.048906] [ 30.050334] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.050506] Tainted: [N]=TEST [ 30.050539] Hardware name: linux,dummy-virt (DT) [ 30.050758] Call trace: [ 30.051618] show_stack+0x20/0x38 (C) [ 30.051863] dump_stack_lvl+0x8c/0xd0 [ 30.051918] print_report+0x118/0x5d0 [ 30.051962] kasan_report+0xdc/0x128 [ 30.052005] __asan_report_store1_noabort+0x20/0x30 [ 30.052052] kmalloc_oob_right+0x5a4/0x660 [ 30.052098] kunit_try_run_case+0x170/0x3f0 [ 30.052150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.052199] kthread+0x328/0x630 [ 30.052242] ret_from_fork+0x10/0x20 [ 30.052526] [ 30.052657] Allocated by task 167: [ 30.052957] kasan_save_stack+0x3c/0x68 [ 30.053541] kasan_save_track+0x20/0x40 [ 30.053637] kasan_save_alloc_info+0x40/0x58 [ 30.053865] __kasan_kmalloc+0xd4/0xd8 [ 30.053902] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.053944] kmalloc_oob_right+0xb0/0x660 [ 30.053980] kunit_try_run_case+0x170/0x3f0 [ 30.054018] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.054057] kthread+0x328/0x630 [ 30.054090] ret_from_fork+0x10/0x20 [ 30.054470] [ 30.054694] The buggy address belongs to the object at fff00000c91b3300 [ 30.054694] which belongs to the cache kmalloc-128 of size 128 [ 30.054852] The buggy address is located 0 bytes to the right of [ 30.054852] allocated 115-byte region [fff00000c91b3300, fff00000c91b3373) [ 30.054956] [ 30.055297] The buggy address belongs to the physical page: [ 30.055606] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b3 [ 30.055942] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.056315] page_type: f5(slab) [ 30.056622] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.056682] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.056785] page dumped because: kasan: bad access detected [ 30.056824] [ 30.056850] Memory state around the buggy address: [ 30.057073] fff00000c91b3200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.057138] fff00000c91b3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.057189] >fff00000c91b3300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.057240] ^ [ 30.057319] fff00000c91b3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.057468] fff00000c91b3400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.057546] ================================================================== [ 30.058713] ================================================================== [ 30.058773] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 30.058826] Write of size 1 at addr fff00000c91b3378 by task kunit_try_catch/167 [ 30.058913] [ 30.058963] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.059070] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.059107] Hardware name: linux,dummy-virt (DT) [ 30.059156] Call trace: [ 30.059196] show_stack+0x20/0x38 (C) [ 30.059255] dump_stack_lvl+0x8c/0xd0 [ 30.059340] print_report+0x118/0x5d0 [ 30.059406] kasan_report+0xdc/0x128 [ 30.059487] __asan_report_store1_noabort+0x20/0x30 [ 30.059553] kmalloc_oob_right+0x538/0x660 [ 30.059620] kunit_try_run_case+0x170/0x3f0 [ 30.059668] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.059735] kthread+0x328/0x630 [ 30.059779] ret_from_fork+0x10/0x20 [ 30.059846] [ 30.059874] Allocated by task 167: [ 30.059902] kasan_save_stack+0x3c/0x68 [ 30.059957] kasan_save_track+0x20/0x40 [ 30.059995] kasan_save_alloc_info+0x40/0x58 [ 30.060030] __kasan_kmalloc+0xd4/0xd8 [ 30.060153] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.060203] kmalloc_oob_right+0xb0/0x660 [ 30.060272] kunit_try_run_case+0x170/0x3f0 [ 30.060395] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.060461] kthread+0x328/0x630 [ 30.060495] ret_from_fork+0x10/0x20 [ 30.060590] [ 30.060651] The buggy address belongs to the object at fff00000c91b3300 [ 30.060651] which belongs to the cache kmalloc-128 of size 128 [ 30.060711] The buggy address is located 5 bytes to the right of [ 30.060711] allocated 115-byte region [fff00000c91b3300, fff00000c91b3373) [ 30.061016] [ 30.061062] The buggy address belongs to the physical page: [ 30.061103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b3 [ 30.061201] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.061254] page_type: f5(slab) [ 30.061294] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.061413] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.061458] page dumped because: kasan: bad access detected [ 30.061489] [ 30.061536] Memory state around the buggy address: [ 30.061843] fff00000c91b3200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.061918] fff00000c91b3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.062063] >fff00000c91b3300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.062102] ^ [ 30.062142] fff00000c91b3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.062182] fff00000c91b3400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.062226] ================================================================== [ 30.062777] ================================================================== [ 30.062825] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 30.062903] Read of size 1 at addr fff00000c91b3380 by task kunit_try_catch/167 [ 30.062969] [ 30.063007] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 30.063115] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.063142] Hardware name: linux,dummy-virt (DT) [ 30.063179] Call trace: [ 30.063218] show_stack+0x20/0x38 (C) [ 30.063284] dump_stack_lvl+0x8c/0xd0 [ 30.063344] print_report+0x118/0x5d0 [ 30.063387] kasan_report+0xdc/0x128 [ 30.063648] __asan_report_load1_noabort+0x20/0x30 [ 30.063719] kmalloc_oob_right+0x5d0/0x660 [ 30.063775] kunit_try_run_case+0x170/0x3f0 [ 30.063841] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.063910] kthread+0x328/0x630 [ 30.063958] ret_from_fork+0x10/0x20 [ 30.064035] [ 30.064094] Allocated by task 167: [ 30.064141] kasan_save_stack+0x3c/0x68 [ 30.064200] kasan_save_track+0x20/0x40 [ 30.064239] kasan_save_alloc_info+0x40/0x58 [ 30.064277] __kasan_kmalloc+0xd4/0xd8 [ 30.064425] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.064466] kmalloc_oob_right+0xb0/0x660 [ 30.064546] kunit_try_run_case+0x170/0x3f0 [ 30.064594] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.064717] kthread+0x328/0x630 [ 30.064779] ret_from_fork+0x10/0x20 [ 30.064815] [ 30.064833] The buggy address belongs to the object at fff00000c91b3300 [ 30.064833] which belongs to the cache kmalloc-128 of size 128 [ 30.064920] The buggy address is located 13 bytes to the right of [ 30.064920] allocated 115-byte region [fff00000c91b3300, fff00000c91b3373) [ 30.064993] [ 30.065032] The buggy address belongs to the physical page: [ 30.065061] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1091b3 [ 30.065113] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.065280] page_type: f5(slab) [ 30.065319] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.065440] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.065629] page dumped because: kasan: bad access detected [ 30.065744] [ 30.065795] Memory state around the buggy address: [ 30.065884] fff00000c91b3280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.065936] fff00000c91b3300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.065977] >fff00000c91b3380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.066012] ^ [ 30.066055] fff00000c91b3400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.066094] fff00000c91b3480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.066131] ==================================================================
Failure - log-parser-boot/exception-warning-libmathint_log-at-intlog10
------------[ cut here ]------------ [ 109.357509] WARNING: lib/math/int_log.c:120 at intlog10+0x38/0x48, CPU#0: kunit_try_catch/689 [ 109.358237] Modules linked in: [ 109.358470] CPU: 0 UID: 0 PID: 689 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 109.358891] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 109.359126] Hardware name: linux,dummy-virt (DT) [ 109.359345] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 109.360527] pc : intlog10+0x38/0x48 [ 109.360944] lr : intlog10_test+0xe4/0x200 [ 109.361436] sp : ffff800082327c10 [ 109.361850] x29: ffff800082327c90 x28: 0000000000000000 x27: 0000000000000000 [ 109.362620] x26: 1ffe00001936a341 x25: 0000000000000000 x24: ffff800082327ce0 [ 109.363390] x23: ffff800082327d00 x22: 0000000000000000 x21: 1ffff00010464f82 [ 109.364137] x20: ffff93639182f1e0 x19: ffff800080087990 x18: 000000004796e5d8 [ 109.364888] x17: 0000000045f92f04 x16: 00000000fc69f4a8 x15: 00000000111b5a35 [ 109.365721] x14: 000000007025431d x13: 1ffe00001b48a599 x12: ffff726c72ae2f89 [ 109.366501] x11: 1ffff26c72ae2f88 x10: ffff726c72ae2f88 x9 : ffff93638ee49824 [ 109.367233] x8 : ffff936395717c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 109.367982] x5 : ffff700010464f82 x4 : 1ffff00010010f3b x3 : 1ffff26c72305e3c [ 109.368746] x2 : 1ffff26c72305e3c x1 : 0000000000000003 x0 : 0000000000000000 [ 109.369528] Call trace: [ 109.369808] intlog10+0x38/0x48 (P) [ 109.370094] kunit_try_run_case+0x170/0x3f0 [ 109.370581] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 109.370865] kthread+0x328/0x630 [ 109.371061] ret_from_fork+0x10/0x20 [ 109.371254] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-libmathint_log-at-intlog2
------------[ cut here ]------------ [ 109.305071] WARNING: lib/math/int_log.c:63 at intlog2+0xd8/0xf8, CPU#1: kunit_try_catch/671 [ 109.308557] Modules linked in: [ 109.308812] CPU: 1 UID: 0 PID: 671 Comm: kunit_try_catch Tainted: G B D N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 109.310319] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 109.310891] Hardware name: linux,dummy-virt (DT) [ 109.311302] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 109.311872] pc : intlog2+0xd8/0xf8 [ 109.312262] lr : intlog2_test+0xe4/0x200 [ 109.312666] sp : ffff800082307c10 [ 109.313019] x29: ffff800082307c90 x28: 0000000000000000 x27: 0000000000000000 [ 109.313852] x26: 1ffe00001934b581 x25: 0000000000000000 x24: ffff800082307ce0 [ 109.314334] x23: ffff800082307d00 x22: 0000000000000000 x21: 1ffff00010460f82 [ 109.314916] x20: ffff93639182f0e0 x19: ffff800080087990 x18: 0000000099cebe45 [ 109.315276] x17: 000000009e1cf3fb x16: fff00000c643103c x15: 00000000411e8858 [ 109.315777] x14: 00000000f1f1f1f1 x13: 1ffe00001b48a5dd x12: ffff726c72ae2f89 [ 109.316243] x11: 1ffff26c72ae2f88 x10: ffff726c72ae2f88 x9 : ffff93638ee49a24 [ 109.316697] x8 : ffff936395717c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 109.317151] x5 : ffff700010460f82 x4 : 1ffff00010010f3b x3 : 1ffff26c72305e1c [ 109.317749] x2 : 1ffff26c72305e1c x1 : 0000000000000003 x0 : 0000000000000000 [ 109.318332] Call trace: [ 109.318625] intlog2+0xd8/0xf8 (P) [ 109.318832] kunit_try_run_case+0x170/0x3f0 [ 109.319297] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 109.319857] kthread+0x328/0x630 [ 109.320240] ret_from_fork+0x10/0x20 [ 109.320693] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/internal-error-oops-oops-smp
KNOWN ISSUE - qemu-arm64: Internal error: Oops at kunit_test_null_dereference - kunit_generic_run_threadfn_adapter
[ 108.371686] Internal error: Oops: 0000000096000005 [#1] SMP [ 108.376594] Modules linked in: [ 108.377320] CPU: 1 UID: 0 PID: 563 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 108.378482] Tainted: [B]=BAD_PAGE, [N]=TEST [ 108.379001] Hardware name: linux,dummy-virt (DT) [ 108.379678] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 108.380555] pc : kunit_test_null_dereference+0x70/0x170 [ 108.381242] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 108.381950] sp : ffff800082187d30 [ 108.382401] x29: ffff800082187d90 x28: 0000000000000000 x27: 0000000000000000 [ 108.383377] x26: 1ffe00001923c261 x25: 0000000000000000 x24: 0000000000000004 [ 108.384270] x23: fff00000c91e130c x22: ffff93638ee362b0 x21: fff00000c1c95108 [ 108.385114] x20: 1ffff00010430fa6 x19: ffff800080087990 x18: 00000000ccca47cc [ 108.385903] x17: 0000000000000001 x16: fff00000c643103c x15: fff00000ff616b48 [ 108.386720] x14: 0000000000018fff x13: 1ffe00001b48a5dd x12: fffd800018f9bdc4 [ 108.387460] x11: 1ffe000018f9bdc3 x10: fffd800018f9bdc3 x9 : ffff93638ee2da40 [ 108.388357] x8 : ffff800082187c18 x7 : 0000000000000001 x6 : 0000000041b58ab3 [ 108.389354] x5 : ffff700010430fa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 108.389845] x2 : dfff800000000000 x1 : fff00000c7cde540 x0 : ffff800080087990 [ 108.390462] Call trace: [ 108.390809] kunit_test_null_dereference+0x70/0x170 (P) [ 108.391409] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 108.391977] kthread+0x328/0x630 [ 108.392361] ret_from_fork+0x10/0x20 [ 108.393007] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 108.393928] ---[ end trace 0000000000000000 ]---