Date
July 11, 2025, 10:11 a.m.
Failure - log-parser-boot/panic-multiline-kernel-panic-not-syncing-vfs-unable-to-mount-root-fs-on-unknown-block
[ 283.324941] Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0) [ 283.333158] SMP: stopping secondary CPUs [ 283.337081] Kernel Offset: disabled [ 283.340532] CPU features: 0x20000,00000000,10023140,0400721b [ 283.346174] Memory Limit: none [ 283.349246] ---[ end Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0) ]---
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc
[ 117.649137] ================================================================== [ 117.649260] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 117.649260] [ 117.649407] Use-after-free read at 0x(____ptrval____) (in kfence-#228): [ 117.649516] test_krealloc+0x51c/0x830 [ 117.652660] kunit_try_run_case+0x170/0x3f0 [ 117.656827] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 117.662296] kthread+0x328/0x630 [ 117.665507] ret_from_fork+0x10/0x20 [ 117.669066] [ 117.670545] kfence-#228: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 117.670545] [ 117.680180] allocated by task 421 on cpu 3 at 117.649048s (0.031129s ago): [ 117.687056] test_alloc+0x29c/0x628 [ 117.690507] test_krealloc+0xc0/0x830 [ 117.694153] kunit_try_run_case+0x170/0x3f0 [ 117.698320] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 117.703788] kthread+0x328/0x630 [ 117.707000] ret_from_fork+0x10/0x20 [ 117.710559] [ 117.712039] freed by task 421 on cpu 3 at 117.649075s (0.062959s ago): [ 117.718565] krealloc_noprof+0x148/0x360 [ 117.722451] test_krealloc+0x1dc/0x830 [ 117.726185] kunit_try_run_case+0x170/0x3f0 [ 117.730350] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 117.735819] kthread+0x328/0x630 [ 117.739031] ret_from_fork+0x10/0x20 [ 117.742591] [ 117.744076] CPU: 3 UID: 0 PID: 421 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 117.755187] Tainted: [B]=BAD_PAGE, [N]=TEST [ 117.759345] Hardware name: WinLink E850-96 board (DT) [ 117.764382] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[ 117.424346] ================================================================== [ 117.424491] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 117.424491] [ 117.424661] Use-after-free read at 0x(____ptrval____) (in kfence-#226): [ 117.425547] test_memcache_typesafe_by_rcu+0x280/0x560 [ 117.430667] kunit_try_run_case+0x170/0x3f0 [ 117.434834] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 117.440303] kthread+0x328/0x630 [ 117.443514] ret_from_fork+0x10/0x20 [ 117.447073] [ 117.448551] kfence-#226: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 117.448551] [ 117.457666] allocated by task 419 on cpu 3 at 117.381077s (0.076587s ago): [ 117.464540] test_alloc+0x230/0x628 [ 117.467993] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 117.473114] kunit_try_run_case+0x170/0x3f0 [ 117.477280] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 117.482749] kthread+0x328/0x630 [ 117.485961] ret_from_fork+0x10/0x20 [ 117.489520] [ 117.490998] freed by task 419 on cpu 3 at 117.381092s (0.109904s ago): [ 117.497521] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 117.502629] kunit_try_run_case+0x170/0x3f0 [ 117.506796] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 117.512263] kthread+0x328/0x630 [ 117.515474] ret_from_fork+0x10/0x20 [ 117.519035] [ 117.520520] CPU: 3 UID: 0 PID: 419 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 117.531630] Tainted: [B]=BAD_PAGE, [N]=TEST [ 117.535788] Hardware name: WinLink E850-96 board (DT) [ 117.540826] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access
[ 94.717731] ================================================================== [ 94.717934] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 94.717934] [ 94.718093] Invalid read at 0x(____ptrval____): [ 94.719198] test_invalid_access+0xdc/0x1f0 [ 94.723403] kunit_try_run_case+0x170/0x3f0 [ 94.727624] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 94.733237] kthread+0x328/0x630 [ 94.736210] ret_from_fork+0x10/0x20 [ 94.739915] [ 94.741335] CPU: 5 UID: 0 PID: 415 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 94.752446] Tainted: [B]=BAD_PAGE, [N]=TEST [ 94.756557] Hardware name: WinLink E850-96 board (DT) [ 94.761626] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[ 94.373131] ================================================================== [ 94.373266] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 94.373266] [ 94.373416] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#221): [ 94.377100] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 94.382306] kunit_try_run_case+0x170/0x3f0 [ 94.386473] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 94.391942] kthread+0x328/0x630 [ 94.395153] ret_from_fork+0x10/0x20 [ 94.398712] [ 94.400190] kfence-#221: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96 [ 94.400190] [ 94.409826] allocated by task 409 on cpu 4 at 94.373051s (0.036773s ago): [ 94.416613] test_alloc+0x29c/0x628 [ 94.420066] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 94.425187] kunit_try_run_case+0x170/0x3f0 [ 94.429354] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 94.434823] kthread+0x328/0x630 [ 94.438036] ret_from_fork+0x10/0x20 [ 94.441595] [ 94.443072] freed by task 409 on cpu 4 at 94.373067s (0.070002s ago): [ 94.449511] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 94.454703] kunit_try_run_case+0x170/0x3f0 [ 94.458868] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 94.464336] kthread+0x328/0x630 [ 94.467548] ret_from_fork+0x10/0x20 [ 94.471109] [ 94.472595] CPU: 4 UID: 0 PID: 409 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 94.483703] Tainted: [B]=BAD_PAGE, [N]=TEST [ 94.487861] Hardware name: WinLink E850-96 board (DT) [ 94.492899] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[ 94.165097] ================================================================== [ 94.165237] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 94.165237] [ 94.165402] Out-of-bounds read at 0x(____ptrval____) (105B right of kfence-#219): [ 94.167074] test_kmalloc_aligned_oob_read+0x238/0x468 [ 94.172195] kunit_try_run_case+0x170/0x3f0 [ 94.176362] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 94.181830] kthread+0x328/0x630 [ 94.185042] ret_from_fork+0x10/0x20 [ 94.188601] [ 94.190080] kfence-#219: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96 [ 94.190080] [ 94.199715] allocated by task 407 on cpu 5 at 94.165062s (0.034651s ago): [ 94.206501] test_alloc+0x29c/0x628 [ 94.209955] test_kmalloc_aligned_oob_read+0x100/0x468 [ 94.215076] kunit_try_run_case+0x170/0x3f0 [ 94.219243] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 94.224712] kthread+0x328/0x630 [ 94.227923] ret_from_fork+0x10/0x20 [ 94.231484] [ 94.232970] CPU: 5 UID: 0 PID: 407 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 94.244077] Tainted: [B]=BAD_PAGE, [N]=TEST [ 94.248237] Hardware name: WinLink E850-96 board (DT) [ 94.253275] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption
[ 87.989104] ================================================================== [ 87.989227] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 87.989227] [ 87.989361] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#160): [ 87.989527] test_corruption+0x284/0x378 [ 87.993061] kunit_try_run_case+0x170/0x3f0 [ 87.997227] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 88.002696] kthread+0x328/0x630 [ 88.005908] ret_from_fork+0x10/0x20 [ 88.009467] [ 88.010946] kfence-#160: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 88.010946] [ 88.020580] allocated by task 395 on cpu 4 at 87.989039s (0.031538s ago): [ 88.027365] test_alloc+0x29c/0x628 [ 88.030821] test_corruption+0x198/0x378 [ 88.034728] kunit_try_run_case+0x170/0x3f0 [ 88.038893] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 88.044362] kthread+0x328/0x630 [ 88.047574] ret_from_fork+0x10/0x20 [ 88.051135] [ 88.052611] freed by task 395 on cpu 4 at 87.989054s (0.063554s ago): [ 88.059053] test_corruption+0x284/0x378 [ 88.062938] kunit_try_run_case+0x170/0x3f0 [ 88.067105] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 88.072574] kthread+0x328/0x630 [ 88.075785] ret_from_fork+0x10/0x20 [ 88.079346] [ 88.080830] CPU: 4 UID: 0 PID: 395 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 88.091939] Tainted: [B]=BAD_PAGE, [N]=TEST [ 88.096099] Hardware name: WinLink E850-96 board (DT) [ 88.101136] ================================================================== [ 88.833102] ================================================================== [ 88.833240] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 88.833240] [ 88.833376] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#168): [ 88.835773] test_corruption+0x120/0x378 [ 88.839677] kunit_try_run_case+0x170/0x3f0 [ 88.843846] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 88.849313] kthread+0x328/0x630 [ 88.852524] ret_from_fork+0x10/0x20 [ 88.856083] [ 88.857561] kfence-#168: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 88.857561] [ 88.866677] allocated by task 397 on cpu 2 at 88.833031s (0.033644s ago): [ 88.873464] test_alloc+0x230/0x628 [ 88.876916] test_corruption+0xdc/0x378 [ 88.880737] kunit_try_run_case+0x170/0x3f0 [ 88.884902] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 88.890371] kthread+0x328/0x630 [ 88.893583] ret_from_fork+0x10/0x20 [ 88.897142] [ 88.898620] freed by task 397 on cpu 2 at 88.833044s (0.065572s ago): [ 88.905061] test_corruption+0x120/0x378 [ 88.908947] kunit_try_run_case+0x170/0x3f0 [ 88.913114] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 88.918583] kthread+0x328/0x630 [ 88.921794] ret_from_fork+0x10/0x20 [ 88.925355] [ 88.926840] CPU: 2 UID: 0 PID: 397 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 88.937947] Tainted: [B]=BAD_PAGE, [N]=TEST [ 88.942108] Hardware name: WinLink E850-96 board (DT) [ 88.947145] ================================================================== [ 89.057100] ================================================================== [ 89.057222] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 89.057222] [ 89.057357] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#170): [ 89.057523] test_corruption+0x1d8/0x378 [ 89.061057] kunit_try_run_case+0x170/0x3f0 [ 89.065224] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 89.070692] kthread+0x328/0x630 [ 89.073904] ret_from_fork+0x10/0x20 [ 89.077463] [ 89.078941] kfence-#170: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 89.078941] [ 89.088054] allocated by task 397 on cpu 2 at 89.057032s (0.031019s ago): [ 89.094838] test_alloc+0x230/0x628 [ 89.098296] test_corruption+0x198/0x378 [ 89.102202] kunit_try_run_case+0x170/0x3f0 [ 89.106369] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 89.111837] kthread+0x328/0x630 [ 89.115049] ret_from_fork+0x10/0x20 [ 89.118608] [ 89.120087] freed by task 397 on cpu 2 at 89.057048s (0.063035s ago): [ 89.126525] test_corruption+0x1d8/0x378 [ 89.130414] kunit_try_run_case+0x170/0x3f0 [ 89.134580] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 89.140049] kthread+0x328/0x630 [ 89.143262] ret_from_fork+0x10/0x20 [ 89.146820] [ 89.148306] CPU: 2 UID: 0 PID: 397 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 89.159415] Tainted: [B]=BAD_PAGE, [N]=TEST [ 89.163574] Hardware name: WinLink E850-96 board (DT) [ 89.168611] ================================================================== [ 87.765112] ================================================================== [ 87.765244] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 87.765244] [ 87.765377] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#158): [ 87.767778] test_corruption+0x278/0x378 [ 87.771682] kunit_try_run_case+0x170/0x3f0 [ 87.775849] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 87.781317] kthread+0x328/0x630 [ 87.784529] ret_from_fork+0x10/0x20 [ 87.788088] [ 87.789566] kfence-#158: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 87.789566] [ 87.799200] allocated by task 395 on cpu 4 at 87.765042s (0.034156s ago): [ 87.805986] test_alloc+0x29c/0x628 [ 87.809441] test_corruption+0xdc/0x378 [ 87.813261] kunit_try_run_case+0x170/0x3f0 [ 87.817428] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 87.822896] kthread+0x328/0x630 [ 87.826108] ret_from_fork+0x10/0x20 [ 87.829670] [ 87.831145] freed by task 395 on cpu 4 at 87.765056s (0.066086s ago): [ 87.837587] test_corruption+0x278/0x378 [ 87.841472] kunit_try_run_case+0x170/0x3f0 [ 87.845639] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 87.851108] kthread+0x328/0x630 [ 87.854319] ret_from_fork+0x10/0x20 [ 87.857880] [ 87.859365] CPU: 4 UID: 0 PID: 395 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 87.870473] Tainted: [B]=BAD_PAGE, [N]=TEST [ 87.874633] Hardware name: WinLink E850-96 board (DT) [ 87.879671] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[ 87.349112] ================================================================== [ 87.349249] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 87.349249] [ 87.349384] Invalid free of 0x(____ptrval____) (in kfence-#154): [ 87.349487] test_invalid_addr_free+0x1ac/0x238 [ 87.352996] kunit_try_run_case+0x170/0x3f0 [ 87.357162] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 87.362631] kthread+0x328/0x630 [ 87.365842] ret_from_fork+0x10/0x20 [ 87.369401] [ 87.370880] kfence-#154: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 87.370880] [ 87.380515] allocated by task 391 on cpu 4 at 87.349054s (0.031459s ago): [ 87.387299] test_alloc+0x29c/0x628 [ 87.390755] test_invalid_addr_free+0xd4/0x238 [ 87.395182] kunit_try_run_case+0x170/0x3f0 [ 87.399349] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 87.404818] kthread+0x328/0x630 [ 87.408029] ret_from_fork+0x10/0x20 [ 87.411590] [ 87.413076] CPU: 4 UID: 0 PID: 391 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 87.424184] Tainted: [B]=BAD_PAGE, [N]=TEST [ 87.428343] Hardware name: WinLink E850-96 board (DT) [ 87.433380] ================================================================== [ 87.557119] ================================================================== [ 87.557255] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 87.557255] [ 87.557387] Invalid free of 0x(____ptrval____) (in kfence-#156): [ 87.557494] test_invalid_addr_free+0xec/0x238 [ 87.560827] kunit_try_run_case+0x170/0x3f0 [ 87.564993] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 87.570462] kthread+0x328/0x630 [ 87.573674] ret_from_fork+0x10/0x20 [ 87.577233] [ 87.578710] kfence-#156: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 87.578710] [ 87.587826] allocated by task 393 on cpu 5 at 87.557061s (0.030763s ago): [ 87.594609] test_alloc+0x230/0x628 [ 87.598066] test_invalid_addr_free+0xd4/0x238 [ 87.602493] kunit_try_run_case+0x170/0x3f0 [ 87.606659] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 87.612128] kthread+0x328/0x630 [ 87.615339] ret_from_fork+0x10/0x20 [ 87.618900] [ 87.620386] CPU: 5 UID: 0 PID: 393 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 87.631493] Tainted: [B]=BAD_PAGE, [N]=TEST [ 87.635653] Hardware name: WinLink E850-96 board (DT) [ 87.640689] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free
[ 87.129112] ================================================================== [ 87.129242] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 87.129242] [ 87.129373] Invalid free of 0x(____ptrval____) (in kfence-#152): [ 87.129476] test_double_free+0x100/0x238 [ 87.131947] kunit_try_run_case+0x170/0x3f0 [ 87.136113] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 87.141582] kthread+0x328/0x630 [ 87.144794] ret_from_fork+0x10/0x20 [ 87.148352] [ 87.149832] kfence-#152: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 87.149832] [ 87.158945] allocated by task 389 on cpu 4 at 87.129035s (0.029908s ago): [ 87.165731] test_alloc+0x230/0x628 [ 87.169185] test_double_free+0xd4/0x238 [ 87.173092] kunit_try_run_case+0x170/0x3f0 [ 87.177258] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 87.182727] kthread+0x328/0x630 [ 87.185939] ret_from_fork+0x10/0x20 [ 87.189498] [ 87.190976] freed by task 389 on cpu 4 at 87.129050s (0.061924s ago): [ 87.197416] test_double_free+0xf0/0x238 [ 87.201303] kunit_try_run_case+0x170/0x3f0 [ 87.205470] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 87.210938] kthread+0x328/0x630 [ 87.214150] ret_from_fork+0x10/0x20 [ 87.217711] [ 87.219195] CPU: 4 UID: 0 PID: 389 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 87.230305] Tainted: [B]=BAD_PAGE, [N]=TEST [ 87.234464] Hardware name: WinLink E850-96 board (DT) [ 87.239501] ================================================================== [ 86.909125] ================================================================== [ 86.909257] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 86.909257] [ 86.909392] Invalid free of 0x(____ptrval____) (in kfence-#150): [ 86.909496] test_double_free+0x1bc/0x238 [ 86.911960] kunit_try_run_case+0x170/0x3f0 [ 86.916127] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 86.921596] kthread+0x328/0x630 [ 86.924808] ret_from_fork+0x10/0x20 [ 86.928366] [ 86.929845] kfence-#150: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 86.929845] [ 86.939481] allocated by task 387 on cpu 7 at 86.909045s (0.030434s ago): [ 86.946265] test_alloc+0x29c/0x628 [ 86.949722] test_double_free+0xd4/0x238 [ 86.953627] kunit_try_run_case+0x170/0x3f0 [ 86.957793] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 86.963263] kthread+0x328/0x630 [ 86.966474] ret_from_fork+0x10/0x20 [ 86.970034] [ 86.971514] freed by task 387 on cpu 7 at 86.909061s (0.062447s ago): [ 86.977952] test_double_free+0x1ac/0x238 [ 86.981925] kunit_try_run_case+0x170/0x3f0 [ 86.986091] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 86.991560] kthread+0x328/0x630 [ 86.994772] ret_from_fork+0x10/0x20 [ 86.998332] [ 86.999818] CPU: 7 UID: 0 PID: 387 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 87.010930] Tainted: [B]=BAD_PAGE, [N]=TEST [ 87.015086] Hardware name: WinLink E850-96 board (DT) [ 87.020123] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[ 86.253100] ================================================================== [ 86.253235] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 86.253235] [ 86.253392] Use-after-free read at 0x(____ptrval____) (in kfence-#144): [ 86.253859] test_use_after_free_read+0x114/0x248 [ 86.258544] kunit_try_run_case+0x170/0x3f0 [ 86.262710] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 86.268179] kthread+0x328/0x630 [ 86.271391] ret_from_fork+0x10/0x20 [ 86.274950] [ 86.276428] kfence-#144: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 86.276428] [ 86.286062] allocated by task 379 on cpu 6 at 86.253045s (0.033015s ago): [ 86.292850] test_alloc+0x29c/0x628 [ 86.296304] test_use_after_free_read+0xd0/0x248 [ 86.300905] kunit_try_run_case+0x170/0x3f0 [ 86.305071] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 86.310539] kthread+0x328/0x630 [ 86.313751] ret_from_fork+0x10/0x20 [ 86.317310] [ 86.318788] freed by task 379 on cpu 6 at 86.253060s (0.065726s ago): [ 86.325230] test_use_after_free_read+0x1c0/0x248 [ 86.329897] kunit_try_run_case+0x170/0x3f0 [ 86.334063] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 86.339532] kthread+0x328/0x630 [ 86.342744] ret_from_fork+0x10/0x20 [ 86.346304] [ 86.347790] CPU: 6 UID: 0 PID: 379 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 86.358898] Tainted: [B]=BAD_PAGE, [N]=TEST [ 86.363057] Hardware name: WinLink E850-96 board (DT) [ 86.368095] ================================================================== [ 86.477109] ================================================================== [ 86.477238] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 86.477238] [ 86.477398] Use-after-free read at 0x(____ptrval____) (in kfence-#146): [ 86.477859] test_use_after_free_read+0x114/0x248 [ 86.482546] kunit_try_run_case+0x170/0x3f0 [ 86.486713] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 86.492181] kthread+0x328/0x630 [ 86.495394] ret_from_fork+0x10/0x20 [ 86.498952] [ 86.500431] kfence-#146: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 86.500431] [ 86.509545] allocated by task 381 on cpu 4 at 86.477048s (0.032495s ago): [ 86.516331] test_alloc+0x230/0x628 [ 86.519785] test_use_after_free_read+0xd0/0x248 [ 86.524386] kunit_try_run_case+0x170/0x3f0 [ 86.528553] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 86.534021] kthread+0x328/0x630 [ 86.537233] ret_from_fork+0x10/0x20 [ 86.540792] [ 86.542272] freed by task 381 on cpu 4 at 86.477063s (0.065205s ago): [ 86.548714] test_use_after_free_read+0xf0/0x248 [ 86.553292] kunit_try_run_case+0x170/0x3f0 [ 86.557459] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 86.562927] kthread+0x328/0x630 [ 86.566139] ret_from_fork+0x10/0x20 [ 86.569699] [ 86.571183] CPU: 4 UID: 0 PID: 381 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 86.582292] Tainted: [B]=BAD_PAGE, [N]=TEST [ 86.586453] Hardware name: WinLink E850-96 board (DT) [ 86.591490] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[ 85.733093] ================================================================== [ 85.733223] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 85.733223] [ 85.733381] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#139): [ 85.734539] test_out_of_bounds_write+0x100/0x240 [ 85.739225] kunit_try_run_case+0x170/0x3f0 [ 85.743392] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 85.748861] kthread+0x328/0x630 [ 85.752072] ret_from_fork+0x10/0x20 [ 85.755632] [ 85.757111] kfence-#139: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 85.757111] [ 85.766744] allocated by task 375 on cpu 4 at 85.733060s (0.033681s ago): [ 85.773532] test_alloc+0x29c/0x628 [ 85.776985] test_out_of_bounds_write+0xc8/0x240 [ 85.781586] kunit_try_run_case+0x170/0x3f0 [ 85.785752] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 85.791221] kthread+0x328/0x630 [ 85.794433] ret_from_fork+0x10/0x20 [ 85.797995] [ 85.799478] CPU: 4 UID: 0 PID: 375 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 85.810588] Tainted: [B]=BAD_PAGE, [N]=TEST [ 85.814746] Hardware name: WinLink E850-96 board (DT) [ 85.819784] ================================================================== [ 86.045075] ================================================================== [ 86.045218] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 86.045218] [ 86.045378] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#142): [ 86.046535] test_out_of_bounds_write+0x100/0x240 [ 86.051220] kunit_try_run_case+0x170/0x3f0 [ 86.055387] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 86.060856] kthread+0x328/0x630 [ 86.064067] ret_from_fork+0x10/0x20 [ 86.067626] [ 86.069105] kfence-#142: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 86.069105] [ 86.078219] allocated by task 377 on cpu 5 at 86.045040s (0.033177s ago): [ 86.085006] test_alloc+0x230/0x628 [ 86.088459] test_out_of_bounds_write+0xc8/0x240 [ 86.093060] kunit_try_run_case+0x170/0x3f0 [ 86.097227] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 86.102696] kthread+0x328/0x630 [ 86.105907] ret_from_fork+0x10/0x20 [ 86.109468] [ 86.110952] CPU: 5 UID: 0 PID: 377 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 86.122062] Tainted: [B]=BAD_PAGE, [N]=TEST [ 86.126221] Hardware name: WinLink E850-96 board (DT) [ 86.131258] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[ 85.105077] ================================================================== [ 85.105215] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 85.105215] [ 85.105372] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#133): [ 85.106445] test_out_of_bounds_read+0x1c8/0x3e0 [ 85.111044] kunit_try_run_case+0x170/0x3f0 [ 85.115211] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 85.120679] kthread+0x328/0x630 [ 85.123891] ret_from_fork+0x10/0x20 [ 85.127450] [ 85.128930] kfence-#133: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 85.128930] [ 85.138564] allocated by task 371 on cpu 4 at 85.105041s (0.033520s ago): [ 85.145352] test_alloc+0x29c/0x628 [ 85.148804] test_out_of_bounds_read+0x198/0x3e0 [ 85.153405] kunit_try_run_case+0x170/0x3f0 [ 85.157571] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 85.163040] kthread+0x328/0x630 [ 85.166252] ret_from_fork+0x10/0x20 [ 85.169812] [ 85.171297] CPU: 4 UID: 0 PID: 371 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 85.182408] Tainted: [B]=BAD_PAGE, [N]=TEST [ 85.186565] Hardware name: WinLink E850-96 board (DT) [ 85.191603] ================================================================== [ 85.417095] ================================================================== [ 85.417236] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 85.417236] [ 85.417390] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#136): [ 85.418293] test_out_of_bounds_read+0x114/0x3e0 [ 85.422892] kunit_try_run_case+0x170/0x3f0 [ 85.427058] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 85.432527] kthread+0x328/0x630 [ 85.435739] ret_from_fork+0x10/0x20 [ 85.439297] [ 85.440775] kfence-#136: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 85.440775] [ 85.449891] allocated by task 373 on cpu 5 at 85.417059s (0.032829s ago): [ 85.456678] test_alloc+0x230/0x628 [ 85.460131] test_out_of_bounds_read+0xdc/0x3e0 [ 85.464645] kunit_try_run_case+0x170/0x3f0 [ 85.468811] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 85.474280] kthread+0x328/0x630 [ 85.477491] ret_from_fork+0x10/0x20 [ 85.481052] [ 85.482537] CPU: 5 UID: 0 PID: 373 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 85.493645] Tainted: [B]=BAD_PAGE, [N]=TEST [ 85.497805] Hardware name: WinLink E850-96 board (DT) [ 85.502841] ================================================================== [ 84.377084] ================================================================== [ 84.377207] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 84.377207] [ 84.377362] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#126): [ 84.378264] test_out_of_bounds_read+0x114/0x3e0 [ 84.382863] kunit_try_run_case+0x170/0x3f0 [ 84.387031] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 84.392499] kthread+0x328/0x630 [ 84.395710] ret_from_fork+0x10/0x20 [ 84.399270] [ 84.400748] kfence-#126: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 84.400748] [ 84.410383] allocated by task 371 on cpu 4 at 84.377049s (0.033331s ago): [ 84.417171] test_alloc+0x29c/0x628 [ 84.420623] test_out_of_bounds_read+0xdc/0x3e0 [ 84.425137] kunit_try_run_case+0x170/0x3f0 [ 84.429304] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 84.434772] kthread+0x328/0x630 [ 84.437984] ret_from_fork+0x10/0x20 [ 84.441545] [ 84.443028] CPU: 4 UID: 0 PID: 371 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 84.454138] Tainted: [B]=BAD_PAGE, [N]=TEST [ 84.458297] Hardware name: WinLink E850-96 board (DT) [ 84.463335] ================================================================== [ 85.525046] ================================================================== [ 85.526625] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 85.526625] [ 85.535652] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#137): [ 85.543029] test_out_of_bounds_read+0x1c8/0x3e0 [ 85.547630] kunit_try_run_case+0x170/0x3f0 [ 85.551796] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 85.557265] kthread+0x328/0x630 [ 85.560476] ret_from_fork+0x10/0x20 [ 85.564035] [ 85.565511] kfence-#137: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 85.565511] [ 85.574626] allocated by task 373 on cpu 5 at 85.525021s (0.049603s ago): [ 85.581416] test_alloc+0x230/0x628 [ 85.584868] test_out_of_bounds_read+0x198/0x3e0 [ 85.589469] kunit_try_run_case+0x170/0x3f0 [ 85.593636] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 85.599104] kthread+0x328/0x630 [ 85.602316] ret_from_fork+0x10/0x20 [ 85.605875] [ 85.607358] CPU: 5 UID: 0 PID: 373 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 85.618471] Tainted: [B]=BAD_PAGE, [N]=TEST [ 85.622628] Hardware name: WinLink E850-96 board (DT) [ 85.627667] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-kmalloc_track_caller_oob_right
[ 37.830336] ================================================================== [ 37.853213] BUG: KFENCE: memory corruption in kmalloc_track_caller_oob_right+0x224/0x488 [ 37.853213] [ 37.862759] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . ] (in kfence-#61): [ 37.870744] kmalloc_track_caller_oob_right+0x224/0x488 [ 37.875953] kunit_try_run_case+0x170/0x3f0 [ 37.880120] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.885588] kthread+0x328/0x630 [ 37.888800] ret_from_fork+0x10/0x20 [ 37.892359] [ 37.893838] kfence-#61: 0x(____ptrval____)-0x(____ptrval____), size=120, cache=kmalloc-128 [ 37.893838] [ 37.903561] allocated by task 226 on cpu 2 at 37.829941s (0.073618s ago): [ 37.910349] kmalloc_track_caller_oob_right+0x184/0x488 [ 37.915536] kunit_try_run_case+0x170/0x3f0 [ 37.919702] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.925171] kthread+0x328/0x630 [ 37.928383] ret_from_fork+0x10/0x20 [ 37.931942] [ 37.933421] freed by task 226 on cpu 2 at 37.830291s (0.103128s ago): [ 37.939863] kmalloc_track_caller_oob_right+0x224/0x488 [ 37.945051] kunit_try_run_case+0x170/0x3f0 [ 37.949216] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.954684] kthread+0x328/0x630 [ 37.957896] ret_from_fork+0x10/0x20 [ 37.961457] [ 37.962942] CPU: 2 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 37.974051] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.978208] Hardware name: WinLink E850-96 board (DT) [ 37.983246] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[ 83.659405] ================================================================== [ 83.666423] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 83.673275] Write of size 121 at addr ffff000803b98000 by task kunit_try_catch/369 [ 83.680827] [ 83.682309] CPU: 6 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 83.682364] Tainted: [B]=BAD_PAGE, [N]=TEST [ 83.682378] Hardware name: WinLink E850-96 board (DT) [ 83.682400] Call trace: [ 83.682415] show_stack+0x20/0x38 (C) [ 83.682451] dump_stack_lvl+0x8c/0xd0 [ 83.682485] print_report+0x118/0x5d0 [ 83.682514] kasan_report+0xdc/0x128 [ 83.682542] kasan_check_range+0x100/0x1a8 [ 83.682574] __kasan_check_write+0x20/0x30 [ 83.682606] strncpy_from_user+0x3c/0x2a0 [ 83.682643] copy_user_test_oob+0x5c0/0xec8 [ 83.682680] kunit_try_run_case+0x170/0x3f0 [ 83.682717] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 83.682754] kthread+0x328/0x630 [ 83.682787] ret_from_fork+0x10/0x20 [ 83.682823] [ 83.753742] Allocated by task 369: [ 83.757131] kasan_save_stack+0x3c/0x68 [ 83.760947] kasan_save_track+0x20/0x40 [ 83.764767] kasan_save_alloc_info+0x40/0x58 [ 83.769020] __kasan_kmalloc+0xd4/0xd8 [ 83.772753] __kmalloc_noprof+0x198/0x4c8 [ 83.776745] kunit_kmalloc_array+0x34/0x88 [ 83.780827] copy_user_test_oob+0xac/0xec8 [ 83.784904] kunit_try_run_case+0x170/0x3f0 [ 83.789072] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 83.794540] kthread+0x328/0x630 [ 83.797752] ret_from_fork+0x10/0x20 [ 83.801311] [ 83.802788] The buggy address belongs to the object at ffff000803b98000 [ 83.802788] which belongs to the cache kmalloc-128 of size 128 [ 83.815287] The buggy address is located 0 bytes inside of [ 83.815287] allocated 120-byte region [ffff000803b98000, ffff000803b98078) [ 83.827699] [ 83.829177] The buggy address belongs to the physical page: [ 83.834736] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883b98 [ 83.842719] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 83.850358] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 83.857301] page_type: f5(slab) [ 83.860435] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 83.868157] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 83.875883] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 83.883695] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 83.891508] head: 0bfffe0000000001 fffffdffe00ee601 00000000ffffffff 00000000ffffffff [ 83.899320] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 83.907127] page dumped because: kasan: bad access detected [ 83.912681] [ 83.914156] Memory state around the buggy address: [ 83.918936] ffff000803b97f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.926139] ffff000803b97f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.933346] >ffff000803b98000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 83.940545] ^ [ 83.947667] ffff000803b98080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.954872] ffff000803b98100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.962073] ================================================================== [ 83.969472] ================================================================== [ 83.976490] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 83.983427] Write of size 1 at addr ffff000803b98078 by task kunit_try_catch/369 [ 83.990805] [ 83.992290] CPU: 6 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 83.992344] Tainted: [B]=BAD_PAGE, [N]=TEST [ 83.992360] Hardware name: WinLink E850-96 board (DT) [ 83.992382] Call trace: [ 83.992397] show_stack+0x20/0x38 (C) [ 83.992429] dump_stack_lvl+0x8c/0xd0 [ 83.992465] print_report+0x118/0x5d0 [ 83.992497] kasan_report+0xdc/0x128 [ 83.992523] __asan_report_store1_noabort+0x20/0x30 [ 83.992559] strncpy_from_user+0x270/0x2a0 [ 83.992598] copy_user_test_oob+0x5c0/0xec8 [ 83.992634] kunit_try_run_case+0x170/0x3f0 [ 83.992671] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 83.992707] kthread+0x328/0x630 [ 83.992739] ret_from_fork+0x10/0x20 [ 83.992776] [ 84.060509] Allocated by task 369: [ 84.063897] kasan_save_stack+0x3c/0x68 [ 84.067713] kasan_save_track+0x20/0x40 [ 84.071533] kasan_save_alloc_info+0x40/0x58 [ 84.075786] __kasan_kmalloc+0xd4/0xd8 [ 84.079519] __kmalloc_noprof+0x198/0x4c8 [ 84.083512] kunit_kmalloc_array+0x34/0x88 [ 84.087593] copy_user_test_oob+0xac/0xec8 [ 84.091672] kunit_try_run_case+0x170/0x3f0 [ 84.095838] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 84.101307] kthread+0x328/0x630 [ 84.104519] ret_from_fork+0x10/0x20 [ 84.108077] [ 84.109555] The buggy address belongs to the object at ffff000803b98000 [ 84.109555] which belongs to the cache kmalloc-128 of size 128 [ 84.122055] The buggy address is located 0 bytes to the right of [ 84.122055] allocated 120-byte region [ffff000803b98000, ffff000803b98078) [ 84.134987] [ 84.136465] The buggy address belongs to the physical page: [ 84.142022] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883b98 [ 84.150005] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 84.157645] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 84.164588] page_type: f5(slab) [ 84.167725] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 84.175444] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 84.183171] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 84.190982] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 84.198795] head: 0bfffe0000000001 fffffdffe00ee601 00000000ffffffff 00000000ffffffff [ 84.206607] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 84.214413] page dumped because: kasan: bad access detected [ 84.219968] [ 84.221444] Memory state around the buggy address: [ 84.226222] ffff000803b97f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.233426] ffff000803b97f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.240633] >ffff000803b98000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 84.247832] ^ [ 84.254954] ffff000803b98080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.262159] ffff000803b98100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.269360] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[ 82.434915] ================================================================== [ 82.441788] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 82.448814] Write of size 121 at addr ffff000803b98000 by task kunit_try_catch/369 [ 82.456366] [ 82.457851] CPU: 6 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 82.457907] Tainted: [B]=BAD_PAGE, [N]=TEST [ 82.457924] Hardware name: WinLink E850-96 board (DT) [ 82.457949] Call trace: [ 82.457964] show_stack+0x20/0x38 (C) [ 82.458003] dump_stack_lvl+0x8c/0xd0 [ 82.458035] print_report+0x118/0x5d0 [ 82.458062] kasan_report+0xdc/0x128 [ 82.458089] kasan_check_range+0x100/0x1a8 [ 82.458116] __kasan_check_write+0x20/0x30 [ 82.458148] copy_user_test_oob+0x35c/0xec8 [ 82.458184] kunit_try_run_case+0x170/0x3f0 [ 82.458223] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 82.458258] kthread+0x328/0x630 [ 82.458285] ret_from_fork+0x10/0x20 [ 82.458320] [ 82.525288] Allocated by task 369: [ 82.528676] kasan_save_stack+0x3c/0x68 [ 82.532493] kasan_save_track+0x20/0x40 [ 82.536313] kasan_save_alloc_info+0x40/0x58 [ 82.540566] __kasan_kmalloc+0xd4/0xd8 [ 82.544299] __kmalloc_noprof+0x198/0x4c8 [ 82.548292] kunit_kmalloc_array+0x34/0x88 [ 82.552373] copy_user_test_oob+0xac/0xec8 [ 82.556453] kunit_try_run_case+0x170/0x3f0 [ 82.560618] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 82.566087] kthread+0x328/0x630 [ 82.569298] ret_from_fork+0x10/0x20 [ 82.572857] [ 82.574335] The buggy address belongs to the object at ffff000803b98000 [ 82.574335] which belongs to the cache kmalloc-128 of size 128 [ 82.586835] The buggy address is located 0 bytes inside of [ 82.586835] allocated 120-byte region [ffff000803b98000, ffff000803b98078) [ 82.599246] [ 82.600724] The buggy address belongs to the physical page: [ 82.606280] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883b98 [ 82.614266] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 82.621904] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 82.628846] page_type: f5(slab) [ 82.631984] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 82.639703] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 82.647430] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 82.655241] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 82.663054] head: 0bfffe0000000001 fffffdffe00ee601 00000000ffffffff 00000000ffffffff [ 82.670866] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 82.678672] page dumped because: kasan: bad access detected [ 82.684227] [ 82.685703] Memory state around the buggy address: [ 82.690483] ffff000803b97f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.697685] ffff000803b97f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.704892] >ffff000803b98000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 82.712091] ^ [ 82.719213] ffff000803b98080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.726418] ffff000803b98100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.733619] ================================================================== [ 83.047120] ================================================================== [ 83.054110] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 83.061133] Write of size 121 at addr ffff000803b98000 by task kunit_try_catch/369 [ 83.068685] [ 83.070166] CPU: 6 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 83.070219] Tainted: [B]=BAD_PAGE, [N]=TEST [ 83.070235] Hardware name: WinLink E850-96 board (DT) [ 83.070258] Call trace: [ 83.070273] show_stack+0x20/0x38 (C) [ 83.070308] dump_stack_lvl+0x8c/0xd0 [ 83.070343] print_report+0x118/0x5d0 [ 83.070372] kasan_report+0xdc/0x128 [ 83.070401] kasan_check_range+0x100/0x1a8 [ 83.070431] __kasan_check_write+0x20/0x30 [ 83.070464] copy_user_test_oob+0x434/0xec8 [ 83.070500] kunit_try_run_case+0x170/0x3f0 [ 83.070538] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 83.070572] kthread+0x328/0x630 [ 83.070605] ret_from_fork+0x10/0x20 [ 83.070638] [ 83.137606] Allocated by task 369: [ 83.140993] kasan_save_stack+0x3c/0x68 [ 83.144811] kasan_save_track+0x20/0x40 [ 83.148630] kasan_save_alloc_info+0x40/0x58 [ 83.152883] __kasan_kmalloc+0xd4/0xd8 [ 83.156616] __kmalloc_noprof+0x198/0x4c8 [ 83.160609] kunit_kmalloc_array+0x34/0x88 [ 83.164690] copy_user_test_oob+0xac/0xec8 [ 83.168769] kunit_try_run_case+0x170/0x3f0 [ 83.172935] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 83.178404] kthread+0x328/0x630 [ 83.181616] ret_from_fork+0x10/0x20 [ 83.185175] [ 83.186652] The buggy address belongs to the object at ffff000803b98000 [ 83.186652] which belongs to the cache kmalloc-128 of size 128 [ 83.199154] The buggy address is located 0 bytes inside of [ 83.199154] allocated 120-byte region [ffff000803b98000, ffff000803b98078) [ 83.211564] [ 83.213042] The buggy address belongs to the physical page: [ 83.218598] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883b98 [ 83.226583] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 83.234221] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 83.241165] page_type: f5(slab) [ 83.244300] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 83.252022] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 83.259747] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 83.267558] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 83.275372] head: 0bfffe0000000001 fffffdffe00ee601 00000000ffffffff 00000000ffffffff [ 83.283183] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 83.290989] page dumped because: kasan: bad access detected [ 83.296544] [ 83.298020] Memory state around the buggy address: [ 83.302799] ffff000803b97f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.310003] ffff000803b97f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.317211] >ffff000803b98000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 83.324409] ^ [ 83.331530] ffff000803b98080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.338735] ffff000803b98100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.345936] ================================================================== [ 83.353540] ================================================================== [ 83.360352] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 83.367377] Read of size 121 at addr ffff000803b98000 by task kunit_try_catch/369 [ 83.374842] [ 83.376325] CPU: 6 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 83.376379] Tainted: [B]=BAD_PAGE, [N]=TEST [ 83.376395] Hardware name: WinLink E850-96 board (DT) [ 83.376416] Call trace: [ 83.376430] show_stack+0x20/0x38 (C) [ 83.376463] dump_stack_lvl+0x8c/0xd0 [ 83.376497] print_report+0x118/0x5d0 [ 83.376527] kasan_report+0xdc/0x128 [ 83.376554] kasan_check_range+0x100/0x1a8 [ 83.376586] __kasan_check_read+0x20/0x30 [ 83.376615] copy_user_test_oob+0x4a0/0xec8 [ 83.376647] kunit_try_run_case+0x170/0x3f0 [ 83.376685] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 83.376723] kthread+0x328/0x630 [ 83.376754] ret_from_fork+0x10/0x20 [ 83.376787] [ 83.443677] Allocated by task 369: [ 83.447066] kasan_save_stack+0x3c/0x68 [ 83.450882] kasan_save_track+0x20/0x40 [ 83.454702] kasan_save_alloc_info+0x40/0x58 [ 83.458955] __kasan_kmalloc+0xd4/0xd8 [ 83.462688] __kmalloc_noprof+0x198/0x4c8 [ 83.466681] kunit_kmalloc_array+0x34/0x88 [ 83.470762] copy_user_test_oob+0xac/0xec8 [ 83.474840] kunit_try_run_case+0x170/0x3f0 [ 83.479009] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 83.484476] kthread+0x328/0x630 [ 83.487688] ret_from_fork+0x10/0x20 [ 83.491246] [ 83.492723] The buggy address belongs to the object at ffff000803b98000 [ 83.492723] which belongs to the cache kmalloc-128 of size 128 [ 83.505222] The buggy address is located 0 bytes inside of [ 83.505222] allocated 120-byte region [ffff000803b98000, ffff000803b98078) [ 83.517635] [ 83.519112] The buggy address belongs to the physical page: [ 83.524670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883b98 [ 83.532654] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 83.540293] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 83.547235] page_type: f5(slab) [ 83.550372] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 83.558092] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 83.565819] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 83.573630] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 83.581443] head: 0bfffe0000000001 fffffdffe00ee601 00000000ffffffff 00000000ffffffff [ 83.589255] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 83.597061] page dumped because: kasan: bad access detected [ 83.602616] [ 83.604092] Memory state around the buggy address: [ 83.608871] ffff000803b97f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.616075] ffff000803b97f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.623281] >ffff000803b98000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 83.630480] ^ [ 83.637602] ffff000803b98080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.644807] ffff000803b98100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.652008] ================================================================== [ 81.817111] ================================================================== [ 81.829472] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 81.836498] Write of size 121 at addr ffff000803b98000 by task kunit_try_catch/369 [ 81.844049] [ 81.845536] CPU: 6 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 81.845599] Tainted: [B]=BAD_PAGE, [N]=TEST [ 81.845616] Hardware name: WinLink E850-96 board (DT) [ 81.845638] Call trace: [ 81.845654] show_stack+0x20/0x38 (C) [ 81.845688] dump_stack_lvl+0x8c/0xd0 [ 81.845723] print_report+0x118/0x5d0 [ 81.845756] kasan_report+0xdc/0x128 [ 81.845786] kasan_check_range+0x100/0x1a8 [ 81.845820] __kasan_check_write+0x20/0x30 [ 81.845854] copy_user_test_oob+0x234/0xec8 [ 81.845888] kunit_try_run_case+0x170/0x3f0 [ 81.845930] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 81.845964] kthread+0x328/0x630 [ 81.845996] ret_from_fork+0x10/0x20 [ 81.846034] [ 81.912973] Allocated by task 369: [ 81.916359] kasan_save_stack+0x3c/0x68 [ 81.920176] kasan_save_track+0x20/0x40 [ 81.923996] kasan_save_alloc_info+0x40/0x58 [ 81.928249] __kasan_kmalloc+0xd4/0xd8 [ 81.931982] __kmalloc_noprof+0x198/0x4c8 [ 81.935975] kunit_kmalloc_array+0x34/0x88 [ 81.940056] copy_user_test_oob+0xac/0xec8 [ 81.944134] kunit_try_run_case+0x170/0x3f0 [ 81.948301] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 81.953770] kthread+0x328/0x630 [ 81.956981] ret_from_fork+0x10/0x20 [ 81.960540] [ 81.962017] The buggy address belongs to the object at ffff000803b98000 [ 81.962017] which belongs to the cache kmalloc-128 of size 128 [ 81.974519] The buggy address is located 0 bytes inside of [ 81.974519] allocated 120-byte region [ffff000803b98000, ffff000803b98078) [ 81.986928] [ 81.988410] The buggy address belongs to the physical page: [ 81.993964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883b98 [ 82.001948] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 82.009588] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 82.016531] page_type: f5(slab) [ 82.019668] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 82.027386] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 82.035114] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 82.042924] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 82.050737] head: 0bfffe0000000001 fffffdffe00ee601 00000000ffffffff 00000000ffffffff [ 82.058549] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 82.066354] page dumped because: kasan: bad access detected [ 82.071910] [ 82.073385] Memory state around the buggy address: [ 82.078167] ffff000803b97f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.085368] ffff000803b97f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.092575] >ffff000803b98000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 82.099774] ^ [ 82.106896] ffff000803b98080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.114101] ffff000803b98100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.121303] ================================================================== [ 82.741040] ================================================================== [ 82.748033] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 82.755060] Read of size 121 at addr ffff000803b98000 by task kunit_try_catch/369 [ 82.762525] [ 82.764009] CPU: 6 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 82.764062] Tainted: [B]=BAD_PAGE, [N]=TEST [ 82.764080] Hardware name: WinLink E850-96 board (DT) [ 82.764103] Call trace: [ 82.764118] show_stack+0x20/0x38 (C) [ 82.764155] dump_stack_lvl+0x8c/0xd0 [ 82.764190] print_report+0x118/0x5d0 [ 82.764218] kasan_report+0xdc/0x128 [ 82.764244] kasan_check_range+0x100/0x1a8 [ 82.764274] __kasan_check_read+0x20/0x30 [ 82.764305] copy_user_test_oob+0x3c8/0xec8 [ 82.764341] kunit_try_run_case+0x170/0x3f0 [ 82.764379] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 82.764414] kthread+0x328/0x630 [ 82.764443] ret_from_fork+0x10/0x20 [ 82.764479] [ 82.831362] Allocated by task 369: [ 82.834749] kasan_save_stack+0x3c/0x68 [ 82.838565] kasan_save_track+0x20/0x40 [ 82.842385] kasan_save_alloc_info+0x40/0x58 [ 82.846638] __kasan_kmalloc+0xd4/0xd8 [ 82.850371] __kmalloc_noprof+0x198/0x4c8 [ 82.854363] kunit_kmalloc_array+0x34/0x88 [ 82.858445] copy_user_test_oob+0xac/0xec8 [ 82.862523] kunit_try_run_case+0x170/0x3f0 [ 82.866690] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 82.872158] kthread+0x328/0x630 [ 82.875370] ret_from_fork+0x10/0x20 [ 82.878929] [ 82.880406] The buggy address belongs to the object at ffff000803b98000 [ 82.880406] which belongs to the cache kmalloc-128 of size 128 [ 82.892904] The buggy address is located 0 bytes inside of [ 82.892904] allocated 120-byte region [ffff000803b98000, ffff000803b98078) [ 82.905318] [ 82.906797] The buggy address belongs to the physical page: [ 82.912352] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883b98 [ 82.920337] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 82.927976] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 82.934919] page_type: f5(slab) [ 82.938054] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 82.945775] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 82.953501] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 82.961313] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 82.969126] head: 0bfffe0000000001 fffffdffe00ee601 00000000ffffffff 00000000ffffffff [ 82.976937] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 82.984744] page dumped because: kasan: bad access detected [ 82.990299] [ 82.991775] Memory state around the buggy address: [ 82.996554] ffff000803b97f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.003757] ffff000803b97f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.010964] >ffff000803b98000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 83.018163] ^ [ 83.025285] ffff000803b98080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.032490] ffff000803b98100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.039691] ================================================================== [ 82.128743] ================================================================== [ 82.135718] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 82.142743] Read of size 121 at addr ffff000803b98000 by task kunit_try_catch/369 [ 82.150208] [ 82.151692] CPU: 6 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 82.151746] Tainted: [B]=BAD_PAGE, [N]=TEST [ 82.151764] Hardware name: WinLink E850-96 board (DT) [ 82.151788] Call trace: [ 82.151801] show_stack+0x20/0x38 (C) [ 82.151839] dump_stack_lvl+0x8c/0xd0 [ 82.151873] print_report+0x118/0x5d0 [ 82.151904] kasan_report+0xdc/0x128 [ 82.151932] kasan_check_range+0x100/0x1a8 [ 82.151964] __kasan_check_read+0x20/0x30 [ 82.151995] copy_user_test_oob+0x728/0xec8 [ 82.152029] kunit_try_run_case+0x170/0x3f0 [ 82.152069] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 82.152104] kthread+0x328/0x630 [ 82.152136] ret_from_fork+0x10/0x20 [ 82.152174] [ 82.219043] Allocated by task 369: [ 82.222432] kasan_save_stack+0x3c/0x68 [ 82.226248] kasan_save_track+0x20/0x40 [ 82.230068] kasan_save_alloc_info+0x40/0x58 [ 82.234321] __kasan_kmalloc+0xd4/0xd8 [ 82.238053] __kmalloc_noprof+0x198/0x4c8 [ 82.242046] kunit_kmalloc_array+0x34/0x88 [ 82.246126] copy_user_test_oob+0xac/0xec8 [ 82.250206] kunit_try_run_case+0x170/0x3f0 [ 82.254373] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 82.259841] kthread+0x328/0x630 [ 82.263053] ret_from_fork+0x10/0x20 [ 82.266612] [ 82.268089] The buggy address belongs to the object at ffff000803b98000 [ 82.268089] which belongs to the cache kmalloc-128 of size 128 [ 82.280588] The buggy address is located 0 bytes inside of [ 82.280588] allocated 120-byte region [ffff000803b98000, ffff000803b98078) [ 82.293000] [ 82.294479] The buggy address belongs to the physical page: [ 82.300035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883b98 [ 82.308019] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 82.315659] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 82.322602] page_type: f5(slab) [ 82.325737] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 82.333458] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 82.341184] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 82.348995] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 82.356809] head: 0bfffe0000000001 fffffdffe00ee601 00000000ffffffff 00000000ffffffff [ 82.364621] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 82.372426] page dumped because: kasan: bad access detected [ 82.377981] [ 82.379457] Memory state around the buggy address: [ 82.384239] ffff000803b97f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.391440] ffff000803b97f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.398646] >ffff000803b98000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 82.405846] ^ [ 82.412968] ffff000803b98080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.420173] ffff000803b98100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.427374] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[ 81.189699] ================================================================== [ 81.203873] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 81.211250] Read of size 8 at addr ffff000800de6578 by task kunit_try_catch/365 [ 81.218539] [ 81.220024] CPU: 7 UID: 0 PID: 365 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 81.220085] Tainted: [B]=BAD_PAGE, [N]=TEST [ 81.220104] Hardware name: WinLink E850-96 board (DT) [ 81.220128] Call trace: [ 81.220144] show_stack+0x20/0x38 (C) [ 81.220183] dump_stack_lvl+0x8c/0xd0 [ 81.220217] print_report+0x118/0x5d0 [ 81.220249] kasan_report+0xdc/0x128 [ 81.220279] __asan_report_load8_noabort+0x20/0x30 [ 81.220317] copy_to_kernel_nofault+0x204/0x250 [ 81.220356] copy_to_kernel_nofault_oob+0x158/0x418 [ 81.220393] kunit_try_run_case+0x170/0x3f0 [ 81.220435] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 81.220470] kthread+0x328/0x630 [ 81.220499] ret_from_fork+0x10/0x20 [ 81.220536] [ 81.289285] Allocated by task 365: [ 81.292673] kasan_save_stack+0x3c/0x68 [ 81.296488] kasan_save_track+0x20/0x40 [ 81.300307] kasan_save_alloc_info+0x40/0x58 [ 81.304561] __kasan_kmalloc+0xd4/0xd8 [ 81.308293] __kmalloc_cache_noprof+0x16c/0x3c0 [ 81.312807] copy_to_kernel_nofault_oob+0xc8/0x418 [ 81.317581] kunit_try_run_case+0x170/0x3f0 [ 81.321749] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 81.327218] kthread+0x328/0x630 [ 81.330428] ret_from_fork+0x10/0x20 [ 81.333987] [ 81.335465] The buggy address belongs to the object at ffff000800de6500 [ 81.335465] which belongs to the cache kmalloc-128 of size 128 [ 81.347965] The buggy address is located 0 bytes to the right of [ 81.347965] allocated 120-byte region [ffff000800de6500, ffff000800de6578) [ 81.360896] [ 81.362375] The buggy address belongs to the physical page: [ 81.367932] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880de6 [ 81.375917] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 81.383555] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 81.390500] page_type: f5(slab) [ 81.393635] raw: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122 [ 81.401354] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 81.409083] head: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122 [ 81.416891] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 81.424705] head: 0bfffe0000000001 fffffdffe0037981 00000000ffffffff 00000000ffffffff [ 81.432516] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 81.440322] page dumped because: kasan: bad access detected [ 81.445878] [ 81.447353] Memory state around the buggy address: [ 81.452133] ffff000800de6400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 81.459336] ffff000800de6480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.466542] >ffff000800de6500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 81.473742] ^ [ 81.480864] ffff000800de6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.488070] ffff000800de6600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.495271] ================================================================== [ 81.502708] ================================================================== [ 81.509686] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 81.516971] Write of size 8 at addr ffff000800de6578 by task kunit_try_catch/365 [ 81.524349] [ 81.525835] CPU: 7 UID: 0 PID: 365 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 81.525891] Tainted: [B]=BAD_PAGE, [N]=TEST [ 81.525911] Hardware name: WinLink E850-96 board (DT) [ 81.525934] Call trace: [ 81.525948] show_stack+0x20/0x38 (C) [ 81.525983] dump_stack_lvl+0x8c/0xd0 [ 81.526016] print_report+0x118/0x5d0 [ 81.526049] kasan_report+0xdc/0x128 [ 81.526077] kasan_check_range+0x100/0x1a8 [ 81.526110] __kasan_check_write+0x20/0x30 [ 81.526143] copy_to_kernel_nofault+0x8c/0x250 [ 81.526179] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 81.526217] kunit_try_run_case+0x170/0x3f0 [ 81.526253] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 81.526288] kthread+0x328/0x630 [ 81.526320] ret_from_fork+0x10/0x20 [ 81.526355] [ 81.598393] Allocated by task 365: [ 81.601781] kasan_save_stack+0x3c/0x68 [ 81.605599] kasan_save_track+0x20/0x40 [ 81.609417] kasan_save_alloc_info+0x40/0x58 [ 81.613671] __kasan_kmalloc+0xd4/0xd8 [ 81.617403] __kmalloc_cache_noprof+0x16c/0x3c0 [ 81.621917] copy_to_kernel_nofault_oob+0xc8/0x418 [ 81.626691] kunit_try_run_case+0x170/0x3f0 [ 81.630858] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 81.636326] kthread+0x328/0x630 [ 81.639538] ret_from_fork+0x10/0x20 [ 81.643097] [ 81.644574] The buggy address belongs to the object at ffff000800de6500 [ 81.644574] which belongs to the cache kmalloc-128 of size 128 [ 81.657074] The buggy address is located 0 bytes to the right of [ 81.657074] allocated 120-byte region [ffff000800de6500, ffff000800de6578) [ 81.670007] [ 81.671485] The buggy address belongs to the physical page: [ 81.677042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880de6 [ 81.685025] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 81.692664] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 81.699606] page_type: f5(slab) [ 81.702743] raw: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122 [ 81.710464] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 81.718191] head: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122 [ 81.726002] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 81.733815] head: 0bfffe0000000001 fffffdffe0037981 00000000ffffffff 00000000ffffffff [ 81.741626] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 81.749434] page dumped because: kasan: bad access detected [ 81.754988] [ 81.756463] Memory state around the buggy address: [ 81.761241] ffff000800de6400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 81.768446] ffff000800de6480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.775652] >ffff000800de6500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 81.782852] ^ [ 81.789973] ffff000800de6580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.797180] ffff000800de6600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.804379] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 80.765891] ================================================================== [ 80.780266] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 80.786949] Read of size 1 at addr ffff800087c7d7f3 by task kunit_try_catch/353 [ 80.794239] [ 80.795724] CPU: 6 UID: 0 PID: 353 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 80.795782] Tainted: [B]=BAD_PAGE, [N]=TEST [ 80.795798] Hardware name: WinLink E850-96 board (DT) [ 80.795823] Call trace: [ 80.795841] show_stack+0x20/0x38 (C) [ 80.795880] dump_stack_lvl+0x8c/0xd0 [ 80.795917] print_report+0x310/0x5d0 [ 80.795948] kasan_report+0xdc/0x128 [ 80.795973] __asan_report_load1_noabort+0x20/0x30 [ 80.796008] vmalloc_oob+0x578/0x5d0 [ 80.796037] kunit_try_run_case+0x170/0x3f0 [ 80.796077] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 80.796110] kthread+0x328/0x630 [ 80.796141] ret_from_fork+0x10/0x20 [ 80.796178] [ 80.859173] The buggy address ffff800087c7d7f3 belongs to a vmalloc virtual mapping [ 80.866811] The buggy address belongs to the physical page: [ 80.872365] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888889 [ 80.880352] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 80.886870] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 80.894591] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 80.902311] page dumped because: kasan: bad access detected [ 80.907865] [ 80.909342] Memory state around the buggy address: [ 80.914125] ffff800087c7d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 80.921323] ffff800087c7d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 80.928529] >ffff800087c7d780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 80.935729] ^ [ 80.942591] ffff800087c7d800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 80.949795] ffff800087c7d880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 80.956997] ================================================================== [ 80.964301] ================================================================== [ 80.971407] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 80.978090] Read of size 1 at addr ffff800087c7d7f8 by task kunit_try_catch/353 [ 80.985381] [ 80.986864] CPU: 6 UID: 0 PID: 353 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 80.986915] Tainted: [B]=BAD_PAGE, [N]=TEST [ 80.986932] Hardware name: WinLink E850-96 board (DT) [ 80.986954] Call trace: [ 80.986967] show_stack+0x20/0x38 (C) [ 80.987003] dump_stack_lvl+0x8c/0xd0 [ 80.987036] print_report+0x310/0x5d0 [ 80.987064] kasan_report+0xdc/0x128 [ 80.987090] __asan_report_load1_noabort+0x20/0x30 [ 80.987123] vmalloc_oob+0x51c/0x5d0 [ 80.987154] kunit_try_run_case+0x170/0x3f0 [ 80.987194] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 80.987226] kthread+0x328/0x630 [ 80.987256] ret_from_fork+0x10/0x20 [ 80.987292] [ 81.050314] The buggy address ffff800087c7d7f8 belongs to a vmalloc virtual mapping [ 81.057953] The buggy address belongs to the physical page: [ 81.063509] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888889 [ 81.071493] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 81.078010] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 81.085734] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 81.093454] page dumped because: kasan: bad access detected [ 81.099008] [ 81.100483] Memory state around the buggy address: [ 81.105262] ffff800087c7d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 81.112466] ffff800087c7d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 81.119671] >ffff800087c7d780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 81.126872] ^ [ 81.133994] ffff800087c7d800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 81.141199] ffff800087c7d880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 81.148399] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 64.908454] ================================================================== [ 64.915486] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 64.922862] Read of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 64.930153] [ 64.931636] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 64.931690] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.931707] Hardware name: WinLink E850-96 board (DT) [ 64.931728] Call trace: [ 64.931741] show_stack+0x20/0x38 (C) [ 64.931776] dump_stack_lvl+0x8c/0xd0 [ 64.931809] print_report+0x118/0x5d0 [ 64.931839] kasan_report+0xdc/0x128 [ 64.931866] __asan_report_load4_noabort+0x20/0x30 [ 64.931900] kasan_atomics_helper+0x40fc/0x4858 [ 64.931935] kasan_atomics+0x198/0x2e0 [ 64.931967] kunit_try_run_case+0x170/0x3f0 [ 64.932006] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.932039] kthread+0x328/0x630 [ 64.932068] ret_from_fork+0x10/0x20 [ 64.932102] [ 64.999770] Allocated by task 349: [ 65.003158] kasan_save_stack+0x3c/0x68 [ 65.006975] kasan_save_track+0x20/0x40 [ 65.010795] kasan_save_alloc_info+0x40/0x58 [ 65.015048] __kasan_kmalloc+0xd4/0xd8 [ 65.018781] __kmalloc_cache_noprof+0x16c/0x3c0 [ 65.023294] kasan_atomics+0xb8/0x2e0 [ 65.026940] kunit_try_run_case+0x170/0x3f0 [ 65.031107] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.036575] kthread+0x328/0x630 [ 65.039787] ret_from_fork+0x10/0x20 [ 65.043346] [ 65.044822] The buggy address belongs to the object at ffff000807848f80 [ 65.044822] which belongs to the cache kmalloc-64 of size 64 [ 65.057148] The buggy address is located 0 bytes to the right of [ 65.057148] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 65.069995] [ 65.071473] The buggy address belongs to the physical page: [ 65.077030] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 65.085015] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 65.091524] page_type: f5(slab) [ 65.094657] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 65.102380] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.110099] page dumped because: kasan: bad access detected [ 65.115654] [ 65.117130] Memory state around the buggy address: [ 65.121909] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.129112] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.136319] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 65.143518] ^ [ 65.148296] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.155501] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.162702] ================================================================== [ 68.081146] ================================================================== [ 68.088180] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858 [ 68.095471] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 68.102849] [ 68.104330] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 68.104381] Tainted: [B]=BAD_PAGE, [N]=TEST [ 68.104398] Hardware name: WinLink E850-96 board (DT) [ 68.104416] Call trace: [ 68.104429] show_stack+0x20/0x38 (C) [ 68.104461] dump_stack_lvl+0x8c/0xd0 [ 68.104491] print_report+0x118/0x5d0 [ 68.104519] kasan_report+0xdc/0x128 [ 68.104547] kasan_check_range+0x100/0x1a8 [ 68.104578] __kasan_check_write+0x20/0x30 [ 68.104609] kasan_atomics_helper+0x760/0x4858 [ 68.104645] kasan_atomics+0x198/0x2e0 [ 68.104677] kunit_try_run_case+0x170/0x3f0 [ 68.104711] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.104745] kthread+0x328/0x630 [ 68.104771] ret_from_fork+0x10/0x20 [ 68.104802] [ 68.175764] Allocated by task 349: [ 68.179150] kasan_save_stack+0x3c/0x68 [ 68.182969] kasan_save_track+0x20/0x40 [ 68.186789] kasan_save_alloc_info+0x40/0x58 [ 68.191042] __kasan_kmalloc+0xd4/0xd8 [ 68.194775] __kmalloc_cache_noprof+0x16c/0x3c0 [ 68.199289] kasan_atomics+0xb8/0x2e0 [ 68.202934] kunit_try_run_case+0x170/0x3f0 [ 68.207101] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.212570] kthread+0x328/0x630 [ 68.215781] ret_from_fork+0x10/0x20 [ 68.219340] [ 68.220816] The buggy address belongs to the object at ffff000807848f80 [ 68.220816] which belongs to the cache kmalloc-64 of size 64 [ 68.233143] The buggy address is located 0 bytes to the right of [ 68.233143] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 68.245989] [ 68.247465] The buggy address belongs to the physical page: [ 68.253021] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 68.261006] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 68.267517] page_type: f5(slab) [ 68.270649] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 68.278374] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 68.286093] page dumped because: kasan: bad access detected [ 68.291648] [ 68.293124] Memory state around the buggy address: [ 68.297902] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.305107] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.312311] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 68.319512] ^ [ 68.324291] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 68.331495] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 68.338696] ================================================================== [ 70.988733] ================================================================== [ 70.995776] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 71.003153] Read of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 71.010444] [ 71.011924] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 71.011972] Tainted: [B]=BAD_PAGE, [N]=TEST [ 71.011990] Hardware name: WinLink E850-96 board (DT) [ 71.012007] Call trace: [ 71.012019] show_stack+0x20/0x38 (C) [ 71.012051] dump_stack_lvl+0x8c/0xd0 [ 71.012082] print_report+0x118/0x5d0 [ 71.012111] kasan_report+0xdc/0x128 [ 71.012139] __asan_report_load4_noabort+0x20/0x30 [ 71.012172] kasan_atomics_helper+0x3dbc/0x4858 [ 71.012208] kasan_atomics+0x198/0x2e0 [ 71.012239] kunit_try_run_case+0x170/0x3f0 [ 71.012278] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.012311] kthread+0x328/0x630 [ 71.012338] ret_from_fork+0x10/0x20 [ 71.012370] [ 71.080061] Allocated by task 349: [ 71.083447] kasan_save_stack+0x3c/0x68 [ 71.087266] kasan_save_track+0x20/0x40 [ 71.091086] kasan_save_alloc_info+0x40/0x58 [ 71.095339] __kasan_kmalloc+0xd4/0xd8 [ 71.099071] __kmalloc_cache_noprof+0x16c/0x3c0 [ 71.103585] kasan_atomics+0xb8/0x2e0 [ 71.107231] kunit_try_run_case+0x170/0x3f0 [ 71.111398] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.116866] kthread+0x328/0x630 [ 71.120078] ret_from_fork+0x10/0x20 [ 71.123637] [ 71.125113] The buggy address belongs to the object at ffff000807848f80 [ 71.125113] which belongs to the cache kmalloc-64 of size 64 [ 71.137439] The buggy address is located 0 bytes to the right of [ 71.137439] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 71.150286] [ 71.151762] The buggy address belongs to the physical page: [ 71.157318] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 71.165305] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 71.171813] page_type: f5(slab) [ 71.174946] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 71.182671] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 71.190390] page dumped because: kasan: bad access detected [ 71.195945] [ 71.197420] Memory state around the buggy address: [ 71.202198] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.209403] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.216608] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 71.223809] ^ [ 71.228587] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 71.235792] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 71.242993] ================================================================== [ 64.114026] ================================================================== [ 64.121055] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 64.128345] Read of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 64.135634] [ 64.137120] CPU: 7 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 64.137181] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.137196] Hardware name: WinLink E850-96 board (DT) [ 64.137219] Call trace: [ 64.137235] show_stack+0x20/0x38 (C) [ 64.137270] dump_stack_lvl+0x8c/0xd0 [ 64.137304] print_report+0x118/0x5d0 [ 64.137334] kasan_report+0xdc/0x128 [ 64.137361] kasan_check_range+0x100/0x1a8 [ 64.137393] __kasan_check_read+0x20/0x30 [ 64.137426] kasan_atomics_helper+0x1ec/0x4858 [ 64.137461] kasan_atomics+0x198/0x2e0 [ 64.137493] kunit_try_run_case+0x170/0x3f0 [ 64.137532] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.137565] kthread+0x328/0x630 [ 64.137593] ret_from_fork+0x10/0x20 [ 64.137628] [ 64.208463] Allocated by task 349: [ 64.211851] kasan_save_stack+0x3c/0x68 [ 64.215668] kasan_save_track+0x20/0x40 [ 64.219487] kasan_save_alloc_info+0x40/0x58 [ 64.223741] __kasan_kmalloc+0xd4/0xd8 [ 64.227473] __kmalloc_cache_noprof+0x16c/0x3c0 [ 64.231987] kasan_atomics+0xb8/0x2e0 [ 64.235633] kunit_try_run_case+0x170/0x3f0 [ 64.239799] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.245268] kthread+0x328/0x630 [ 64.248480] ret_from_fork+0x10/0x20 [ 64.252039] [ 64.253516] The buggy address belongs to the object at ffff000807848f80 [ 64.253516] which belongs to the cache kmalloc-64 of size 64 [ 64.265841] The buggy address is located 0 bytes to the right of [ 64.265841] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 64.278689] [ 64.280165] The buggy address belongs to the physical page: [ 64.285722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 64.293707] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 64.300216] page_type: f5(slab) [ 64.303350] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 64.311072] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.318791] page dumped because: kasan: bad access detected [ 64.324347] [ 64.325822] Memory state around the buggy address: [ 64.330603] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.337805] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.345010] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 64.352211] ^ [ 64.356990] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 64.364193] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 64.371394] ================================================================== [ 65.961763] ================================================================== [ 65.968771] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 65.976058] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 65.983436] [ 65.984920] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 65.984973] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.984989] Hardware name: WinLink E850-96 board (DT) [ 65.985008] Call trace: [ 65.985025] show_stack+0x20/0x38 (C) [ 65.985057] dump_stack_lvl+0x8c/0xd0 [ 65.985090] print_report+0x118/0x5d0 [ 65.985118] kasan_report+0xdc/0x128 [ 65.985146] kasan_check_range+0x100/0x1a8 [ 65.985177] __kasan_check_write+0x20/0x30 [ 65.985208] kasan_atomics_helper+0x414/0x4858 [ 65.985245] kasan_atomics+0x198/0x2e0 [ 65.985279] kunit_try_run_case+0x170/0x3f0 [ 65.985315] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.985348] kthread+0x328/0x630 [ 65.985378] ret_from_fork+0x10/0x20 [ 65.985413] [ 66.056352] Allocated by task 349: [ 66.059737] kasan_save_stack+0x3c/0x68 [ 66.063557] kasan_save_track+0x20/0x40 [ 66.067376] kasan_save_alloc_info+0x40/0x58 [ 66.071630] __kasan_kmalloc+0xd4/0xd8 [ 66.075362] __kmalloc_cache_noprof+0x16c/0x3c0 [ 66.079876] kasan_atomics+0xb8/0x2e0 [ 66.083522] kunit_try_run_case+0x170/0x3f0 [ 66.087688] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.093157] kthread+0x328/0x630 [ 66.096368] ret_from_fork+0x10/0x20 [ 66.099928] [ 66.101403] The buggy address belongs to the object at ffff000807848f80 [ 66.101403] which belongs to the cache kmalloc-64 of size 64 [ 66.113730] The buggy address is located 0 bytes to the right of [ 66.113730] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 66.126576] [ 66.128054] The buggy address belongs to the physical page: [ 66.133610] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 66.141597] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 66.148104] page_type: f5(slab) [ 66.151238] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 66.158961] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.166680] page dumped because: kasan: bad access detected [ 66.172235] [ 66.173711] Memory state around the buggy address: [ 66.178490] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.185694] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.192901] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 66.200100] ^ [ 66.204877] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 66.212083] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 66.219283] ================================================================== [ 75.207929] ================================================================== [ 75.214986] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 75.222360] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 75.229738] [ 75.231219] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 75.231268] Tainted: [B]=BAD_PAGE, [N]=TEST [ 75.231285] Hardware name: WinLink E850-96 board (DT) [ 75.231304] Call trace: [ 75.231317] show_stack+0x20/0x38 (C) [ 75.231348] dump_stack_lvl+0x8c/0xd0 [ 75.231377] print_report+0x118/0x5d0 [ 75.231407] kasan_report+0xdc/0x128 [ 75.231435] kasan_check_range+0x100/0x1a8 [ 75.231464] __kasan_check_write+0x20/0x30 [ 75.231496] kasan_atomics_helper+0x10c0/0x4858 [ 75.231531] kasan_atomics+0x198/0x2e0 [ 75.231565] kunit_try_run_case+0x170/0x3f0 [ 75.231603] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.231635] kthread+0x328/0x630 [ 75.231662] ret_from_fork+0x10/0x20 [ 75.231693] [ 75.302741] Allocated by task 349: [ 75.306126] kasan_save_stack+0x3c/0x68 [ 75.309946] kasan_save_track+0x20/0x40 [ 75.313765] kasan_save_alloc_info+0x40/0x58 [ 75.318018] __kasan_kmalloc+0xd4/0xd8 [ 75.321751] __kmalloc_cache_noprof+0x16c/0x3c0 [ 75.326265] kasan_atomics+0xb8/0x2e0 [ 75.329911] kunit_try_run_case+0x170/0x3f0 [ 75.334077] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.339546] kthread+0x328/0x630 [ 75.342758] ret_from_fork+0x10/0x20 [ 75.346317] [ 75.347792] The buggy address belongs to the object at ffff000807848f80 [ 75.347792] which belongs to the cache kmalloc-64 of size 64 [ 75.360119] The buggy address is located 0 bytes to the right of [ 75.360119] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 75.372965] [ 75.374441] The buggy address belongs to the physical page: [ 75.379998] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 75.387983] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 75.394493] page_type: f5(slab) [ 75.397627] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 75.405350] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 75.413069] page dumped because: kasan: bad access detected [ 75.418624] [ 75.420100] Memory state around the buggy address: [ 75.424878] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.432083] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.439288] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 75.446489] ^ [ 75.451266] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 75.458471] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 75.465672] ================================================================== [ 76.798493] ================================================================== [ 76.805585] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 76.812962] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 76.820340] [ 76.821819] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 76.821868] Tainted: [B]=BAD_PAGE, [N]=TEST [ 76.821885] Hardware name: WinLink E850-96 board (DT) [ 76.821902] Call trace: [ 76.821915] show_stack+0x20/0x38 (C) [ 76.821948] dump_stack_lvl+0x8c/0xd0 [ 76.821979] print_report+0x118/0x5d0 [ 76.822006] kasan_report+0xdc/0x128 [ 76.822035] kasan_check_range+0x100/0x1a8 [ 76.822063] __kasan_check_write+0x20/0x30 [ 76.822095] kasan_atomics_helper+0x1384/0x4858 [ 76.822129] kasan_atomics+0x198/0x2e0 [ 76.822163] kunit_try_run_case+0x170/0x3f0 [ 76.822198] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.822232] kthread+0x328/0x630 [ 76.822259] ret_from_fork+0x10/0x20 [ 76.822292] [ 76.893342] Allocated by task 349: [ 76.896727] kasan_save_stack+0x3c/0x68 [ 76.900547] kasan_save_track+0x20/0x40 [ 76.904366] kasan_save_alloc_info+0x40/0x58 [ 76.908619] __kasan_kmalloc+0xd4/0xd8 [ 76.912352] __kmalloc_cache_noprof+0x16c/0x3c0 [ 76.916866] kasan_atomics+0xb8/0x2e0 [ 76.920512] kunit_try_run_case+0x170/0x3f0 [ 76.924678] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.930147] kthread+0x328/0x630 [ 76.933359] ret_from_fork+0x10/0x20 [ 76.936918] [ 76.938393] The buggy address belongs to the object at ffff000807848f80 [ 76.938393] which belongs to the cache kmalloc-64 of size 64 [ 76.950720] The buggy address is located 0 bytes to the right of [ 76.950720] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 76.963567] [ 76.965042] The buggy address belongs to the physical page: [ 76.970598] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 76.978584] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 76.985094] page_type: f5(slab) [ 76.988227] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 76.995951] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 77.003670] page dumped because: kasan: bad access detected [ 77.009225] [ 77.010701] Memory state around the buggy address: [ 77.015479] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 77.022684] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 77.029889] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 77.037090] ^ [ 77.041868] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 77.049073] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 77.056274] ================================================================== [ 69.932304] ================================================================== [ 69.939368] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 69.946659] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 69.954037] [ 69.955516] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 69.955567] Tainted: [B]=BAD_PAGE, [N]=TEST [ 69.955582] Hardware name: WinLink E850-96 board (DT) [ 69.955599] Call trace: [ 69.955611] show_stack+0x20/0x38 (C) [ 69.955641] dump_stack_lvl+0x8c/0xd0 [ 69.955673] print_report+0x118/0x5d0 [ 69.955699] kasan_report+0xdc/0x128 [ 69.955724] kasan_check_range+0x100/0x1a8 [ 69.955756] __kasan_check_write+0x20/0x30 [ 69.955787] kasan_atomics_helper+0xa6c/0x4858 [ 69.955823] kasan_atomics+0x198/0x2e0 [ 69.955857] kunit_try_run_case+0x170/0x3f0 [ 69.955890] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.955923] kthread+0x328/0x630 [ 69.955949] ret_from_fork+0x10/0x20 [ 69.955982] [ 70.026952] Allocated by task 349: [ 70.030337] kasan_save_stack+0x3c/0x68 [ 70.034157] kasan_save_track+0x20/0x40 [ 70.037976] kasan_save_alloc_info+0x40/0x58 [ 70.042230] __kasan_kmalloc+0xd4/0xd8 [ 70.045962] __kmalloc_cache_noprof+0x16c/0x3c0 [ 70.050476] kasan_atomics+0xb8/0x2e0 [ 70.054122] kunit_try_run_case+0x170/0x3f0 [ 70.058289] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.063757] kthread+0x328/0x630 [ 70.066968] ret_from_fork+0x10/0x20 [ 70.070528] [ 70.072004] The buggy address belongs to the object at ffff000807848f80 [ 70.072004] which belongs to the cache kmalloc-64 of size 64 [ 70.084330] The buggy address is located 0 bytes to the right of [ 70.084330] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 70.097177] [ 70.098653] The buggy address belongs to the physical page: [ 70.104208] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 70.112194] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 70.118704] page_type: f5(slab) [ 70.121837] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 70.129561] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 70.137280] page dumped because: kasan: bad access detected [ 70.142836] [ 70.144311] Memory state around the buggy address: [ 70.149089] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.156294] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.163499] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 70.170700] ^ [ 70.175478] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 70.182682] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 70.189884] ================================================================== [ 77.855473] ================================================================== [ 77.862513] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 77.869890] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 77.877268] [ 77.878750] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 77.878800] Tainted: [B]=BAD_PAGE, [N]=TEST [ 77.878815] Hardware name: WinLink E850-96 board (DT) [ 77.878835] Call trace: [ 77.878848] show_stack+0x20/0x38 (C) [ 77.878882] dump_stack_lvl+0x8c/0xd0 [ 77.878911] print_report+0x118/0x5d0 [ 77.878941] kasan_report+0xdc/0x128 [ 77.878969] kasan_check_range+0x100/0x1a8 [ 77.879001] __kasan_check_write+0x20/0x30 [ 77.879029] kasan_atomics_helper+0x14e4/0x4858 [ 77.879064] kasan_atomics+0x198/0x2e0 [ 77.879097] kunit_try_run_case+0x170/0x3f0 [ 77.879131] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.879165] kthread+0x328/0x630 [ 77.879191] ret_from_fork+0x10/0x20 [ 77.879222] [ 77.950270] Allocated by task 349: [ 77.953656] kasan_save_stack+0x3c/0x68 [ 77.957475] kasan_save_track+0x20/0x40 [ 77.961295] kasan_save_alloc_info+0x40/0x58 [ 77.965548] __kasan_kmalloc+0xd4/0xd8 [ 77.969281] __kmalloc_cache_noprof+0x16c/0x3c0 [ 77.973795] kasan_atomics+0xb8/0x2e0 [ 77.977440] kunit_try_run_case+0x170/0x3f0 [ 77.981607] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.987076] kthread+0x328/0x630 [ 77.990287] ret_from_fork+0x10/0x20 [ 77.993846] [ 77.995322] The buggy address belongs to the object at ffff000807848f80 [ 77.995322] which belongs to the cache kmalloc-64 of size 64 [ 78.007649] The buggy address is located 0 bytes to the right of [ 78.007649] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 78.020495] [ 78.021973] The buggy address belongs to the physical page: [ 78.027527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 78.035513] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 78.042023] page_type: f5(slab) [ 78.045157] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 78.052879] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 78.060598] page dumped because: kasan: bad access detected [ 78.066154] [ 78.067630] Memory state around the buggy address: [ 78.072408] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 78.079613] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 78.086818] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 78.094018] ^ [ 78.098796] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 78.106001] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 78.113202] ================================================================== [ 63.583501] ================================================================== [ 63.597628] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 63.605004] Read of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 63.612293] [ 63.613777] CPU: 5 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 63.613840] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.613856] Hardware name: WinLink E850-96 board (DT) [ 63.613879] Call trace: [ 63.613894] show_stack+0x20/0x38 (C) [ 63.613930] dump_stack_lvl+0x8c/0xd0 [ 63.613964] print_report+0x118/0x5d0 [ 63.613995] kasan_report+0xdc/0x128 [ 63.614022] __asan_report_load4_noabort+0x20/0x30 [ 63.614059] kasan_atomics_helper+0x40a8/0x4858 [ 63.614095] kasan_atomics+0x198/0x2e0 [ 63.614127] kunit_try_run_case+0x170/0x3f0 [ 63.614168] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.614203] kthread+0x328/0x630 [ 63.614233] ret_from_fork+0x10/0x20 [ 63.614270] [ 63.681910] Allocated by task 349: [ 63.685295] kasan_save_stack+0x3c/0x68 [ 63.689113] kasan_save_track+0x20/0x40 [ 63.692932] kasan_save_alloc_info+0x40/0x58 [ 63.697186] __kasan_kmalloc+0xd4/0xd8 [ 63.700920] __kmalloc_cache_noprof+0x16c/0x3c0 [ 63.705432] kasan_atomics+0xb8/0x2e0 [ 63.709078] kunit_try_run_case+0x170/0x3f0 [ 63.713244] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.718713] kthread+0x328/0x630 [ 63.721925] ret_from_fork+0x10/0x20 [ 63.725484] [ 63.726961] The buggy address belongs to the object at ffff000807848f80 [ 63.726961] which belongs to the cache kmalloc-64 of size 64 [ 63.739288] The buggy address is located 0 bytes to the right of [ 63.739288] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 63.752133] [ 63.753612] The buggy address belongs to the physical page: [ 63.759168] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 63.767153] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.773663] page_type: f5(slab) [ 63.776798] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 63.784517] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.792238] page dumped because: kasan: bad access detected [ 63.797792] [ 63.799267] Memory state around the buggy address: [ 63.804049] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.811251] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.818457] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 63.825656] ^ [ 63.830435] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 63.837639] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 63.844843] ================================================================== [ 79.439102] ================================================================== [ 79.446170] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 79.453547] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 79.460925] [ 79.462406] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 79.462457] Tainted: [B]=BAD_PAGE, [N]=TEST [ 79.462474] Hardware name: WinLink E850-96 board (DT) [ 79.462494] Call trace: [ 79.462505] show_stack+0x20/0x38 (C) [ 79.462539] dump_stack_lvl+0x8c/0xd0 [ 79.462570] print_report+0x118/0x5d0 [ 79.462597] kasan_report+0xdc/0x128 [ 79.462625] kasan_check_range+0x100/0x1a8 [ 79.462655] __kasan_check_write+0x20/0x30 [ 79.462686] kasan_atomics_helper+0x16d0/0x4858 [ 79.462722] kasan_atomics+0x198/0x2e0 [ 79.462753] kunit_try_run_case+0x170/0x3f0 [ 79.462789] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 79.462821] kthread+0x328/0x630 [ 79.462849] ret_from_fork+0x10/0x20 [ 79.462880] [ 79.533927] Allocated by task 349: [ 79.537313] kasan_save_stack+0x3c/0x68 [ 79.541132] kasan_save_track+0x20/0x40 [ 79.544952] kasan_save_alloc_info+0x40/0x58 [ 79.549205] __kasan_kmalloc+0xd4/0xd8 [ 79.552937] __kmalloc_cache_noprof+0x16c/0x3c0 [ 79.557451] kasan_atomics+0xb8/0x2e0 [ 79.561097] kunit_try_run_case+0x170/0x3f0 [ 79.565264] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 79.570732] kthread+0x328/0x630 [ 79.573944] ret_from_fork+0x10/0x20 [ 79.577503] [ 79.578979] The buggy address belongs to the object at ffff000807848f80 [ 79.578979] which belongs to the cache kmalloc-64 of size 64 [ 79.591306] The buggy address is located 0 bytes to the right of [ 79.591306] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 79.604152] [ 79.605630] The buggy address belongs to the physical page: [ 79.611184] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 79.619170] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 79.625680] page_type: f5(slab) [ 79.628814] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 79.636537] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 79.644256] page dumped because: kasan: bad access detected [ 79.649811] [ 79.651287] Memory state around the buggy address: [ 79.656064] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 79.663269] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 79.670474] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 79.677675] ^ [ 79.682453] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 79.689658] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 79.696859] ================================================================== [ 69.137553] ================================================================== [ 69.144588] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 69.151879] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 69.159257] [ 69.160738] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 69.160785] Tainted: [B]=BAD_PAGE, [N]=TEST [ 69.160801] Hardware name: WinLink E850-96 board (DT) [ 69.160816] Call trace: [ 69.160830] show_stack+0x20/0x38 (C) [ 69.160863] dump_stack_lvl+0x8c/0xd0 [ 69.160893] print_report+0x118/0x5d0 [ 69.160920] kasan_report+0xdc/0x128 [ 69.160947] kasan_check_range+0x100/0x1a8 [ 69.160977] __kasan_check_write+0x20/0x30 [ 69.161008] kasan_atomics_helper+0x934/0x4858 [ 69.161043] kasan_atomics+0x198/0x2e0 [ 69.161076] kunit_try_run_case+0x170/0x3f0 [ 69.161113] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.161145] kthread+0x328/0x630 [ 69.161172] ret_from_fork+0x10/0x20 [ 69.161203] [ 69.232172] Allocated by task 349: [ 69.235558] kasan_save_stack+0x3c/0x68 [ 69.239377] kasan_save_track+0x20/0x40 [ 69.243197] kasan_save_alloc_info+0x40/0x58 [ 69.247450] __kasan_kmalloc+0xd4/0xd8 [ 69.251183] __kmalloc_cache_noprof+0x16c/0x3c0 [ 69.255696] kasan_atomics+0xb8/0x2e0 [ 69.259342] kunit_try_run_case+0x170/0x3f0 [ 69.263508] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.268977] kthread+0x328/0x630 [ 69.272189] ret_from_fork+0x10/0x20 [ 69.275748] [ 69.277224] The buggy address belongs to the object at ffff000807848f80 [ 69.277224] which belongs to the cache kmalloc-64 of size 64 [ 69.289550] The buggy address is located 0 bytes to the right of [ 69.289550] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 69.302397] [ 69.303873] The buggy address belongs to the physical page: [ 69.309429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 69.317416] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 69.323924] page_type: f5(slab) [ 69.327059] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 69.334781] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 69.342501] page dumped because: kasan: bad access detected [ 69.348056] [ 69.349531] Memory state around the buggy address: [ 69.354310] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.361515] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.368719] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 69.375920] ^ [ 69.380698] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 69.387902] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 69.395104] ================================================================== [ 68.346048] ================================================================== [ 68.353107] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 68.360397] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 68.367776] [ 68.369255] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 68.369302] Tainted: [B]=BAD_PAGE, [N]=TEST [ 68.369318] Hardware name: WinLink E850-96 board (DT) [ 68.369336] Call trace: [ 68.369349] show_stack+0x20/0x38 (C) [ 68.369380] dump_stack_lvl+0x8c/0xd0 [ 68.369411] print_report+0x118/0x5d0 [ 68.369437] kasan_report+0xdc/0x128 [ 68.369466] kasan_check_range+0x100/0x1a8 [ 68.369494] __kasan_check_write+0x20/0x30 [ 68.369524] kasan_atomics_helper+0x7cc/0x4858 [ 68.369559] kasan_atomics+0x198/0x2e0 [ 68.369592] kunit_try_run_case+0x170/0x3f0 [ 68.369627] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.369659] kthread+0x328/0x630 [ 68.369686] ret_from_fork+0x10/0x20 [ 68.369716] [ 68.440691] Allocated by task 349: [ 68.444077] kasan_save_stack+0x3c/0x68 [ 68.447896] kasan_save_track+0x20/0x40 [ 68.451715] kasan_save_alloc_info+0x40/0x58 [ 68.455969] __kasan_kmalloc+0xd4/0xd8 [ 68.459701] __kmalloc_cache_noprof+0x16c/0x3c0 [ 68.464215] kasan_atomics+0xb8/0x2e0 [ 68.467861] kunit_try_run_case+0x170/0x3f0 [ 68.472027] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.477496] kthread+0x328/0x630 [ 68.480708] ret_from_fork+0x10/0x20 [ 68.484267] [ 68.485742] The buggy address belongs to the object at ffff000807848f80 [ 68.485742] which belongs to the cache kmalloc-64 of size 64 [ 68.498069] The buggy address is located 0 bytes to the right of [ 68.498069] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 68.510916] [ 68.512391] The buggy address belongs to the physical page: [ 68.517947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 68.525933] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 68.532443] page_type: f5(slab) [ 68.535578] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 68.543300] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 68.551020] page dumped because: kasan: bad access detected [ 68.556575] [ 68.558050] Memory state around the buggy address: [ 68.562828] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.570033] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.577238] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 68.584439] ^ [ 68.589217] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 68.596421] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 68.603623] ================================================================== [ 71.250340] ================================================================== [ 71.257404] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 71.264694] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 71.272072] [ 71.273551] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 71.273601] Tainted: [B]=BAD_PAGE, [N]=TEST [ 71.273619] Hardware name: WinLink E850-96 board (DT) [ 71.273638] Call trace: [ 71.273653] show_stack+0x20/0x38 (C) [ 71.273686] dump_stack_lvl+0x8c/0xd0 [ 71.273716] print_report+0x118/0x5d0 [ 71.273746] kasan_report+0xdc/0x128 [ 71.273772] kasan_check_range+0x100/0x1a8 [ 71.273803] __kasan_check_write+0x20/0x30 [ 71.273835] kasan_atomics_helper+0xc08/0x4858 [ 71.273870] kasan_atomics+0x198/0x2e0 [ 71.273903] kunit_try_run_case+0x170/0x3f0 [ 71.273937] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.273971] kthread+0x328/0x630 [ 71.273998] ret_from_fork+0x10/0x20 [ 71.274029] [ 71.344988] Allocated by task 349: [ 71.348373] kasan_save_stack+0x3c/0x68 [ 71.352192] kasan_save_track+0x20/0x40 [ 71.356012] kasan_save_alloc_info+0x40/0x58 [ 71.360266] __kasan_kmalloc+0xd4/0xd8 [ 71.363998] __kmalloc_cache_noprof+0x16c/0x3c0 [ 71.368512] kasan_atomics+0xb8/0x2e0 [ 71.372157] kunit_try_run_case+0x170/0x3f0 [ 71.376324] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.381793] kthread+0x328/0x630 [ 71.385005] ret_from_fork+0x10/0x20 [ 71.388564] [ 71.390039] The buggy address belongs to the object at ffff000807848f80 [ 71.390039] which belongs to the cache kmalloc-64 of size 64 [ 71.402366] The buggy address is located 0 bytes to the right of [ 71.402366] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 71.415212] [ 71.416688] The buggy address belongs to the physical page: [ 71.422244] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 71.430230] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 71.436740] page_type: f5(slab) [ 71.439873] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 71.447597] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 71.455316] page dumped because: kasan: bad access detected [ 71.460871] [ 71.462347] Memory state around the buggy address: [ 71.467125] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.474330] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.481534] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 71.488735] ^ [ 71.493513] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 71.500718] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 71.507920] ================================================================== [ 78.650751] ================================================================== [ 78.657813] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 78.665191] Read of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 78.672482] [ 78.673962] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 78.674008] Tainted: [B]=BAD_PAGE, [N]=TEST [ 78.674026] Hardware name: WinLink E850-96 board (DT) [ 78.674046] Call trace: [ 78.674056] show_stack+0x20/0x38 (C) [ 78.674091] dump_stack_lvl+0x8c/0xd0 [ 78.674119] print_report+0x118/0x5d0 [ 78.674147] kasan_report+0xdc/0x128 [ 78.674176] __asan_report_load8_noabort+0x20/0x30 [ 78.674208] kasan_atomics_helper+0x3db0/0x4858 [ 78.674243] kasan_atomics+0x198/0x2e0 [ 78.674277] kunit_try_run_case+0x170/0x3f0 [ 78.674312] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 78.674345] kthread+0x328/0x630 [ 78.674372] ret_from_fork+0x10/0x20 [ 78.674404] [ 78.742099] Allocated by task 349: [ 78.745484] kasan_save_stack+0x3c/0x68 [ 78.749304] kasan_save_track+0x20/0x40 [ 78.753123] kasan_save_alloc_info+0x40/0x58 [ 78.757377] __kasan_kmalloc+0xd4/0xd8 [ 78.761109] __kmalloc_cache_noprof+0x16c/0x3c0 [ 78.765623] kasan_atomics+0xb8/0x2e0 [ 78.769269] kunit_try_run_case+0x170/0x3f0 [ 78.773435] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 78.778904] kthread+0x328/0x630 [ 78.782116] ret_from_fork+0x10/0x20 [ 78.785675] [ 78.787150] The buggy address belongs to the object at ffff000807848f80 [ 78.787150] which belongs to the cache kmalloc-64 of size 64 [ 78.799477] The buggy address is located 0 bytes to the right of [ 78.799477] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 78.812324] [ 78.813799] The buggy address belongs to the physical page: [ 78.819355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 78.827341] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 78.833851] page_type: f5(slab) [ 78.836984] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 78.844708] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 78.852427] page dumped because: kasan: bad access detected [ 78.857983] [ 78.859458] Memory state around the buggy address: [ 78.864236] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 78.871441] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 78.878646] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 78.885847] ^ [ 78.890625] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 78.897829] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 78.905031] ================================================================== [ 73.621310] ================================================================== [ 73.628376] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 73.635752] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 73.643130] [ 73.644611] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 73.644660] Tainted: [B]=BAD_PAGE, [N]=TEST [ 73.644677] Hardware name: WinLink E850-96 board (DT) [ 73.644695] Call trace: [ 73.644709] show_stack+0x20/0x38 (C) [ 73.644743] dump_stack_lvl+0x8c/0xd0 [ 73.644775] print_report+0x118/0x5d0 [ 73.644803] kasan_report+0xdc/0x128 [ 73.644830] __asan_report_store8_noabort+0x20/0x30 [ 73.644862] kasan_atomics_helper+0x3e5c/0x4858 [ 73.644897] kasan_atomics+0x198/0x2e0 [ 73.644931] kunit_try_run_case+0x170/0x3f0 [ 73.644966] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.645000] kthread+0x328/0x630 [ 73.645028] ret_from_fork+0x10/0x20 [ 73.645059] [ 73.712834] Allocated by task 349: [ 73.716219] kasan_save_stack+0x3c/0x68 [ 73.720039] kasan_save_track+0x20/0x40 [ 73.723858] kasan_save_alloc_info+0x40/0x58 [ 73.728112] __kasan_kmalloc+0xd4/0xd8 [ 73.731844] __kmalloc_cache_noprof+0x16c/0x3c0 [ 73.736358] kasan_atomics+0xb8/0x2e0 [ 73.740004] kunit_try_run_case+0x170/0x3f0 [ 73.744171] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.749639] kthread+0x328/0x630 [ 73.752851] ret_from_fork+0x10/0x20 [ 73.756410] [ 73.757886] The buggy address belongs to the object at ffff000807848f80 [ 73.757886] which belongs to the cache kmalloc-64 of size 64 [ 73.770212] The buggy address is located 0 bytes to the right of [ 73.770212] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 73.783059] [ 73.784535] The buggy address belongs to the physical page: [ 73.790090] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 73.798076] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 73.804586] page_type: f5(slab) [ 73.807723] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 73.815443] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 73.823163] page dumped because: kasan: bad access detected [ 73.828718] [ 73.830194] Memory state around the buggy address: [ 73.834971] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.842176] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.849381] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.856582] ^ [ 73.861360] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 73.868565] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 73.875766] ================================================================== [ 78.120523] ================================================================== [ 78.127614] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 78.134991] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 78.142369] [ 78.143848] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 78.143895] Tainted: [B]=BAD_PAGE, [N]=TEST [ 78.143912] Hardware name: WinLink E850-96 board (DT) [ 78.143930] Call trace: [ 78.143944] show_stack+0x20/0x38 (C) [ 78.143979] dump_stack_lvl+0x8c/0xd0 [ 78.144007] print_report+0x118/0x5d0 [ 78.144038] kasan_report+0xdc/0x128 [ 78.144067] kasan_check_range+0x100/0x1a8 [ 78.144098] __kasan_check_write+0x20/0x30 [ 78.144129] kasan_atomics_helper+0x154c/0x4858 [ 78.144165] kasan_atomics+0x198/0x2e0 [ 78.144198] kunit_try_run_case+0x170/0x3f0 [ 78.144235] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 78.144267] kthread+0x328/0x630 [ 78.144293] ret_from_fork+0x10/0x20 [ 78.144326] [ 78.215371] Allocated by task 349: [ 78.218757] kasan_save_stack+0x3c/0x68 [ 78.222575] kasan_save_track+0x20/0x40 [ 78.226395] kasan_save_alloc_info+0x40/0x58 [ 78.230648] __kasan_kmalloc+0xd4/0xd8 [ 78.234381] __kmalloc_cache_noprof+0x16c/0x3c0 [ 78.238895] kasan_atomics+0xb8/0x2e0 [ 78.242540] kunit_try_run_case+0x170/0x3f0 [ 78.246707] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 78.252176] kthread+0x328/0x630 [ 78.255387] ret_from_fork+0x10/0x20 [ 78.258946] [ 78.260422] The buggy address belongs to the object at ffff000807848f80 [ 78.260422] which belongs to the cache kmalloc-64 of size 64 [ 78.272749] The buggy address is located 0 bytes to the right of [ 78.272749] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 78.285595] [ 78.287071] The buggy address belongs to the physical page: [ 78.292627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 78.300613] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 78.307123] page_type: f5(slab) [ 78.310256] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 78.317980] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 78.325699] page dumped because: kasan: bad access detected [ 78.331254] [ 78.332730] Memory state around the buggy address: [ 78.337508] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 78.344713] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 78.351917] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 78.359119] ^ [ 78.363897] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 78.371101] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 78.378302] ================================================================== [ 78.912400] ================================================================== [ 78.919442] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 78.926819] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 78.934197] [ 78.935676] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 78.935725] Tainted: [B]=BAD_PAGE, [N]=TEST [ 78.935741] Hardware name: WinLink E850-96 board (DT) [ 78.935758] Call trace: [ 78.935772] show_stack+0x20/0x38 (C) [ 78.935804] dump_stack_lvl+0x8c/0xd0 [ 78.935834] print_report+0x118/0x5d0 [ 78.935864] kasan_report+0xdc/0x128 [ 78.935891] kasan_check_range+0x100/0x1a8 [ 78.935922] __kasan_check_write+0x20/0x30 [ 78.935955] kasan_atomics_helper+0x1644/0x4858 [ 78.935989] kasan_atomics+0x198/0x2e0 [ 78.936021] kunit_try_run_case+0x170/0x3f0 [ 78.936056] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 78.936088] kthread+0x328/0x630 [ 78.936116] ret_from_fork+0x10/0x20 [ 78.936149] [ 79.007199] Allocated by task 349: [ 79.010585] kasan_save_stack+0x3c/0x68 [ 79.014404] kasan_save_track+0x20/0x40 [ 79.018223] kasan_save_alloc_info+0x40/0x58 [ 79.022477] __kasan_kmalloc+0xd4/0xd8 [ 79.026209] __kmalloc_cache_noprof+0x16c/0x3c0 [ 79.030723] kasan_atomics+0xb8/0x2e0 [ 79.034369] kunit_try_run_case+0x170/0x3f0 [ 79.038535] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 79.044004] kthread+0x328/0x630 [ 79.047216] ret_from_fork+0x10/0x20 [ 79.050775] [ 79.052251] The buggy address belongs to the object at ffff000807848f80 [ 79.052251] which belongs to the cache kmalloc-64 of size 64 [ 79.064577] The buggy address is located 0 bytes to the right of [ 79.064577] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 79.077424] [ 79.078900] The buggy address belongs to the physical page: [ 79.084455] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 79.092441] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 79.098951] page_type: f5(slab) [ 79.102087] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 79.109808] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 79.117527] page dumped because: kasan: bad access detected [ 79.123082] [ 79.124558] Memory state around the buggy address: [ 79.129336] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 79.136541] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 79.143746] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 79.150947] ^ [ 79.155725] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 79.162930] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 79.170131] ================================================================== [ 65.696840] ================================================================== [ 65.703844] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858 [ 65.711132] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 65.718510] [ 65.719993] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 65.720046] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.720061] Hardware name: WinLink E850-96 board (DT) [ 65.720082] Call trace: [ 65.720096] show_stack+0x20/0x38 (C) [ 65.720132] dump_stack_lvl+0x8c/0xd0 [ 65.720164] print_report+0x118/0x5d0 [ 65.720193] kasan_report+0xdc/0x128 [ 65.720221] kasan_check_range+0x100/0x1a8 [ 65.720251] __kasan_check_write+0x20/0x30 [ 65.720283] kasan_atomics_helper+0x3ac/0x4858 [ 65.720320] kasan_atomics+0x198/0x2e0 [ 65.720352] kunit_try_run_case+0x170/0x3f0 [ 65.720388] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.720420] kthread+0x328/0x630 [ 65.720450] ret_from_fork+0x10/0x20 [ 65.720485] [ 65.791425] Allocated by task 349: [ 65.794811] kasan_save_stack+0x3c/0x68 [ 65.798630] kasan_save_track+0x20/0x40 [ 65.802449] kasan_save_alloc_info+0x40/0x58 [ 65.806703] __kasan_kmalloc+0xd4/0xd8 [ 65.810435] __kmalloc_cache_noprof+0x16c/0x3c0 [ 65.814949] kasan_atomics+0xb8/0x2e0 [ 65.818595] kunit_try_run_case+0x170/0x3f0 [ 65.822762] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.828230] kthread+0x328/0x630 [ 65.831442] ret_from_fork+0x10/0x20 [ 65.835001] [ 65.836477] The buggy address belongs to the object at ffff000807848f80 [ 65.836477] which belongs to the cache kmalloc-64 of size 64 [ 65.848803] The buggy address is located 0 bytes to the right of [ 65.848803] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 65.861650] [ 65.863127] The buggy address belongs to the physical page: [ 65.868683] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 65.876671] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 65.883178] page_type: f5(slab) [ 65.886313] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 65.894035] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.901754] page dumped because: kasan: bad access detected [ 65.907309] [ 65.908784] Memory state around the buggy address: [ 65.913563] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.920767] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.927974] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 65.935173] ^ [ 65.939951] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.947156] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.954357] ================================================================== [ 68.611000] ================================================================== [ 68.618034] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 68.625324] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 68.632702] [ 68.634183] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 68.634232] Tainted: [B]=BAD_PAGE, [N]=TEST [ 68.634247] Hardware name: WinLink E850-96 board (DT) [ 68.634268] Call trace: [ 68.634280] show_stack+0x20/0x38 (C) [ 68.634311] dump_stack_lvl+0x8c/0xd0 [ 68.634343] print_report+0x118/0x5d0 [ 68.634371] kasan_report+0xdc/0x128 [ 68.634399] kasan_check_range+0x100/0x1a8 [ 68.634430] __kasan_check_write+0x20/0x30 [ 68.634461] kasan_atomics_helper+0x894/0x4858 [ 68.634496] kasan_atomics+0x198/0x2e0 [ 68.634529] kunit_try_run_case+0x170/0x3f0 [ 68.634562] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.634594] kthread+0x328/0x630 [ 68.634624] ret_from_fork+0x10/0x20 [ 68.634656] [ 68.705617] Allocated by task 349: [ 68.709003] kasan_save_stack+0x3c/0x68 [ 68.712822] kasan_save_track+0x20/0x40 [ 68.716642] kasan_save_alloc_info+0x40/0x58 [ 68.720895] __kasan_kmalloc+0xd4/0xd8 [ 68.724628] __kmalloc_cache_noprof+0x16c/0x3c0 [ 68.729142] kasan_atomics+0xb8/0x2e0 [ 68.732787] kunit_try_run_case+0x170/0x3f0 [ 68.736954] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.742423] kthread+0x328/0x630 [ 68.745634] ret_from_fork+0x10/0x20 [ 68.749193] [ 68.750669] The buggy address belongs to the object at ffff000807848f80 [ 68.750669] which belongs to the cache kmalloc-64 of size 64 [ 68.762996] The buggy address is located 0 bytes to the right of [ 68.762996] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 68.775842] [ 68.777318] The buggy address belongs to the physical page: [ 68.782874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 68.790861] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 68.797370] page_type: f5(slab) [ 68.800503] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 68.808227] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 68.815946] page dumped because: kasan: bad access detected [ 68.821501] [ 68.822977] Memory state around the buggy address: [ 68.827755] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.834960] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.842165] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 68.849366] ^ [ 68.854143] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 68.861348] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 68.868549] ================================================================== [ 72.568401] ================================================================== [ 72.575440] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 72.582817] Read of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 72.590108] [ 72.591587] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 72.591639] Tainted: [B]=BAD_PAGE, [N]=TEST [ 72.591657] Hardware name: WinLink E850-96 board (DT) [ 72.591676] Call trace: [ 72.591689] show_stack+0x20/0x38 (C) [ 72.591721] dump_stack_lvl+0x8c/0xd0 [ 72.591753] print_report+0x118/0x5d0 [ 72.591782] kasan_report+0xdc/0x128 [ 72.591810] __asan_report_load4_noabort+0x20/0x30 [ 72.591842] kasan_atomics_helper+0x3e04/0x4858 [ 72.591877] kasan_atomics+0x198/0x2e0 [ 72.591911] kunit_try_run_case+0x170/0x3f0 [ 72.591946] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.591981] kthread+0x328/0x630 [ 72.592008] ret_from_fork+0x10/0x20 [ 72.592040] [ 72.659725] Allocated by task 349: [ 72.663110] kasan_save_stack+0x3c/0x68 [ 72.666930] kasan_save_track+0x20/0x40 [ 72.670749] kasan_save_alloc_info+0x40/0x58 [ 72.675003] __kasan_kmalloc+0xd4/0xd8 [ 72.678735] __kmalloc_cache_noprof+0x16c/0x3c0 [ 72.683249] kasan_atomics+0xb8/0x2e0 [ 72.686895] kunit_try_run_case+0x170/0x3f0 [ 72.691061] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.696530] kthread+0x328/0x630 [ 72.699742] ret_from_fork+0x10/0x20 [ 72.703301] [ 72.704776] The buggy address belongs to the object at ffff000807848f80 [ 72.704776] which belongs to the cache kmalloc-64 of size 64 [ 72.717103] The buggy address is located 0 bytes to the right of [ 72.717103] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 72.729950] [ 72.731426] The buggy address belongs to the physical page: [ 72.736982] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 72.744967] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 72.751477] page_type: f5(slab) [ 72.754610] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 72.762334] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 72.770053] page dumped because: kasan: bad access detected [ 72.775609] [ 72.777084] Memory state around the buggy address: [ 72.781862] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.789067] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.796272] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 72.803473] ^ [ 72.808251] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 72.815455] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 72.822657] ================================================================== [ 67.286368] ================================================================== [ 67.293401] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 67.300691] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 67.308071] [ 67.309553] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 67.309605] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.309622] Hardware name: WinLink E850-96 board (DT) [ 67.309642] Call trace: [ 67.309652] show_stack+0x20/0x38 (C) [ 67.309684] dump_stack_lvl+0x8c/0xd0 [ 67.309716] print_report+0x118/0x5d0 [ 67.309745] kasan_report+0xdc/0x128 [ 67.309773] kasan_check_range+0x100/0x1a8 [ 67.309802] __kasan_check_write+0x20/0x30 [ 67.309833] kasan_atomics_helper+0x61c/0x4858 [ 67.309869] kasan_atomics+0x198/0x2e0 [ 67.309900] kunit_try_run_case+0x170/0x3f0 [ 67.309936] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.309969] kthread+0x328/0x630 [ 67.309996] ret_from_fork+0x10/0x20 [ 67.310029] [ 67.380985] Allocated by task 349: [ 67.384370] kasan_save_stack+0x3c/0x68 [ 67.388190] kasan_save_track+0x20/0x40 [ 67.392009] kasan_save_alloc_info+0x40/0x58 [ 67.396262] __kasan_kmalloc+0xd4/0xd8 [ 67.399995] __kmalloc_cache_noprof+0x16c/0x3c0 [ 67.404509] kasan_atomics+0xb8/0x2e0 [ 67.408155] kunit_try_run_case+0x170/0x3f0 [ 67.412321] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.417790] kthread+0x328/0x630 [ 67.421002] ret_from_fork+0x10/0x20 [ 67.424561] [ 67.426036] The buggy address belongs to the object at ffff000807848f80 [ 67.426036] which belongs to the cache kmalloc-64 of size 64 [ 67.438363] The buggy address is located 0 bytes to the right of [ 67.438363] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 67.451209] [ 67.452686] The buggy address belongs to the physical page: [ 67.458241] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 67.466228] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 67.472737] page_type: f5(slab) [ 67.475871] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 67.483594] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 67.491313] page dumped because: kasan: bad access detected [ 67.496869] [ 67.498344] Memory state around the buggy address: [ 67.503122] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.510327] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.517532] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 67.524732] ^ [ 67.529511] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 67.536715] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 67.543916] ================================================================== [ 70.197231] ================================================================== [ 70.204294] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 70.211585] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 70.218963] [ 70.220445] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 70.220494] Tainted: [B]=BAD_PAGE, [N]=TEST [ 70.220511] Hardware name: WinLink E850-96 board (DT) [ 70.220529] Call trace: [ 70.220540] show_stack+0x20/0x38 (C) [ 70.220572] dump_stack_lvl+0x8c/0xd0 [ 70.220602] print_report+0x118/0x5d0 [ 70.220630] kasan_report+0xdc/0x128 [ 70.220659] kasan_check_range+0x100/0x1a8 [ 70.220688] __kasan_check_write+0x20/0x30 [ 70.220720] kasan_atomics_helper+0xad4/0x4858 [ 70.220756] kasan_atomics+0x198/0x2e0 [ 70.220791] kunit_try_run_case+0x170/0x3f0 [ 70.220826] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.220858] kthread+0x328/0x630 [ 70.220884] ret_from_fork+0x10/0x20 [ 70.220914] [ 70.291878] Allocated by task 349: [ 70.295264] kasan_save_stack+0x3c/0x68 [ 70.299084] kasan_save_track+0x20/0x40 [ 70.302903] kasan_save_alloc_info+0x40/0x58 [ 70.307156] __kasan_kmalloc+0xd4/0xd8 [ 70.310889] __kmalloc_cache_noprof+0x16c/0x3c0 [ 70.315403] kasan_atomics+0xb8/0x2e0 [ 70.319049] kunit_try_run_case+0x170/0x3f0 [ 70.323215] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.328684] kthread+0x328/0x630 [ 70.331895] ret_from_fork+0x10/0x20 [ 70.335454] [ 70.336930] The buggy address belongs to the object at ffff000807848f80 [ 70.336930] which belongs to the cache kmalloc-64 of size 64 [ 70.349257] The buggy address is located 0 bytes to the right of [ 70.349257] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 70.362103] [ 70.363579] The buggy address belongs to the physical page: [ 70.369135] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 70.377122] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 70.383631] page_type: f5(slab) [ 70.386765] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 70.394488] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 70.402207] page dumped because: kasan: bad access detected [ 70.407762] [ 70.409238] Memory state around the buggy address: [ 70.414016] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.421221] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.428425] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 70.435626] ^ [ 70.440405] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 70.447609] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 70.454810] ================================================================== [ 72.829982] ================================================================== [ 72.837067] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 72.844358] Read of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 72.851649] [ 72.853129] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 72.853179] Tainted: [B]=BAD_PAGE, [N]=TEST [ 72.853196] Hardware name: WinLink E850-96 board (DT) [ 72.853215] Call trace: [ 72.853227] show_stack+0x20/0x38 (C) [ 72.853260] dump_stack_lvl+0x8c/0xd0 [ 72.853293] print_report+0x118/0x5d0 [ 72.853322] kasan_report+0xdc/0x128 [ 72.853351] kasan_check_range+0x100/0x1a8 [ 72.853383] __kasan_check_read+0x20/0x30 [ 72.853413] kasan_atomics_helper+0xdd4/0x4858 [ 72.853448] kasan_atomics+0x198/0x2e0 [ 72.853479] kunit_try_run_case+0x170/0x3f0 [ 72.853515] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.853549] kthread+0x328/0x630 [ 72.853577] ret_from_fork+0x10/0x20 [ 72.853610] [ 72.924478] Allocated by task 349: [ 72.927863] kasan_save_stack+0x3c/0x68 [ 72.931683] kasan_save_track+0x20/0x40 [ 72.935502] kasan_save_alloc_info+0x40/0x58 [ 72.939756] __kasan_kmalloc+0xd4/0xd8 [ 72.943488] __kmalloc_cache_noprof+0x16c/0x3c0 [ 72.948002] kasan_atomics+0xb8/0x2e0 [ 72.951648] kunit_try_run_case+0x170/0x3f0 [ 72.955814] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.961283] kthread+0x328/0x630 [ 72.964495] ret_from_fork+0x10/0x20 [ 72.968054] [ 72.969529] The buggy address belongs to the object at ffff000807848f80 [ 72.969529] which belongs to the cache kmalloc-64 of size 64 [ 72.981856] The buggy address is located 0 bytes to the right of [ 72.981856] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 72.994703] [ 72.996178] The buggy address belongs to the physical page: [ 73.001734] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 73.009720] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 73.016230] page_type: f5(slab) [ 73.019363] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 73.027087] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 73.034806] page dumped because: kasan: bad access detected [ 73.040362] [ 73.041837] Memory state around the buggy address: [ 73.046615] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.053820] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.061025] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.068226] ^ [ 73.073004] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 73.080208] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 73.087409] ================================================================== [ 75.473032] ================================================================== [ 75.480085] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 75.487460] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 75.494839] [ 75.496319] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 75.496370] Tainted: [B]=BAD_PAGE, [N]=TEST [ 75.496384] Hardware name: WinLink E850-96 board (DT) [ 75.496405] Call trace: [ 75.496418] show_stack+0x20/0x38 (C) [ 75.496449] dump_stack_lvl+0x8c/0xd0 [ 75.496481] print_report+0x118/0x5d0 [ 75.496510] kasan_report+0xdc/0x128 [ 75.496537] kasan_check_range+0x100/0x1a8 [ 75.496569] __kasan_check_write+0x20/0x30 [ 75.496600] kasan_atomics_helper+0x1128/0x4858 [ 75.496636] kasan_atomics+0x198/0x2e0 [ 75.496668] kunit_try_run_case+0x170/0x3f0 [ 75.496702] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.496736] kthread+0x328/0x630 [ 75.496763] ret_from_fork+0x10/0x20 [ 75.496794] [ 75.567841] Allocated by task 349: [ 75.571226] kasan_save_stack+0x3c/0x68 [ 75.575046] kasan_save_track+0x20/0x40 [ 75.578865] kasan_save_alloc_info+0x40/0x58 [ 75.583119] __kasan_kmalloc+0xd4/0xd8 [ 75.586851] __kmalloc_cache_noprof+0x16c/0x3c0 [ 75.591365] kasan_atomics+0xb8/0x2e0 [ 75.595011] kunit_try_run_case+0x170/0x3f0 [ 75.599177] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.604646] kthread+0x328/0x630 [ 75.607857] ret_from_fork+0x10/0x20 [ 75.611417] [ 75.612892] The buggy address belongs to the object at ffff000807848f80 [ 75.612892] which belongs to the cache kmalloc-64 of size 64 [ 75.625219] The buggy address is located 0 bytes to the right of [ 75.625219] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 75.638065] [ 75.639541] The buggy address belongs to the physical page: [ 75.645098] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 75.653084] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 75.659593] page_type: f5(slab) [ 75.662728] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 75.670450] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 75.678169] page dumped because: kasan: bad access detected [ 75.683725] [ 75.685200] Memory state around the buggy address: [ 75.689978] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.697183] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.704388] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 75.711589] ^ [ 75.716367] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 75.723572] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 75.730773] ================================================================== [ 67.816194] ================================================================== [ 67.823254] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 67.830544] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 67.837922] [ 67.839402] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 67.839450] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.839466] Hardware name: WinLink E850-96 board (DT) [ 67.839485] Call trace: [ 67.839497] show_stack+0x20/0x38 (C) [ 67.839529] dump_stack_lvl+0x8c/0xd0 [ 67.839557] print_report+0x118/0x5d0 [ 67.839584] kasan_report+0xdc/0x128 [ 67.839612] kasan_check_range+0x100/0x1a8 [ 67.839641] __kasan_check_write+0x20/0x30 [ 67.839671] kasan_atomics_helper+0x6ec/0x4858 [ 67.839706] kasan_atomics+0x198/0x2e0 [ 67.839738] kunit_try_run_case+0x170/0x3f0 [ 67.839772] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.839807] kthread+0x328/0x630 [ 67.839836] ret_from_fork+0x10/0x20 [ 67.839866] [ 67.910838] Allocated by task 349: [ 67.914223] kasan_save_stack+0x3c/0x68 [ 67.918043] kasan_save_track+0x20/0x40 [ 67.921862] kasan_save_alloc_info+0x40/0x58 [ 67.926116] __kasan_kmalloc+0xd4/0xd8 [ 67.929848] __kmalloc_cache_noprof+0x16c/0x3c0 [ 67.934362] kasan_atomics+0xb8/0x2e0 [ 67.938008] kunit_try_run_case+0x170/0x3f0 [ 67.942175] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.947643] kthread+0x328/0x630 [ 67.950855] ret_from_fork+0x10/0x20 [ 67.954413] [ 67.955889] The buggy address belongs to the object at ffff000807848f80 [ 67.955889] which belongs to the cache kmalloc-64 of size 64 [ 67.968216] The buggy address is located 0 bytes to the right of [ 67.968216] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 67.981063] [ 67.982538] The buggy address belongs to the physical page: [ 67.988094] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 67.996080] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 68.002590] page_type: f5(slab) [ 68.005724] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 68.013447] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 68.021166] page dumped because: kasan: bad access detected [ 68.026722] [ 68.028197] Memory state around the buggy address: [ 68.032975] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.040180] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.047385] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 68.054586] ^ [ 68.059364] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 68.066568] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 68.073770] ================================================================== [ 64.378838] ================================================================== [ 64.385808] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 64.393097] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 64.400474] [ 64.401958] CPU: 7 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 64.402013] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.402031] Hardware name: WinLink E850-96 board (DT) [ 64.402050] Call trace: [ 64.402066] show_stack+0x20/0x38 (C) [ 64.402102] dump_stack_lvl+0x8c/0xd0 [ 64.402135] print_report+0x118/0x5d0 [ 64.402168] kasan_report+0xdc/0x128 [ 64.402196] kasan_check_range+0x100/0x1a8 [ 64.402228] __kasan_check_write+0x20/0x30 [ 64.402260] kasan_atomics_helper+0x24c/0x4858 [ 64.402295] kasan_atomics+0x198/0x2e0 [ 64.402328] kunit_try_run_case+0x170/0x3f0 [ 64.402365] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.402399] kthread+0x328/0x630 [ 64.402429] ret_from_fork+0x10/0x20 [ 64.402464] [ 64.473389] Allocated by task 349: [ 64.476776] kasan_save_stack+0x3c/0x68 [ 64.480594] kasan_save_track+0x20/0x40 [ 64.484414] kasan_save_alloc_info+0x40/0x58 [ 64.488667] __kasan_kmalloc+0xd4/0xd8 [ 64.492400] __kmalloc_cache_noprof+0x16c/0x3c0 [ 64.496913] kasan_atomics+0xb8/0x2e0 [ 64.500559] kunit_try_run_case+0x170/0x3f0 [ 64.504726] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.510194] kthread+0x328/0x630 [ 64.513406] ret_from_fork+0x10/0x20 [ 64.516965] [ 64.518442] The buggy address belongs to the object at ffff000807848f80 [ 64.518442] which belongs to the cache kmalloc-64 of size 64 [ 64.530767] The buggy address is located 0 bytes to the right of [ 64.530767] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 64.543614] [ 64.545092] The buggy address belongs to the physical page: [ 64.550648] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 64.558634] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 64.565143] page_type: f5(slab) [ 64.568278] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 64.575999] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.583718] page dumped because: kasan: bad access detected [ 64.589274] [ 64.590749] Memory state around the buggy address: [ 64.595530] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.602732] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.609938] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 64.617137] ^ [ 64.621917] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 64.629120] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 64.636323] ================================================================== [ 73.094757] ================================================================== [ 73.101820] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 73.109198] Read of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 73.116489] [ 73.117969] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 73.118016] Tainted: [B]=BAD_PAGE, [N]=TEST [ 73.118033] Hardware name: WinLink E850-96 board (DT) [ 73.118052] Call trace: [ 73.118065] show_stack+0x20/0x38 (C) [ 73.118097] dump_stack_lvl+0x8c/0xd0 [ 73.118131] print_report+0x118/0x5d0 [ 73.118158] kasan_report+0xdc/0x128 [ 73.118186] __asan_report_load8_noabort+0x20/0x30 [ 73.118219] kasan_atomics_helper+0x3f58/0x4858 [ 73.118254] kasan_atomics+0x198/0x2e0 [ 73.118286] kunit_try_run_case+0x170/0x3f0 [ 73.118322] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.118355] kthread+0x328/0x630 [ 73.118384] ret_from_fork+0x10/0x20 [ 73.118414] [ 73.186106] Allocated by task 349: [ 73.189491] kasan_save_stack+0x3c/0x68 [ 73.193311] kasan_save_track+0x20/0x40 [ 73.197130] kasan_save_alloc_info+0x40/0x58 [ 73.201384] __kasan_kmalloc+0xd4/0xd8 [ 73.205116] __kmalloc_cache_noprof+0x16c/0x3c0 [ 73.209630] kasan_atomics+0xb8/0x2e0 [ 73.213276] kunit_try_run_case+0x170/0x3f0 [ 73.217442] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.222911] kthread+0x328/0x630 [ 73.226123] ret_from_fork+0x10/0x20 [ 73.229682] [ 73.231157] The buggy address belongs to the object at ffff000807848f80 [ 73.231157] which belongs to the cache kmalloc-64 of size 64 [ 73.243484] The buggy address is located 0 bytes to the right of [ 73.243484] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 73.256331] [ 73.257806] The buggy address belongs to the physical page: [ 73.263362] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 73.271348] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 73.277858] page_type: f5(slab) [ 73.280991] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 73.288715] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 73.296434] page dumped because: kasan: bad access detected [ 73.301989] [ 73.303465] Memory state around the buggy address: [ 73.308243] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.315448] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.322653] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.329854] ^ [ 73.334632] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 73.341837] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 73.349038] ================================================================== [ 66.756510] ================================================================== [ 66.763548] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 66.770838] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 66.778216] [ 66.779699] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 66.779750] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.779766] Hardware name: WinLink E850-96 board (DT) [ 66.779786] Call trace: [ 66.779798] show_stack+0x20/0x38 (C) [ 66.779832] dump_stack_lvl+0x8c/0xd0 [ 66.779864] print_report+0x118/0x5d0 [ 66.779890] kasan_report+0xdc/0x128 [ 66.779918] kasan_check_range+0x100/0x1a8 [ 66.779950] __kasan_check_write+0x20/0x30 [ 66.779980] kasan_atomics_helper+0x54c/0x4858 [ 66.780014] kasan_atomics+0x198/0x2e0 [ 66.780046] kunit_try_run_case+0x170/0x3f0 [ 66.780082] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.780115] kthread+0x328/0x630 [ 66.780145] ret_from_fork+0x10/0x20 [ 66.780179] [ 66.851132] Allocated by task 349: [ 66.854517] kasan_save_stack+0x3c/0x68 [ 66.858337] kasan_save_track+0x20/0x40 [ 66.862156] kasan_save_alloc_info+0x40/0x58 [ 66.866409] __kasan_kmalloc+0xd4/0xd8 [ 66.870142] __kmalloc_cache_noprof+0x16c/0x3c0 [ 66.874655] kasan_atomics+0xb8/0x2e0 [ 66.878301] kunit_try_run_case+0x170/0x3f0 [ 66.882468] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.887936] kthread+0x328/0x630 [ 66.891148] ret_from_fork+0x10/0x20 [ 66.894708] [ 66.896183] The buggy address belongs to the object at ffff000807848f80 [ 66.896183] which belongs to the cache kmalloc-64 of size 64 [ 66.908510] The buggy address is located 0 bytes to the right of [ 66.908510] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 66.921356] [ 66.922832] The buggy address belongs to the physical page: [ 66.928388] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 66.936375] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 66.942884] page_type: f5(slab) [ 66.946018] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 66.953741] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.961460] page dumped because: kasan: bad access detected [ 66.967015] [ 66.968491] Memory state around the buggy address: [ 66.973270] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.980473] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.987679] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 66.994879] ^ [ 66.999658] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 67.006862] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 67.014063] ================================================================== [ 79.177475] ================================================================== [ 79.184541] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 79.191919] Read of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 79.199210] [ 79.200691] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 79.200739] Tainted: [B]=BAD_PAGE, [N]=TEST [ 79.200755] Hardware name: WinLink E850-96 board (DT) [ 79.200773] Call trace: [ 79.200787] show_stack+0x20/0x38 (C) [ 79.200820] dump_stack_lvl+0x8c/0xd0 [ 79.200852] print_report+0x118/0x5d0 [ 79.200882] kasan_report+0xdc/0x128 [ 79.200911] __asan_report_load8_noabort+0x20/0x30 [ 79.200944] kasan_atomics_helper+0x3df4/0x4858 [ 79.200980] kasan_atomics+0x198/0x2e0 [ 79.201012] kunit_try_run_case+0x170/0x3f0 [ 79.201047] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 79.201081] kthread+0x328/0x630 [ 79.201108] ret_from_fork+0x10/0x20 [ 79.201139] [ 79.268827] Allocated by task 349: [ 79.272212] kasan_save_stack+0x3c/0x68 [ 79.276032] kasan_save_track+0x20/0x40 [ 79.279852] kasan_save_alloc_info+0x40/0x58 [ 79.284105] __kasan_kmalloc+0xd4/0xd8 [ 79.287837] __kmalloc_cache_noprof+0x16c/0x3c0 [ 79.292351] kasan_atomics+0xb8/0x2e0 [ 79.295997] kunit_try_run_case+0x170/0x3f0 [ 79.300163] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 79.305632] kthread+0x328/0x630 [ 79.308844] ret_from_fork+0x10/0x20 [ 79.312403] [ 79.313879] The buggy address belongs to the object at ffff000807848f80 [ 79.313879] which belongs to the cache kmalloc-64 of size 64 [ 79.326205] The buggy address is located 0 bytes to the right of [ 79.326205] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 79.339052] [ 79.340527] The buggy address belongs to the physical page: [ 79.346083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 79.354069] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 79.360579] page_type: f5(slab) [ 79.363714] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 79.371436] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 79.379155] page dumped because: kasan: bad access detected [ 79.384711] [ 79.386186] Memory state around the buggy address: [ 79.390964] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 79.398169] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 79.405374] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 79.412575] ^ [ 79.417353] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 79.424557] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 79.431759] ================================================================== [ 79.965857] ================================================================== [ 79.972898] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 79.980275] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 79.987653] [ 79.989134] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 79.989186] Tainted: [B]=BAD_PAGE, [N]=TEST [ 79.989201] Hardware name: WinLink E850-96 board (DT) [ 79.989221] Call trace: [ 79.989234] show_stack+0x20/0x38 (C) [ 79.989266] dump_stack_lvl+0x8c/0xd0 [ 79.989296] print_report+0x118/0x5d0 [ 79.989326] kasan_report+0xdc/0x128 [ 79.989353] kasan_check_range+0x100/0x1a8 [ 79.989383] __kasan_check_write+0x20/0x30 [ 79.989414] kasan_atomics_helper+0x175c/0x4858 [ 79.989451] kasan_atomics+0x198/0x2e0 [ 79.989485] kunit_try_run_case+0x170/0x3f0 [ 79.989520] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 79.989552] kthread+0x328/0x630 [ 79.989579] ret_from_fork+0x10/0x20 [ 79.989610] [ 80.060655] Allocated by task 349: [ 80.064041] kasan_save_stack+0x3c/0x68 [ 80.067860] kasan_save_track+0x20/0x40 [ 80.071680] kasan_save_alloc_info+0x40/0x58 [ 80.075933] __kasan_kmalloc+0xd4/0xd8 [ 80.079665] __kmalloc_cache_noprof+0x16c/0x3c0 [ 80.084180] kasan_atomics+0xb8/0x2e0 [ 80.087825] kunit_try_run_case+0x170/0x3f0 [ 80.091992] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 80.097461] kthread+0x328/0x630 [ 80.100673] ret_from_fork+0x10/0x20 [ 80.104231] [ 80.105707] The buggy address belongs to the object at ffff000807848f80 [ 80.105707] which belongs to the cache kmalloc-64 of size 64 [ 80.118034] The buggy address is located 0 bytes to the right of [ 80.118034] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 80.130880] [ 80.132356] The buggy address belongs to the physical page: [ 80.137912] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 80.145897] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 80.152408] page_type: f5(slab) [ 80.155542] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 80.163265] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 80.170984] page dumped because: kasan: bad access detected [ 80.176539] [ 80.178015] Memory state around the buggy address: [ 80.182794] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 80.189998] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 80.197203] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 80.204403] ^ [ 80.209181] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 80.216386] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 80.223587] ================================================================== [ 71.515260] ================================================================== [ 71.522331] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 71.529707] Read of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 71.536999] [ 71.538481] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 71.538529] Tainted: [B]=BAD_PAGE, [N]=TEST [ 71.538544] Hardware name: WinLink E850-96 board (DT) [ 71.538566] Call trace: [ 71.538579] show_stack+0x20/0x38 (C) [ 71.538609] dump_stack_lvl+0x8c/0xd0 [ 71.538643] print_report+0x118/0x5d0 [ 71.538671] kasan_report+0xdc/0x128 [ 71.538700] __asan_report_load4_noabort+0x20/0x30 [ 71.538733] kasan_atomics_helper+0x3de4/0x4858 [ 71.538770] kasan_atomics+0x198/0x2e0 [ 71.538805] kunit_try_run_case+0x170/0x3f0 [ 71.538838] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.538870] kthread+0x328/0x630 [ 71.538898] ret_from_fork+0x10/0x20 [ 71.538928] [ 71.606615] Allocated by task 349: [ 71.610001] kasan_save_stack+0x3c/0x68 [ 71.613820] kasan_save_track+0x20/0x40 [ 71.617640] kasan_save_alloc_info+0x40/0x58 [ 71.621893] __kasan_kmalloc+0xd4/0xd8 [ 71.625626] __kmalloc_cache_noprof+0x16c/0x3c0 [ 71.630140] kasan_atomics+0xb8/0x2e0 [ 71.633786] kunit_try_run_case+0x170/0x3f0 [ 71.637952] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.643421] kthread+0x328/0x630 [ 71.646633] ret_from_fork+0x10/0x20 [ 71.650191] [ 71.651667] The buggy address belongs to the object at ffff000807848f80 [ 71.651667] which belongs to the cache kmalloc-64 of size 64 [ 71.663994] The buggy address is located 0 bytes to the right of [ 71.663994] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 71.676840] [ 71.678316] The buggy address belongs to the physical page: [ 71.683874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 71.691858] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 71.698368] page_type: f5(slab) [ 71.701502] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 71.709225] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 71.716944] page dumped because: kasan: bad access detected [ 71.722499] [ 71.723975] Memory state around the buggy address: [ 71.728753] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.735958] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.743163] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 71.750364] ^ [ 71.755142] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 71.762346] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 71.769547] ================================================================== [ 77.590346] ================================================================== [ 77.597413] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 77.604790] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 77.612168] [ 77.613650] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 77.613698] Tainted: [B]=BAD_PAGE, [N]=TEST [ 77.613715] Hardware name: WinLink E850-96 board (DT) [ 77.613734] Call trace: [ 77.613749] show_stack+0x20/0x38 (C) [ 77.613779] dump_stack_lvl+0x8c/0xd0 [ 77.613808] print_report+0x118/0x5d0 [ 77.613837] kasan_report+0xdc/0x128 [ 77.613865] kasan_check_range+0x100/0x1a8 [ 77.613894] __kasan_check_write+0x20/0x30 [ 77.613925] kasan_atomics_helper+0x147c/0x4858 [ 77.613960] kasan_atomics+0x198/0x2e0 [ 77.613993] kunit_try_run_case+0x170/0x3f0 [ 77.614027] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.614059] kthread+0x328/0x630 [ 77.614084] ret_from_fork+0x10/0x20 [ 77.614119] [ 77.685170] Allocated by task 349: [ 77.688556] kasan_save_stack+0x3c/0x68 [ 77.692375] kasan_save_track+0x20/0x40 [ 77.696194] kasan_save_alloc_info+0x40/0x58 [ 77.700448] __kasan_kmalloc+0xd4/0xd8 [ 77.704180] __kmalloc_cache_noprof+0x16c/0x3c0 [ 77.708694] kasan_atomics+0xb8/0x2e0 [ 77.712340] kunit_try_run_case+0x170/0x3f0 [ 77.716507] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.721975] kthread+0x328/0x630 [ 77.725187] ret_from_fork+0x10/0x20 [ 77.728746] [ 77.730222] The buggy address belongs to the object at ffff000807848f80 [ 77.730222] which belongs to the cache kmalloc-64 of size 64 [ 77.742548] The buggy address is located 0 bytes to the right of [ 77.742548] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 77.755395] [ 77.756871] The buggy address belongs to the physical page: [ 77.762427] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 77.770412] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 77.776923] page_type: f5(slab) [ 77.780055] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 77.787780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 77.795498] page dumped because: kasan: bad access detected [ 77.801054] [ 77.802529] Memory state around the buggy address: [ 77.807308] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 77.814513] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 77.821717] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 77.828918] ^ [ 77.833696] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 77.840901] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 77.848102] ================================================================== [ 68.875868] ================================================================== [ 68.882960] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 68.890337] Read of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 68.897629] [ 68.899108] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 68.899153] Tainted: [B]=BAD_PAGE, [N]=TEST [ 68.899170] Hardware name: WinLink E850-96 board (DT) [ 68.899189] Call trace: [ 68.899201] show_stack+0x20/0x38 (C) [ 68.899234] dump_stack_lvl+0x8c/0xd0 [ 68.899265] print_report+0x118/0x5d0 [ 68.899293] kasan_report+0xdc/0x128 [ 68.899322] __asan_report_load4_noabort+0x20/0x30 [ 68.899354] kasan_atomics_helper+0x42d8/0x4858 [ 68.899389] kasan_atomics+0x198/0x2e0 [ 68.899423] kunit_try_run_case+0x170/0x3f0 [ 68.899457] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.899491] kthread+0x328/0x630 [ 68.899519] ret_from_fork+0x10/0x20 [ 68.899550] [ 68.967246] Allocated by task 349: [ 68.970631] kasan_save_stack+0x3c/0x68 [ 68.974451] kasan_save_track+0x20/0x40 [ 68.978270] kasan_save_alloc_info+0x40/0x58 [ 68.982523] __kasan_kmalloc+0xd4/0xd8 [ 68.986256] __kmalloc_cache_noprof+0x16c/0x3c0 [ 68.990770] kasan_atomics+0xb8/0x2e0 [ 68.994415] kunit_try_run_case+0x170/0x3f0 [ 68.998582] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.004050] kthread+0x328/0x630 [ 69.007262] ret_from_fork+0x10/0x20 [ 69.010821] [ 69.012297] The buggy address belongs to the object at ffff000807848f80 [ 69.012297] which belongs to the cache kmalloc-64 of size 64 [ 69.024624] The buggy address is located 0 bytes to the right of [ 69.024624] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 69.037471] [ 69.038946] The buggy address belongs to the physical page: [ 69.044502] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 69.052488] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 69.058998] page_type: f5(slab) [ 69.062132] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 69.069855] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 69.077574] page dumped because: kasan: bad access detected [ 69.083129] [ 69.084605] Memory state around the buggy address: [ 69.089383] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.096588] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.103793] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 69.110994] ^ [ 69.115771] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 69.122976] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 69.130177] ================================================================== [ 77.063623] ================================================================== [ 77.070685] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 77.078062] Read of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 77.085353] [ 77.086832] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 77.086881] Tainted: [B]=BAD_PAGE, [N]=TEST [ 77.086897] Hardware name: WinLink E850-96 board (DT) [ 77.086916] Call trace: [ 77.086929] show_stack+0x20/0x38 (C) [ 77.086961] dump_stack_lvl+0x8c/0xd0 [ 77.086991] print_report+0x118/0x5d0 [ 77.087019] kasan_report+0xdc/0x128 [ 77.087047] __asan_report_load8_noabort+0x20/0x30 [ 77.087079] kasan_atomics_helper+0x3f04/0x4858 [ 77.087115] kasan_atomics+0x198/0x2e0 [ 77.087149] kunit_try_run_case+0x170/0x3f0 [ 77.087187] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.087219] kthread+0x328/0x630 [ 77.087245] ret_from_fork+0x10/0x20 [ 77.087279] [ 77.154970] Allocated by task 349: [ 77.158355] kasan_save_stack+0x3c/0x68 [ 77.162175] kasan_save_track+0x20/0x40 [ 77.165994] kasan_save_alloc_info+0x40/0x58 [ 77.170247] __kasan_kmalloc+0xd4/0xd8 [ 77.173980] __kmalloc_cache_noprof+0x16c/0x3c0 [ 77.178494] kasan_atomics+0xb8/0x2e0 [ 77.182140] kunit_try_run_case+0x170/0x3f0 [ 77.186306] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.191775] kthread+0x328/0x630 [ 77.194987] ret_from_fork+0x10/0x20 [ 77.198546] [ 77.200021] The buggy address belongs to the object at ffff000807848f80 [ 77.200021] which belongs to the cache kmalloc-64 of size 64 [ 77.212348] The buggy address is located 0 bytes to the right of [ 77.212348] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 77.225195] [ 77.226670] The buggy address belongs to the physical page: [ 77.232229] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 77.240212] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 77.246722] page_type: f5(slab) [ 77.249855] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 77.257579] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 77.265298] page dumped because: kasan: bad access detected [ 77.270854] [ 77.272329] Memory state around the buggy address: [ 77.277107] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 77.284312] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 77.291517] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 77.298718] ^ [ 77.303496] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 77.310700] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 77.317902] ================================================================== [ 65.170085] ================================================================== [ 65.177113] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 65.184405] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 65.191781] [ 65.193265] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 65.193316] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.193333] Hardware name: WinLink E850-96 board (DT) [ 65.193354] Call trace: [ 65.193368] show_stack+0x20/0x38 (C) [ 65.193404] dump_stack_lvl+0x8c/0xd0 [ 65.193438] print_report+0x118/0x5d0 [ 65.193466] kasan_report+0xdc/0x128 [ 65.193492] kasan_check_range+0x100/0x1a8 [ 65.193524] __kasan_check_write+0x20/0x30 [ 65.193554] kasan_atomics_helper+0x32c/0x4858 [ 65.193587] kasan_atomics+0x198/0x2e0 [ 65.193623] kunit_try_run_case+0x170/0x3f0 [ 65.193659] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.193691] kthread+0x328/0x630 [ 65.193721] ret_from_fork+0x10/0x20 [ 65.193756] [ 65.264697] Allocated by task 349: [ 65.268083] kasan_save_stack+0x3c/0x68 [ 65.271902] kasan_save_track+0x20/0x40 [ 65.275721] kasan_save_alloc_info+0x40/0x58 [ 65.279975] __kasan_kmalloc+0xd4/0xd8 [ 65.283707] __kmalloc_cache_noprof+0x16c/0x3c0 [ 65.288221] kasan_atomics+0xb8/0x2e0 [ 65.291867] kunit_try_run_case+0x170/0x3f0 [ 65.296033] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.301502] kthread+0x328/0x630 [ 65.304714] ret_from_fork+0x10/0x20 [ 65.308273] [ 65.309749] The buggy address belongs to the object at ffff000807848f80 [ 65.309749] which belongs to the cache kmalloc-64 of size 64 [ 65.322075] The buggy address is located 0 bytes to the right of [ 65.322075] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 65.334922] [ 65.336399] The buggy address belongs to the physical page: [ 65.341955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 65.349941] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 65.356449] page_type: f5(slab) [ 65.359585] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 65.367306] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.375025] page dumped because: kasan: bad access detected [ 65.380581] [ 65.382056] Memory state around the buggy address: [ 65.386835] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.394039] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.401244] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 65.408445] ^ [ 65.413223] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.420427] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.427629] ================================================================== [ 67.021420] ================================================================== [ 67.028474] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 67.035765] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 67.043143] [ 67.044624] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 67.044674] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.044690] Hardware name: WinLink E850-96 board (DT) [ 67.044710] Call trace: [ 67.044722] show_stack+0x20/0x38 (C) [ 67.044753] dump_stack_lvl+0x8c/0xd0 [ 67.044786] print_report+0x118/0x5d0 [ 67.044814] kasan_report+0xdc/0x128 [ 67.044842] kasan_check_range+0x100/0x1a8 [ 67.044872] __kasan_check_write+0x20/0x30 [ 67.044905] kasan_atomics_helper+0x5b4/0x4858 [ 67.044940] kasan_atomics+0x198/0x2e0 [ 67.044973] kunit_try_run_case+0x170/0x3f0 [ 67.045008] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.045040] kthread+0x328/0x630 [ 67.045068] ret_from_fork+0x10/0x20 [ 67.045099] [ 67.116058] Allocated by task 349: [ 67.119444] kasan_save_stack+0x3c/0x68 [ 67.123263] kasan_save_track+0x20/0x40 [ 67.127082] kasan_save_alloc_info+0x40/0x58 [ 67.131336] __kasan_kmalloc+0xd4/0xd8 [ 67.135068] __kmalloc_cache_noprof+0x16c/0x3c0 [ 67.139583] kasan_atomics+0xb8/0x2e0 [ 67.143228] kunit_try_run_case+0x170/0x3f0 [ 67.147394] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.152863] kthread+0x328/0x630 [ 67.156075] ret_from_fork+0x10/0x20 [ 67.159634] [ 67.161110] The buggy address belongs to the object at ffff000807848f80 [ 67.161110] which belongs to the cache kmalloc-64 of size 64 [ 67.173436] The buggy address is located 0 bytes to the right of [ 67.173436] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 67.186283] [ 67.187759] The buggy address belongs to the physical page: [ 67.193315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 67.201300] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 67.207810] page_type: f5(slab) [ 67.210945] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 67.218667] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 67.226386] page dumped because: kasan: bad access detected [ 67.231942] [ 67.233417] Memory state around the buggy address: [ 67.238195] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.245400] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.252605] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 67.259806] ^ [ 67.264584] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 67.271789] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 67.278990] ================================================================== [ 70.723788] ================================================================== [ 70.730850] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 70.738139] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 70.745518] [ 70.746997] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 70.747046] Tainted: [B]=BAD_PAGE, [N]=TEST [ 70.747063] Hardware name: WinLink E850-96 board (DT) [ 70.747081] Call trace: [ 70.747094] show_stack+0x20/0x38 (C) [ 70.747124] dump_stack_lvl+0x8c/0xd0 [ 70.747155] print_report+0x118/0x5d0 [ 70.747181] kasan_report+0xdc/0x128 [ 70.747210] kasan_check_range+0x100/0x1a8 [ 70.747241] __kasan_check_write+0x20/0x30 [ 70.747270] kasan_atomics_helper+0xb70/0x4858 [ 70.747305] kasan_atomics+0x198/0x2e0 [ 70.747337] kunit_try_run_case+0x170/0x3f0 [ 70.747374] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.747407] kthread+0x328/0x630 [ 70.747433] ret_from_fork+0x10/0x20 [ 70.747464] [ 70.818433] Allocated by task 349: [ 70.821819] kasan_save_stack+0x3c/0x68 [ 70.825638] kasan_save_track+0x20/0x40 [ 70.829457] kasan_save_alloc_info+0x40/0x58 [ 70.833711] __kasan_kmalloc+0xd4/0xd8 [ 70.837443] __kmalloc_cache_noprof+0x16c/0x3c0 [ 70.841957] kasan_atomics+0xb8/0x2e0 [ 70.845603] kunit_try_run_case+0x170/0x3f0 [ 70.849770] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.855238] kthread+0x328/0x630 [ 70.858450] ret_from_fork+0x10/0x20 [ 70.862008] [ 70.863484] The buggy address belongs to the object at ffff000807848f80 [ 70.863484] which belongs to the cache kmalloc-64 of size 64 [ 70.875811] The buggy address is located 0 bytes to the right of [ 70.875811] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 70.888658] [ 70.890134] The buggy address belongs to the physical page: [ 70.895691] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 70.903675] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 70.910185] page_type: f5(slab) [ 70.913318] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 70.921042] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 70.928762] page dumped because: kasan: bad access detected [ 70.934317] [ 70.935792] Memory state around the buggy address: [ 70.940570] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.947775] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.954980] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 70.962181] ^ [ 70.966959] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 70.974164] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 70.981365] ================================================================== [ 77.325273] ================================================================== [ 77.332313] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 77.339690] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 77.347068] [ 77.348547] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 77.348599] Tainted: [B]=BAD_PAGE, [N]=TEST [ 77.348614] Hardware name: WinLink E850-96 board (DT) [ 77.348633] Call trace: [ 77.348647] show_stack+0x20/0x38 (C) [ 77.348677] dump_stack_lvl+0x8c/0xd0 [ 77.348707] print_report+0x118/0x5d0 [ 77.348735] kasan_report+0xdc/0x128 [ 77.348764] kasan_check_range+0x100/0x1a8 [ 77.348797] __kasan_check_write+0x20/0x30 [ 77.348826] kasan_atomics_helper+0x1414/0x4858 [ 77.348861] kasan_atomics+0x198/0x2e0 [ 77.348894] kunit_try_run_case+0x170/0x3f0 [ 77.348931] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.348965] kthread+0x328/0x630 [ 77.348991] ret_from_fork+0x10/0x20 [ 77.349025] [ 77.420070] Allocated by task 349: [ 77.423456] kasan_save_stack+0x3c/0x68 [ 77.427275] kasan_save_track+0x20/0x40 [ 77.431094] kasan_save_alloc_info+0x40/0x58 [ 77.435348] __kasan_kmalloc+0xd4/0xd8 [ 77.439080] __kmalloc_cache_noprof+0x16c/0x3c0 [ 77.443594] kasan_atomics+0xb8/0x2e0 [ 77.447240] kunit_try_run_case+0x170/0x3f0 [ 77.451407] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.456875] kthread+0x328/0x630 [ 77.460087] ret_from_fork+0x10/0x20 [ 77.463646] [ 77.465122] The buggy address belongs to the object at ffff000807848f80 [ 77.465122] which belongs to the cache kmalloc-64 of size 64 [ 77.477448] The buggy address is located 0 bytes to the right of [ 77.477448] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 77.490295] [ 77.491771] The buggy address belongs to the physical page: [ 77.497328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 77.505314] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 77.511823] page_type: f5(slab) [ 77.514957] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 77.522680] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 77.530398] page dumped because: kasan: bad access detected [ 77.535954] [ 77.537429] Memory state around the buggy address: [ 77.542207] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 77.549412] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 77.556617] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 77.563818] ^ [ 77.568596] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 77.575801] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 77.583002] ================================================================== [ 71.776921] ================================================================== [ 71.783960] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 71.791249] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 71.798627] [ 71.800107] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 71.800155] Tainted: [B]=BAD_PAGE, [N]=TEST [ 71.800171] Hardware name: WinLink E850-96 board (DT) [ 71.800189] Call trace: [ 71.800202] show_stack+0x20/0x38 (C) [ 71.800234] dump_stack_lvl+0x8c/0xd0 [ 71.800266] print_report+0x118/0x5d0 [ 71.800295] kasan_report+0xdc/0x128 [ 71.800324] kasan_check_range+0x100/0x1a8 [ 71.800354] __kasan_check_write+0x20/0x30 [ 71.800385] kasan_atomics_helper+0xca0/0x4858 [ 71.800418] kasan_atomics+0x198/0x2e0 [ 71.800451] kunit_try_run_case+0x170/0x3f0 [ 71.800487] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.800520] kthread+0x328/0x630 [ 71.800547] ret_from_fork+0x10/0x20 [ 71.800579] [ 71.871542] Allocated by task 349: [ 71.874928] kasan_save_stack+0x3c/0x68 [ 71.878748] kasan_save_track+0x20/0x40 [ 71.882566] kasan_save_alloc_info+0x40/0x58 [ 71.886820] __kasan_kmalloc+0xd4/0xd8 [ 71.890552] __kmalloc_cache_noprof+0x16c/0x3c0 [ 71.895066] kasan_atomics+0xb8/0x2e0 [ 71.898712] kunit_try_run_case+0x170/0x3f0 [ 71.902879] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.908348] kthread+0x328/0x630 [ 71.911559] ret_from_fork+0x10/0x20 [ 71.915118] [ 71.916594] The buggy address belongs to the object at ffff000807848f80 [ 71.916594] which belongs to the cache kmalloc-64 of size 64 [ 71.928920] The buggy address is located 0 bytes to the right of [ 71.928920] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 71.941767] [ 71.943243] The buggy address belongs to the physical page: [ 71.948799] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 71.956786] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 71.963295] page_type: f5(slab) [ 71.966428] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 71.974152] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 71.981871] page dumped because: kasan: bad access detected [ 71.987426] [ 71.988901] Memory state around the buggy address: [ 71.993679] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.000884] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.008089] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 72.015290] ^ [ 72.020068] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 72.027273] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 72.034474] ================================================================== [ 74.413031] ================================================================== [ 74.420030] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 74.427320] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 74.434698] [ 74.436180] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 74.436230] Tainted: [B]=BAD_PAGE, [N]=TEST [ 74.436244] Hardware name: WinLink E850-96 board (DT) [ 74.436262] Call trace: [ 74.436276] show_stack+0x20/0x38 (C) [ 74.436308] dump_stack_lvl+0x8c/0xd0 [ 74.436339] print_report+0x118/0x5d0 [ 74.436369] kasan_report+0xdc/0x128 [ 74.436397] kasan_check_range+0x100/0x1a8 [ 74.436428] __kasan_check_write+0x20/0x30 [ 74.436458] kasan_atomics_helper+0xf88/0x4858 [ 74.436493] kasan_atomics+0x198/0x2e0 [ 74.436528] kunit_try_run_case+0x170/0x3f0 [ 74.436566] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.436597] kthread+0x328/0x630 [ 74.436625] ret_from_fork+0x10/0x20 [ 74.436657] [ 74.507614] Allocated by task 349: [ 74.510999] kasan_save_stack+0x3c/0x68 [ 74.514819] kasan_save_track+0x20/0x40 [ 74.518638] kasan_save_alloc_info+0x40/0x58 [ 74.522891] __kasan_kmalloc+0xd4/0xd8 [ 74.526624] __kmalloc_cache_noprof+0x16c/0x3c0 [ 74.531138] kasan_atomics+0xb8/0x2e0 [ 74.534784] kunit_try_run_case+0x170/0x3f0 [ 74.538950] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.544419] kthread+0x328/0x630 [ 74.547631] ret_from_fork+0x10/0x20 [ 74.551190] [ 74.552665] The buggy address belongs to the object at ffff000807848f80 [ 74.552665] which belongs to the cache kmalloc-64 of size 64 [ 74.564992] The buggy address is located 0 bytes to the right of [ 74.564992] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 74.577839] [ 74.579316] The buggy address belongs to the physical page: [ 74.584870] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 74.592857] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 74.599366] page_type: f5(slab) [ 74.602501] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 74.610223] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 74.617942] page dumped because: kasan: bad access detected [ 74.623497] [ 74.624973] Memory state around the buggy address: [ 74.629751] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.636956] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.644161] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 74.651362] ^ [ 74.656141] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 74.663344] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 74.670546] ================================================================== [ 76.268317] ================================================================== [ 76.275384] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 76.282761] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 76.290139] [ 76.291619] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 76.291666] Tainted: [B]=BAD_PAGE, [N]=TEST [ 76.291681] Hardware name: WinLink E850-96 board (DT) [ 76.291699] Call trace: [ 76.291712] show_stack+0x20/0x38 (C) [ 76.291745] dump_stack_lvl+0x8c/0xd0 [ 76.291775] print_report+0x118/0x5d0 [ 76.291803] kasan_report+0xdc/0x128 [ 76.291831] kasan_check_range+0x100/0x1a8 [ 76.291860] __kasan_check_write+0x20/0x30 [ 76.291893] kasan_atomics_helper+0x126c/0x4858 [ 76.291928] kasan_atomics+0x198/0x2e0 [ 76.291961] kunit_try_run_case+0x170/0x3f0 [ 76.291995] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.292029] kthread+0x328/0x630 [ 76.292056] ret_from_fork+0x10/0x20 [ 76.292087] [ 76.363141] Allocated by task 349: [ 76.366527] kasan_save_stack+0x3c/0x68 [ 76.370346] kasan_save_track+0x20/0x40 [ 76.374166] kasan_save_alloc_info+0x40/0x58 [ 76.378419] __kasan_kmalloc+0xd4/0xd8 [ 76.382152] __kmalloc_cache_noprof+0x16c/0x3c0 [ 76.386666] kasan_atomics+0xb8/0x2e0 [ 76.390311] kunit_try_run_case+0x170/0x3f0 [ 76.394478] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.399947] kthread+0x328/0x630 [ 76.403159] ret_from_fork+0x10/0x20 [ 76.406717] [ 76.408193] The buggy address belongs to the object at ffff000807848f80 [ 76.408193] which belongs to the cache kmalloc-64 of size 64 [ 76.420520] The buggy address is located 0 bytes to the right of [ 76.420520] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 76.433366] [ 76.434842] The buggy address belongs to the physical page: [ 76.440398] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 76.448383] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 76.454894] page_type: f5(slab) [ 76.458026] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 76.465751] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 76.473470] page dumped because: kasan: bad access detected [ 76.479025] [ 76.480501] Memory state around the buggy address: [ 76.485279] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 76.492484] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 76.499688] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 76.506889] ^ [ 76.511667] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 76.518872] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 76.526073] ================================================================== [ 76.003242] ================================================================== [ 76.010284] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 76.017661] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 76.025039] [ 76.026521] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 76.026573] Tainted: [B]=BAD_PAGE, [N]=TEST [ 76.026590] Hardware name: WinLink E850-96 board (DT) [ 76.026608] Call trace: [ 76.026621] show_stack+0x20/0x38 (C) [ 76.026653] dump_stack_lvl+0x8c/0xd0 [ 76.026684] print_report+0x118/0x5d0 [ 76.026713] kasan_report+0xdc/0x128 [ 76.026740] kasan_check_range+0x100/0x1a8 [ 76.026772] __kasan_check_write+0x20/0x30 [ 76.026804] kasan_atomics_helper+0x11f8/0x4858 [ 76.026839] kasan_atomics+0x198/0x2e0 [ 76.026872] kunit_try_run_case+0x170/0x3f0 [ 76.026909] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.026941] kthread+0x328/0x630 [ 76.026970] ret_from_fork+0x10/0x20 [ 76.027002] [ 76.098041] Allocated by task 349: [ 76.101426] kasan_save_stack+0x3c/0x68 [ 76.105246] kasan_save_track+0x20/0x40 [ 76.109066] kasan_save_alloc_info+0x40/0x58 [ 76.113319] __kasan_kmalloc+0xd4/0xd8 [ 76.117051] __kmalloc_cache_noprof+0x16c/0x3c0 [ 76.121565] kasan_atomics+0xb8/0x2e0 [ 76.125211] kunit_try_run_case+0x170/0x3f0 [ 76.129378] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.134847] kthread+0x328/0x630 [ 76.138058] ret_from_fork+0x10/0x20 [ 76.141617] [ 76.143093] The buggy address belongs to the object at ffff000807848f80 [ 76.143093] which belongs to the cache kmalloc-64 of size 64 [ 76.155420] The buggy address is located 0 bytes to the right of [ 76.155420] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 76.168266] [ 76.169742] The buggy address belongs to the physical page: [ 76.175298] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 76.183285] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 76.189793] page_type: f5(slab) [ 76.192926] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 76.200651] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 76.208370] page dumped because: kasan: bad access detected [ 76.213925] [ 76.215401] Memory state around the buggy address: [ 76.220179] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 76.227384] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 76.234588] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 76.241789] ^ [ 76.246567] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 76.253772] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 76.260973] ================================================================== [ 72.303453] ================================================================== [ 72.310513] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 72.317803] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 72.325181] [ 72.326661] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 72.326712] Tainted: [B]=BAD_PAGE, [N]=TEST [ 72.326727] Hardware name: WinLink E850-96 board (DT) [ 72.326746] Call trace: [ 72.326758] show_stack+0x20/0x38 (C) [ 72.326790] dump_stack_lvl+0x8c/0xd0 [ 72.326824] print_report+0x118/0x5d0 [ 72.326852] kasan_report+0xdc/0x128 [ 72.326880] kasan_check_range+0x100/0x1a8 [ 72.326913] __kasan_check_write+0x20/0x30 [ 72.326943] kasan_atomics_helper+0xd3c/0x4858 [ 72.326977] kasan_atomics+0x198/0x2e0 [ 72.327010] kunit_try_run_case+0x170/0x3f0 [ 72.327046] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.327080] kthread+0x328/0x630 [ 72.327106] ret_from_fork+0x10/0x20 [ 72.327138] [ 72.398097] Allocated by task 349: [ 72.401482] kasan_save_stack+0x3c/0x68 [ 72.405302] kasan_save_track+0x20/0x40 [ 72.409121] kasan_save_alloc_info+0x40/0x58 [ 72.413374] __kasan_kmalloc+0xd4/0xd8 [ 72.417107] __kmalloc_cache_noprof+0x16c/0x3c0 [ 72.421621] kasan_atomics+0xb8/0x2e0 [ 72.425267] kunit_try_run_case+0x170/0x3f0 [ 72.429433] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.434902] kthread+0x328/0x630 [ 72.438113] ret_from_fork+0x10/0x20 [ 72.441673] [ 72.443148] The buggy address belongs to the object at ffff000807848f80 [ 72.443148] which belongs to the cache kmalloc-64 of size 64 [ 72.455475] The buggy address is located 0 bytes to the right of [ 72.455475] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 72.468322] [ 72.469798] The buggy address belongs to the physical page: [ 72.475353] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 72.483339] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 72.489849] page_type: f5(slab) [ 72.492982] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 72.500706] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 72.508425] page dumped because: kasan: bad access detected [ 72.513980] [ 72.515456] Memory state around the buggy address: [ 72.520234] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.527439] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.534644] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 72.541845] ^ [ 72.546623] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 72.553827] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 72.561029] ================================================================== [ 63.852187] ================================================================== [ 63.859254] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 63.866628] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 63.874007] [ 63.875492] CPU: 5 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 63.875554] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.875569] Hardware name: WinLink E850-96 board (DT) [ 63.875591] Call trace: [ 63.875606] show_stack+0x20/0x38 (C) [ 63.875643] dump_stack_lvl+0x8c/0xd0 [ 63.875677] print_report+0x118/0x5d0 [ 63.875706] kasan_report+0xdc/0x128 [ 63.875732] __asan_report_store4_noabort+0x20/0x30 [ 63.875768] kasan_atomics_helper+0x3f7c/0x4858 [ 63.875806] kasan_atomics+0x198/0x2e0 [ 63.875839] kunit_try_run_case+0x170/0x3f0 [ 63.875877] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.875910] kthread+0x328/0x630 [ 63.875943] ret_from_fork+0x10/0x20 [ 63.875978] [ 63.943710] Allocated by task 349: [ 63.947099] kasan_save_stack+0x3c/0x68 [ 63.950915] kasan_save_track+0x20/0x40 [ 63.954734] kasan_save_alloc_info+0x40/0x58 [ 63.958987] __kasan_kmalloc+0xd4/0xd8 [ 63.962720] __kmalloc_cache_noprof+0x16c/0x3c0 [ 63.967234] kasan_atomics+0xb8/0x2e0 [ 63.970880] kunit_try_run_case+0x170/0x3f0 [ 63.975046] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.980515] kthread+0x328/0x630 [ 63.983727] ret_from_fork+0x10/0x20 [ 63.987286] [ 63.988763] The buggy address belongs to the object at ffff000807848f80 [ 63.988763] which belongs to the cache kmalloc-64 of size 64 [ 64.001088] The buggy address is located 0 bytes to the right of [ 64.001088] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 64.013935] [ 64.015412] The buggy address belongs to the physical page: [ 64.020969] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 64.028956] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 64.035462] page_type: f5(slab) [ 64.038597] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 64.046319] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.054040] page dumped because: kasan: bad access detected [ 64.059594] [ 64.061069] Memory state around the buggy address: [ 64.065849] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.073052] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.080260] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 64.087458] ^ [ 64.092237] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 64.099441] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 64.106642] ================================================================== [ 78.385676] ================================================================== [ 78.392714] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 78.400090] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 78.407469] [ 78.408950] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 78.409000] Tainted: [B]=BAD_PAGE, [N]=TEST [ 78.409016] Hardware name: WinLink E850-96 board (DT) [ 78.409035] Call trace: [ 78.409048] show_stack+0x20/0x38 (C) [ 78.409078] dump_stack_lvl+0x8c/0xd0 [ 78.409108] print_report+0x118/0x5d0 [ 78.409136] kasan_report+0xdc/0x128 [ 78.409167] kasan_check_range+0x100/0x1a8 [ 78.409197] __kasan_check_write+0x20/0x30 [ 78.409228] kasan_atomics_helper+0x15b4/0x4858 [ 78.409264] kasan_atomics+0x198/0x2e0 [ 78.409297] kunit_try_run_case+0x170/0x3f0 [ 78.409331] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 78.409365] kthread+0x328/0x630 [ 78.409391] ret_from_fork+0x10/0x20 [ 78.409424] [ 78.480471] Allocated by task 349: [ 78.483857] kasan_save_stack+0x3c/0x68 [ 78.487676] kasan_save_track+0x20/0x40 [ 78.491495] kasan_save_alloc_info+0x40/0x58 [ 78.495748] __kasan_kmalloc+0xd4/0xd8 [ 78.499481] __kmalloc_cache_noprof+0x16c/0x3c0 [ 78.503995] kasan_atomics+0xb8/0x2e0 [ 78.507641] kunit_try_run_case+0x170/0x3f0 [ 78.511807] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 78.517276] kthread+0x328/0x630 [ 78.520488] ret_from_fork+0x10/0x20 [ 78.524047] [ 78.525522] The buggy address belongs to the object at ffff000807848f80 [ 78.525522] which belongs to the cache kmalloc-64 of size 64 [ 78.537849] The buggy address is located 0 bytes to the right of [ 78.537849] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 78.550696] [ 78.552173] The buggy address belongs to the physical page: [ 78.557727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 78.565715] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 78.572223] page_type: f5(slab) [ 78.575358] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 78.583080] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 78.590799] page dumped because: kasan: bad access detected [ 78.596354] [ 78.597830] Memory state around the buggy address: [ 78.602608] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 78.609813] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 78.617018] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 78.624219] ^ [ 78.628997] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 78.636201] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 78.643402] ================================================================== [ 73.356409] ================================================================== [ 73.363449] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 73.370739] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 73.378117] [ 73.379597] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 73.379646] Tainted: [B]=BAD_PAGE, [N]=TEST [ 73.379662] Hardware name: WinLink E850-96 board (DT) [ 73.379680] Call trace: [ 73.379692] show_stack+0x20/0x38 (C) [ 73.379725] dump_stack_lvl+0x8c/0xd0 [ 73.379757] print_report+0x118/0x5d0 [ 73.379786] kasan_report+0xdc/0x128 [ 73.379815] kasan_check_range+0x100/0x1a8 [ 73.379846] __kasan_check_write+0x20/0x30 [ 73.379877] kasan_atomics_helper+0xe44/0x4858 [ 73.379915] kasan_atomics+0x198/0x2e0 [ 73.379946] kunit_try_run_case+0x170/0x3f0 [ 73.379982] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.380016] kthread+0x328/0x630 [ 73.380042] ret_from_fork+0x10/0x20 [ 73.380075] [ 73.451032] Allocated by task 349: [ 73.454418] kasan_save_stack+0x3c/0x68 [ 73.458238] kasan_save_track+0x20/0x40 [ 73.462057] kasan_save_alloc_info+0x40/0x58 [ 73.466310] __kasan_kmalloc+0xd4/0xd8 [ 73.470042] __kmalloc_cache_noprof+0x16c/0x3c0 [ 73.474556] kasan_atomics+0xb8/0x2e0 [ 73.478202] kunit_try_run_case+0x170/0x3f0 [ 73.482369] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.487838] kthread+0x328/0x630 [ 73.491049] ret_from_fork+0x10/0x20 [ 73.494608] [ 73.496084] The buggy address belongs to the object at ffff000807848f80 [ 73.496084] which belongs to the cache kmalloc-64 of size 64 [ 73.508411] The buggy address is located 0 bytes to the right of [ 73.508411] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 73.521257] [ 73.522734] The buggy address belongs to the physical page: [ 73.528290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 73.536276] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 73.542785] page_type: f5(slab) [ 73.545920] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 73.553642] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 73.561361] page dumped because: kasan: bad access detected [ 73.566916] [ 73.568392] Memory state around the buggy address: [ 73.573170] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.580375] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.587579] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.594781] ^ [ 73.599558] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 73.606763] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 73.613964] ================================================================== [ 66.491564] ================================================================== [ 66.498621] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 66.505911] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 66.513290] [ 66.514774] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 66.514824] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.514840] Hardware name: WinLink E850-96 board (DT) [ 66.514858] Call trace: [ 66.514870] show_stack+0x20/0x38 (C) [ 66.514900] dump_stack_lvl+0x8c/0xd0 [ 66.514934] print_report+0x118/0x5d0 [ 66.514961] kasan_report+0xdc/0x128 [ 66.514988] kasan_check_range+0x100/0x1a8 [ 66.515018] __kasan_check_write+0x20/0x30 [ 66.515050] kasan_atomics_helper+0x4e4/0x4858 [ 66.515087] kasan_atomics+0x198/0x2e0 [ 66.515121] kunit_try_run_case+0x170/0x3f0 [ 66.515156] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.515189] kthread+0x328/0x630 [ 66.515215] ret_from_fork+0x10/0x20 [ 66.515248] [ 66.586205] Allocated by task 349: [ 66.589591] kasan_save_stack+0x3c/0x68 [ 66.593410] kasan_save_track+0x20/0x40 [ 66.597229] kasan_save_alloc_info+0x40/0x58 [ 66.601483] __kasan_kmalloc+0xd4/0xd8 [ 66.605215] __kmalloc_cache_noprof+0x16c/0x3c0 [ 66.609729] kasan_atomics+0xb8/0x2e0 [ 66.613375] kunit_try_run_case+0x170/0x3f0 [ 66.617541] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.623010] kthread+0x328/0x630 [ 66.626222] ret_from_fork+0x10/0x20 [ 66.629781] [ 66.631256] The buggy address belongs to the object at ffff000807848f80 [ 66.631256] which belongs to the cache kmalloc-64 of size 64 [ 66.643583] The buggy address is located 0 bytes to the right of [ 66.643583] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 66.656430] [ 66.657907] The buggy address belongs to the physical page: [ 66.663462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 66.671449] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 66.677957] page_type: f5(slab) [ 66.681091] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 66.688814] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.696533] page dumped because: kasan: bad access detected [ 66.702089] [ 66.703564] Memory state around the buggy address: [ 66.708343] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.715547] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.722752] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 66.729953] ^ [ 66.734730] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 66.741935] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 66.749137] ================================================================== [ 70.462153] ================================================================== [ 70.469221] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 70.476598] Read of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 70.483890] [ 70.485370] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 70.485419] Tainted: [B]=BAD_PAGE, [N]=TEST [ 70.485435] Hardware name: WinLink E850-96 board (DT) [ 70.485453] Call trace: [ 70.485467] show_stack+0x20/0x38 (C) [ 70.485498] dump_stack_lvl+0x8c/0xd0 [ 70.485531] print_report+0x118/0x5d0 [ 70.485560] kasan_report+0xdc/0x128 [ 70.485589] __asan_report_load4_noabort+0x20/0x30 [ 70.485621] kasan_atomics_helper+0x3dcc/0x4858 [ 70.485656] kasan_atomics+0x198/0x2e0 [ 70.485688] kunit_try_run_case+0x170/0x3f0 [ 70.485724] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.485755] kthread+0x328/0x630 [ 70.485782] ret_from_fork+0x10/0x20 [ 70.485812] [ 70.553506] Allocated by task 349: [ 70.556892] kasan_save_stack+0x3c/0x68 [ 70.560711] kasan_save_track+0x20/0x40 [ 70.564531] kasan_save_alloc_info+0x40/0x58 [ 70.568784] __kasan_kmalloc+0xd4/0xd8 [ 70.572517] __kmalloc_cache_noprof+0x16c/0x3c0 [ 70.577030] kasan_atomics+0xb8/0x2e0 [ 70.580676] kunit_try_run_case+0x170/0x3f0 [ 70.584843] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.590312] kthread+0x328/0x630 [ 70.593523] ret_from_fork+0x10/0x20 [ 70.597082] [ 70.598558] The buggy address belongs to the object at ffff000807848f80 [ 70.598558] which belongs to the cache kmalloc-64 of size 64 [ 70.610884] The buggy address is located 0 bytes to the right of [ 70.610884] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 70.623731] [ 70.625207] The buggy address belongs to the physical page: [ 70.630763] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 70.638748] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 70.645259] page_type: f5(slab) [ 70.648393] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 70.656116] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 70.663835] page dumped because: kasan: bad access detected [ 70.669390] [ 70.670866] Memory state around the buggy address: [ 70.675644] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.682849] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.690053] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 70.697254] ^ [ 70.702032] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 70.709237] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 70.716438] ================================================================== [ 74.677932] ================================================================== [ 74.684957] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 74.692247] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 74.699625] [ 74.701104] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 74.701152] Tainted: [B]=BAD_PAGE, [N]=TEST [ 74.701170] Hardware name: WinLink E850-96 board (DT) [ 74.701187] Call trace: [ 74.701201] show_stack+0x20/0x38 (C) [ 74.701237] dump_stack_lvl+0x8c/0xd0 [ 74.701265] print_report+0x118/0x5d0 [ 74.701291] kasan_report+0xdc/0x128 [ 74.701319] kasan_check_range+0x100/0x1a8 [ 74.701349] __kasan_check_write+0x20/0x30 [ 74.701379] kasan_atomics_helper+0xff0/0x4858 [ 74.701414] kasan_atomics+0x198/0x2e0 [ 74.701447] kunit_try_run_case+0x170/0x3f0 [ 74.701482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.701514] kthread+0x328/0x630 [ 74.701542] ret_from_fork+0x10/0x20 [ 74.701573] [ 74.772540] Allocated by task 349: [ 74.775926] kasan_save_stack+0x3c/0x68 [ 74.779745] kasan_save_track+0x20/0x40 [ 74.783564] kasan_save_alloc_info+0x40/0x58 [ 74.787818] __kasan_kmalloc+0xd4/0xd8 [ 74.791551] __kmalloc_cache_noprof+0x16c/0x3c0 [ 74.796064] kasan_atomics+0xb8/0x2e0 [ 74.799710] kunit_try_run_case+0x170/0x3f0 [ 74.803877] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.809346] kthread+0x328/0x630 [ 74.812557] ret_from_fork+0x10/0x20 [ 74.816116] [ 74.817592] The buggy address belongs to the object at ffff000807848f80 [ 74.817592] which belongs to the cache kmalloc-64 of size 64 [ 74.829919] The buggy address is located 0 bytes to the right of [ 74.829919] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 74.842765] [ 74.844241] The buggy address belongs to the physical page: [ 74.849797] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 74.857784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 74.864293] page_type: f5(slab) [ 74.867426] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 74.875150] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 74.882869] page dumped because: kasan: bad access detected [ 74.888424] [ 74.889900] Memory state around the buggy address: [ 74.894678] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.901883] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.909088] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 74.916288] ^ [ 74.921068] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 74.928271] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 74.935472] ================================================================== [ 79.704212] ================================================================== [ 79.711270] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 79.718647] Read of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 79.725938] [ 79.727419] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 79.727467] Tainted: [B]=BAD_PAGE, [N]=TEST [ 79.727485] Hardware name: WinLink E850-96 board (DT) [ 79.727502] Call trace: [ 79.727515] show_stack+0x20/0x38 (C) [ 79.727546] dump_stack_lvl+0x8c/0xd0 [ 79.727580] print_report+0x118/0x5d0 [ 79.727609] kasan_report+0xdc/0x128 [ 79.727635] __asan_report_load8_noabort+0x20/0x30 [ 79.727669] kasan_atomics_helper+0x3e10/0x4858 [ 79.727704] kasan_atomics+0x198/0x2e0 [ 79.727737] kunit_try_run_case+0x170/0x3f0 [ 79.727772] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 79.727805] kthread+0x328/0x630 [ 79.727833] ret_from_fork+0x10/0x20 [ 79.727864] [ 79.795555] Allocated by task 349: [ 79.798941] kasan_save_stack+0x3c/0x68 [ 79.802760] kasan_save_track+0x20/0x40 [ 79.806580] kasan_save_alloc_info+0x40/0x58 [ 79.810833] __kasan_kmalloc+0xd4/0xd8 [ 79.814566] __kmalloc_cache_noprof+0x16c/0x3c0 [ 79.819079] kasan_atomics+0xb8/0x2e0 [ 79.822725] kunit_try_run_case+0x170/0x3f0 [ 79.826892] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 79.832360] kthread+0x328/0x630 [ 79.835572] ret_from_fork+0x10/0x20 [ 79.839131] [ 79.840607] The buggy address belongs to the object at ffff000807848f80 [ 79.840607] which belongs to the cache kmalloc-64 of size 64 [ 79.852934] The buggy address is located 0 bytes to the right of [ 79.852934] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 79.865780] [ 79.867256] The buggy address belongs to the physical page: [ 79.872812] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 79.880797] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 79.887308] page_type: f5(slab) [ 79.890442] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 79.898165] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 79.905884] page dumped because: kasan: bad access detected [ 79.911439] [ 79.912915] Memory state around the buggy address: [ 79.917693] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 79.924897] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 79.932102] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 79.939303] ^ [ 79.944081] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 79.951286] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 79.958487] ================================================================== [ 80.492588] ================================================================== [ 80.499626] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 80.507003] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 80.514381] [ 80.515862] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 80.515915] Tainted: [B]=BAD_PAGE, [N]=TEST [ 80.515932] Hardware name: WinLink E850-96 board (DT) [ 80.515952] Call trace: [ 80.515966] show_stack+0x20/0x38 (C) [ 80.515997] dump_stack_lvl+0x8c/0xd0 [ 80.516027] print_report+0x118/0x5d0 [ 80.516057] kasan_report+0xdc/0x128 [ 80.516085] kasan_check_range+0x100/0x1a8 [ 80.516116] __kasan_check_write+0x20/0x30 [ 80.516147] kasan_atomics_helper+0x17ec/0x4858 [ 80.516183] kasan_atomics+0x198/0x2e0 [ 80.516216] kunit_try_run_case+0x170/0x3f0 [ 80.516252] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 80.516284] kthread+0x328/0x630 [ 80.516312] ret_from_fork+0x10/0x20 [ 80.516344] [ 80.587384] Allocated by task 349: [ 80.590769] kasan_save_stack+0x3c/0x68 [ 80.594589] kasan_save_track+0x20/0x40 [ 80.598408] kasan_save_alloc_info+0x40/0x58 [ 80.602661] __kasan_kmalloc+0xd4/0xd8 [ 80.606394] __kmalloc_cache_noprof+0x16c/0x3c0 [ 80.610908] kasan_atomics+0xb8/0x2e0 [ 80.614553] kunit_try_run_case+0x170/0x3f0 [ 80.618720] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 80.624189] kthread+0x328/0x630 [ 80.627401] ret_from_fork+0x10/0x20 [ 80.630960] [ 80.632435] The buggy address belongs to the object at ffff000807848f80 [ 80.632435] which belongs to the cache kmalloc-64 of size 64 [ 80.644762] The buggy address is located 0 bytes to the right of [ 80.644762] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 80.657608] [ 80.659086] The buggy address belongs to the physical page: [ 80.664640] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 80.672627] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 80.679136] page_type: f5(slab) [ 80.682269] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 80.689993] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 80.697712] page dumped because: kasan: bad access detected [ 80.703267] [ 80.704743] Memory state around the buggy address: [ 80.709521] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 80.716726] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 80.723930] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 80.731132] ^ [ 80.735909] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 80.743114] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 80.750315] ================================================================== [ 75.738121] ================================================================== [ 75.745183] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 75.752560] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 75.759939] [ 75.761419] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 75.761465] Tainted: [B]=BAD_PAGE, [N]=TEST [ 75.761483] Hardware name: WinLink E850-96 board (DT) [ 75.761502] Call trace: [ 75.761514] show_stack+0x20/0x38 (C) [ 75.761546] dump_stack_lvl+0x8c/0xd0 [ 75.761577] print_report+0x118/0x5d0 [ 75.761605] kasan_report+0xdc/0x128 [ 75.761633] kasan_check_range+0x100/0x1a8 [ 75.761663] __kasan_check_write+0x20/0x30 [ 75.761695] kasan_atomics_helper+0x1190/0x4858 [ 75.761733] kasan_atomics+0x198/0x2e0 [ 75.761765] kunit_try_run_case+0x170/0x3f0 [ 75.761799] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.761831] kthread+0x328/0x630 [ 75.761860] ret_from_fork+0x10/0x20 [ 75.761892] [ 75.832941] Allocated by task 349: [ 75.836326] kasan_save_stack+0x3c/0x68 [ 75.840146] kasan_save_track+0x20/0x40 [ 75.843966] kasan_save_alloc_info+0x40/0x58 [ 75.848219] __kasan_kmalloc+0xd4/0xd8 [ 75.851951] __kmalloc_cache_noprof+0x16c/0x3c0 [ 75.856465] kasan_atomics+0xb8/0x2e0 [ 75.860111] kunit_try_run_case+0x170/0x3f0 [ 75.864278] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.869746] kthread+0x328/0x630 [ 75.872958] ret_from_fork+0x10/0x20 [ 75.876517] [ 75.877992] The buggy address belongs to the object at ffff000807848f80 [ 75.877992] which belongs to the cache kmalloc-64 of size 64 [ 75.890319] The buggy address is located 0 bytes to the right of [ 75.890319] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 75.903166] [ 75.904642] The buggy address belongs to the physical page: [ 75.910198] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 75.918183] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 75.924694] page_type: f5(slab) [ 75.927826] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 75.935550] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 75.943269] page dumped because: kasan: bad access detected [ 75.948825] [ 75.950300] Memory state around the buggy address: [ 75.955079] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.962284] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.969488] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 75.976689] ^ [ 75.981467] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 75.988672] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 75.995873] ================================================================== [ 76.533445] ================================================================== [ 76.540484] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 76.547861] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 76.555239] [ 76.556720] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 76.556770] Tainted: [B]=BAD_PAGE, [N]=TEST [ 76.556786] Hardware name: WinLink E850-96 board (DT) [ 76.556805] Call trace: [ 76.556820] show_stack+0x20/0x38 (C) [ 76.556852] dump_stack_lvl+0x8c/0xd0 [ 76.556882] print_report+0x118/0x5d0 [ 76.556911] kasan_report+0xdc/0x128 [ 76.556938] kasan_check_range+0x100/0x1a8 [ 76.556969] __kasan_check_write+0x20/0x30 [ 76.557001] kasan_atomics_helper+0x12d8/0x4858 [ 76.557037] kasan_atomics+0x198/0x2e0 [ 76.557069] kunit_try_run_case+0x170/0x3f0 [ 76.557103] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.557135] kthread+0x328/0x630 [ 76.557164] ret_from_fork+0x10/0x20 [ 76.557194] [ 76.628242] Allocated by task 349: [ 76.631628] kasan_save_stack+0x3c/0x68 [ 76.635447] kasan_save_track+0x20/0x40 [ 76.639266] kasan_save_alloc_info+0x40/0x58 [ 76.643519] __kasan_kmalloc+0xd4/0xd8 [ 76.647252] __kmalloc_cache_noprof+0x16c/0x3c0 [ 76.651766] kasan_atomics+0xb8/0x2e0 [ 76.655412] kunit_try_run_case+0x170/0x3f0 [ 76.659578] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.665047] kthread+0x328/0x630 [ 76.668259] ret_from_fork+0x10/0x20 [ 76.671818] [ 76.673293] The buggy address belongs to the object at ffff000807848f80 [ 76.673293] which belongs to the cache kmalloc-64 of size 64 [ 76.685620] The buggy address is located 0 bytes to the right of [ 76.685620] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 76.698467] [ 76.699943] The buggy address belongs to the physical page: [ 76.705498] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 76.713485] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 76.719994] page_type: f5(slab) [ 76.723127] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 76.730851] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 76.738570] page dumped because: kasan: bad access detected [ 76.744125] [ 76.745601] Memory state around the buggy address: [ 76.750379] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 76.757584] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 76.764789] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 76.771990] ^ [ 76.776768] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 76.783972] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 76.791173] ================================================================== [ 64.643706] ================================================================== [ 64.650736] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 64.658024] Read of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 64.665314] [ 64.666799] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 64.666856] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.666872] Hardware name: WinLink E850-96 board (DT) [ 64.666893] Call trace: [ 64.666907] show_stack+0x20/0x38 (C) [ 64.666945] dump_stack_lvl+0x8c/0xd0 [ 64.666977] print_report+0x118/0x5d0 [ 64.667009] kasan_report+0xdc/0x128 [ 64.667038] kasan_check_range+0x100/0x1a8 [ 64.667071] __kasan_check_read+0x20/0x30 [ 64.667106] kasan_atomics_helper+0x2b0/0x4858 [ 64.667140] kasan_atomics+0x198/0x2e0 [ 64.667174] kunit_try_run_case+0x170/0x3f0 [ 64.667215] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.667249] kthread+0x328/0x630 [ 64.667278] ret_from_fork+0x10/0x20 [ 64.667316] [ 64.738142] Allocated by task 349: [ 64.741531] kasan_save_stack+0x3c/0x68 [ 64.745347] kasan_save_track+0x20/0x40 [ 64.749167] kasan_save_alloc_info+0x40/0x58 [ 64.753420] __kasan_kmalloc+0xd4/0xd8 [ 64.757152] __kmalloc_cache_noprof+0x16c/0x3c0 [ 64.761667] kasan_atomics+0xb8/0x2e0 [ 64.765312] kunit_try_run_case+0x170/0x3f0 [ 64.769479] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.774948] kthread+0x328/0x630 [ 64.778159] ret_from_fork+0x10/0x20 [ 64.781718] [ 64.783196] The buggy address belongs to the object at ffff000807848f80 [ 64.783196] which belongs to the cache kmalloc-64 of size 64 [ 64.795521] The buggy address is located 0 bytes to the right of [ 64.795521] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 64.808367] [ 64.809845] The buggy address belongs to the physical page: [ 64.815402] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 64.823387] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 64.829896] page_type: f5(slab) [ 64.833030] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 64.840752] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.848471] page dumped because: kasan: bad access detected [ 64.854026] [ 64.855502] Memory state around the buggy address: [ 64.860281] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.867485] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.874691] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 64.881890] ^ [ 64.886670] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 64.893873] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 64.901074] ================================================================== [ 74.148017] ================================================================== [ 74.155104] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 74.162394] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 74.169772] [ 74.171253] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 74.171305] Tainted: [B]=BAD_PAGE, [N]=TEST [ 74.171321] Hardware name: WinLink E850-96 board (DT) [ 74.171341] Call trace: [ 74.171353] show_stack+0x20/0x38 (C) [ 74.171385] dump_stack_lvl+0x8c/0xd0 [ 74.171416] print_report+0x118/0x5d0 [ 74.171446] kasan_report+0xdc/0x128 [ 74.171473] kasan_check_range+0x100/0x1a8 [ 74.171503] __kasan_check_write+0x20/0x30 [ 74.171535] kasan_atomics_helper+0xf20/0x4858 [ 74.171568] kasan_atomics+0x198/0x2e0 [ 74.171604] kunit_try_run_case+0x170/0x3f0 [ 74.171639] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.171673] kthread+0x328/0x630 [ 74.171700] ret_from_fork+0x10/0x20 [ 74.171734] [ 74.242687] Allocated by task 349: [ 74.246073] kasan_save_stack+0x3c/0x68 [ 74.249892] kasan_save_track+0x20/0x40 [ 74.253712] kasan_save_alloc_info+0x40/0x58 [ 74.257965] __kasan_kmalloc+0xd4/0xd8 [ 74.261697] __kmalloc_cache_noprof+0x16c/0x3c0 [ 74.266211] kasan_atomics+0xb8/0x2e0 [ 74.269857] kunit_try_run_case+0x170/0x3f0 [ 74.274023] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.279492] kthread+0x328/0x630 [ 74.282704] ret_from_fork+0x10/0x20 [ 74.286263] [ 74.287739] The buggy address belongs to the object at ffff000807848f80 [ 74.287739] which belongs to the cache kmalloc-64 of size 64 [ 74.300065] The buggy address is located 0 bytes to the right of [ 74.300065] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 74.312912] [ 74.314387] The buggy address belongs to the physical page: [ 74.319944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 74.327929] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 74.334440] page_type: f5(slab) [ 74.337573] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 74.345297] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 74.353016] page dumped because: kasan: bad access detected [ 74.358571] [ 74.360046] Memory state around the buggy address: [ 74.364825] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.372029] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.379234] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 74.386435] ^ [ 74.391213] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 74.398418] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 74.405619] ================================================================== [ 80.230938] ================================================================== [ 80.237998] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 80.245375] Read of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 80.252667] [ 80.254146] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 80.254194] Tainted: [B]=BAD_PAGE, [N]=TEST [ 80.254211] Hardware name: WinLink E850-96 board (DT) [ 80.254229] Call trace: [ 80.254241] show_stack+0x20/0x38 (C) [ 80.254275] dump_stack_lvl+0x8c/0xd0 [ 80.254305] print_report+0x118/0x5d0 [ 80.254334] kasan_report+0xdc/0x128 [ 80.254362] __asan_report_load8_noabort+0x20/0x30 [ 80.254394] kasan_atomics_helper+0x3e20/0x4858 [ 80.254429] kasan_atomics+0x198/0x2e0 [ 80.254462] kunit_try_run_case+0x170/0x3f0 [ 80.254496] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 80.254531] kthread+0x328/0x630 [ 80.254558] ret_from_fork+0x10/0x20 [ 80.254590] [ 80.322283] Allocated by task 349: [ 80.325669] kasan_save_stack+0x3c/0x68 [ 80.329488] kasan_save_track+0x20/0x40 [ 80.333308] kasan_save_alloc_info+0x40/0x58 [ 80.337561] __kasan_kmalloc+0xd4/0xd8 [ 80.341294] __kmalloc_cache_noprof+0x16c/0x3c0 [ 80.345808] kasan_atomics+0xb8/0x2e0 [ 80.349453] kunit_try_run_case+0x170/0x3f0 [ 80.353620] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 80.359089] kthread+0x328/0x630 [ 80.362300] ret_from_fork+0x10/0x20 [ 80.365860] [ 80.367335] The buggy address belongs to the object at ffff000807848f80 [ 80.367335] which belongs to the cache kmalloc-64 of size 64 [ 80.379662] The buggy address is located 0 bytes to the right of [ 80.379662] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 80.392508] [ 80.393984] The buggy address belongs to the physical page: [ 80.399540] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 80.407526] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 80.414036] page_type: f5(slab) [ 80.417171] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 80.424893] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 80.432612] page dumped because: kasan: bad access detected [ 80.438167] [ 80.439643] Memory state around the buggy address: [ 80.444421] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 80.451625] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 80.458830] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 80.466032] ^ [ 80.470809] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 80.478014] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 80.485215] ================================================================== [ 69.667398] ================================================================== [ 69.674442] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 69.681732] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 69.689110] [ 69.690589] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 69.690639] Tainted: [B]=BAD_PAGE, [N]=TEST [ 69.690656] Hardware name: WinLink E850-96 board (DT) [ 69.690674] Call trace: [ 69.690687] show_stack+0x20/0x38 (C) [ 69.690722] dump_stack_lvl+0x8c/0xd0 [ 69.690752] print_report+0x118/0x5d0 [ 69.690779] kasan_report+0xdc/0x128 [ 69.690806] kasan_check_range+0x100/0x1a8 [ 69.690835] __kasan_check_write+0x20/0x30 [ 69.690867] kasan_atomics_helper+0xa04/0x4858 [ 69.690901] kasan_atomics+0x198/0x2e0 [ 69.690935] kunit_try_run_case+0x170/0x3f0 [ 69.690971] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.691002] kthread+0x328/0x630 [ 69.691030] ret_from_fork+0x10/0x20 [ 69.691063] [ 69.762025] Allocated by task 349: [ 69.765411] kasan_save_stack+0x3c/0x68 [ 69.769230] kasan_save_track+0x20/0x40 [ 69.773049] kasan_save_alloc_info+0x40/0x58 [ 69.777303] __kasan_kmalloc+0xd4/0xd8 [ 69.781035] __kmalloc_cache_noprof+0x16c/0x3c0 [ 69.785549] kasan_atomics+0xb8/0x2e0 [ 69.789195] kunit_try_run_case+0x170/0x3f0 [ 69.793362] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.798831] kthread+0x328/0x630 [ 69.802042] ret_from_fork+0x10/0x20 [ 69.805602] [ 69.807077] The buggy address belongs to the object at ffff000807848f80 [ 69.807077] which belongs to the cache kmalloc-64 of size 64 [ 69.819403] The buggy address is located 0 bytes to the right of [ 69.819403] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 69.832250] [ 69.833726] The buggy address belongs to the physical page: [ 69.839285] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 69.847269] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 69.853778] page_type: f5(slab) [ 69.856912] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 69.864635] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 69.872354] page dumped because: kasan: bad access detected [ 69.877909] [ 69.879385] Memory state around the buggy address: [ 69.884163] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.891368] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.898572] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 69.905773] ^ [ 69.910551] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 69.917756] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 69.924957] ================================================================== [ 73.883134] ================================================================== [ 73.890178] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 73.897467] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 73.904845] [ 73.906325] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 73.906379] Tainted: [B]=BAD_PAGE, [N]=TEST [ 73.906395] Hardware name: WinLink E850-96 board (DT) [ 73.906415] Call trace: [ 73.906428] show_stack+0x20/0x38 (C) [ 73.906459] dump_stack_lvl+0x8c/0xd0 [ 73.906492] print_report+0x118/0x5d0 [ 73.906520] kasan_report+0xdc/0x128 [ 73.906548] kasan_check_range+0x100/0x1a8 [ 73.906578] __kasan_check_write+0x20/0x30 [ 73.906610] kasan_atomics_helper+0xeb8/0x4858 [ 73.906646] kasan_atomics+0x198/0x2e0 [ 73.906682] kunit_try_run_case+0x170/0x3f0 [ 73.906715] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.906748] kthread+0x328/0x630 [ 73.906775] ret_from_fork+0x10/0x20 [ 73.906808] [ 73.977761] Allocated by task 349: [ 73.981146] kasan_save_stack+0x3c/0x68 [ 73.984966] kasan_save_track+0x20/0x40 [ 73.988785] kasan_save_alloc_info+0x40/0x58 [ 73.993038] __kasan_kmalloc+0xd4/0xd8 [ 73.996771] __kmalloc_cache_noprof+0x16c/0x3c0 [ 74.001285] kasan_atomics+0xb8/0x2e0 [ 74.004931] kunit_try_run_case+0x170/0x3f0 [ 74.009097] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.014566] kthread+0x328/0x630 [ 74.017778] ret_from_fork+0x10/0x20 [ 74.021336] [ 74.022812] The buggy address belongs to the object at ffff000807848f80 [ 74.022812] which belongs to the cache kmalloc-64 of size 64 [ 74.035139] The buggy address is located 0 bytes to the right of [ 74.035139] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 74.047985] [ 74.049463] The buggy address belongs to the physical page: [ 74.055018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 74.063005] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 74.069513] page_type: f5(slab) [ 74.072649] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 74.080370] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 74.088089] page dumped because: kasan: bad access detected [ 74.093644] [ 74.095120] Memory state around the buggy address: [ 74.099898] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.107103] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.114308] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 74.121509] ^ [ 74.126287] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 74.133491] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 74.140693] ================================================================== [ 74.942849] ================================================================== [ 74.949884] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 74.957260] Write of size 8 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 74.964638] [ 74.966122] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 74.966175] Tainted: [B]=BAD_PAGE, [N]=TEST [ 74.966193] Hardware name: WinLink E850-96 board (DT) [ 74.966211] Call trace: [ 74.966223] show_stack+0x20/0x38 (C) [ 74.966255] dump_stack_lvl+0x8c/0xd0 [ 74.966284] print_report+0x118/0x5d0 [ 74.966313] kasan_report+0xdc/0x128 [ 74.966342] kasan_check_range+0x100/0x1a8 [ 74.966372] __kasan_check_write+0x20/0x30 [ 74.966403] kasan_atomics_helper+0x1058/0x4858 [ 74.966440] kasan_atomics+0x198/0x2e0 [ 74.966474] kunit_try_run_case+0x170/0x3f0 [ 74.966508] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.966542] kthread+0x328/0x630 [ 74.966570] ret_from_fork+0x10/0x20 [ 74.966600] [ 75.037641] Allocated by task 349: [ 75.041026] kasan_save_stack+0x3c/0x68 [ 75.044845] kasan_save_track+0x20/0x40 [ 75.048665] kasan_save_alloc_info+0x40/0x58 [ 75.052918] __kasan_kmalloc+0xd4/0xd8 [ 75.056651] __kmalloc_cache_noprof+0x16c/0x3c0 [ 75.061165] kasan_atomics+0xb8/0x2e0 [ 75.064811] kunit_try_run_case+0x170/0x3f0 [ 75.068977] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.074446] kthread+0x328/0x630 [ 75.077657] ret_from_fork+0x10/0x20 [ 75.081216] [ 75.082692] The buggy address belongs to the object at ffff000807848f80 [ 75.082692] which belongs to the cache kmalloc-64 of size 64 [ 75.095019] The buggy address is located 0 bytes to the right of [ 75.095019] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 75.107865] [ 75.109341] The buggy address belongs to the physical page: [ 75.114897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 75.122882] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 75.129393] page_type: f5(slab) [ 75.132527] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 75.140250] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 75.147969] page dumped because: kasan: bad access detected [ 75.153524] [ 75.155000] Memory state around the buggy address: [ 75.159778] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.166983] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.174188] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 75.181389] ^ [ 75.186168] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 75.193371] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 75.200572] ================================================================== [ 69.402450] ================================================================== [ 69.409515] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 69.416805] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 69.424183] [ 69.425663] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 69.425710] Tainted: [B]=BAD_PAGE, [N]=TEST [ 69.425725] Hardware name: WinLink E850-96 board (DT) [ 69.425745] Call trace: [ 69.425758] show_stack+0x20/0x38 (C) [ 69.425790] dump_stack_lvl+0x8c/0xd0 [ 69.425821] print_report+0x118/0x5d0 [ 69.425849] kasan_report+0xdc/0x128 [ 69.425877] kasan_check_range+0x100/0x1a8 [ 69.425907] __kasan_check_write+0x20/0x30 [ 69.425937] kasan_atomics_helper+0x99c/0x4858 [ 69.425971] kasan_atomics+0x198/0x2e0 [ 69.426004] kunit_try_run_case+0x170/0x3f0 [ 69.426038] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.426072] kthread+0x328/0x630 [ 69.426099] ret_from_fork+0x10/0x20 [ 69.426129] [ 69.497099] Allocated by task 349: [ 69.500485] kasan_save_stack+0x3c/0x68 [ 69.504304] kasan_save_track+0x20/0x40 [ 69.508123] kasan_save_alloc_info+0x40/0x58 [ 69.512377] __kasan_kmalloc+0xd4/0xd8 [ 69.516109] __kmalloc_cache_noprof+0x16c/0x3c0 [ 69.520623] kasan_atomics+0xb8/0x2e0 [ 69.524269] kunit_try_run_case+0x170/0x3f0 [ 69.528435] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.533904] kthread+0x328/0x630 [ 69.537116] ret_from_fork+0x10/0x20 [ 69.540675] [ 69.542150] The buggy address belongs to the object at ffff000807848f80 [ 69.542150] which belongs to the cache kmalloc-64 of size 64 [ 69.554477] The buggy address is located 0 bytes to the right of [ 69.554477] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 69.567323] [ 69.568799] The buggy address belongs to the physical page: [ 69.574355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 69.582341] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 69.588851] page_type: f5(slab) [ 69.591984] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 69.599708] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 69.607427] page dumped because: kasan: bad access detected [ 69.612983] [ 69.614458] Memory state around the buggy address: [ 69.619236] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.626441] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.633646] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 69.640847] ^ [ 69.645625] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 69.652829] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 69.660031] ================================================================== [ 72.041850] ================================================================== [ 72.048885] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 72.056262] Read of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 72.063553] [ 72.065035] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 72.065084] Tainted: [B]=BAD_PAGE, [N]=TEST [ 72.065100] Hardware name: WinLink E850-96 board (DT) [ 72.065119] Call trace: [ 72.065133] show_stack+0x20/0x38 (C) [ 72.065164] dump_stack_lvl+0x8c/0xd0 [ 72.065197] print_report+0x118/0x5d0 [ 72.065226] kasan_report+0xdc/0x128 [ 72.065255] __asan_report_load4_noabort+0x20/0x30 [ 72.065288] kasan_atomics_helper+0x3dd8/0x4858 [ 72.065324] kasan_atomics+0x198/0x2e0 [ 72.065358] kunit_try_run_case+0x170/0x3f0 [ 72.065393] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.065425] kthread+0x328/0x630 [ 72.065452] ret_from_fork+0x10/0x20 [ 72.065485] [ 72.133170] Allocated by task 349: [ 72.136556] kasan_save_stack+0x3c/0x68 [ 72.140375] kasan_save_track+0x20/0x40 [ 72.144195] kasan_save_alloc_info+0x40/0x58 [ 72.148448] __kasan_kmalloc+0xd4/0xd8 [ 72.152180] __kmalloc_cache_noprof+0x16c/0x3c0 [ 72.156694] kasan_atomics+0xb8/0x2e0 [ 72.160340] kunit_try_run_case+0x170/0x3f0 [ 72.164507] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.169975] kthread+0x328/0x630 [ 72.173187] ret_from_fork+0x10/0x20 [ 72.176746] [ 72.178222] The buggy address belongs to the object at ffff000807848f80 [ 72.178222] which belongs to the cache kmalloc-64 of size 64 [ 72.190548] The buggy address is located 0 bytes to the right of [ 72.190548] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 72.203395] [ 72.204871] The buggy address belongs to the physical page: [ 72.210428] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 72.218413] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 72.224923] page_type: f5(slab) [ 72.228057] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 72.235780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 72.243499] page dumped because: kasan: bad access detected [ 72.249054] [ 72.250530] Memory state around the buggy address: [ 72.255308] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.262512] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.269717] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 72.276918] ^ [ 72.281696] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 72.288901] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 72.296102] ================================================================== [ 65.435033] ================================================================== [ 65.442040] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 65.449417] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 65.456796] [ 65.458279] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 65.458330] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.458346] Hardware name: WinLink E850-96 board (DT) [ 65.458369] Call trace: [ 65.458382] show_stack+0x20/0x38 (C) [ 65.458416] dump_stack_lvl+0x8c/0xd0 [ 65.458449] print_report+0x118/0x5d0 [ 65.458477] kasan_report+0xdc/0x128 [ 65.458507] __asan_report_store4_noabort+0x20/0x30 [ 65.458540] kasan_atomics_helper+0x3f94/0x4858 [ 65.458576] kasan_atomics+0x198/0x2e0 [ 65.458608] kunit_try_run_case+0x170/0x3f0 [ 65.458643] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.458676] kthread+0x328/0x630 [ 65.458704] ret_from_fork+0x10/0x20 [ 65.458740] [ 65.526499] Allocated by task 349: [ 65.529884] kasan_save_stack+0x3c/0x68 [ 65.533704] kasan_save_track+0x20/0x40 [ 65.537523] kasan_save_alloc_info+0x40/0x58 [ 65.541776] __kasan_kmalloc+0xd4/0xd8 [ 65.545509] __kmalloc_cache_noprof+0x16c/0x3c0 [ 65.550023] kasan_atomics+0xb8/0x2e0 [ 65.553668] kunit_try_run_case+0x170/0x3f0 [ 65.557835] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.563304] kthread+0x328/0x630 [ 65.566515] ret_from_fork+0x10/0x20 [ 65.570075] [ 65.571550] The buggy address belongs to the object at ffff000807848f80 [ 65.571550] which belongs to the cache kmalloc-64 of size 64 [ 65.583878] The buggy address is located 0 bytes to the right of [ 65.583878] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 65.596723] [ 65.598202] The buggy address belongs to the physical page: [ 65.603757] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 65.611744] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 65.618251] page_type: f5(slab) [ 65.621387] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 65.629108] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.636827] page dumped because: kasan: bad access detected [ 65.642382] [ 65.643858] Memory state around the buggy address: [ 65.648637] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.655841] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.663048] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 65.670246] ^ [ 65.675024] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.682229] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.689430] ================================================================== [ 67.551236] ================================================================== [ 67.558327] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 67.565618] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 67.572996] [ 67.574476] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 67.574526] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.574541] Hardware name: WinLink E850-96 board (DT) [ 67.574558] Call trace: [ 67.574571] show_stack+0x20/0x38 (C) [ 67.574602] dump_stack_lvl+0x8c/0xd0 [ 67.574634] print_report+0x118/0x5d0 [ 67.574663] kasan_report+0xdc/0x128 [ 67.574690] kasan_check_range+0x100/0x1a8 [ 67.574720] __kasan_check_write+0x20/0x30 [ 67.574751] kasan_atomics_helper+0x684/0x4858 [ 67.574786] kasan_atomics+0x198/0x2e0 [ 67.574819] kunit_try_run_case+0x170/0x3f0 [ 67.574856] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.574888] kthread+0x328/0x630 [ 67.574916] ret_from_fork+0x10/0x20 [ 67.574948] [ 67.645911] Allocated by task 349: [ 67.649298] kasan_save_stack+0x3c/0x68 [ 67.653116] kasan_save_track+0x20/0x40 [ 67.656936] kasan_save_alloc_info+0x40/0x58 [ 67.661189] __kasan_kmalloc+0xd4/0xd8 [ 67.664921] __kmalloc_cache_noprof+0x16c/0x3c0 [ 67.669435] kasan_atomics+0xb8/0x2e0 [ 67.673081] kunit_try_run_case+0x170/0x3f0 [ 67.677248] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.682717] kthread+0x328/0x630 [ 67.685928] ret_from_fork+0x10/0x20 [ 67.689487] [ 67.690963] The buggy address belongs to the object at ffff000807848f80 [ 67.690963] which belongs to the cache kmalloc-64 of size 64 [ 67.703289] The buggy address is located 0 bytes to the right of [ 67.703289] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 67.716136] [ 67.717612] The buggy address belongs to the physical page: [ 67.723168] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 67.731153] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 67.737663] page_type: f5(slab) [ 67.740798] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 67.748521] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 67.756239] page dumped because: kasan: bad access detected [ 67.761795] [ 67.763271] Memory state around the buggy address: [ 67.768049] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.775253] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.782458] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 67.789659] ^ [ 67.794437] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 67.801642] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 67.808843] ================================================================== [ 66.226644] ================================================================== [ 66.233694] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 66.240985] Write of size 4 at addr ffff000807848fb0 by task kunit_try_catch/349 [ 66.248363] [ 66.249846] CPU: 6 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 66.249898] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.249913] Hardware name: WinLink E850-96 board (DT) [ 66.249933] Call trace: [ 66.249946] show_stack+0x20/0x38 (C) [ 66.249978] dump_stack_lvl+0x8c/0xd0 [ 66.250009] print_report+0x118/0x5d0 [ 66.250037] kasan_report+0xdc/0x128 [ 66.250065] kasan_check_range+0x100/0x1a8 [ 66.250093] __kasan_check_write+0x20/0x30 [ 66.250124] kasan_atomics_helper+0x47c/0x4858 [ 66.250158] kasan_atomics+0x198/0x2e0 [ 66.250190] kunit_try_run_case+0x170/0x3f0 [ 66.250226] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.250258] kthread+0x328/0x630 [ 66.250286] ret_from_fork+0x10/0x20 [ 66.250321] [ 66.321278] Allocated by task 349: [ 66.324664] kasan_save_stack+0x3c/0x68 [ 66.328484] kasan_save_track+0x20/0x40 [ 66.332303] kasan_save_alloc_info+0x40/0x58 [ 66.336556] __kasan_kmalloc+0xd4/0xd8 [ 66.340289] __kmalloc_cache_noprof+0x16c/0x3c0 [ 66.344803] kasan_atomics+0xb8/0x2e0 [ 66.348448] kunit_try_run_case+0x170/0x3f0 [ 66.352615] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.358083] kthread+0x328/0x630 [ 66.361295] ret_from_fork+0x10/0x20 [ 66.364854] [ 66.366330] The buggy address belongs to the object at ffff000807848f80 [ 66.366330] which belongs to the cache kmalloc-64 of size 64 [ 66.378657] The buggy address is located 0 bytes to the right of [ 66.378657] allocated 48-byte region [ffff000807848f80, ffff000807848fb0) [ 66.391503] [ 66.392980] The buggy address belongs to the physical page: [ 66.398536] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887848 [ 66.406523] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 66.413031] page_type: f5(slab) [ 66.416165] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 66.423888] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.431607] page dumped because: kasan: bad access detected [ 66.437162] [ 66.438638] Memory state around the buggy address: [ 66.443418] ffff000807848e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.450620] ffff000807848f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.457825] >ffff000807848f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 66.465026] ^ [ 66.469804] ffff000807849000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 66.477009] ffff000807849080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 66.484210] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 61.170990] ================================================================== [ 61.178041] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 61.186894] Write of size 8 at addr ffff000800b19528 by task kunit_try_catch/345 [ 61.194272] [ 61.195754] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 61.195804] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.195821] Hardware name: WinLink E850-96 board (DT) [ 61.195838] Call trace: [ 61.195852] show_stack+0x20/0x38 (C) [ 61.195884] dump_stack_lvl+0x8c/0xd0 [ 61.195915] print_report+0x118/0x5d0 [ 61.195942] kasan_report+0xdc/0x128 [ 61.195971] kasan_check_range+0x100/0x1a8 [ 61.196001] __kasan_check_write+0x20/0x30 [ 61.196031] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 61.196070] kasan_bitops_generic+0x11c/0x1c8 [ 61.196105] kunit_try_run_case+0x170/0x3f0 [ 61.196141] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.196174] kthread+0x328/0x630 [ 61.196200] ret_from_fork+0x10/0x20 [ 61.196233] [ 61.269358] Allocated by task 345: [ 61.272743] kasan_save_stack+0x3c/0x68 [ 61.276563] kasan_save_track+0x20/0x40 [ 61.280382] kasan_save_alloc_info+0x40/0x58 [ 61.284635] __kasan_kmalloc+0xd4/0xd8 [ 61.288368] __kmalloc_cache_noprof+0x16c/0x3c0 [ 61.292881] kasan_bitops_generic+0xa0/0x1c8 [ 61.297135] kunit_try_run_case+0x170/0x3f0 [ 61.301302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.306770] kthread+0x328/0x630 [ 61.309982] ret_from_fork+0x10/0x20 [ 61.313541] [ 61.315017] The buggy address belongs to the object at ffff000800b19520 [ 61.315017] which belongs to the cache kmalloc-16 of size 16 [ 61.327344] The buggy address is located 8 bytes inside of [ 61.327344] allocated 9-byte region [ffff000800b19520, ffff000800b19529) [ 61.339582] [ 61.341058] The buggy address belongs to the physical page: [ 61.346615] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19 [ 61.354600] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.361110] page_type: f5(slab) [ 61.364245] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 61.371967] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 61.379686] page dumped because: kasan: bad access detected [ 61.385241] [ 61.386717] Memory state around the buggy address: [ 61.391497] ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 61.398700] ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 61.405906] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 61.413106] ^ [ 61.417623] ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.424828] ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.432029] ================================================================== [ 61.704453] ================================================================== [ 61.711541] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 61.720480] Write of size 8 at addr ffff000800b19528 by task kunit_try_catch/345 [ 61.727858] [ 61.729337] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 61.729386] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.729405] Hardware name: WinLink E850-96 board (DT) [ 61.729423] Call trace: [ 61.729435] show_stack+0x20/0x38 (C) [ 61.729466] dump_stack_lvl+0x8c/0xd0 [ 61.729499] print_report+0x118/0x5d0 [ 61.729527] kasan_report+0xdc/0x128 [ 61.729553] kasan_check_range+0x100/0x1a8 [ 61.729583] __kasan_check_write+0x20/0x30 [ 61.729614] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 61.729650] kasan_bitops_generic+0x11c/0x1c8 [ 61.729686] kunit_try_run_case+0x170/0x3f0 [ 61.729718] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.729748] kthread+0x328/0x630 [ 61.729775] ret_from_fork+0x10/0x20 [ 61.729804] [ 61.803030] Allocated by task 345: [ 61.806416] kasan_save_stack+0x3c/0x68 [ 61.810235] kasan_save_track+0x20/0x40 [ 61.814055] kasan_save_alloc_info+0x40/0x58 [ 61.818308] __kasan_kmalloc+0xd4/0xd8 [ 61.822040] __kmalloc_cache_noprof+0x16c/0x3c0 [ 61.826554] kasan_bitops_generic+0xa0/0x1c8 [ 61.830808] kunit_try_run_case+0x170/0x3f0 [ 61.834974] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.840443] kthread+0x328/0x630 [ 61.843655] ret_from_fork+0x10/0x20 [ 61.847214] [ 61.848689] The buggy address belongs to the object at ffff000800b19520 [ 61.848689] which belongs to the cache kmalloc-16 of size 16 [ 61.861016] The buggy address is located 8 bytes inside of [ 61.861016] allocated 9-byte region [ffff000800b19520, ffff000800b19529) [ 61.873255] [ 61.874731] The buggy address belongs to the physical page: [ 61.880287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19 [ 61.888272] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.894783] page_type: f5(slab) [ 61.897917] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 61.905640] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 61.913359] page dumped because: kasan: bad access detected [ 61.918914] [ 61.920389] Memory state around the buggy address: [ 61.925169] ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 61.932373] ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 61.939577] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 61.946778] ^ [ 61.951296] ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.958500] ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.965702] ================================================================== [ 63.305497] ================================================================== [ 63.312558] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 63.321498] Read of size 8 at addr ffff000800b19528 by task kunit_try_catch/345 [ 63.328789] [ 63.330269] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 63.330318] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.330334] Hardware name: WinLink E850-96 board (DT) [ 63.330352] Call trace: [ 63.330364] show_stack+0x20/0x38 (C) [ 63.330396] dump_stack_lvl+0x8c/0xd0 [ 63.330427] print_report+0x118/0x5d0 [ 63.330456] kasan_report+0xdc/0x128 [ 63.330482] __asan_report_load8_noabort+0x20/0x30 [ 63.330515] kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 63.330555] kasan_bitops_generic+0x11c/0x1c8 [ 63.330589] kunit_try_run_case+0x170/0x3f0 [ 63.330622] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.330657] kthread+0x328/0x630 [ 63.330684] ret_from_fork+0x10/0x20 [ 63.330714] [ 63.400576] Allocated by task 345: [ 63.403961] kasan_save_stack+0x3c/0x68 [ 63.407781] kasan_save_track+0x20/0x40 [ 63.411600] kasan_save_alloc_info+0x40/0x58 [ 63.415853] __kasan_kmalloc+0xd4/0xd8 [ 63.419586] __kmalloc_cache_noprof+0x16c/0x3c0 [ 63.424100] kasan_bitops_generic+0xa0/0x1c8 [ 63.428353] kunit_try_run_case+0x170/0x3f0 [ 63.432520] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.437989] kthread+0x328/0x630 [ 63.441200] ret_from_fork+0x10/0x20 [ 63.444759] [ 63.446235] The buggy address belongs to the object at ffff000800b19520 [ 63.446235] which belongs to the cache kmalloc-16 of size 16 [ 63.458561] The buggy address is located 8 bytes inside of [ 63.458561] allocated 9-byte region [ffff000800b19520, ffff000800b19529) [ 63.470801] [ 63.472276] The buggy address belongs to the physical page: [ 63.477832] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19 [ 63.485818] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.492328] page_type: f5(slab) [ 63.495461] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 63.503185] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 63.510904] page dumped because: kasan: bad access detected [ 63.516459] [ 63.517935] Memory state around the buggy address: [ 63.522713] ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 63.529918] ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 63.537123] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 63.544324] ^ [ 63.548841] ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.556046] ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.563247] ================================================================== [ 62.506745] ================================================================== [ 62.513786] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 62.522725] Read of size 8 at addr ffff000800b19528 by task kunit_try_catch/345 [ 62.530016] [ 62.531497] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 62.531546] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.531562] Hardware name: WinLink E850-96 board (DT) [ 62.531581] Call trace: [ 62.531593] show_stack+0x20/0x38 (C) [ 62.531623] dump_stack_lvl+0x8c/0xd0 [ 62.531652] print_report+0x118/0x5d0 [ 62.531680] kasan_report+0xdc/0x128 [ 62.531708] __asan_report_load8_noabort+0x20/0x30 [ 62.531743] kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 62.531781] kasan_bitops_generic+0x11c/0x1c8 [ 62.531816] kunit_try_run_case+0x170/0x3f0 [ 62.531853] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.531886] kthread+0x328/0x630 [ 62.531913] ret_from_fork+0x10/0x20 [ 62.531944] [ 62.601803] Allocated by task 345: [ 62.605188] kasan_save_stack+0x3c/0x68 [ 62.609008] kasan_save_track+0x20/0x40 [ 62.612827] kasan_save_alloc_info+0x40/0x58 [ 62.617081] __kasan_kmalloc+0xd4/0xd8 [ 62.620813] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.625327] kasan_bitops_generic+0xa0/0x1c8 [ 62.629581] kunit_try_run_case+0x170/0x3f0 [ 62.633747] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.639216] kthread+0x328/0x630 [ 62.642428] ret_from_fork+0x10/0x20 [ 62.645986] [ 62.647462] The buggy address belongs to the object at ffff000800b19520 [ 62.647462] which belongs to the cache kmalloc-16 of size 16 [ 62.659789] The buggy address is located 8 bytes inside of [ 62.659789] allocated 9-byte region [ffff000800b19520, ffff000800b19529) [ 62.672028] [ 62.673504] The buggy address belongs to the physical page: [ 62.679059] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19 [ 62.687047] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.693555] page_type: f5(slab) [ 62.696690] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 62.704412] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 62.712131] page dumped because: kasan: bad access detected [ 62.717687] [ 62.719162] Memory state around the buggy address: [ 62.723941] ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 62.731145] ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 62.738350] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 62.745551] ^ [ 62.750068] ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.757273] ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.764474] ================================================================== [ 62.238153] ================================================================== [ 62.245213] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 62.254152] Write of size 8 at addr ffff000800b19528 by task kunit_try_catch/345 [ 62.261530] [ 62.263011] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 62.263059] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.263077] Hardware name: WinLink E850-96 board (DT) [ 62.263095] Call trace: [ 62.263105] show_stack+0x20/0x38 (C) [ 62.263138] dump_stack_lvl+0x8c/0xd0 [ 62.263166] print_report+0x118/0x5d0 [ 62.263192] kasan_report+0xdc/0x128 [ 62.263219] kasan_check_range+0x100/0x1a8 [ 62.263248] __kasan_check_write+0x20/0x30 [ 62.263278] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 62.263317] kasan_bitops_generic+0x11c/0x1c8 [ 62.263352] kunit_try_run_case+0x170/0x3f0 [ 62.263387] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.263420] kthread+0x328/0x630 [ 62.263447] ret_from_fork+0x10/0x20 [ 62.263478] [ 62.336703] Allocated by task 345: [ 62.340088] kasan_save_stack+0x3c/0x68 [ 62.343907] kasan_save_track+0x20/0x40 [ 62.347727] kasan_save_alloc_info+0x40/0x58 [ 62.351980] __kasan_kmalloc+0xd4/0xd8 [ 62.355713] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.360227] kasan_bitops_generic+0xa0/0x1c8 [ 62.364480] kunit_try_run_case+0x170/0x3f0 [ 62.368647] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.374116] kthread+0x328/0x630 [ 62.377327] ret_from_fork+0x10/0x20 [ 62.380886] [ 62.382362] The buggy address belongs to the object at ffff000800b19520 [ 62.382362] which belongs to the cache kmalloc-16 of size 16 [ 62.394689] The buggy address is located 8 bytes inside of [ 62.394689] allocated 9-byte region [ffff000800b19520, ffff000800b19529) [ 62.406928] [ 62.408403] The buggy address belongs to the physical page: [ 62.413959] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19 [ 62.421945] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.428455] page_type: f5(slab) [ 62.431589] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 62.439312] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 62.447031] page dumped because: kasan: bad access detected [ 62.452586] [ 62.454062] Memory state around the buggy address: [ 62.458840] ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 62.466045] ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 62.473250] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 62.480450] ^ [ 62.484969] ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.492173] ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.499374] ================================================================== [ 63.040392] ================================================================== [ 63.047458] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 63.056397] Read of size 8 at addr ffff000800b19528 by task kunit_try_catch/345 [ 63.063689] [ 63.065170] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 63.065217] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.065235] Hardware name: WinLink E850-96 board (DT) [ 63.065251] Call trace: [ 63.065264] show_stack+0x20/0x38 (C) [ 63.065296] dump_stack_lvl+0x8c/0xd0 [ 63.065324] print_report+0x118/0x5d0 [ 63.065352] kasan_report+0xdc/0x128 [ 63.065379] __asan_report_load8_noabort+0x20/0x30 [ 63.065413] kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 63.065452] kasan_bitops_generic+0x11c/0x1c8 [ 63.065486] kunit_try_run_case+0x170/0x3f0 [ 63.065520] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.065555] kthread+0x328/0x630 [ 63.065582] ret_from_fork+0x10/0x20 [ 63.065613] [ 63.135477] Allocated by task 345: [ 63.138861] kasan_save_stack+0x3c/0x68 [ 63.142680] kasan_save_track+0x20/0x40 [ 63.146500] kasan_save_alloc_info+0x40/0x58 [ 63.150753] __kasan_kmalloc+0xd4/0xd8 [ 63.154486] __kmalloc_cache_noprof+0x16c/0x3c0 [ 63.158999] kasan_bitops_generic+0xa0/0x1c8 [ 63.163253] kunit_try_run_case+0x170/0x3f0 [ 63.167419] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.172888] kthread+0x328/0x630 [ 63.176100] ret_from_fork+0x10/0x20 [ 63.179659] [ 63.181135] The buggy address belongs to the object at ffff000800b19520 [ 63.181135] which belongs to the cache kmalloc-16 of size 16 [ 63.193461] The buggy address is located 8 bytes inside of [ 63.193461] allocated 9-byte region [ffff000800b19520, ffff000800b19529) [ 63.205700] [ 63.207176] The buggy address belongs to the physical page: [ 63.212732] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19 [ 63.220719] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.227228] page_type: f5(slab) [ 63.230364] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 63.238085] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 63.245804] page dumped because: kasan: bad access detected [ 63.251359] [ 63.252835] Memory state around the buggy address: [ 63.257613] ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 63.264818] ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 63.272023] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 63.279223] ^ [ 63.283741] ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.290946] ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.298147] ================================================================== [ 61.973077] ================================================================== [ 61.980112] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 61.989052] Read of size 8 at addr ffff000800b19528 by task kunit_try_catch/345 [ 61.996344] [ 61.997823] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 61.997874] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.997890] Hardware name: WinLink E850-96 board (DT) [ 61.997910] Call trace: [ 61.997922] show_stack+0x20/0x38 (C) [ 61.997954] dump_stack_lvl+0x8c/0xd0 [ 61.997989] print_report+0x118/0x5d0 [ 61.998018] kasan_report+0xdc/0x128 [ 61.998046] __asan_report_load8_noabort+0x20/0x30 [ 61.998079] kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 61.998119] kasan_bitops_generic+0x11c/0x1c8 [ 61.998153] kunit_try_run_case+0x170/0x3f0 [ 61.998187] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.998220] kthread+0x328/0x630 [ 61.998247] ret_from_fork+0x10/0x20 [ 61.998279] [ 62.068130] Allocated by task 345: [ 62.071516] kasan_save_stack+0x3c/0x68 [ 62.075336] kasan_save_track+0x20/0x40 [ 62.079155] kasan_save_alloc_info+0x40/0x58 [ 62.083408] __kasan_kmalloc+0xd4/0xd8 [ 62.087141] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.091654] kasan_bitops_generic+0xa0/0x1c8 [ 62.095908] kunit_try_run_case+0x170/0x3f0 [ 62.100075] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.105543] kthread+0x328/0x630 [ 62.108755] ret_from_fork+0x10/0x20 [ 62.112314] [ 62.113789] The buggy address belongs to the object at ffff000800b19520 [ 62.113789] which belongs to the cache kmalloc-16 of size 16 [ 62.126116] The buggy address is located 8 bytes inside of [ 62.126116] allocated 9-byte region [ffff000800b19520, ffff000800b19529) [ 62.138355] [ 62.139831] The buggy address belongs to the physical page: [ 62.145387] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19 [ 62.153375] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.159883] page_type: f5(slab) [ 62.163017] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 62.170740] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 62.178459] page dumped because: kasan: bad access detected [ 62.184014] [ 62.185490] Memory state around the buggy address: [ 62.190269] ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 62.197472] ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 62.204677] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 62.211878] ^ [ 62.216396] ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.223601] ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.230802] ================================================================== [ 62.771819] ================================================================== [ 62.778887] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 62.787825] Write of size 8 at addr ffff000800b19528 by task kunit_try_catch/345 [ 62.795203] [ 62.796682] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 62.796731] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.796747] Hardware name: WinLink E850-96 board (DT) [ 62.796766] Call trace: [ 62.796778] show_stack+0x20/0x38 (C) [ 62.796809] dump_stack_lvl+0x8c/0xd0 [ 62.796839] print_report+0x118/0x5d0 [ 62.796867] kasan_report+0xdc/0x128 [ 62.796894] kasan_check_range+0x100/0x1a8 [ 62.796924] __kasan_check_write+0x20/0x30 [ 62.796955] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 62.796995] kasan_bitops_generic+0x11c/0x1c8 [ 62.797029] kunit_try_run_case+0x170/0x3f0 [ 62.797062] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.797095] kthread+0x328/0x630 [ 62.797121] ret_from_fork+0x10/0x20 [ 62.797153] [ 62.870375] Allocated by task 345: [ 62.873761] kasan_save_stack+0x3c/0x68 [ 62.877580] kasan_save_track+0x20/0x40 [ 62.881400] kasan_save_alloc_info+0x40/0x58 [ 62.885653] __kasan_kmalloc+0xd4/0xd8 [ 62.889386] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.893899] kasan_bitops_generic+0xa0/0x1c8 [ 62.898153] kunit_try_run_case+0x170/0x3f0 [ 62.902319] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.907788] kthread+0x328/0x630 [ 62.911000] ret_from_fork+0x10/0x20 [ 62.914559] [ 62.916036] The buggy address belongs to the object at ffff000800b19520 [ 62.916036] which belongs to the cache kmalloc-16 of size 16 [ 62.928361] The buggy address is located 8 bytes inside of [ 62.928361] allocated 9-byte region [ffff000800b19520, ffff000800b19529) [ 62.940600] [ 62.942076] The buggy address belongs to the physical page: [ 62.947632] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19 [ 62.955617] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.962128] page_type: f5(slab) [ 62.965262] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 62.972984] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 62.980704] page dumped because: kasan: bad access detected [ 62.986259] [ 62.987735] Memory state around the buggy address: [ 62.992513] ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 62.999718] ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 63.006922] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 63.014123] ^ [ 63.018641] ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.025846] ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.033047] ================================================================== [ 61.439401] ================================================================== [ 61.446440] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 61.455381] Read of size 8 at addr ffff000800b19528 by task kunit_try_catch/345 [ 61.462671] [ 61.464153] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 61.464204] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.464221] Hardware name: WinLink E850-96 board (DT) [ 61.464239] Call trace: [ 61.464252] show_stack+0x20/0x38 (C) [ 61.464285] dump_stack_lvl+0x8c/0xd0 [ 61.464314] print_report+0x118/0x5d0 [ 61.464342] kasan_report+0xdc/0x128 [ 61.464369] __asan_report_load8_noabort+0x20/0x30 [ 61.464404] kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 61.464447] kasan_bitops_generic+0x11c/0x1c8 [ 61.464480] kunit_try_run_case+0x170/0x3f0 [ 61.464513] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.464548] kthread+0x328/0x630 [ 61.464574] ret_from_fork+0x10/0x20 [ 61.464605] [ 61.534458] Allocated by task 345: [ 61.537843] kasan_save_stack+0x3c/0x68 [ 61.541663] kasan_save_track+0x20/0x40 [ 61.545482] kasan_save_alloc_info+0x40/0x58 [ 61.549736] __kasan_kmalloc+0xd4/0xd8 [ 61.553468] __kmalloc_cache_noprof+0x16c/0x3c0 [ 61.557982] kasan_bitops_generic+0xa0/0x1c8 [ 61.562235] kunit_try_run_case+0x170/0x3f0 [ 61.566402] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.571870] kthread+0x328/0x630 [ 61.575082] ret_from_fork+0x10/0x20 [ 61.578641] [ 61.580117] The buggy address belongs to the object at ffff000800b19520 [ 61.580117] which belongs to the cache kmalloc-16 of size 16 [ 61.592444] The buggy address is located 8 bytes inside of [ 61.592444] allocated 9-byte region [ffff000800b19520, ffff000800b19529) [ 61.604683] [ 61.606158] The buggy address belongs to the physical page: [ 61.611715] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19 [ 61.619702] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.626210] page_type: f5(slab) [ 61.629345] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 61.637067] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 61.644786] page dumped because: kasan: bad access detected [ 61.650342] [ 61.651817] Memory state around the buggy address: [ 61.656597] ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 61.663800] ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 61.671007] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 61.678206] ^ [ 61.682723] ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.689928] ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.697129] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[ 59.575827] ================================================================== [ 59.582927] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 59.591085] Write of size 8 at addr ffff000800b19528 by task kunit_try_catch/345 [ 59.598463] [ 59.599946] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 59.599998] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.600014] Hardware name: WinLink E850-96 board (DT) [ 59.600034] Call trace: [ 59.600045] show_stack+0x20/0x38 (C) [ 59.600076] dump_stack_lvl+0x8c/0xd0 [ 59.600110] print_report+0x118/0x5d0 [ 59.600138] kasan_report+0xdc/0x128 [ 59.600165] kasan_check_range+0x100/0x1a8 [ 59.600196] __kasan_check_write+0x20/0x30 [ 59.600226] kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 59.600261] kasan_bitops_generic+0x110/0x1c8 [ 59.600297] kunit_try_run_case+0x170/0x3f0 [ 59.600331] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.600362] kthread+0x328/0x630 [ 59.600391] ret_from_fork+0x10/0x20 [ 59.600426] [ 59.672854] Allocated by task 345: [ 59.676241] kasan_save_stack+0x3c/0x68 [ 59.680059] kasan_save_track+0x20/0x40 [ 59.683878] kasan_save_alloc_info+0x40/0x58 [ 59.688132] __kasan_kmalloc+0xd4/0xd8 [ 59.691864] __kmalloc_cache_noprof+0x16c/0x3c0 [ 59.696378] kasan_bitops_generic+0xa0/0x1c8 [ 59.700631] kunit_try_run_case+0x170/0x3f0 [ 59.704798] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.710267] kthread+0x328/0x630 [ 59.713478] ret_from_fork+0x10/0x20 [ 59.717037] [ 59.718514] The buggy address belongs to the object at ffff000800b19520 [ 59.718514] which belongs to the cache kmalloc-16 of size 16 [ 59.730840] The buggy address is located 8 bytes inside of [ 59.730840] allocated 9-byte region [ffff000800b19520, ffff000800b19529) [ 59.743079] [ 59.744556] The buggy address belongs to the physical page: [ 59.750112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19 [ 59.758099] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.764607] page_type: f5(slab) [ 59.767741] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 59.775464] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 59.783182] page dumped because: kasan: bad access detected [ 59.788737] [ 59.790213] Memory state around the buggy address: [ 59.794993] ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 59.802196] ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 59.809402] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 59.816602] ^ [ 59.821119] ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.828324] ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.835527] ================================================================== [ 60.109849] ================================================================== [ 60.116949] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 60.125105] Read of size 8 at addr ffff000800b19528 by task kunit_try_catch/345 [ 60.132396] [ 60.133880] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 60.133930] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.133948] Hardware name: WinLink E850-96 board (DT) [ 60.133967] Call trace: [ 60.133980] show_stack+0x20/0x38 (C) [ 60.134012] dump_stack_lvl+0x8c/0xd0 [ 60.134045] print_report+0x118/0x5d0 [ 60.134074] kasan_report+0xdc/0x128 [ 60.134102] __asan_report_load8_noabort+0x20/0x30 [ 60.134135] kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 60.134170] kasan_bitops_generic+0x110/0x1c8 [ 60.134205] kunit_try_run_case+0x170/0x3f0 [ 60.134242] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.134274] kthread+0x328/0x630 [ 60.134302] ret_from_fork+0x10/0x20 [ 60.134335] [ 60.203402] Allocated by task 345: [ 60.206787] kasan_save_stack+0x3c/0x68 [ 60.210607] kasan_save_track+0x20/0x40 [ 60.214426] kasan_save_alloc_info+0x40/0x58 [ 60.218679] __kasan_kmalloc+0xd4/0xd8 [ 60.222412] __kmalloc_cache_noprof+0x16c/0x3c0 [ 60.226926] kasan_bitops_generic+0xa0/0x1c8 [ 60.231179] kunit_try_run_case+0x170/0x3f0 [ 60.235346] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.240814] kthread+0x328/0x630 [ 60.244026] ret_from_fork+0x10/0x20 [ 60.247585] [ 60.249062] The buggy address belongs to the object at ffff000800b19520 [ 60.249062] which belongs to the cache kmalloc-16 of size 16 [ 60.261387] The buggy address is located 8 bytes inside of [ 60.261387] allocated 9-byte region [ffff000800b19520, ffff000800b19529) [ 60.273626] [ 60.275104] The buggy address belongs to the physical page: [ 60.280662] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19 [ 60.288646] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.295155] page_type: f5(slab) [ 60.298288] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 60.306011] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 60.313730] page dumped because: kasan: bad access detected [ 60.319285] [ 60.320761] Memory state around the buggy address: [ 60.325540] ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 60.332744] ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 60.339950] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 60.347149] ^ [ 60.351667] ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.358872] ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.366073] ================================================================== [ 59.842838] ================================================================== [ 59.849938] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 59.858095] Write of size 8 at addr ffff000800b19528 by task kunit_try_catch/345 [ 59.865473] [ 59.866957] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 59.867006] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.867022] Hardware name: WinLink E850-96 board (DT) [ 59.867044] Call trace: [ 59.867056] show_stack+0x20/0x38 (C) [ 59.867090] dump_stack_lvl+0x8c/0xd0 [ 59.867121] print_report+0x118/0x5d0 [ 59.867148] kasan_report+0xdc/0x128 [ 59.867175] kasan_check_range+0x100/0x1a8 [ 59.867203] __kasan_check_write+0x20/0x30 [ 59.867234] kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 59.867271] kasan_bitops_generic+0x110/0x1c8 [ 59.867307] kunit_try_run_case+0x170/0x3f0 [ 59.867343] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.867377] kthread+0x328/0x630 [ 59.867404] ret_from_fork+0x10/0x20 [ 59.867439] [ 59.939864] Allocated by task 345: [ 59.943251] kasan_save_stack+0x3c/0x68 [ 59.947069] kasan_save_track+0x20/0x40 [ 59.950888] kasan_save_alloc_info+0x40/0x58 [ 59.955141] __kasan_kmalloc+0xd4/0xd8 [ 59.958874] __kmalloc_cache_noprof+0x16c/0x3c0 [ 59.963388] kasan_bitops_generic+0xa0/0x1c8 [ 59.967641] kunit_try_run_case+0x170/0x3f0 [ 59.971808] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.977276] kthread+0x328/0x630 [ 59.980488] ret_from_fork+0x10/0x20 [ 59.984047] [ 59.985523] The buggy address belongs to the object at ffff000800b19520 [ 59.985523] which belongs to the cache kmalloc-16 of size 16 [ 59.997850] The buggy address is located 8 bytes inside of [ 59.997850] allocated 9-byte region [ffff000800b19520, ffff000800b19529) [ 60.010088] [ 60.011566] The buggy address belongs to the physical page: [ 60.017122] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19 [ 60.025108] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.031617] page_type: f5(slab) [ 60.034751] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 60.042473] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 60.050192] page dumped because: kasan: bad access detected [ 60.055748] [ 60.057223] Memory state around the buggy address: [ 60.062003] ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 60.069206] ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 60.076412] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 60.083612] ^ [ 60.088129] ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.095334] ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.102535] ================================================================== [ 58.512551] ================================================================== [ 58.521834] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 58.529992] Write of size 8 at addr ffff000800b19528 by task kunit_try_catch/345 [ 58.537367] [ 58.538853] CPU: 2 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 58.538910] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.538930] Hardware name: WinLink E850-96 board (DT) [ 58.538952] Call trace: [ 58.538965] show_stack+0x20/0x38 (C) [ 58.539004] dump_stack_lvl+0x8c/0xd0 [ 58.539038] print_report+0x118/0x5d0 [ 58.539068] kasan_report+0xdc/0x128 [ 58.539096] kasan_check_range+0x100/0x1a8 [ 58.539128] __kasan_check_write+0x20/0x30 [ 58.539162] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 58.539199] kasan_bitops_generic+0x110/0x1c8 [ 58.539237] kunit_try_run_case+0x170/0x3f0 [ 58.539276] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.539310] kthread+0x328/0x630 [ 58.539339] ret_from_fork+0x10/0x20 [ 58.539376] [ 58.611759] Allocated by task 345: [ 58.615148] kasan_save_stack+0x3c/0x68 [ 58.618963] kasan_save_track+0x20/0x40 [ 58.622783] kasan_save_alloc_info+0x40/0x58 [ 58.627037] __kasan_kmalloc+0xd4/0xd8 [ 58.630769] __kmalloc_cache_noprof+0x16c/0x3c0 [ 58.635283] kasan_bitops_generic+0xa0/0x1c8 [ 58.639536] kunit_try_run_case+0x170/0x3f0 [ 58.643703] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.649173] kthread+0x328/0x630 [ 58.652383] ret_from_fork+0x10/0x20 [ 58.655943] [ 58.657420] The buggy address belongs to the object at ffff000800b19520 [ 58.657420] which belongs to the cache kmalloc-16 of size 16 [ 58.669745] The buggy address is located 8 bytes inside of [ 58.669745] allocated 9-byte region [ffff000800b19520, ffff000800b19529) [ 58.681985] [ 58.683463] The buggy address belongs to the physical page: [ 58.689019] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19 [ 58.697003] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.703513] page_type: f5(slab) [ 58.706649] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 58.714368] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 58.722087] page dumped because: kasan: bad access detected [ 58.727642] [ 58.729118] Memory state around the buggy address: [ 58.733898] ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 58.741101] ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 58.748308] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 58.755507] ^ [ 58.760024] ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.767230] ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.774431] ================================================================== [ 60.640394] ================================================================== [ 60.647494] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 60.655652] Write of size 8 at addr ffff000800b19528 by task kunit_try_catch/345 [ 60.663030] [ 60.664513] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 60.664563] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.664580] Hardware name: WinLink E850-96 board (DT) [ 60.664597] Call trace: [ 60.664610] show_stack+0x20/0x38 (C) [ 60.664643] dump_stack_lvl+0x8c/0xd0 [ 60.664674] print_report+0x118/0x5d0 [ 60.664701] kasan_report+0xdc/0x128 [ 60.664731] kasan_check_range+0x100/0x1a8 [ 60.664760] __kasan_check_write+0x20/0x30 [ 60.664792] kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 60.664830] kasan_bitops_generic+0x110/0x1c8 [ 60.664865] kunit_try_run_case+0x170/0x3f0 [ 60.664901] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.664934] kthread+0x328/0x630 [ 60.664961] ret_from_fork+0x10/0x20 [ 60.664996] [ 60.737421] Allocated by task 345: [ 60.740806] kasan_save_stack+0x3c/0x68 [ 60.744626] kasan_save_track+0x20/0x40 [ 60.748446] kasan_save_alloc_info+0x40/0x58 [ 60.752699] __kasan_kmalloc+0xd4/0xd8 [ 60.756431] __kmalloc_cache_noprof+0x16c/0x3c0 [ 60.760947] kasan_bitops_generic+0xa0/0x1c8 [ 60.765198] kunit_try_run_case+0x170/0x3f0 [ 60.769365] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.774834] kthread+0x328/0x630 [ 60.778046] ret_from_fork+0x10/0x20 [ 60.781605] [ 60.783080] The buggy address belongs to the object at ffff000800b19520 [ 60.783080] which belongs to the cache kmalloc-16 of size 16 [ 60.795407] The buggy address is located 8 bytes inside of [ 60.795407] allocated 9-byte region [ffff000800b19520, ffff000800b19529) [ 60.807646] [ 60.809122] The buggy address belongs to the physical page: [ 60.814678] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19 [ 60.822665] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.829175] page_type: f5(slab) [ 60.832308] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 60.840031] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 60.847750] page dumped because: kasan: bad access detected [ 60.853305] [ 60.854780] Memory state around the buggy address: [ 60.859560] ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 60.866763] ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 60.873970] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 60.881169] ^ [ 60.885686] ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.892892] ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.900092] ================================================================== [ 59.312332] ================================================================== [ 59.319392] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 59.327547] Read of size 8 at addr ffff000800b19528 by task kunit_try_catch/345 [ 59.334838] [ 59.336323] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 59.336375] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.336391] Hardware name: WinLink E850-96 board (DT) [ 59.336412] Call trace: [ 59.336427] show_stack+0x20/0x38 (C) [ 59.336459] dump_stack_lvl+0x8c/0xd0 [ 59.336491] print_report+0x118/0x5d0 [ 59.336522] kasan_report+0xdc/0x128 [ 59.336550] __asan_report_load8_noabort+0x20/0x30 [ 59.336585] kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 59.336622] kasan_bitops_generic+0x110/0x1c8 [ 59.336657] kunit_try_run_case+0x170/0x3f0 [ 59.336695] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.336729] kthread+0x328/0x630 [ 59.336758] ret_from_fork+0x10/0x20 [ 59.336793] [ 59.405844] Allocated by task 345: [ 59.409233] kasan_save_stack+0x3c/0x68 [ 59.413049] kasan_save_track+0x20/0x40 [ 59.416868] kasan_save_alloc_info+0x40/0x58 [ 59.421122] __kasan_kmalloc+0xd4/0xd8 [ 59.424854] __kmalloc_cache_noprof+0x16c/0x3c0 [ 59.429368] kasan_bitops_generic+0xa0/0x1c8 [ 59.433622] kunit_try_run_case+0x170/0x3f0 [ 59.437788] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.443258] kthread+0x328/0x630 [ 59.446468] ret_from_fork+0x10/0x20 [ 59.450028] [ 59.451505] The buggy address belongs to the object at ffff000800b19520 [ 59.451505] which belongs to the cache kmalloc-16 of size 16 [ 59.463830] The buggy address is located 8 bytes inside of [ 59.463830] allocated 9-byte region [ffff000800b19520, ffff000800b19529) [ 59.476069] [ 59.477546] The buggy address belongs to the physical page: [ 59.483102] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19 [ 59.491088] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.497598] page_type: f5(slab) [ 59.500731] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 59.508453] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 59.516172] page dumped because: kasan: bad access detected [ 59.521728] [ 59.523203] Memory state around the buggy address: [ 59.527983] ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 59.535186] ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 59.542392] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 59.549592] ^ [ 59.554110] ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.561316] ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.568516] ================================================================== [ 60.373370] ================================================================== [ 60.380485] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 60.388642] Write of size 8 at addr ffff000800b19528 by task kunit_try_catch/345 [ 60.396020] [ 60.397504] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 60.397557] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.397573] Hardware name: WinLink E850-96 board (DT) [ 60.397595] Call trace: [ 60.397608] show_stack+0x20/0x38 (C) [ 60.397640] dump_stack_lvl+0x8c/0xd0 [ 60.397669] print_report+0x118/0x5d0 [ 60.397698] kasan_report+0xdc/0x128 [ 60.397728] kasan_check_range+0x100/0x1a8 [ 60.397761] __kasan_check_write+0x20/0x30 [ 60.397790] kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 60.397826] kasan_bitops_generic+0x110/0x1c8 [ 60.397859] kunit_try_run_case+0x170/0x3f0 [ 60.397895] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.397929] kthread+0x328/0x630 [ 60.397955] ret_from_fork+0x10/0x20 [ 60.397986] [ 60.470411] Allocated by task 345: [ 60.473797] kasan_save_stack+0x3c/0x68 [ 60.477616] kasan_save_track+0x20/0x40 [ 60.481436] kasan_save_alloc_info+0x40/0x58 [ 60.485689] __kasan_kmalloc+0xd4/0xd8 [ 60.489422] __kmalloc_cache_noprof+0x16c/0x3c0 [ 60.493935] kasan_bitops_generic+0xa0/0x1c8 [ 60.498189] kunit_try_run_case+0x170/0x3f0 [ 60.502356] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.507824] kthread+0x328/0x630 [ 60.511036] ret_from_fork+0x10/0x20 [ 60.514595] [ 60.516071] The buggy address belongs to the object at ffff000800b19520 [ 60.516071] which belongs to the cache kmalloc-16 of size 16 [ 60.528397] The buggy address is located 8 bytes inside of [ 60.528397] allocated 9-byte region [ffff000800b19520, ffff000800b19529) [ 60.540636] [ 60.542113] The buggy address belongs to the physical page: [ 60.547668] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19 [ 60.555655] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.562164] page_type: f5(slab) [ 60.565299] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 60.573020] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 60.580740] page dumped because: kasan: bad access detected [ 60.586295] [ 60.587771] Memory state around the buggy address: [ 60.592550] ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 60.599753] ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 60.606960] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 60.614159] ^ [ 60.618677] ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.625882] ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.633083] ================================================================== [ 58.781942] ================================================================== [ 58.788844] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 58.796999] Read of size 8 at addr ffff000800b19528 by task kunit_try_catch/345 [ 58.804290] [ 58.805775] CPU: 2 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 58.805832] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.805849] Hardware name: WinLink E850-96 board (DT) [ 58.805871] Call trace: [ 58.805884] show_stack+0x20/0x38 (C) [ 58.805919] dump_stack_lvl+0x8c/0xd0 [ 58.805953] print_report+0x118/0x5d0 [ 58.805979] kasan_report+0xdc/0x128 [ 58.806007] __asan_report_load8_noabort+0x20/0x30 [ 58.806043] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 58.806080] kasan_bitops_generic+0x110/0x1c8 [ 58.806119] kunit_try_run_case+0x170/0x3f0 [ 58.806156] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.806190] kthread+0x328/0x630 [ 58.806221] ret_from_fork+0x10/0x20 [ 58.806255] [ 58.875297] Allocated by task 345: [ 58.878685] kasan_save_stack+0x3c/0x68 [ 58.882503] kasan_save_track+0x20/0x40 [ 58.886321] kasan_save_alloc_info+0x40/0x58 [ 58.890574] __kasan_kmalloc+0xd4/0xd8 [ 58.894307] __kmalloc_cache_noprof+0x16c/0x3c0 [ 58.898821] kasan_bitops_generic+0xa0/0x1c8 [ 58.903074] kunit_try_run_case+0x170/0x3f0 [ 58.907241] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.912711] kthread+0x328/0x630 [ 58.915921] ret_from_fork+0x10/0x20 [ 58.919480] [ 58.920957] The buggy address belongs to the object at ffff000800b19520 [ 58.920957] which belongs to the cache kmalloc-16 of size 16 [ 58.933283] The buggy address is located 8 bytes inside of [ 58.933283] allocated 9-byte region [ffff000800b19520, ffff000800b19529) [ 58.945521] [ 58.946999] The buggy address belongs to the physical page: [ 58.952555] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19 [ 58.960541] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.967050] page_type: f5(slab) [ 58.970185] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 58.977906] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 58.985624] page dumped because: kasan: bad access detected [ 58.991180] [ 58.992655] Memory state around the buggy address: [ 58.997437] ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 59.004639] ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 59.011846] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 59.019044] ^ [ 59.023562] ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.030768] ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.037968] ================================================================== [ 59.045415] ================================================================== [ 59.052381] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 59.060537] Write of size 8 at addr ffff000800b19528 by task kunit_try_catch/345 [ 59.067915] [ 59.069399] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 59.069453] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.069471] Hardware name: WinLink E850-96 board (DT) [ 59.069496] Call trace: [ 59.069510] show_stack+0x20/0x38 (C) [ 59.069548] dump_stack_lvl+0x8c/0xd0 [ 59.069582] print_report+0x118/0x5d0 [ 59.069613] kasan_report+0xdc/0x128 [ 59.069642] kasan_check_range+0x100/0x1a8 [ 59.069672] __kasan_check_write+0x20/0x30 [ 59.069708] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 59.069748] kasan_bitops_generic+0x110/0x1c8 [ 59.069784] kunit_try_run_case+0x170/0x3f0 [ 59.069823] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.069857] kthread+0x328/0x630 [ 59.069886] ret_from_fork+0x10/0x20 [ 59.069924] [ 59.142306] Allocated by task 345: [ 59.145695] kasan_save_stack+0x3c/0x68 [ 59.149511] kasan_save_track+0x20/0x40 [ 59.153331] kasan_save_alloc_info+0x40/0x58 [ 59.157584] __kasan_kmalloc+0xd4/0xd8 [ 59.161317] __kmalloc_cache_noprof+0x16c/0x3c0 [ 59.165830] kasan_bitops_generic+0xa0/0x1c8 [ 59.170083] kunit_try_run_case+0x170/0x3f0 [ 59.174252] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.179720] kthread+0x328/0x630 [ 59.182931] ret_from_fork+0x10/0x20 [ 59.186490] [ 59.187967] The buggy address belongs to the object at ffff000800b19520 [ 59.187967] which belongs to the cache kmalloc-16 of size 16 [ 59.200292] The buggy address is located 8 bytes inside of [ 59.200292] allocated 9-byte region [ffff000800b19520, ffff000800b19529) [ 59.212531] [ 59.214009] The buggy address belongs to the physical page: [ 59.219567] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19 [ 59.227550] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.234060] page_type: f5(slab) [ 59.237194] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 59.244916] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 59.252634] page dumped because: kasan: bad access detected [ 59.258190] [ 59.259665] Memory state around the buggy address: [ 59.264447] ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 59.271649] ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 59.278854] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 59.286054] ^ [ 59.290573] ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.297778] ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.304978] ================================================================== [ 60.907491] ================================================================== [ 60.914504] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 60.922662] Read of size 8 at addr ffff000800b19528 by task kunit_try_catch/345 [ 60.929953] [ 60.931436] CPU: 6 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 60.931485] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.931501] Hardware name: WinLink E850-96 board (DT) [ 60.931521] Call trace: [ 60.931533] show_stack+0x20/0x38 (C) [ 60.931565] dump_stack_lvl+0x8c/0xd0 [ 60.931598] print_report+0x118/0x5d0 [ 60.931627] kasan_report+0xdc/0x128 [ 60.931654] __asan_report_load8_noabort+0x20/0x30 [ 60.931687] kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 60.931724] kasan_bitops_generic+0x110/0x1c8 [ 60.931759] kunit_try_run_case+0x170/0x3f0 [ 60.931793] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.931826] kthread+0x328/0x630 [ 60.931855] ret_from_fork+0x10/0x20 [ 60.931888] [ 61.000959] Allocated by task 345: [ 61.004345] kasan_save_stack+0x3c/0x68 [ 61.008164] kasan_save_track+0x20/0x40 [ 61.011983] kasan_save_alloc_info+0x40/0x58 [ 61.016237] __kasan_kmalloc+0xd4/0xd8 [ 61.019969] __kmalloc_cache_noprof+0x16c/0x3c0 [ 61.024483] kasan_bitops_generic+0xa0/0x1c8 [ 61.028737] kunit_try_run_case+0x170/0x3f0 [ 61.032903] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.038372] kthread+0x328/0x630 [ 61.041583] ret_from_fork+0x10/0x20 [ 61.045143] [ 61.046618] The buggy address belongs to the object at ffff000800b19520 [ 61.046618] which belongs to the cache kmalloc-16 of size 16 [ 61.058945] The buggy address is located 8 bytes inside of [ 61.058945] allocated 9-byte region [ffff000800b19520, ffff000800b19529) [ 61.071184] [ 61.072659] The buggy address belongs to the physical page: [ 61.078217] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880b19 [ 61.086203] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.092711] page_type: f5(slab) [ 61.095846] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 61.103568] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 61.111287] page dumped because: kasan: bad access detected [ 61.116843] [ 61.118318] Memory state around the buggy address: [ 61.123098] ffff000800b19400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 61.130301] ffff000800b19480: fa fb fc fc fa fb fc fc fa fb fc fc 00 04 fc fc [ 61.137506] >ffff000800b19500: 00 04 fc fc 00 01 fc fc fc fc fc fc fc fc fc fc [ 61.144707] ^ [ 61.149224] ffff000800b19580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.156429] ffff000800b19600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.163630] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strnlen
[ 58.210660] ================================================================== [ 58.217672] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88 [ 58.223658] Read of size 1 at addr ffff0008016ffe10 by task kunit_try_catch/343 [ 58.230949] [ 58.232432] CPU: 5 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 58.232486] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.232503] Hardware name: WinLink E850-96 board (DT) [ 58.232522] Call trace: [ 58.232536] show_stack+0x20/0x38 (C) [ 58.232569] dump_stack_lvl+0x8c/0xd0 [ 58.232601] print_report+0x118/0x5d0 [ 58.232631] kasan_report+0xdc/0x128 [ 58.232660] __asan_report_load1_noabort+0x20/0x30 [ 58.232694] strnlen+0x80/0x88 [ 58.232729] kasan_strings+0x478/0xb00 [ 58.232760] kunit_try_run_case+0x170/0x3f0 [ 58.232798] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.232832] kthread+0x328/0x630 [ 58.232860] ret_from_fork+0x10/0x20 [ 58.232894] [ 58.299089] Allocated by task 343: [ 58.302478] kasan_save_stack+0x3c/0x68 [ 58.306295] kasan_save_track+0x20/0x40 [ 58.310114] kasan_save_alloc_info+0x40/0x58 [ 58.314367] __kasan_kmalloc+0xd4/0xd8 [ 58.318100] __kmalloc_cache_noprof+0x16c/0x3c0 [ 58.322614] kasan_strings+0xc8/0xb00 [ 58.326259] kunit_try_run_case+0x170/0x3f0 [ 58.330426] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.335895] kthread+0x328/0x630 [ 58.339107] ret_from_fork+0x10/0x20 [ 58.342666] [ 58.344143] Freed by task 343: [ 58.347180] kasan_save_stack+0x3c/0x68 [ 58.350999] kasan_save_track+0x20/0x40 [ 58.354818] kasan_save_free_info+0x4c/0x78 [ 58.358985] __kasan_slab_free+0x6c/0x98 [ 58.362891] kfree+0x214/0x3c8 [ 58.365929] kasan_strings+0x24c/0xb00 [ 58.369662] kunit_try_run_case+0x170/0x3f0 [ 58.373828] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.379297] kthread+0x328/0x630 [ 58.382509] ret_from_fork+0x10/0x20 [ 58.386068] [ 58.387543] The buggy address belongs to the object at ffff0008016ffe00 [ 58.387543] which belongs to the cache kmalloc-32 of size 32 [ 58.399870] The buggy address is located 16 bytes inside of [ 58.399870] freed 32-byte region [ffff0008016ffe00, ffff0008016ffe20) [ 58.411936] [ 58.413413] The buggy address belongs to the physical page: [ 58.418971] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8816ff [ 58.426955] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.433464] page_type: f5(slab) [ 58.436602] raw: 0bfffe0000000000 ffff000800002780 dead000000000100 dead000000000122 [ 58.444320] raw: 0000000000000000 0000000000400040 00000000f5000000 0000000000000000 [ 58.452039] page dumped because: kasan: bad access detected [ 58.457594] [ 58.459070] Memory state around the buggy address: [ 58.463851] ffff0008016ffd00: 00 00 00 00 fc fc fc fc fa fb fb fb fc fc fc fc [ 58.471053] ffff0008016ffd80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 58.478258] >ffff0008016ffe00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 58.485459] ^ [ 58.489195] ffff0008016ffe80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 58.496400] ffff0008016fff00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 58.503601] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strlen
[ 57.910466] ================================================================== [ 57.917501] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0 [ 57.923401] Read of size 1 at addr ffff0008016ffe10 by task kunit_try_catch/343 [ 57.930693] [ 57.932176] CPU: 5 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 57.932232] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.932247] Hardware name: WinLink E850-96 board (DT) [ 57.932268] Call trace: [ 57.932282] show_stack+0x20/0x38 (C) [ 57.932317] dump_stack_lvl+0x8c/0xd0 [ 57.932353] print_report+0x118/0x5d0 [ 57.932382] kasan_report+0xdc/0x128 [ 57.932411] __asan_report_load1_noabort+0x20/0x30 [ 57.932445] strlen+0xa8/0xb0 [ 57.932475] kasan_strings+0x418/0xb00 [ 57.932507] kunit_try_run_case+0x170/0x3f0 [ 57.932543] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.932577] kthread+0x328/0x630 [ 57.932605] ret_from_fork+0x10/0x20 [ 57.932640] [ 57.998747] Allocated by task 343: [ 58.002134] kasan_save_stack+0x3c/0x68 [ 58.005952] kasan_save_track+0x20/0x40 [ 58.009771] kasan_save_alloc_info+0x40/0x58 [ 58.014025] __kasan_kmalloc+0xd4/0xd8 [ 58.017757] __kmalloc_cache_noprof+0x16c/0x3c0 [ 58.022271] kasan_strings+0xc8/0xb00 [ 58.025917] kunit_try_run_case+0x170/0x3f0 [ 58.030084] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.035552] kthread+0x328/0x630 [ 58.038764] ret_from_fork+0x10/0x20 [ 58.042323] [ 58.043798] Freed by task 343: [ 58.046837] kasan_save_stack+0x3c/0x68 [ 58.050657] kasan_save_track+0x20/0x40 [ 58.054476] kasan_save_free_info+0x4c/0x78 [ 58.058642] __kasan_slab_free+0x6c/0x98 [ 58.062548] kfree+0x214/0x3c8 [ 58.065586] kasan_strings+0x24c/0xb00 [ 58.069319] kunit_try_run_case+0x170/0x3f0 [ 58.073485] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.078954] kthread+0x328/0x630 [ 58.082166] ret_from_fork+0x10/0x20 [ 58.085725] [ 58.087201] The buggy address belongs to the object at ffff0008016ffe00 [ 58.087201] which belongs to the cache kmalloc-32 of size 32 [ 58.099527] The buggy address is located 16 bytes inside of [ 58.099527] freed 32-byte region [ffff0008016ffe00, ffff0008016ffe20) [ 58.111593] [ 58.113070] The buggy address belongs to the physical page: [ 58.118628] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8816ff [ 58.126612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.133122] page_type: f5(slab) [ 58.136255] raw: 0bfffe0000000000 ffff000800002780 dead000000000100 dead000000000122 [ 58.143977] raw: 0000000000000000 0000000000400040 00000000f5000000 0000000000000000 [ 58.151696] page dumped because: kasan: bad access detected [ 58.157252] [ 58.158727] Memory state around the buggy address: [ 58.163506] ffff0008016ffd00: 00 00 00 00 fc fc fc fc fa fb fb fb fc fc fc fc [ 58.170710] ffff0008016ffd80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 58.177916] >ffff0008016ffe00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 58.185116] ^ [ 58.188852] ffff0008016ffe80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 58.196057] ffff0008016fff00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 58.203258] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[ 57.612515] ================================================================== [ 57.619506] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00 [ 57.626183] Read of size 1 at addr ffff0008016ffe10 by task kunit_try_catch/343 [ 57.633475] [ 57.634960] CPU: 5 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 57.635017] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.635035] Hardware name: WinLink E850-96 board (DT) [ 57.635061] Call trace: [ 57.635074] show_stack+0x20/0x38 (C) [ 57.635111] dump_stack_lvl+0x8c/0xd0 [ 57.635146] print_report+0x118/0x5d0 [ 57.635174] kasan_report+0xdc/0x128 [ 57.635200] __asan_report_load1_noabort+0x20/0x30 [ 57.635232] kasan_strings+0x95c/0xb00 [ 57.635261] kunit_try_run_case+0x170/0x3f0 [ 57.635301] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.635334] kthread+0x328/0x630 [ 57.635363] ret_from_fork+0x10/0x20 [ 57.635400] [ 57.698579] Allocated by task 343: [ 57.701966] kasan_save_stack+0x3c/0x68 [ 57.705783] kasan_save_track+0x20/0x40 [ 57.709602] kasan_save_alloc_info+0x40/0x58 [ 57.713856] __kasan_kmalloc+0xd4/0xd8 [ 57.717588] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.722102] kasan_strings+0xc8/0xb00 [ 57.725748] kunit_try_run_case+0x170/0x3f0 [ 57.729914] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.735384] kthread+0x328/0x630 [ 57.738595] ret_from_fork+0x10/0x20 [ 57.742154] [ 57.743631] Freed by task 343: [ 57.746670] kasan_save_stack+0x3c/0x68 [ 57.750487] kasan_save_track+0x20/0x40 [ 57.754306] kasan_save_free_info+0x4c/0x78 [ 57.758473] __kasan_slab_free+0x6c/0x98 [ 57.762379] kfree+0x214/0x3c8 [ 57.765417] kasan_strings+0x24c/0xb00 [ 57.769151] kunit_try_run_case+0x170/0x3f0 [ 57.773317] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.778785] kthread+0x328/0x630 [ 57.781997] ret_from_fork+0x10/0x20 [ 57.785556] [ 57.787033] The buggy address belongs to the object at ffff0008016ffe00 [ 57.787033] which belongs to the cache kmalloc-32 of size 32 [ 57.799358] The buggy address is located 16 bytes inside of [ 57.799358] freed 32-byte region [ffff0008016ffe00, ffff0008016ffe20) [ 57.811423] [ 57.812900] The buggy address belongs to the physical page: [ 57.818458] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8816ff [ 57.826443] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.832952] page_type: f5(slab) [ 57.836087] raw: 0bfffe0000000000 ffff000800002780 dead000000000100 dead000000000122 [ 57.843808] raw: 0000000000000000 0000000000400040 00000000f5000000 0000000000000000 [ 57.851529] page dumped because: kasan: bad access detected [ 57.857083] [ 57.858559] Memory state around the buggy address: [ 57.863338] ffff0008016ffd00: 00 00 00 00 fc fc fc fc fa fb fb fb fc fc fc fc [ 57.870541] ffff0008016ffd80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 57.877747] >ffff0008016ffe00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 57.884947] ^ [ 57.888683] ffff0008016ffe80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 57.895888] ffff0008016fff00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 57.903089] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp
[ 57.295711] ================================================================== [ 57.319335] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 [ 57.325235] Read of size 1 at addr ffff0008016ffe10 by task kunit_try_catch/343 [ 57.332524] [ 57.334013] CPU: 5 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 57.334069] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.334086] Hardware name: WinLink E850-96 board (DT) [ 57.334109] Call trace: [ 57.334125] show_stack+0x20/0x38 (C) [ 57.334163] dump_stack_lvl+0x8c/0xd0 [ 57.334194] print_report+0x118/0x5d0 [ 57.334226] kasan_report+0xdc/0x128 [ 57.334254] __asan_report_load1_noabort+0x20/0x30 [ 57.334289] strcmp+0xc0/0xc8 [ 57.334321] kasan_strings+0x340/0xb00 [ 57.334357] kunit_try_run_case+0x170/0x3f0 [ 57.334394] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.334430] kthread+0x328/0x630 [ 57.334461] ret_from_fork+0x10/0x20 [ 57.334494] [ 57.400580] Allocated by task 343: [ 57.403968] kasan_save_stack+0x3c/0x68 [ 57.407784] kasan_save_track+0x20/0x40 [ 57.411603] kasan_save_alloc_info+0x40/0x58 [ 57.415857] __kasan_kmalloc+0xd4/0xd8 [ 57.419589] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.424103] kasan_strings+0xc8/0xb00 [ 57.427749] kunit_try_run_case+0x170/0x3f0 [ 57.431915] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.437385] kthread+0x328/0x630 [ 57.440596] ret_from_fork+0x10/0x20 [ 57.444155] [ 57.445632] Freed by task 343: [ 57.448670] kasan_save_stack+0x3c/0x68 [ 57.452488] kasan_save_track+0x20/0x40 [ 57.456309] kasan_save_free_info+0x4c/0x78 [ 57.460474] __kasan_slab_free+0x6c/0x98 [ 57.464380] kfree+0x214/0x3c8 [ 57.467418] kasan_strings+0x24c/0xb00 [ 57.471152] kunit_try_run_case+0x170/0x3f0 [ 57.475317] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.480786] kthread+0x328/0x630 [ 57.483998] ret_from_fork+0x10/0x20 [ 57.487557] [ 57.489034] The buggy address belongs to the object at ffff0008016ffe00 [ 57.489034] which belongs to the cache kmalloc-32 of size 32 [ 57.501360] The buggy address is located 16 bytes inside of [ 57.501360] freed 32-byte region [ffff0008016ffe00, ffff0008016ffe20) [ 57.513426] [ 57.514902] The buggy address belongs to the physical page: [ 57.520460] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8816ff [ 57.528446] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.534954] page_type: f5(slab) [ 57.538089] raw: 0bfffe0000000000 ffff000800002780 dead000000000100 dead000000000122 [ 57.545809] raw: 0000000000000000 0000000000400040 00000000f5000000 0000000000000000 [ 57.553529] page dumped because: kasan: bad access detected [ 57.559083] [ 57.560559] Memory state around the buggy address: [ 57.565342] ffff0008016ffd00: 00 00 00 00 fc fc fc fc fa fb fb fb fc fc fc fc [ 57.572542] ffff0008016ffd80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 57.579750] >ffff0008016ffe00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 57.586948] ^ [ 57.590684] ffff0008016ffe80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 57.597889] ffff0008016fff00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 57.605091] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[ 56.994016] ================================================================== [ 57.004148] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 57.010138] Read of size 1 at addr ffff000806058358 by task kunit_try_catch/341 [ 57.017425] [ 57.018914] CPU: 6 UID: 0 PID: 341 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 57.018975] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.018993] Hardware name: WinLink E850-96 board (DT) [ 57.019017] Call trace: [ 57.019034] show_stack+0x20/0x38 (C) [ 57.019077] dump_stack_lvl+0x8c/0xd0 [ 57.019111] print_report+0x118/0x5d0 [ 57.019144] kasan_report+0xdc/0x128 [ 57.019173] __asan_report_load1_noabort+0x20/0x30 [ 57.019209] memcmp+0x198/0x1d8 [ 57.019243] kasan_memcmp+0x16c/0x300 [ 57.019276] kunit_try_run_case+0x170/0x3f0 [ 57.019317] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.019352] kthread+0x328/0x630 [ 57.019384] ret_from_fork+0x10/0x20 [ 57.019420] [ 57.085568] Allocated by task 341: [ 57.088955] kasan_save_stack+0x3c/0x68 [ 57.092771] kasan_save_track+0x20/0x40 [ 57.096591] kasan_save_alloc_info+0x40/0x58 [ 57.100844] __kasan_kmalloc+0xd4/0xd8 [ 57.104577] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.109090] kasan_memcmp+0xbc/0x300 [ 57.112650] kunit_try_run_case+0x170/0x3f0 [ 57.116816] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.122286] kthread+0x328/0x630 [ 57.125497] ret_from_fork+0x10/0x20 [ 57.129055] [ 57.130534] The buggy address belongs to the object at ffff000806058340 [ 57.130534] which belongs to the cache kmalloc-32 of size 32 [ 57.142860] The buggy address is located 0 bytes to the right of [ 57.142860] allocated 24-byte region [ffff000806058340, ffff000806058358) [ 57.155706] [ 57.157183] The buggy address belongs to the physical page: [ 57.162740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886058 [ 57.170724] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.177235] page_type: f5(slab) [ 57.180369] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 57.188089] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 57.195809] page dumped because: kasan: bad access detected [ 57.201363] [ 57.202839] Memory state around the buggy address: [ 57.207619] ffff000806058200: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 57.214822] ffff000806058280: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 57.222028] >ffff000806058300: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 57.229228] ^ [ 57.235307] ffff000806058380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.242514] ffff000806058400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.249713] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[ 56.769068] ================================================================== [ 56.778808] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340 [ 56.786355] Read of size 1 at addr ffff800089687b4a by task kunit_try_catch/337 [ 56.793646] [ 56.795129] CPU: 4 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 56.795189] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.795208] Hardware name: WinLink E850-96 board (DT) [ 56.795230] Call trace: [ 56.795247] show_stack+0x20/0x38 (C) [ 56.795285] dump_stack_lvl+0x8c/0xd0 [ 56.795321] print_report+0x310/0x5d0 [ 56.795353] kasan_report+0xdc/0x128 [ 56.795381] __asan_report_load1_noabort+0x20/0x30 [ 56.795414] kasan_alloca_oob_right+0x2dc/0x340 [ 56.795448] kunit_try_run_case+0x170/0x3f0 [ 56.795492] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.795527] kthread+0x328/0x630 [ 56.795557] ret_from_fork+0x10/0x20 [ 56.795596] [ 56.859533] The buggy address belongs to stack of task kunit_try_catch/337 [ 56.866409] [ 56.867863] The buggy address ffff800089687b4a belongs to a vmalloc virtual mapping [ 56.875506] The buggy address belongs to the physical page: [ 56.881061] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88883a [ 56.889045] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.895566] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 56.903284] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 56.911005] page dumped because: kasan: bad access detected [ 56.916559] [ 56.918035] Memory state around the buggy address: [ 56.922814] ffff800089687a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 56.930017] ffff800089687a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 56.937223] >ffff800089687b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 56.944423] ^ [ 56.949982] ffff800089687b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 56.957187] ffff800089687c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 56.964390] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[ 56.565085] ================================================================== [ 56.574296] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 56.581755] Read of size 1 at addr ffff800089667b5f by task kunit_try_catch/335 [ 56.589047] [ 56.590530] CPU: 5 UID: 0 PID: 335 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 56.590591] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.590609] Hardware name: WinLink E850-96 board (DT) [ 56.590632] Call trace: [ 56.590647] show_stack+0x20/0x38 (C) [ 56.590683] dump_stack_lvl+0x8c/0xd0 [ 56.590718] print_report+0x310/0x5d0 [ 56.590747] kasan_report+0xdc/0x128 [ 56.590775] __asan_report_load1_noabort+0x20/0x30 [ 56.590811] kasan_alloca_oob_left+0x2b8/0x310 [ 56.590845] kunit_try_run_case+0x170/0x3f0 [ 56.590886] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.590919] kthread+0x328/0x630 [ 56.590949] ret_from_fork+0x10/0x20 [ 56.590986] [ 56.654848] The buggy address belongs to stack of task kunit_try_catch/335 [ 56.661720] [ 56.663177] The buggy address ffff800089667b5f belongs to a vmalloc virtual mapping [ 56.670820] The buggy address belongs to the physical page: [ 56.676375] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888826 [ 56.684359] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.690878] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 56.698599] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 56.706318] page dumped because: kasan: bad access detected [ 56.711874] [ 56.713350] Memory state around the buggy address: [ 56.718131] ffff800089667a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 56.725333] ffff800089667a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 56.732539] >ffff800089667b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 56.739738] ^ [ 56.745818] ffff800089667b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 56.753023] ffff800089667c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 56.760225] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 56.331217] ================================================================== [ 56.345656] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 56.352508] Read of size 1 at addr ffff800089647c2a by task kunit_try_catch/333 [ 56.359797] [ 56.361283] CPU: 7 UID: 0 PID: 333 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 56.361346] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.361361] Hardware name: WinLink E850-96 board (DT) [ 56.361386] Call trace: [ 56.361403] show_stack+0x20/0x38 (C) [ 56.361445] dump_stack_lvl+0x8c/0xd0 [ 56.361478] print_report+0x310/0x5d0 [ 56.361509] kasan_report+0xdc/0x128 [ 56.361536] __asan_report_load1_noabort+0x20/0x30 [ 56.361570] kasan_stack_oob+0x238/0x270 [ 56.361601] kunit_try_run_case+0x170/0x3f0 [ 56.361642] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.361676] kthread+0x328/0x630 [ 56.361704] ret_from_fork+0x10/0x20 [ 56.361741] [ 56.425076] The buggy address belongs to stack of task kunit_try_catch/333 [ 56.431932] and is located at offset 138 in frame: [ 56.436792] kasan_stack_oob+0x0/0x270 [ 56.440530] [ 56.441999] This frame has 4 objects: [ 56.445652] [48, 49) '__assertion' [ 56.445678] [64, 72) 'array' [ 56.449121] [96, 112) '__assertion' [ 56.452071] [128, 138) 'stack_array' [ 56.455628] [ 56.460751] The buggy address ffff800089647c2a belongs to a vmalloc virtual mapping [ 56.468393] The buggy address belongs to the physical page: [ 56.473948] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888812 [ 56.481933] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.488452] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 56.496172] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 56.503893] page dumped because: kasan: bad access detected [ 56.509446] [ 56.510922] Memory state around the buggy address: [ 56.515702] ffff800089647b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 56.522905] ffff800089647b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 56.530111] >ffff800089647c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 56.537311] ^ [ 56.541829] ffff800089647c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 [ 56.549032] ffff800089647d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 56.556234] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 56.120463] ================================================================== [ 56.131245] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 56.138793] Read of size 1 at addr ffff800087b4d6cd by task kunit_try_catch/329 [ 56.146084] [ 56.147569] CPU: 4 UID: 0 PID: 329 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 56.147629] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.147645] Hardware name: WinLink E850-96 board (DT) [ 56.147669] Call trace: [ 56.147687] show_stack+0x20/0x38 (C) [ 56.147722] dump_stack_lvl+0x8c/0xd0 [ 56.147759] print_report+0x310/0x5d0 [ 56.147786] kasan_report+0xdc/0x128 [ 56.147814] __asan_report_load1_noabort+0x20/0x30 [ 56.147849] kasan_global_oob_right+0x230/0x270 [ 56.147879] kunit_try_run_case+0x170/0x3f0 [ 56.147919] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.147952] kthread+0x328/0x630 [ 56.147985] ret_from_fork+0x10/0x20 [ 56.148022] [ 56.211968] The buggy address belongs to the variable: [ 56.217090] global_array+0xd/0x40 [ 56.220475] [ 56.221950] The buggy address ffff800087b4d6cd belongs to a vmalloc virtual mapping [ 56.229594] The buggy address belongs to the physical page: [ 56.235150] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x87b4d [ 56.243048] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 56.250347] raw: 03fffe0000002000 fffffdffc01ed348 fffffdffc01ed348 0000000000000000 [ 56.258068] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 56.265787] page dumped because: kasan: bad access detected [ 56.271342] [ 56.272818] Memory state around the buggy address: [ 56.277600] ffff800087b4d580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 56.284802] ffff800087b4d600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 56.292007] >ffff800087b4d680: 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 [ 56.299206] ^ [ 56.304766] ffff800087b4d700: 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 [ 56.311971] ffff800087b4d780: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00 [ 56.319172] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 55.553471] ================================================================== [ 55.563636] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 55.571613] Free of addr ffff0008019ace01 by task kunit_try_catch/325 [ 55.578037] [ 55.579524] CPU: 3 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 55.579588] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.579605] Hardware name: WinLink E850-96 board (DT) [ 55.579628] Call trace: [ 55.579641] show_stack+0x20/0x38 (C) [ 55.579677] dump_stack_lvl+0x8c/0xd0 [ 55.579710] print_report+0x118/0x5d0 [ 55.579739] kasan_report_invalid_free+0xc0/0xe8 [ 55.579773] check_slab_allocation+0xfc/0x108 [ 55.579816] __kasan_mempool_poison_object+0x78/0x150 [ 55.579854] mempool_free+0x28c/0x328 [ 55.579888] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 55.579926] mempool_kmalloc_invalid_free+0xc0/0x118 [ 55.579960] kunit_try_run_case+0x170/0x3f0 [ 55.580001] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.580034] kthread+0x328/0x630 [ 55.580066] ret_from_fork+0x10/0x20 [ 55.580104] [ 55.659287] Allocated by task 325: [ 55.662675] kasan_save_stack+0x3c/0x68 [ 55.666491] kasan_save_track+0x20/0x40 [ 55.670310] kasan_save_alloc_info+0x40/0x58 [ 55.674563] __kasan_mempool_unpoison_object+0x11c/0x180 [ 55.679859] remove_element+0x130/0x1f8 [ 55.683678] mempool_alloc_preallocated+0x58/0xc0 [ 55.688367] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 55.693921] mempool_kmalloc_invalid_free+0xc0/0x118 [ 55.698868] kunit_try_run_case+0x170/0x3f0 [ 55.703035] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.708504] kthread+0x328/0x630 [ 55.711715] ret_from_fork+0x10/0x20 [ 55.715275] [ 55.716752] The buggy address belongs to the object at ffff0008019ace00 [ 55.716752] which belongs to the cache kmalloc-128 of size 128 [ 55.729252] The buggy address is located 1 bytes inside of [ 55.729252] 128-byte region [ffff0008019ace00, ffff0008019ace80) [ 55.740795] [ 55.742273] The buggy address belongs to the physical page: [ 55.747831] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8819ac [ 55.755815] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 55.763453] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 55.770396] page_type: f5(slab) [ 55.773534] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 55.781252] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.788981] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 55.796791] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.804603] head: 0bfffe0000000001 fffffdffe0066b01 00000000ffffffff 00000000ffffffff [ 55.812415] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 55.820221] page dumped because: kasan: bad access detected [ 55.825776] [ 55.827251] Memory state around the buggy address: [ 55.832030] ffff0008019acd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 55.839235] ffff0008019acd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.846441] >ffff0008019ace00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 55.853641] ^ [ 55.856856] ffff0008019ace80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.864061] ffff0008019acf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 55.871263] ================================================================== [ 55.880310] ================================================================== [ 55.890452] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 55.898433] Free of addr ffff000805b50001 by task kunit_try_catch/327 [ 55.904856] [ 55.906342] CPU: 5 UID: 0 PID: 327 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 55.906405] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.906424] Hardware name: WinLink E850-96 board (DT) [ 55.906449] Call trace: [ 55.906463] show_stack+0x20/0x38 (C) [ 55.906498] dump_stack_lvl+0x8c/0xd0 [ 55.906533] print_report+0x118/0x5d0 [ 55.906564] kasan_report_invalid_free+0xc0/0xe8 [ 55.906597] __kasan_mempool_poison_object+0xfc/0x150 [ 55.906639] mempool_free+0x28c/0x328 [ 55.906675] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 55.906713] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 55.906753] kunit_try_run_case+0x170/0x3f0 [ 55.906794] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.906827] kthread+0x328/0x630 [ 55.906858] ret_from_fork+0x10/0x20 [ 55.906897] [ 55.982287] The buggy address belongs to the physical page: [ 55.987844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885b50 [ 55.995828] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 56.003467] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 56.010410] page_type: f8(unknown) [ 56.013807] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 56.021526] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 56.029253] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 56.037064] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 56.044878] head: 0bfffe0000000002 fffffdffe016d401 00000000ffffffff 00000000ffffffff [ 56.052689] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 56.060495] page dumped because: kasan: bad access detected [ 56.066050] [ 56.067526] Memory state around the buggy address: [ 56.072305] ffff000805b4ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 56.079509] ffff000805b4ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 56.086715] >ffff000805b50000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 56.093915] ^ [ 56.097130] ffff000805b50080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 56.104335] ffff000805b50100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 56.111537] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 55.119539] ================================================================== [ 55.129002] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 55.136118] Free of addr ffff000806dcc000 by task kunit_try_catch/321 [ 55.142541] [ 55.144027] CPU: 4 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 55.144089] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.144106] Hardware name: WinLink E850-96 board (DT) [ 55.144128] Call trace: [ 55.144144] show_stack+0x20/0x38 (C) [ 55.144184] dump_stack_lvl+0x8c/0xd0 [ 55.144218] print_report+0x118/0x5d0 [ 55.144248] kasan_report_invalid_free+0xc0/0xe8 [ 55.144276] __kasan_mempool_poison_object+0x14c/0x150 [ 55.144318] mempool_free+0x28c/0x328 [ 55.144351] mempool_double_free_helper+0x150/0x2e8 [ 55.144390] mempool_kmalloc_large_double_free+0xc0/0x118 [ 55.144428] kunit_try_run_case+0x170/0x3f0 [ 55.144465] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.144498] kthread+0x328/0x630 [ 55.144526] ret_from_fork+0x10/0x20 [ 55.144560] [ 55.219191] The buggy address belongs to the physical page: [ 55.224748] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886dcc [ 55.232731] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 55.240370] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 55.247315] page_type: f8(unknown) [ 55.250710] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 55.258430] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 55.266156] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 55.273968] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 55.281781] head: 0bfffe0000000002 fffffdffe01b7301 00000000ffffffff 00000000ffffffff [ 55.289593] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 55.297399] page dumped because: kasan: bad access detected [ 55.302954] [ 55.304429] Memory state around the buggy address: [ 55.309208] ffff000806dcbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 55.316412] ffff000806dcbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 55.323619] >ffff000806dcc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 55.330818] ^ [ 55.334034] ffff000806dcc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 55.341239] ffff000806dcc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 55.348440] ================================================================== [ 55.357511] ================================================================== [ 55.368061] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 55.375176] Free of addr ffff000808748000 by task kunit_try_catch/323 [ 55.381600] [ 55.383085] CPU: 3 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 55.383146] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.383160] Hardware name: WinLink E850-96 board (DT) [ 55.383183] Call trace: [ 55.383196] show_stack+0x20/0x38 (C) [ 55.383231] dump_stack_lvl+0x8c/0xd0 [ 55.383266] print_report+0x118/0x5d0 [ 55.383292] kasan_report_invalid_free+0xc0/0xe8 [ 55.383321] __kasan_mempool_poison_pages+0xe0/0xe8 [ 55.383366] mempool_free+0x24c/0x328 [ 55.383399] mempool_double_free_helper+0x150/0x2e8 [ 55.383433] mempool_page_alloc_double_free+0xbc/0x118 [ 55.383470] kunit_try_run_case+0x170/0x3f0 [ 55.383505] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.383539] kthread+0x328/0x630 [ 55.383569] ret_from_fork+0x10/0x20 [ 55.383607] [ 55.457729] The buggy address belongs to the physical page: [ 55.463285] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888748 [ 55.471270] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.477789] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 55.485510] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 55.493229] page dumped because: kasan: bad access detected [ 55.498784] [ 55.500260] Memory state around the buggy address: [ 55.505040] ffff000808747f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 55.512243] ffff000808747f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 55.519450] >ffff000808748000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 55.526649] ^ [ 55.529864] ffff000808748080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 55.537068] ffff000808748100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 55.544270] ================================================================== [ 54.744006] ================================================================== [ 54.753748] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 54.760862] Free of addr ffff000803b8ae00 by task kunit_try_catch/319 [ 54.767287] [ 54.768772] CPU: 5 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 54.768827] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.768843] Hardware name: WinLink E850-96 board (DT) [ 54.768866] Call trace: [ 54.768879] show_stack+0x20/0x38 (C) [ 54.768912] dump_stack_lvl+0x8c/0xd0 [ 54.768947] print_report+0x118/0x5d0 [ 54.768976] kasan_report_invalid_free+0xc0/0xe8 [ 54.769007] check_slab_allocation+0xd4/0x108 [ 54.769045] __kasan_mempool_poison_object+0x78/0x150 [ 54.769086] mempool_free+0x28c/0x328 [ 54.769119] mempool_double_free_helper+0x150/0x2e8 [ 54.769153] mempool_kmalloc_double_free+0xc0/0x118 [ 54.769186] kunit_try_run_case+0x170/0x3f0 [ 54.769227] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.769260] kthread+0x328/0x630 [ 54.769291] ret_from_fork+0x10/0x20 [ 54.769324] [ 54.847667] Allocated by task 319: [ 54.851055] kasan_save_stack+0x3c/0x68 [ 54.854871] kasan_save_track+0x20/0x40 [ 54.858690] kasan_save_alloc_info+0x40/0x58 [ 54.862944] __kasan_mempool_unpoison_object+0x11c/0x180 [ 54.868240] remove_element+0x130/0x1f8 [ 54.872058] mempool_alloc_preallocated+0x58/0xc0 [ 54.876745] mempool_double_free_helper+0x94/0x2e8 [ 54.881520] mempool_kmalloc_double_free+0xc0/0x118 [ 54.886381] kunit_try_run_case+0x170/0x3f0 [ 54.890547] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.896016] kthread+0x328/0x630 [ 54.899228] ret_from_fork+0x10/0x20 [ 54.902787] [ 54.904264] Freed by task 319: [ 54.907300] kasan_save_stack+0x3c/0x68 [ 54.911120] kasan_save_track+0x20/0x40 [ 54.914939] kasan_save_free_info+0x4c/0x78 [ 54.919106] __kasan_mempool_poison_object+0xc0/0x150 [ 54.924140] mempool_free+0x28c/0x328 [ 54.927786] mempool_double_free_helper+0x100/0x2e8 [ 54.932647] mempool_kmalloc_double_free+0xc0/0x118 [ 54.937508] kunit_try_run_case+0x170/0x3f0 [ 54.941675] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.947143] kthread+0x328/0x630 [ 54.950355] ret_from_fork+0x10/0x20 [ 54.953915] [ 54.955391] The buggy address belongs to the object at ffff000803b8ae00 [ 54.955391] which belongs to the cache kmalloc-128 of size 128 [ 54.967892] The buggy address is located 0 bytes inside of [ 54.967892] 128-byte region [ffff000803b8ae00, ffff000803b8ae80) [ 54.979435] [ 54.980914] The buggy address belongs to the physical page: [ 54.986470] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883b8a [ 54.994454] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 55.002093] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 55.009036] page_type: f5(slab) [ 55.012172] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 55.019892] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.027619] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 55.035430] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.043243] head: 0bfffe0000000001 fffffdffe00ee281 00000000ffffffff 00000000ffffffff [ 55.051055] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 55.058860] page dumped because: kasan: bad access detected [ 55.064416] [ 55.065891] Memory state around the buggy address: [ 55.070670] ffff000803b8ad00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 55.077875] ffff000803b8ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.085081] >ffff000803b8ae00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 55.092280] ^ [ 55.095496] ffff000803b8ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.102700] ffff000803b8af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 55.109903] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 54.565178] ================================================================== [ 54.565370] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 54.571283] Read of size 1 at addr ffff000806dcc000 by task kunit_try_catch/317 [ 54.578573] [ 54.580061] CPU: 4 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 54.580117] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.580135] Hardware name: WinLink E850-96 board (DT) [ 54.580158] Call trace: [ 54.580173] show_stack+0x20/0x38 (C) [ 54.580211] dump_stack_lvl+0x8c/0xd0 [ 54.580245] print_report+0x118/0x5d0 [ 54.580276] kasan_report+0xdc/0x128 [ 54.580304] __asan_report_load1_noabort+0x20/0x30 [ 54.580337] mempool_uaf_helper+0x314/0x340 [ 54.580372] mempool_page_alloc_uaf+0xc0/0x118 [ 54.580408] kunit_try_run_case+0x170/0x3f0 [ 54.580449] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.580482] kthread+0x328/0x630 [ 54.580512] ret_from_fork+0x10/0x20 [ 54.580546] [ 54.648541] The buggy address belongs to the physical page: [ 54.654096] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886dcc [ 54.662084] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.668605] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 54.676321] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 54.684041] page dumped because: kasan: bad access detected [ 54.689595] [ 54.691071] Memory state around the buggy address: [ 54.695851] ffff000806dcbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 54.703054] ffff000806dcbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 54.710260] >ffff000806dcc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 54.717459] ^ [ 54.720675] ffff000806dcc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 54.727880] ffff000806dcc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 54.735084] ================================================================== [ 53.998812] ================================================================== [ 54.008188] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 54.014870] Read of size 1 at addr ffff000805b50000 by task kunit_try_catch/313 [ 54.022158] [ 54.023645] CPU: 3 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 54.023704] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.023721] Hardware name: WinLink E850-96 board (DT) [ 54.023743] Call trace: [ 54.023759] show_stack+0x20/0x38 (C) [ 54.023797] dump_stack_lvl+0x8c/0xd0 [ 54.023830] print_report+0x118/0x5d0 [ 54.023861] kasan_report+0xdc/0x128 [ 54.023888] __asan_report_load1_noabort+0x20/0x30 [ 54.023923] mempool_uaf_helper+0x314/0x340 [ 54.023954] mempool_kmalloc_large_uaf+0xc4/0x120 [ 54.023986] kunit_try_run_case+0x170/0x3f0 [ 54.024028] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.024060] kthread+0x328/0x630 [ 54.024091] ret_from_fork+0x10/0x20 [ 54.024129] [ 54.092387] The buggy address belongs to the physical page: [ 54.097942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885b50 [ 54.105926] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 54.113566] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 54.120508] page_type: f8(unknown) [ 54.123906] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 54.131625] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 54.139351] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 54.147162] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 54.154975] head: 0bfffe0000000002 fffffdffe016d401 00000000ffffffff 00000000ffffffff [ 54.162787] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 54.170593] page dumped because: kasan: bad access detected [ 54.176148] [ 54.177624] Memory state around the buggy address: [ 54.182407] ffff000805b4ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 54.189607] ffff000805b4ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 54.196815] >ffff000805b50000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 54.204012] ^ [ 54.207228] ffff000805b50080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 54.214433] ffff000805b50100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 54.221634] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 53.645850] ================================================================== [ 53.646037] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 53.652808] Read of size 1 at addr ffff000803b8aa00 by task kunit_try_catch/311 [ 53.660097] [ 53.661584] CPU: 5 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 53.661640] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.661657] Hardware name: WinLink E850-96 board (DT) [ 53.661680] Call trace: [ 53.661694] show_stack+0x20/0x38 (C) [ 53.661731] dump_stack_lvl+0x8c/0xd0 [ 53.661763] print_report+0x118/0x5d0 [ 53.661793] kasan_report+0xdc/0x128 [ 53.661821] __asan_report_load1_noabort+0x20/0x30 [ 53.661852] mempool_uaf_helper+0x314/0x340 [ 53.661885] mempool_kmalloc_uaf+0xc4/0x120 [ 53.661916] kunit_try_run_case+0x170/0x3f0 [ 53.661958] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.661990] kthread+0x328/0x630 [ 53.662020] ret_from_fork+0x10/0x20 [ 53.662054] [ 53.729802] Allocated by task 311: [ 53.733190] kasan_save_stack+0x3c/0x68 [ 53.737006] kasan_save_track+0x20/0x40 [ 53.740826] kasan_save_alloc_info+0x40/0x58 [ 53.745079] __kasan_mempool_unpoison_object+0x11c/0x180 [ 53.750373] remove_element+0x130/0x1f8 [ 53.754193] mempool_alloc_preallocated+0x58/0xc0 [ 53.758880] mempool_uaf_helper+0xa4/0x340 [ 53.762960] mempool_kmalloc_uaf+0xc4/0x120 [ 53.767127] kunit_try_run_case+0x170/0x3f0 [ 53.771293] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.776763] kthread+0x328/0x630 [ 53.779973] ret_from_fork+0x10/0x20 [ 53.783532] [ 53.785010] Freed by task 311: [ 53.788046] kasan_save_stack+0x3c/0x68 [ 53.791866] kasan_save_track+0x20/0x40 [ 53.795687] kasan_save_free_info+0x4c/0x78 [ 53.799852] __kasan_mempool_poison_object+0xc0/0x150 [ 53.804886] mempool_free+0x28c/0x328 [ 53.808532] mempool_uaf_helper+0x104/0x340 [ 53.812699] mempool_kmalloc_uaf+0xc4/0x120 [ 53.816865] kunit_try_run_case+0x170/0x3f0 [ 53.821032] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.826500] kthread+0x328/0x630 [ 53.829712] ret_from_fork+0x10/0x20 [ 53.833272] [ 53.834750] The buggy address belongs to the object at ffff000803b8aa00 [ 53.834750] which belongs to the cache kmalloc-128 of size 128 [ 53.847249] The buggy address is located 0 bytes inside of [ 53.847249] freed 128-byte region [ffff000803b8aa00, ffff000803b8aa80) [ 53.859312] [ 53.860791] The buggy address belongs to the physical page: [ 53.866348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883b8a [ 53.874332] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 53.881971] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 53.888915] page_type: f5(slab) [ 53.892050] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 53.899770] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.907496] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 53.915308] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.923121] head: 0bfffe0000000001 fffffdffe00ee281 00000000ffffffff 00000000ffffffff [ 53.930933] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 53.938738] page dumped because: kasan: bad access detected [ 53.944294] [ 53.945769] Memory state around the buggy address: [ 53.950549] ffff000803b8a900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 53.957752] ffff000803b8a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.964960] >ffff000803b8aa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 53.972158] ^ [ 53.975374] ffff000803b8aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.982579] ffff000803b8ab00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 53.989779] ================================================================== [ 54.231369] ================================================================== [ 54.240563] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 54.247678] Read of size 1 at addr ffff000801da7240 by task kunit_try_catch/315 [ 54.254966] [ 54.256455] CPU: 4 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 54.256513] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.256532] Hardware name: WinLink E850-96 board (DT) [ 54.256554] Call trace: [ 54.256570] show_stack+0x20/0x38 (C) [ 54.256607] dump_stack_lvl+0x8c/0xd0 [ 54.256639] print_report+0x118/0x5d0 [ 54.256669] kasan_report+0xdc/0x128 [ 54.256698] __asan_report_load1_noabort+0x20/0x30 [ 54.256732] mempool_uaf_helper+0x314/0x340 [ 54.256766] mempool_slab_uaf+0xc0/0x118 [ 54.256799] kunit_try_run_case+0x170/0x3f0 [ 54.256841] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.256875] kthread+0x328/0x630 [ 54.256904] ret_from_fork+0x10/0x20 [ 54.256940] [ 54.324410] Allocated by task 315: [ 54.327799] kasan_save_stack+0x3c/0x68 [ 54.331615] kasan_save_track+0x20/0x40 [ 54.335434] kasan_save_alloc_info+0x40/0x58 [ 54.339688] __kasan_mempool_unpoison_object+0xbc/0x180 [ 54.344895] remove_element+0x16c/0x1f8 [ 54.348715] mempool_alloc_preallocated+0x58/0xc0 [ 54.353402] mempool_uaf_helper+0xa4/0x340 [ 54.357482] mempool_slab_uaf+0xc0/0x118 [ 54.361390] kunit_try_run_case+0x170/0x3f0 [ 54.365555] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.371024] kthread+0x328/0x630 [ 54.374235] ret_from_fork+0x10/0x20 [ 54.377795] [ 54.379271] Freed by task 315: [ 54.382310] kasan_save_stack+0x3c/0x68 [ 54.386127] kasan_save_track+0x20/0x40 [ 54.389947] kasan_save_free_info+0x4c/0x78 [ 54.394113] __kasan_mempool_poison_object+0xc0/0x150 [ 54.399148] mempool_free+0x28c/0x328 [ 54.402794] mempool_uaf_helper+0x104/0x340 [ 54.406960] mempool_slab_uaf+0xc0/0x118 [ 54.410867] kunit_try_run_case+0x170/0x3f0 [ 54.415035] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.420502] kthread+0x328/0x630 [ 54.423714] ret_from_fork+0x10/0x20 [ 54.427273] [ 54.428750] The buggy address belongs to the object at ffff000801da7240 [ 54.428750] which belongs to the cache test_cache of size 123 [ 54.441164] The buggy address is located 0 bytes inside of [ 54.441164] freed 123-byte region [ffff000801da7240, ffff000801da72bb) [ 54.453227] [ 54.454706] The buggy address belongs to the physical page: [ 54.460262] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881da7 [ 54.468247] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.474756] page_type: f5(slab) [ 54.477893] raw: 0bfffe0000000000 ffff000801b70500 dead000000000122 0000000000000000 [ 54.485612] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 54.493332] page dumped because: kasan: bad access detected [ 54.498886] [ 54.500362] Memory state around the buggy address: [ 54.505143] ffff000801da7100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.512345] ffff000801da7180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 54.519554] >ffff000801da7200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 54.526750] ^ [ 54.532049] ffff000801da7280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.539254] ffff000801da7300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.546455] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 52.820447] ================================================================== [ 52.820618] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 52.820754] Read of size 1 at addr ffff000800de6373 by task kunit_try_catch/305 [ 52.827212] [ 52.828697] CPU: 7 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 52.828754] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.828769] Hardware name: WinLink E850-96 board (DT) [ 52.828793] Call trace: [ 52.828808] show_stack+0x20/0x38 (C) [ 52.828844] dump_stack_lvl+0x8c/0xd0 [ 52.828878] print_report+0x118/0x5d0 [ 52.828906] kasan_report+0xdc/0x128 [ 52.828933] __asan_report_load1_noabort+0x20/0x30 [ 52.828963] mempool_oob_right_helper+0x2ac/0x2f0 [ 52.828995] mempool_kmalloc_oob_right+0xc4/0x120 [ 52.829027] kunit_try_run_case+0x170/0x3f0 [ 52.829061] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.829092] kthread+0x328/0x630 [ 52.829119] ret_from_fork+0x10/0x20 [ 52.829150] [ 52.897957] Allocated by task 305: [ 52.901346] kasan_save_stack+0x3c/0x68 [ 52.905162] kasan_save_track+0x20/0x40 [ 52.908979] kasan_save_alloc_info+0x40/0x58 [ 52.913233] __kasan_mempool_unpoison_object+0x11c/0x180 [ 52.918528] remove_element+0x130/0x1f8 [ 52.922348] mempool_alloc_preallocated+0x58/0xc0 [ 52.927035] mempool_oob_right_helper+0x98/0x2f0 [ 52.931636] mempool_kmalloc_oob_right+0xc4/0x120 [ 52.936323] kunit_try_run_case+0x170/0x3f0 [ 52.940489] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.945958] kthread+0x328/0x630 [ 52.949170] ret_from_fork+0x10/0x20 [ 52.952729] [ 52.954207] The buggy address belongs to the object at ffff000800de6300 [ 52.954207] which belongs to the cache kmalloc-128 of size 128 [ 52.966708] The buggy address is located 0 bytes to the right of [ 52.966708] allocated 115-byte region [ffff000800de6300, ffff000800de6373) [ 52.979638] [ 52.981118] The buggy address belongs to the physical page: [ 52.986674] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880de6 [ 52.994657] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 53.002298] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 53.009241] page_type: f5(slab) [ 53.012379] raw: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122 [ 53.020099] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.027826] head: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122 [ 53.035634] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.043447] head: 0bfffe0000000001 fffffdffe0037981 00000000ffffffff 00000000ffffffff [ 53.051258] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 53.059064] page dumped because: kasan: bad access detected [ 53.064619] [ 53.066095] Memory state around the buggy address: [ 53.070877] ffff000800de6200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 53.078078] ffff000800de6280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.085284] >ffff000800de6300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 53.092484] ^ [ 53.099345] ffff000800de6380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.106551] ffff000800de6400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 53.113753] ================================================================== [ 53.122842] ================================================================== [ 53.132678] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 53.140228] Read of size 1 at addr ffff0008078d6001 by task kunit_try_catch/307 [ 53.147518] [ 53.149005] CPU: 5 UID: 0 PID: 307 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 53.149062] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.149080] Hardware name: WinLink E850-96 board (DT) [ 53.149103] Call trace: [ 53.149115] show_stack+0x20/0x38 (C) [ 53.149150] dump_stack_lvl+0x8c/0xd0 [ 53.149181] print_report+0x118/0x5d0 [ 53.149212] kasan_report+0xdc/0x128 [ 53.149238] __asan_report_load1_noabort+0x20/0x30 [ 53.149274] mempool_oob_right_helper+0x2ac/0x2f0 [ 53.149310] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 53.149344] kunit_try_run_case+0x170/0x3f0 [ 53.149383] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.149415] kthread+0x328/0x630 [ 53.149446] ret_from_fork+0x10/0x20 [ 53.149484] [ 53.218787] The buggy address belongs to the physical page: [ 53.224345] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8878d4 [ 53.232328] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 53.239966] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 53.246910] page_type: f8(unknown) [ 53.250308] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 53.258026] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 53.265754] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 53.273564] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 53.281377] head: 0bfffe0000000002 fffffdffe01e3501 00000000ffffffff 00000000ffffffff [ 53.289189] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 53.296994] page dumped because: kasan: bad access detected [ 53.302550] [ 53.304025] Memory state around the buggy address: [ 53.308804] ffff0008078d5f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 53.316008] ffff0008078d5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 53.323215] >ffff0008078d6000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 53.330414] ^ [ 53.333630] ffff0008078d6080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 53.340835] ffff0008078d6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 53.348035] ================================================================== [ 53.357540] ================================================================== [ 53.367486] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 53.375032] Read of size 1 at addr ffff0008084ed2bb by task kunit_try_catch/309 [ 53.382325] [ 53.383809] CPU: 3 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 53.383870] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.383888] Hardware name: WinLink E850-96 board (DT) [ 53.383909] Call trace: [ 53.383923] show_stack+0x20/0x38 (C) [ 53.383959] dump_stack_lvl+0x8c/0xd0 [ 53.383993] print_report+0x118/0x5d0 [ 53.384023] kasan_report+0xdc/0x128 [ 53.384050] __asan_report_load1_noabort+0x20/0x30 [ 53.384087] mempool_oob_right_helper+0x2ac/0x2f0 [ 53.384123] mempool_slab_oob_right+0xc0/0x118 [ 53.384159] kunit_try_run_case+0x170/0x3f0 [ 53.384197] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.384234] kthread+0x328/0x630 [ 53.384264] ret_from_fork+0x10/0x20 [ 53.384299] [ 53.452810] Allocated by task 309: [ 53.456196] kasan_save_stack+0x3c/0x68 [ 53.460013] kasan_save_track+0x20/0x40 [ 53.463832] kasan_save_alloc_info+0x40/0x58 [ 53.468086] __kasan_mempool_unpoison_object+0xbc/0x180 [ 53.473294] remove_element+0x16c/0x1f8 [ 53.477114] mempool_alloc_preallocated+0x58/0xc0 [ 53.481802] mempool_oob_right_helper+0x98/0x2f0 [ 53.486402] mempool_slab_oob_right+0xc0/0x118 [ 53.490829] kunit_try_run_case+0x170/0x3f0 [ 53.494995] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.500464] kthread+0x328/0x630 [ 53.503675] ret_from_fork+0x10/0x20 [ 53.507235] [ 53.508712] The buggy address belongs to the object at ffff0008084ed240 [ 53.508712] which belongs to the cache test_cache of size 123 [ 53.521126] The buggy address is located 0 bytes to the right of [ 53.521126] allocated 123-byte region [ffff0008084ed240, ffff0008084ed2bb) [ 53.534057] [ 53.535536] The buggy address belongs to the physical page: [ 53.541092] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8884ed [ 53.549077] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.555586] page_type: f5(slab) [ 53.558722] raw: 0bfffe0000000000 ffff0008019cc140 dead000000000122 0000000000000000 [ 53.566442] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 53.574161] page dumped because: kasan: bad access detected [ 53.579716] [ 53.581191] Memory state around the buggy address: [ 53.585975] ffff0008084ed180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 53.593176] ffff0008084ed200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 53.600381] >ffff0008084ed280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 53.607580] ^ [ 53.612619] ffff0008084ed300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.619823] ffff0008084ed380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.627025] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 51.923970] ================================================================== [ 51.924161] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300 [ 51.924305] Read of size 1 at addr ffff000801b70280 by task kunit_try_catch/299 [ 51.927856] [ 51.929344] CPU: 4 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 51.929405] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.929423] Hardware name: WinLink E850-96 board (DT) [ 51.929446] Call trace: [ 51.929459] show_stack+0x20/0x38 (C) [ 51.929496] dump_stack_lvl+0x8c/0xd0 [ 51.929530] print_report+0x118/0x5d0 [ 51.929565] kasan_report+0xdc/0x128 [ 51.929592] __kasan_check_byte+0x54/0x70 [ 51.929629] kmem_cache_destroy+0x34/0x218 [ 51.929666] kmem_cache_double_destroy+0x174/0x300 [ 51.929700] kunit_try_run_case+0x170/0x3f0 [ 51.929737] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.929770] kthread+0x328/0x630 [ 51.929801] ret_from_fork+0x10/0x20 [ 51.929840] [ 51.997301] Allocated by task 299: [ 52.000688] kasan_save_stack+0x3c/0x68 [ 52.004504] kasan_save_track+0x20/0x40 [ 52.008324] kasan_save_alloc_info+0x40/0x58 [ 52.012577] __kasan_slab_alloc+0xa8/0xb0 [ 52.016570] kmem_cache_alloc_noprof+0x10c/0x398 [ 52.021171] __kmem_cache_create_args+0x178/0x280 [ 52.025858] kmem_cache_double_destroy+0xc0/0x300 [ 52.030546] kunit_try_run_case+0x170/0x3f0 [ 52.034714] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.040181] kthread+0x328/0x630 [ 52.043393] ret_from_fork+0x10/0x20 [ 52.046951] [ 52.048429] Freed by task 299: [ 52.051467] kasan_save_stack+0x3c/0x68 [ 52.055285] kasan_save_track+0x20/0x40 [ 52.059104] kasan_save_free_info+0x4c/0x78 [ 52.063271] __kasan_slab_free+0x6c/0x98 [ 52.067178] kmem_cache_free+0x260/0x468 [ 52.071083] slab_kmem_cache_release+0x38/0x50 [ 52.075510] kmem_cache_release+0x1c/0x30 [ 52.079503] kobject_put+0x17c/0x420 [ 52.083062] sysfs_slab_release+0x1c/0x30 [ 52.087055] kmem_cache_destroy+0x118/0x218 [ 52.091222] kmem_cache_double_destroy+0x128/0x300 [ 52.095996] kunit_try_run_case+0x170/0x3f0 [ 52.100164] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.105632] kthread+0x328/0x630 [ 52.108843] ret_from_fork+0x10/0x20 [ 52.112402] [ 52.113880] The buggy address belongs to the object at ffff000801b70280 [ 52.113880] which belongs to the cache kmem_cache of size 208 [ 52.126295] The buggy address is located 0 bytes inside of [ 52.126295] freed 208-byte region [ffff000801b70280, ffff000801b70350) [ 52.138358] [ 52.139835] The buggy address belongs to the physical page: [ 52.145391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881b70 [ 52.153376] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 52.161015] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 52.167959] page_type: f5(slab) [ 52.171095] raw: 0bfffe0000000040 ffff000800002000 dead000000000122 0000000000000000 [ 52.178814] raw: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000 [ 52.186542] head: 0bfffe0000000040 ffff000800002000 dead000000000122 0000000000000000 [ 52.194352] head: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000 [ 52.202164] head: 0bfffe0000000001 fffffdffe006dc01 00000000ffffffff 00000000ffffffff [ 52.209977] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 52.217782] page dumped because: kasan: bad access detected [ 52.223338] [ 52.224813] Memory state around the buggy address: [ 52.229593] ffff000801b70180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 52.236796] ffff000801b70200: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.244003] >ffff000801b70280: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 52.251202] ^ [ 52.254417] ffff000801b70300: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 52.261622] ffff000801b70380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.268825] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 51.509089] ================================================================== [ 51.509284] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468 [ 51.509418] Read of size 1 at addr ffff000801b74000 by task kunit_try_catch/297 [ 51.512800] [ 51.514289] CPU: 4 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 51.514346] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.514363] Hardware name: WinLink E850-96 board (DT) [ 51.514386] Call trace: [ 51.514401] show_stack+0x20/0x38 (C) [ 51.514438] dump_stack_lvl+0x8c/0xd0 [ 51.514470] print_report+0x118/0x5d0 [ 51.514501] kasan_report+0xdc/0x128 [ 51.514531] __asan_report_load1_noabort+0x20/0x30 [ 51.514567] kmem_cache_rcu_uaf+0x388/0x468 [ 51.514602] kunit_try_run_case+0x170/0x3f0 [ 51.514639] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.514675] kthread+0x328/0x630 [ 51.514703] ret_from_fork+0x10/0x20 [ 51.514738] [ 51.578339] Allocated by task 297: [ 51.581725] kasan_save_stack+0x3c/0x68 [ 51.585542] kasan_save_track+0x20/0x40 [ 51.589362] kasan_save_alloc_info+0x40/0x58 [ 51.593615] __kasan_slab_alloc+0xa8/0xb0 [ 51.597608] kmem_cache_alloc_noprof+0x10c/0x398 [ 51.602209] kmem_cache_rcu_uaf+0x12c/0x468 [ 51.606376] kunit_try_run_case+0x170/0x3f0 [ 51.610542] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.616012] kthread+0x328/0x630 [ 51.619223] ret_from_fork+0x10/0x20 [ 51.622781] [ 51.624258] Freed by task 0: [ 51.627124] kasan_save_stack+0x3c/0x68 [ 51.630941] kasan_save_track+0x20/0x40 [ 51.634760] kasan_save_free_info+0x4c/0x78 [ 51.638927] __kasan_slab_free+0x6c/0x98 [ 51.642833] slab_free_after_rcu_debug+0xd4/0x2f8 [ 51.647521] rcu_core+0x9f4/0x1e20 [ 51.650906] rcu_core_si+0x18/0x30 [ 51.654292] handle_softirqs+0x374/0xb28 [ 51.658197] __do_softirq+0x1c/0x28 [ 51.661670] [ 51.663147] Last potentially related work creation: [ 51.668008] kasan_save_stack+0x3c/0x68 [ 51.671826] kasan_record_aux_stack+0xb4/0xc8 [ 51.676168] kmem_cache_free+0x120/0x468 [ 51.680072] kmem_cache_rcu_uaf+0x16c/0x468 [ 51.684239] kunit_try_run_case+0x170/0x3f0 [ 51.688406] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.693874] kthread+0x328/0x630 [ 51.697086] ret_from_fork+0x10/0x20 [ 51.700645] [ 51.702120] The buggy address belongs to the object at ffff000801b74000 [ 51.702120] which belongs to the cache test_cache of size 200 [ 51.714537] The buggy address is located 0 bytes inside of [ 51.714537] freed 200-byte region [ffff000801b74000, ffff000801b740c8) [ 51.726603] [ 51.728079] The buggy address belongs to the physical page: [ 51.733635] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881b74 [ 51.741619] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 51.749258] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 51.756201] page_type: f5(slab) [ 51.759337] raw: 0bfffe0000000040 ffff000801b70140 dead000000000122 0000000000000000 [ 51.767057] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 51.774785] head: 0bfffe0000000040 ffff000801b70140 dead000000000122 0000000000000000 [ 51.782595] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 51.790408] head: 0bfffe0000000001 fffffdffe006dd01 00000000ffffffff 00000000ffffffff [ 51.798220] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 51.806025] page dumped because: kasan: bad access detected [ 51.811581] [ 51.813056] Memory state around the buggy address: [ 51.817837] ffff000801b73f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 51.825039] ffff000801b73f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 51.832246] >ffff000801b74000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 51.839446] ^ [ 51.842660] ffff000801b74080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 51.849865] ffff000801b74100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.857068] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 51.141783] ================================================================== [ 51.141983] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 51.148275] Free of addr ffff000803b98001 by task kunit_try_catch/295 [ 51.154699] [ 51.156184] CPU: 5 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 51.156236] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.156253] Hardware name: WinLink E850-96 board (DT) [ 51.156278] Call trace: [ 51.156291] show_stack+0x20/0x38 (C) [ 51.156328] dump_stack_lvl+0x8c/0xd0 [ 51.156363] print_report+0x118/0x5d0 [ 51.156392] kasan_report_invalid_free+0xc0/0xe8 [ 51.156425] check_slab_allocation+0xfc/0x108 [ 51.156460] __kasan_slab_pre_free+0x2c/0x48 [ 51.156493] kmem_cache_free+0xf0/0x468 [ 51.156527] kmem_cache_invalid_free+0x184/0x3c8 [ 51.156560] kunit_try_run_case+0x170/0x3f0 [ 51.156597] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.156634] kthread+0x328/0x630 [ 51.156663] ret_from_fork+0x10/0x20 [ 51.156699] [ 51.229350] Allocated by task 295: [ 51.232737] kasan_save_stack+0x3c/0x68 [ 51.236553] kasan_save_track+0x20/0x40 [ 51.240373] kasan_save_alloc_info+0x40/0x58 [ 51.244626] __kasan_slab_alloc+0xa8/0xb0 [ 51.248619] kmem_cache_alloc_noprof+0x10c/0x398 [ 51.253219] kmem_cache_invalid_free+0x12c/0x3c8 [ 51.257821] kunit_try_run_case+0x170/0x3f0 [ 51.261987] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.267455] kthread+0x328/0x630 [ 51.270667] ret_from_fork+0x10/0x20 [ 51.274226] [ 51.275705] The buggy address belongs to the object at ffff000803b98000 [ 51.275705] which belongs to the cache test_cache of size 200 [ 51.288116] The buggy address is located 1 bytes inside of [ 51.288116] 200-byte region [ffff000803b98000, ffff000803b980c8) [ 51.299662] [ 51.301139] The buggy address belongs to the physical page: [ 51.306695] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883b98 [ 51.314679] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 51.322319] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 51.329261] page_type: f5(slab) [ 51.332399] raw: 0bfffe0000000040 ffff000801e59900 dead000000000122 0000000000000000 [ 51.340117] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 51.347846] head: 0bfffe0000000040 ffff000801e59900 dead000000000122 0000000000000000 [ 51.355655] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 51.363470] head: 0bfffe0000000001 fffffdffe00ee601 00000000ffffffff 00000000ffffffff [ 51.371280] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 51.379085] page dumped because: kasan: bad access detected [ 51.384641] [ 51.386116] Memory state around the buggy address: [ 51.390898] ffff000803b97f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 51.398099] ffff000803b97f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 51.405305] >ffff000803b98000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 51.412506] ^ [ 51.415721] ffff000803b98080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 51.422926] ffff000803b98100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.430128] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 50.800644] ================================================================== [ 50.800829] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 50.800958] Free of addr ffff000801b72000 by task kunit_try_catch/293 [ 50.802358] [ 50.803847] CPU: 4 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 50.803907] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.803925] Hardware name: WinLink E850-96 board (DT) [ 50.803949] Call trace: [ 50.803962] show_stack+0x20/0x38 (C) [ 50.804001] dump_stack_lvl+0x8c/0xd0 [ 50.804036] print_report+0x118/0x5d0 [ 50.804066] kasan_report_invalid_free+0xc0/0xe8 [ 50.804096] check_slab_allocation+0xd4/0x108 [ 50.804136] __kasan_slab_pre_free+0x2c/0x48 [ 50.804170] kmem_cache_free+0xf0/0x468 [ 50.804206] kmem_cache_double_free+0x190/0x3c8 [ 50.804242] kunit_try_run_case+0x170/0x3f0 [ 50.804280] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.804311] kthread+0x328/0x630 [ 50.804343] ret_from_fork+0x10/0x20 [ 50.804379] [ 50.876923] Allocated by task 293: [ 50.880312] kasan_save_stack+0x3c/0x68 [ 50.884131] kasan_save_track+0x20/0x40 [ 50.887947] kasan_save_alloc_info+0x40/0x58 [ 50.892202] __kasan_slab_alloc+0xa8/0xb0 [ 50.896193] kmem_cache_alloc_noprof+0x10c/0x398 [ 50.900794] kmem_cache_double_free+0x12c/0x3c8 [ 50.905308] kunit_try_run_case+0x170/0x3f0 [ 50.909474] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.914945] kthread+0x328/0x630 [ 50.918155] ret_from_fork+0x10/0x20 [ 50.921714] [ 50.923191] Freed by task 293: [ 50.926228] kasan_save_stack+0x3c/0x68 [ 50.930049] kasan_save_track+0x20/0x40 [ 50.933868] kasan_save_free_info+0x4c/0x78 [ 50.938033] __kasan_slab_free+0x6c/0x98 [ 50.941939] kmem_cache_free+0x260/0x468 [ 50.945846] kmem_cache_double_free+0x140/0x3c8 [ 50.950359] kunit_try_run_case+0x170/0x3f0 [ 50.954526] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.959995] kthread+0x328/0x630 [ 50.963206] ret_from_fork+0x10/0x20 [ 50.966765] [ 50.968242] The buggy address belongs to the object at ffff000801b72000 [ 50.968242] which belongs to the cache test_cache of size 200 [ 50.980656] The buggy address is located 0 bytes inside of [ 50.980656] 200-byte region [ffff000801b72000, ffff000801b720c8) [ 50.992201] [ 50.993678] The buggy address belongs to the physical page: [ 50.999234] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881b72 [ 51.007218] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 51.014858] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 51.021801] page_type: f5(slab) [ 51.024936] raw: 0bfffe0000000040 ffff000801b70000 dead000000000122 0000000000000000 [ 51.032656] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 51.040385] head: 0bfffe0000000040 ffff000801b70000 dead000000000122 0000000000000000 [ 51.048194] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 51.056007] head: 0bfffe0000000001 fffffdffe006dc81 00000000ffffffff 00000000ffffffff [ 51.063819] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 51.071627] page dumped because: kasan: bad access detected [ 51.077180] [ 51.078655] Memory state around the buggy address: [ 51.083435] ffff000801b71f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.090639] ffff000801b71f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.097845] >ffff000801b72000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 51.105045] ^ [ 51.108260] ffff000801b72080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 51.115465] ffff000801b72100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.122667] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 50.462033] ================================================================== [ 50.471582] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430 [ 50.478260] Read of size 1 at addr ffff000803b960c8 by task kunit_try_catch/291 [ 50.485550] [ 50.487035] CPU: 5 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 50.487096] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.487112] Hardware name: WinLink E850-96 board (DT) [ 50.487136] Call trace: [ 50.487154] show_stack+0x20/0x38 (C) [ 50.487188] dump_stack_lvl+0x8c/0xd0 [ 50.487220] print_report+0x118/0x5d0 [ 50.487248] kasan_report+0xdc/0x128 [ 50.487275] __asan_report_load1_noabort+0x20/0x30 [ 50.487307] kmem_cache_oob+0x344/0x430 [ 50.487339] kunit_try_run_case+0x170/0x3f0 [ 50.487380] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.487415] kthread+0x328/0x630 [ 50.487444] ret_from_fork+0x10/0x20 [ 50.487478] [ 50.550740] Allocated by task 291: [ 50.554127] kasan_save_stack+0x3c/0x68 [ 50.557943] kasan_save_track+0x20/0x40 [ 50.561763] kasan_save_alloc_info+0x40/0x58 [ 50.566016] __kasan_slab_alloc+0xa8/0xb0 [ 50.570009] kmem_cache_alloc_noprof+0x10c/0x398 [ 50.574610] kmem_cache_oob+0x12c/0x430 [ 50.578429] kunit_try_run_case+0x170/0x3f0 [ 50.582596] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.588064] kthread+0x328/0x630 [ 50.591276] ret_from_fork+0x10/0x20 [ 50.594835] [ 50.596313] The buggy address belongs to the object at ffff000803b96000 [ 50.596313] which belongs to the cache test_cache of size 200 [ 50.608726] The buggy address is located 0 bytes to the right of [ 50.608726] allocated 200-byte region [ffff000803b96000, ffff000803b960c8) [ 50.621658] [ 50.623136] The buggy address belongs to the physical page: [ 50.628693] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883b96 [ 50.636676] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 50.644317] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 50.651259] page_type: f5(slab) [ 50.654397] raw: 0bfffe0000000040 ffff000801e597c0 dead000000000122 0000000000000000 [ 50.662116] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 50.669843] head: 0bfffe0000000040 ffff000801e597c0 dead000000000122 0000000000000000 [ 50.677653] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 50.685466] head: 0bfffe0000000001 fffffdffe00ee581 00000000ffffffff 00000000ffffffff [ 50.693278] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 50.701084] page dumped because: kasan: bad access detected [ 50.706639] [ 50.708115] Memory state around the buggy address: [ 50.712894] ffff000803b95f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.720099] ffff000803b96000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 50.727306] >ffff000803b96080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 50.734503] ^ [ 50.740063] ffff000803b96100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.747267] ffff000803b96180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.754470] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 50.115917] ================================================================== [ 50.123322] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 50.130001] Read of size 8 at addr ffff0008084f7700 by task kunit_try_catch/284 [ 50.137292] [ 50.138778] CPU: 7 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 50.138836] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.138851] Hardware name: WinLink E850-96 board (DT) [ 50.138875] Call trace: [ 50.138889] show_stack+0x20/0x38 (C) [ 50.138924] dump_stack_lvl+0x8c/0xd0 [ 50.138958] print_report+0x118/0x5d0 [ 50.138985] kasan_report+0xdc/0x128 [ 50.139014] __asan_report_load8_noabort+0x20/0x30 [ 50.139047] workqueue_uaf+0x480/0x4a8 [ 50.139079] kunit_try_run_case+0x170/0x3f0 [ 50.139117] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.139148] kthread+0x328/0x630 [ 50.139180] ret_from_fork+0x10/0x20 [ 50.139216] [ 50.202395] Allocated by task 284: [ 50.205783] kasan_save_stack+0x3c/0x68 [ 50.209598] kasan_save_track+0x20/0x40 [ 50.213419] kasan_save_alloc_info+0x40/0x58 [ 50.217671] __kasan_kmalloc+0xd4/0xd8 [ 50.221403] __kmalloc_cache_noprof+0x16c/0x3c0 [ 50.225917] workqueue_uaf+0x13c/0x4a8 [ 50.229650] kunit_try_run_case+0x170/0x3f0 [ 50.233816] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.239285] kthread+0x328/0x630 [ 50.242497] ret_from_fork+0x10/0x20 [ 50.246056] [ 50.247533] Freed by task 121: [ 50.250570] kasan_save_stack+0x3c/0x68 [ 50.254389] kasan_save_track+0x20/0x40 [ 50.258208] kasan_save_free_info+0x4c/0x78 [ 50.262375] __kasan_slab_free+0x6c/0x98 [ 50.266281] kfree+0x214/0x3c8 [ 50.269319] workqueue_uaf_work+0x18/0x30 [ 50.273312] process_one_work+0x530/0xf98 [ 50.277305] worker_thread+0x618/0xf38 [ 50.281038] kthread+0x328/0x630 [ 50.284250] ret_from_fork+0x10/0x20 [ 50.287809] [ 50.289286] Last potentially related work creation: [ 50.294146] kasan_save_stack+0x3c/0x68 [ 50.297965] kasan_record_aux_stack+0xb4/0xc8 [ 50.302305] __queue_work+0x65c/0xfe0 [ 50.305951] queue_work_on+0xbc/0xf8 [ 50.309510] workqueue_uaf+0x210/0x4a8 [ 50.313242] kunit_try_run_case+0x170/0x3f0 [ 50.317409] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.322877] kthread+0x328/0x630 [ 50.326089] ret_from_fork+0x10/0x20 [ 50.329648] [ 50.331125] The buggy address belongs to the object at ffff0008084f7700 [ 50.331125] which belongs to the cache kmalloc-32 of size 32 [ 50.343453] The buggy address is located 0 bytes inside of [ 50.343453] freed 32-byte region [ffff0008084f7700, ffff0008084f7720) [ 50.355431] [ 50.356906] The buggy address belongs to the physical page: [ 50.362465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8884f7 [ 50.370451] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.376958] page_type: f5(slab) [ 50.380094] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 50.387814] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 50.395534] page dumped because: kasan: bad access detected [ 50.401088] [ 50.402563] Memory state around the buggy address: [ 50.407344] ffff0008084f7600: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 50.414547] ffff0008084f7680: fa fb fb fb fc fc fc fc 00 00 00 07 fc fc fc fc [ 50.421754] >ffff0008084f7700: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 50.428951] ^ [ 50.432168] ffff0008084f7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.439374] ffff0008084f7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.446575] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[ 49.748957] ================================================================== [ 49.749131] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 49.749253] Read of size 4 at addr ffff000806d0df80 by task swapper/4/0 [ 49.750317] [ 49.751805] CPU: 4 UID: 0 PID: 0 Comm: swapper/4 Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 49.751861] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.751876] Hardware name: WinLink E850-96 board (DT) [ 49.751897] Call trace: [ 49.751910] show_stack+0x20/0x38 (C) [ 49.751953] dump_stack_lvl+0x8c/0xd0 [ 49.751985] print_report+0x118/0x5d0 [ 49.752017] kasan_report+0xdc/0x128 [ 49.752044] __asan_report_load4_noabort+0x20/0x30 [ 49.752078] rcu_uaf_reclaim+0x64/0x70 [ 49.752109] rcu_core+0x9f4/0x1e20 [ 49.752145] rcu_core_si+0x18/0x30 [ 49.752174] handle_softirqs+0x374/0xb28 [ 49.752210] __do_softirq+0x1c/0x28 [ 49.752239] ____do_softirq+0x18/0x30 [ 49.752276] call_on_irq_stack+0x24/0x30 [ 49.752307] do_softirq_own_stack+0x24/0x38 [ 49.752336] __irq_exit_rcu+0x1fc/0x318 [ 49.752367] irq_exit_rcu+0x1c/0x80 [ 49.752396] el1_interrupt+0x38/0x58 [ 49.752430] el1h_64_irq_handler+0x18/0x28 [ 49.752461] el1h_64_irq+0x6c/0x70 [ 49.752489] arch_local_irq_enable+0x4/0x8 (P) [ 49.752525] do_idle+0x384/0x4e8 [ 49.752560] cpu_startup_entry+0x64/0x80 [ 49.752589] secondary_start_kernel+0x28c/0x340 [ 49.752622] __secondary_switched+0xc0/0xc8 [ 49.752663] [ 49.862730] Allocated by task 282: [ 49.866117] kasan_save_stack+0x3c/0x68 [ 49.869934] kasan_save_track+0x20/0x40 [ 49.873752] kasan_save_alloc_info+0x40/0x58 [ 49.878006] __kasan_kmalloc+0xd4/0xd8 [ 49.881740] __kmalloc_cache_noprof+0x16c/0x3c0 [ 49.886252] rcu_uaf+0xb0/0x2d8 [ 49.889378] kunit_try_run_case+0x170/0x3f0 [ 49.893544] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.899012] kthread+0x328/0x630 [ 49.902224] ret_from_fork+0x10/0x20 [ 49.905783] [ 49.907259] Freed by task 0: [ 49.910125] kasan_save_stack+0x3c/0x68 [ 49.913944] kasan_save_track+0x20/0x40 [ 49.917762] kasan_save_free_info+0x4c/0x78 [ 49.921929] __kasan_slab_free+0x6c/0x98 [ 49.925835] kfree+0x214/0x3c8 [ 49.928873] rcu_uaf_reclaim+0x28/0x70 [ 49.932606] rcu_core+0x9f4/0x1e20 [ 49.935991] rcu_core_si+0x18/0x30 [ 49.939378] handle_softirqs+0x374/0xb28 [ 49.943282] __do_softirq+0x1c/0x28 [ 49.946755] [ 49.948232] Last potentially related work creation: [ 49.953093] kasan_save_stack+0x3c/0x68 [ 49.956911] kasan_record_aux_stack+0xb4/0xc8 [ 49.961251] __call_rcu_common.constprop.0+0x74/0x8c8 [ 49.966286] call_rcu+0x18/0x30 [ 49.969410] rcu_uaf+0x14c/0x2d8 [ 49.972622] kunit_try_run_case+0x170/0x3f0 [ 49.976789] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.982258] kthread+0x328/0x630 [ 49.985469] ret_from_fork+0x10/0x20 [ 49.989028] [ 49.990505] The buggy address belongs to the object at ffff000806d0df80 [ 49.990505] which belongs to the cache kmalloc-32 of size 32 [ 50.002832] The buggy address is located 0 bytes inside of [ 50.002832] freed 32-byte region [ffff000806d0df80, ffff000806d0dfa0) [ 50.014809] [ 50.016290] The buggy address belongs to the physical page: [ 50.021844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886d0d [ 50.029829] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.036339] page_type: f5(slab) [ 50.039474] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 50.047195] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 50.054913] page dumped because: kasan: bad access detected [ 50.060468] [ 50.061944] Memory state around the buggy address: [ 50.066724] ffff000806d0de80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 50.073926] ffff000806d0df00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 50.081133] >ffff000806d0df80: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 50.088334] ^ [ 50.091549] ffff000806d0e000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.098753] ffff000806d0e080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.105955] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 48.697141] ================================================================== [ 48.706786] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 48.713118] Read of size 1 at addr ffff00080193b000 by task kunit_try_catch/280 [ 48.720408] [ 48.721896] CPU: 2 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 48.721959] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.721976] Hardware name: WinLink E850-96 board (DT) [ 48.722001] Call trace: [ 48.722015] show_stack+0x20/0x38 (C) [ 48.722050] dump_stack_lvl+0x8c/0xd0 [ 48.722085] print_report+0x118/0x5d0 [ 48.722115] kasan_report+0xdc/0x128 [ 48.722143] __kasan_check_byte+0x54/0x70 [ 48.722181] ksize+0x30/0x88 [ 48.722216] ksize_uaf+0x168/0x5f8 [ 48.722249] kunit_try_run_case+0x170/0x3f0 [ 48.722288] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.722322] kthread+0x328/0x630 [ 48.722349] ret_from_fork+0x10/0x20 [ 48.722387] [ 48.787249] Allocated by task 280: [ 48.790634] kasan_save_stack+0x3c/0x68 [ 48.794454] kasan_save_track+0x20/0x40 [ 48.798272] kasan_save_alloc_info+0x40/0x58 [ 48.802525] __kasan_kmalloc+0xd4/0xd8 [ 48.806257] __kmalloc_cache_noprof+0x16c/0x3c0 [ 48.810771] ksize_uaf+0xb8/0x5f8 [ 48.814070] kunit_try_run_case+0x170/0x3f0 [ 48.818236] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.823708] kthread+0x328/0x630 [ 48.826917] ret_from_fork+0x10/0x20 [ 48.830476] [ 48.831952] Freed by task 280: [ 48.834990] kasan_save_stack+0x3c/0x68 [ 48.838809] kasan_save_track+0x20/0x40 [ 48.842630] kasan_save_free_info+0x4c/0x78 [ 48.846795] __kasan_slab_free+0x6c/0x98 [ 48.850701] kfree+0x214/0x3c8 [ 48.853740] ksize_uaf+0x11c/0x5f8 [ 48.857125] kunit_try_run_case+0x170/0x3f0 [ 48.861291] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.866760] kthread+0x328/0x630 [ 48.869972] ret_from_fork+0x10/0x20 [ 48.873531] [ 48.875008] The buggy address belongs to the object at ffff00080193b000 [ 48.875008] which belongs to the cache kmalloc-128 of size 128 [ 48.887512] The buggy address is located 0 bytes inside of [ 48.887512] freed 128-byte region [ffff00080193b000, ffff00080193b080) [ 48.899573] [ 48.901051] The buggy address belongs to the physical page: [ 48.906609] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88193a [ 48.914591] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 48.922230] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 48.929174] page_type: f5(slab) [ 48.932310] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 48.940030] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.947756] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 48.955567] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.963380] head: 0bfffe0000000001 fffffdffe0064e81 00000000ffffffff 00000000ffffffff [ 48.971192] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 48.978998] page dumped because: kasan: bad access detected [ 48.984553] [ 48.986029] Memory state around the buggy address: [ 48.990810] ffff00080193af00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 48.998012] ffff00080193af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.005218] >ffff00080193b000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 49.012418] ^ [ 49.015633] ffff00080193b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.022838] ffff00080193b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.030041] ================================================================== [ 49.037366] ================================================================== [ 49.044455] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 49.050786] Read of size 1 at addr ffff00080193b000 by task kunit_try_catch/280 [ 49.058077] [ 49.059559] CPU: 2 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 49.059612] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.059627] Hardware name: WinLink E850-96 board (DT) [ 49.059649] Call trace: [ 49.059662] show_stack+0x20/0x38 (C) [ 49.059696] dump_stack_lvl+0x8c/0xd0 [ 49.059729] print_report+0x118/0x5d0 [ 49.059755] kasan_report+0xdc/0x128 [ 49.059782] __asan_report_load1_noabort+0x20/0x30 [ 49.059814] ksize_uaf+0x598/0x5f8 [ 49.059844] kunit_try_run_case+0x170/0x3f0 [ 49.059882] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.059914] kthread+0x328/0x630 [ 49.059944] ret_from_fork+0x10/0x20 [ 49.059979] [ 49.122833] Allocated by task 280: [ 49.126221] kasan_save_stack+0x3c/0x68 [ 49.130037] kasan_save_track+0x20/0x40 [ 49.133857] kasan_save_alloc_info+0x40/0x58 [ 49.138110] __kasan_kmalloc+0xd4/0xd8 [ 49.141843] __kmalloc_cache_noprof+0x16c/0x3c0 [ 49.146357] ksize_uaf+0xb8/0x5f8 [ 49.149655] kunit_try_run_case+0x170/0x3f0 [ 49.153822] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.159292] kthread+0x328/0x630 [ 49.162502] ret_from_fork+0x10/0x20 [ 49.166061] [ 49.167537] Freed by task 280: [ 49.170575] kasan_save_stack+0x3c/0x68 [ 49.174394] kasan_save_track+0x20/0x40 [ 49.178213] kasan_save_free_info+0x4c/0x78 [ 49.182381] __kasan_slab_free+0x6c/0x98 [ 49.186287] kfree+0x214/0x3c8 [ 49.189325] ksize_uaf+0x11c/0x5f8 [ 49.192710] kunit_try_run_case+0x170/0x3f0 [ 49.196877] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.202345] kthread+0x328/0x630 [ 49.205557] ret_from_fork+0x10/0x20 [ 49.209116] [ 49.210593] The buggy address belongs to the object at ffff00080193b000 [ 49.210593] which belongs to the cache kmalloc-128 of size 128 [ 49.223092] The buggy address is located 0 bytes inside of [ 49.223092] freed 128-byte region [ffff00080193b000, ffff00080193b080) [ 49.235157] [ 49.236636] The buggy address belongs to the physical page: [ 49.242193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88193a [ 49.250176] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 49.257815] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 49.264759] page_type: f5(slab) [ 49.267897] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 49.275615] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.283341] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 49.291152] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.298966] head: 0bfffe0000000001 fffffdffe0064e81 00000000ffffffff 00000000ffffffff [ 49.306778] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 49.314583] page dumped because: kasan: bad access detected [ 49.320139] [ 49.321614] Memory state around the buggy address: [ 49.326394] ffff00080193af00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 49.333597] ffff00080193af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.340803] >ffff00080193b000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 49.348003] ^ [ 49.351219] ffff00080193b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.358423] ffff00080193b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.365624] ================================================================== [ 49.373019] ================================================================== [ 49.380042] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 49.386371] Read of size 1 at addr ffff00080193b078 by task kunit_try_catch/280 [ 49.393662] [ 49.395146] CPU: 2 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 49.395196] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.395212] Hardware name: WinLink E850-96 board (DT) [ 49.395234] Call trace: [ 49.395246] show_stack+0x20/0x38 (C) [ 49.395282] dump_stack_lvl+0x8c/0xd0 [ 49.395314] print_report+0x118/0x5d0 [ 49.395340] kasan_report+0xdc/0x128 [ 49.395368] __asan_report_load1_noabort+0x20/0x30 [ 49.395399] ksize_uaf+0x544/0x5f8 [ 49.395429] kunit_try_run_case+0x170/0x3f0 [ 49.395465] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.395498] kthread+0x328/0x630 [ 49.395528] ret_from_fork+0x10/0x20 [ 49.395563] [ 49.458418] Allocated by task 280: [ 49.461807] kasan_save_stack+0x3c/0x68 [ 49.465624] kasan_save_track+0x20/0x40 [ 49.469442] kasan_save_alloc_info+0x40/0x58 [ 49.473695] __kasan_kmalloc+0xd4/0xd8 [ 49.477428] __kmalloc_cache_noprof+0x16c/0x3c0 [ 49.481942] ksize_uaf+0xb8/0x5f8 [ 49.485240] kunit_try_run_case+0x170/0x3f0 [ 49.489407] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.494877] kthread+0x328/0x630 [ 49.498088] ret_from_fork+0x10/0x20 [ 49.501647] [ 49.503122] Freed by task 280: [ 49.506160] kasan_save_stack+0x3c/0x68 [ 49.509980] kasan_save_track+0x20/0x40 [ 49.513799] kasan_save_free_info+0x4c/0x78 [ 49.517965] __kasan_slab_free+0x6c/0x98 [ 49.521872] kfree+0x214/0x3c8 [ 49.524909] ksize_uaf+0x11c/0x5f8 [ 49.528295] kunit_try_run_case+0x170/0x3f0 [ 49.532462] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.537931] kthread+0x328/0x630 [ 49.541142] ret_from_fork+0x10/0x20 [ 49.544701] [ 49.546178] The buggy address belongs to the object at ffff00080193b000 [ 49.546178] which belongs to the cache kmalloc-128 of size 128 [ 49.558677] The buggy address is located 120 bytes inside of [ 49.558677] freed 128-byte region [ffff00080193b000, ffff00080193b080) [ 49.570916] [ 49.572395] The buggy address belongs to the physical page: [ 49.577950] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88193a [ 49.585935] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 49.593574] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 49.600518] page_type: f5(slab) [ 49.603654] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 49.611373] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.619100] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 49.626911] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.634724] head: 0bfffe0000000001 fffffdffe0064e81 00000000ffffffff 00000000ffffffff [ 49.642536] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 49.650342] page dumped because: kasan: bad access detected [ 49.655897] [ 49.657373] Memory state around the buggy address: [ 49.662153] ffff00080193af00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 49.669356] ffff00080193af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.676562] >ffff00080193b000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 49.683762] ^ [ 49.690883] ffff00080193b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.698088] ffff00080193b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.705289] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 48.094290] ================================================================== [ 48.101240] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 48.108612] Read of size 1 at addr ffff00080193af78 by task kunit_try_catch/278 [ 48.115903] [ 48.117388] CPU: 2 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 48.117446] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.117461] Hardware name: WinLink E850-96 board (DT) [ 48.117481] Call trace: [ 48.117494] show_stack+0x20/0x38 (C) [ 48.117527] dump_stack_lvl+0x8c/0xd0 [ 48.117560] print_report+0x118/0x5d0 [ 48.117587] kasan_report+0xdc/0x128 [ 48.117616] __asan_report_load1_noabort+0x20/0x30 [ 48.117651] ksize_unpoisons_memory+0x618/0x740 [ 48.117683] kunit_try_run_case+0x170/0x3f0 [ 48.117721] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.117753] kthread+0x328/0x630 [ 48.117783] ret_from_fork+0x10/0x20 [ 48.117819] [ 48.181787] Allocated by task 278: [ 48.185175] kasan_save_stack+0x3c/0x68 [ 48.188993] kasan_save_track+0x20/0x40 [ 48.192812] kasan_save_alloc_info+0x40/0x58 [ 48.197064] __kasan_kmalloc+0xd4/0xd8 [ 48.200799] __kmalloc_cache_noprof+0x16c/0x3c0 [ 48.205312] ksize_unpoisons_memory+0xc0/0x740 [ 48.209739] kunit_try_run_case+0x170/0x3f0 [ 48.213905] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.219374] kthread+0x328/0x630 [ 48.222586] ret_from_fork+0x10/0x20 [ 48.226145] [ 48.227621] The buggy address belongs to the object at ffff00080193af00 [ 48.227621] which belongs to the cache kmalloc-128 of size 128 [ 48.240124] The buggy address is located 5 bytes to the right of [ 48.240124] allocated 115-byte region [ffff00080193af00, ffff00080193af73) [ 48.253054] [ 48.254532] The buggy address belongs to the physical page: [ 48.260091] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88193a [ 48.268073] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 48.275712] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 48.282656] page_type: f5(slab) [ 48.285791] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 48.293512] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.301238] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 48.309049] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.316862] head: 0bfffe0000000001 fffffdffe0064e81 00000000ffffffff 00000000ffffffff [ 48.324674] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 48.332480] page dumped because: kasan: bad access detected [ 48.338035] [ 48.339511] Memory state around the buggy address: [ 48.344290] ffff00080193ae00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 48.351494] ffff00080193ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.358700] >ffff00080193af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 48.365899] ^ [ 48.373022] ffff00080193af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.380227] ffff00080193b000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.387427] ================================================================== [ 48.394819] ================================================================== [ 48.401843] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 48.409217] Read of size 1 at addr ffff00080193af7f by task kunit_try_catch/278 [ 48.416507] [ 48.417992] CPU: 4 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 48.418050] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.418067] Hardware name: WinLink E850-96 board (DT) [ 48.418091] Call trace: [ 48.418104] show_stack+0x20/0x38 (C) [ 48.418141] dump_stack_lvl+0x8c/0xd0 [ 48.418174] print_report+0x118/0x5d0 [ 48.418203] kasan_report+0xdc/0x128 [ 48.418231] __asan_report_load1_noabort+0x20/0x30 [ 48.418263] ksize_unpoisons_memory+0x690/0x740 [ 48.418300] kunit_try_run_case+0x170/0x3f0 [ 48.418340] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.418375] kthread+0x328/0x630 [ 48.418407] ret_from_fork+0x10/0x20 [ 48.418441] [ 48.482391] Allocated by task 278: [ 48.485780] kasan_save_stack+0x3c/0x68 [ 48.489596] kasan_save_track+0x20/0x40 [ 48.493415] kasan_save_alloc_info+0x40/0x58 [ 48.497668] __kasan_kmalloc+0xd4/0xd8 [ 48.501401] __kmalloc_cache_noprof+0x16c/0x3c0 [ 48.505915] ksize_unpoisons_memory+0xc0/0x740 [ 48.510342] kunit_try_run_case+0x170/0x3f0 [ 48.514509] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.519977] kthread+0x328/0x630 [ 48.523189] ret_from_fork+0x10/0x20 [ 48.526748] [ 48.528225] The buggy address belongs to the object at ffff00080193af00 [ 48.528225] which belongs to the cache kmalloc-128 of size 128 [ 48.540727] The buggy address is located 12 bytes to the right of [ 48.540727] allocated 115-byte region [ffff00080193af00, ffff00080193af73) [ 48.553744] [ 48.555222] The buggy address belongs to the physical page: [ 48.560779] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88193a [ 48.568763] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 48.576402] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 48.583345] page_type: f5(slab) [ 48.586481] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 48.594202] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.601928] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 48.609739] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.617552] head: 0bfffe0000000001 fffffdffe0064e81 00000000ffffffff 00000000ffffffff [ 48.625364] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 48.633170] page dumped because: kasan: bad access detected [ 48.638725] [ 48.640200] Memory state around the buggy address: [ 48.644979] ffff00080193ae00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 48.652183] ffff00080193ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.659389] >ffff00080193af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 48.666589] ^ [ 48.673711] ffff00080193af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.680917] ffff00080193b000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.688118] ================================================================== [ 47.791257] ================================================================== [ 47.800894] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 47.808269] Read of size 1 at addr ffff00080193af73 by task kunit_try_catch/278 [ 47.815562] [ 47.817047] CPU: 2 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 47.817102] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.817119] Hardware name: WinLink E850-96 board (DT) [ 47.817140] Call trace: [ 47.817154] show_stack+0x20/0x38 (C) [ 47.817192] dump_stack_lvl+0x8c/0xd0 [ 47.817225] print_report+0x118/0x5d0 [ 47.817254] kasan_report+0xdc/0x128 [ 47.817282] __asan_report_load1_noabort+0x20/0x30 [ 47.817317] ksize_unpoisons_memory+0x628/0x740 [ 47.817350] kunit_try_run_case+0x170/0x3f0 [ 47.817389] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.817421] kthread+0x328/0x630 [ 47.817450] ret_from_fork+0x10/0x20 [ 47.817485] [ 47.881445] Allocated by task 278: [ 47.884836] kasan_save_stack+0x3c/0x68 [ 47.888650] kasan_save_track+0x20/0x40 [ 47.892469] kasan_save_alloc_info+0x40/0x58 [ 47.896722] __kasan_kmalloc+0xd4/0xd8 [ 47.900456] __kmalloc_cache_noprof+0x16c/0x3c0 [ 47.904969] ksize_unpoisons_memory+0xc0/0x740 [ 47.909396] kunit_try_run_case+0x170/0x3f0 [ 47.913563] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.919031] kthread+0x328/0x630 [ 47.922243] ret_from_fork+0x10/0x20 [ 47.925802] [ 47.927280] The buggy address belongs to the object at ffff00080193af00 [ 47.927280] which belongs to the cache kmalloc-128 of size 128 [ 47.939781] The buggy address is located 0 bytes to the right of [ 47.939781] allocated 115-byte region [ffff00080193af00, ffff00080193af73) [ 47.952711] [ 47.954191] The buggy address belongs to the physical page: [ 47.959747] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88193a [ 47.967731] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 47.975370] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 47.982313] page_type: f5(slab) [ 47.985450] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 47.993169] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.000894] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 48.008707] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.016520] head: 0bfffe0000000001 fffffdffe0064e81 00000000ffffffff 00000000ffffffff [ 48.024331] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 48.032137] page dumped because: kasan: bad access detected [ 48.037693] [ 48.039168] Memory state around the buggy address: [ 48.043948] ffff00080193ae00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 48.051151] ffff00080193ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.058357] >ffff00080193af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 48.065557] ^ [ 48.072418] ffff00080193af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.079624] ffff00080193b000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.086824] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive
[ 47.475274] ================================================================== [ 47.481976] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 47.487962] Free of addr ffff0008030dafc0 by task kunit_try_catch/276 [ 47.494385] [ 47.495870] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 47.495925] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.495942] Hardware name: WinLink E850-96 board (DT) [ 47.495963] Call trace: [ 47.495977] show_stack+0x20/0x38 (C) [ 47.496009] dump_stack_lvl+0x8c/0xd0 [ 47.496041] print_report+0x118/0x5d0 [ 47.496068] kasan_report_invalid_free+0xc0/0xe8 [ 47.496098] check_slab_allocation+0xd4/0x108 [ 47.496134] __kasan_slab_pre_free+0x2c/0x48 [ 47.496168] kfree+0xe8/0x3c8 [ 47.496200] kfree_sensitive+0x3c/0xb0 [ 47.496233] kmalloc_double_kzfree+0x168/0x308 [ 47.496268] kunit_try_run_case+0x170/0x3f0 [ 47.496303] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.496336] kthread+0x328/0x630 [ 47.496364] ret_from_fork+0x10/0x20 [ 47.496395] [ 47.571729] Allocated by task 276: [ 47.575115] kasan_save_stack+0x3c/0x68 [ 47.578932] kasan_save_track+0x20/0x40 [ 47.582752] kasan_save_alloc_info+0x40/0x58 [ 47.587005] __kasan_kmalloc+0xd4/0xd8 [ 47.590738] __kmalloc_cache_noprof+0x16c/0x3c0 [ 47.595251] kmalloc_double_kzfree+0xb8/0x308 [ 47.599592] kunit_try_run_case+0x170/0x3f0 [ 47.603758] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.609227] kthread+0x328/0x630 [ 47.612439] ret_from_fork+0x10/0x20 [ 47.615998] [ 47.617473] Freed by task 276: [ 47.620511] kasan_save_stack+0x3c/0x68 [ 47.624331] kasan_save_track+0x20/0x40 [ 47.628150] kasan_save_free_info+0x4c/0x78 [ 47.632317] __kasan_slab_free+0x6c/0x98 [ 47.636223] kfree+0x214/0x3c8 [ 47.639261] kfree_sensitive+0x80/0xb0 [ 47.642995] kmalloc_double_kzfree+0x11c/0x308 [ 47.647421] kunit_try_run_case+0x170/0x3f0 [ 47.651587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.657056] kthread+0x328/0x630 [ 47.660268] ret_from_fork+0x10/0x20 [ 47.663827] [ 47.665304] The buggy address belongs to the object at ffff0008030dafc0 [ 47.665304] which belongs to the cache kmalloc-16 of size 16 [ 47.677630] The buggy address is located 0 bytes inside of [ 47.677630] 16-byte region [ffff0008030dafc0, ffff0008030dafd0) [ 47.689086] [ 47.690566] The buggy address belongs to the physical page: [ 47.696121] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830da [ 47.704106] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.710616] page_type: f5(slab) [ 47.713753] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 47.721472] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 47.729192] page dumped because: kasan: bad access detected [ 47.734746] [ 47.736221] Memory state around the buggy address: [ 47.741001] ffff0008030dae80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 47.748204] ffff0008030daf00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 47.755412] >ffff0008030daf80: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc [ 47.762610] ^ [ 47.767910] ffff0008030db000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 47.775113] ffff0008030db080: 00 fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 [ 47.782315] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[ 47.159218] ================================================================== [ 47.173041] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 47.180414] Read of size 1 at addr ffff0008030dafc0 by task kunit_try_catch/276 [ 47.187705] [ 47.189191] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 47.189252] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.189268] Hardware name: WinLink E850-96 board (DT) [ 47.189291] Call trace: [ 47.189306] show_stack+0x20/0x38 (C) [ 47.189344] dump_stack_lvl+0x8c/0xd0 [ 47.189377] print_report+0x118/0x5d0 [ 47.189406] kasan_report+0xdc/0x128 [ 47.189431] __kasan_check_byte+0x54/0x70 [ 47.189468] kfree_sensitive+0x30/0xb0 [ 47.189507] kmalloc_double_kzfree+0x168/0x308 [ 47.189542] kunit_try_run_case+0x170/0x3f0 [ 47.189582] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.189614] kthread+0x328/0x630 [ 47.189644] ret_from_fork+0x10/0x20 [ 47.189679] [ 47.256456] Allocated by task 276: [ 47.259844] kasan_save_stack+0x3c/0x68 [ 47.263659] kasan_save_track+0x20/0x40 [ 47.267480] kasan_save_alloc_info+0x40/0x58 [ 47.271732] __kasan_kmalloc+0xd4/0xd8 [ 47.275465] __kmalloc_cache_noprof+0x16c/0x3c0 [ 47.279978] kmalloc_double_kzfree+0xb8/0x308 [ 47.284319] kunit_try_run_case+0x170/0x3f0 [ 47.288485] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.293954] kthread+0x328/0x630 [ 47.297166] ret_from_fork+0x10/0x20 [ 47.300725] [ 47.302202] Freed by task 276: [ 47.305240] kasan_save_stack+0x3c/0x68 [ 47.309058] kasan_save_track+0x20/0x40 [ 47.312877] kasan_save_free_info+0x4c/0x78 [ 47.317044] __kasan_slab_free+0x6c/0x98 [ 47.320951] kfree+0x214/0x3c8 [ 47.323988] kfree_sensitive+0x80/0xb0 [ 47.327721] kmalloc_double_kzfree+0x11c/0x308 [ 47.332148] kunit_try_run_case+0x170/0x3f0 [ 47.336314] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.341783] kthread+0x328/0x630 [ 47.344995] ret_from_fork+0x10/0x20 [ 47.348554] [ 47.350032] The buggy address belongs to the object at ffff0008030dafc0 [ 47.350032] which belongs to the cache kmalloc-16 of size 16 [ 47.362359] The buggy address is located 0 bytes inside of [ 47.362359] freed 16-byte region [ffff0008030dafc0, ffff0008030dafd0) [ 47.374335] [ 47.375814] The buggy address belongs to the physical page: [ 47.381370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830da [ 47.389354] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.395865] page_type: f5(slab) [ 47.398999] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 47.406719] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 47.414438] page dumped because: kasan: bad access detected [ 47.419994] [ 47.421469] Memory state around the buggy address: [ 47.426248] ffff0008030dae80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 47.433452] ffff0008030daf00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 47.440658] >ffff0008030daf80: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc [ 47.447858] ^ [ 47.453158] ffff0008030db000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 47.460362] ffff0008030db080: 00 fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 [ 47.467565] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[ 46.854687] ================================================================== [ 46.864021] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 46.870617] Read of size 1 at addr ffff0008083ca9a8 by task kunit_try_catch/272 [ 46.877903] [ 46.879389] CPU: 2 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 46.879446] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.879465] Hardware name: WinLink E850-96 board (DT) [ 46.879488] Call trace: [ 46.879503] show_stack+0x20/0x38 (C) [ 46.879538] dump_stack_lvl+0x8c/0xd0 [ 46.879569] print_report+0x118/0x5d0 [ 46.879599] kasan_report+0xdc/0x128 [ 46.879624] __asan_report_load1_noabort+0x20/0x30 [ 46.879656] kmalloc_uaf2+0x3f4/0x468 [ 46.879685] kunit_try_run_case+0x170/0x3f0 [ 46.879726] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.879761] kthread+0x328/0x630 [ 46.879792] ret_from_fork+0x10/0x20 [ 46.879829] [ 46.942919] Allocated by task 272: [ 46.946306] kasan_save_stack+0x3c/0x68 [ 46.950122] kasan_save_track+0x20/0x40 [ 46.953943] kasan_save_alloc_info+0x40/0x58 [ 46.958195] __kasan_kmalloc+0xd4/0xd8 [ 46.961927] __kmalloc_cache_noprof+0x16c/0x3c0 [ 46.966441] kmalloc_uaf2+0xc4/0x468 [ 46.970000] kunit_try_run_case+0x170/0x3f0 [ 46.974167] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.979635] kthread+0x328/0x630 [ 46.982848] ret_from_fork+0x10/0x20 [ 46.986407] [ 46.987883] Freed by task 272: [ 46.990922] kasan_save_stack+0x3c/0x68 [ 46.994739] kasan_save_track+0x20/0x40 [ 46.998559] kasan_save_free_info+0x4c/0x78 [ 47.002726] __kasan_slab_free+0x6c/0x98 [ 47.006633] kfree+0x214/0x3c8 [ 47.009670] kmalloc_uaf2+0x134/0x468 [ 47.013316] kunit_try_run_case+0x170/0x3f0 [ 47.017484] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.022951] kthread+0x328/0x630 [ 47.026163] ret_from_fork+0x10/0x20 [ 47.029722] [ 47.031199] The buggy address belongs to the object at ffff0008083ca980 [ 47.031199] which belongs to the cache kmalloc-64 of size 64 [ 47.043526] The buggy address is located 40 bytes inside of [ 47.043526] freed 64-byte region [ffff0008083ca980, ffff0008083ca9c0) [ 47.055589] [ 47.057067] The buggy address belongs to the physical page: [ 47.062624] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8883ca [ 47.070609] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.077120] page_type: f5(slab) [ 47.080254] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 47.087976] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.095694] page dumped because: kasan: bad access detected [ 47.101248] [ 47.102724] Memory state around the buggy address: [ 47.107505] ffff0008083ca880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.114707] ffff0008083ca900: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.121913] >ffff0008083ca980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.129113] ^ [ 47.133631] ffff0008083caa00: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 47.140834] ffff0008083caa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.148037] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 46.549329] ================================================================== [ 46.557946] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 46.565062] Write of size 33 at addr ffff0008083fc280 by task kunit_try_catch/270 [ 46.572524] [ 46.574012] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 46.574068] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.574085] Hardware name: WinLink E850-96 board (DT) [ 46.574109] Call trace: [ 46.574123] show_stack+0x20/0x38 (C) [ 46.574161] dump_stack_lvl+0x8c/0xd0 [ 46.574194] print_report+0x118/0x5d0 [ 46.574222] kasan_report+0xdc/0x128 [ 46.574252] kasan_check_range+0x100/0x1a8 [ 46.574282] __asan_memset+0x34/0x78 [ 46.574313] kmalloc_uaf_memset+0x170/0x310 [ 46.574346] kunit_try_run_case+0x170/0x3f0 [ 46.574387] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.574420] kthread+0x328/0x630 [ 46.574451] ret_from_fork+0x10/0x20 [ 46.574483] [ 46.640927] Allocated by task 270: [ 46.644313] kasan_save_stack+0x3c/0x68 [ 46.648130] kasan_save_track+0x20/0x40 [ 46.651950] kasan_save_alloc_info+0x40/0x58 [ 46.656203] __kasan_kmalloc+0xd4/0xd8 [ 46.659936] __kmalloc_cache_noprof+0x16c/0x3c0 [ 46.664449] kmalloc_uaf_memset+0xb8/0x310 [ 46.668531] kunit_try_run_case+0x170/0x3f0 [ 46.672696] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.678164] kthread+0x328/0x630 [ 46.681376] ret_from_fork+0x10/0x20 [ 46.684935] [ 46.686412] Freed by task 270: [ 46.689450] kasan_save_stack+0x3c/0x68 [ 46.693269] kasan_save_track+0x20/0x40 [ 46.697088] kasan_save_free_info+0x4c/0x78 [ 46.701254] __kasan_slab_free+0x6c/0x98 [ 46.705161] kfree+0x214/0x3c8 [ 46.708199] kmalloc_uaf_memset+0x11c/0x310 [ 46.712366] kunit_try_run_case+0x170/0x3f0 [ 46.716532] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.722002] kthread+0x328/0x630 [ 46.725212] ret_from_fork+0x10/0x20 [ 46.728771] [ 46.730249] The buggy address belongs to the object at ffff0008083fc280 [ 46.730249] which belongs to the cache kmalloc-64 of size 64 [ 46.742575] The buggy address is located 0 bytes inside of [ 46.742575] freed 64-byte region [ffff0008083fc280, ffff0008083fc2c0) [ 46.754552] [ 46.756031] The buggy address belongs to the physical page: [ 46.761587] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8883fc [ 46.769573] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.776082] page_type: f5(slab) [ 46.779217] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 46.786937] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 46.794656] page dumped because: kasan: bad access detected [ 46.800211] [ 46.801686] Memory state around the buggy address: [ 46.806467] ffff0008083fc180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.813669] ffff0008083fc200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.820876] >ffff0008083fc280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.828075] ^ [ 46.831291] ffff0008083fc300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.838496] ffff0008083fc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.845698] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[ 46.244174] ================================================================== [ 46.254567] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 46.261072] Read of size 1 at addr ffff000806d01568 by task kunit_try_catch/268 [ 46.268362] [ 46.269848] CPU: 4 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 46.269909] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.269929] Hardware name: WinLink E850-96 board (DT) [ 46.269953] Call trace: [ 46.269966] show_stack+0x20/0x38 (C) [ 46.270003] dump_stack_lvl+0x8c/0xd0 [ 46.270036] print_report+0x118/0x5d0 [ 46.270067] kasan_report+0xdc/0x128 [ 46.270095] __asan_report_load1_noabort+0x20/0x30 [ 46.270128] kmalloc_uaf+0x300/0x338 [ 46.270159] kunit_try_run_case+0x170/0x3f0 [ 46.270199] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.270232] kthread+0x328/0x630 [ 46.270263] ret_from_fork+0x10/0x20 [ 46.270298] [ 46.333293] Allocated by task 268: [ 46.336680] kasan_save_stack+0x3c/0x68 [ 46.340498] kasan_save_track+0x20/0x40 [ 46.344317] kasan_save_alloc_info+0x40/0x58 [ 46.348568] __kasan_kmalloc+0xd4/0xd8 [ 46.352301] __kmalloc_cache_noprof+0x16c/0x3c0 [ 46.356815] kmalloc_uaf+0xb8/0x338 [ 46.360288] kunit_try_run_case+0x170/0x3f0 [ 46.364454] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.369923] kthread+0x328/0x630 [ 46.373134] ret_from_fork+0x10/0x20 [ 46.376694] [ 46.378170] Freed by task 268: [ 46.381209] kasan_save_stack+0x3c/0x68 [ 46.385026] kasan_save_track+0x20/0x40 [ 46.388846] kasan_save_free_info+0x4c/0x78 [ 46.393012] __kasan_slab_free+0x6c/0x98 [ 46.396918] kfree+0x214/0x3c8 [ 46.399957] kmalloc_uaf+0x11c/0x338 [ 46.403516] kunit_try_run_case+0x170/0x3f0 [ 46.407682] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.413151] kthread+0x328/0x630 [ 46.416363] ret_from_fork+0x10/0x20 [ 46.419922] [ 46.421399] The buggy address belongs to the object at ffff000806d01560 [ 46.421399] which belongs to the cache kmalloc-16 of size 16 [ 46.433725] The buggy address is located 8 bytes inside of [ 46.433725] freed 16-byte region [ffff000806d01560, ffff000806d01570) [ 46.445703] [ 46.447181] The buggy address belongs to the physical page: [ 46.452737] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886d01 [ 46.460722] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.467232] page_type: f5(slab) [ 46.470368] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 46.478087] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 46.485807] page dumped because: kasan: bad access detected [ 46.491362] [ 46.492837] Memory state around the buggy address: [ 46.497617] ffff000806d01400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 46.504820] ffff000806d01480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 46.512027] >ffff000806d01500: 00 05 fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 46.519226] ^ [ 46.525827] ffff000806d01580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.533033] ffff000806d01600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.540234] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 45.975989] ================================================================== [ 45.986516] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0 [ 45.994408] Read of size 64 at addr ffff0008083ca904 by task kunit_try_catch/266 [ 46.001787] [ 46.003274] CPU: 2 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 46.003333] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.003351] Hardware name: WinLink E850-96 board (DT) [ 46.003373] Call trace: [ 46.003386] show_stack+0x20/0x38 (C) [ 46.003422] dump_stack_lvl+0x8c/0xd0 [ 46.003455] print_report+0x118/0x5d0 [ 46.003487] kasan_report+0xdc/0x128 [ 46.003515] kasan_check_range+0x100/0x1a8 [ 46.003544] __asan_memmove+0x3c/0x98 [ 46.003573] kmalloc_memmove_invalid_size+0x154/0x2e0 [ 46.003608] kunit_try_run_case+0x170/0x3f0 [ 46.003646] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.003680] kthread+0x328/0x630 [ 46.003712] ret_from_fork+0x10/0x20 [ 46.003745] [ 46.071143] Allocated by task 266: [ 46.074531] kasan_save_stack+0x3c/0x68 [ 46.078347] kasan_save_track+0x20/0x40 [ 46.082167] kasan_save_alloc_info+0x40/0x58 [ 46.086420] __kasan_kmalloc+0xd4/0xd8 [ 46.090153] __kmalloc_cache_noprof+0x16c/0x3c0 [ 46.094666] kmalloc_memmove_invalid_size+0xb0/0x2e0 [ 46.099614] kunit_try_run_case+0x170/0x3f0 [ 46.103781] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.109249] kthread+0x328/0x630 [ 46.112461] ret_from_fork+0x10/0x20 [ 46.116020] [ 46.117497] The buggy address belongs to the object at ffff0008083ca900 [ 46.117497] which belongs to the cache kmalloc-64 of size 64 [ 46.129823] The buggy address is located 4 bytes inside of [ 46.129823] allocated 64-byte region [ffff0008083ca900, ffff0008083ca940) [ 46.142150] [ 46.143626] The buggy address belongs to the physical page: [ 46.149183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8883ca [ 46.157169] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.163676] page_type: f5(slab) [ 46.166814] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 46.174534] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 46.182253] page dumped because: kasan: bad access detected [ 46.187807] [ 46.189283] Memory state around the buggy address: [ 46.194064] ffff0008083ca800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.201265] ffff0008083ca880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.208473] >ffff0008083ca900: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 46.215672] ^ [ 46.220970] ffff0008083ca980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.228176] ffff0008083caa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.235376] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 45.710346] ================================================================== [ 45.719937] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 45.727486] Read of size 18446744073709551614 at addr ffff0008081c9284 by task kunit_try_catch/264 [ 45.736425] [ 45.737912] CPU: 4 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 45.737972] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.737989] Hardware name: WinLink E850-96 board (DT) [ 45.738012] Call trace: [ 45.738025] show_stack+0x20/0x38 (C) [ 45.738059] dump_stack_lvl+0x8c/0xd0 [ 45.738092] print_report+0x118/0x5d0 [ 45.738121] kasan_report+0xdc/0x128 [ 45.738148] kasan_check_range+0x100/0x1a8 [ 45.738181] __asan_memmove+0x3c/0x98 [ 45.738215] kmalloc_memmove_negative_size+0x154/0x2e0 [ 45.738249] kunit_try_run_case+0x170/0x3f0 [ 45.738288] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.738322] kthread+0x328/0x630 [ 45.738352] ret_from_fork+0x10/0x20 [ 45.738388] [ 45.805868] Allocated by task 264: [ 45.809257] kasan_save_stack+0x3c/0x68 [ 45.813073] kasan_save_track+0x20/0x40 [ 45.816893] kasan_save_alloc_info+0x40/0x58 [ 45.821146] __kasan_kmalloc+0xd4/0xd8 [ 45.824879] __kmalloc_cache_noprof+0x16c/0x3c0 [ 45.829393] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 45.834427] kunit_try_run_case+0x170/0x3f0 [ 45.838594] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.844063] kthread+0x328/0x630 [ 45.847274] ret_from_fork+0x10/0x20 [ 45.850833] [ 45.852311] The buggy address belongs to the object at ffff0008081c9280 [ 45.852311] which belongs to the cache kmalloc-64 of size 64 [ 45.864638] The buggy address is located 4 bytes inside of [ 45.864638] 64-byte region [ffff0008081c9280, ffff0008081c92c0) [ 45.876093] [ 45.877572] The buggy address belongs to the physical page: [ 45.883128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8881c9 [ 45.891113] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 45.897622] page_type: f5(slab) [ 45.900758] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 45.908478] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 45.916197] page dumped because: kasan: bad access detected [ 45.921752] [ 45.923228] Memory state around the buggy address: [ 45.928008] ffff0008081c9180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 45.935212] ffff0008081c9200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 45.942417] >ffff0008081c9280: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 45.949616] ^ [ 45.952832] ffff0008081c9300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.960037] ffff0008081c9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.967238] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[ 45.403157] ================================================================== [ 45.412737] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 45.420028] Write of size 16 at addr ffff00080193ae69 by task kunit_try_catch/262 [ 45.427490] [ 45.428974] CPU: 2 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 45.429027] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.429045] Hardware name: WinLink E850-96 board (DT) [ 45.429071] Call trace: [ 45.429083] show_stack+0x20/0x38 (C) [ 45.429119] dump_stack_lvl+0x8c/0xd0 [ 45.429151] print_report+0x118/0x5d0 [ 45.429180] kasan_report+0xdc/0x128 [ 45.429210] kasan_check_range+0x100/0x1a8 [ 45.429239] __asan_memset+0x34/0x78 [ 45.429269] kmalloc_oob_memset_16+0x150/0x2f8 [ 45.429302] kunit_try_run_case+0x170/0x3f0 [ 45.429339] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.429372] kthread+0x328/0x630 [ 45.429402] ret_from_fork+0x10/0x20 [ 45.429436] [ 45.496151] Allocated by task 262: [ 45.499540] kasan_save_stack+0x3c/0x68 [ 45.503356] kasan_save_track+0x20/0x40 [ 45.507175] kasan_save_alloc_info+0x40/0x58 [ 45.511428] __kasan_kmalloc+0xd4/0xd8 [ 45.515161] __kmalloc_cache_noprof+0x16c/0x3c0 [ 45.519675] kmalloc_oob_memset_16+0xb0/0x2f8 [ 45.524016] kunit_try_run_case+0x170/0x3f0 [ 45.528181] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.533651] kthread+0x328/0x630 [ 45.536862] ret_from_fork+0x10/0x20 [ 45.540421] [ 45.541898] The buggy address belongs to the object at ffff00080193ae00 [ 45.541898] which belongs to the cache kmalloc-128 of size 128 [ 45.554399] The buggy address is located 105 bytes inside of [ 45.554399] allocated 120-byte region [ffff00080193ae00, ffff00080193ae78) [ 45.566983] [ 45.568463] The buggy address belongs to the physical page: [ 45.574018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88193a [ 45.582003] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 45.589643] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 45.596585] page_type: f5(slab) [ 45.599721] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 45.607441] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 45.615167] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 45.622978] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 45.630791] head: 0bfffe0000000001 fffffdffe0064e81 00000000ffffffff 00000000ffffffff [ 45.638603] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 45.646409] page dumped because: kasan: bad access detected [ 45.651964] [ 45.653440] Memory state around the buggy address: [ 45.658220] ffff00080193ad00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 45.665423] ffff00080193ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.672632] >ffff00080193ae00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 45.679829] ^ [ 45.686950] ffff00080193ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.694155] ffff00080193af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.701356] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[ 45.096505] ================================================================== [ 45.105973] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 45.113176] Write of size 8 at addr ffff0008019acb71 by task kunit_try_catch/260 [ 45.120550] [ 45.122036] CPU: 3 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 45.122091] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.122107] Hardware name: WinLink E850-96 board (DT) [ 45.122130] Call trace: [ 45.122144] show_stack+0x20/0x38 (C) [ 45.122176] dump_stack_lvl+0x8c/0xd0 [ 45.122209] print_report+0x118/0x5d0 [ 45.122238] kasan_report+0xdc/0x128 [ 45.122264] kasan_check_range+0x100/0x1a8 [ 45.122293] __asan_memset+0x34/0x78 [ 45.122322] kmalloc_oob_memset_8+0x150/0x2f8 [ 45.122354] kunit_try_run_case+0x170/0x3f0 [ 45.122391] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.122423] kthread+0x328/0x630 [ 45.122453] ret_from_fork+0x10/0x20 [ 45.122489] [ 45.189126] Allocated by task 260: [ 45.192513] kasan_save_stack+0x3c/0x68 [ 45.196330] kasan_save_track+0x20/0x40 [ 45.200150] kasan_save_alloc_info+0x40/0x58 [ 45.204402] __kasan_kmalloc+0xd4/0xd8 [ 45.208134] __kmalloc_cache_noprof+0x16c/0x3c0 [ 45.212648] kmalloc_oob_memset_8+0xb0/0x2f8 [ 45.216901] kunit_try_run_case+0x170/0x3f0 [ 45.221068] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.226537] kthread+0x328/0x630 [ 45.229749] ret_from_fork+0x10/0x20 [ 45.233308] [ 45.234785] The buggy address belongs to the object at ffff0008019acb00 [ 45.234785] which belongs to the cache kmalloc-128 of size 128 [ 45.247287] The buggy address is located 113 bytes inside of [ 45.247287] allocated 120-byte region [ffff0008019acb00, ffff0008019acb78) [ 45.259870] [ 45.261350] The buggy address belongs to the physical page: [ 45.266906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8819ac [ 45.274889] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 45.282530] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 45.289471] page_type: f5(slab) [ 45.292609] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 45.300327] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 45.308054] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 45.315865] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 45.323678] head: 0bfffe0000000001 fffffdffe0066b01 00000000ffffffff 00000000ffffffff [ 45.331490] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 45.339296] page dumped because: kasan: bad access detected [ 45.344851] [ 45.346326] Memory state around the buggy address: [ 45.351108] ffff0008019aca00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 45.358310] ffff0008019aca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.365516] >ffff0008019acb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 45.372715] ^ [ 45.379837] ffff0008019acb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.387043] ffff0008019acc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.394244] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[ 44.789705] ================================================================== [ 44.799206] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 44.806408] Write of size 4 at addr ffff00080193ad75 by task kunit_try_catch/258 [ 44.813783] [ 44.815271] CPU: 2 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 44.815328] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.815344] Hardware name: WinLink E850-96 board (DT) [ 44.815365] Call trace: [ 44.815378] show_stack+0x20/0x38 (C) [ 44.815414] dump_stack_lvl+0x8c/0xd0 [ 44.815444] print_report+0x118/0x5d0 [ 44.815472] kasan_report+0xdc/0x128 [ 44.815499] kasan_check_range+0x100/0x1a8 [ 44.815528] __asan_memset+0x34/0x78 [ 44.815558] kmalloc_oob_memset_4+0x150/0x300 [ 44.815589] kunit_try_run_case+0x170/0x3f0 [ 44.815626] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.815659] kthread+0x328/0x630 [ 44.815689] ret_from_fork+0x10/0x20 [ 44.815722] [ 44.882358] Allocated by task 258: [ 44.885747] kasan_save_stack+0x3c/0x68 [ 44.889563] kasan_save_track+0x20/0x40 [ 44.893382] kasan_save_alloc_info+0x40/0x58 [ 44.897636] __kasan_kmalloc+0xd4/0xd8 [ 44.901368] __kmalloc_cache_noprof+0x16c/0x3c0 [ 44.905882] kmalloc_oob_memset_4+0xb0/0x300 [ 44.910137] kunit_try_run_case+0x170/0x3f0 [ 44.914302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.919771] kthread+0x328/0x630 [ 44.922983] ret_from_fork+0x10/0x20 [ 44.926542] [ 44.928019] The buggy address belongs to the object at ffff00080193ad00 [ 44.928019] which belongs to the cache kmalloc-128 of size 128 [ 44.940519] The buggy address is located 117 bytes inside of [ 44.940519] allocated 120-byte region [ffff00080193ad00, ffff00080193ad78) [ 44.953104] [ 44.954582] The buggy address belongs to the physical page: [ 44.960139] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88193a [ 44.968124] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 44.975762] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 44.982706] page_type: f5(slab) [ 44.985843] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 44.993561] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 45.001288] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 45.009099] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 45.016911] head: 0bfffe0000000001 fffffdffe0064e81 00000000ffffffff 00000000ffffffff [ 45.024724] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 45.032529] page dumped because: kasan: bad access detected [ 45.038085] [ 45.039560] Memory state around the buggy address: [ 45.044340] ffff00080193ac00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 45.051543] ffff00080193ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.058750] >ffff00080193ad00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 45.065949] ^ [ 45.073071] ffff00080193ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.080277] ffff00080193ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.087478] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[ 44.482651] ================================================================== [ 44.492439] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 44.499641] Write of size 2 at addr ffff0008019aca77 by task kunit_try_catch/256 [ 44.507017] [ 44.508505] CPU: 3 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 44.508560] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.508574] Hardware name: WinLink E850-96 board (DT) [ 44.508595] Call trace: [ 44.508607] show_stack+0x20/0x38 (C) [ 44.508642] dump_stack_lvl+0x8c/0xd0 [ 44.508676] print_report+0x118/0x5d0 [ 44.508704] kasan_report+0xdc/0x128 [ 44.508731] kasan_check_range+0x100/0x1a8 [ 44.508761] __asan_memset+0x34/0x78 [ 44.508790] kmalloc_oob_memset_2+0x150/0x2f8 [ 44.508821] kunit_try_run_case+0x170/0x3f0 [ 44.508857] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.508889] kthread+0x328/0x630 [ 44.508916] ret_from_fork+0x10/0x20 [ 44.508946] [ 44.575593] Allocated by task 256: [ 44.578981] kasan_save_stack+0x3c/0x68 [ 44.582797] kasan_save_track+0x20/0x40 [ 44.586617] kasan_save_alloc_info+0x40/0x58 [ 44.590869] __kasan_kmalloc+0xd4/0xd8 [ 44.594602] __kmalloc_cache_noprof+0x16c/0x3c0 [ 44.599116] kmalloc_oob_memset_2+0xb0/0x2f8 [ 44.603369] kunit_try_run_case+0x170/0x3f0 [ 44.607537] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.613005] kthread+0x328/0x630 [ 44.616216] ret_from_fork+0x10/0x20 [ 44.619775] [ 44.621252] The buggy address belongs to the object at ffff0008019aca00 [ 44.621252] which belongs to the cache kmalloc-128 of size 128 [ 44.633754] The buggy address is located 119 bytes inside of [ 44.633754] allocated 120-byte region [ffff0008019aca00, ffff0008019aca78) [ 44.646337] [ 44.647817] The buggy address belongs to the physical page: [ 44.653373] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8819ac [ 44.661356] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 44.668995] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 44.675939] page_type: f5(slab) [ 44.679076] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 44.686795] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 44.694523] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 44.702333] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 44.710145] head: 0bfffe0000000001 fffffdffe0066b01 00000000ffffffff 00000000ffffffff [ 44.717957] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 44.725763] page dumped because: kasan: bad access detected [ 44.731319] [ 44.732794] Memory state around the buggy address: [ 44.737574] ffff0008019ac900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 44.744777] ffff0008019ac980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.751983] >ffff0008019aca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 44.759183] ^ [ 44.766304] ffff0008019aca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.773509] ffff0008019acb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.780712] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 44.176135] ================================================================== [ 44.185329] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 44.192613] Write of size 128 at addr ffff00080193ac00 by task kunit_try_catch/254 [ 44.200163] [ 44.201652] CPU: 2 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 44.201710] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.201727] Hardware name: WinLink E850-96 board (DT) [ 44.201747] Call trace: [ 44.201761] show_stack+0x20/0x38 (C) [ 44.201798] dump_stack_lvl+0x8c/0xd0 [ 44.201830] print_report+0x118/0x5d0 [ 44.201859] kasan_report+0xdc/0x128 [ 44.201887] kasan_check_range+0x100/0x1a8 [ 44.201916] __asan_memset+0x34/0x78 [ 44.201943] kmalloc_oob_in_memset+0x144/0x2d0 [ 44.201974] kunit_try_run_case+0x170/0x3f0 [ 44.202013] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.202048] kthread+0x328/0x630 [ 44.202079] ret_from_fork+0x10/0x20 [ 44.202113] [ 44.268827] Allocated by task 254: [ 44.272215] kasan_save_stack+0x3c/0x68 [ 44.276030] kasan_save_track+0x20/0x40 [ 44.279850] kasan_save_alloc_info+0x40/0x58 [ 44.284103] __kasan_kmalloc+0xd4/0xd8 [ 44.287836] __kmalloc_cache_noprof+0x16c/0x3c0 [ 44.292350] kmalloc_oob_in_memset+0xb0/0x2d0 [ 44.296691] kunit_try_run_case+0x170/0x3f0 [ 44.300856] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.306325] kthread+0x328/0x630 [ 44.309537] ret_from_fork+0x10/0x20 [ 44.313096] [ 44.314573] The buggy address belongs to the object at ffff00080193ac00 [ 44.314573] which belongs to the cache kmalloc-128 of size 128 [ 44.327073] The buggy address is located 0 bytes inside of [ 44.327073] allocated 120-byte region [ffff00080193ac00, ffff00080193ac78) [ 44.339484] [ 44.340963] The buggy address belongs to the physical page: [ 44.346521] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88193a [ 44.354505] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 44.362143] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 44.369085] page_type: f5(slab) [ 44.372222] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 44.379942] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 44.387668] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 44.395480] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 44.403293] head: 0bfffe0000000001 fffffdffe0064e81 00000000ffffffff 00000000ffffffff [ 44.411104] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 44.418912] page dumped because: kasan: bad access detected [ 44.424465] [ 44.425941] Memory state around the buggy address: [ 44.430721] ffff00080193ab00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 44.437924] ffff00080193ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.445130] >ffff00080193ac00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 44.452330] ^ [ 44.459452] ffff00080193ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.466656] ffff00080193ad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.473858] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[ 43.873609] ================================================================== [ 43.882727] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 43.889493] Read of size 16 at addr ffff000800ba16a0 by task kunit_try_catch/252 [ 43.896871] [ 43.898356] CPU: 3 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 43.898416] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.898432] Hardware name: WinLink E850-96 board (DT) [ 43.898453] Call trace: [ 43.898466] show_stack+0x20/0x38 (C) [ 43.898500] dump_stack_lvl+0x8c/0xd0 [ 43.898534] print_report+0x118/0x5d0 [ 43.898563] kasan_report+0xdc/0x128 [ 43.898593] __asan_report_load16_noabort+0x20/0x30 [ 43.898628] kmalloc_uaf_16+0x3bc/0x438 [ 43.898658] kunit_try_run_case+0x170/0x3f0 [ 43.898698] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.898728] kthread+0x328/0x630 [ 43.898759] ret_from_fork+0x10/0x20 [ 43.898795] [ 43.962148] Allocated by task 252: [ 43.965534] kasan_save_stack+0x3c/0x68 [ 43.969351] kasan_save_track+0x20/0x40 [ 43.973171] kasan_save_alloc_info+0x40/0x58 [ 43.977424] __kasan_kmalloc+0xd4/0xd8 [ 43.981157] __kmalloc_cache_noprof+0x16c/0x3c0 [ 43.985670] kmalloc_uaf_16+0x140/0x438 [ 43.989489] kunit_try_run_case+0x170/0x3f0 [ 43.993656] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.999126] kthread+0x328/0x630 [ 44.002336] ret_from_fork+0x10/0x20 [ 44.005896] [ 44.007373] Freed by task 252: [ 44.010409] kasan_save_stack+0x3c/0x68 [ 44.014229] kasan_save_track+0x20/0x40 [ 44.018049] kasan_save_free_info+0x4c/0x78 [ 44.022215] __kasan_slab_free+0x6c/0x98 [ 44.026121] kfree+0x214/0x3c8 [ 44.029159] kmalloc_uaf_16+0x190/0x438 [ 44.032978] kunit_try_run_case+0x170/0x3f0 [ 44.037145] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.042614] kthread+0x328/0x630 [ 44.045826] ret_from_fork+0x10/0x20 [ 44.049384] [ 44.050863] The buggy address belongs to the object at ffff000800ba16a0 [ 44.050863] which belongs to the cache kmalloc-16 of size 16 [ 44.063188] The buggy address is located 0 bytes inside of [ 44.063188] freed 16-byte region [ffff000800ba16a0, ffff000800ba16b0) [ 44.075165] [ 44.076644] The buggy address belongs to the physical page: [ 44.082201] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ba1 [ 44.090185] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 44.096694] page_type: f5(slab) [ 44.099832] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 44.107550] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 44.115269] page dumped because: kasan: bad access detected [ 44.120824] [ 44.122300] Memory state around the buggy address: [ 44.127083] ffff000800ba1580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 44.134284] ffff000800ba1600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 44.141491] >ffff000800ba1680: 00 00 fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 44.148688] ^ [ 44.152946] ffff000800ba1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.160152] ffff000800ba1780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.167353] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[ 43.613999] ================================================================== [ 43.623006] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 43.629686] Write of size 16 at addr ffff000806d01520 by task kunit_try_catch/250 [ 43.637151] [ 43.638637] CPU: 4 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 43.638696] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.638710] Hardware name: WinLink E850-96 board (DT) [ 43.638731] Call trace: [ 43.638748] show_stack+0x20/0x38 (C) [ 43.638786] dump_stack_lvl+0x8c/0xd0 [ 43.638818] print_report+0x118/0x5d0 [ 43.638845] kasan_report+0xdc/0x128 [ 43.638870] __asan_report_store16_noabort+0x20/0x30 [ 43.638904] kmalloc_oob_16+0x3a0/0x3f8 [ 43.638933] kunit_try_run_case+0x170/0x3f0 [ 43.638972] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.639003] kthread+0x328/0x630 [ 43.639032] ret_from_fork+0x10/0x20 [ 43.639068] [ 43.702516] Allocated by task 250: [ 43.705902] kasan_save_stack+0x3c/0x68 [ 43.709720] kasan_save_track+0x20/0x40 [ 43.713539] kasan_save_alloc_info+0x40/0x58 [ 43.717792] __kasan_kmalloc+0xd4/0xd8 [ 43.721525] __kmalloc_cache_noprof+0x16c/0x3c0 [ 43.726039] kmalloc_oob_16+0xb4/0x3f8 [ 43.729771] kunit_try_run_case+0x170/0x3f0 [ 43.733938] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.739407] kthread+0x328/0x630 [ 43.742618] ret_from_fork+0x10/0x20 [ 43.746178] [ 43.747656] The buggy address belongs to the object at ffff000806d01520 [ 43.747656] which belongs to the cache kmalloc-16 of size 16 [ 43.759980] The buggy address is located 0 bytes inside of [ 43.759980] allocated 13-byte region [ffff000806d01520, ffff000806d0152d) [ 43.772305] [ 43.773783] The buggy address belongs to the physical page: [ 43.779340] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886d01 [ 43.787325] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.793834] page_type: f5(slab) [ 43.796970] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 43.804690] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 43.812409] page dumped because: kasan: bad access detected [ 43.817964] [ 43.819441] Memory state around the buggy address: [ 43.824220] ffff000806d01400: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 43.831423] ffff000806d01480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 43.838629] >ffff000806d01500: 00 05 fc fc 00 05 fc fc 00 00 fc fc fc fc fc fc [ 43.845830] ^ [ 43.850346] ffff000806d01580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.857553] ffff000806d01600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.864752] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 42.933526] ================================================================== [ 42.943331] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 42.949922] Read of size 1 at addr ffff0008030fd200 by task kunit_try_catch/248 [ 42.957213] [ 42.958700] CPU: 3 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 42.958761] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.958776] Hardware name: WinLink E850-96 board (DT) [ 42.958796] Call trace: [ 42.958809] show_stack+0x20/0x38 (C) [ 42.958844] dump_stack_lvl+0x8c/0xd0 [ 42.958874] print_report+0x118/0x5d0 [ 42.958901] kasan_report+0xdc/0x128 [ 42.958929] __kasan_check_byte+0x54/0x70 [ 42.958965] krealloc_noprof+0x44/0x360 [ 42.959002] krealloc_uaf+0x180/0x520 [ 42.959033] kunit_try_run_case+0x170/0x3f0 [ 42.959072] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.959104] kthread+0x328/0x630 [ 42.959135] ret_from_fork+0x10/0x20 [ 42.959171] [ 43.025270] Allocated by task 248: [ 43.028657] kasan_save_stack+0x3c/0x68 [ 43.032473] kasan_save_track+0x20/0x40 [ 43.036294] kasan_save_alloc_info+0x40/0x58 [ 43.040546] __kasan_kmalloc+0xd4/0xd8 [ 43.044278] __kmalloc_cache_noprof+0x16c/0x3c0 [ 43.048792] krealloc_uaf+0xc8/0x520 [ 43.052351] kunit_try_run_case+0x170/0x3f0 [ 43.056518] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.061986] kthread+0x328/0x630 [ 43.065198] ret_from_fork+0x10/0x20 [ 43.068757] [ 43.070234] Freed by task 248: [ 43.073273] kasan_save_stack+0x3c/0x68 [ 43.077090] kasan_save_track+0x20/0x40 [ 43.080908] kasan_save_free_info+0x4c/0x78 [ 43.085076] __kasan_slab_free+0x6c/0x98 [ 43.088984] kfree+0x214/0x3c8 [ 43.092020] krealloc_uaf+0x12c/0x520 [ 43.095666] kunit_try_run_case+0x170/0x3f0 [ 43.099833] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.105302] kthread+0x328/0x630 [ 43.108513] ret_from_fork+0x10/0x20 [ 43.112072] [ 43.113550] The buggy address belongs to the object at ffff0008030fd200 [ 43.113550] which belongs to the cache kmalloc-256 of size 256 [ 43.126052] The buggy address is located 0 bytes inside of [ 43.126052] freed 256-byte region [ffff0008030fd200, ffff0008030fd300) [ 43.138115] [ 43.139593] The buggy address belongs to the physical page: [ 43.145149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830fc [ 43.153133] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 43.160772] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 43.167714] page_type: f5(slab) [ 43.170853] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 43.178571] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 43.186298] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 43.194109] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 43.201922] head: 0bfffe0000000002 fffffdffe00c3f01 00000000ffffffff 00000000ffffffff [ 43.209734] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 43.217539] page dumped because: kasan: bad access detected [ 43.223094] [ 43.224570] Memory state around the buggy address: [ 43.229352] ffff0008030fd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.236553] ffff0008030fd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.243758] >ffff0008030fd200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 43.250959] ^ [ 43.254175] ffff0008030fd280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 43.261379] ffff0008030fd300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.268582] ================================================================== [ 43.275964] ================================================================== [ 43.283000] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 43.289587] Read of size 1 at addr ffff0008030fd200 by task kunit_try_catch/248 [ 43.296879] [ 43.298363] CPU: 3 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 43.298416] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.298431] Hardware name: WinLink E850-96 board (DT) [ 43.298452] Call trace: [ 43.298467] show_stack+0x20/0x38 (C) [ 43.298498] dump_stack_lvl+0x8c/0xd0 [ 43.298531] print_report+0x118/0x5d0 [ 43.298558] kasan_report+0xdc/0x128 [ 43.298585] __asan_report_load1_noabort+0x20/0x30 [ 43.298614] krealloc_uaf+0x4c8/0x520 [ 43.298644] kunit_try_run_case+0x170/0x3f0 [ 43.298681] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.298713] kthread+0x328/0x630 [ 43.298741] ret_from_fork+0x10/0x20 [ 43.298776] [ 43.361894] Allocated by task 248: [ 43.365283] kasan_save_stack+0x3c/0x68 [ 43.369100] kasan_save_track+0x20/0x40 [ 43.372919] kasan_save_alloc_info+0x40/0x58 [ 43.377172] __kasan_kmalloc+0xd4/0xd8 [ 43.380905] __kmalloc_cache_noprof+0x16c/0x3c0 [ 43.385419] krealloc_uaf+0xc8/0x520 [ 43.388978] kunit_try_run_case+0x170/0x3f0 [ 43.393145] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.398613] kthread+0x328/0x630 [ 43.401825] ret_from_fork+0x10/0x20 [ 43.405384] [ 43.406860] Freed by task 248: [ 43.409899] kasan_save_stack+0x3c/0x68 [ 43.413717] kasan_save_track+0x20/0x40 [ 43.417536] kasan_save_free_info+0x4c/0x78 [ 43.421703] __kasan_slab_free+0x6c/0x98 [ 43.425609] kfree+0x214/0x3c8 [ 43.428648] krealloc_uaf+0x12c/0x520 [ 43.432293] kunit_try_run_case+0x170/0x3f0 [ 43.436460] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.441928] kthread+0x328/0x630 [ 43.445140] ret_from_fork+0x10/0x20 [ 43.448699] [ 43.450175] The buggy address belongs to the object at ffff0008030fd200 [ 43.450175] which belongs to the cache kmalloc-256 of size 256 [ 43.462677] The buggy address is located 0 bytes inside of [ 43.462677] freed 256-byte region [ffff0008030fd200, ffff0008030fd300) [ 43.474740] [ 43.476220] The buggy address belongs to the physical page: [ 43.481776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830fc [ 43.489759] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 43.497399] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 43.504342] page_type: f5(slab) [ 43.507476] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 43.515198] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 43.522924] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 43.530736] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 43.538549] head: 0bfffe0000000002 fffffdffe00c3f01 00000000ffffffff 00000000ffffffff [ 43.546361] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 43.554166] page dumped because: kasan: bad access detected [ 43.559721] [ 43.561197] Memory state around the buggy address: [ 43.565977] ffff0008030fd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.573180] ffff0008030fd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.580385] >ffff0008030fd200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 43.587586] ^ [ 43.590801] ffff0008030fd280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 43.598006] ffff0008030fd300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.605207] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 40.065834] ================================================================== [ 40.072802] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 40.080347] Write of size 1 at addr ffff000801b81cd0 by task kunit_try_catch/242 [ 40.087725] [ 40.089210] CPU: 2 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 40.089261] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.089275] Hardware name: WinLink E850-96 board (DT) [ 40.089296] Call trace: [ 40.089307] show_stack+0x20/0x38 (C) [ 40.089341] dump_stack_lvl+0x8c/0xd0 [ 40.089373] print_report+0x118/0x5d0 [ 40.089401] kasan_report+0xdc/0x128 [ 40.089428] __asan_report_store1_noabort+0x20/0x30 [ 40.089461] krealloc_less_oob_helper+0xb9c/0xc50 [ 40.089494] krealloc_less_oob+0x20/0x38 [ 40.089525] kunit_try_run_case+0x170/0x3f0 [ 40.089563] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.089595] kthread+0x328/0x630 [ 40.089627] ret_from_fork+0x10/0x20 [ 40.089664] [ 40.157776] Allocated by task 242: [ 40.161165] kasan_save_stack+0x3c/0x68 [ 40.164981] kasan_save_track+0x20/0x40 [ 40.168802] kasan_save_alloc_info+0x40/0x58 [ 40.173054] __kasan_krealloc+0x118/0x178 [ 40.177047] krealloc_noprof+0x128/0x360 [ 40.180953] krealloc_less_oob_helper+0x168/0xc50 [ 40.185640] krealloc_less_oob+0x20/0x38 [ 40.189547] kunit_try_run_case+0x170/0x3f0 [ 40.193714] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.199182] kthread+0x328/0x630 [ 40.202394] ret_from_fork+0x10/0x20 [ 40.205953] [ 40.207430] The buggy address belongs to the object at ffff000801b81c00 [ 40.207430] which belongs to the cache kmalloc-256 of size 256 [ 40.219931] The buggy address is located 7 bytes to the right of [ 40.219931] allocated 201-byte region [ffff000801b81c00, ffff000801b81cc9) [ 40.232862] [ 40.234340] The buggy address belongs to the physical page: [ 40.239898] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881b80 [ 40.247881] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 40.255520] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 40.262462] page_type: f5(slab) [ 40.265600] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 40.273320] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 40.281046] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 40.288857] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 40.296670] head: 0bfffe0000000002 fffffdffe006e001 00000000ffffffff 00000000ffffffff [ 40.304482] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 40.312288] page dumped because: kasan: bad access detected [ 40.317843] [ 40.319319] Memory state around the buggy address: [ 40.324099] ffff000801b81b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.331302] ffff000801b81c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.338508] >ffff000801b81c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 40.345707] ^ [ 40.351527] ffff000801b81d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.358732] ffff000801b81d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.365933] ================================================================== [ 41.768554] ================================================================== [ 41.778591] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 41.786138] Write of size 1 at addr ffff000805b420c9 by task kunit_try_catch/246 [ 41.793516] [ 41.795001] CPU: 3 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 41.795059] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.795073] Hardware name: WinLink E850-96 board (DT) [ 41.795096] Call trace: [ 41.795111] show_stack+0x20/0x38 (C) [ 41.795147] dump_stack_lvl+0x8c/0xd0 [ 41.795180] print_report+0x118/0x5d0 [ 41.795210] kasan_report+0xdc/0x128 [ 41.795235] __asan_report_store1_noabort+0x20/0x30 [ 41.795271] krealloc_less_oob_helper+0xa48/0xc50 [ 41.795306] krealloc_large_less_oob+0x20/0x38 [ 41.795338] kunit_try_run_case+0x170/0x3f0 [ 41.795375] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.795407] kthread+0x328/0x630 [ 41.795437] ret_from_fork+0x10/0x20 [ 41.795474] [ 41.864090] The buggy address belongs to the physical page: [ 41.869648] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885b40 [ 41.877631] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 41.885271] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 41.892213] page_type: f8(unknown) [ 41.895609] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 41.903329] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 41.911056] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 41.918867] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 41.926680] head: 0bfffe0000000002 fffffdffe016d001 00000000ffffffff 00000000ffffffff [ 41.934493] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 41.942298] page dumped because: kasan: bad access detected [ 41.947853] [ 41.949329] Memory state around the buggy address: [ 41.954110] ffff000805b41f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.961312] ffff000805b42000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.968520] >ffff000805b42080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 41.975717] ^ [ 41.981277] ffff000805b42100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 41.988481] ffff000805b42180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 41.995684] ================================================================== [ 42.003187] ================================================================== [ 42.010100] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 42.017645] Write of size 1 at addr ffff000805b420d0 by task kunit_try_catch/246 [ 42.025023] [ 42.026507] CPU: 5 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 42.026561] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.026577] Hardware name: WinLink E850-96 board (DT) [ 42.026597] Call trace: [ 42.026613] show_stack+0x20/0x38 (C) [ 42.026649] dump_stack_lvl+0x8c/0xd0 [ 42.026682] print_report+0x118/0x5d0 [ 42.026711] kasan_report+0xdc/0x128 [ 42.026738] __asan_report_store1_noabort+0x20/0x30 [ 42.026771] krealloc_less_oob_helper+0xb9c/0xc50 [ 42.026806] krealloc_large_less_oob+0x20/0x38 [ 42.026838] kunit_try_run_case+0x170/0x3f0 [ 42.026878] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.026912] kthread+0x328/0x630 [ 42.026944] ret_from_fork+0x10/0x20 [ 42.026980] [ 42.095596] The buggy address belongs to the physical page: [ 42.101154] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885b40 [ 42.109138] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 42.116777] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 42.123719] page_type: f8(unknown) [ 42.127116] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 42.134836] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 42.142563] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 42.150374] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 42.158187] head: 0bfffe0000000002 fffffdffe016d001 00000000ffffffff 00000000ffffffff [ 42.165999] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 42.173805] page dumped because: kasan: bad access detected [ 42.179360] [ 42.180836] Memory state around the buggy address: [ 42.185618] ffff000805b41f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 42.192819] ffff000805b42000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 42.200027] >ffff000805b42080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 42.207225] ^ [ 42.213044] ffff000805b42100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 42.220249] ffff000805b42180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 42.227450] ================================================================== [ 40.681150] ================================================================== [ 40.688244] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 40.695789] Write of size 1 at addr ffff000801b81cea by task kunit_try_catch/242 [ 40.703167] [ 40.704652] CPU: 3 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 40.704702] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.704717] Hardware name: WinLink E850-96 board (DT) [ 40.704736] Call trace: [ 40.704750] show_stack+0x20/0x38 (C) [ 40.704784] dump_stack_lvl+0x8c/0xd0 [ 40.704815] print_report+0x118/0x5d0 [ 40.704842] kasan_report+0xdc/0x128 [ 40.704868] __asan_report_store1_noabort+0x20/0x30 [ 40.704899] krealloc_less_oob_helper+0xae4/0xc50 [ 40.704934] krealloc_less_oob+0x20/0x38 [ 40.704966] kunit_try_run_case+0x170/0x3f0 [ 40.705002] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.705036] kthread+0x328/0x630 [ 40.705066] ret_from_fork+0x10/0x20 [ 40.705100] [ 40.773218] Allocated by task 242: [ 40.776605] kasan_save_stack+0x3c/0x68 [ 40.780423] kasan_save_track+0x20/0x40 [ 40.784243] kasan_save_alloc_info+0x40/0x58 [ 40.788496] __kasan_krealloc+0x118/0x178 [ 40.792489] krealloc_noprof+0x128/0x360 [ 40.796395] krealloc_less_oob_helper+0x168/0xc50 [ 40.801082] krealloc_less_oob+0x20/0x38 [ 40.804989] kunit_try_run_case+0x170/0x3f0 [ 40.809155] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.814624] kthread+0x328/0x630 [ 40.817836] ret_from_fork+0x10/0x20 [ 40.821395] [ 40.822874] The buggy address belongs to the object at ffff000801b81c00 [ 40.822874] which belongs to the cache kmalloc-256 of size 256 [ 40.835371] The buggy address is located 33 bytes to the right of [ 40.835371] allocated 201-byte region [ffff000801b81c00, ffff000801b81cc9) [ 40.848391] [ 40.849869] The buggy address belongs to the physical page: [ 40.855425] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881b80 [ 40.863410] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 40.871048] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 40.877992] page_type: f5(slab) [ 40.881128] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 40.888848] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 40.896575] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 40.904386] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 40.912199] head: 0bfffe0000000002 fffffdffe006e001 00000000ffffffff 00000000ffffffff [ 40.920011] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 40.927817] page dumped because: kasan: bad access detected [ 40.933372] [ 40.934848] Memory state around the buggy address: [ 40.939627] ffff000801b81b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.946831] ffff000801b81c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.954037] >ffff000801b81c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 40.961237] ^ [ 40.967837] ffff000801b81d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.975042] ffff000801b81d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.982243] ================================================================== [ 42.234771] ================================================================== [ 42.241862] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 42.249412] Write of size 1 at addr ffff000805b420da by task kunit_try_catch/246 [ 42.256790] [ 42.258273] CPU: 5 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 42.258322] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.258337] Hardware name: WinLink E850-96 board (DT) [ 42.258353] Call trace: [ 42.258367] show_stack+0x20/0x38 (C) [ 42.258401] dump_stack_lvl+0x8c/0xd0 [ 42.258433] print_report+0x118/0x5d0 [ 42.258460] kasan_report+0xdc/0x128 [ 42.258488] __asan_report_store1_noabort+0x20/0x30 [ 42.258520] krealloc_less_oob_helper+0xa80/0xc50 [ 42.258553] krealloc_large_less_oob+0x20/0x38 [ 42.258585] kunit_try_run_case+0x170/0x3f0 [ 42.258621] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.258653] kthread+0x328/0x630 [ 42.258682] ret_from_fork+0x10/0x20 [ 42.258717] [ 42.327363] The buggy address belongs to the physical page: [ 42.332920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885b40 [ 42.340903] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 42.348544] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 42.355486] page_type: f8(unknown) [ 42.358882] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 42.366604] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 42.374330] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 42.382142] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 42.389955] head: 0bfffe0000000002 fffffdffe016d001 00000000ffffffff 00000000ffffffff [ 42.397767] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 42.405573] page dumped because: kasan: bad access detected [ 42.411128] [ 42.412603] Memory state around the buggy address: [ 42.417383] ffff000805b41f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 42.424586] ffff000805b42000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 42.431793] >ffff000805b42080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 42.438992] ^ [ 42.445072] ffff000805b42100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 42.452277] ffff000805b42180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 42.459478] ================================================================== [ 42.466762] ================================================================== [ 42.473890] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 42.481440] Write of size 1 at addr ffff000805b420ea by task kunit_try_catch/246 [ 42.488818] [ 42.490300] CPU: 5 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 42.490347] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.490363] Hardware name: WinLink E850-96 board (DT) [ 42.490381] Call trace: [ 42.490391] show_stack+0x20/0x38 (C) [ 42.490423] dump_stack_lvl+0x8c/0xd0 [ 42.490452] print_report+0x118/0x5d0 [ 42.490479] kasan_report+0xdc/0x128 [ 42.490505] __asan_report_store1_noabort+0x20/0x30 [ 42.490539] krealloc_less_oob_helper+0xae4/0xc50 [ 42.490573] krealloc_large_less_oob+0x20/0x38 [ 42.490605] kunit_try_run_case+0x170/0x3f0 [ 42.490643] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.490675] kthread+0x328/0x630 [ 42.490703] ret_from_fork+0x10/0x20 [ 42.490735] [ 42.559391] The buggy address belongs to the physical page: [ 42.564947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885b40 [ 42.572931] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 42.580572] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 42.587514] page_type: f8(unknown) [ 42.590909] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 42.598631] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 42.606358] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 42.614170] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 42.621982] head: 0bfffe0000000002 fffffdffe016d001 00000000ffffffff 00000000ffffffff [ 42.629794] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 42.637600] page dumped because: kasan: bad access detected [ 42.643155] [ 42.644631] Memory state around the buggy address: [ 42.649410] ffff000805b41f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 42.656614] ffff000805b42000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 42.663820] >ffff000805b42080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 42.671020] ^ [ 42.677621] ffff000805b42100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 42.684825] ffff000805b42180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 42.692027] ================================================================== [ 42.699325] ================================================================== [ 42.706438] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 42.713988] Write of size 1 at addr ffff000805b420eb by task kunit_try_catch/246 [ 42.721366] [ 42.722847] CPU: 5 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 42.722893] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.722908] Hardware name: WinLink E850-96 board (DT) [ 42.722925] Call trace: [ 42.722936] show_stack+0x20/0x38 (C) [ 42.722967] dump_stack_lvl+0x8c/0xd0 [ 42.722995] print_report+0x118/0x5d0 [ 42.723021] kasan_report+0xdc/0x128 [ 42.723047] __asan_report_store1_noabort+0x20/0x30 [ 42.723080] krealloc_less_oob_helper+0xa58/0xc50 [ 42.723114] krealloc_large_less_oob+0x20/0x38 [ 42.723148] kunit_try_run_case+0x170/0x3f0 [ 42.723184] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.723215] kthread+0x328/0x630 [ 42.723241] ret_from_fork+0x10/0x20 [ 42.723271] [ 42.791940] The buggy address belongs to the physical page: [ 42.797496] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885b40 [ 42.805480] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 42.813120] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 42.820063] page_type: f8(unknown) [ 42.823459] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 42.831180] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 42.838907] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 42.846718] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 42.854531] head: 0bfffe0000000002 fffffdffe016d001 00000000ffffffff 00000000ffffffff [ 42.862343] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 42.870149] page dumped because: kasan: bad access detected [ 42.875704] [ 42.877180] Memory state around the buggy address: [ 42.881959] ffff000805b41f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 42.889163] ffff000805b42000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 42.896368] >ffff000805b42080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 42.903568] ^ [ 42.910169] ffff000805b42100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 42.917374] ffff000805b42180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 42.924575] ================================================================== [ 40.373322] ================================================================== [ 40.380349] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 40.387895] Write of size 1 at addr ffff000801b81cda by task kunit_try_catch/242 [ 40.395273] [ 40.396756] CPU: 3 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 40.396812] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.396826] Hardware name: WinLink E850-96 board (DT) [ 40.396847] Call trace: [ 40.396864] show_stack+0x20/0x38 (C) [ 40.396899] dump_stack_lvl+0x8c/0xd0 [ 40.396929] print_report+0x118/0x5d0 [ 40.396955] kasan_report+0xdc/0x128 [ 40.396979] __asan_report_store1_noabort+0x20/0x30 [ 40.397012] krealloc_less_oob_helper+0xa80/0xc50 [ 40.397045] krealloc_less_oob+0x20/0x38 [ 40.397076] kunit_try_run_case+0x170/0x3f0 [ 40.397112] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.397145] kthread+0x328/0x630 [ 40.397174] ret_from_fork+0x10/0x20 [ 40.397211] [ 40.465325] Allocated by task 242: [ 40.468712] kasan_save_stack+0x3c/0x68 [ 40.472529] kasan_save_track+0x20/0x40 [ 40.476348] kasan_save_alloc_info+0x40/0x58 [ 40.480601] __kasan_krealloc+0x118/0x178 [ 40.484594] krealloc_noprof+0x128/0x360 [ 40.488500] krealloc_less_oob_helper+0x168/0xc50 [ 40.493188] krealloc_less_oob+0x20/0x38 [ 40.497094] kunit_try_run_case+0x170/0x3f0 [ 40.501260] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.506729] kthread+0x328/0x630 [ 40.509941] ret_from_fork+0x10/0x20 [ 40.513500] [ 40.514979] The buggy address belongs to the object at ffff000801b81c00 [ 40.514979] which belongs to the cache kmalloc-256 of size 256 [ 40.527476] The buggy address is located 17 bytes to the right of [ 40.527476] allocated 201-byte region [ffff000801b81c00, ffff000801b81cc9) [ 40.540496] [ 40.541974] The buggy address belongs to the physical page: [ 40.547531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881b80 [ 40.555515] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 40.563155] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 40.570098] page_type: f5(slab) [ 40.573232] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 40.580953] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 40.588680] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 40.596491] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 40.604304] head: 0bfffe0000000002 fffffdffe006e001 00000000ffffffff 00000000ffffffff [ 40.612116] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 40.619922] page dumped because: kasan: bad access detected [ 40.625477] [ 40.626953] Memory state around the buggy address: [ 40.631732] ffff000801b81b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.638936] ffff000801b81c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.646142] >ffff000801b81c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 40.653342] ^ [ 40.659422] ffff000801b81d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.666627] ffff000801b81d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.673828] ================================================================== [ 40.989552] ================================================================== [ 40.996657] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 41.004205] Write of size 1 at addr ffff000801b81ceb by task kunit_try_catch/242 [ 41.011583] [ 41.013068] CPU: 3 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 41.013122] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.013136] Hardware name: WinLink E850-96 board (DT) [ 41.013155] Call trace: [ 41.013169] show_stack+0x20/0x38 (C) [ 41.013202] dump_stack_lvl+0x8c/0xd0 [ 41.013235] print_report+0x118/0x5d0 [ 41.013263] kasan_report+0xdc/0x128 [ 41.013288] __asan_report_store1_noabort+0x20/0x30 [ 41.013319] krealloc_less_oob_helper+0xa58/0xc50 [ 41.013352] krealloc_less_oob+0x20/0x38 [ 41.013384] kunit_try_run_case+0x170/0x3f0 [ 41.013423] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.013454] kthread+0x328/0x630 [ 41.013482] ret_from_fork+0x10/0x20 [ 41.013515] [ 41.081634] Allocated by task 242: [ 41.085021] kasan_save_stack+0x3c/0x68 [ 41.088839] kasan_save_track+0x20/0x40 [ 41.092658] kasan_save_alloc_info+0x40/0x58 [ 41.096912] __kasan_krealloc+0x118/0x178 [ 41.100904] krealloc_noprof+0x128/0x360 [ 41.104811] krealloc_less_oob_helper+0x168/0xc50 [ 41.109498] krealloc_less_oob+0x20/0x38 [ 41.113404] kunit_try_run_case+0x170/0x3f0 [ 41.117571] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.123040] kthread+0x328/0x630 [ 41.126251] ret_from_fork+0x10/0x20 [ 41.129810] [ 41.131289] The buggy address belongs to the object at ffff000801b81c00 [ 41.131289] which belongs to the cache kmalloc-256 of size 256 [ 41.143789] The buggy address is located 34 bytes to the right of [ 41.143789] allocated 201-byte region [ffff000801b81c00, ffff000801b81cc9) [ 41.156807] [ 41.158284] The buggy address belongs to the physical page: [ 41.163840] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881b80 [ 41.171827] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 41.179464] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 41.186407] page_type: f5(slab) [ 41.189543] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 41.197264] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 41.204990] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 41.212801] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 41.220614] head: 0bfffe0000000002 fffffdffe006e001 00000000ffffffff 00000000ffffffff [ 41.228426] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 41.236234] page dumped because: kasan: bad access detected [ 41.241787] [ 41.243263] Memory state around the buggy address: [ 41.248043] ffff000801b81b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.255246] ffff000801b81c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.262454] >ffff000801b81c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 41.269652] ^ [ 41.276253] ffff000801b81d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.283457] ffff000801b81d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.290659] ================================================================== [ 39.756188] ================================================================== [ 39.765512] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 39.773063] Write of size 1 at addr ffff000801b81cc9 by task kunit_try_catch/242 [ 39.780441] [ 39.781924] CPU: 2 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 39.781980] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.781995] Hardware name: WinLink E850-96 board (DT) [ 39.782017] Call trace: [ 39.782029] show_stack+0x20/0x38 (C) [ 39.782063] dump_stack_lvl+0x8c/0xd0 [ 39.782098] print_report+0x118/0x5d0 [ 39.782129] kasan_report+0xdc/0x128 [ 39.782158] __asan_report_store1_noabort+0x20/0x30 [ 39.782193] krealloc_less_oob_helper+0xa48/0xc50 [ 39.782229] krealloc_less_oob+0x20/0x38 [ 39.782261] kunit_try_run_case+0x170/0x3f0 [ 39.782299] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.782331] kthread+0x328/0x630 [ 39.782361] ret_from_fork+0x10/0x20 [ 39.782394] [ 39.850489] Allocated by task 242: [ 39.853878] kasan_save_stack+0x3c/0x68 [ 39.857696] kasan_save_track+0x20/0x40 [ 39.861515] kasan_save_alloc_info+0x40/0x58 [ 39.865767] __kasan_krealloc+0x118/0x178 [ 39.869761] krealloc_noprof+0x128/0x360 [ 39.873666] krealloc_less_oob_helper+0x168/0xc50 [ 39.878353] krealloc_less_oob+0x20/0x38 [ 39.882259] kunit_try_run_case+0x170/0x3f0 [ 39.886426] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.891895] kthread+0x328/0x630 [ 39.895106] ret_from_fork+0x10/0x20 [ 39.898665] [ 39.900144] The buggy address belongs to the object at ffff000801b81c00 [ 39.900144] which belongs to the cache kmalloc-256 of size 256 [ 39.912646] The buggy address is located 0 bytes to the right of [ 39.912646] allocated 201-byte region [ffff000801b81c00, ffff000801b81cc9) [ 39.925577] [ 39.927055] The buggy address belongs to the physical page: [ 39.932611] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881b80 [ 39.940594] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 39.948235] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 39.955178] page_type: f5(slab) [ 39.958313] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 39.966032] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.973760] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 39.981570] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.989383] head: 0bfffe0000000002 fffffdffe006e001 00000000ffffffff 00000000ffffffff [ 39.997195] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 40.005001] page dumped because: kasan: bad access detected [ 40.010556] [ 40.012031] Memory state around the buggy address: [ 40.016812] ffff000801b81b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.024016] ffff000801b81c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.031221] >ffff000801b81c80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 40.038421] ^ [ 40.043979] ffff000801b81d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.051185] ffff000801b81d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.058386] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 39.135661] ================================================================== [ 39.144778] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 39.152325] Write of size 1 at addr ffff0008030fd0eb by task kunit_try_catch/240 [ 39.159701] [ 39.161189] CPU: 3 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 39.161249] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.161267] Hardware name: WinLink E850-96 board (DT) [ 39.161288] Call trace: [ 39.161300] show_stack+0x20/0x38 (C) [ 39.161339] dump_stack_lvl+0x8c/0xd0 [ 39.161372] print_report+0x118/0x5d0 [ 39.161401] kasan_report+0xdc/0x128 [ 39.161429] __asan_report_store1_noabort+0x20/0x30 [ 39.161464] krealloc_more_oob_helper+0x60c/0x678 [ 39.161499] krealloc_more_oob+0x20/0x38 [ 39.161531] kunit_try_run_case+0x170/0x3f0 [ 39.161570] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.161602] kthread+0x328/0x630 [ 39.161633] ret_from_fork+0x10/0x20 [ 39.161668] [ 39.229754] Allocated by task 240: [ 39.233141] kasan_save_stack+0x3c/0x68 [ 39.236957] kasan_save_track+0x20/0x40 [ 39.240776] kasan_save_alloc_info+0x40/0x58 [ 39.245030] __kasan_krealloc+0x118/0x178 [ 39.249022] krealloc_noprof+0x128/0x360 [ 39.252929] krealloc_more_oob_helper+0x168/0x678 [ 39.257616] krealloc_more_oob+0x20/0x38 [ 39.261522] kunit_try_run_case+0x170/0x3f0 [ 39.265689] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.271158] kthread+0x328/0x630 [ 39.274370] ret_from_fork+0x10/0x20 [ 39.277928] [ 39.279406] The buggy address belongs to the object at ffff0008030fd000 [ 39.279406] which belongs to the cache kmalloc-256 of size 256 [ 39.291908] The buggy address is located 0 bytes to the right of [ 39.291908] allocated 235-byte region [ffff0008030fd000, ffff0008030fd0eb) [ 39.304838] [ 39.306316] The buggy address belongs to the physical page: [ 39.311873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830fc [ 39.319857] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 39.327496] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 39.334441] page_type: f5(slab) [ 39.337576] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 39.345295] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.353024] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 39.360833] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.368646] head: 0bfffe0000000002 fffffdffe00c3f01 00000000ffffffff 00000000ffffffff [ 39.376458] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 39.384264] page dumped because: kasan: bad access detected [ 39.389819] [ 39.391295] Memory state around the buggy address: [ 39.396074] ffff0008030fcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.403280] ffff0008030fd000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.410485] >ffff0008030fd080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 39.417683] ^ [ 39.424284] ffff0008030fd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.431489] ffff0008030fd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.438691] ================================================================== [ 41.299455] ================================================================== [ 41.308891] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 41.316440] Write of size 1 at addr ffff0008057ce0eb by task kunit_try_catch/244 [ 41.323821] [ 41.325304] CPU: 2 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 41.325362] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.325378] Hardware name: WinLink E850-96 board (DT) [ 41.325401] Call trace: [ 41.325415] show_stack+0x20/0x38 (C) [ 41.325449] dump_stack_lvl+0x8c/0xd0 [ 41.325482] print_report+0x118/0x5d0 [ 41.325511] kasan_report+0xdc/0x128 [ 41.325536] __asan_report_store1_noabort+0x20/0x30 [ 41.325570] krealloc_more_oob_helper+0x60c/0x678 [ 41.325605] krealloc_large_more_oob+0x20/0x38 [ 41.325637] kunit_try_run_case+0x170/0x3f0 [ 41.325674] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.325706] kthread+0x328/0x630 [ 41.325737] ret_from_fork+0x10/0x20 [ 41.325774] [ 41.394393] The buggy address belongs to the physical page: [ 41.399949] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8857cc [ 41.407933] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 41.415572] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 41.422515] page_type: f8(unknown) [ 41.425912] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 41.433632] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 41.441358] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 41.449170] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 41.456983] head: 0bfffe0000000002 fffffdffe015f301 00000000ffffffff 00000000ffffffff [ 41.464794] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 41.472600] page dumped because: kasan: bad access detected [ 41.478156] [ 41.479631] Memory state around the buggy address: [ 41.484413] ffff0008057cdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.491614] ffff0008057ce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.498822] >ffff0008057ce080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 41.506020] ^ [ 41.512621] ffff0008057ce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 41.519825] ffff0008057ce180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 41.527026] ================================================================== [ 39.446147] ================================================================== [ 39.453105] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 39.460652] Write of size 1 at addr ffff0008030fd0f0 by task kunit_try_catch/240 [ 39.468030] [ 39.469514] CPU: 3 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 39.469569] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.469584] Hardware name: WinLink E850-96 board (DT) [ 39.469606] Call trace: [ 39.469618] show_stack+0x20/0x38 (C) [ 39.469653] dump_stack_lvl+0x8c/0xd0 [ 39.469685] print_report+0x118/0x5d0 [ 39.469715] kasan_report+0xdc/0x128 [ 39.469740] __asan_report_store1_noabort+0x20/0x30 [ 39.469774] krealloc_more_oob_helper+0x5c0/0x678 [ 39.469810] krealloc_more_oob+0x20/0x38 [ 39.469840] kunit_try_run_case+0x170/0x3f0 [ 39.469878] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.469909] kthread+0x328/0x630 [ 39.469937] ret_from_fork+0x10/0x20 [ 39.469973] [ 39.538081] Allocated by task 240: [ 39.541468] kasan_save_stack+0x3c/0x68 [ 39.545285] kasan_save_track+0x20/0x40 [ 39.549105] kasan_save_alloc_info+0x40/0x58 [ 39.553358] __kasan_krealloc+0x118/0x178 [ 39.557351] krealloc_noprof+0x128/0x360 [ 39.561257] krealloc_more_oob_helper+0x168/0x678 [ 39.565945] krealloc_more_oob+0x20/0x38 [ 39.569851] kunit_try_run_case+0x170/0x3f0 [ 39.574018] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.579486] kthread+0x328/0x630 [ 39.582698] ret_from_fork+0x10/0x20 [ 39.586257] [ 39.587734] The buggy address belongs to the object at ffff0008030fd000 [ 39.587734] which belongs to the cache kmalloc-256 of size 256 [ 39.600234] The buggy address is located 5 bytes to the right of [ 39.600234] allocated 235-byte region [ffff0008030fd000, ffff0008030fd0eb) [ 39.613168] [ 39.614644] The buggy address belongs to the physical page: [ 39.620202] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830fc [ 39.628185] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 39.635825] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 39.642768] page_type: f5(slab) [ 39.645902] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 39.653624] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.661350] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 39.669161] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.676975] head: 0bfffe0000000002 fffffdffe00c3f01 00000000ffffffff 00000000ffffffff [ 39.684786] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 39.692592] page dumped because: kasan: bad access detected [ 39.698148] [ 39.699624] Memory state around the buggy address: [ 39.704404] ffff0008030fcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.711606] ffff0008030fd000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.718812] >ffff0008030fd080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 39.726012] ^ [ 39.732873] ffff0008030fd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.740078] ffff0008030fd180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.747279] ================================================================== [ 41.534367] ================================================================== [ 41.541442] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 41.548988] Write of size 1 at addr ffff0008057ce0f0 by task kunit_try_catch/244 [ 41.556366] [ 41.557849] CPU: 2 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 41.557900] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.557914] Hardware name: WinLink E850-96 board (DT) [ 41.557934] Call trace: [ 41.557948] show_stack+0x20/0x38 (C) [ 41.557979] dump_stack_lvl+0x8c/0xd0 [ 41.558011] print_report+0x118/0x5d0 [ 41.558037] kasan_report+0xdc/0x128 [ 41.558063] __asan_report_store1_noabort+0x20/0x30 [ 41.558095] krealloc_more_oob_helper+0x5c0/0x678 [ 41.558128] krealloc_large_more_oob+0x20/0x38 [ 41.558162] kunit_try_run_case+0x170/0x3f0 [ 41.558198] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.558230] kthread+0x328/0x630 [ 41.558260] ret_from_fork+0x10/0x20 [ 41.558294] [ 41.626940] The buggy address belongs to the physical page: [ 41.632498] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8857cc [ 41.640481] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 41.648121] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 41.655063] page_type: f8(unknown) [ 41.658460] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 41.666180] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 41.673906] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 41.681718] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 41.689531] head: 0bfffe0000000002 fffffdffe015f301 00000000ffffffff 00000000ffffffff [ 41.697343] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 41.705149] page dumped because: kasan: bad access detected [ 41.710704] [ 41.712180] Memory state around the buggy address: [ 41.716961] ffff0008057cdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.724163] ffff0008057ce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.731369] >ffff0008057ce080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 41.738568] ^ [ 41.745430] ffff0008057ce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 41.752634] ffff0008057ce180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 41.759836] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 38.943837] ================================================================== [ 38.958235] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 38.964566] Read of size 1 at addr ffff0008084e0000 by task kunit_try_catch/238 [ 38.971857] [ 38.973346] CPU: 5 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 38.973406] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.973421] Hardware name: WinLink E850-96 board (DT) [ 38.973442] Call trace: [ 38.973455] show_stack+0x20/0x38 (C) [ 38.973492] dump_stack_lvl+0x8c/0xd0 [ 38.973525] print_report+0x118/0x5d0 [ 38.973553] kasan_report+0xdc/0x128 [ 38.973580] __asan_report_load1_noabort+0x20/0x30 [ 38.973613] page_alloc_uaf+0x328/0x350 [ 38.973646] kunit_try_run_case+0x170/0x3f0 [ 38.973684] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.973718] kthread+0x328/0x630 [ 38.973748] ret_from_fork+0x10/0x20 [ 38.973782] [ 39.037049] The buggy address belongs to the physical page: [ 39.042606] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8884e0 [ 39.050592] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.057100] page_type: f0(buddy) [ 39.060322] raw: 0bfffe0000000000 ffff00087f61bd08 ffff00087f61bd08 0000000000000000 [ 39.068042] raw: 0000000000000000 0000000000000005 00000000f0000000 0000000000000000 [ 39.075762] page dumped because: kasan: bad access detected [ 39.081317] [ 39.082792] Memory state around the buggy address: [ 39.087572] ffff0008084dff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.094775] ffff0008084dff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.101982] >ffff0008084e0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.109181] ^ [ 39.112396] ffff0008084e0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.119601] ffff0008084e0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.126805] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree
[ 38.707386] ================================================================== [ 38.716742] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 38.722124] Free of addr ffff000805b3c001 by task kunit_try_catch/234 [ 38.728546] [ 38.730033] CPU: 3 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 38.730092] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.730109] Hardware name: WinLink E850-96 board (DT) [ 38.730132] Call trace: [ 38.730148] show_stack+0x20/0x38 (C) [ 38.730184] dump_stack_lvl+0x8c/0xd0 [ 38.730216] print_report+0x118/0x5d0 [ 38.730245] kasan_report_invalid_free+0xc0/0xe8 [ 38.730276] __kasan_kfree_large+0x5c/0xa8 [ 38.730313] free_large_kmalloc+0x68/0x150 [ 38.730347] kfree+0x270/0x3c8 [ 38.730376] kmalloc_large_invalid_free+0x108/0x270 [ 38.730412] kunit_try_run_case+0x170/0x3f0 [ 38.730451] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.730483] kthread+0x328/0x630 [ 38.730512] ret_from_fork+0x10/0x20 [ 38.730547] [ 38.802245] The buggy address belongs to the physical page: [ 38.807801] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885b3c [ 38.815784] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 38.823424] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 38.830368] page_type: f8(unknown) [ 38.833766] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 38.841483] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 38.849212] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 38.857021] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 38.864836] head: 0bfffe0000000002 fffffdffe016cf01 00000000ffffffff 00000000ffffffff [ 38.872646] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 38.880452] page dumped because: kasan: bad access detected [ 38.886007] [ 38.887483] Memory state around the buggy address: [ 38.892266] ffff000805b3bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.899467] ffff000805b3bf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.906674] >ffff000805b3c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.913871] ^ [ 38.917086] ffff000805b3c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.924293] ffff000805b3c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.931493] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 38.522743] ================================================================== [ 38.532718] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 38.539313] Read of size 1 at addr ffff000806dc4000 by task kunit_try_catch/232 [ 38.546603] [ 38.548089] CPU: 4 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 38.548146] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.548163] Hardware name: WinLink E850-96 board (DT) [ 38.548185] Call trace: [ 38.548200] show_stack+0x20/0x38 (C) [ 38.548236] dump_stack_lvl+0x8c/0xd0 [ 38.548271] print_report+0x118/0x5d0 [ 38.548303] kasan_report+0xdc/0x128 [ 38.548330] __asan_report_load1_noabort+0x20/0x30 [ 38.548366] kmalloc_large_uaf+0x2cc/0x2f8 [ 38.548399] kunit_try_run_case+0x170/0x3f0 [ 38.548437] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.548469] kthread+0x328/0x630 [ 38.548499] ret_from_fork+0x10/0x20 [ 38.548535] [ 38.612057] The buggy address belongs to the physical page: [ 38.617612] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886dc4 [ 38.625596] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.632117] raw: 0bfffe0000000000 fffffdffe01b7208 ffff00085afabfc0 0000000000000000 [ 38.639837] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 38.647558] page dumped because: kasan: bad access detected [ 38.653111] [ 38.654587] Memory state around the buggy address: [ 38.659367] ffff000806dc3f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.666570] ffff000806dc3f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.673777] >ffff000806dc4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.680976] ^ [ 38.684191] ffff000806dc4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.691396] ffff000806dc4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.698597] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 38.294314] ================================================================== [ 38.303645] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 38.311106] Write of size 1 at addr ffff000805b3e00a by task kunit_try_catch/230 [ 38.318481] [ 38.319967] CPU: 3 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 38.320026] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.320040] Hardware name: WinLink E850-96 board (DT) [ 38.320061] Call trace: [ 38.320074] show_stack+0x20/0x38 (C) [ 38.320112] dump_stack_lvl+0x8c/0xd0 [ 38.320145] print_report+0x118/0x5d0 [ 38.320176] kasan_report+0xdc/0x128 [ 38.320203] __asan_report_store1_noabort+0x20/0x30 [ 38.320239] kmalloc_large_oob_right+0x278/0x2b8 [ 38.320274] kunit_try_run_case+0x170/0x3f0 [ 38.320312] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.320343] kthread+0x328/0x630 [ 38.320372] ret_from_fork+0x10/0x20 [ 38.320407] [ 38.384543] The buggy address belongs to the physical page: [ 38.390098] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885b3c [ 38.398082] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 38.405722] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 38.412664] page_type: f8(unknown) [ 38.416061] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 38.423781] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 38.431509] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 38.439319] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 38.447132] head: 0bfffe0000000002 fffffdffe016cf01 00000000ffffffff 00000000ffffffff [ 38.454944] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 38.462749] page dumped because: kasan: bad access detected [ 38.468305] [ 38.469780] Memory state around the buggy address: [ 38.474561] ffff000805b3df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.481765] ffff000805b3df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.488971] >ffff000805b3e000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 38.496169] ^ [ 38.499645] ffff000805b3e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 38.506849] ffff000805b3e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 38.514051] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 37.992072] ================================================================== [ 38.002873] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 38.010155] Write of size 1 at addr ffff000800df1f00 by task kunit_try_catch/228 [ 38.017530] [ 38.019017] CPU: 4 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 38.019070] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.019087] Hardware name: WinLink E850-96 board (DT) [ 38.019109] Call trace: [ 38.019122] show_stack+0x20/0x38 (C) [ 38.019158] dump_stack_lvl+0x8c/0xd0 [ 38.019189] print_report+0x118/0x5d0 [ 38.019219] kasan_report+0xdc/0x128 [ 38.019248] __asan_report_store1_noabort+0x20/0x30 [ 38.019284] kmalloc_big_oob_right+0x2a4/0x2f0 [ 38.019315] kunit_try_run_case+0x170/0x3f0 [ 38.019353] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.019386] kthread+0x328/0x630 [ 38.019415] ret_from_fork+0x10/0x20 [ 38.019452] [ 38.083417] Allocated by task 228: [ 38.086804] kasan_save_stack+0x3c/0x68 [ 38.090620] kasan_save_track+0x20/0x40 [ 38.094439] kasan_save_alloc_info+0x40/0x58 [ 38.098693] __kasan_kmalloc+0xd4/0xd8 [ 38.102427] __kmalloc_cache_noprof+0x16c/0x3c0 [ 38.106939] kmalloc_big_oob_right+0xb8/0x2f0 [ 38.111279] kunit_try_run_case+0x170/0x3f0 [ 38.115446] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.120914] kthread+0x328/0x630 [ 38.124126] ret_from_fork+0x10/0x20 [ 38.127685] [ 38.129162] The buggy address belongs to the object at ffff000800df0000 [ 38.129162] which belongs to the cache kmalloc-8k of size 8192 [ 38.141665] The buggy address is located 0 bytes to the right of [ 38.141665] allocated 7936-byte region [ffff000800df0000, ffff000800df1f00) [ 38.154683] [ 38.156161] The buggy address belongs to the physical page: [ 38.161716] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880df0 [ 38.169701] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 38.177340] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 38.184283] page_type: f5(slab) [ 38.187419] raw: 0bfffe0000000040 ffff000800003180 dead000000000122 0000000000000000 [ 38.195139] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 38.202865] head: 0bfffe0000000040 ffff000800003180 dead000000000122 0000000000000000 [ 38.210677] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 38.218490] head: 0bfffe0000000003 fffffdffe0037c01 00000000ffffffff 00000000ffffffff [ 38.226303] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 38.234107] page dumped because: kasan: bad access detected [ 38.239663] [ 38.241138] Memory state around the buggy address: [ 38.245918] ffff000800df1e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.253121] ffff000800df1e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.260327] >ffff000800df1f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.267527] ^ [ 38.270743] ffff000800df1f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.277948] ffff000800df2000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.285150] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[ 37.523285] ================================================================== [ 37.533081] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 37.541150] Write of size 1 at addr ffff00080193aa78 by task kunit_try_catch/226 [ 37.548527] [ 37.550015] CPU: 2 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 37.550073] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.550089] Hardware name: WinLink E850-96 board (DT) [ 37.550111] Call trace: [ 37.550126] show_stack+0x20/0x38 (C) [ 37.550159] dump_stack_lvl+0x8c/0xd0 [ 37.550194] print_report+0x118/0x5d0 [ 37.550223] kasan_report+0xdc/0x128 [ 37.550249] __asan_report_store1_noabort+0x20/0x30 [ 37.550289] kmalloc_track_caller_oob_right+0x40c/0x488 [ 37.550325] kunit_try_run_case+0x170/0x3f0 [ 37.550362] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.550395] kthread+0x328/0x630 [ 37.550425] ret_from_fork+0x10/0x20 [ 37.550461] [ 37.615194] Allocated by task 226: [ 37.618584] kasan_save_stack+0x3c/0x68 [ 37.622398] kasan_save_track+0x20/0x40 [ 37.626217] kasan_save_alloc_info+0x40/0x58 [ 37.630470] __kasan_kmalloc+0xd4/0xd8 [ 37.634203] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 37.639758] kmalloc_track_caller_oob_right+0xa8/0x488 [ 37.644880] kunit_try_run_case+0x170/0x3f0 [ 37.649046] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.654517] kthread+0x328/0x630 [ 37.657727] ret_from_fork+0x10/0x20 [ 37.661286] [ 37.662764] The buggy address belongs to the object at ffff00080193aa00 [ 37.662764] which belongs to the cache kmalloc-128 of size 128 [ 37.675264] The buggy address is located 0 bytes to the right of [ 37.675264] allocated 120-byte region [ffff00080193aa00, ffff00080193aa78) [ 37.688195] [ 37.689674] The buggy address belongs to the physical page: [ 37.695232] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88193a [ 37.703214] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 37.710853] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 37.717797] page_type: f5(slab) [ 37.720931] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 37.728652] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.736381] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 37.744191] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.752004] head: 0bfffe0000000001 fffffdffe0064e81 00000000ffffffff 00000000ffffffff [ 37.759816] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 37.767621] page dumped because: kasan: bad access detected [ 37.773176] [ 37.774652] Memory state around the buggy address: [ 37.779431] ffff00080193a900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.786635] ffff00080193a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.793842] >ffff00080193aa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.801041] ^ [ 37.808163] ffff00080193aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.815367] ffff00080193ab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.822570] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 37.222461] ================================================================== [ 37.231700] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 37.239072] Read of size 1 at addr ffff000807c37000 by task kunit_try_catch/224 [ 37.246362] [ 37.247848] CPU: 4 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 37.247908] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.247922] Hardware name: WinLink E850-96 board (DT) [ 37.247944] Call trace: [ 37.247959] show_stack+0x20/0x38 (C) [ 37.247995] dump_stack_lvl+0x8c/0xd0 [ 37.248029] print_report+0x118/0x5d0 [ 37.248058] kasan_report+0xdc/0x128 [ 37.248084] __asan_report_load1_noabort+0x20/0x30 [ 37.248116] kmalloc_node_oob_right+0x2f4/0x330 [ 37.248148] kunit_try_run_case+0x170/0x3f0 [ 37.248191] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.248225] kthread+0x328/0x630 [ 37.248254] ret_from_fork+0x10/0x20 [ 37.248289] [ 37.312248] Allocated by task 224: [ 37.315636] kasan_save_stack+0x3c/0x68 [ 37.319451] kasan_save_track+0x20/0x40 [ 37.323270] kasan_save_alloc_info+0x40/0x58 [ 37.327524] __kasan_kmalloc+0xd4/0xd8 [ 37.331256] __kmalloc_cache_node_noprof+0x178/0x3d0 [ 37.336204] kmalloc_node_oob_right+0xbc/0x330 [ 37.340631] kunit_try_run_case+0x170/0x3f0 [ 37.344798] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.350266] kthread+0x328/0x630 [ 37.353478] ret_from_fork+0x10/0x20 [ 37.357037] [ 37.358514] The buggy address belongs to the object at ffff000807c36000 [ 37.358514] which belongs to the cache kmalloc-4k of size 4096 [ 37.371015] The buggy address is located 0 bytes to the right of [ 37.371015] allocated 4096-byte region [ffff000807c36000, ffff000807c37000) [ 37.384033] [ 37.385511] The buggy address belongs to the physical page: [ 37.391069] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887c30 [ 37.399052] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 37.406692] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 37.413635] page_type: f5(slab) [ 37.416771] raw: 0bfffe0000000040 ffff000800003040 dead000000000122 0000000000000000 [ 37.424490] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 37.432218] head: 0bfffe0000000040 ffff000800003040 dead000000000122 0000000000000000 [ 37.440028] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 37.447842] head: 0bfffe0000000003 fffffdffe01f0c01 00000000ffffffff 00000000ffffffff [ 37.455654] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 37.463459] page dumped because: kasan: bad access detected [ 37.469015] [ 37.470490] Memory state around the buggy address: [ 37.475270] ffff000807c36f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.482473] ffff000807c36f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.489679] >ffff000807c37000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.496879] ^ [ 37.500095] ffff000807c37080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.507299] ffff000807c37100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.514501] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 36.826608] ================================================================== [ 36.835869] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 36.842723] Read of size 1 at addr ffff000800ba165f by task kunit_try_catch/222 [ 36.850015] [ 36.851499] CPU: 3 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 36.851551] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.851569] Hardware name: WinLink E850-96 board (DT) [ 36.851591] Call trace: [ 36.851605] show_stack+0x20/0x38 (C) [ 36.851642] dump_stack_lvl+0x8c/0xd0 [ 36.851673] print_report+0x118/0x5d0 [ 36.851701] kasan_report+0xdc/0x128 [ 36.851729] __asan_report_load1_noabort+0x20/0x30 [ 36.851763] kmalloc_oob_left+0x2ec/0x320 [ 36.851795] kunit_try_run_case+0x170/0x3f0 [ 36.851833] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.851865] kthread+0x328/0x630 [ 36.851893] ret_from_fork+0x10/0x20 [ 36.851926] [ 36.915377] Allocated by task 12: [ 36.918680] kasan_save_stack+0x3c/0x68 [ 36.922495] kasan_save_track+0x20/0x40 [ 36.926314] kasan_save_alloc_info+0x40/0x58 [ 36.930568] __kasan_kmalloc+0xd4/0xd8 [ 36.934302] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 36.939856] kstrdup+0x54/0xc8 [ 36.942894] kstrdup_const+0x48/0x60 [ 36.946453] __kernfs_new_node+0xb0/0x578 [ 36.950446] kernfs_new_node+0x128/0x1a8 [ 36.954352] kernfs_create_link+0xac/0x228 [ 36.958432] sysfs_do_create_link_sd+0x8c/0x128 [ 36.962946] sysfs_create_link_nowarn+0x48/0xb8 [ 36.967461] link_and_create_debugfs+0x70/0x440 [ 36.971974] _regulator_get_common+0x2ac/0x8d0 [ 36.976400] _regulator_get+0x48/0xa0 [ 36.980046] _devm_regulator_get+0x60/0xd0 [ 36.984126] devm_regulator_get_optional+0x1c/0x30 [ 36.988900] usb_conn_probe+0x21c/0xa80 [ 36.992719] platform_probe+0xcc/0x180 [ 36.996452] really_probe+0x188/0x7f0 [ 37.000100] __driver_probe_device+0x164/0x378 [ 37.004525] driver_probe_device+0x64/0x180 [ 37.008692] __device_attach_driver+0x174/0x280 [ 37.013205] bus_for_each_drv+0x118/0x1b0 [ 37.017198] __device_attach+0x174/0x378 [ 37.021105] device_initial_probe+0x1c/0x30 [ 37.025271] bus_probe_device+0x12c/0x170 [ 37.029264] deferred_probe_work_func+0x140/0x208 [ 37.033953] process_one_work+0x530/0xf98 [ 37.037945] worker_thread+0x618/0xf38 [ 37.041677] kthread+0x328/0x630 [ 37.044889] ret_from_fork+0x10/0x20 [ 37.048448] [ 37.049925] Freed by task 0: [ 37.052792] kasan_save_stack+0x3c/0x68 [ 37.056608] kasan_save_track+0x20/0x40 [ 37.060428] kasan_save_free_info+0x4c/0x78 [ 37.064593] __kasan_slab_free+0x6c/0x98 [ 37.068500] kfree+0x214/0x3c8 [ 37.071538] kfree_const+0x3c/0x50 [ 37.074923] kernfs_free_rcu+0x4c/0x120 [ 37.078743] rcu_core+0x9f4/0x1e20 [ 37.082128] rcu_core_si+0x18/0x30 [ 37.085513] handle_softirqs+0x374/0xb28 [ 37.089421] __do_softirq+0x1c/0x28 [ 37.092892] [ 37.094371] The buggy address belongs to the object at ffff000800ba1640 [ 37.094371] which belongs to the cache kmalloc-16 of size 16 [ 37.106695] The buggy address is located 15 bytes to the right of [ 37.106695] allocated 16-byte region [ffff000800ba1640, ffff000800ba1650) [ 37.119627] [ 37.121108] The buggy address belongs to the physical page: [ 37.126663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880ba1 [ 37.134647] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.141158] page_type: f5(slab) [ 37.144293] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 37.152013] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 37.159733] page dumped because: kasan: bad access detected [ 37.165286] [ 37.166762] Memory state around the buggy address: [ 37.171542] ffff000800ba1500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 37.178745] ffff000800ba1580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 37.185954] >ffff000800ba1600: fa fb fc fc fa fb fc fc fa fb fc fc 00 07 fc fc [ 37.193151] ^ [ 37.199231] ffff000800ba1680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.206435] ffff000800ba1700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.213638] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 35.927442] ================================================================== [ 35.933889] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 35.940828] Write of size 1 at addr ffff00080193a973 by task kunit_try_catch/220 [ 35.948204] [ 35.949692] CPU: 2 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 35.949746] Tainted: [N]=TEST [ 35.949760] Hardware name: WinLink E850-96 board (DT) [ 35.949783] Call trace: [ 35.949796] show_stack+0x20/0x38 (C) [ 35.949830] dump_stack_lvl+0x8c/0xd0 [ 35.949861] print_report+0x118/0x5d0 [ 35.949890] kasan_report+0xdc/0x128 [ 35.949918] __asan_report_store1_noabort+0x20/0x30 [ 35.949953] kmalloc_oob_right+0x5a4/0x660 [ 35.949987] kunit_try_run_case+0x170/0x3f0 [ 35.950024] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.950057] kthread+0x328/0x630 [ 35.950087] ret_from_fork+0x10/0x20 [ 35.950123] [ 36.012527] Allocated by task 220: [ 36.015915] kasan_save_stack+0x3c/0x68 [ 36.019731] kasan_save_track+0x20/0x40 [ 36.023550] kasan_save_alloc_info+0x40/0x58 [ 36.027804] __kasan_kmalloc+0xd4/0xd8 [ 36.031537] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.036050] kmalloc_oob_right+0xb0/0x660 [ 36.040043] kunit_try_run_case+0x170/0x3f0 [ 36.044210] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.049678] kthread+0x328/0x630 [ 36.052890] ret_from_fork+0x10/0x20 [ 36.056449] [ 36.057926] The buggy address belongs to the object at ffff00080193a900 [ 36.057926] which belongs to the cache kmalloc-128 of size 128 [ 36.070427] The buggy address is located 0 bytes to the right of [ 36.070427] allocated 115-byte region [ffff00080193a900, ffff00080193a973) [ 36.083358] [ 36.084836] The buggy address belongs to the physical page: [ 36.090394] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88193a [ 36.098379] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.106016] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.112960] page_type: f5(slab) [ 36.116097] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 36.123815] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.131544] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 36.139353] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.147167] head: 0bfffe0000000001 fffffdffe0064e81 00000000ffffffff 00000000ffffffff [ 36.154978] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 36.162784] page dumped because: kasan: bad access detected [ 36.168340] [ 36.169815] Memory state around the buggy address: [ 36.174595] ffff00080193a800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.181798] ffff00080193a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.189005] >ffff00080193a900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 36.196204] ^ [ 36.203065] ffff00080193a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.210271] ffff00080193aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.217471] ================================================================== [ 36.529555] ================================================================== [ 36.536656] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 36.543594] Read of size 1 at addr ffff00080193a980 by task kunit_try_catch/220 [ 36.550886] [ 36.552370] CPU: 2 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 36.552423] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.552439] Hardware name: WinLink E850-96 board (DT) [ 36.552458] Call trace: [ 36.552468] show_stack+0x20/0x38 (C) [ 36.552502] dump_stack_lvl+0x8c/0xd0 [ 36.552534] print_report+0x118/0x5d0 [ 36.552563] kasan_report+0xdc/0x128 [ 36.552589] __asan_report_load1_noabort+0x20/0x30 [ 36.552621] kmalloc_oob_right+0x5d0/0x660 [ 36.552652] kunit_try_run_case+0x170/0x3f0 [ 36.552687] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.552718] kthread+0x328/0x630 [ 36.552746] ret_from_fork+0x10/0x20 [ 36.552779] [ 36.616336] Allocated by task 220: [ 36.619723] kasan_save_stack+0x3c/0x68 [ 36.623541] kasan_save_track+0x20/0x40 [ 36.627361] kasan_save_alloc_info+0x40/0x58 [ 36.631614] __kasan_kmalloc+0xd4/0xd8 [ 36.635347] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.639860] kmalloc_oob_right+0xb0/0x660 [ 36.643853] kunit_try_run_case+0x170/0x3f0 [ 36.648020] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.653490] kthread+0x328/0x630 [ 36.656700] ret_from_fork+0x10/0x20 [ 36.660260] [ 36.661736] The buggy address belongs to the object at ffff00080193a900 [ 36.661736] which belongs to the cache kmalloc-128 of size 128 [ 36.674235] The buggy address is located 13 bytes to the right of [ 36.674235] allocated 115-byte region [ffff00080193a900, ffff00080193a973) [ 36.687256] [ 36.688734] The buggy address belongs to the physical page: [ 36.694291] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88193a [ 36.702273] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.709914] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.716857] page_type: f5(slab) [ 36.719990] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 36.727713] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.735440] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 36.743251] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.751064] head: 0bfffe0000000001 fffffdffe0064e81 00000000ffffffff 00000000ffffffff [ 36.758876] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 36.766681] page dumped because: kasan: bad access detected [ 36.772236] [ 36.773712] Memory state around the buggy address: [ 36.778490] ffff00080193a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.785695] ffff00080193a900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 36.792901] >ffff00080193a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.800101] ^ [ 36.803318] ffff00080193aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.810521] ffff00080193aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.817722] ================================================================== [ 36.230044] ================================================================== [ 36.237179] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 36.244120] Write of size 1 at addr ffff00080193a978 by task kunit_try_catch/220 [ 36.251498] [ 36.252983] CPU: 2 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 36.253037] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.253052] Hardware name: WinLink E850-96 board (DT) [ 36.253073] Call trace: [ 36.253086] show_stack+0x20/0x38 (C) [ 36.253118] dump_stack_lvl+0x8c/0xd0 [ 36.253149] print_report+0x118/0x5d0 [ 36.253176] kasan_report+0xdc/0x128 [ 36.253202] __asan_report_store1_noabort+0x20/0x30 [ 36.253235] kmalloc_oob_right+0x538/0x660 [ 36.253263] kunit_try_run_case+0x170/0x3f0 [ 36.253299] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.253331] kthread+0x328/0x630 [ 36.253360] ret_from_fork+0x10/0x20 [ 36.253396] [ 36.317035] Allocated by task 220: [ 36.320422] kasan_save_stack+0x3c/0x68 [ 36.324240] kasan_save_track+0x20/0x40 [ 36.328059] kasan_save_alloc_info+0x40/0x58 [ 36.332313] __kasan_kmalloc+0xd4/0xd8 [ 36.336045] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.340559] kmalloc_oob_right+0xb0/0x660 [ 36.344553] kunit_try_run_case+0x170/0x3f0 [ 36.348719] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.354187] kthread+0x328/0x630 [ 36.357399] ret_from_fork+0x10/0x20 [ 36.360958] [ 36.362435] The buggy address belongs to the object at ffff00080193a900 [ 36.362435] which belongs to the cache kmalloc-128 of size 128 [ 36.374935] The buggy address is located 5 bytes to the right of [ 36.374935] allocated 115-byte region [ffff00080193a900, ffff00080193a973) [ 36.387869] [ 36.389347] The buggy address belongs to the physical page: [ 36.394902] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88193a [ 36.402887] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.410525] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.417471] page_type: f5(slab) [ 36.420604] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 36.428325] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.436051] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 36.443863] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.451676] head: 0bfffe0000000001 fffffdffe0064e81 00000000ffffffff 00000000ffffffff [ 36.459488] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 36.467293] page dumped because: kasan: bad access detected [ 36.472849] [ 36.474325] Memory state around the buggy address: [ 36.479104] ffff00080193a800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.486307] ffff00080193a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.493515] >ffff00080193a900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 36.500713] ^ [ 36.507835] ffff00080193a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.515041] ffff00080193aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.522241] ==================================================================
Failure - log-parser-boot/exception-warning-libmathint_log-at-intlog10
------------[ cut here ]------------ [ 182.095976] WARNING: lib/math/int_log.c:120 at intlog10+0x38/0x48, CPU#4: kunit_try_catch/742 [ 182.104483] Modules linked in: [ 182.107528] CPU: 4 UID: 0 PID: 742 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 182.118642] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 182.124446] Hardware name: WinLink E850-96 board (DT) [ 182.129483] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 182.136423] pc : intlog10+0x38/0x48 [ 182.139897] lr : intlog10_test+0xe4/0x200 [ 182.143888] sp : ffff80008af67c10 [ 182.147187] x29: ffff80008af67c90 x28: 0000000000000000 x27: 0000000000000000 [ 182.154305] x26: 1fffe00100208481 x25: 0000000000000000 x24: ffff80008af67ce0 [ 182.161424] x23: ffff80008af67d00 x22: 0000000000000000 x21: 1ffff000115ecf82 [ 182.168541] x20: ffff800083c2f1e0 x19: ffff800087d07990 x18: ffff800087d07b08 [ 182.175659] x17: 0000000000000000 x16: ffff00085afa7da8 x15: ffff800081229698 [ 182.182777] x14: ffff8000808ffa0c x13: 1fffe0010b5f4f99 x12: ffff700010f62f89 [ 182.189895] x11: 1ffff00010f62f88 x10: ffff700010f62f88 x9 : ffff800081249824 [ 182.197012] x8 : ffff800087b17c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 182.204130] x5 : ffff7000115ecf82 x4 : 1ffff00010fa0f3b x3 : 1ffff00010785e3c [ 182.211248] x2 : 1ffff00010785e3c x1 : 0000000000000003 x0 : 0000000000000000 [ 182.218369] Call trace: [ 182.220800] intlog10+0x38/0x48 (P) [ 182.224271] kunit_try_run_case+0x170/0x3f0 [ 182.228437] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 182.233906] kthread+0x328/0x630 [ 182.237118] ret_from_fork+0x10/0x20 [ 182.240678] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-libmathint_log-at-intlog2
------------[ cut here ]------------ [ 181.891292] WARNING: lib/math/int_log.c:63 at intlog2+0xd8/0xf8, CPU#0: kunit_try_catch/724 [ 181.899625] Modules linked in: [ 181.902673] CPU: 0 UID: 0 PID: 724 Comm: kunit_try_catch Tainted: G B D N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 181.913782] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 181.918720] Hardware name: WinLink E850-96 board (DT) [ 181.923758] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 181.930697] pc : intlog2+0xd8/0xf8 [ 181.934083] lr : intlog2_test+0xe4/0x200 [ 181.937989] sp : ffff80008ae47c10 [ 181.941287] x29: ffff80008ae47c90 x28: 0000000000000000 x27: 0000000000000000 [ 181.948405] x26: 1fffe001002086c1 x25: 0000000000000000 x24: ffff80008ae47ce0 [ 181.955525] x23: ffff80008ae47d00 x22: 0000000000000000 x21: 1ffff000115c8f82 [ 181.962641] x20: ffff800083c2f0e0 x19: ffff800087d07990 x18: 000000001639443b [ 181.969759] x17: 0000000000000000 x16: ffff00085af1fda8 x15: 0000000000000000 [ 181.976877] x14: 00000000f1f1f1f1 x13: 1fffe0010b5e3f99 x12: ffff700010f62f89 [ 181.983995] x11: 1ffff00010f62f88 x10: ffff700010f62f88 x9 : ffff800081249a24 [ 181.991113] x8 : ffff800087b17c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 181.998231] x5 : ffff7000115c8f82 x4 : 1ffff00010fa0f3b x3 : 1ffff00010785e1c [ 182.005349] x2 : 1ffff00010785e1c x1 : 0000000000000003 x0 : 0000000000000000 [ 182.012469] Call trace: [ 182.014901] intlog2+0xd8/0xf8 (P) [ 182.018285] kunit_try_run_case+0x170/0x3f0 [ 182.022449] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 182.027918] kthread+0x328/0x630 [ 182.031131] ret_from_fork+0x10/0x20 [ 182.034692] ---[ end trace 0000000000000000 ]---
Failure - lava/job
(no logs available)
Failure - lava/fastboot-boot
(no logs available)
Failure - lava/auto-login-action
(no logs available)
Failure - lava/login-action
(no logs available)
Failure - boot/gcc-13-lkftconfig-kunit
(no logs available)
Failure - log-parser-boot/internal-error-oops-oops-smp
KNOWN ISSUE - qemu-arm64: Internal error: Oops at kunit_test_null_dereference - kunit_generic_run_threadfn_adapter
[ 180.761768] Internal error: Oops: 0000000096000005 [#1] SMP [ 180.767374] Modules linked in: [ 180.770418] CPU: 2 UID: 0 PID: 616 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc5-next-20250711 #1 PREEMPT [ 180.781529] Tainted: [B]=BAD_PAGE, [N]=TEST [ 180.785685] Hardware name: WinLink E850-96 board (DT) [ 180.790723] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 180.797664] pc : kunit_test_null_dereference+0x70/0x170 [ 180.802873] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 180.808687] sp : ffff80008a7b7d30 [ 180.811985] x29: ffff80008a7b7d90 x28: 0000000000000000 x27: 0000000000000000 [ 180.819103] x26: 1fffe0010047c181 x25: 0000000000000000 x24: 0000000000000004 [ 180.826221] x23: ffff0008023e0c0c x22: ffff8000812362b0 x21: ffff000800c80508 [ 180.833339] x20: 1ffff000114f6fa6 x19: ffff800087d07990 x18: 00000000feebf614 [ 180.840458] x17: 0000000000000001 x16: ffff00085af63da8 x15: ffff800081229380 [ 180.847575] x14: ffff8000812344b0 x13: 1fffe0010b5ec799 x12: ffff6001011e962c [ 180.854693] x11: 1fffe001011e962b x10: ffff6001011e962b x9 : ffff80008122da40 [ 180.861811] x8 : ffff80008a7b7c18 x7 : 0000000000000000 x6 : 0000000041b58ab3 [ 180.868929] x5 : ffff7000114f6fa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 180.876047] x2 : dfff800000000000 x1 : ffff000808f4a880 x0 : ffff800087d07990 [ 180.883167] Call trace: [ 180.885598] kunit_test_null_dereference+0x70/0x170 (P) [ 180.890806] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 180.896273] kthread+0x328/0x630 [ 180.899485] ret_from_fork+0x10/0x20 [ 180.903057] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 180.909124] ---[ end trace 0000000000000000 ]---