Date
July 14, 2025, 10:38 a.m.
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 32.199398] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 32.271685] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 32.257232] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 32.289333] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 32.247642] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 32.146247] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 32.106030] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0
Failure - log-parser-boot/internal-error-oops-oops-smp
[ 109.519745] Internal error: Oops: 0000000096000005 [#1] SMP [ 109.525242] Modules linked in: [ 109.526565] CPU: 0 UID: 0 PID: 563 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 109.527815] Tainted: [B]=BAD_PAGE, [N]=TEST [ 109.528022] Hardware name: linux,dummy-virt (DT) [ 109.528797] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 109.529744] pc : kunit_test_null_dereference+0x70/0x170 [ 109.530539] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 109.531233] sp : ffff800082127d30 [ 109.531649] x29: ffff800082127d90 x28: 0000000000000000 x27: 0000000000000000 [ 109.532098] x26: 1ffe000019350b01 x25: 0000000000000000 x24: 0000000000000004 [ 109.533180] x23: fff00000c9a8580c x22: ffffb0784aa38b58 x21: fff00000c1b2fa88 [ 109.534172] x20: 1ffff00010424fa6 x19: ffff800080087990 x18: 000000008cf77334 [ 109.535101] x17: 0000000000000001 x16: fff00000c932843c x15: fff00000ff616b48 [ 109.536037] x14: 0000000000018fff x13: 1ffe00001b48e9dd x12: fffd8000197c98b4 [ 109.536778] x11: 1ffe0000197c98b3 x10: fffd8000197c98b3 x9 : ffffb0784aa302e8 [ 109.537482] x8 : ffff800082127c18 x7 : 0000000000000001 x6 : 0000000041b58ab3 [ 109.538218] x5 : ffff700010424fa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 109.538934] x2 : dfff800000000000 x1 : fff00000cbe4bcc0 x0 : ffff800080087990 [ 109.539464] Call trace: [ 109.539633] kunit_test_null_dereference+0x70/0x170 (P) [ 109.539880] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 109.540141] kthread+0x328/0x630 [ 109.540401] ret_from_fork+0x10/0x20 [ 109.540902] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 109.541719] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc
[ 63.537268] ================================================================== [ 63.537342] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 63.537342] [ 63.537428] Use-after-free read at 0x00000000f131ff61 (in kfence-#188): [ 63.537481] test_krealloc+0x51c/0x830 [ 63.537525] kunit_try_run_case+0x170/0x3f0 [ 63.537572] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.537622] kthread+0x328/0x630 [ 63.537659] ret_from_fork+0x10/0x20 [ 63.537700] [ 63.537725] kfence-#188: 0x00000000f131ff61-0x00000000982bc35d, size=32, cache=kmalloc-32 [ 63.537725] [ 63.537779] allocated by task 368 on cpu 1 at 63.536588s (0.001187s ago): [ 63.537847] test_alloc+0x29c/0x628 [ 63.537888] test_krealloc+0xc0/0x830 [ 63.537928] kunit_try_run_case+0x170/0x3f0 [ 63.537969] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.538011] kthread+0x328/0x630 [ 63.538057] ret_from_fork+0x10/0x20 [ 63.538100] [ 63.538123] freed by task 368 on cpu 1 at 63.536852s (0.001268s ago): [ 63.538183] krealloc_noprof+0x148/0x360 [ 63.538225] test_krealloc+0x1dc/0x830 [ 63.538264] kunit_try_run_case+0x170/0x3f0 [ 63.538303] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.538345] kthread+0x328/0x630 [ 63.538383] ret_from_fork+0x10/0x20 [ 63.538426] [ 63.538472] CPU: 1 UID: 0 PID: 368 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 63.538552] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.538581] Hardware name: linux,dummy-virt (DT) [ 63.538614] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[ 63.447941] ================================================================== [ 63.448058] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 63.448058] [ 63.448190] Use-after-free read at 0x00000000a7b96bbc (in kfence-#187): [ 63.448246] test_memcache_typesafe_by_rcu+0x280/0x560 [ 63.448297] kunit_try_run_case+0x170/0x3f0 [ 63.448346] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.448388] kthread+0x328/0x630 [ 63.448427] ret_from_fork+0x10/0x20 [ 63.448468] [ 63.448495] kfence-#187: 0x00000000a7b96bbc-0x0000000005dba069, size=32, cache=test [ 63.448495] [ 63.448547] allocated by task 366 on cpu 0 at 63.431966s (0.016578s ago): [ 63.448618] test_alloc+0x230/0x628 [ 63.448658] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 63.448703] kunit_try_run_case+0x170/0x3f0 [ 63.448744] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.448786] kthread+0x328/0x630 [ 63.448821] ret_from_fork+0x10/0x20 [ 63.448860] [ 63.448883] freed by task 366 on cpu 0 at 63.432093s (0.016787s ago): [ 63.448940] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 63.448982] kunit_try_run_case+0x170/0x3f0 [ 63.449024] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.449075] kthread+0x328/0x630 [ 63.449110] ret_from_fork+0x10/0x20 [ 63.449150] [ 63.449197] CPU: 0 UID: 0 PID: 366 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 63.449278] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.449307] Hardware name: linux,dummy-virt (DT) [ 63.449342] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access
[ 40.156960] ================================================================== [ 40.157132] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 40.157132] [ 40.157233] Invalid read at 0x000000001e966d8a: [ 40.157454] test_invalid_access+0xdc/0x1f0 [ 40.157690] kunit_try_run_case+0x170/0x3f0 [ 40.158358] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.158820] kthread+0x328/0x630 [ 40.159028] ret_from_fork+0x10/0x20 [ 40.159943] [ 40.160188] CPU: 1 UID: 0 PID: 362 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 40.160282] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.160318] Hardware name: linux,dummy-virt (DT) [ 40.160359] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[ 33.893549] ================================================================== [ 33.893650] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 33.893650] [ 33.893855] Out-of-bounds write at 0x00000000aa5ddc1b (1B left of kfence-#125): [ 33.894119] test_out_of_bounds_write+0x100/0x240 [ 33.894295] kunit_try_run_case+0x170/0x3f0 [ 33.894513] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.894557] kthread+0x328/0x630 [ 33.894599] ret_from_fork+0x10/0x20 [ 33.894638] [ 33.894665] kfence-#125: 0x0000000095ec527a-0x000000002871d083, size=32, cache=kmalloc-32 [ 33.894665] [ 33.895532] allocated by task 322 on cpu 0 at 33.893145s (0.001569s ago): [ 33.895622] test_alloc+0x29c/0x628 [ 33.895664] test_out_of_bounds_write+0xc8/0x240 [ 33.896333] kunit_try_run_case+0x170/0x3f0 [ 33.897067] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.897144] kthread+0x328/0x630 [ 33.897194] ret_from_fork+0x10/0x20 [ 33.897235] [ 33.897372] CPU: 0 UID: 0 PID: 322 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 33.897865] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.898176] Hardware name: linux,dummy-virt (DT) [ 33.898540] ================================================================== [ 34.205584] ================================================================== [ 34.206008] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 34.206008] [ 34.206214] Out-of-bounds write at 0x00000000ba849019 (1B left of kfence-#128): [ 34.206277] test_out_of_bounds_write+0x100/0x240 [ 34.206371] kunit_try_run_case+0x170/0x3f0 [ 34.206466] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.206512] kthread+0x328/0x630 [ 34.206712] ret_from_fork+0x10/0x20 [ 34.206881] [ 34.206947] kfence-#128: 0x00000000c77a9003-0x0000000069b3d0c2, size=32, cache=test [ 34.206947] [ 34.207103] allocated by task 324 on cpu 0 at 34.205490s (0.001525s ago): [ 34.207216] test_alloc+0x230/0x628 [ 34.207275] test_out_of_bounds_write+0xc8/0x240 [ 34.207319] kunit_try_run_case+0x170/0x3f0 [ 34.207745] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.207840] kthread+0x328/0x630 [ 34.207886] ret_from_fork+0x10/0x20 [ 34.207998] [ 34.208058] CPU: 0 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 34.208147] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.208178] Hardware name: linux,dummy-virt (DT) [ 34.208270] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[ 39.924878] ================================================================== [ 39.924987] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 39.924987] [ 39.925071] Corrupted memory at 0x00000000a9f49f17 [ ! . . . . . . . . . . . . . . . ] (in kfence-#183): [ 39.925389] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 39.925439] kunit_try_run_case+0x170/0x3f0 [ 39.925487] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.925528] kthread+0x328/0x630 [ 39.925566] ret_from_fork+0x10/0x20 [ 39.925610] [ 39.925637] kfence-#183: 0x00000000c8b8fec1-0x00000000019d166d, size=73, cache=kmalloc-96 [ 39.925637] [ 39.925692] allocated by task 356 on cpu 1 at 39.924621s (0.001066s ago): [ 39.925755] test_alloc+0x29c/0x628 [ 39.925800] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 39.925848] kunit_try_run_case+0x170/0x3f0 [ 39.925887] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.925929] kthread+0x328/0x630 [ 39.925966] ret_from_fork+0x10/0x20 [ 39.926004] [ 39.926028] freed by task 356 on cpu 1 at 39.924771s (0.001253s ago): [ 39.926102] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 39.926149] kunit_try_run_case+0x170/0x3f0 [ 39.926193] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.926234] kthread+0x328/0x630 [ 39.926272] ret_from_fork+0x10/0x20 [ 39.926312] [ 39.926361] CPU: 1 UID: 0 PID: 356 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 39.926445] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.926474] Hardware name: linux,dummy-virt (DT) [ 39.926509] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[ 39.612928] ================================================================== [ 39.613038] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 39.613038] [ 39.613159] Out-of-bounds read at 0x000000003f5cf870 (105B right of kfence-#180): [ 39.613220] test_kmalloc_aligned_oob_read+0x238/0x468 [ 39.613270] kunit_try_run_case+0x170/0x3f0 [ 39.613317] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.613357] kthread+0x328/0x630 [ 39.613396] ret_from_fork+0x10/0x20 [ 39.613434] [ 39.613460] kfence-#180: 0x00000000cd52b3f1-0x00000000af8cae3d, size=73, cache=kmalloc-96 [ 39.613460] [ 39.613514] allocated by task 354 on cpu 0 at 39.612676s (0.000834s ago): [ 39.613585] test_alloc+0x29c/0x628 [ 39.613630] test_kmalloc_aligned_oob_read+0x100/0x468 [ 39.613673] kunit_try_run_case+0x170/0x3f0 [ 39.613714] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.613753] kthread+0x328/0x630 [ 39.613789] ret_from_fork+0x10/0x20 [ 39.613828] [ 39.613876] CPU: 0 UID: 0 PID: 354 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 39.613957] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.613985] Hardware name: linux,dummy-virt (DT) [ 39.614020] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption
[ 35.244910] ================================================================== [ 35.245004] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 35.245004] [ 35.245085] Corrupted memory at 0x00000000f2d26b9a [ ! ] (in kfence-#138): [ 35.245216] test_corruption+0x284/0x378 [ 35.245264] kunit_try_run_case+0x170/0x3f0 [ 35.245307] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.245349] kthread+0x328/0x630 [ 35.245386] ret_from_fork+0x10/0x20 [ 35.245427] [ 35.245450] kfence-#138: 0x00000000fd200a2d-0x0000000046d6fc34, size=32, cache=kmalloc-32 [ 35.245450] [ 35.245505] allocated by task 342 on cpu 1 at 35.244631s (0.000871s ago): [ 35.245566] test_alloc+0x29c/0x628 [ 35.245611] test_corruption+0x198/0x378 [ 35.245652] kunit_try_run_case+0x170/0x3f0 [ 35.245694] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.245735] kthread+0x328/0x630 [ 35.245772] ret_from_fork+0x10/0x20 [ 35.245811] [ 35.245834] freed by task 342 on cpu 1 at 35.244740s (0.001091s ago): [ 35.245897] test_corruption+0x284/0x378 [ 35.245936] kunit_try_run_case+0x170/0x3f0 [ 35.245975] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.246016] kthread+0x328/0x630 [ 35.246063] ret_from_fork+0x10/0x20 [ 35.246101] [ 35.246143] CPU: 1 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 35.246221] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.246251] Hardware name: linux,dummy-virt (DT) [ 35.246285] ================================================================== [ 35.556776] ================================================================== [ 35.556866] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 35.556866] [ 35.556928] Corrupted memory at 0x00000000749ffd9c [ ! ] (in kfence-#141): [ 35.557042] test_corruption+0x1d8/0x378 [ 35.557106] kunit_try_run_case+0x170/0x3f0 [ 35.557149] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.557191] kthread+0x328/0x630 [ 35.557229] ret_from_fork+0x10/0x20 [ 35.557269] [ 35.557293] kfence-#141: 0x0000000063447b2d-0x00000000ee64cd8c, size=32, cache=test [ 35.557293] [ 35.557348] allocated by task 344 on cpu 1 at 35.556630s (0.000715s ago): [ 35.557409] test_alloc+0x230/0x628 [ 35.557450] test_corruption+0x198/0x378 [ 35.557491] kunit_try_run_case+0x170/0x3f0 [ 35.557532] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.557574] kthread+0x328/0x630 [ 35.557613] ret_from_fork+0x10/0x20 [ 35.557654] [ 35.557679] freed by task 344 on cpu 1 at 35.556688s (0.000987s ago): [ 35.557743] test_corruption+0x1d8/0x378 [ 35.557784] kunit_try_run_case+0x170/0x3f0 [ 35.557824] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.557866] kthread+0x328/0x630 [ 35.557901] ret_from_fork+0x10/0x20 [ 35.557940] [ 35.557981] CPU: 1 UID: 0 PID: 344 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 35.558070] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.558100] Hardware name: linux,dummy-virt (DT) [ 35.558134] ================================================================== [ 35.140843] ================================================================== [ 35.140952] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 35.140952] [ 35.141019] Corrupted memory at 0x0000000089f69fc5 [ ! . . . . . . . . . . . . . . . ] (in kfence-#137): [ 35.142155] test_corruption+0x278/0x378 [ 35.142209] kunit_try_run_case+0x170/0x3f0 [ 35.142257] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.142299] kthread+0x328/0x630 [ 35.142339] ret_from_fork+0x10/0x20 [ 35.142381] [ 35.142405] kfence-#137: 0x000000005a0adbbc-0x0000000023781057, size=32, cache=kmalloc-32 [ 35.142405] [ 35.142463] allocated by task 342 on cpu 1 at 35.140554s (0.001906s ago): [ 35.142527] test_alloc+0x29c/0x628 [ 35.142568] test_corruption+0xdc/0x378 [ 35.142609] kunit_try_run_case+0x170/0x3f0 [ 35.142651] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.142692] kthread+0x328/0x630 [ 35.142726] ret_from_fork+0x10/0x20 [ 35.142767] [ 35.142790] freed by task 342 on cpu 1 at 35.140663s (0.002124s ago): [ 35.142853] test_corruption+0x278/0x378 [ 35.142893] kunit_try_run_case+0x170/0x3f0 [ 35.142932] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.142973] kthread+0x328/0x630 [ 35.143008] ret_from_fork+0x10/0x20 [ 35.143057] [ 35.143105] CPU: 1 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 35.143185] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.143214] Hardware name: linux,dummy-virt (DT) [ 35.143247] ================================================================== [ 35.348795] ================================================================== [ 35.348896] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 35.348896] [ 35.348961] Corrupted memory at 0x00000000239cd208 [ ! . . . . . . . . . . . . . . . ] (in kfence-#139): [ 35.349289] test_corruption+0x120/0x378 [ 35.349338] kunit_try_run_case+0x170/0x3f0 [ 35.349383] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.349425] kthread+0x328/0x630 [ 35.349464] ret_from_fork+0x10/0x20 [ 35.349504] [ 35.349528] kfence-#139: 0x0000000042c9df16-0x0000000054fcd1c6, size=32, cache=test [ 35.349528] [ 35.349585] allocated by task 344 on cpu 1 at 35.348636s (0.000944s ago): [ 35.349652] test_alloc+0x230/0x628 [ 35.349692] test_corruption+0xdc/0x378 [ 35.349732] kunit_try_run_case+0x170/0x3f0 [ 35.349773] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.349813] kthread+0x328/0x630 [ 35.349849] ret_from_fork+0x10/0x20 [ 35.349887] [ 35.349911] freed by task 344 on cpu 1 at 35.348701s (0.001206s ago): [ 35.349972] test_corruption+0x120/0x378 [ 35.350013] kunit_try_run_case+0x170/0x3f0 [ 35.350065] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.350107] kthread+0x328/0x630 [ 35.350142] ret_from_fork+0x10/0x20 [ 35.350179] [ 35.350223] CPU: 1 UID: 0 PID: 344 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 35.350304] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.350333] Hardware name: linux,dummy-virt (DT) [ 35.350367] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[ 35.036750] ================================================================== [ 35.036848] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 35.036848] [ 35.036911] Invalid free of 0x00000000a251537a (in kfence-#136): [ 35.036967] test_invalid_addr_free+0xec/0x238 [ 35.037015] kunit_try_run_case+0x170/0x3f0 [ 35.037076] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.037121] kthread+0x328/0x630 [ 35.037162] ret_from_fork+0x10/0x20 [ 35.037203] [ 35.037227] kfence-#136: 0x00000000d212235e-0x00000000ccef3bd3, size=32, cache=test [ 35.037227] [ 35.037280] allocated by task 340 on cpu 0 at 35.036621s (0.000655s ago): [ 35.037344] test_alloc+0x230/0x628 [ 35.037385] test_invalid_addr_free+0xd4/0x238 [ 35.037426] kunit_try_run_case+0x170/0x3f0 [ 35.037468] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.037508] kthread+0x328/0x630 [ 35.037544] ret_from_fork+0x10/0x20 [ 35.037582] [ 35.037632] CPU: 0 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 35.037712] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.037742] Hardware name: linux,dummy-virt (DT) [ 35.037774] ================================================================== [ 34.932793] ================================================================== [ 34.932897] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 34.932897] [ 34.932962] Invalid free of 0x000000003c39334c (in kfence-#135): [ 34.933020] test_invalid_addr_free+0x1ac/0x238 [ 34.933086] kunit_try_run_case+0x170/0x3f0 [ 34.933133] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.933175] kthread+0x328/0x630 [ 34.933216] ret_from_fork+0x10/0x20 [ 34.933257] [ 34.933281] kfence-#135: 0x00000000abbe6914-0x000000009d7f57e5, size=32, cache=kmalloc-32 [ 34.933281] [ 34.933337] allocated by task 338 on cpu 0 at 34.932636s (0.000697s ago): [ 34.933402] test_alloc+0x29c/0x628 [ 34.933444] test_invalid_addr_free+0xd4/0x238 [ 34.933489] kunit_try_run_case+0x170/0x3f0 [ 34.933531] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.933573] kthread+0x328/0x630 [ 34.933621] ret_from_fork+0x10/0x20 [ 34.933662] [ 34.933710] CPU: 0 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 34.933792] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.933824] Hardware name: linux,dummy-virt (DT) [ 34.933857] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free
[ 34.724994] ================================================================== [ 34.725139] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 34.725139] [ 34.725214] Invalid free of 0x00000000fe351f62 (in kfence-#133): [ 34.725281] test_double_free+0x1bc/0x238 [ 34.725330] kunit_try_run_case+0x170/0x3f0 [ 34.725378] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.725420] kthread+0x328/0x630 [ 34.725459] ret_from_fork+0x10/0x20 [ 34.725499] [ 34.725525] kfence-#133: 0x00000000fe351f62-0x00000000a5ca718a, size=32, cache=kmalloc-32 [ 34.725525] [ 34.725580] allocated by task 334 on cpu 1 at 34.724654s (0.000922s ago): [ 34.725653] test_alloc+0x29c/0x628 [ 34.725695] test_double_free+0xd4/0x238 [ 34.725737] kunit_try_run_case+0x170/0x3f0 [ 34.725777] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.725821] kthread+0x328/0x630 [ 34.725857] ret_from_fork+0x10/0x20 [ 34.725899] [ 34.725924] freed by task 334 on cpu 1 at 34.724737s (0.001183s ago): [ 34.725990] test_double_free+0x1ac/0x238 [ 34.726030] kunit_try_run_case+0x170/0x3f0 [ 34.726084] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.726125] kthread+0x328/0x630 [ 34.726162] ret_from_fork+0x10/0x20 [ 34.726200] [ 34.726250] CPU: 1 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 34.726334] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.726363] Hardware name: linux,dummy-virt (DT) [ 34.726397] ================================================================== [ 34.828804] ================================================================== [ 34.828900] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 34.828900] [ 34.828963] Invalid free of 0x00000000c920656e (in kfence-#134): [ 34.829014] test_double_free+0x100/0x238 [ 34.829078] kunit_try_run_case+0x170/0x3f0 [ 34.829122] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.829163] kthread+0x328/0x630 [ 34.829201] ret_from_fork+0x10/0x20 [ 34.829241] [ 34.829265] kfence-#134: 0x00000000c920656e-0x00000000012ddf33, size=32, cache=test [ 34.829265] [ 34.829323] allocated by task 336 on cpu 1 at 34.828573s (0.000746s ago): [ 34.829389] test_alloc+0x230/0x628 [ 34.829431] test_double_free+0xd4/0x238 [ 34.829470] kunit_try_run_case+0x170/0x3f0 [ 34.829511] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.829552] kthread+0x328/0x630 [ 34.829591] ret_from_fork+0x10/0x20 [ 34.829630] [ 34.829654] freed by task 336 on cpu 1 at 34.828632s (0.001018s ago): [ 34.829717] test_double_free+0xf0/0x238 [ 34.829758] kunit_try_run_case+0x170/0x3f0 [ 34.829798] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.829839] kthread+0x328/0x630 [ 34.829874] ret_from_fork+0x10/0x20 [ 34.829913] [ 34.829955] CPU: 1 UID: 0 PID: 336 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 34.830034] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.830070] Hardware name: linux,dummy-virt (DT) [ 34.830104] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[ 34.310554] ================================================================== [ 34.310654] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 34.310654] [ 34.310788] Use-after-free read at 0x0000000037457c64 (in kfence-#129): [ 34.310840] test_use_after_free_read+0x114/0x248 [ 34.310934] kunit_try_run_case+0x170/0x3f0 [ 34.310981] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.311082] kthread+0x328/0x630 [ 34.311127] ret_from_fork+0x10/0x20 [ 34.311194] [ 34.311473] kfence-#129: 0x0000000037457c64-0x000000005bf296f3, size=32, cache=kmalloc-32 [ 34.311473] [ 34.311631] allocated by task 326 on cpu 0 at 34.309529s (0.002007s ago): [ 34.311729] test_alloc+0x29c/0x628 [ 34.312040] test_use_after_free_read+0xd0/0x248 [ 34.312202] kunit_try_run_case+0x170/0x3f0 [ 34.312258] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.312315] kthread+0x328/0x630 [ 34.312887] ret_from_fork+0x10/0x20 [ 34.313106] [ 34.313343] freed by task 326 on cpu 0 at 34.309941s (0.003241s ago): [ 34.313477] test_use_after_free_read+0x1c0/0x248 [ 34.313534] kunit_try_run_case+0x170/0x3f0 [ 34.313577] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.313636] kthread+0x328/0x630 [ 34.313672] ret_from_fork+0x10/0x20 [ 34.313737] [ 34.313795] CPU: 0 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 34.313889] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.313919] Hardware name: linux,dummy-virt (DT) [ 34.313955] ================================================================== [ 34.418166] ================================================================== [ 34.418280] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 34.418280] [ 34.418490] Use-after-free read at 0x00000000a6d029e1 (in kfence-#130): [ 34.418559] test_use_after_free_read+0x114/0x248 [ 34.418975] kunit_try_run_case+0x170/0x3f0 [ 34.419179] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.419299] kthread+0x328/0x630 [ 34.419573] ret_from_fork+0x10/0x20 [ 34.419637] [ 34.419855] kfence-#130: 0x00000000a6d029e1-0x0000000057219c1d, size=32, cache=test [ 34.419855] [ 34.420096] allocated by task 328 on cpu 0 at 34.417499s (0.002588s ago): [ 34.420327] test_alloc+0x230/0x628 [ 34.420629] test_use_after_free_read+0xd0/0x248 [ 34.420733] kunit_try_run_case+0x170/0x3f0 [ 34.421176] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.421433] kthread+0x328/0x630 [ 34.421487] ret_from_fork+0x10/0x20 [ 34.421529] [ 34.421553] freed by task 328 on cpu 0 at 34.417834s (0.003715s ago): [ 34.422192] test_use_after_free_read+0xf0/0x248 [ 34.422415] kunit_try_run_case+0x170/0x3f0 [ 34.422669] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.422806] kthread+0x328/0x630 [ 34.422904] ret_from_fork+0x10/0x20 [ 34.423220] [ 34.423502] CPU: 0 UID: 0 PID: 328 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 34.423795] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.424190] Hardware name: linux,dummy-virt (DT) [ 34.424283] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[ 33.685357] ================================================================== [ 33.685443] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 33.685443] [ 33.685605] Out-of-bounds read at 0x000000004d3f0096 (32B right of kfence-#123): [ 33.685745] test_out_of_bounds_read+0x1c8/0x3e0 [ 33.685822] kunit_try_run_case+0x170/0x3f0 [ 33.685902] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.685944] kthread+0x328/0x630 [ 33.686280] ret_from_fork+0x10/0x20 [ 33.686438] [ 33.686475] kfence-#123: 0x000000001e79d931-0x000000002b793eea, size=32, cache=test [ 33.686475] [ 33.686566] allocated by task 320 on cpu 0 at 33.685193s (0.001333s ago): [ 33.686701] test_alloc+0x230/0x628 [ 33.686758] test_out_of_bounds_read+0x198/0x3e0 [ 33.686803] kunit_try_run_case+0x170/0x3f0 [ 33.686845] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.687081] kthread+0x328/0x630 [ 33.687175] ret_from_fork+0x10/0x20 [ 33.687219] [ 33.687350] CPU: 0 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 33.687458] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.687556] Hardware name: linux,dummy-virt (DT) [ 33.687590] ================================================================== [ 33.371006] ================================================================== [ 33.371133] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 33.371133] [ 33.371255] Out-of-bounds read at 0x0000000048fc19dd (1B left of kfence-#120): [ 33.371415] test_out_of_bounds_read+0x114/0x3e0 [ 33.371479] kunit_try_run_case+0x170/0x3f0 [ 33.371524] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.371857] kthread+0x328/0x630 [ 33.372007] ret_from_fork+0x10/0x20 [ 33.372067] [ 33.372118] kfence-#120: 0x00000000fa2f132a-0x000000000b635f6c, size=32, cache=test [ 33.372118] [ 33.372366] allocated by task 320 on cpu 0 at 33.370230s (0.002074s ago): [ 33.372989] test_alloc+0x230/0x628 [ 33.373142] test_out_of_bounds_read+0xdc/0x3e0 [ 33.373249] kunit_try_run_case+0x170/0x3f0 [ 33.373313] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.373516] kthread+0x328/0x630 [ 33.373752] ret_from_fork+0x10/0x20 [ 33.373934] [ 33.374014] CPU: 0 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 33.374783] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.374878] Hardware name: linux,dummy-virt (DT) [ 33.374985] ================================================================== [ 33.059589] ================================================================== [ 33.059977] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 33.059977] [ 33.060825] Out-of-bounds read at 0x0000000038f32756 (1B left of kfence-#117): [ 33.061673] test_out_of_bounds_read+0x114/0x3e0 [ 33.062070] kunit_try_run_case+0x170/0x3f0 [ 33.062267] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.062429] kthread+0x328/0x630 [ 33.062528] ret_from_fork+0x10/0x20 [ 33.063102] [ 33.063733] kfence-#117: 0x00000000a9ecfbbf-0x00000000e18ab0e3, size=32, cache=kmalloc-32 [ 33.063733] [ 33.064628] allocated by task 318 on cpu 0 at 33.057960s (0.006456s ago): [ 33.066375] test_alloc+0x29c/0x628 [ 33.066842] test_out_of_bounds_read+0xdc/0x3e0 [ 33.066962] kunit_try_run_case+0x170/0x3f0 [ 33.067326] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.067533] kthread+0x328/0x630 [ 33.067643] ret_from_fork+0x10/0x20 [ 33.068099] [ 33.068359] CPU: 0 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 33.068622] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.068800] Hardware name: linux,dummy-virt (DT) [ 33.068859] ================================================================== [ 33.265564] ================================================================== [ 33.265662] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 33.265662] [ 33.265765] Out-of-bounds read at 0x00000000e92ea9aa (32B right of kfence-#119): [ 33.265828] test_out_of_bounds_read+0x1c8/0x3e0 [ 33.265875] kunit_try_run_case+0x170/0x3f0 [ 33.266066] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.266221] kthread+0x328/0x630 [ 33.266276] ret_from_fork+0x10/0x20 [ 33.266547] [ 33.266643] kfence-#119: 0x00000000592b2bb9-0x000000003297a55c, size=32, cache=kmalloc-32 [ 33.266643] [ 33.266753] allocated by task 318 on cpu 0 at 33.265323s (0.001419s ago): [ 33.266835] test_alloc+0x29c/0x628 [ 33.266898] test_out_of_bounds_read+0x198/0x3e0 [ 33.266958] kunit_try_run_case+0x170/0x3f0 [ 33.267036] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.267090] kthread+0x328/0x630 [ 33.267144] ret_from_fork+0x10/0x20 [ 33.267184] [ 33.267246] CPU: 0 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 33.267684] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.267764] Hardware name: linux,dummy-virt (DT) [ 33.267799] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[ 32.921256] ================================================================== [ 32.921757] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 32.921881] Write of size 1 at addr fff00000c85fcf78 by task kunit_try_catch/316 [ 32.921956] [ 32.921990] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.922166] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.922193] Hardware name: linux,dummy-virt (DT) [ 32.922754] Call trace: [ 32.922902] show_stack+0x20/0x38 (C) [ 32.923039] dump_stack_lvl+0x8c/0xd0 [ 32.923159] print_report+0x118/0x5d0 [ 32.923329] kasan_report+0xdc/0x128 [ 32.923395] __asan_report_store1_noabort+0x20/0x30 [ 32.923447] strncpy_from_user+0x270/0x2a0 [ 32.923795] copy_user_test_oob+0x5c0/0xec8 [ 32.923875] kunit_try_run_case+0x170/0x3f0 [ 32.924298] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.924510] kthread+0x328/0x630 [ 32.924617] ret_from_fork+0x10/0x20 [ 32.924786] [ 32.924806] Allocated by task 316: [ 32.924835] kasan_save_stack+0x3c/0x68 [ 32.925178] kasan_save_track+0x20/0x40 [ 32.925435] kasan_save_alloc_info+0x40/0x58 [ 32.925509] __kasan_kmalloc+0xd4/0xd8 [ 32.925660] __kmalloc_noprof+0x198/0x4c8 [ 32.925930] kunit_kmalloc_array+0x34/0x88 [ 32.926130] copy_user_test_oob+0xac/0xec8 [ 32.926234] kunit_try_run_case+0x170/0x3f0 [ 32.926277] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.926627] kthread+0x328/0x630 [ 32.926714] ret_from_fork+0x10/0x20 [ 32.926782] [ 32.926977] The buggy address belongs to the object at fff00000c85fcf00 [ 32.926977] which belongs to the cache kmalloc-128 of size 128 [ 32.927454] The buggy address is located 0 bytes to the right of [ 32.927454] allocated 120-byte region [fff00000c85fcf00, fff00000c85fcf78) [ 32.927565] [ 32.927599] The buggy address belongs to the physical page: [ 32.927861] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085fc [ 32.928105] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.928228] page_type: f5(slab) [ 32.928527] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.928605] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.929038] page dumped because: kasan: bad access detected [ 32.929115] [ 32.929249] Memory state around the buggy address: [ 32.929708] fff00000c85fce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.929813] fff00000c85fce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.929864] >fff00000c85fcf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.930201] ^ [ 32.930290] fff00000c85fcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.930661] fff00000c85fd000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.930803] ================================================================== [ 32.911269] ================================================================== [ 32.911338] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 32.911399] Write of size 121 at addr fff00000c85fcf00 by task kunit_try_catch/316 [ 32.911452] [ 32.911489] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.911585] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.911616] Hardware name: linux,dummy-virt (DT) [ 32.911659] Call trace: [ 32.911684] show_stack+0x20/0x38 (C) [ 32.911732] dump_stack_lvl+0x8c/0xd0 [ 32.911780] print_report+0x118/0x5d0 [ 32.911835] kasan_report+0xdc/0x128 [ 32.911880] kasan_check_range+0x100/0x1a8 [ 32.911926] __kasan_check_write+0x20/0x30 [ 32.911982] strncpy_from_user+0x3c/0x2a0 [ 32.912032] copy_user_test_oob+0x5c0/0xec8 [ 32.912096] kunit_try_run_case+0x170/0x3f0 [ 32.912147] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.912982] kthread+0x328/0x630 [ 32.913108] ret_from_fork+0x10/0x20 [ 32.913192] [ 32.913247] Allocated by task 316: [ 32.913317] kasan_save_stack+0x3c/0x68 [ 32.913401] kasan_save_track+0x20/0x40 [ 32.913481] kasan_save_alloc_info+0x40/0x58 [ 32.913535] __kasan_kmalloc+0xd4/0xd8 [ 32.913576] __kmalloc_noprof+0x198/0x4c8 [ 32.913907] kunit_kmalloc_array+0x34/0x88 [ 32.914442] copy_user_test_oob+0xac/0xec8 [ 32.914525] kunit_try_run_case+0x170/0x3f0 [ 32.914643] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.914701] kthread+0x328/0x630 [ 32.914736] ret_from_fork+0x10/0x20 [ 32.915342] [ 32.915423] The buggy address belongs to the object at fff00000c85fcf00 [ 32.915423] which belongs to the cache kmalloc-128 of size 128 [ 32.915568] The buggy address is located 0 bytes inside of [ 32.915568] allocated 120-byte region [fff00000c85fcf00, fff00000c85fcf78) [ 32.915919] [ 32.916092] The buggy address belongs to the physical page: [ 32.916378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085fc [ 32.916469] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.916659] page_type: f5(slab) [ 32.916730] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.916923] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.917299] page dumped because: kasan: bad access detected [ 32.917381] [ 32.917713] Memory state around the buggy address: [ 32.917776] fff00000c85fce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.918075] fff00000c85fce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.918209] >fff00000c85fcf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.918776] ^ [ 32.918959] fff00000c85fcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.919125] fff00000c85fd000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.919461] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[ 32.876982] ================================================================== [ 32.877145] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 32.877208] Write of size 121 at addr fff00000c85fcf00 by task kunit_try_catch/316 [ 32.877262] [ 32.877619] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.877751] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.877787] Hardware name: linux,dummy-virt (DT) [ 32.877820] Call trace: [ 32.877940] show_stack+0x20/0x38 (C) [ 32.878035] dump_stack_lvl+0x8c/0xd0 [ 32.878218] print_report+0x118/0x5d0 [ 32.878282] kasan_report+0xdc/0x128 [ 32.878328] kasan_check_range+0x100/0x1a8 [ 32.878383] __kasan_check_write+0x20/0x30 [ 32.878592] copy_user_test_oob+0x35c/0xec8 [ 32.878656] kunit_try_run_case+0x170/0x3f0 [ 32.878708] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.878860] kthread+0x328/0x630 [ 32.878916] ret_from_fork+0x10/0x20 [ 32.878981] [ 32.879331] Allocated by task 316: [ 32.879437] kasan_save_stack+0x3c/0x68 [ 32.879532] kasan_save_track+0x20/0x40 [ 32.879578] kasan_save_alloc_info+0x40/0x58 [ 32.879655] __kasan_kmalloc+0xd4/0xd8 [ 32.879776] __kmalloc_noprof+0x198/0x4c8 [ 32.879843] kunit_kmalloc_array+0x34/0x88 [ 32.879901] copy_user_test_oob+0xac/0xec8 [ 32.880178] kunit_try_run_case+0x170/0x3f0 [ 32.881036] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.881125] kthread+0x328/0x630 [ 32.881198] ret_from_fork+0x10/0x20 [ 32.881266] [ 32.881343] The buggy address belongs to the object at fff00000c85fcf00 [ 32.881343] which belongs to the cache kmalloc-128 of size 128 [ 32.881418] The buggy address is located 0 bytes inside of [ 32.881418] allocated 120-byte region [fff00000c85fcf00, fff00000c85fcf78) [ 32.881485] [ 32.881879] The buggy address belongs to the physical page: [ 32.881994] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085fc [ 32.882446] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.882515] page_type: f5(slab) [ 32.882560] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.882938] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.883324] page dumped because: kasan: bad access detected [ 32.883374] [ 32.883395] Memory state around the buggy address: [ 32.883432] fff00000c85fce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.883619] fff00000c85fce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.883676] >fff00000c85fcf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.883718] ^ [ 32.883791] fff00000c85fcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.883836] fff00000c85fd000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.883895] ================================================================== [ 32.885537] ================================================================== [ 32.885653] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 32.885708] Read of size 121 at addr fff00000c85fcf00 by task kunit_try_catch/316 [ 32.885788] [ 32.886102] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.886215] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.886244] Hardware name: linux,dummy-virt (DT) [ 32.886395] Call trace: [ 32.886643] show_stack+0x20/0x38 (C) [ 32.886789] dump_stack_lvl+0x8c/0xd0 [ 32.886842] print_report+0x118/0x5d0 [ 32.886898] kasan_report+0xdc/0x128 [ 32.886948] kasan_check_range+0x100/0x1a8 [ 32.887241] __kasan_check_read+0x20/0x30 [ 32.887542] copy_user_test_oob+0x3c8/0xec8 [ 32.887622] kunit_try_run_case+0x170/0x3f0 [ 32.887716] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.887801] kthread+0x328/0x630 [ 32.887845] ret_from_fork+0x10/0x20 [ 32.887994] [ 32.888110] Allocated by task 316: [ 32.888230] kasan_save_stack+0x3c/0x68 [ 32.888279] kasan_save_track+0x20/0x40 [ 32.888668] kasan_save_alloc_info+0x40/0x58 [ 32.889112] __kasan_kmalloc+0xd4/0xd8 [ 32.889237] __kmalloc_noprof+0x198/0x4c8 [ 32.889370] kunit_kmalloc_array+0x34/0x88 [ 32.889435] copy_user_test_oob+0xac/0xec8 [ 32.889515] kunit_try_run_case+0x170/0x3f0 [ 32.889560] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.889620] kthread+0x328/0x630 [ 32.889656] ret_from_fork+0x10/0x20 [ 32.889695] [ 32.889718] The buggy address belongs to the object at fff00000c85fcf00 [ 32.889718] which belongs to the cache kmalloc-128 of size 128 [ 32.889802] The buggy address is located 0 bytes inside of [ 32.889802] allocated 120-byte region [fff00000c85fcf00, fff00000c85fcf78) [ 32.889874] [ 32.889905] The buggy address belongs to the physical page: [ 32.889943] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085fc [ 32.890002] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.890061] page_type: f5(slab) [ 32.890102] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.890154] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.890213] page dumped because: kasan: bad access detected [ 32.890260] [ 32.890291] Memory state around the buggy address: [ 32.890339] fff00000c85fce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.890385] fff00000c85fce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.890429] >fff00000c85fcf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.890477] ^ [ 32.890530] fff00000c85fcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.890571] fff00000c85fd000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.890612] ================================================================== [ 32.891630] ================================================================== [ 32.891693] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 32.892007] Write of size 121 at addr fff00000c85fcf00 by task kunit_try_catch/316 [ 32.892099] [ 32.892131] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.892384] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.892757] Hardware name: linux,dummy-virt (DT) [ 32.892881] Call trace: [ 32.892947] show_stack+0x20/0x38 (C) [ 32.893092] dump_stack_lvl+0x8c/0xd0 [ 32.893241] print_report+0x118/0x5d0 [ 32.893401] kasan_report+0xdc/0x128 [ 32.893554] kasan_check_range+0x100/0x1a8 [ 32.893726] __kasan_check_write+0x20/0x30 [ 32.893947] copy_user_test_oob+0x434/0xec8 [ 32.894400] kunit_try_run_case+0x170/0x3f0 [ 32.894545] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.894707] kthread+0x328/0x630 [ 32.894827] ret_from_fork+0x10/0x20 [ 32.894945] [ 32.895226] Allocated by task 316: [ 32.895375] kasan_save_stack+0x3c/0x68 [ 32.895478] kasan_save_track+0x20/0x40 [ 32.895737] kasan_save_alloc_info+0x40/0x58 [ 32.895840] __kasan_kmalloc+0xd4/0xd8 [ 32.895902] __kmalloc_noprof+0x198/0x4c8 [ 32.896107] kunit_kmalloc_array+0x34/0x88 [ 32.896442] copy_user_test_oob+0xac/0xec8 [ 32.896617] kunit_try_run_case+0x170/0x3f0 [ 32.896688] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.896750] kthread+0x328/0x630 [ 32.896878] ret_from_fork+0x10/0x20 [ 32.897366] [ 32.897427] The buggy address belongs to the object at fff00000c85fcf00 [ 32.897427] which belongs to the cache kmalloc-128 of size 128 [ 32.897502] The buggy address is located 0 bytes inside of [ 32.897502] allocated 120-byte region [fff00000c85fcf00, fff00000c85fcf78) [ 32.897855] [ 32.897905] The buggy address belongs to the physical page: [ 32.898091] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085fc [ 32.898149] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.898483] page_type: f5(slab) [ 32.898830] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.898912] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.898986] page dumped because: kasan: bad access detected [ 32.899166] [ 32.899235] Memory state around the buggy address: [ 32.899296] fff00000c85fce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.899688] fff00000c85fce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.899997] >fff00000c85fcf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.900119] ^ [ 32.900193] fff00000c85fcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.900295] fff00000c85fd000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.900872] ================================================================== [ 32.858280] ================================================================== [ 32.858552] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 32.858922] Read of size 121 at addr fff00000c85fcf00 by task kunit_try_catch/316 [ 32.859001] [ 32.859038] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.859464] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.859618] Hardware name: linux,dummy-virt (DT) [ 32.859821] Call trace: [ 32.859869] show_stack+0x20/0x38 (C) [ 32.859924] dump_stack_lvl+0x8c/0xd0 [ 32.859975] print_report+0x118/0x5d0 [ 32.860020] kasan_report+0xdc/0x128 [ 32.860076] kasan_check_range+0x100/0x1a8 [ 32.860122] __kasan_check_read+0x20/0x30 [ 32.860176] copy_user_test_oob+0x728/0xec8 [ 32.860226] kunit_try_run_case+0x170/0x3f0 [ 32.860276] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.860326] kthread+0x328/0x630 [ 32.860689] ret_from_fork+0x10/0x20 [ 32.861070] [ 32.861147] Allocated by task 316: [ 32.861213] kasan_save_stack+0x3c/0x68 [ 32.861261] kasan_save_track+0x20/0x40 [ 32.861325] kasan_save_alloc_info+0x40/0x58 [ 32.861538] __kasan_kmalloc+0xd4/0xd8 [ 32.861697] __kmalloc_noprof+0x198/0x4c8 [ 32.862118] kunit_kmalloc_array+0x34/0x88 [ 32.862299] copy_user_test_oob+0xac/0xec8 [ 32.862488] kunit_try_run_case+0x170/0x3f0 [ 32.862568] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.862726] kthread+0x328/0x630 [ 32.862893] ret_from_fork+0x10/0x20 [ 32.863022] [ 32.863055] The buggy address belongs to the object at fff00000c85fcf00 [ 32.863055] which belongs to the cache kmalloc-128 of size 128 [ 32.863387] The buggy address is located 0 bytes inside of [ 32.863387] allocated 120-byte region [fff00000c85fcf00, fff00000c85fcf78) [ 32.863498] [ 32.863625] The buggy address belongs to the physical page: [ 32.863665] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085fc [ 32.864027] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.864512] page_type: f5(slab) [ 32.864626] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.864681] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.865076] page dumped because: kasan: bad access detected [ 32.865190] [ 32.865446] Memory state around the buggy address: [ 32.865552] fff00000c85fce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.866113] fff00000c85fce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.866180] >fff00000c85fcf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.866353] ^ [ 32.866400] fff00000c85fcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.867006] fff00000c85fd000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.867072] ================================================================== [ 32.842358] ================================================================== [ 32.842486] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 32.842586] Write of size 121 at addr fff00000c85fcf00 by task kunit_try_catch/316 [ 32.842640] [ 32.842689] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.842784] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.842823] Hardware name: linux,dummy-virt (DT) [ 32.842859] Call trace: [ 32.842917] show_stack+0x20/0x38 (C) [ 32.842990] dump_stack_lvl+0x8c/0xd0 [ 32.843045] print_report+0x118/0x5d0 [ 32.843937] kasan_report+0xdc/0x128 [ 32.844177] kasan_check_range+0x100/0x1a8 [ 32.844438] __kasan_check_write+0x20/0x30 [ 32.844607] copy_user_test_oob+0x234/0xec8 [ 32.844774] kunit_try_run_case+0x170/0x3f0 [ 32.844862] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.844939] kthread+0x328/0x630 [ 32.845301] ret_from_fork+0x10/0x20 [ 32.845700] [ 32.845803] Allocated by task 316: [ 32.845850] kasan_save_stack+0x3c/0x68 [ 32.845988] kasan_save_track+0x20/0x40 [ 32.846033] kasan_save_alloc_info+0x40/0x58 [ 32.846366] __kasan_kmalloc+0xd4/0xd8 [ 32.846453] __kmalloc_noprof+0x198/0x4c8 [ 32.846569] kunit_kmalloc_array+0x34/0x88 [ 32.846762] copy_user_test_oob+0xac/0xec8 [ 32.846892] kunit_try_run_case+0x170/0x3f0 [ 32.847025] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.847092] kthread+0x328/0x630 [ 32.847562] ret_from_fork+0x10/0x20 [ 32.847638] [ 32.847737] The buggy address belongs to the object at fff00000c85fcf00 [ 32.847737] which belongs to the cache kmalloc-128 of size 128 [ 32.847843] The buggy address is located 0 bytes inside of [ 32.847843] allocated 120-byte region [fff00000c85fcf00, fff00000c85fcf78) [ 32.847916] [ 32.848245] The buggy address belongs to the physical page: [ 32.848349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085fc [ 32.848417] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.848474] page_type: f5(slab) [ 32.848739] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.848964] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.849100] page dumped because: kasan: bad access detected [ 32.849244] [ 32.849325] Memory state around the buggy address: [ 32.849492] fff00000c85fce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.849553] fff00000c85fce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.849879] >fff00000c85fcf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.849963] ^ [ 32.850189] fff00000c85fcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.850459] fff00000c85fd000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.850686] ================================================================== [ 32.902888] ================================================================== [ 32.903033] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 32.903131] Read of size 121 at addr fff00000c85fcf00 by task kunit_try_catch/316 [ 32.903284] [ 32.903318] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.903412] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.903439] Hardware name: linux,dummy-virt (DT) [ 32.903749] Call trace: [ 32.904043] show_stack+0x20/0x38 (C) [ 32.904150] dump_stack_lvl+0x8c/0xd0 [ 32.904378] print_report+0x118/0x5d0 [ 32.904561] kasan_report+0xdc/0x128 [ 32.904623] kasan_check_range+0x100/0x1a8 [ 32.904671] __kasan_check_read+0x20/0x30 [ 32.904719] copy_user_test_oob+0x4a0/0xec8 [ 32.904768] kunit_try_run_case+0x170/0x3f0 [ 32.904952] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.905143] kthread+0x328/0x630 [ 32.905359] ret_from_fork+0x10/0x20 [ 32.905727] [ 32.905777] Allocated by task 316: [ 32.905889] kasan_save_stack+0x3c/0x68 [ 32.905999] kasan_save_track+0x20/0x40 [ 32.906141] kasan_save_alloc_info+0x40/0x58 [ 32.906241] __kasan_kmalloc+0xd4/0xd8 [ 32.906412] __kmalloc_noprof+0x198/0x4c8 [ 32.906458] kunit_kmalloc_array+0x34/0x88 [ 32.906834] copy_user_test_oob+0xac/0xec8 [ 32.907109] kunit_try_run_case+0x170/0x3f0 [ 32.907705] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.907808] kthread+0x328/0x630 [ 32.907873] ret_from_fork+0x10/0x20 [ 32.908059] [ 32.908085] The buggy address belongs to the object at fff00000c85fcf00 [ 32.908085] which belongs to the cache kmalloc-128 of size 128 [ 32.908482] The buggy address is located 0 bytes inside of [ 32.908482] allocated 120-byte region [fff00000c85fcf00, fff00000c85fcf78) [ 32.908581] [ 32.908905] The buggy address belongs to the physical page: [ 32.908965] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085fc [ 32.909022] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.909083] page_type: f5(slab) [ 32.909124] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.909616] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.909780] page dumped because: kasan: bad access detected [ 32.909821] [ 32.909843] Memory state around the buggy address: [ 32.910124] fff00000c85fce00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.910215] fff00000c85fce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.910398] >fff00000c85fcf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.910467] ^ [ 32.910509] fff00000c85fcf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.910554] fff00000c85fd000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.910595] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[ 32.791457] ================================================================== [ 32.791584] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 32.791656] Read of size 8 at addr fff00000c85fce78 by task kunit_try_catch/312 [ 32.791708] [ 32.791942] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.792228] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.792317] Hardware name: linux,dummy-virt (DT) [ 32.792401] Call trace: [ 32.792504] show_stack+0x20/0x38 (C) [ 32.792585] dump_stack_lvl+0x8c/0xd0 [ 32.792899] print_report+0x118/0x5d0 [ 32.793007] kasan_report+0xdc/0x128 [ 32.793460] __asan_report_load8_noabort+0x20/0x30 [ 32.793594] copy_to_kernel_nofault+0x204/0x250 [ 32.794000] copy_to_kernel_nofault_oob+0x158/0x418 [ 32.794108] kunit_try_run_case+0x170/0x3f0 [ 32.794246] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.794389] kthread+0x328/0x630 [ 32.794498] ret_from_fork+0x10/0x20 [ 32.794566] [ 32.794587] Allocated by task 312: [ 32.794890] kasan_save_stack+0x3c/0x68 [ 32.794958] kasan_save_track+0x20/0x40 [ 32.795085] kasan_save_alloc_info+0x40/0x58 [ 32.795184] __kasan_kmalloc+0xd4/0xd8 [ 32.795380] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.795462] copy_to_kernel_nofault_oob+0xc8/0x418 [ 32.795660] kunit_try_run_case+0x170/0x3f0 [ 32.795965] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.796038] kthread+0x328/0x630 [ 32.796813] ret_from_fork+0x10/0x20 [ 32.796945] [ 32.797021] The buggy address belongs to the object at fff00000c85fce00 [ 32.797021] which belongs to the cache kmalloc-128 of size 128 [ 32.797219] The buggy address is located 0 bytes to the right of [ 32.797219] allocated 120-byte region [fff00000c85fce00, fff00000c85fce78) [ 32.797310] [ 32.797334] The buggy address belongs to the physical page: [ 32.797394] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085fc [ 32.797750] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.797973] page_type: f5(slab) [ 32.798154] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.798259] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.798375] page dumped because: kasan: bad access detected [ 32.798658] [ 32.798774] Memory state around the buggy address: [ 32.798916] fff00000c85fcd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.799077] fff00000c85fcd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.799183] >fff00000c85fce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.799307] ^ [ 32.799378] fff00000c85fce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.799475] fff00000c85fcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.799904] ================================================================== [ 32.801680] ================================================================== [ 32.802385] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 32.802474] Write of size 8 at addr fff00000c85fce78 by task kunit_try_catch/312 [ 32.802531] [ 32.802567] CPU: 0 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.802770] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.802837] Hardware name: linux,dummy-virt (DT) [ 32.802881] Call trace: [ 32.803000] show_stack+0x20/0x38 (C) [ 32.803393] dump_stack_lvl+0x8c/0xd0 [ 32.803475] print_report+0x118/0x5d0 [ 32.803522] kasan_report+0xdc/0x128 [ 32.803752] kasan_check_range+0x100/0x1a8 [ 32.803810] __kasan_check_write+0x20/0x30 [ 32.803858] copy_to_kernel_nofault+0x8c/0x250 [ 32.804110] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 32.804416] kunit_try_run_case+0x170/0x3f0 [ 32.804565] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.804749] kthread+0x328/0x630 [ 32.804886] ret_from_fork+0x10/0x20 [ 32.805093] [ 32.805161] Allocated by task 312: [ 32.805262] kasan_save_stack+0x3c/0x68 [ 32.805311] kasan_save_track+0x20/0x40 [ 32.805373] kasan_save_alloc_info+0x40/0x58 [ 32.805544] __kasan_kmalloc+0xd4/0xd8 [ 32.805766] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.805952] copy_to_kernel_nofault_oob+0xc8/0x418 [ 32.806013] kunit_try_run_case+0x170/0x3f0 [ 32.806473] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.806568] kthread+0x328/0x630 [ 32.806664] ret_from_fork+0x10/0x20 [ 32.806734] [ 32.806998] The buggy address belongs to the object at fff00000c85fce00 [ 32.806998] which belongs to the cache kmalloc-128 of size 128 [ 32.807131] The buggy address is located 0 bytes to the right of [ 32.807131] allocated 120-byte region [fff00000c85fce00, fff00000c85fce78) [ 32.807434] [ 32.807568] The buggy address belongs to the physical page: [ 32.807646] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085fc [ 32.807814] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.807894] page_type: f5(slab) [ 32.807945] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.808008] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.808063] page dumped because: kasan: bad access detected [ 32.808097] [ 32.808130] Memory state around the buggy address: [ 32.808191] fff00000c85fcd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.808239] fff00000c85fcd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.808654] >fff00000c85fce00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 32.808743] ^ [ 32.809260] fff00000c85fce80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.809325] fff00000c85fcf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.809534] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 32.731467] ================================================================== [ 32.732147] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 32.732751] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/300 [ 32.733133] [ 32.733257] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.733641] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.733753] Hardware name: linux,dummy-virt (DT) [ 32.733838] Call trace: [ 32.733864] show_stack+0x20/0x38 (C) [ 32.734247] dump_stack_lvl+0x8c/0xd0 [ 32.734360] print_report+0x310/0x5d0 [ 32.734428] kasan_report+0xdc/0x128 [ 32.734753] __asan_report_load1_noabort+0x20/0x30 [ 32.734928] vmalloc_oob+0x578/0x5d0 [ 32.735109] kunit_try_run_case+0x170/0x3f0 [ 32.735221] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.735548] kthread+0x328/0x630 [ 32.735860] ret_from_fork+0x10/0x20 [ 32.736032] [ 32.736072] The buggy address ffff8000800fe7f3 belongs to a vmalloc virtual mapping [ 32.736227] The buggy address belongs to the physical page: [ 32.736394] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a89 [ 32.736735] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.736852] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 32.736933] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.737424] page dumped because: kasan: bad access detected [ 32.737467] [ 32.737596] Memory state around the buggy address: [ 32.737791] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.738168] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.738308] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 32.738352] ^ [ 32.738416] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 32.738752] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 32.739065] ================================================================== [ 32.741815] ================================================================== [ 32.741873] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 32.741934] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/300 [ 32.741986] [ 32.742064] CPU: 0 UID: 0 PID: 300 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.742154] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.742181] Hardware name: linux,dummy-virt (DT) [ 32.742224] Call trace: [ 32.742250] show_stack+0x20/0x38 (C) [ 32.742304] dump_stack_lvl+0x8c/0xd0 [ 32.742353] print_report+0x310/0x5d0 [ 32.742396] kasan_report+0xdc/0x128 [ 32.742441] __asan_report_load1_noabort+0x20/0x30 [ 32.742489] vmalloc_oob+0x51c/0x5d0 [ 32.742535] kunit_try_run_case+0x170/0x3f0 [ 32.742593] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.742647] kthread+0x328/0x630 [ 32.742689] ret_from_fork+0x10/0x20 [ 32.742736] [ 32.742760] The buggy address ffff8000800fe7f8 belongs to a vmalloc virtual mapping [ 32.742804] The buggy address belongs to the physical page: [ 32.742848] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a89 [ 32.742907] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.742968] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 32.743019] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.743070] page dumped because: kasan: bad access detected [ 32.743103] [ 32.743131] Memory state around the buggy address: [ 32.743165] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.743210] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.743260] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 32.743301] ^ [ 32.743343] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 32.743387] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 32.743426] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 32.567374] ================================================================== [ 32.567433] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 32.567485] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.567556] [ 32.567591] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.567676] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.567705] Hardware name: linux,dummy-virt (DT) [ 32.567742] Call trace: [ 32.567769] show_stack+0x20/0x38 (C) [ 32.567816] dump_stack_lvl+0x8c/0xd0 [ 32.567863] print_report+0x118/0x5d0 [ 32.567912] kasan_report+0xdc/0x128 [ 32.567957] kasan_check_range+0x100/0x1a8 [ 32.568020] __kasan_check_write+0x20/0x30 [ 32.568083] kasan_atomics_helper+0x1128/0x4858 [ 32.568137] kasan_atomics+0x198/0x2e0 [ 32.568447] kunit_try_run_case+0x170/0x3f0 [ 32.568873] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.568928] kthread+0x328/0x630 [ 32.568973] ret_from_fork+0x10/0x20 [ 32.569388] [ 32.569443] Allocated by task 296: [ 32.570069] kasan_save_stack+0x3c/0x68 [ 32.570342] kasan_save_track+0x20/0x40 [ 32.570426] kasan_save_alloc_info+0x40/0x58 [ 32.570598] __kasan_kmalloc+0xd4/0xd8 [ 32.570765] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.571070] kasan_atomics+0xb8/0x2e0 [ 32.571414] kunit_try_run_case+0x170/0x3f0 [ 32.571580] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.571631] kthread+0x328/0x630 [ 32.571813] ret_from_fork+0x10/0x20 [ 32.572027] [ 32.572100] The buggy address belongs to the object at fff00000c85f0e00 [ 32.572100] which belongs to the cache kmalloc-64 of size 64 [ 32.572277] The buggy address is located 0 bytes to the right of [ 32.572277] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.572558] [ 32.572588] The buggy address belongs to the physical page: [ 32.572794] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.572918] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.572997] page_type: f5(slab) [ 32.573318] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.573430] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.573550] page dumped because: kasan: bad access detected [ 32.573628] [ 32.573912] Memory state around the buggy address: [ 32.574043] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.574145] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.574390] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.574562] ^ [ 32.574711] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.574789] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.574917] ================================================================== [ 32.684792] ================================================================== [ 32.684845] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 32.684895] Read of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.684946] [ 32.684976] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.685075] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.685104] Hardware name: linux,dummy-virt (DT) [ 32.685134] Call trace: [ 32.685159] show_stack+0x20/0x38 (C) [ 32.685207] dump_stack_lvl+0x8c/0xd0 [ 32.685254] print_report+0x118/0x5d0 [ 32.685298] kasan_report+0xdc/0x128 [ 32.685343] __asan_report_load8_noabort+0x20/0x30 [ 32.685395] kasan_atomics_helper+0x3df4/0x4858 [ 32.685445] kasan_atomics+0x198/0x2e0 [ 32.685493] kunit_try_run_case+0x170/0x3f0 [ 32.685542] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.685598] kthread+0x328/0x630 [ 32.685641] ret_from_fork+0x10/0x20 [ 32.685691] [ 32.685712] Allocated by task 296: [ 32.685741] kasan_save_stack+0x3c/0x68 [ 32.685784] kasan_save_track+0x20/0x40 [ 32.685823] kasan_save_alloc_info+0x40/0x58 [ 32.685862] __kasan_kmalloc+0xd4/0xd8 [ 32.685901] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.686005] kasan_atomics+0xb8/0x2e0 [ 32.686240] kunit_try_run_case+0x170/0x3f0 [ 32.686282] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.686325] kthread+0x328/0x630 [ 32.686361] ret_from_fork+0x10/0x20 [ 32.686447] [ 32.686505] The buggy address belongs to the object at fff00000c85f0e00 [ 32.686505] which belongs to the cache kmalloc-64 of size 64 [ 32.686746] The buggy address is located 0 bytes to the right of [ 32.686746] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.686812] [ 32.687010] The buggy address belongs to the physical page: [ 32.687066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.687400] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.687463] page_type: f5(slab) [ 32.687503] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.687555] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.687595] page dumped because: kasan: bad access detected [ 32.687629] [ 32.687932] Memory state around the buggy address: [ 32.688057] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.688199] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.688364] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.688469] ^ [ 32.688835] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.688884] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.688925] ================================================================== [ 32.697493] ================================================================== [ 32.697615] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 32.697687] Read of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.697740] [ 32.697789] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.697873] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.697900] Hardware name: linux,dummy-virt (DT) [ 32.697933] Call trace: [ 32.697955] show_stack+0x20/0x38 (C) [ 32.698023] dump_stack_lvl+0x8c/0xd0 [ 32.698081] print_report+0x118/0x5d0 [ 32.698239] kasan_report+0xdc/0x128 [ 32.698493] __asan_report_load8_noabort+0x20/0x30 [ 32.698566] kasan_atomics_helper+0x3e10/0x4858 [ 32.698928] kasan_atomics+0x198/0x2e0 [ 32.699003] kunit_try_run_case+0x170/0x3f0 [ 32.699068] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.699120] kthread+0x328/0x630 [ 32.699197] ret_from_fork+0x10/0x20 [ 32.699293] [ 32.699322] Allocated by task 296: [ 32.699353] kasan_save_stack+0x3c/0x68 [ 32.699433] kasan_save_track+0x20/0x40 [ 32.699511] kasan_save_alloc_info+0x40/0x58 [ 32.699552] __kasan_kmalloc+0xd4/0xd8 [ 32.699590] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.699658] kasan_atomics+0xb8/0x2e0 [ 32.699698] kunit_try_run_case+0x170/0x3f0 [ 32.699738] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.699781] kthread+0x328/0x630 [ 32.699902] ret_from_fork+0x10/0x20 [ 32.700034] [ 32.700088] The buggy address belongs to the object at fff00000c85f0e00 [ 32.700088] which belongs to the cache kmalloc-64 of size 64 [ 32.700151] The buggy address is located 0 bytes to the right of [ 32.700151] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.700246] [ 32.700434] The buggy address belongs to the physical page: [ 32.700521] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.700669] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.700741] page_type: f5(slab) [ 32.700781] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.700855] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.700928] page dumped because: kasan: bad access detected [ 32.700962] [ 32.700983] Memory state around the buggy address: [ 32.701016] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.701170] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.701232] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.701273] ^ [ 32.701308] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.701363] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.701404] ================================================================== [ 32.354357] ================================================================== [ 32.354405] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 32.354453] Read of size 4 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.354504] [ 32.354535] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.354618] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.354648] Hardware name: linux,dummy-virt (DT) [ 32.354680] Call trace: [ 32.354704] show_stack+0x20/0x38 (C) [ 32.354775] dump_stack_lvl+0x8c/0xd0 [ 32.354823] print_report+0x118/0x5d0 [ 32.354867] kasan_report+0xdc/0x128 [ 32.354918] __asan_report_load4_noabort+0x20/0x30 [ 32.354968] kasan_atomics_helper+0x42d8/0x4858 [ 32.355020] kasan_atomics+0x198/0x2e0 [ 32.355684] kunit_try_run_case+0x170/0x3f0 [ 32.355782] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.356544] kthread+0x328/0x630 [ 32.356639] ret_from_fork+0x10/0x20 [ 32.356721] [ 32.356742] Allocated by task 296: [ 32.356796] kasan_save_stack+0x3c/0x68 [ 32.357275] __kasan_kmalloc+0xd4/0xd8 [ 32.358627] [ 32.358926] [ 32.359151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.359280] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.359341] page_type: f5(slab) [ 32.359871] page dumped because: kasan: bad access detected [ 32.360645] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.364657] kasan_atomics+0x198/0x2e0 [ 32.365592] Allocated by task 296: [ 32.365736] kasan_save_stack+0x3c/0x68 [ 32.365968] kasan_save_track+0x20/0x40 [ 32.366139] kasan_save_alloc_info+0x40/0x58 [ 32.366211] __kasan_kmalloc+0xd4/0xd8 [ 32.366540] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.366617] kasan_atomics+0xb8/0x2e0 [ 32.366784] kunit_try_run_case+0x170/0x3f0 [ 32.366856] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.367043] kthread+0x328/0x630 [ 32.367241] ret_from_fork+0x10/0x20 [ 32.367300] [ 32.367324] The buggy address belongs to the object at fff00000c85f0e00 [ 32.367324] which belongs to the cache kmalloc-64 of size 64 [ 32.367650] The buggy address is located 0 bytes to the right of [ 32.367650] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.368072] [ 32.368126] The buggy address belongs to the physical page: [ 32.368281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.368547] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.368814] page_type: f5(slab) [ 32.369007] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.369129] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.369218] page dumped because: kasan: bad access detected [ 32.369252] [ 32.369491] Memory state around the buggy address: [ 32.369652] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.370077] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.370163] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.370307] ^ [ 32.370364] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.370525] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.370649] ================================================================== [ 32.635883] ================================================================== [ 32.635985] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 32.636199] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.636497] [ 32.636875] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.637127] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.637195] Hardware name: linux,dummy-virt (DT) [ 32.637352] Call trace: [ 32.637379] show_stack+0x20/0x38 (C) [ 32.637434] dump_stack_lvl+0x8c/0xd0 [ 32.638072] print_report+0x118/0x5d0 [ 32.638144] kasan_report+0xdc/0x128 [ 32.638324] kasan_check_range+0x100/0x1a8 [ 32.638613] __kasan_check_write+0x20/0x30 [ 32.638772] kasan_atomics_helper+0x147c/0x4858 [ 32.638961] kasan_atomics+0x198/0x2e0 [ 32.639153] kunit_try_run_case+0x170/0x3f0 [ 32.639250] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.639341] kthread+0x328/0x630 [ 32.639564] ret_from_fork+0x10/0x20 [ 32.639821] [ 32.639887] Allocated by task 296: [ 32.640200] kasan_save_stack+0x3c/0x68 [ 32.640661] kasan_save_track+0x20/0x40 [ 32.640781] kasan_save_alloc_info+0x40/0x58 [ 32.641175] __kasan_kmalloc+0xd4/0xd8 [ 32.641250] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.641459] kasan_atomics+0xb8/0x2e0 [ 32.641705] kunit_try_run_case+0x170/0x3f0 [ 32.641809] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.642145] kthread+0x328/0x630 [ 32.642546] ret_from_fork+0x10/0x20 [ 32.642792] [ 32.642838] The buggy address belongs to the object at fff00000c85f0e00 [ 32.642838] which belongs to the cache kmalloc-64 of size 64 [ 32.642917] The buggy address is located 0 bytes to the right of [ 32.642917] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.643204] [ 32.643239] The buggy address belongs to the physical page: [ 32.643398] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.643807] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.644315] page_type: f5(slab) [ 32.644381] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.644795] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.644865] page dumped because: kasan: bad access detected [ 32.645024] [ 32.645144] Memory state around the buggy address: [ 32.645213] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.645620] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.645718] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.645827] ^ [ 32.646095] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.646236] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.646484] ================================================================== [ 32.520044] ================================================================== [ 32.520114] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 32.520278] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.520430] [ 32.520498] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.520597] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.520895] Hardware name: linux,dummy-virt (DT) [ 32.520948] Call trace: [ 32.521026] show_stack+0x20/0x38 (C) [ 32.521380] dump_stack_lvl+0x8c/0xd0 [ 32.521506] print_report+0x118/0x5d0 [ 32.521620] kasan_report+0xdc/0x128 [ 32.521665] kasan_check_range+0x100/0x1a8 [ 32.521986] __kasan_check_write+0x20/0x30 [ 32.522392] kasan_atomics_helper+0xf20/0x4858 [ 32.522516] kasan_atomics+0x198/0x2e0 [ 32.522693] kunit_try_run_case+0x170/0x3f0 [ 32.522871] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.523363] kthread+0x328/0x630 [ 32.523502] ret_from_fork+0x10/0x20 [ 32.523615] [ 32.523675] Allocated by task 296: [ 32.523704] kasan_save_stack+0x3c/0x68 [ 32.524122] kasan_save_track+0x20/0x40 [ 32.524259] kasan_save_alloc_info+0x40/0x58 [ 32.524439] __kasan_kmalloc+0xd4/0xd8 [ 32.524618] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.524675] kasan_atomics+0xb8/0x2e0 [ 32.524860] kunit_try_run_case+0x170/0x3f0 [ 32.524984] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.525124] kthread+0x328/0x630 [ 32.525436] ret_from_fork+0x10/0x20 [ 32.525580] [ 32.525627] The buggy address belongs to the object at fff00000c85f0e00 [ 32.525627] which belongs to the cache kmalloc-64 of size 64 [ 32.525844] The buggy address is located 0 bytes to the right of [ 32.525844] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.526102] [ 32.526147] The buggy address belongs to the physical page: [ 32.526295] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.526511] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.526634] page_type: f5(slab) [ 32.526967] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.527233] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.527468] page dumped because: kasan: bad access detected [ 32.527597] [ 32.527693] Memory state around the buggy address: [ 32.527775] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.527934] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.527981] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.528234] ^ [ 32.528407] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.528619] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.528817] ================================================================== [ 32.549677] ================================================================== [ 32.549749] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 32.549874] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.549936] [ 32.550160] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.550270] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.550352] Hardware name: linux,dummy-virt (DT) [ 32.550390] Call trace: [ 32.550440] show_stack+0x20/0x38 (C) [ 32.550492] dump_stack_lvl+0x8c/0xd0 [ 32.550551] print_report+0x118/0x5d0 [ 32.550597] kasan_report+0xdc/0x128 [ 32.550640] kasan_check_range+0x100/0x1a8 [ 32.550688] __kasan_check_write+0x20/0x30 [ 32.551185] kasan_atomics_helper+0x1058/0x4858 [ 32.551265] kasan_atomics+0x198/0x2e0 [ 32.551543] kunit_try_run_case+0x170/0x3f0 [ 32.551694] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.551757] kthread+0x328/0x630 [ 32.551802] ret_from_fork+0x10/0x20 [ 32.551852] [ 32.551872] Allocated by task 296: [ 32.552383] kasan_save_stack+0x3c/0x68 [ 32.552528] kasan_save_track+0x20/0x40 [ 32.552626] kasan_save_alloc_info+0x40/0x58 [ 32.552704] __kasan_kmalloc+0xd4/0xd8 [ 32.552857] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.552914] kasan_atomics+0xb8/0x2e0 [ 32.552961] kunit_try_run_case+0x170/0x3f0 [ 32.553003] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.553311] kthread+0x328/0x630 [ 32.553444] ret_from_fork+0x10/0x20 [ 32.553497] [ 32.553540] The buggy address belongs to the object at fff00000c85f0e00 [ 32.553540] which belongs to the cache kmalloc-64 of size 64 [ 32.553605] The buggy address is located 0 bytes to the right of [ 32.553605] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.553672] [ 32.553703] The buggy address belongs to the physical page: [ 32.553737] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.553804] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.553854] page_type: f5(slab) [ 32.553908] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.553961] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.554012] page dumped because: kasan: bad access detected [ 32.554045] [ 32.554092] Memory state around the buggy address: [ 32.554126] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.554170] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.554214] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.554255] ^ [ 32.554299] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.554353] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.554394] ================================================================== [ 32.648157] ================================================================== [ 32.648716] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 32.649002] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.649221] [ 32.649291] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.649386] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.649506] Hardware name: linux,dummy-virt (DT) [ 32.649578] Call trace: [ 32.649637] show_stack+0x20/0x38 (C) [ 32.649692] dump_stack_lvl+0x8c/0xd0 [ 32.649747] print_report+0x118/0x5d0 [ 32.649793] kasan_report+0xdc/0x128 [ 32.649837] kasan_check_range+0x100/0x1a8 [ 32.649883] __kasan_check_write+0x20/0x30 [ 32.649938] kasan_atomics_helper+0x14e4/0x4858 [ 32.649989] kasan_atomics+0x198/0x2e0 [ 32.650037] kunit_try_run_case+0x170/0x3f0 [ 32.650097] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.650148] kthread+0x328/0x630 [ 32.650191] ret_from_fork+0x10/0x20 [ 32.650258] [ 32.650282] Allocated by task 296: [ 32.650328] kasan_save_stack+0x3c/0x68 [ 32.650372] kasan_save_track+0x20/0x40 [ 32.650413] kasan_save_alloc_info+0x40/0x58 [ 32.650453] __kasan_kmalloc+0xd4/0xd8 [ 32.650503] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.650546] kasan_atomics+0xb8/0x2e0 [ 32.650585] kunit_try_run_case+0x170/0x3f0 [ 32.650626] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.650680] kthread+0x328/0x630 [ 32.650724] ret_from_fork+0x10/0x20 [ 32.650777] [ 32.650798] The buggy address belongs to the object at fff00000c85f0e00 [ 32.650798] which belongs to the cache kmalloc-64 of size 64 [ 32.650866] The buggy address is located 0 bytes to the right of [ 32.650866] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.650932] [ 32.650954] The buggy address belongs to the physical page: [ 32.650987] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.651054] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.651550] page_type: f5(slab) [ 32.652045] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.652131] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.652225] page dumped because: kasan: bad access detected [ 32.652278] [ 32.652333] Memory state around the buggy address: [ 32.652773] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.653078] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.653131] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.653169] ^ [ 32.653206] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.653600] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.654122] ================================================================== [ 32.712615] ================================================================== [ 32.712664] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 32.712716] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.712787] [ 32.712821] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.713061] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.713126] Hardware name: linux,dummy-virt (DT) [ 32.713161] Call trace: [ 32.713211] show_stack+0x20/0x38 (C) [ 32.713270] dump_stack_lvl+0x8c/0xd0 [ 32.713471] print_report+0x118/0x5d0 [ 32.713578] kasan_report+0xdc/0x128 [ 32.713663] kasan_check_range+0x100/0x1a8 [ 32.713728] __kasan_check_write+0x20/0x30 [ 32.713814] kasan_atomics_helper+0x17ec/0x4858 [ 32.713895] kasan_atomics+0x198/0x2e0 [ 32.713942] kunit_try_run_case+0x170/0x3f0 [ 32.714010] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.714073] kthread+0x328/0x630 [ 32.714153] ret_from_fork+0x10/0x20 [ 32.714230] [ 32.714258] Allocated by task 296: [ 32.714290] kasan_save_stack+0x3c/0x68 [ 32.714334] kasan_save_track+0x20/0x40 [ 32.714375] kasan_save_alloc_info+0x40/0x58 [ 32.714645] __kasan_kmalloc+0xd4/0xd8 [ 32.714715] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.714761] kasan_atomics+0xb8/0x2e0 [ 32.714798] kunit_try_run_case+0x170/0x3f0 [ 32.714851] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.714895] kthread+0x328/0x630 [ 32.714936] ret_from_fork+0x10/0x20 [ 32.714976] [ 32.714998] The buggy address belongs to the object at fff00000c85f0e00 [ 32.714998] which belongs to the cache kmalloc-64 of size 64 [ 32.715076] The buggy address is located 0 bytes to the right of [ 32.715076] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.715142] [ 32.715164] The buggy address belongs to the physical page: [ 32.715196] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.715247] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.715306] page_type: f5(slab) [ 32.715346] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.715396] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.715445] page dumped because: kasan: bad access detected [ 32.715484] [ 32.715504] Memory state around the buggy address: [ 32.715548] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.715592] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.715636] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.715676] ^ [ 32.715708] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.715751] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.715799] ================================================================== [ 32.488152] ================================================================== [ 32.488370] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 32.488553] Read of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.488611] [ 32.488643] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.489320] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.489358] Hardware name: linux,dummy-virt (DT) [ 32.489406] Call trace: [ 32.489453] show_stack+0x20/0x38 (C) [ 32.489882] dump_stack_lvl+0x8c/0xd0 [ 32.490113] print_report+0x118/0x5d0 [ 32.490428] kasan_report+0xdc/0x128 [ 32.490630] __asan_report_load8_noabort+0x20/0x30 [ 32.491011] kasan_atomics_helper+0x3f58/0x4858 [ 32.491141] kasan_atomics+0x198/0x2e0 [ 32.491194] kunit_try_run_case+0x170/0x3f0 [ 32.491405] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.491740] kthread+0x328/0x630 [ 32.491937] ret_from_fork+0x10/0x20 [ 32.492017] [ 32.492038] Allocated by task 296: [ 32.492192] kasan_save_stack+0x3c/0x68 [ 32.492481] kasan_save_track+0x20/0x40 [ 32.492659] kasan_save_alloc_info+0x40/0x58 [ 32.492867] __kasan_kmalloc+0xd4/0xd8 [ 32.492951] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.492995] kasan_atomics+0xb8/0x2e0 [ 32.493042] kunit_try_run_case+0x170/0x3f0 [ 32.493095] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.493489] kthread+0x328/0x630 [ 32.493571] ret_from_fork+0x10/0x20 [ 32.493642] [ 32.493780] The buggy address belongs to the object at fff00000c85f0e00 [ 32.493780] which belongs to the cache kmalloc-64 of size 64 [ 32.494012] The buggy address is located 0 bytes to the right of [ 32.494012] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.494161] [ 32.494222] The buggy address belongs to the physical page: [ 32.494494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.494705] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.494781] page_type: f5(slab) [ 32.494865] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.494951] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.495022] page dumped because: kasan: bad access detected [ 32.495065] [ 32.495086] Memory state around the buggy address: [ 32.495268] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.495575] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.495786] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.495874] ^ [ 32.496012] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.496107] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.496228] ================================================================== [ 32.619946] ================================================================== [ 32.619998] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 32.620139] Read of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.620387] [ 32.620421] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.620507] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.620536] Hardware name: linux,dummy-virt (DT) [ 32.620569] Call trace: [ 32.620592] show_stack+0x20/0x38 (C) [ 32.620644] dump_stack_lvl+0x8c/0xd0 [ 32.620693] print_report+0x118/0x5d0 [ 32.620739] kasan_report+0xdc/0x128 [ 32.620784] __asan_report_load8_noabort+0x20/0x30 [ 32.621401] kasan_atomics_helper+0x3f04/0x4858 [ 32.621529] kasan_atomics+0x198/0x2e0 [ 32.621876] kunit_try_run_case+0x170/0x3f0 [ 32.622005] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.622383] kthread+0x328/0x630 [ 32.622479] ret_from_fork+0x10/0x20 [ 32.622793] [ 32.622917] Allocated by task 296: [ 32.623229] kasan_save_stack+0x3c/0x68 [ 32.623323] kasan_save_track+0x20/0x40 [ 32.623385] kasan_save_alloc_info+0x40/0x58 [ 32.623629] __kasan_kmalloc+0xd4/0xd8 [ 32.623857] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.624070] kasan_atomics+0xb8/0x2e0 [ 32.624177] kunit_try_run_case+0x170/0x3f0 [ 32.624292] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.624462] kthread+0x328/0x630 [ 32.624667] ret_from_fork+0x10/0x20 [ 32.624993] [ 32.625068] The buggy address belongs to the object at fff00000c85f0e00 [ 32.625068] which belongs to the cache kmalloc-64 of size 64 [ 32.625439] The buggy address is located 0 bytes to the right of [ 32.625439] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.625639] [ 32.625713] The buggy address belongs to the physical page: [ 32.625847] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.625932] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.626311] page_type: f5(slab) [ 32.626491] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.626708] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.626803] page dumped because: kasan: bad access detected [ 32.627220] [ 32.627264] Memory state around the buggy address: [ 32.627318] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.627629] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.627750] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.627869] ^ [ 32.628068] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.628143] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.628384] ================================================================== [ 32.530539] ================================================================== [ 32.530593] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 32.530645] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.530697] [ 32.530965] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.531212] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.531386] Hardware name: linux,dummy-virt (DT) [ 32.531651] Call trace: [ 32.531688] show_stack+0x20/0x38 (C) [ 32.531741] dump_stack_lvl+0x8c/0xd0 [ 32.531981] print_report+0x118/0x5d0 [ 32.532043] kasan_report+0xdc/0x128 [ 32.532102] kasan_check_range+0x100/0x1a8 [ 32.532300] __kasan_check_write+0x20/0x30 [ 32.532490] kasan_atomics_helper+0xf88/0x4858 [ 32.532923] kasan_atomics+0x198/0x2e0 [ 32.533407] kunit_try_run_case+0x170/0x3f0 [ 32.533693] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.533754] kthread+0x328/0x630 [ 32.533799] ret_from_fork+0x10/0x20 [ 32.534241] [ 32.534286] Allocated by task 296: [ 32.534364] kasan_save_stack+0x3c/0x68 [ 32.534514] kasan_save_track+0x20/0x40 [ 32.534565] kasan_save_alloc_info+0x40/0x58 [ 32.534607] __kasan_kmalloc+0xd4/0xd8 [ 32.534982] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.535180] kasan_atomics+0xb8/0x2e0 [ 32.535334] kunit_try_run_case+0x170/0x3f0 [ 32.535501] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.535706] kthread+0x328/0x630 [ 32.535769] ret_from_fork+0x10/0x20 [ 32.536059] [ 32.536149] The buggy address belongs to the object at fff00000c85f0e00 [ 32.536149] which belongs to the cache kmalloc-64 of size 64 [ 32.536361] The buggy address is located 0 bytes to the right of [ 32.536361] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.536443] [ 32.536466] The buggy address belongs to the physical page: [ 32.536686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.536775] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.536976] page_type: f5(slab) [ 32.537150] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.537290] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.537417] page dumped because: kasan: bad access detected [ 32.537491] [ 32.537512] Memory state around the buggy address: [ 32.537595] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.537660] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.537711] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.537757] ^ [ 32.537796] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.537846] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.537902] ================================================================== [ 32.690464] ================================================================== [ 32.690527] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 32.690716] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.690810] [ 32.690841] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.690927] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.690954] Hardware name: linux,dummy-virt (DT) [ 32.691379] Call trace: [ 32.691421] show_stack+0x20/0x38 (C) [ 32.691482] dump_stack_lvl+0x8c/0xd0 [ 32.691565] print_report+0x118/0x5d0 [ 32.691774] kasan_report+0xdc/0x128 [ 32.692096] kasan_check_range+0x100/0x1a8 [ 32.692158] __kasan_check_write+0x20/0x30 [ 32.692594] kasan_atomics_helper+0x16d0/0x4858 [ 32.692742] kasan_atomics+0x198/0x2e0 [ 32.692995] kunit_try_run_case+0x170/0x3f0 [ 32.693056] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.693127] kthread+0x328/0x630 [ 32.693170] ret_from_fork+0x10/0x20 [ 32.693219] [ 32.693842] Allocated by task 296: [ 32.693977] kasan_save_stack+0x3c/0x68 [ 32.694173] kasan_save_track+0x20/0x40 [ 32.694292] kasan_save_alloc_info+0x40/0x58 [ 32.694402] __kasan_kmalloc+0xd4/0xd8 [ 32.694507] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.694550] kasan_atomics+0xb8/0x2e0 [ 32.694590] kunit_try_run_case+0x170/0x3f0 [ 32.694631] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.694674] kthread+0x328/0x630 [ 32.694709] ret_from_fork+0x10/0x20 [ 32.694760] [ 32.694804] The buggy address belongs to the object at fff00000c85f0e00 [ 32.694804] which belongs to the cache kmalloc-64 of size 64 [ 32.694864] The buggy address is located 0 bytes to the right of [ 32.694864] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.694936] [ 32.694959] The buggy address belongs to the physical page: [ 32.695015] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.695078] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.695132] page_type: f5(slab) [ 32.695283] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.695338] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.695378] page dumped because: kasan: bad access detected [ 32.695656] [ 32.695744] Memory state around the buggy address: [ 32.695827] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.696178] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.696235] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.696323] ^ [ 32.696653] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.696770] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.696889] ================================================================== [ 32.497536] ================================================================== [ 32.497643] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 32.497698] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.497766] [ 32.498074] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.498178] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.498416] Hardware name: linux,dummy-virt (DT) [ 32.498475] Call trace: [ 32.498503] show_stack+0x20/0x38 (C) [ 32.498686] dump_stack_lvl+0x8c/0xd0 [ 32.498753] print_report+0x118/0x5d0 [ 32.498797] kasan_report+0xdc/0x128 [ 32.499076] kasan_check_range+0x100/0x1a8 [ 32.499138] __kasan_check_write+0x20/0x30 [ 32.499330] kasan_atomics_helper+0xe44/0x4858 [ 32.499575] kasan_atomics+0x198/0x2e0 [ 32.499639] kunit_try_run_case+0x170/0x3f0 [ 32.499693] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.499754] kthread+0x328/0x630 [ 32.499828] ret_from_fork+0x10/0x20 [ 32.499883] [ 32.499923] Allocated by task 296: [ 32.499960] kasan_save_stack+0x3c/0x68 [ 32.500150] kasan_save_track+0x20/0x40 [ 32.500543] kasan_save_alloc_info+0x40/0x58 [ 32.500745] __kasan_kmalloc+0xd4/0xd8 [ 32.500867] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.500911] kasan_atomics+0xb8/0x2e0 [ 32.501250] kunit_try_run_case+0x170/0x3f0 [ 32.501430] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.501607] kthread+0x328/0x630 [ 32.501875] ret_from_fork+0x10/0x20 [ 32.501925] [ 32.502101] The buggy address belongs to the object at fff00000c85f0e00 [ 32.502101] which belongs to the cache kmalloc-64 of size 64 [ 32.502313] The buggy address is located 0 bytes to the right of [ 32.502313] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.502628] [ 32.502679] The buggy address belongs to the physical page: [ 32.502741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.502824] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.502874] page_type: f5(slab) [ 32.502923] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.502975] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.503019] page dumped because: kasan: bad access detected [ 32.503076] [ 32.503106] Memory state around the buggy address: [ 32.503139] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.503183] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.503227] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.503281] ^ [ 32.503314] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.503358] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.503407] ================================================================== [ 32.371942] ================================================================== [ 32.372321] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 32.372515] Write of size 4 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.372634] [ 32.372842] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.373033] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.373078] Hardware name: linux,dummy-virt (DT) [ 32.373111] Call trace: [ 32.373135] show_stack+0x20/0x38 (C) [ 32.373186] dump_stack_lvl+0x8c/0xd0 [ 32.373236] print_report+0x118/0x5d0 [ 32.373281] kasan_report+0xdc/0x128 [ 32.373388] kasan_check_range+0x100/0x1a8 [ 32.373459] __kasan_check_write+0x20/0x30 [ 32.373513] kasan_atomics_helper+0x99c/0x4858 [ 32.373563] kasan_atomics+0x198/0x2e0 [ 32.373614] kunit_try_run_case+0x170/0x3f0 [ 32.373672] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.373723] kthread+0x328/0x630 [ 32.373775] ret_from_fork+0x10/0x20 [ 32.373836] [ 32.373857] Allocated by task 296: [ 32.373894] kasan_save_stack+0x3c/0x68 [ 32.373940] kasan_save_track+0x20/0x40 [ 32.373987] kasan_save_alloc_info+0x40/0x58 [ 32.374034] __kasan_kmalloc+0xd4/0xd8 [ 32.374624] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.374883] kasan_atomics+0xb8/0x2e0 [ 32.375205] kunit_try_run_case+0x170/0x3f0 [ 32.375258] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.375571] kthread+0x328/0x630 [ 32.375700] ret_from_fork+0x10/0x20 [ 32.375799] [ 32.375928] The buggy address belongs to the object at fff00000c85f0e00 [ 32.375928] which belongs to the cache kmalloc-64 of size 64 [ 32.376167] The buggy address is located 0 bytes to the right of [ 32.376167] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.376485] [ 32.376551] The buggy address belongs to the physical page: [ 32.376608] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.376757] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.376810] page_type: f5(slab) [ 32.376857] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.377194] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.377652] page dumped because: kasan: bad access detected [ 32.377756] [ 32.377817] Memory state around the buggy address: [ 32.378032] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.378300] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.378395] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.378517] ^ [ 32.378575] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.378630] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.378759] ================================================================== [ 32.504134] ================================================================== [ 32.504185] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 32.504236] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.504626] [ 32.504707] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.505174] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.505245] Hardware name: linux,dummy-virt (DT) [ 32.505380] Call trace: [ 32.505436] show_stack+0x20/0x38 (C) [ 32.505649] dump_stack_lvl+0x8c/0xd0 [ 32.506036] print_report+0x118/0x5d0 [ 32.506146] kasan_report+0xdc/0x128 [ 32.506241] __asan_report_store8_noabort+0x20/0x30 [ 32.506585] kasan_atomics_helper+0x3e5c/0x4858 [ 32.506712] kasan_atomics+0x198/0x2e0 [ 32.506764] kunit_try_run_case+0x170/0x3f0 [ 32.507128] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.507220] kthread+0x328/0x630 [ 32.507574] ret_from_fork+0x10/0x20 [ 32.507713] [ 32.507735] Allocated by task 296: [ 32.507795] kasan_save_stack+0x3c/0x68 [ 32.508077] kasan_save_track+0x20/0x40 [ 32.508236] kasan_save_alloc_info+0x40/0x58 [ 32.508461] __kasan_kmalloc+0xd4/0xd8 [ 32.508698] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.508982] kasan_atomics+0xb8/0x2e0 [ 32.509202] kunit_try_run_case+0x170/0x3f0 [ 32.509297] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.509350] kthread+0x328/0x630 [ 32.509731] ret_from_fork+0x10/0x20 [ 32.509820] [ 32.510015] The buggy address belongs to the object at fff00000c85f0e00 [ 32.510015] which belongs to the cache kmalloc-64 of size 64 [ 32.510421] The buggy address is located 0 bytes to the right of [ 32.510421] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.510670] [ 32.510822] The buggy address belongs to the physical page: [ 32.510878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.510968] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.511152] page_type: f5(slab) [ 32.511545] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.511628] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.511798] page dumped because: kasan: bad access detected [ 32.511880] [ 32.511920] Memory state around the buggy address: [ 32.512005] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.512062] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.512106] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.512553] ^ [ 32.512942] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.513030] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.513151] ================================================================== [ 32.464178] ================================================================== [ 32.464564] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 32.464657] Write of size 4 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.464741] [ 32.464775] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.465179] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.465234] Hardware name: linux,dummy-virt (DT) [ 32.465490] Call trace: [ 32.465524] show_stack+0x20/0x38 (C) [ 32.465578] dump_stack_lvl+0x8c/0xd0 [ 32.465995] print_report+0x118/0x5d0 [ 32.466361] kasan_report+0xdc/0x128 [ 32.466672] kasan_check_range+0x100/0x1a8 [ 32.466811] __kasan_check_write+0x20/0x30 [ 32.466885] kasan_atomics_helper+0xd3c/0x4858 [ 32.467195] kasan_atomics+0x198/0x2e0 [ 32.467398] kunit_try_run_case+0x170/0x3f0 [ 32.467630] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.467690] kthread+0x328/0x630 [ 32.467743] ret_from_fork+0x10/0x20 [ 32.468122] [ 32.468202] Allocated by task 296: [ 32.468253] kasan_save_stack+0x3c/0x68 [ 32.468303] kasan_save_track+0x20/0x40 [ 32.468344] kasan_save_alloc_info+0x40/0x58 [ 32.468812] __kasan_kmalloc+0xd4/0xd8 [ 32.468982] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.469114] kasan_atomics+0xb8/0x2e0 [ 32.469380] kunit_try_run_case+0x170/0x3f0 [ 32.469578] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.469658] kthread+0x328/0x630 [ 32.469779] ret_from_fork+0x10/0x20 [ 32.470126] [ 32.470194] The buggy address belongs to the object at fff00000c85f0e00 [ 32.470194] which belongs to the cache kmalloc-64 of size 64 [ 32.470315] The buggy address is located 0 bytes to the right of [ 32.470315] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.470462] [ 32.470522] The buggy address belongs to the physical page: [ 32.470591] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.470650] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.470738] page_type: f5(slab) [ 32.470922] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.471314] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.471380] page dumped because: kasan: bad access detected [ 32.471520] [ 32.471542] Memory state around the buggy address: [ 32.471583] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.471906] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.471999] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.472042] ^ [ 32.472387] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.472530] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.472629] ================================================================== [ 32.454138] ================================================================== [ 32.454510] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 32.454582] Read of size 4 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.454913] [ 32.454974] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.455073] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.455284] Hardware name: linux,dummy-virt (DT) [ 32.455412] Call trace: [ 32.455551] show_stack+0x20/0x38 (C) [ 32.455611] dump_stack_lvl+0x8c/0xd0 [ 32.455659] print_report+0x118/0x5d0 [ 32.455705] kasan_report+0xdc/0x128 [ 32.455749] __asan_report_load4_noabort+0x20/0x30 [ 32.456365] kasan_atomics_helper+0x3dd8/0x4858 [ 32.456448] kasan_atomics+0x198/0x2e0 [ 32.456773] kunit_try_run_case+0x170/0x3f0 [ 32.456943] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.457267] kthread+0x328/0x630 [ 32.457427] ret_from_fork+0x10/0x20 [ 32.457499] [ 32.457626] Allocated by task 296: [ 32.457826] kasan_save_stack+0x3c/0x68 [ 32.458180] kasan_save_track+0x20/0x40 [ 32.458260] kasan_save_alloc_info+0x40/0x58 [ 32.458324] __kasan_kmalloc+0xd4/0xd8 [ 32.458612] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.458785] kasan_atomics+0xb8/0x2e0 [ 32.458975] kunit_try_run_case+0x170/0x3f0 [ 32.459121] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.459252] kthread+0x328/0x630 [ 32.459445] ret_from_fork+0x10/0x20 [ 32.459643] [ 32.459696] The buggy address belongs to the object at fff00000c85f0e00 [ 32.459696] which belongs to the cache kmalloc-64 of size 64 [ 32.459784] The buggy address is located 0 bytes to the right of [ 32.459784] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.459927] [ 32.459988] The buggy address belongs to the physical page: [ 32.460129] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.460488] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.460569] page_type: f5(slab) [ 32.460775] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.460852] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.461314] page dumped because: kasan: bad access detected [ 32.461505] [ 32.461546] Memory state around the buggy address: [ 32.461768] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.462013] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.462085] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.462269] ^ [ 32.462468] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.462540] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.462672] ================================================================== [ 32.701950] ================================================================== [ 32.702014] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 32.702116] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.702192] [ 32.702250] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.702336] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.702365] Hardware name: linux,dummy-virt (DT) [ 32.702395] Call trace: [ 32.702419] show_stack+0x20/0x38 (C) [ 32.702641] dump_stack_lvl+0x8c/0xd0 [ 32.702699] print_report+0x118/0x5d0 [ 32.702743] kasan_report+0xdc/0x128 [ 32.702788] kasan_check_range+0x100/0x1a8 [ 32.702842] __kasan_check_write+0x20/0x30 [ 32.702975] kasan_atomics_helper+0x175c/0x4858 [ 32.703059] kasan_atomics+0x198/0x2e0 [ 32.703182] kunit_try_run_case+0x170/0x3f0 [ 32.703255] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.703372] kthread+0x328/0x630 [ 32.703418] ret_from_fork+0x10/0x20 [ 32.703476] [ 32.703499] Allocated by task 296: [ 32.703529] kasan_save_stack+0x3c/0x68 [ 32.703582] kasan_save_track+0x20/0x40 [ 32.703624] kasan_save_alloc_info+0x40/0x58 [ 32.703664] __kasan_kmalloc+0xd4/0xd8 [ 32.703712] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.703755] kasan_atomics+0xb8/0x2e0 [ 32.703803] kunit_try_run_case+0x170/0x3f0 [ 32.703844] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.703895] kthread+0x328/0x630 [ 32.703940] ret_from_fork+0x10/0x20 [ 32.703985] [ 32.704007] The buggy address belongs to the object at fff00000c85f0e00 [ 32.704007] which belongs to the cache kmalloc-64 of size 64 [ 32.704077] The buggy address is located 0 bytes to the right of [ 32.704077] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.704143] [ 32.704172] The buggy address belongs to the physical page: [ 32.704204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.704278] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.704330] page_type: f5(slab) [ 32.704403] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.704453] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.704702] page dumped because: kasan: bad access detected [ 32.704780] [ 32.704802] Memory state around the buggy address: [ 32.704837] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.705112] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.705185] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.705225] ^ [ 32.705266] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.705374] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.705466] ================================================================== [ 32.396516] ================================================================== [ 32.396569] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 32.397068] Write of size 4 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.397179] [ 32.397603] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.397719] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.398249] kasan_check_range+0x100/0x1a8 [ 32.399517] [ 32.399657] kasan_save_track+0x20/0x40 [ 32.400461] ret_from_fork+0x10/0x20 [ 32.401106] [ 32.401270] The buggy address belongs to the physical page: [ 32.401482] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.401809] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.401973] page_type: f5(slab) [ 32.402201] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.402261] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.402657] page dumped because: kasan: bad access detected [ 32.402745] [ 32.403011] Memory state around the buggy address: [ 32.403292] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.403342] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.403516] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.403709] ^ [ 32.403781] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.403930] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.404021] ================================================================== [ 32.591654] ================================================================== [ 32.591707] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 32.591758] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.592258] [ 32.592380] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.592651] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.592682] Hardware name: linux,dummy-virt (DT) [ 32.592714] Call trace: [ 32.592885] show_stack+0x20/0x38 (C) [ 32.593138] dump_stack_lvl+0x8c/0xd0 [ 32.593234] print_report+0x118/0x5d0 [ 32.593635] kasan_report+0xdc/0x128 [ 32.593744] kasan_check_range+0x100/0x1a8 [ 32.593821] __kasan_check_write+0x20/0x30 [ 32.593987] kasan_atomics_helper+0x126c/0x4858 [ 32.594339] kasan_atomics+0x198/0x2e0 [ 32.594477] kunit_try_run_case+0x170/0x3f0 [ 32.594567] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.594920] kthread+0x328/0x630 [ 32.595009] ret_from_fork+0x10/0x20 [ 32.595410] [ 32.595514] Allocated by task 296: [ 32.595584] kasan_save_stack+0x3c/0x68 [ 32.595954] kasan_save_track+0x20/0x40 [ 32.596032] kasan_save_alloc_info+0x40/0x58 [ 32.596088] __kasan_kmalloc+0xd4/0xd8 [ 32.596281] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.596501] kasan_atomics+0xb8/0x2e0 [ 32.596802] kunit_try_run_case+0x170/0x3f0 [ 32.596940] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.596989] kthread+0x328/0x630 [ 32.597334] ret_from_fork+0x10/0x20 [ 32.597448] [ 32.597662] The buggy address belongs to the object at fff00000c85f0e00 [ 32.597662] which belongs to the cache kmalloc-64 of size 64 [ 32.597731] The buggy address is located 0 bytes to the right of [ 32.597731] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.598247] [ 32.598333] The buggy address belongs to the physical page: [ 32.598532] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.598761] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.598964] page_type: f5(slab) [ 32.599283] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.599425] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.599483] page dumped because: kasan: bad access detected [ 32.599538] [ 32.599573] Memory state around the buggy address: [ 32.599606] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.599652] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.599695] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.599743] ^ [ 32.599788] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.599842] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.599887] ================================================================== [ 32.601739] ================================================================== [ 32.601922] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 32.601982] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.602292] [ 32.602661] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.602768] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.602862] Hardware name: linux,dummy-virt (DT) [ 32.602897] Call trace: [ 32.602924] show_stack+0x20/0x38 (C) [ 32.603082] dump_stack_lvl+0x8c/0xd0 [ 32.603139] print_report+0x118/0x5d0 [ 32.603183] kasan_report+0xdc/0x128 [ 32.603227] kasan_check_range+0x100/0x1a8 [ 32.603289] __kasan_check_write+0x20/0x30 [ 32.603505] kasan_atomics_helper+0x12d8/0x4858 [ 32.603841] kasan_atomics+0x198/0x2e0 [ 32.603913] kunit_try_run_case+0x170/0x3f0 [ 32.603965] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.604125] kthread+0x328/0x630 [ 32.604212] ret_from_fork+0x10/0x20 [ 32.604421] [ 32.604488] Allocated by task 296: [ 32.604608] kasan_save_stack+0x3c/0x68 [ 32.604690] kasan_save_track+0x20/0x40 [ 32.604870] kasan_save_alloc_info+0x40/0x58 [ 32.604952] __kasan_kmalloc+0xd4/0xd8 [ 32.605382] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.605560] kasan_atomics+0xb8/0x2e0 [ 32.605666] kunit_try_run_case+0x170/0x3f0 [ 32.605895] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.606037] kthread+0x328/0x630 [ 32.606094] ret_from_fork+0x10/0x20 [ 32.606502] [ 32.606613] The buggy address belongs to the object at fff00000c85f0e00 [ 32.606613] which belongs to the cache kmalloc-64 of size 64 [ 32.606681] The buggy address is located 0 bytes to the right of [ 32.606681] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.606882] [ 32.606999] The buggy address belongs to the physical page: [ 32.607058] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.607141] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.607199] page_type: f5(slab) [ 32.607247] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.607307] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.607350] page dumped because: kasan: bad access detected [ 32.607384] [ 32.607404] Memory state around the buggy address: [ 32.607447] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.607493] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.607538] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.607578] ^ [ 32.607623] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.607678] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.607727] ================================================================== [ 32.671978] ================================================================== [ 32.672038] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 32.672100] Read of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.672151] [ 32.672193] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.672299] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.672341] Hardware name: linux,dummy-virt (DT) [ 32.672401] Call trace: [ 32.672556] show_stack+0x20/0x38 (C) [ 32.672611] dump_stack_lvl+0x8c/0xd0 [ 32.672660] print_report+0x118/0x5d0 [ 32.672707] kasan_report+0xdc/0x128 [ 32.672761] __asan_report_load8_noabort+0x20/0x30 [ 32.672811] kasan_atomics_helper+0x3db0/0x4858 [ 32.672878] kasan_atomics+0x198/0x2e0 [ 32.672925] kunit_try_run_case+0x170/0x3f0 [ 32.672989] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.673042] kthread+0x328/0x630 [ 32.673108] ret_from_fork+0x10/0x20 [ 32.673159] [ 32.673192] Allocated by task 296: [ 32.673228] kasan_save_stack+0x3c/0x68 [ 32.673281] kasan_save_track+0x20/0x40 [ 32.673321] kasan_save_alloc_info+0x40/0x58 [ 32.673378] __kasan_kmalloc+0xd4/0xd8 [ 32.673419] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.673471] kasan_atomics+0xb8/0x2e0 [ 32.673519] kunit_try_run_case+0x170/0x3f0 [ 32.673560] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.673609] kthread+0x328/0x630 [ 32.673646] ret_from_fork+0x10/0x20 [ 32.673693] [ 32.673713] The buggy address belongs to the object at fff00000c85f0e00 [ 32.673713] which belongs to the cache kmalloc-64 of size 64 [ 32.673772] The buggy address is located 0 bytes to the right of [ 32.673772] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.673848] [ 32.673869] The buggy address belongs to the physical page: [ 32.673902] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.673957] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.674013] page_type: f5(slab) [ 32.674069] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.674333] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.674436] page dumped because: kasan: bad access detected [ 32.674788] [ 32.674906] Memory state around the buggy address: [ 32.675577] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.675709] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.676025] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.676119] ^ [ 32.676218] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.676284] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.676498] ================================================================== [ 32.473983] ================================================================== [ 32.474037] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 32.474209] Read of size 4 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.474272] [ 32.474329] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.474416] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.474445] Hardware name: linux,dummy-virt (DT) [ 32.474479] Call trace: [ 32.474519] show_stack+0x20/0x38 (C) [ 32.474574] dump_stack_lvl+0x8c/0xd0 [ 32.474621] print_report+0x118/0x5d0 [ 32.474666] kasan_report+0xdc/0x128 [ 32.474726] __asan_report_load4_noabort+0x20/0x30 [ 32.474786] kasan_atomics_helper+0x3e04/0x4858 [ 32.474848] kasan_atomics+0x198/0x2e0 [ 32.474897] kunit_try_run_case+0x170/0x3f0 [ 32.474948] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.475001] kthread+0x328/0x630 [ 32.475056] ret_from_fork+0x10/0x20 [ 32.475412] [ 32.475733] Allocated by task 296: [ 32.475776] kasan_save_stack+0x3c/0x68 [ 32.475823] kasan_save_track+0x20/0x40 [ 32.475866] kasan_save_alloc_info+0x40/0x58 [ 32.476161] __kasan_kmalloc+0xd4/0xd8 [ 32.476390] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.476604] kasan_atomics+0xb8/0x2e0 [ 32.476842] kunit_try_run_case+0x170/0x3f0 [ 32.476918] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.476964] kthread+0x328/0x630 [ 32.476998] ret_from_fork+0x10/0x20 [ 32.477035] [ 32.477069] The buggy address belongs to the object at fff00000c85f0e00 [ 32.477069] which belongs to the cache kmalloc-64 of size 64 [ 32.477403] The buggy address is located 0 bytes to the right of [ 32.477403] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.477631] [ 32.477789] The buggy address belongs to the physical page: [ 32.477900] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.478066] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.478286] page_type: f5(slab) [ 32.478492] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.478585] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.478851] page dumped because: kasan: bad access detected [ 32.479037] [ 32.479110] Memory state around the buggy address: [ 32.479336] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.479553] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.479701] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.479800] ^ [ 32.479855] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.479974] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.480015] ================================================================== [ 32.576178] ================================================================== [ 32.576271] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 32.576661] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.576790] [ 32.576869] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.577154] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.577290] Hardware name: linux,dummy-virt (DT) [ 32.577332] Call trace: [ 32.577407] show_stack+0x20/0x38 (C) [ 32.577462] dump_stack_lvl+0x8c/0xd0 [ 32.577508] print_report+0x118/0x5d0 [ 32.577574] kasan_report+0xdc/0x128 [ 32.577630] kasan_check_range+0x100/0x1a8 [ 32.577677] __kasan_check_write+0x20/0x30 [ 32.577734] kasan_atomics_helper+0x1190/0x4858 [ 32.577792] kasan_atomics+0x198/0x2e0 [ 32.577847] kunit_try_run_case+0x170/0x3f0 [ 32.577897] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.577948] kthread+0x328/0x630 [ 32.577992] ret_from_fork+0x10/0x20 [ 32.578060] [ 32.578083] Allocated by task 296: [ 32.578113] kasan_save_stack+0x3c/0x68 [ 32.578157] kasan_save_track+0x20/0x40 [ 32.578197] kasan_save_alloc_info+0x40/0x58 [ 32.578252] __kasan_kmalloc+0xd4/0xd8 [ 32.578293] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.578335] kasan_atomics+0xb8/0x2e0 [ 32.578381] kunit_try_run_case+0x170/0x3f0 [ 32.578422] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.578471] kthread+0x328/0x630 [ 32.578507] ret_from_fork+0x10/0x20 [ 32.578545] [ 32.578565] The buggy address belongs to the object at fff00000c85f0e00 [ 32.578565] which belongs to the cache kmalloc-64 of size 64 [ 32.578625] The buggy address is located 0 bytes to the right of [ 32.578625] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.578700] [ 32.578730] The buggy address belongs to the physical page: [ 32.578781] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.578838] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.578900] page_type: f5(slab) [ 32.578962] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.579014] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.579905] page dumped because: kasan: bad access detected [ 32.579973] [ 32.580018] Memory state around the buggy address: [ 32.580093] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.580179] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.580243] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.580402] ^ [ 32.580552] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.580603] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.580644] ================================================================== [ 32.655133] ================================================================== [ 32.655539] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 32.655621] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.655675] [ 32.655713] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.655947] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.655979] Hardware name: linux,dummy-virt (DT) [ 32.656012] Call trace: [ 32.656035] show_stack+0x20/0x38 (C) [ 32.656196] dump_stack_lvl+0x8c/0xd0 [ 32.656248] print_report+0x118/0x5d0 [ 32.656523] kasan_report+0xdc/0x128 [ 32.656736] kasan_check_range+0x100/0x1a8 [ 32.656875] __kasan_check_write+0x20/0x30 [ 32.657078] kasan_atomics_helper+0x154c/0x4858 [ 32.657174] kasan_atomics+0x198/0x2e0 [ 32.657251] kunit_try_run_case+0x170/0x3f0 [ 32.657324] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.657377] kthread+0x328/0x630 [ 32.657663] ret_from_fork+0x10/0x20 [ 32.658317] [ 32.658840] Allocated by task 296: [ 32.658907] kasan_save_stack+0x3c/0x68 [ 32.658980] kasan_save_track+0x20/0x40 [ 32.659106] kasan_save_alloc_info+0x40/0x58 [ 32.659151] __kasan_kmalloc+0xd4/0xd8 [ 32.659583] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.659666] kasan_atomics+0xb8/0x2e0 [ 32.659912] kunit_try_run_case+0x170/0x3f0 [ 32.660104] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.660293] kthread+0x328/0x630 [ 32.660517] ret_from_fork+0x10/0x20 [ 32.660785] [ 32.661034] The buggy address belongs to the object at fff00000c85f0e00 [ 32.661034] which belongs to the cache kmalloc-64 of size 64 [ 32.661135] The buggy address is located 0 bytes to the right of [ 32.661135] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.661529] [ 32.661567] The buggy address belongs to the physical page: [ 32.661624] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.661922] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.662071] page_type: f5(slab) [ 32.662166] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.662599] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.662669] page dumped because: kasan: bad access detected [ 32.662872] [ 32.663136] Memory state around the buggy address: [ 32.663232] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.663464] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.663550] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.663653] ^ [ 32.663691] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.663736] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.664152] ================================================================== [ 32.538906] ================================================================== [ 32.539222] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 32.539639] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.539732] [ 32.539768] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.539935] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.539984] Hardware name: linux,dummy-virt (DT) [ 32.540311] Call trace: [ 32.540395] show_stack+0x20/0x38 (C) [ 32.540460] dump_stack_lvl+0x8c/0xd0 [ 32.540700] print_report+0x118/0x5d0 [ 32.540946] kasan_report+0xdc/0x128 [ 32.541090] kasan_check_range+0x100/0x1a8 [ 32.541233] __kasan_check_write+0x20/0x30 [ 32.541322] kasan_atomics_helper+0xff0/0x4858 [ 32.541498] kasan_atomics+0x198/0x2e0 [ 32.541656] kunit_try_run_case+0x170/0x3f0 [ 32.541764] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.541826] kthread+0x328/0x630 [ 32.542043] ret_from_fork+0x10/0x20 [ 32.542284] [ 32.542344] Allocated by task 296: [ 32.542552] kasan_save_stack+0x3c/0x68 [ 32.542768] kasan_save_track+0x20/0x40 [ 32.542839] kasan_save_alloc_info+0x40/0x58 [ 32.542895] __kasan_kmalloc+0xd4/0xd8 [ 32.542938] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.543294] kasan_atomics+0xb8/0x2e0 [ 32.543384] kunit_try_run_case+0x170/0x3f0 [ 32.543786] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.544134] kthread+0x328/0x630 [ 32.544281] ret_from_fork+0x10/0x20 [ 32.544520] [ 32.544654] The buggy address belongs to the object at fff00000c85f0e00 [ 32.544654] which belongs to the cache kmalloc-64 of size 64 [ 32.544827] The buggy address is located 0 bytes to the right of [ 32.544827] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.545124] [ 32.545298] The buggy address belongs to the physical page: [ 32.545344] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.545557] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.545855] page_type: f5(slab) [ 32.546121] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.546273] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.546358] page dumped because: kasan: bad access detected [ 32.546530] [ 32.546709] Memory state around the buggy address: [ 32.546776] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.546879] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.546932] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.546979] ^ [ 32.547018] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.547078] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.547134] ================================================================== [ 32.582421] ================================================================== [ 32.582483] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 32.582537] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.582633] [ 32.582693] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.582820] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.582866] Hardware name: linux,dummy-virt (DT) [ 32.582897] Call trace: [ 32.582923] show_stack+0x20/0x38 (C) [ 32.583154] dump_stack_lvl+0x8c/0xd0 [ 32.583332] print_report+0x118/0x5d0 [ 32.583701] kasan_report+0xdc/0x128 [ 32.583806] kasan_check_range+0x100/0x1a8 [ 32.583874] __kasan_check_write+0x20/0x30 [ 32.583997] kasan_atomics_helper+0x11f8/0x4858 [ 32.584067] kasan_atomics+0x198/0x2e0 [ 32.584121] kunit_try_run_case+0x170/0x3f0 [ 32.584178] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.584565] kthread+0x328/0x630 [ 32.584857] ret_from_fork+0x10/0x20 [ 32.584917] [ 32.584941] Allocated by task 296: [ 32.584972] kasan_save_stack+0x3c/0x68 [ 32.585015] kasan_save_track+0x20/0x40 [ 32.585070] kasan_save_alloc_info+0x40/0x58 [ 32.585729] __kasan_kmalloc+0xd4/0xd8 [ 32.585825] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.585951] kasan_atomics+0xb8/0x2e0 [ 32.585994] kunit_try_run_case+0x170/0x3f0 [ 32.586311] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.586540] kthread+0x328/0x630 [ 32.586785] ret_from_fork+0x10/0x20 [ 32.586847] [ 32.587028] The buggy address belongs to the object at fff00000c85f0e00 [ 32.587028] which belongs to the cache kmalloc-64 of size 64 [ 32.587488] The buggy address is located 0 bytes to the right of [ 32.587488] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.587651] [ 32.587686] The buggy address belongs to the physical page: [ 32.587720] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.588076] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.588317] page_type: f5(slab) [ 32.588519] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.588577] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.588959] page dumped because: kasan: bad access detected [ 32.589060] [ 32.589138] Memory state around the buggy address: [ 32.589492] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.589568] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.589731] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.589863] ^ [ 32.589951] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.590317] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.590433] ================================================================== [ 32.514339] ================================================================== [ 32.514454] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 32.514508] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.514559] [ 32.514592] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.514677] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.514705] Hardware name: linux,dummy-virt (DT) [ 32.514738] Call trace: [ 32.514763] show_stack+0x20/0x38 (C) [ 32.514834] dump_stack_lvl+0x8c/0xd0 [ 32.514884] print_report+0x118/0x5d0 [ 32.514929] kasan_report+0xdc/0x128 [ 32.514973] kasan_check_range+0x100/0x1a8 [ 32.515021] __kasan_check_write+0x20/0x30 [ 32.515079] kasan_atomics_helper+0xeb8/0x4858 [ 32.515129] kasan_atomics+0x198/0x2e0 [ 32.515175] kunit_try_run_case+0x170/0x3f0 [ 32.515224] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.515276] kthread+0x328/0x630 [ 32.515325] ret_from_fork+0x10/0x20 [ 32.515383] [ 32.515413] Allocated by task 296: [ 32.515443] kasan_save_stack+0x3c/0x68 [ 32.515487] kasan_save_track+0x20/0x40 [ 32.515534] kasan_save_alloc_info+0x40/0x58 [ 32.515574] __kasan_kmalloc+0xd4/0xd8 [ 32.515622] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.515665] kasan_atomics+0xb8/0x2e0 [ 32.515706] kunit_try_run_case+0x170/0x3f0 [ 32.515748] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.515791] kthread+0x328/0x630 [ 32.515827] ret_from_fork+0x10/0x20 [ 32.515865] [ 32.515894] The buggy address belongs to the object at fff00000c85f0e00 [ 32.515894] which belongs to the cache kmalloc-64 of size 64 [ 32.515963] The buggy address is located 0 bytes to the right of [ 32.515963] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.516031] [ 32.516845] The buggy address belongs to the physical page: [ 32.516904] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.516962] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.517542] page_type: f5(slab) [ 32.517602] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.518067] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.518117] page dumped because: kasan: bad access detected [ 32.518150] [ 32.518200] Memory state around the buggy address: [ 32.518279] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.518373] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.518644] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.518786] ^ [ 32.519087] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.519240] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.519284] ================================================================== [ 32.609948] ================================================================== [ 32.610025] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 32.610088] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.610139] [ 32.610172] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.610464] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.610508] Hardware name: linux,dummy-virt (DT) [ 32.610792] Call trace: [ 32.610939] show_stack+0x20/0x38 (C) [ 32.611001] dump_stack_lvl+0x8c/0xd0 [ 32.611229] print_report+0x118/0x5d0 [ 32.611282] kasan_report+0xdc/0x128 [ 32.611327] kasan_check_range+0x100/0x1a8 [ 32.611374] __kasan_check_write+0x20/0x30 [ 32.611580] kasan_atomics_helper+0x1384/0x4858 [ 32.611633] kasan_atomics+0x198/0x2e0 [ 32.611679] kunit_try_run_case+0x170/0x3f0 [ 32.612104] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.612192] kthread+0x328/0x630 [ 32.612423] ret_from_fork+0x10/0x20 [ 32.612704] [ 32.612747] Allocated by task 296: [ 32.613011] kasan_save_stack+0x3c/0x68 [ 32.613203] kasan_save_track+0x20/0x40 [ 32.613263] kasan_save_alloc_info+0x40/0x58 [ 32.613305] __kasan_kmalloc+0xd4/0xd8 [ 32.613527] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.613853] kasan_atomics+0xb8/0x2e0 [ 32.614090] kunit_try_run_case+0x170/0x3f0 [ 32.614311] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.614558] kthread+0x328/0x630 [ 32.614650] ret_from_fork+0x10/0x20 [ 32.614834] [ 32.614857] The buggy address belongs to the object at fff00000c85f0e00 [ 32.614857] which belongs to the cache kmalloc-64 of size 64 [ 32.615089] The buggy address is located 0 bytes to the right of [ 32.615089] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.615585] [ 32.616028] The buggy address belongs to the physical page: [ 32.616089] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.616474] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.616627] page_type: f5(slab) [ 32.616673] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.617161] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.617363] page dumped because: kasan: bad access detected [ 32.617403] [ 32.617517] Memory state around the buggy address: [ 32.617774] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.617961] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.618031] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.618221] ^ [ 32.618399] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.618486] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.618824] ================================================================== [ 32.705742] ================================================================== [ 32.705895] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 32.705951] Read of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.706107] [ 32.706194] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.706280] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.706328] Hardware name: linux,dummy-virt (DT) [ 32.706409] Call trace: [ 32.706435] show_stack+0x20/0x38 (C) [ 32.706550] dump_stack_lvl+0x8c/0xd0 [ 32.706672] print_report+0x118/0x5d0 [ 32.706832] kasan_report+0xdc/0x128 [ 32.706926] __asan_report_load8_noabort+0x20/0x30 [ 32.707032] kasan_atomics_helper+0x3e20/0x4858 [ 32.707126] kasan_atomics+0x198/0x2e0 [ 32.707184] kunit_try_run_case+0x170/0x3f0 [ 32.707234] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.707302] kthread+0x328/0x630 [ 32.707430] ret_from_fork+0x10/0x20 [ 32.707483] [ 32.707594] Allocated by task 296: [ 32.707673] kasan_save_stack+0x3c/0x68 [ 32.707741] kasan_save_track+0x20/0x40 [ 32.707788] kasan_save_alloc_info+0x40/0x58 [ 32.707834] __kasan_kmalloc+0xd4/0xd8 [ 32.707907] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.708327] kasan_atomics+0xb8/0x2e0 [ 32.708410] kunit_try_run_case+0x170/0x3f0 [ 32.708456] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.708512] kthread+0x328/0x630 [ 32.708546] ret_from_fork+0x10/0x20 [ 32.708584] [ 32.709134] The buggy address belongs to the object at fff00000c85f0e00 [ 32.709134] which belongs to the cache kmalloc-64 of size 64 [ 32.709498] The buggy address is located 0 bytes to the right of [ 32.709498] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.709601] [ 32.709626] The buggy address belongs to the physical page: [ 32.709756] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.709831] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.710144] page_type: f5(slab) [ 32.710221] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.710347] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.710760] page dumped because: kasan: bad access detected [ 32.710866] [ 32.710929] Memory state around the buggy address: [ 32.710977] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.711022] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.711344] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.711517] ^ [ 32.711619] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.711945] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.712068] ================================================================== [ 32.389874] ================================================================== [ 32.390022] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 32.390132] Write of size 4 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.390225] [ 32.390261] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.390502] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.390530] Hardware name: linux,dummy-virt (DT) [ 32.390900] Call trace: [ 32.390944] show_stack+0x20/0x38 (C) [ 32.391000] dump_stack_lvl+0x8c/0xd0 [ 32.391651] print_report+0x118/0x5d0 [ 32.391722] kasan_report+0xdc/0x128 [ 32.391780] kasan_check_range+0x100/0x1a8 [ 32.391849] __kasan_check_write+0x20/0x30 [ 32.391902] kasan_atomics_helper+0xa6c/0x4858 [ 32.391997] kasan_atomics+0x198/0x2e0 [ 32.392058] kunit_try_run_case+0x170/0x3f0 [ 32.392109] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.392477] kthread+0x328/0x630 [ 32.392774] ret_from_fork+0x10/0x20 [ 32.392836] [ 32.392857] Allocated by task 296: [ 32.392916] kasan_save_stack+0x3c/0x68 [ 32.392962] kasan_save_track+0x20/0x40 [ 32.393020] kasan_save_alloc_info+0x40/0x58 [ 32.393071] __kasan_kmalloc+0xd4/0xd8 [ 32.393133] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.393182] kasan_atomics+0xb8/0x2e0 [ 32.393222] kunit_try_run_case+0x170/0x3f0 [ 32.393264] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.393305] kthread+0x328/0x630 [ 32.393341] ret_from_fork+0x10/0x20 [ 32.393378] [ 32.393405] The buggy address belongs to the object at fff00000c85f0e00 [ 32.393405] which belongs to the cache kmalloc-64 of size 64 [ 32.393464] The buggy address is located 0 bytes to the right of [ 32.393464] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.393529] [ 32.393560] The buggy address belongs to the physical page: [ 32.393606] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.393659] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.393708] page_type: f5(slab) [ 32.393748] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.393817] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.393867] page dumped because: kasan: bad access detected [ 32.393910] [ 32.393939] Memory state around the buggy address: [ 32.393982] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.394335] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.394519] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.395060] ^ [ 32.395143] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.395415] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.395609] ================================================================== [ 32.482188] ================================================================== [ 32.482269] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 32.482332] Read of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.482383] [ 32.482521] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.482725] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.482766] Hardware name: linux,dummy-virt (DT) [ 32.482801] Call trace: [ 32.482858] show_stack+0x20/0x38 (C) [ 32.482919] dump_stack_lvl+0x8c/0xd0 [ 32.483201] print_report+0x118/0x5d0 [ 32.483273] kasan_report+0xdc/0x128 [ 32.483465] kasan_check_range+0x100/0x1a8 [ 32.483527] __kasan_check_read+0x20/0x30 [ 32.483812] kasan_atomics_helper+0xdd4/0x4858 [ 32.484105] kasan_atomics+0x198/0x2e0 [ 32.484334] kunit_try_run_case+0x170/0x3f0 [ 32.484770] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.484849] kthread+0x328/0x630 [ 32.484898] ret_from_fork+0x10/0x20 [ 32.484951] [ 32.484972] Allocated by task 296: [ 32.485310] kasan_save_stack+0x3c/0x68 [ 32.485532] kasan_save_track+0x20/0x40 [ 32.485629] kasan_save_alloc_info+0x40/0x58 [ 32.485831] __kasan_kmalloc+0xd4/0xd8 [ 32.485891] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.485947] kasan_atomics+0xb8/0x2e0 [ 32.485986] kunit_try_run_case+0x170/0x3f0 [ 32.486033] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.486095] kthread+0x328/0x630 [ 32.486135] ret_from_fork+0x10/0x20 [ 32.486172] [ 32.486194] The buggy address belongs to the object at fff00000c85f0e00 [ 32.486194] which belongs to the cache kmalloc-64 of size 64 [ 32.486255] The buggy address is located 0 bytes to the right of [ 32.486255] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.486320] [ 32.486372] The buggy address belongs to the physical page: [ 32.486429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.486484] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.486535] page_type: f5(slab) [ 32.486587] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.486649] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.486701] page dumped because: kasan: bad access detected [ 32.486735] [ 32.486764] Memory state around the buggy address: [ 32.486816] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.486871] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.486915] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.486955] ^ [ 32.486988] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.487031] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.487415] ================================================================== [ 32.665452] ================================================================== [ 32.665518] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 32.665596] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.665852] [ 32.666070] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.666181] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.666435] Hardware name: linux,dummy-virt (DT) [ 32.666603] Call trace: [ 32.666637] show_stack+0x20/0x38 (C) [ 32.666693] dump_stack_lvl+0x8c/0xd0 [ 32.666935] print_report+0x118/0x5d0 [ 32.667070] kasan_report+0xdc/0x128 [ 32.667136] kasan_check_range+0x100/0x1a8 [ 32.667184] __kasan_check_write+0x20/0x30 [ 32.667398] kasan_atomics_helper+0x15b4/0x4858 [ 32.667482] kasan_atomics+0x198/0x2e0 [ 32.667740] kunit_try_run_case+0x170/0x3f0 [ 32.667866] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.668044] kthread+0x328/0x630 [ 32.668112] ret_from_fork+0x10/0x20 [ 32.668621] [ 32.668675] Allocated by task 296: [ 32.668753] kasan_save_stack+0x3c/0x68 [ 32.669115] kasan_save_track+0x20/0x40 [ 32.669201] kasan_save_alloc_info+0x40/0x58 [ 32.669249] __kasan_kmalloc+0xd4/0xd8 [ 32.669608] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.669742] kasan_atomics+0xb8/0x2e0 [ 32.669913] kunit_try_run_case+0x170/0x3f0 [ 32.670200] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.670368] kthread+0x328/0x630 [ 32.670407] ret_from_fork+0x10/0x20 [ 32.670446] [ 32.670490] The buggy address belongs to the object at fff00000c85f0e00 [ 32.670490] which belongs to the cache kmalloc-64 of size 64 [ 32.670557] The buggy address is located 0 bytes to the right of [ 32.670557] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.670629] [ 32.670657] The buggy address belongs to the physical page: [ 32.670702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.670772] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.670828] page_type: f5(slab) [ 32.670871] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.670921] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.670964] page dumped because: kasan: bad access detected [ 32.670998] [ 32.671034] Memory state around the buggy address: [ 32.671092] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.671148] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.671193] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.671237] ^ [ 32.671272] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.671318] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.671368] ================================================================== [ 32.629755] ================================================================== [ 32.630117] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 32.630185] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.630379] [ 32.630456] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.630642] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.630673] Hardware name: linux,dummy-virt (DT) [ 32.630704] Call trace: [ 32.630738] show_stack+0x20/0x38 (C) [ 32.630870] dump_stack_lvl+0x8c/0xd0 [ 32.630919] print_report+0x118/0x5d0 [ 32.630972] kasan_report+0xdc/0x128 [ 32.631025] kasan_check_range+0x100/0x1a8 [ 32.631084] __kasan_check_write+0x20/0x30 [ 32.631129] kasan_atomics_helper+0x1414/0x4858 [ 32.631188] kasan_atomics+0x198/0x2e0 [ 32.631242] kunit_try_run_case+0x170/0x3f0 [ 32.631292] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.631344] kthread+0x328/0x630 [ 32.631387] ret_from_fork+0x10/0x20 [ 32.631435] [ 32.631466] Allocated by task 296: [ 32.631505] kasan_save_stack+0x3c/0x68 [ 32.631557] kasan_save_track+0x20/0x40 [ 32.631599] kasan_save_alloc_info+0x40/0x58 [ 32.631638] __kasan_kmalloc+0xd4/0xd8 [ 32.631684] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.631726] kasan_atomics+0xb8/0x2e0 [ 32.631765] kunit_try_run_case+0x170/0x3f0 [ 32.631815] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.631860] kthread+0x328/0x630 [ 32.631903] ret_from_fork+0x10/0x20 [ 32.631941] [ 32.631962] The buggy address belongs to the object at fff00000c85f0e00 [ 32.631962] which belongs to the cache kmalloc-64 of size 64 [ 32.632021] The buggy address is located 0 bytes to the right of [ 32.632021] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.632097] [ 32.632200] The buggy address belongs to the physical page: [ 32.632255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.632331] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.632395] page_type: f5(slab) [ 32.632436] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.633321] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.633409] page dumped because: kasan: bad access detected [ 32.633461] [ 32.633508] Memory state around the buggy address: [ 32.633574] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.633655] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.633728] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.633767] ^ [ 32.634269] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.634365] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.634661] ================================================================== [ 32.556119] ================================================================== [ 32.556378] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 32.556484] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.556663] [ 32.556734] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.556913] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.556975] Hardware name: linux,dummy-virt (DT) [ 32.557006] Call trace: [ 32.557030] show_stack+0x20/0x38 (C) [ 32.557643] dump_stack_lvl+0x8c/0xd0 [ 32.557860] print_report+0x118/0x5d0 [ 32.557954] kasan_report+0xdc/0x128 [ 32.558076] kasan_check_range+0x100/0x1a8 [ 32.558184] __kasan_check_write+0x20/0x30 [ 32.558348] kasan_atomics_helper+0x10c0/0x4858 [ 32.558414] kasan_atomics+0x198/0x2e0 [ 32.558963] kunit_try_run_case+0x170/0x3f0 [ 32.559150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.559432] kthread+0x328/0x630 [ 32.559603] ret_from_fork+0x10/0x20 [ 32.560043] [ 32.560373] Allocated by task 296: [ 32.560426] kasan_save_stack+0x3c/0x68 [ 32.560651] kasan_save_track+0x20/0x40 [ 32.560899] kasan_save_alloc_info+0x40/0x58 [ 32.560976] __kasan_kmalloc+0xd4/0xd8 [ 32.561156] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.561215] kasan_atomics+0xb8/0x2e0 [ 32.561277] kunit_try_run_case+0x170/0x3f0 [ 32.561326] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.561749] kthread+0x328/0x630 [ 32.561998] ret_from_fork+0x10/0x20 [ 32.562166] [ 32.562523] The buggy address belongs to the object at fff00000c85f0e00 [ 32.562523] which belongs to the cache kmalloc-64 of size 64 [ 32.562635] The buggy address is located 0 bytes to the right of [ 32.562635] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.562835] [ 32.562993] The buggy address belongs to the physical page: [ 32.563446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.563792] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.563960] page_type: f5(slab) [ 32.564059] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.564214] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.564289] page dumped because: kasan: bad access detected [ 32.564530] [ 32.564627] Memory state around the buggy address: [ 32.564766] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.564826] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.565067] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.565139] ^ [ 32.565482] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.565656] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.565877] ================================================================== [ 32.676901] ================================================================== [ 32.677043] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 32.677373] Write of size 8 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.677440] [ 32.677475] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.677594] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.677626] Hardware name: linux,dummy-virt (DT) [ 32.677657] Call trace: [ 32.677903] show_stack+0x20/0x38 (C) [ 32.677975] dump_stack_lvl+0x8c/0xd0 [ 32.678034] print_report+0x118/0x5d0 [ 32.678406] kasan_report+0xdc/0x128 [ 32.678502] kasan_check_range+0x100/0x1a8 [ 32.678553] __kasan_check_write+0x20/0x30 [ 32.678612] kasan_atomics_helper+0x1644/0x4858 [ 32.678676] kasan_atomics+0x198/0x2e0 [ 32.678723] kunit_try_run_case+0x170/0x3f0 [ 32.679024] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.679106] kthread+0x328/0x630 [ 32.679229] ret_from_fork+0x10/0x20 [ 32.679309] [ 32.679537] Allocated by task 296: [ 32.679621] kasan_save_stack+0x3c/0x68 [ 32.679675] kasan_save_track+0x20/0x40 [ 32.679717] kasan_save_alloc_info+0x40/0x58 [ 32.679969] __kasan_kmalloc+0xd4/0xd8 [ 32.680059] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.680188] kasan_atomics+0xb8/0x2e0 [ 32.680425] kunit_try_run_case+0x170/0x3f0 [ 32.680836] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.681134] kthread+0x328/0x630 [ 32.681802] ret_from_fork+0x10/0x20 [ 32.681859] [ 32.681881] The buggy address belongs to the object at fff00000c85f0e00 [ 32.681881] which belongs to the cache kmalloc-64 of size 64 [ 32.682121] The buggy address is located 0 bytes to the right of [ 32.682121] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.682211] [ 32.682333] The buggy address belongs to the physical page: [ 32.682410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.682551] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.682621] page_type: f5(slab) [ 32.682911] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.682988] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.683032] page dumped because: kasan: bad access detected [ 32.683076] [ 32.683097] Memory state around the buggy address: [ 32.683129] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.683411] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.683618] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.683682] ^ [ 32.684104] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.684227] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.684459] ================================================================== [ 32.380193] ================================================================== [ 32.380404] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 32.380461] Write of size 4 at addr fff00000c85f0e30 by task kunit_try_catch/296 [ 32.380520] [ 32.380698] CPU: 0 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.381024] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.381223] Hardware name: linux,dummy-virt (DT) [ 32.381274] Call trace: [ 32.381462] show_stack+0x20/0x38 (C) [ 32.381988] print_report+0x118/0x5d0 [ 32.383522] ret_from_fork+0x10/0x20 [ 32.385199] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.385930] The buggy address is located 0 bytes to the right of [ 32.385930] allocated 48-byte region [fff00000c85f0e00, fff00000c85f0e30) [ 32.386009] [ 32.386043] The buggy address belongs to the physical page: [ 32.386382] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085f0 [ 32.386485] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.386639] page_type: f5(slab) [ 32.386724] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 32.386835] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.387362] page dumped because: kasan: bad access detected [ 32.387519] [ 32.387608] Memory state around the buggy address: [ 32.387706] fff00000c85f0d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.387995] fff00000c85f0d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.388243] >fff00000c85f0e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.388361] ^ [ 32.388508] fff00000c85f0e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.388582] fff00000c85f0f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.388623] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[ 32.023967] ================================================================== [ 32.024032] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 32.024528] Write of size 8 at addr fff00000c64c1b48 by task kunit_try_catch/292 [ 32.024604] [ 32.024644] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.025083] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.025217] Hardware name: linux,dummy-virt (DT) [ 32.025254] Call trace: [ 32.025297] show_stack+0x20/0x38 (C) [ 32.025729] dump_stack_lvl+0x8c/0xd0 [ 32.025837] print_report+0x118/0x5d0 [ 32.025988] kasan_report+0xdc/0x128 [ 32.026064] kasan_check_range+0x100/0x1a8 [ 32.026207] __kasan_check_write+0x20/0x30 [ 32.026296] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 32.026372] kasan_bitops_generic+0x110/0x1c8 [ 32.026689] kunit_try_run_case+0x170/0x3f0 [ 32.026804] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.026923] kthread+0x328/0x630 [ 32.027005] ret_from_fork+0x10/0x20 [ 32.027076] [ 32.027099] Allocated by task 292: [ 32.027142] kasan_save_stack+0x3c/0x68 [ 32.027202] kasan_save_track+0x20/0x40 [ 32.027247] kasan_save_alloc_info+0x40/0x58 [ 32.027288] __kasan_kmalloc+0xd4/0xd8 [ 32.027747] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.027835] kasan_bitops_generic+0xa0/0x1c8 [ 32.028156] kunit_try_run_case+0x170/0x3f0 [ 32.028298] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.028395] kthread+0x328/0x630 [ 32.028451] ret_from_fork+0x10/0x20 [ 32.028735] [ 32.028821] The buggy address belongs to the object at fff00000c64c1b40 [ 32.028821] which belongs to the cache kmalloc-16 of size 16 [ 32.028949] The buggy address is located 8 bytes inside of [ 32.028949] allocated 9-byte region [fff00000c64c1b40, fff00000c64c1b49) [ 32.029306] [ 32.029359] The buggy address belongs to the physical page: [ 32.029449] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c64c1a40 pfn:0x1064c1 [ 32.029683] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.029881] page_type: f5(slab) [ 32.029956] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 32.030248] raw: fff00000c64c1a40 000000008080007f 00000000f5000000 0000000000000000 [ 32.030552] page dumped because: kasan: bad access detected [ 32.030681] [ 32.030749] Memory state around the buggy address: [ 32.030863] fff00000c64c1a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.030959] fff00000c64c1a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.031122] >fff00000c64c1b00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 32.031179] ^ [ 32.031342] fff00000c64c1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.031553] fff00000c64c1c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.031653] ================================================================== [ 32.055799] ================================================================== [ 32.055930] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 32.055984] Write of size 8 at addr fff00000c64c1b48 by task kunit_try_catch/292 [ 32.056036] [ 32.056082] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.056167] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.056312] Hardware name: linux,dummy-virt (DT) [ 32.056694] Call trace: [ 32.056922] show_stack+0x20/0x38 (C) [ 32.057114] dump_stack_lvl+0x8c/0xd0 [ 32.057239] print_report+0x118/0x5d0 [ 32.057629] kasan_report+0xdc/0x128 [ 32.057763] kasan_check_range+0x100/0x1a8 [ 32.057954] __kasan_check_write+0x20/0x30 [ 32.058115] kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 32.058235] kasan_bitops_generic+0x110/0x1c8 [ 32.058490] kunit_try_run_case+0x170/0x3f0 [ 32.058780] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.058904] kthread+0x328/0x630 [ 32.059029] ret_from_fork+0x10/0x20 [ 32.059210] [ 32.059233] Allocated by task 292: [ 32.059468] kasan_save_stack+0x3c/0x68 [ 32.059568] kasan_save_track+0x20/0x40 [ 32.059723] kasan_save_alloc_info+0x40/0x58 [ 32.059929] __kasan_kmalloc+0xd4/0xd8 [ 32.060099] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.060227] kasan_bitops_generic+0xa0/0x1c8 [ 32.060902] [ 32.062421] page_type: f5(slab) [ 32.062767] page dumped because: kasan: bad access detected [ 32.063668] ^ [ 32.065448] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 32.066380] show_stack+0x20/0x38 (C) [ 32.066643] kasan_check_range+0x100/0x1a8 [ 32.067446] kthread+0x328/0x630 [ 32.068209] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.068428] kthread+0x328/0x630 [ 32.068891] [ 32.069704] The buggy address is located 8 bytes inside of [ 32.069704] allocated 9-byte region [fff00000c64c1b40, fff00000c64c1b49) [ 32.070996] fff00000c64c1a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.072808] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.073229] Call trace: [ 32.073298] show_stack+0x20/0x38 (C) [ 32.074182] kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 32.075489] Allocated by task 292: [ 32.076464] kasan_bitops_generic+0xa0/0x1c8 [ 32.076909] kthread+0x328/0x630 [ 32.077572] The buggy address is located 8 bytes inside of [ 32.077572] allocated 9-byte region [fff00000c64c1b40, fff00000c64c1b49) [ 32.078967] fff00000c64c1a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.080088] ================================================================== [ 32.048918] ================================================================== [ 32.048971] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 32.049474] Read of size 8 at addr fff00000c64c1b48 by task kunit_try_catch/292 [ 32.049546] [ 32.049823] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.049927] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.050024] Hardware name: linux,dummy-virt (DT) [ 32.050116] Call trace: [ 32.050461] show_stack+0x20/0x38 (C) [ 32.050571] dump_stack_lvl+0x8c/0xd0 [ 32.050692] print_report+0x118/0x5d0 [ 32.050744] kasan_report+0xdc/0x128 [ 32.050789] __asan_report_load8_noabort+0x20/0x30 [ 32.050984] kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 32.051070] kasan_bitops_generic+0x110/0x1c8 [ 32.051267] kunit_try_run_case+0x170/0x3f0 [ 32.051335] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.051389] kthread+0x328/0x630 [ 32.051672] ret_from_fork+0x10/0x20 [ 32.051736] [ 32.051816] Allocated by task 292: [ 32.051872] kasan_save_stack+0x3c/0x68 [ 32.051946] kasan_save_track+0x20/0x40 [ 32.052126] kasan_save_alloc_info+0x40/0x58 [ 32.052367] __kasan_kmalloc+0xd4/0xd8 [ 32.052480] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.052832] kasan_bitops_generic+0xa0/0x1c8 [ 32.052948] kunit_try_run_case+0x170/0x3f0 [ 32.053070] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.053186] kthread+0x328/0x630 [ 32.053384] ret_from_fork+0x10/0x20 [ 32.053564] [ 32.053668] The buggy address belongs to the object at fff00000c64c1b40 [ 32.053668] which belongs to the cache kmalloc-16 of size 16 [ 32.053750] The buggy address is located 8 bytes inside of [ 32.053750] allocated 9-byte region [fff00000c64c1b40, fff00000c64c1b49) [ 32.053815] [ 32.053981] The buggy address belongs to the physical page: [ 32.054028] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c64c1a40 pfn:0x1064c1 [ 32.054193] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.054278] page_type: f5(slab) [ 32.054336] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 32.054391] raw: fff00000c64c1a40 000000008080007f 00000000f5000000 0000000000000000 [ 32.054445] page dumped because: kasan: bad access detected [ 32.054488] [ 32.054510] Memory state around the buggy address: [ 32.054544] fff00000c64c1a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.054590] fff00000c64c1a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.054644] >fff00000c64c1b00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 32.054699] ^ [ 32.054738] fff00000c64c1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.054781] fff00000c64c1c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.054835] ================================================================== [ 32.039570] ================================================================== [ 32.039621] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 32.039675] Write of size 8 at addr fff00000c64c1b48 by task kunit_try_catch/292 [ 32.039808] [ 32.039844] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.039932] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.040222] Hardware name: linux,dummy-virt (DT) [ 32.040380] Call trace: [ 32.040454] show_stack+0x20/0x38 (C) [ 32.040569] dump_stack_lvl+0x8c/0xd0 [ 32.040686] print_report+0x118/0x5d0 [ 32.040854] kasan_report+0xdc/0x128 [ 32.040908] kasan_check_range+0x100/0x1a8 [ 32.040954] __kasan_check_write+0x20/0x30 [ 32.041185] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 32.041382] kasan_bitops_generic+0x110/0x1c8 [ 32.041580] kunit_try_run_case+0x170/0x3f0 [ 32.041763] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.041879] kthread+0x328/0x630 [ 32.042081] ret_from_fork+0x10/0x20 [ 32.042296] [ 32.042384] Allocated by task 292: [ 32.042417] kasan_save_stack+0x3c/0x68 [ 32.042869] kasan_save_track+0x20/0x40 [ 32.043256] kasan_save_alloc_info+0x40/0x58 [ 32.043343] __kasan_kmalloc+0xd4/0xd8 [ 32.043406] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.043488] kasan_bitops_generic+0xa0/0x1c8 [ 32.043562] kunit_try_run_case+0x170/0x3f0 [ 32.044242] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.044305] kthread+0x328/0x630 [ 32.044343] ret_from_fork+0x10/0x20 [ 32.044540] [ 32.044789] The buggy address belongs to the object at fff00000c64c1b40 [ 32.044789] which belongs to the cache kmalloc-16 of size 16 [ 32.044963] The buggy address is located 8 bytes inside of [ 32.044963] allocated 9-byte region [fff00000c64c1b40, fff00000c64c1b49) [ 32.045098] [ 32.045188] The buggy address belongs to the physical page: [ 32.045301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c64c1a40 pfn:0x1064c1 [ 32.045404] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.045952] page_type: f5(slab) [ 32.046128] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 32.046249] raw: fff00000c64c1a40 000000008080007f 00000000f5000000 0000000000000000 [ 32.046348] page dumped because: kasan: bad access detected [ 32.046477] [ 32.046667] Memory state around the buggy address: [ 32.046734] fff00000c64c1a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.046849] fff00000c64c1a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.046922] >fff00000c64c1b00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 32.047252] ^ [ 32.047460] fff00000c64c1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.047523] fff00000c64c1c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.047689] ================================================================== [ 32.033722] ================================================================== [ 32.033798] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 32.033857] Read of size 8 at addr fff00000c64c1b48 by task kunit_try_catch/292 [ 32.033909] [ 32.033941] CPU: 0 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.034025] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.034066] Hardware name: linux,dummy-virt (DT) [ 32.034099] Call trace: [ 32.034122] show_stack+0x20/0x38 (C) [ 32.034182] dump_stack_lvl+0x8c/0xd0 [ 32.034232] print_report+0x118/0x5d0 [ 32.034276] kasan_report+0xdc/0x128 [ 32.034320] __asan_report_load8_noabort+0x20/0x30 [ 32.034380] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 32.034436] kasan_bitops_generic+0x110/0x1c8 [ 32.034487] kunit_try_run_case+0x170/0x3f0 [ 32.034537] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.034589] kthread+0x328/0x630 [ 32.034632] ret_from_fork+0x10/0x20 [ 32.034689] [ 32.034709] Allocated by task 292: [ 32.034741] kasan_save_stack+0x3c/0x68 [ 32.034782] kasan_save_track+0x20/0x40 [ 32.034821] kasan_save_alloc_info+0x40/0x58 [ 32.034860] __kasan_kmalloc+0xd4/0xd8 [ 32.034900] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.034942] kasan_bitops_generic+0xa0/0x1c8 [ 32.034984] kunit_try_run_case+0x170/0x3f0 [ 32.035025] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.035713] kthread+0x328/0x630 [ 32.035775] ret_from_fork+0x10/0x20 [ 32.035825] [ 32.035856] The buggy address belongs to the object at fff00000c64c1b40 [ 32.035856] which belongs to the cache kmalloc-16 of size 16 [ 32.035918] The buggy address is located 8 bytes inside of [ 32.035918] allocated 9-byte region [fff00000c64c1b40, fff00000c64c1b49) [ 32.035981] [ 32.036203] The buggy address belongs to the physical page: [ 32.036304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c64c1a40 pfn:0x1064c1 [ 32.036762] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.036981] page_type: f5(slab) [ 32.037174] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 32.037332] raw: fff00000c64c1a40 000000008080007f 00000000f5000000 0000000000000000 [ 32.037432] page dumped because: kasan: bad access detected [ 32.037498] [ 32.037521] Memory state around the buggy address: [ 32.037994] fff00000c64c1a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.038169] fff00000c64c1a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 32.038291] >fff00000c64c1b00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 32.038378] ^ [ 32.038484] fff00000c64c1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.038797] fff00000c64c1c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.038929] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strnlen
[ 32.003528] ================================================================== [ 32.003853] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88 [ 32.004200] Read of size 1 at addr fff00000c65343d0 by task kunit_try_catch/290 [ 32.004283] [ 32.004427] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 32.004552] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.004587] Hardware name: linux,dummy-virt (DT) [ 32.004618] Call trace: [ 32.004644] show_stack+0x20/0x38 (C) [ 32.004850] dump_stack_lvl+0x8c/0xd0 [ 32.005079] print_report+0x118/0x5d0 [ 32.005163] kasan_report+0xdc/0x128 [ 32.005260] __asan_report_load1_noabort+0x20/0x30 [ 32.005443] strnlen+0x80/0x88 [ 32.005622] kasan_strings+0x478/0xb00 [ 32.005698] kunit_try_run_case+0x170/0x3f0 [ 32.005777] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.006177] kthread+0x328/0x630 [ 32.006406] ret_from_fork+0x10/0x20 [ 32.006722] [ 32.006892] Allocated by task 290: [ 32.006941] kasan_save_stack+0x3c/0x68 [ 32.007154] kasan_save_track+0x20/0x40 [ 32.007378] kasan_save_alloc_info+0x40/0x58 [ 32.007466] __kasan_kmalloc+0xd4/0xd8 [ 32.007579] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.007685] kasan_strings+0xc8/0xb00 [ 32.007855] kunit_try_run_case+0x170/0x3f0 [ 32.007918] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.007960] kthread+0x328/0x630 [ 32.008075] ret_from_fork+0x10/0x20 [ 32.008117] [ 32.008150] Freed by task 290: [ 32.008183] kasan_save_stack+0x3c/0x68 [ 32.008471] kasan_save_track+0x20/0x40 [ 32.008647] kasan_save_free_info+0x4c/0x78 [ 32.008848] __kasan_slab_free+0x6c/0x98 [ 32.009081] kfree+0x214/0x3c8 [ 32.009158] kasan_strings+0x24c/0xb00 [ 32.009306] kunit_try_run_case+0x170/0x3f0 [ 32.009419] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.009566] kthread+0x328/0x630 [ 32.009659] ret_from_fork+0x10/0x20 [ 32.009793] [ 32.009816] The buggy address belongs to the object at fff00000c65343c0 [ 32.009816] which belongs to the cache kmalloc-32 of size 32 [ 32.009923] The buggy address is located 16 bytes inside of [ 32.009923] freed 32-byte region [fff00000c65343c0, fff00000c65343e0) [ 32.010423] [ 32.010474] The buggy address belongs to the physical page: [ 32.010528] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106534 [ 32.010753] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.010812] page_type: f5(slab) [ 32.010988] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 32.011061] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 32.011104] page dumped because: kasan: bad access detected [ 32.011148] [ 32.011180] Memory state around the buggy address: [ 32.011216] fff00000c6534280: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 32.011259] fff00000c6534300: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 32.011315] >fff00000c6534380: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 32.011365] ^ [ 32.011409] fff00000c6534400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 32.011461] fff00000c6534480: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 32.011502] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strlen
[ 31.993352] ================================================================== [ 31.993906] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0 [ 31.993981] Read of size 1 at addr fff00000c65343d0 by task kunit_try_catch/290 [ 31.994293] [ 31.994345] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 31.994557] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.994683] Hardware name: linux,dummy-virt (DT) [ 31.994720] Call trace: [ 31.994786] show_stack+0x20/0x38 (C) [ 31.994849] dump_stack_lvl+0x8c/0xd0 [ 31.995141] print_report+0x118/0x5d0 [ 31.995211] kasan_report+0xdc/0x128 [ 31.995437] __asan_report_load1_noabort+0x20/0x30 [ 31.995511] strlen+0xa8/0xb0 [ 31.995691] kasan_strings+0x418/0xb00 [ 31.995755] kunit_try_run_case+0x170/0x3f0 [ 31.995881] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.996162] kthread+0x328/0x630 [ 31.996290] ret_from_fork+0x10/0x20 [ 31.996374] [ 31.996413] Allocated by task 290: [ 31.996575] kasan_save_stack+0x3c/0x68 [ 31.996625] kasan_save_track+0x20/0x40 [ 31.996884] kasan_save_alloc_info+0x40/0x58 [ 31.997014] __kasan_kmalloc+0xd4/0xd8 [ 31.997156] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.997310] kasan_strings+0xc8/0xb00 [ 31.997365] kunit_try_run_case+0x170/0x3f0 [ 31.997593] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.997748] kthread+0x328/0x630 [ 31.997810] ret_from_fork+0x10/0x20 [ 31.998187] [ 31.998229] Freed by task 290: [ 31.998435] kasan_save_stack+0x3c/0x68 [ 31.998627] kasan_save_track+0x20/0x40 [ 31.998699] kasan_save_free_info+0x4c/0x78 [ 31.998899] __kasan_slab_free+0x6c/0x98 [ 31.999099] kfree+0x214/0x3c8 [ 31.999197] kasan_strings+0x24c/0xb00 [ 31.999237] kunit_try_run_case+0x170/0x3f0 [ 31.999415] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.999460] kthread+0x328/0x630 [ 31.999850] ret_from_fork+0x10/0x20 [ 31.999948] [ 31.999971] The buggy address belongs to the object at fff00000c65343c0 [ 31.999971] which belongs to the cache kmalloc-32 of size 32 [ 32.000373] The buggy address is located 16 bytes inside of [ 32.000373] freed 32-byte region [fff00000c65343c0, fff00000c65343e0) [ 32.000491] [ 32.000527] The buggy address belongs to the physical page: [ 32.000585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106534 [ 32.000655] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.000707] page_type: f5(slab) [ 32.000861] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 32.001121] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 32.001257] page dumped because: kasan: bad access detected [ 32.001346] [ 32.001487] Memory state around the buggy address: [ 32.001547] fff00000c6534280: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 32.001920] fff00000c6534300: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 32.001996] >fff00000c6534380: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 32.002139] ^ [ 32.002219] fff00000c6534400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 32.002379] fff00000c6534480: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 32.002469] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[ 31.981467] ================================================================== [ 31.981520] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00 [ 31.981574] Read of size 1 at addr fff00000c65343d0 by task kunit_try_catch/290 [ 31.981914] [ 31.982138] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 31.982262] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.982550] Hardware name: linux,dummy-virt (DT) [ 31.982636] Call trace: [ 31.982703] show_stack+0x20/0x38 (C) [ 31.982757] dump_stack_lvl+0x8c/0xd0 [ 31.983115] print_report+0x118/0x5d0 [ 31.983191] kasan_report+0xdc/0x128 [ 31.983283] __asan_report_load1_noabort+0x20/0x30 [ 31.983337] kasan_strings+0x95c/0xb00 [ 31.983423] kunit_try_run_case+0x170/0x3f0 [ 31.983587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.983644] kthread+0x328/0x630 [ 31.983953] ret_from_fork+0x10/0x20 [ 31.984032] [ 31.984068] Allocated by task 290: [ 31.984196] kasan_save_stack+0x3c/0x68 [ 31.984277] kasan_save_track+0x20/0x40 [ 31.984424] kasan_save_alloc_info+0x40/0x58 [ 31.984491] __kasan_kmalloc+0xd4/0xd8 [ 31.984561] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.984605] kasan_strings+0xc8/0xb00 [ 31.984778] kunit_try_run_case+0x170/0x3f0 [ 31.985111] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.985230] kthread+0x328/0x630 [ 31.985348] ret_from_fork+0x10/0x20 [ 31.985447] [ 31.985503] Freed by task 290: [ 31.985595] kasan_save_stack+0x3c/0x68 [ 31.985692] kasan_save_track+0x20/0x40 [ 31.985733] kasan_save_free_info+0x4c/0x78 [ 31.985955] __kasan_slab_free+0x6c/0x98 [ 31.986031] kfree+0x214/0x3c8 [ 31.986221] kasan_strings+0x24c/0xb00 [ 31.986316] kunit_try_run_case+0x170/0x3f0 [ 31.986396] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.987173] kthread+0x328/0x630 [ 31.987271] ret_from_fork+0x10/0x20 [ 31.987781] [ 31.988063] The buggy address belongs to the object at fff00000c65343c0 [ 31.988063] which belongs to the cache kmalloc-32 of size 32 [ 31.988332] The buggy address is located 16 bytes inside of [ 31.988332] freed 32-byte region [fff00000c65343c0, fff00000c65343e0) [ 31.988396] [ 31.988573] The buggy address belongs to the physical page: [ 31.988625] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106534 [ 31.988787] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.989100] page_type: f5(slab) [ 31.989405] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 31.989645] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 31.989872] page dumped because: kasan: bad access detected [ 31.990212] [ 31.990303] Memory state around the buggy address: [ 31.990383] fff00000c6534280: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 31.990508] fff00000c6534300: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 31.990584] >fff00000c6534380: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 31.990710] ^ [ 31.990768] fff00000c6534400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 31.990834] fff00000c6534480: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 31.990947] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp
[ 31.974645] ================================================================== [ 31.974706] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 [ 31.975008] Read of size 1 at addr fff00000c65343d0 by task kunit_try_catch/290 [ 31.975549] [ 31.975773] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 31.975872] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.975996] Hardware name: linux,dummy-virt (DT) [ 31.976060] Call trace: [ 31.976124] show_stack+0x20/0x38 (C) [ 31.976278] dump_stack_lvl+0x8c/0xd0 [ 31.976331] print_report+0x118/0x5d0 [ 31.976691] kasan_report+0xdc/0x128 [ 31.976771] __asan_report_load1_noabort+0x20/0x30 [ 31.976885] strcmp+0xc0/0xc8 [ 31.976997] kasan_strings+0x340/0xb00 [ 31.977190] kunit_try_run_case+0x170/0x3f0 [ 31.977252] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.977304] kthread+0x328/0x630 [ 31.977347] ret_from_fork+0x10/0x20 [ 31.977398] [ 31.977457] Allocated by task 290: [ 31.977513] kasan_save_stack+0x3c/0x68 [ 31.977567] kasan_save_track+0x20/0x40 [ 31.977614] kasan_save_alloc_info+0x40/0x58 [ 31.977656] __kasan_kmalloc+0xd4/0xd8 [ 31.977697] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.977740] kasan_strings+0xc8/0xb00 [ 31.977778] kunit_try_run_case+0x170/0x3f0 [ 31.977818] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.977865] kthread+0x328/0x630 [ 31.977899] ret_from_fork+0x10/0x20 [ 31.977936] [ 31.977967] Freed by task 290: [ 31.977995] kasan_save_stack+0x3c/0x68 [ 31.978044] kasan_save_track+0x20/0x40 [ 31.978099] kasan_save_free_info+0x4c/0x78 [ 31.978148] __kasan_slab_free+0x6c/0x98 [ 31.978190] kfree+0x214/0x3c8 [ 31.978228] kasan_strings+0x24c/0xb00 [ 31.978265] kunit_try_run_case+0x170/0x3f0 [ 31.978316] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.978364] kthread+0x328/0x630 [ 31.978400] ret_from_fork+0x10/0x20 [ 31.978438] [ 31.978470] The buggy address belongs to the object at fff00000c65343c0 [ 31.978470] which belongs to the cache kmalloc-32 of size 32 [ 31.978536] The buggy address is located 16 bytes inside of [ 31.978536] freed 32-byte region [fff00000c65343c0, fff00000c65343e0) [ 31.978605] [ 31.978635] The buggy address belongs to the physical page: [ 31.978675] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106534 [ 31.978758] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.978832] page_type: f5(slab) [ 31.978878] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 31.978930] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 31.978981] page dumped because: kasan: bad access detected [ 31.979025] [ 31.979737] Memory state around the buggy address: [ 31.979829] fff00000c6534280: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 31.979888] fff00000c6534300: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 31.979998] >fff00000c6534380: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 31.980040] ^ [ 31.980094] fff00000c6534400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 31.980467] fff00000c6534480: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 31.980685] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[ 31.947794] ================================================================== [ 31.948011] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 31.948125] Read of size 1 at addr fff00000c6534218 by task kunit_try_catch/288 [ 31.948283] [ 31.948327] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 31.948435] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.948465] Hardware name: linux,dummy-virt (DT) [ 31.948509] Call trace: [ 31.948536] show_stack+0x20/0x38 (C) [ 31.948941] dump_stack_lvl+0x8c/0xd0 [ 31.949120] print_report+0x118/0x5d0 [ 31.949237] kasan_report+0xdc/0x128 [ 31.949381] __asan_report_load1_noabort+0x20/0x30 [ 31.949494] memcmp+0x198/0x1d8 [ 31.949584] kasan_memcmp+0x16c/0x300 [ 31.949852] kunit_try_run_case+0x170/0x3f0 [ 31.950029] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.950165] kthread+0x328/0x630 [ 31.950212] ret_from_fork+0x10/0x20 [ 31.950274] [ 31.950303] Allocated by task 288: [ 31.950343] kasan_save_stack+0x3c/0x68 [ 31.950390] kasan_save_track+0x20/0x40 [ 31.950439] kasan_save_alloc_info+0x40/0x58 [ 31.950477] __kasan_kmalloc+0xd4/0xd8 [ 31.950526] __kmalloc_cache_noprof+0x16c/0x3c0 [ 31.950573] kasan_memcmp+0xbc/0x300 [ 31.950619] kunit_try_run_case+0x170/0x3f0 [ 31.950659] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.950726] kthread+0x328/0x630 [ 31.950760] ret_from_fork+0x10/0x20 [ 31.950798] [ 31.950828] The buggy address belongs to the object at fff00000c6534200 [ 31.950828] which belongs to the cache kmalloc-32 of size 32 [ 31.950897] The buggy address is located 0 bytes to the right of [ 31.950897] allocated 24-byte region [fff00000c6534200, fff00000c6534218) [ 31.950968] [ 31.951008] The buggy address belongs to the physical page: [ 31.951069] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106534 [ 31.951401] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.951732] page_type: f5(slab) [ 31.951852] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 31.951967] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 31.952198] page dumped because: kasan: bad access detected [ 31.952600] [ 31.952665] Memory state around the buggy address: [ 31.952794] fff00000c6534100: 00 00 00 fc fc fc fc fc 00 00 00 04 fc fc fc fc [ 31.952871] fff00000c6534180: 00 00 07 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 31.952937] >fff00000c6534200: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.953128] ^ [ 31.953315] fff00000c6534280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.953367] fff00000c6534300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.953499] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[ 31.922418] ================================================================== [ 31.922670] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340 [ 31.922891] Read of size 1 at addr ffff800080b77b4a by task kunit_try_catch/284 [ 31.922983] [ 31.923269] CPU: 0 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 31.923370] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.923616] Hardware name: linux,dummy-virt (DT) [ 31.923694] Call trace: [ 31.923721] show_stack+0x20/0x38 (C) [ 31.923775] dump_stack_lvl+0x8c/0xd0 [ 31.923931] print_report+0x310/0x5d0 [ 31.923988] kasan_report+0xdc/0x128 [ 31.924034] __asan_report_load1_noabort+0x20/0x30 [ 31.924116] kasan_alloca_oob_right+0x2dc/0x340 [ 31.924167] kunit_try_run_case+0x170/0x3f0 [ 31.924362] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.924460] kthread+0x328/0x630 [ 31.924586] ret_from_fork+0x10/0x20 [ 31.924641] [ 31.924935] The buggy address belongs to stack of task kunit_try_catch/284 [ 31.925109] [ 31.925169] The buggy address ffff800080b77b4a belongs to a vmalloc virtual mapping [ 31.925279] The buggy address belongs to the physical page: [ 31.925316] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b1d [ 31.925734] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.925838] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 31.925906] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 31.926125] page dumped because: kasan: bad access detected [ 31.926543] [ 31.926594] Memory state around the buggy address: [ 31.926722] ffff800080b77a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.926808] ffff800080b77a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.927096] >ffff800080b77b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 31.927252] ^ [ 31.927311] ffff800080b77b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 31.927478] ffff800080b77c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 31.927666] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[ 31.907536] ================================================================== [ 31.907612] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 31.907670] Read of size 1 at addr ffff800080b77b5f by task kunit_try_catch/282 [ 31.907722] [ 31.907756] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 31.907870] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.907899] Hardware name: linux,dummy-virt (DT) [ 31.907933] Call trace: [ 31.907965] show_stack+0x20/0x38 (C) [ 31.908017] dump_stack_lvl+0x8c/0xd0 [ 31.908923] print_report+0x310/0x5d0 [ 31.909399] kasan_report+0xdc/0x128 [ 31.909583] __asan_report_load1_noabort+0x20/0x30 [ 31.909718] kasan_alloca_oob_left+0x2b8/0x310 [ 31.909772] kunit_try_run_case+0x170/0x3f0 [ 31.910008] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.910131] kthread+0x328/0x630 [ 31.910302] ret_from_fork+0x10/0x20 [ 31.910445] [ 31.910516] The buggy address belongs to stack of task kunit_try_catch/282 [ 31.910664] [ 31.910706] The buggy address ffff800080b77b5f belongs to a vmalloc virtual mapping [ 31.911071] The buggy address belongs to the physical page: [ 31.911152] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b1d [ 31.911277] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.911395] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 31.911551] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 31.911640] page dumped because: kasan: bad access detected [ 31.911965] [ 31.912098] Memory state around the buggy address: [ 31.912164] ffff800080b77a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.912308] ffff800080b77a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.912390] >ffff800080b77b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 31.912554] ^ [ 31.912763] ffff800080b77b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 31.912828] ffff800080b77c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 31.913156] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 31.893191] ================================================================== [ 31.893426] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 31.893505] Read of size 1 at addr ffff800080b77c2a by task kunit_try_catch/280 [ 31.893558] [ 31.893609] CPU: 0 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 31.893699] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.893886] Hardware name: linux,dummy-virt (DT) [ 31.893962] Call trace: [ 31.894000] show_stack+0x20/0x38 (C) [ 31.894131] dump_stack_lvl+0x8c/0xd0 [ 31.894183] print_report+0x310/0x5d0 [ 31.894582] kasan_report+0xdc/0x128 [ 31.894725] __asan_report_load1_noabort+0x20/0x30 [ 31.894829] kasan_stack_oob+0x238/0x270 [ 31.894906] kunit_try_run_case+0x170/0x3f0 [ 31.895122] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.895193] kthread+0x328/0x630 [ 31.895239] ret_from_fork+0x10/0x20 [ 31.895421] [ 31.895612] The buggy address belongs to stack of task kunit_try_catch/280 [ 31.895738] and is located at offset 138 in frame: [ 31.896059] kasan_stack_oob+0x0/0x270 [ 31.896351] [ 31.897169] This frame has 4 objects: [ 31.897322] [48, 49) '__assertion' [ 31.897402] [64, 72) 'array' [ 31.897447] [96, 112) '__assertion' [ 31.897511] [128, 138) 'stack_array' [ 31.897570] [ 31.897612] The buggy address ffff800080b77c2a belongs to a vmalloc virtual mapping [ 31.897676] The buggy address belongs to the physical page: [ 31.897738] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b1d [ 31.897797] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.897883] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 31.897935] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 31.897978] page dumped because: kasan: bad access detected [ 31.898026] [ 31.898061] Memory state around the buggy address: [ 31.898354] ffff800080b77b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.898453] ffff800080b77b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 31.898642] >ffff800080b77c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 31.898917] ^ [ 31.899480] ffff800080b77c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 [ 31.899557] ffff800080b77d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 31.899652] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 31.867781] ================================================================== [ 31.868105] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 31.868451] Read of size 1 at addr ffffb0785134e6cd by task kunit_try_catch/276 [ 31.868637] [ 31.868787] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 31.868892] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.869156] Hardware name: linux,dummy-virt (DT) [ 31.869275] Call trace: [ 31.869567] show_stack+0x20/0x38 (C) [ 31.869679] dump_stack_lvl+0x8c/0xd0 [ 31.869844] print_report+0x310/0x5d0 [ 31.869944] kasan_report+0xdc/0x128 [ 31.870031] __asan_report_load1_noabort+0x20/0x30 [ 31.870096] kasan_global_oob_right+0x230/0x270 [ 31.870159] kunit_try_run_case+0x170/0x3f0 [ 31.870216] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.870279] kthread+0x328/0x630 [ 31.870332] ret_from_fork+0x10/0x20 [ 31.870405] [ 31.870483] The buggy address belongs to the variable: [ 31.870540] global_array+0xd/0x40 [ 31.870615] [ 31.870673] The buggy address ffffb0785134e6cd belongs to a vmalloc virtual mapping [ 31.870781] The buggy address belongs to the physical page: [ 31.870826] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47d4e [ 31.870885] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 31.870957] raw: 03fffe0000002000 ffffc1ffc01f5388 ffffc1ffc01f5388 0000000000000000 [ 31.871010] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 31.871319] page dumped because: kasan: bad access detected [ 31.871641] [ 31.871857] Memory state around the buggy address: [ 31.871936] ffffb0785134e580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.872292] ffffb0785134e600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.872601] >ffffb0785134e680: 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 [ 31.872755] ^ [ 31.872847] ffffb0785134e700: 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 [ 31.873154] ffffb0785134e780: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00 [ 31.873283] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 31.853582] ================================================================== [ 31.853654] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 31.853713] Free of addr fff00000c9c08001 by task kunit_try_catch/274 [ 31.853759] [ 31.853794] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 31.853878] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.853903] Hardware name: linux,dummy-virt (DT) [ 31.853935] Call trace: [ 31.853957] show_stack+0x20/0x38 (C) [ 31.854074] dump_stack_lvl+0x8c/0xd0 [ 31.854140] print_report+0x118/0x5d0 [ 31.854186] kasan_report_invalid_free+0xc0/0xe8 [ 31.854232] __kasan_mempool_poison_object+0xfc/0x150 [ 31.854285] mempool_free+0x28c/0x328 [ 31.854340] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 31.854391] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 31.854443] kunit_try_run_case+0x170/0x3f0 [ 31.854492] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.854548] kthread+0x328/0x630 [ 31.854591] ret_from_fork+0x10/0x20 [ 31.854646] [ 31.854676] The buggy address belongs to the physical page: [ 31.854709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c08 [ 31.854773] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.854821] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.854883] page_type: f8(unknown) [ 31.854922] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.854978] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.855028] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.855885] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.856159] head: 0bfffe0000000002 ffffc1ffc3270201 00000000ffffffff 00000000ffffffff [ 31.856284] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 31.856370] page dumped because: kasan: bad access detected [ 31.856455] [ 31.856759] Memory state around the buggy address: [ 31.856830] fff00000c9c07f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.856977] fff00000c9c07f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.857106] >fff00000c9c08000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.857339] ^ [ 31.857422] fff00000c9c08080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.857571] fff00000c9c08100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.857976] ================================================================== [ 31.833790] ================================================================== [ 31.833862] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 31.833948] Free of addr fff00000c85fca01 by task kunit_try_catch/272 [ 31.833992] [ 31.834038] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 31.834136] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.834171] Hardware name: linux,dummy-virt (DT) [ 31.834204] Call trace: [ 31.834235] show_stack+0x20/0x38 (C) [ 31.834284] dump_stack_lvl+0x8c/0xd0 [ 31.834332] print_report+0x118/0x5d0 [ 31.834376] kasan_report_invalid_free+0xc0/0xe8 [ 31.834422] check_slab_allocation+0xfc/0x108 [ 31.834478] __kasan_mempool_poison_object+0x78/0x150 [ 31.834532] mempool_free+0x28c/0x328 [ 31.834576] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 31.834629] mempool_kmalloc_invalid_free+0xc0/0x118 [ 31.834684] kunit_try_run_case+0x170/0x3f0 [ 31.834731] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.834781] kthread+0x328/0x630 [ 31.834824] ret_from_fork+0x10/0x20 [ 31.834873] [ 31.834897] Allocated by task 272: [ 31.834925] kasan_save_stack+0x3c/0x68 [ 31.834965] kasan_save_track+0x20/0x40 [ 31.835004] kasan_save_alloc_info+0x40/0x58 [ 31.835962] __kasan_mempool_unpoison_object+0x11c/0x180 [ 31.836067] remove_element+0x130/0x1f8 [ 31.836130] mempool_alloc_preallocated+0x58/0xc0 [ 31.836183] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 31.836261] mempool_kmalloc_invalid_free+0xc0/0x118 [ 31.836443] kunit_try_run_case+0x170/0x3f0 [ 31.836493] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.836535] kthread+0x328/0x630 [ 31.836568] ret_from_fork+0x10/0x20 [ 31.836976] [ 31.837070] The buggy address belongs to the object at fff00000c85fca00 [ 31.837070] which belongs to the cache kmalloc-128 of size 128 [ 31.837433] The buggy address is located 1 bytes inside of [ 31.837433] 128-byte region [fff00000c85fca00, fff00000c85fca80) [ 31.837602] [ 31.837682] The buggy address belongs to the physical page: [ 31.837993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085fc [ 31.838079] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.838247] page_type: f5(slab) [ 31.838343] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.838706] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.838839] page dumped because: kasan: bad access detected [ 31.838899] [ 31.839205] Memory state around the buggy address: [ 31.839291] fff00000c85fc900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.839367] fff00000c85fc980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.839508] >fff00000c85fca00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.839585] ^ [ 31.839614] fff00000c85fca80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.839986] fff00000c85fcb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.840069] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 31.798164] ================================================================== [ 31.798271] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 31.798418] Free of addr fff00000c9c04000 by task kunit_try_catch/268 [ 31.798486] [ 31.798543] CPU: 0 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 31.798783] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.798816] Hardware name: linux,dummy-virt (DT) [ 31.798847] Call trace: [ 31.798877] show_stack+0x20/0x38 (C) [ 31.799146] dump_stack_lvl+0x8c/0xd0 [ 31.799354] print_report+0x118/0x5d0 [ 31.799655] kasan_report_invalid_free+0xc0/0xe8 [ 31.799727] __kasan_mempool_poison_object+0x14c/0x150 [ 31.799780] mempool_free+0x28c/0x328 [ 31.799879] mempool_double_free_helper+0x150/0x2e8 [ 31.799966] mempool_kmalloc_large_double_free+0xc0/0x118 [ 31.800020] kunit_try_run_case+0x170/0x3f0 [ 31.800157] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.800238] kthread+0x328/0x630 [ 31.800699] ret_from_fork+0x10/0x20 [ 31.800811] [ 31.801277] The buggy address belongs to the physical page: [ 31.801351] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c04 [ 31.801431] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.801489] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.801806] page_type: f8(unknown) [ 31.801960] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.802704] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.802776] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.802853] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.802937] head: 0bfffe0000000002 ffffc1ffc3270101 00000000ffffffff 00000000ffffffff [ 31.803255] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 31.803372] page dumped because: kasan: bad access detected [ 31.803487] [ 31.803541] Memory state around the buggy address: [ 31.803622] fff00000c9c03f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.803788] fff00000c9c03f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.803867] >fff00000c9c04000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.804160] ^ [ 31.804263] fff00000c9c04080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.804336] fff00000c9c04100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.804428] ================================================================== [ 31.817115] ================================================================== [ 31.817181] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 31.817245] Free of addr fff00000c9c04000 by task kunit_try_catch/270 [ 31.817288] [ 31.817756] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 31.817900] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.818068] Hardware name: linux,dummy-virt (DT) [ 31.818159] Call trace: [ 31.818205] show_stack+0x20/0x38 (C) [ 31.818280] dump_stack_lvl+0x8c/0xd0 [ 31.818665] print_report+0x118/0x5d0 [ 31.818786] kasan_report_invalid_free+0xc0/0xe8 [ 31.818872] __kasan_mempool_poison_pages+0xe0/0xe8 [ 31.819011] mempool_free+0x24c/0x328 [ 31.819110] mempool_double_free_helper+0x150/0x2e8 [ 31.819472] mempool_page_alloc_double_free+0xbc/0x118 [ 31.819605] kunit_try_run_case+0x170/0x3f0 [ 31.819930] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.820098] kthread+0x328/0x630 [ 31.820268] ret_from_fork+0x10/0x20 [ 31.820347] [ 31.820409] The buggy address belongs to the physical page: [ 31.820527] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c04 [ 31.820598] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.820673] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 31.821032] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 31.821165] page dumped because: kasan: bad access detected [ 31.821302] [ 31.821355] Memory state around the buggy address: [ 31.821432] fff00000c9c03f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.821580] fff00000c9c03f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.821633] >fff00000c9c04000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.822099] ^ [ 31.822231] fff00000c9c04080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.822352] fff00000c9c04100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.822477] ================================================================== [ 31.775992] ================================================================== [ 31.776540] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 31.776872] Free of addr fff00000c85fc600 by task kunit_try_catch/266 [ 31.777226] [ 31.777269] CPU: 0 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 31.777659] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.777700] Hardware name: linux,dummy-virt (DT) [ 31.777769] Call trace: [ 31.778119] show_stack+0x20/0x38 (C) [ 31.778526] dump_stack_lvl+0x8c/0xd0 [ 31.778665] print_report+0x118/0x5d0 [ 31.778744] kasan_report_invalid_free+0xc0/0xe8 [ 31.779119] check_slab_allocation+0xd4/0x108 [ 31.779273] __kasan_mempool_poison_object+0x78/0x150 [ 31.779329] mempool_free+0x28c/0x328 [ 31.779680] mempool_double_free_helper+0x150/0x2e8 [ 31.779763] mempool_kmalloc_double_free+0xc0/0x118 [ 31.779848] kunit_try_run_case+0x170/0x3f0 [ 31.780247] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.780415] kthread+0x328/0x630 [ 31.780494] ret_from_fork+0x10/0x20 [ 31.780562] [ 31.780580] Allocated by task 266: [ 31.780887] kasan_save_stack+0x3c/0x68 [ 31.780982] kasan_save_track+0x20/0x40 [ 31.781141] kasan_save_alloc_info+0x40/0x58 [ 31.781220] __kasan_mempool_unpoison_object+0x11c/0x180 [ 31.781519] remove_element+0x130/0x1f8 [ 31.781742] mempool_alloc_preallocated+0x58/0xc0 [ 31.781803] mempool_double_free_helper+0x94/0x2e8 [ 31.782031] mempool_kmalloc_double_free+0xc0/0x118 [ 31.782230] kunit_try_run_case+0x170/0x3f0 [ 31.782354] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.782417] kthread+0x328/0x630 [ 31.782733] ret_from_fork+0x10/0x20 [ 31.782808] [ 31.782857] Freed by task 266: [ 31.783003] kasan_save_stack+0x3c/0x68 [ 31.783089] kasan_save_track+0x20/0x40 [ 31.783351] kasan_save_free_info+0x4c/0x78 [ 31.783566] __kasan_mempool_poison_object+0xc0/0x150 [ 31.783690] mempool_free+0x28c/0x328 [ 31.783880] mempool_double_free_helper+0x100/0x2e8 [ 31.784072] mempool_kmalloc_double_free+0xc0/0x118 [ 31.784147] kunit_try_run_case+0x170/0x3f0 [ 31.784365] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.784598] kthread+0x328/0x630 [ 31.784686] ret_from_fork+0x10/0x20 [ 31.784798] [ 31.784851] The buggy address belongs to the object at fff00000c85fc600 [ 31.784851] which belongs to the cache kmalloc-128 of size 128 [ 31.784972] The buggy address is located 0 bytes inside of [ 31.784972] 128-byte region [fff00000c85fc600, fff00000c85fc680) [ 31.785097] [ 31.785148] The buggy address belongs to the physical page: [ 31.785180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085fc [ 31.785246] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.785294] page_type: f5(slab) [ 31.785335] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.785394] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.785434] page dumped because: kasan: bad access detected [ 31.785465] [ 31.785482] Memory state around the buggy address: [ 31.785520] fff00000c85fc500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.785578] fff00000c85fc580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.785636] >fff00000c85fc600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.785673] ^ [ 31.785715] fff00000c85fc680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.785758] fff00000c85fc700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.785805] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 31.762498] ================================================================== [ 31.762569] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 31.762948] Read of size 1 at addr fff00000c9c04000 by task kunit_try_catch/264 [ 31.763074] [ 31.763128] CPU: 0 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 31.763583] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.763648] Hardware name: linux,dummy-virt (DT) [ 31.763728] Call trace: [ 31.763759] show_stack+0x20/0x38 (C) [ 31.763831] dump_stack_lvl+0x8c/0xd0 [ 31.763899] print_report+0x118/0x5d0 [ 31.763944] kasan_report+0xdc/0x128 [ 31.763987] __asan_report_load1_noabort+0x20/0x30 [ 31.764390] mempool_uaf_helper+0x314/0x340 [ 31.764471] mempool_page_alloc_uaf+0xc0/0x118 [ 31.764588] kunit_try_run_case+0x170/0x3f0 [ 31.764657] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.764716] kthread+0x328/0x630 [ 31.765124] ret_from_fork+0x10/0x20 [ 31.765255] [ 31.765281] The buggy address belongs to the physical page: [ 31.765346] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c04 [ 31.765420] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.765800] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 31.766193] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 31.766257] page dumped because: kasan: bad access detected [ 31.766294] [ 31.766313] Memory state around the buggy address: [ 31.766480] fff00000c9c03f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.766684] fff00000c9c03f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.766760] >fff00000c9c04000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.766821] ^ [ 31.766926] fff00000c9c04080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.767079] fff00000c9c04100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.767272] ================================================================== [ 31.695443] ================================================================== [ 31.695626] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 31.695712] Read of size 1 at addr fff00000c9c00000 by task kunit_try_catch/260 [ 31.695764] [ 31.695958] CPU: 0 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 31.696095] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.696199] Hardware name: linux,dummy-virt (DT) [ 31.696252] Call trace: [ 31.696355] show_stack+0x20/0x38 (C) [ 31.696413] dump_stack_lvl+0x8c/0xd0 [ 31.696476] print_report+0x118/0x5d0 [ 31.696525] kasan_report+0xdc/0x128 [ 31.696603] __asan_report_load1_noabort+0x20/0x30 [ 31.697007] mempool_uaf_helper+0x314/0x340 [ 31.697086] mempool_kmalloc_large_uaf+0xc4/0x120 [ 31.697142] kunit_try_run_case+0x170/0x3f0 [ 31.697190] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.697277] kthread+0x328/0x630 [ 31.697322] ret_from_fork+0x10/0x20 [ 31.697377] [ 31.697410] The buggy address belongs to the physical page: [ 31.697445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109c00 [ 31.697512] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.697577] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.697646] page_type: f8(unknown) [ 31.697690] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.697742] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.697792] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.697840] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.697889] head: 0bfffe0000000002 ffffc1ffc3270001 00000000ffffffff 00000000ffffffff [ 31.697951] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 31.697993] page dumped because: kasan: bad access detected [ 31.698025] [ 31.698044] Memory state around the buggy address: [ 31.698103] fff00000c9bfff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.698145] fff00000c9bfff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.698186] >fff00000c9c00000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.698224] ^ [ 31.698258] fff00000c9c00080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.698300] fff00000c9c00100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.698357] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 31.682718] ================================================================== [ 31.682811] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 31.682891] Read of size 1 at addr fff00000c85fc200 by task kunit_try_catch/258 [ 31.682944] [ 31.682987] CPU: 0 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 31.683096] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.683125] Hardware name: linux,dummy-virt (DT) [ 31.683160] Call trace: [ 31.683185] show_stack+0x20/0x38 (C) [ 31.683237] dump_stack_lvl+0x8c/0xd0 [ 31.683287] print_report+0x118/0x5d0 [ 31.683330] kasan_report+0xdc/0x128 [ 31.683373] __asan_report_load1_noabort+0x20/0x30 [ 31.683421] mempool_uaf_helper+0x314/0x340 [ 31.683467] mempool_kmalloc_uaf+0xc4/0x120 [ 31.683514] kunit_try_run_case+0x170/0x3f0 [ 31.683567] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.683616] kthread+0x328/0x630 [ 31.683658] ret_from_fork+0x10/0x20 [ 31.683705] [ 31.683725] Allocated by task 258: [ 31.683753] kasan_save_stack+0x3c/0x68 [ 31.683795] kasan_save_track+0x20/0x40 [ 31.683832] kasan_save_alloc_info+0x40/0x58 [ 31.683871] __kasan_mempool_unpoison_object+0x11c/0x180 [ 31.683912] remove_element+0x130/0x1f8 [ 31.683950] mempool_alloc_preallocated+0x58/0xc0 [ 31.683990] mempool_uaf_helper+0xa4/0x340 [ 31.684027] mempool_kmalloc_uaf+0xc4/0x120 [ 31.684075] kunit_try_run_case+0x170/0x3f0 [ 31.684113] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.684155] kthread+0x328/0x630 [ 31.684204] ret_from_fork+0x10/0x20 [ 31.684242] [ 31.684274] Freed by task 258: [ 31.684301] kasan_save_stack+0x3c/0x68 [ 31.684339] kasan_save_track+0x20/0x40 [ 31.684378] kasan_save_free_info+0x4c/0x78 [ 31.684414] __kasan_mempool_poison_object+0xc0/0x150 [ 31.684457] mempool_free+0x28c/0x328 [ 31.684494] mempool_uaf_helper+0x104/0x340 [ 31.684531] mempool_kmalloc_uaf+0xc4/0x120 [ 31.684570] kunit_try_run_case+0x170/0x3f0 [ 31.684608] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.684650] kthread+0x328/0x630 [ 31.684682] ret_from_fork+0x10/0x20 [ 31.684719] [ 31.684739] The buggy address belongs to the object at fff00000c85fc200 [ 31.684739] which belongs to the cache kmalloc-128 of size 128 [ 31.684798] The buggy address is located 0 bytes inside of [ 31.684798] freed 128-byte region [fff00000c85fc200, fff00000c85fc280) [ 31.684857] [ 31.684881] The buggy address belongs to the physical page: [ 31.684913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085fc [ 31.684970] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.685022] page_type: f5(slab) [ 31.685075] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.685125] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.685166] page dumped because: kasan: bad access detected [ 31.685198] [ 31.685216] Memory state around the buggy address: [ 31.685250] fff00000c85fc100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.685292] fff00000c85fc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.685334] >fff00000c85fc200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.685374] ^ [ 31.685402] fff00000c85fc280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.685445] fff00000c85fc300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.685483] ================================================================== [ 31.711947] ================================================================== [ 31.712020] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 31.712090] Read of size 1 at addr fff00000c85de240 by task kunit_try_catch/262 [ 31.712140] [ 31.712178] CPU: 0 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 31.713208] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.713347] Hardware name: linux,dummy-virt (DT) [ 31.713503] Call trace: [ 31.713556] show_stack+0x20/0x38 (C) [ 31.713638] dump_stack_lvl+0x8c/0xd0 [ 31.714425] print_report+0x118/0x5d0 [ 31.714508] kasan_report+0xdc/0x128 [ 31.714555] __asan_report_load1_noabort+0x20/0x30 [ 31.714660] mempool_uaf_helper+0x314/0x340 [ 31.714723] mempool_slab_uaf+0xc0/0x118 [ 31.714770] kunit_try_run_case+0x170/0x3f0 [ 31.714819] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.714878] kthread+0x328/0x630 [ 31.714936] ret_from_fork+0x10/0x20 [ 31.714993] [ 31.715013] Allocated by task 262: [ 31.715064] kasan_save_stack+0x3c/0x68 [ 31.715111] kasan_save_track+0x20/0x40 [ 31.715151] kasan_save_alloc_info+0x40/0x58 [ 31.715189] __kasan_mempool_unpoison_object+0xbc/0x180 [ 31.715231] remove_element+0x16c/0x1f8 [ 31.715279] mempool_alloc_preallocated+0x58/0xc0 [ 31.715325] mempool_uaf_helper+0xa4/0x340 [ 31.715372] mempool_slab_uaf+0xc0/0x118 [ 31.715416] kunit_try_run_case+0x170/0x3f0 [ 31.715454] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.715496] kthread+0x328/0x630 [ 31.715528] ret_from_fork+0x10/0x20 [ 31.715582] [ 31.715602] Freed by task 262: [ 31.715635] kasan_save_stack+0x3c/0x68 [ 31.715674] kasan_save_track+0x20/0x40 [ 31.715721] kasan_save_free_info+0x4c/0x78 [ 31.715758] __kasan_mempool_poison_object+0xc0/0x150 [ 31.715810] mempool_free+0x28c/0x328 [ 31.715847] mempool_uaf_helper+0x104/0x340 [ 31.715885] mempool_slab_uaf+0xc0/0x118 [ 31.715921] kunit_try_run_case+0x170/0x3f0 [ 31.715975] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.716023] kthread+0x328/0x630 [ 31.716087] ret_from_fork+0x10/0x20 [ 31.716479] [ 31.716504] The buggy address belongs to the object at fff00000c85de240 [ 31.716504] which belongs to the cache test_cache of size 123 [ 31.717312] The buggy address is located 0 bytes inside of [ 31.717312] freed 123-byte region [fff00000c85de240, fff00000c85de2bb) [ 31.717596] [ 31.717638] The buggy address belongs to the physical page: [ 31.718132] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085de [ 31.718244] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.718434] page_type: f5(slab) [ 31.718522] raw: 0bfffe0000000000 fff00000c5687b40 dead000000000122 0000000000000000 [ 31.718681] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 31.718782] page dumped because: kasan: bad access detected [ 31.719164] [ 31.719225] Memory state around the buggy address: [ 31.719309] fff00000c85de100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.719482] fff00000c85de180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.719528] >fff00000c85de200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 31.719960] ^ [ 31.720014] fff00000c85de280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.720376] fff00000c85de300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.720501] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 31.614404] ================================================================== [ 31.614910] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 31.615121] Read of size 1 at addr fff00000c85fc2bb by task kunit_try_catch/256 [ 31.615379] [ 31.615824] CPU: 1 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 31.615970] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.616033] Hardware name: linux,dummy-virt (DT) [ 31.616092] Call trace: [ 31.616183] show_stack+0x20/0x38 (C) [ 31.616278] dump_stack_lvl+0x8c/0xd0 [ 31.616365] print_report+0x118/0x5d0 [ 31.617073] kasan_report+0xdc/0x128 [ 31.617629] __asan_report_load1_noabort+0x20/0x30 [ 31.617691] mempool_oob_right_helper+0x2ac/0x2f0 [ 31.617740] mempool_slab_oob_right+0xc0/0x118 [ 31.618387] kunit_try_run_case+0x170/0x3f0 [ 31.619420] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.619481] kthread+0x328/0x630 [ 31.619823] ret_from_fork+0x10/0x20 [ 31.619882] [ 31.619902] Allocated by task 256: [ 31.619933] kasan_save_stack+0x3c/0x68 [ 31.619976] kasan_save_track+0x20/0x40 [ 31.620016] kasan_save_alloc_info+0x40/0x58 [ 31.620065] __kasan_mempool_unpoison_object+0xbc/0x180 [ 31.621497] remove_element+0x16c/0x1f8 [ 31.621658] mempool_alloc_preallocated+0x58/0xc0 [ 31.622029] mempool_oob_right_helper+0x98/0x2f0 [ 31.622664] mempool_slab_oob_right+0xc0/0x118 [ 31.623509] kunit_try_run_case+0x170/0x3f0 [ 31.623566] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.623960] kthread+0x328/0x630 [ 31.624006] ret_from_fork+0x10/0x20 [ 31.624371] [ 31.624414] The buggy address belongs to the object at fff00000c85fc240 [ 31.624414] which belongs to the cache test_cache of size 123 [ 31.624493] The buggy address is located 0 bytes to the right of [ 31.624493] allocated 123-byte region [fff00000c85fc240, fff00000c85fc2bb) [ 31.624619] [ 31.624641] The buggy address belongs to the physical page: [ 31.624675] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1085fc [ 31.625374] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.625872] page_type: f5(slab) [ 31.626134] raw: 0bfffe0000000000 fff00000c592e780 dead000000000122 0000000000000000 [ 31.626272] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 31.626824] page dumped because: kasan: bad access detected [ 31.627318] [ 31.627400] Memory state around the buggy address: [ 31.627562] fff00000c85fc180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.627952] fff00000c85fc200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 31.628719] >fff00000c85fc280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 31.628937] ^ [ 31.629214] fff00000c85fc300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.629432] fff00000c85fc380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.629766] ================================================================== [ 31.602900] ================================================================== [ 31.602979] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 31.603062] Read of size 1 at addr fff00000c9be2001 by task kunit_try_catch/254 [ 31.603112] [ 31.603151] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 31.603264] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.603293] Hardware name: linux,dummy-virt (DT) [ 31.603324] Call trace: [ 31.603389] show_stack+0x20/0x38 (C) [ 31.603489] dump_stack_lvl+0x8c/0xd0 [ 31.603535] print_report+0x118/0x5d0 [ 31.603578] kasan_report+0xdc/0x128 [ 31.603619] __asan_report_load1_noabort+0x20/0x30 [ 31.603744] mempool_oob_right_helper+0x2ac/0x2f0 [ 31.603817] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 31.603966] kunit_try_run_case+0x170/0x3f0 [ 31.604179] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.604271] kthread+0x328/0x630 [ 31.604316] ret_from_fork+0x10/0x20 [ 31.604423] [ 31.604448] The buggy address belongs to the physical page: [ 31.604483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109be0 [ 31.604539] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 31.604591] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 31.604770] page_type: f8(unknown) [ 31.604857] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.605044] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.605105] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 31.605153] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 31.605202] head: 0bfffe0000000002 ffffc1ffc326f801 00000000ffffffff 00000000ffffffff [ 31.605286] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 31.605330] page dumped because: kasan: bad access detected [ 31.605362] [ 31.605403] Memory state around the buggy address: [ 31.605437] fff00000c9be1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.605481] fff00000c9be1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.605523] >fff00000c9be2000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.605561] ^ [ 31.605592] fff00000c9be2080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.605635] fff00000c9be2100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 31.605674] ================================================================== [ 31.588727] ================================================================== [ 31.588813] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 31.588894] Read of size 1 at addr fff00000c6537273 by task kunit_try_catch/252 [ 31.588944] [ 31.588989] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 31.589095] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.589124] Hardware name: linux,dummy-virt (DT) [ 31.589157] Call trace: [ 31.589184] show_stack+0x20/0x38 (C) [ 31.589236] dump_stack_lvl+0x8c/0xd0 [ 31.589285] print_report+0x118/0x5d0 [ 31.589329] kasan_report+0xdc/0x128 [ 31.589371] __asan_report_load1_noabort+0x20/0x30 [ 31.589418] mempool_oob_right_helper+0x2ac/0x2f0 [ 31.589467] mempool_kmalloc_oob_right+0xc4/0x120 [ 31.589515] kunit_try_run_case+0x170/0x3f0 [ 31.589565] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.589619] kthread+0x328/0x630 [ 31.589663] ret_from_fork+0x10/0x20 [ 31.589710] [ 31.589729] Allocated by task 252: [ 31.589759] kasan_save_stack+0x3c/0x68 [ 31.589800] kasan_save_track+0x20/0x40 [ 31.589840] kasan_save_alloc_info+0x40/0x58 [ 31.589876] __kasan_mempool_unpoison_object+0x11c/0x180 [ 31.589918] remove_element+0x130/0x1f8 [ 31.589958] mempool_alloc_preallocated+0x58/0xc0 [ 31.589998] mempool_oob_right_helper+0x98/0x2f0 [ 31.590037] mempool_kmalloc_oob_right+0xc4/0x120 [ 31.590087] kunit_try_run_case+0x170/0x3f0 [ 31.590125] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.590166] kthread+0x328/0x630 [ 31.590199] ret_from_fork+0x10/0x20 [ 31.590235] [ 31.590255] The buggy address belongs to the object at fff00000c6537200 [ 31.590255] which belongs to the cache kmalloc-128 of size 128 [ 31.590313] The buggy address is located 0 bytes to the right of [ 31.590313] allocated 115-byte region [fff00000c6537200, fff00000c6537273) [ 31.590377] [ 31.590399] The buggy address belongs to the physical page: [ 31.590434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106537 [ 31.590492] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.590545] page_type: f5(slab) [ 31.590588] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 31.590637] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 31.590680] page dumped because: kasan: bad access detected [ 31.590713] [ 31.590731] Memory state around the buggy address: [ 31.590766] fff00000c6537100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.590809] fff00000c6537180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.590853] >fff00000c6537200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.590891] ^ [ 31.590930] fff00000c6537280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.590973] fff00000c6537300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 31.591011] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 31.011465] ================================================================== [ 31.011547] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300 [ 31.011619] Read of size 1 at addr fff00000c56878c0 by task kunit_try_catch/246 [ 31.012486] [ 31.012904] CPU: 0 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 31.013193] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.013282] Hardware name: linux,dummy-virt (DT) [ 31.013656] Call trace: [ 31.013778] show_stack+0x20/0x38 (C) [ 31.013840] dump_stack_lvl+0x8c/0xd0 [ 31.014284] print_report+0x118/0x5d0 [ 31.014443] kasan_report+0xdc/0x128 [ 31.014772] __kasan_check_byte+0x54/0x70 [ 31.014930] kmem_cache_destroy+0x34/0x218 [ 31.015018] kmem_cache_double_destroy+0x174/0x300 [ 31.015451] kunit_try_run_case+0x170/0x3f0 [ 31.015528] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.015783] kthread+0x328/0x630 [ 31.016105] ret_from_fork+0x10/0x20 [ 31.016254] [ 31.016343] Allocated by task 246: [ 31.016472] kasan_save_stack+0x3c/0x68 [ 31.016592] kasan_save_track+0x20/0x40 [ 31.016968] kasan_save_alloc_info+0x40/0x58 [ 31.017237] __kasan_slab_alloc+0xa8/0xb0 [ 31.017336] kmem_cache_alloc_noprof+0x10c/0x398 [ 31.017392] __kmem_cache_create_args+0x178/0x280 [ 31.017713] kmem_cache_double_destroy+0xc0/0x300 [ 31.017819] kunit_try_run_case+0x170/0x3f0 [ 31.018112] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.018196] kthread+0x328/0x630 [ 31.018288] ret_from_fork+0x10/0x20 [ 31.018471] [ 31.018609] Freed by task 246: [ 31.018747] kasan_save_stack+0x3c/0x68 [ 31.018918] kasan_save_track+0x20/0x40 [ 31.018993] kasan_save_free_info+0x4c/0x78 [ 31.019035] __kasan_slab_free+0x6c/0x98 [ 31.019245] kmem_cache_free+0x260/0x468 [ 31.019414] slab_kmem_cache_release+0x38/0x50 [ 31.019873] kmem_cache_release+0x1c/0x30 [ 31.019986] kobject_put+0x17c/0x420 [ 31.020419] sysfs_slab_release+0x1c/0x30 [ 31.020498] kmem_cache_destroy+0x118/0x218 [ 31.020668] kmem_cache_double_destroy+0x128/0x300 [ 31.020759] kunit_try_run_case+0x170/0x3f0 [ 31.020905] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.021155] kthread+0x328/0x630 [ 31.021400] ret_from_fork+0x10/0x20 [ 31.021469] [ 31.021576] The buggy address belongs to the object at fff00000c56878c0 [ 31.021576] which belongs to the cache kmem_cache of size 208 [ 31.021681] The buggy address is located 0 bytes inside of [ 31.021681] freed 208-byte region [fff00000c56878c0, fff00000c5687990) [ 31.021812] [ 31.021953] The buggy address belongs to the physical page: [ 31.022027] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105687 [ 31.022455] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.022693] page_type: f5(slab) [ 31.022858] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000 [ 31.023095] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000 [ 31.023169] page dumped because: kasan: bad access detected [ 31.023325] [ 31.023410] Memory state around the buggy address: [ 31.023480] fff00000c5687780: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.023716] fff00000c5687800: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 31.024022] >fff00000c5687880: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 31.024151] ^ [ 31.024214] fff00000c5687900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.024387] fff00000c5687980: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.024619] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 30.921169] ================================================================== [ 30.921272] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468 [ 30.921354] Read of size 1 at addr fff00000c9b87000 by task kunit_try_catch/244 [ 30.921580] [ 30.921836] CPU: 0 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 30.922328] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.922358] Hardware name: linux,dummy-virt (DT) [ 30.922394] Call trace: [ 30.922421] show_stack+0x20/0x38 (C) [ 30.923145] dump_stack_lvl+0x8c/0xd0 [ 30.923448] print_report+0x118/0x5d0 [ 30.923509] kasan_report+0xdc/0x128 [ 30.923712] __asan_report_load1_noabort+0x20/0x30 [ 30.923853] kmem_cache_rcu_uaf+0x388/0x468 [ 30.924033] kunit_try_run_case+0x170/0x3f0 [ 30.924111] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.924425] kthread+0x328/0x630 [ 30.924501] ret_from_fork+0x10/0x20 [ 30.924714] [ 30.924828] Allocated by task 244: [ 30.925002] kasan_save_stack+0x3c/0x68 [ 30.925066] kasan_save_track+0x20/0x40 [ 30.925521] kasan_save_alloc_info+0x40/0x58 [ 30.925702] __kasan_slab_alloc+0xa8/0xb0 [ 30.925794] kmem_cache_alloc_noprof+0x10c/0x398 [ 30.925837] kmem_cache_rcu_uaf+0x12c/0x468 [ 30.925887] kunit_try_run_case+0x170/0x3f0 [ 30.925925] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.926108] kthread+0x328/0x630 [ 30.926411] ret_from_fork+0x10/0x20 [ 30.926462] [ 30.926509] Freed by task 0: [ 30.926541] kasan_save_stack+0x3c/0x68 [ 30.926579] kasan_save_track+0x20/0x40 [ 30.926839] kasan_save_free_info+0x4c/0x78 [ 30.926883] __kasan_slab_free+0x6c/0x98 [ 30.926922] slab_free_after_rcu_debug+0xd4/0x2f8 [ 30.926963] rcu_core+0x9f4/0x1e20 [ 30.927002] rcu_core_si+0x18/0x30 [ 30.927037] handle_softirqs+0x374/0xb28 [ 30.927085] __do_softirq+0x1c/0x28 [ 30.927119] [ 30.927138] Last potentially related work creation: [ 30.927165] kasan_save_stack+0x3c/0x68 [ 30.927514] kasan_record_aux_stack+0xb4/0xc8 [ 30.927619] kmem_cache_free+0x120/0x468 [ 30.927661] kmem_cache_rcu_uaf+0x16c/0x468 [ 30.927698] kunit_try_run_case+0x170/0x3f0 [ 30.928213] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.928258] kthread+0x328/0x630 [ 30.928570] ret_from_fork+0x10/0x20 [ 30.928719] [ 30.928743] The buggy address belongs to the object at fff00000c9b87000 [ 30.928743] which belongs to the cache test_cache of size 200 [ 30.928881] The buggy address is located 0 bytes inside of [ 30.928881] freed 200-byte region [fff00000c9b87000, fff00000c9b870c8) [ 30.928974] [ 30.928997] The buggy address belongs to the physical page: [ 30.929032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b87 [ 30.929345] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.929487] page_type: f5(slab) [ 30.929612] raw: 0bfffe0000000000 fff00000c5687780 dead000000000122 0000000000000000 [ 30.929707] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 30.929749] page dumped because: kasan: bad access detected [ 30.929782] [ 30.929800] Memory state around the buggy address: [ 30.929906] fff00000c9b86f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.930063] fff00000c9b86f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.930106] >fff00000c9b87000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.930192] ^ [ 30.930221] fff00000c9b87080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 30.930711] fff00000c9b87100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.930759] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 30.296035] ================================================================== [ 30.296939] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 30.297189] Free of addr fff00000c9b86001 by task kunit_try_catch/242 [ 30.297280] [ 30.297324] CPU: 0 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 30.297411] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.297437] Hardware name: linux,dummy-virt (DT) [ 30.297470] Call trace: [ 30.297494] show_stack+0x20/0x38 (C) [ 30.297572] dump_stack_lvl+0x8c/0xd0 [ 30.297630] print_report+0x118/0x5d0 [ 30.297674] kasan_report_invalid_free+0xc0/0xe8 [ 30.297721] check_slab_allocation+0xfc/0x108 [ 30.297771] __kasan_slab_pre_free+0x2c/0x48 [ 30.297819] kmem_cache_free+0xf0/0x468 [ 30.297881] kmem_cache_invalid_free+0x184/0x3c8 [ 30.298055] kunit_try_run_case+0x170/0x3f0 [ 30.298142] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.298191] kthread+0x328/0x630 [ 30.298235] ret_from_fork+0x10/0x20 [ 30.298282] [ 30.298302] Allocated by task 242: [ 30.298332] kasan_save_stack+0x3c/0x68 [ 30.298383] kasan_save_track+0x20/0x40 [ 30.298422] kasan_save_alloc_info+0x40/0x58 [ 30.298459] __kasan_slab_alloc+0xa8/0xb0 [ 30.298496] kmem_cache_alloc_noprof+0x10c/0x398 [ 30.298537] kmem_cache_invalid_free+0x12c/0x3c8 [ 30.298574] kunit_try_run_case+0x170/0x3f0 [ 30.298613] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.298653] kthread+0x328/0x630 [ 30.298709] ret_from_fork+0x10/0x20 [ 30.298745] [ 30.298763] The buggy address belongs to the object at fff00000c9b86000 [ 30.298763] which belongs to the cache test_cache of size 200 [ 30.298826] The buggy address is located 1 bytes inside of [ 30.298826] 200-byte region [fff00000c9b86000, fff00000c9b860c8) [ 30.298945] [ 30.299086] The buggy address belongs to the physical page: [ 30.299175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b86 [ 30.299255] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.299308] page_type: f5(slab) [ 30.299350] raw: 0bfffe0000000000 fff00000c5687640 dead000000000122 0000000000000000 [ 30.299413] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 30.299457] page dumped because: kasan: bad access detected [ 30.299489] [ 30.299506] Memory state around the buggy address: [ 30.299539] fff00000c9b85f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.299582] fff00000c9b85f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.299624] >fff00000c9b86000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.299661] ^ [ 30.299700] fff00000c9b86080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 30.299848] fff00000c9b86100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.299896] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 30.268041] ================================================================== [ 30.268679] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 30.268916] Free of addr fff00000c9b84000 by task kunit_try_catch/240 [ 30.269075] [ 30.269121] CPU: 0 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 30.269208] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.269235] Hardware name: linux,dummy-virt (DT) [ 30.269269] Call trace: [ 30.269295] show_stack+0x20/0x38 (C) [ 30.269384] dump_stack_lvl+0x8c/0xd0 [ 30.269435] print_report+0x118/0x5d0 [ 30.269480] kasan_report_invalid_free+0xc0/0xe8 [ 30.269526] check_slab_allocation+0xd4/0x108 [ 30.269575] __kasan_slab_pre_free+0x2c/0x48 [ 30.269630] kmem_cache_free+0xf0/0x468 [ 30.269733] kmem_cache_double_free+0x190/0x3c8 [ 30.269783] kunit_try_run_case+0x170/0x3f0 [ 30.269904] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.270025] kthread+0x328/0x630 [ 30.270181] ret_from_fork+0x10/0x20 [ 30.270231] [ 30.270259] Allocated by task 240: [ 30.270373] kasan_save_stack+0x3c/0x68 [ 30.270415] kasan_save_track+0x20/0x40 [ 30.270464] kasan_save_alloc_info+0x40/0x58 [ 30.270502] __kasan_slab_alloc+0xa8/0xb0 [ 30.270540] kmem_cache_alloc_noprof+0x10c/0x398 [ 30.270619] kmem_cache_double_free+0x12c/0x3c8 [ 30.270809] kunit_try_run_case+0x170/0x3f0 [ 30.270867] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.271011] kthread+0x328/0x630 [ 30.271044] ret_from_fork+0x10/0x20 [ 30.271132] [ 30.271151] Freed by task 240: [ 30.271238] kasan_save_stack+0x3c/0x68 [ 30.271289] kasan_save_track+0x20/0x40 [ 30.271332] kasan_save_free_info+0x4c/0x78 [ 30.271369] __kasan_slab_free+0x6c/0x98 [ 30.271407] kmem_cache_free+0x260/0x468 [ 30.271472] kmem_cache_double_free+0x140/0x3c8 [ 30.271510] kunit_try_run_case+0x170/0x3f0 [ 30.271589] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.271780] kthread+0x328/0x630 [ 30.271900] ret_from_fork+0x10/0x20 [ 30.271937] [ 30.271956] The buggy address belongs to the object at fff00000c9b84000 [ 30.271956] which belongs to the cache test_cache of size 200 [ 30.272014] The buggy address is located 0 bytes inside of [ 30.272014] 200-byte region [fff00000c9b84000, fff00000c9b840c8) [ 30.272082] [ 30.272106] The buggy address belongs to the physical page: [ 30.272138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b84 [ 30.272224] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.272276] page_type: f5(slab) [ 30.272318] raw: 0bfffe0000000000 fff00000c5687500 dead000000000122 0000000000000000 [ 30.272367] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 30.272408] page dumped because: kasan: bad access detected [ 30.272439] [ 30.272456] Memory state around the buggy address: [ 30.272489] fff00000c9b83f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.272532] fff00000c9b83f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.272574] >fff00000c9b84000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.272612] ^ [ 30.272639] fff00000c9b84080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 30.272680] fff00000c9b84100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.272716] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 30.011606] ================================================================== [ 30.011682] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430 [ 30.011933] Read of size 1 at addr fff00000c9b830c8 by task kunit_try_catch/238 [ 30.012014] [ 30.012099] CPU: 0 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 30.012210] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.012238] Hardware name: linux,dummy-virt (DT) [ 30.012318] Call trace: [ 30.012342] show_stack+0x20/0x38 (C) [ 30.012398] dump_stack_lvl+0x8c/0xd0 [ 30.012570] print_report+0x118/0x5d0 [ 30.012618] kasan_report+0xdc/0x128 [ 30.012734] __asan_report_load1_noabort+0x20/0x30 [ 30.012861] kmem_cache_oob+0x344/0x430 [ 30.012968] kunit_try_run_case+0x170/0x3f0 [ 30.013030] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.013105] kthread+0x328/0x630 [ 30.013268] ret_from_fork+0x10/0x20 [ 30.013398] [ 30.013416] Allocated by task 238: [ 30.013455] kasan_save_stack+0x3c/0x68 [ 30.013537] kasan_save_track+0x20/0x40 [ 30.013576] kasan_save_alloc_info+0x40/0x58 [ 30.013616] __kasan_slab_alloc+0xa8/0xb0 [ 30.013828] kmem_cache_alloc_noprof+0x10c/0x398 [ 30.013940] kmem_cache_oob+0x12c/0x430 [ 30.014061] kunit_try_run_case+0x170/0x3f0 [ 30.014225] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.014266] kthread+0x328/0x630 [ 30.014347] ret_from_fork+0x10/0x20 [ 30.014705] [ 30.014852] The buggy address belongs to the object at fff00000c9b83000 [ 30.014852] which belongs to the cache test_cache of size 200 [ 30.014996] The buggy address is located 0 bytes to the right of [ 30.014996] allocated 200-byte region [fff00000c9b83000, fff00000c9b830c8) [ 30.015112] [ 30.015371] The buggy address belongs to the physical page: [ 30.015492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b83 [ 30.015628] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.015714] page_type: f5(slab) [ 30.015785] raw: 0bfffe0000000000 fff00000c56873c0 dead000000000122 0000000000000000 [ 30.015985] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 30.016193] page dumped because: kasan: bad access detected [ 30.016317] [ 30.016363] Memory state around the buggy address: [ 30.016408] fff00000c9b82f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.016506] fff00000c9b83000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.016597] >fff00000c9b83080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 30.016636] ^ [ 30.016673] fff00000c9b83100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.016714] fff00000c9b83180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.016754] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 29.987224] ================================================================== [ 29.987311] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 29.987385] Read of size 8 at addr fff00000c9aded80 by task kunit_try_catch/231 [ 29.987444] [ 29.987483] CPU: 0 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.987581] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.987610] Hardware name: linux,dummy-virt (DT) [ 29.987658] Call trace: [ 29.987683] show_stack+0x20/0x38 (C) [ 29.987733] dump_stack_lvl+0x8c/0xd0 [ 29.987778] print_report+0x118/0x5d0 [ 29.987822] kasan_report+0xdc/0x128 [ 29.987864] __asan_report_load8_noabort+0x20/0x30 [ 29.987913] workqueue_uaf+0x480/0x4a8 [ 29.987960] kunit_try_run_case+0x170/0x3f0 [ 29.988016] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.988081] kthread+0x328/0x630 [ 29.988121] ret_from_fork+0x10/0x20 [ 29.988170] [ 29.988215] Allocated by task 231: [ 29.988261] kasan_save_stack+0x3c/0x68 [ 29.988402] kasan_save_track+0x20/0x40 [ 29.988649] kasan_save_alloc_info+0x40/0x58 [ 29.988734] __kasan_kmalloc+0xd4/0xd8 [ 29.988774] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.988817] workqueue_uaf+0x13c/0x4a8 [ 29.988854] kunit_try_run_case+0x170/0x3f0 [ 29.988922] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.988966] kthread+0x328/0x630 [ 29.989082] ret_from_fork+0x10/0x20 [ 29.989128] [ 29.989147] Freed by task 75: [ 29.989173] kasan_save_stack+0x3c/0x68 [ 29.989212] kasan_save_track+0x20/0x40 [ 29.989250] kasan_save_free_info+0x4c/0x78 [ 29.989288] __kasan_slab_free+0x6c/0x98 [ 29.989327] kfree+0x214/0x3c8 [ 29.989404] workqueue_uaf_work+0x18/0x30 [ 29.989535] process_one_work+0x530/0xf98 [ 29.989574] worker_thread+0x618/0xf38 [ 29.989725] kthread+0x328/0x630 [ 29.989758] ret_from_fork+0x10/0x20 [ 29.989860] [ 29.989921] Last potentially related work creation: [ 29.989964] kasan_save_stack+0x3c/0x68 [ 29.990134] kasan_record_aux_stack+0xb4/0xc8 [ 29.990222] __queue_work+0x65c/0xfe0 [ 29.990379] queue_work_on+0xbc/0xf8 [ 29.990512] workqueue_uaf+0x210/0x4a8 [ 29.990559] kunit_try_run_case+0x170/0x3f0 [ 29.990610] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.990651] kthread+0x328/0x630 [ 29.990682] ret_from_fork+0x10/0x20 [ 29.990718] [ 29.990908] The buggy address belongs to the object at fff00000c9aded80 [ 29.990908] which belongs to the cache kmalloc-32 of size 32 [ 29.991005] The buggy address is located 0 bytes inside of [ 29.991005] freed 32-byte region [fff00000c9aded80, fff00000c9adeda0) [ 29.991165] [ 29.991271] The buggy address belongs to the physical page: [ 29.991360] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ade [ 29.991429] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.991552] page_type: f5(slab) [ 29.991675] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 29.991788] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 29.991888] page dumped because: kasan: bad access detected [ 29.991939] [ 29.991956] Memory state around the buggy address: [ 29.991991] fff00000c9adec80: 00 00 03 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 29.992034] fff00000c9aded00: 00 00 00 fc fc fc fc fc 00 00 00 07 fc fc fc fc [ 29.992086] >fff00000c9aded80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 29.992324] ^ [ 29.992415] fff00000c9adee00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.992485] fff00000c9adee80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.992587] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[ 29.961458] ================================================================== [ 29.963121] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 29.963204] Read of size 4 at addr fff00000c9adebc0 by task swapper/0/0 [ 29.964358] [ 29.964418] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.964993] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.965651] Hardware name: linux,dummy-virt (DT) [ 29.965958] Call trace: [ 29.966161] show_stack+0x20/0x38 (C) [ 29.966798] dump_stack_lvl+0x8c/0xd0 [ 29.967340] print_report+0x118/0x5d0 [ 29.967734] kasan_report+0xdc/0x128 [ 29.967781] __asan_report_load4_noabort+0x20/0x30 [ 29.967829] rcu_uaf_reclaim+0x64/0x70 [ 29.968778] rcu_core+0x9f4/0x1e20 [ 29.968843] rcu_core_si+0x18/0x30 [ 29.969770] handle_softirqs+0x374/0xb28 [ 29.969826] __do_softirq+0x1c/0x28 [ 29.969871] ____do_softirq+0x18/0x30 [ 29.969917] call_on_irq_stack+0x24/0x30 [ 29.971427] do_softirq_own_stack+0x24/0x38 [ 29.971491] __irq_exit_rcu+0x1fc/0x318 [ 29.971539] irq_exit_rcu+0x1c/0x80 [ 29.971584] el1_interrupt+0x38/0x58 [ 29.971636] el1h_64_irq_handler+0x18/0x28 [ 29.971684] el1h_64_irq+0x6c/0x70 [ 29.971811] arch_local_irq_enable+0x4/0x8 (P) [ 29.971864] do_idle+0x384/0x4e8 [ 29.971908] cpu_startup_entry+0x68/0x80 [ 29.971951] rest_init+0x160/0x188 [ 29.971997] start_kernel+0x30c/0x3d0 [ 29.972064] __primary_switched+0x8c/0xa0 [ 29.972393] [ 29.972430] Allocated by task 229: [ 29.972463] kasan_save_stack+0x3c/0x68 [ 29.972510] kasan_save_track+0x20/0x40 [ 29.972716] kasan_save_alloc_info+0x40/0x58 [ 29.972762] __kasan_kmalloc+0xd4/0xd8 [ 29.972917] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.973112] rcu_uaf+0xb0/0x2d8 [ 29.973211] kunit_try_run_case+0x170/0x3f0 [ 29.973353] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.973397] kthread+0x328/0x630 [ 29.973564] ret_from_fork+0x10/0x20 [ 29.973761] [ 29.973831] Freed by task 0: [ 29.973877] kasan_save_stack+0x3c/0x68 [ 29.974028] kasan_save_track+0x20/0x40 [ 29.974094] kasan_save_free_info+0x4c/0x78 [ 29.974135] __kasan_slab_free+0x6c/0x98 [ 29.974176] kfree+0x214/0x3c8 [ 29.974210] rcu_uaf_reclaim+0x28/0x70 [ 29.974246] rcu_core+0x9f4/0x1e20 [ 29.974306] rcu_core_si+0x18/0x30 [ 29.974415] handle_softirqs+0x374/0xb28 [ 29.974516] __do_softirq+0x1c/0x28 [ 29.974579] [ 29.974616] Last potentially related work creation: [ 29.974694] kasan_save_stack+0x3c/0x68 [ 29.974791] kasan_record_aux_stack+0xb4/0xc8 [ 29.974830] __call_rcu_common.constprop.0+0x74/0x8c8 [ 29.974907] call_rcu+0x18/0x30 [ 29.974967] rcu_uaf+0x14c/0x2d8 [ 29.975003] kunit_try_run_case+0x170/0x3f0 [ 29.975095] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.975141] kthread+0x328/0x630 [ 29.975187] ret_from_fork+0x10/0x20 [ 29.975231] [ 29.975260] The buggy address belongs to the object at fff00000c9adebc0 [ 29.975260] which belongs to the cache kmalloc-32 of size 32 [ 29.975339] The buggy address is located 0 bytes inside of [ 29.975339] freed 32-byte region [fff00000c9adebc0, fff00000c9adebe0) [ 29.975419] [ 29.975443] The buggy address belongs to the physical page: [ 29.975495] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ade [ 29.975572] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.975629] page_type: f5(slab) [ 29.975674] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 29.975731] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 29.975778] page dumped because: kasan: bad access detected [ 29.975815] [ 29.975833] Memory state around the buggy address: [ 29.975882] fff00000c9adea80: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 29.975942] fff00000c9adeb00: 00 00 05 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 29.976002] >fff00000c9adeb80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 29.976060] ^ [ 29.976100] fff00000c9adec00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.976150] fff00000c9adec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.976196] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 29.864269] ================================================================== [ 29.864325] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 29.864420] Read of size 1 at addr fff00000c636af78 by task kunit_try_catch/227 [ 29.864473] [ 29.864506] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.864590] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.864617] Hardware name: linux,dummy-virt (DT) [ 29.864648] Call trace: [ 29.864669] show_stack+0x20/0x38 (C) [ 29.864971] dump_stack_lvl+0x8c/0xd0 [ 29.865076] print_report+0x118/0x5d0 [ 29.865621] kasan_report+0xdc/0x128 [ 29.865746] __asan_report_load1_noabort+0x20/0x30 [ 29.865847] ksize_uaf+0x544/0x5f8 [ 29.865890] kunit_try_run_case+0x170/0x3f0 [ 29.865938] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.866204] kthread+0x328/0x630 [ 29.866396] ret_from_fork+0x10/0x20 [ 29.866463] [ 29.866483] Allocated by task 227: [ 29.866592] kasan_save_stack+0x3c/0x68 [ 29.866654] kasan_save_track+0x20/0x40 [ 29.867068] kasan_save_alloc_info+0x40/0x58 [ 29.867236] __kasan_kmalloc+0xd4/0xd8 [ 29.867277] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.867320] ksize_uaf+0xb8/0x5f8 [ 29.867394] kunit_try_run_case+0x170/0x3f0 [ 29.867451] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.867557] kthread+0x328/0x630 [ 29.867590] ret_from_fork+0x10/0x20 [ 29.867627] [ 29.867646] Freed by task 227: [ 29.867674] kasan_save_stack+0x3c/0x68 [ 29.867713] kasan_save_track+0x20/0x40 [ 29.867887] kasan_save_free_info+0x4c/0x78 [ 29.867937] __kasan_slab_free+0x6c/0x98 [ 29.867979] kfree+0x214/0x3c8 [ 29.868013] ksize_uaf+0x11c/0x5f8 [ 29.868059] kunit_try_run_case+0x170/0x3f0 [ 29.868098] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.868140] kthread+0x328/0x630 [ 29.868179] ret_from_fork+0x10/0x20 [ 29.868680] [ 29.868704] The buggy address belongs to the object at fff00000c636af00 [ 29.868704] which belongs to the cache kmalloc-128 of size 128 [ 29.868834] The buggy address is located 120 bytes inside of [ 29.868834] freed 128-byte region [fff00000c636af00, fff00000c636af80) [ 29.869111] [ 29.869198] The buggy address belongs to the physical page: [ 29.869236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10636a [ 29.869380] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.869466] page_type: f5(slab) [ 29.869546] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.869650] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.869744] page dumped because: kasan: bad access detected [ 29.869862] [ 29.869927] Memory state around the buggy address: [ 29.869968] fff00000c636ae00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.870069] fff00000c636ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.870111] >fff00000c636af00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.870148] ^ [ 29.870349] fff00000c636af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.870549] fff00000c636b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.870652] ================================================================== [ 29.847653] ================================================================== [ 29.847730] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 29.848058] Read of size 1 at addr fff00000c636af00 by task kunit_try_catch/227 [ 29.848126] [ 29.848749] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.848849] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.848948] Hardware name: linux,dummy-virt (DT) [ 29.848985] Call trace: [ 29.849254] show_stack+0x20/0x38 (C) [ 29.849460] dump_stack_lvl+0x8c/0xd0 [ 29.849522] print_report+0x118/0x5d0 [ 29.849566] kasan_report+0xdc/0x128 [ 29.849624] __kasan_check_byte+0x54/0x70 [ 29.849670] ksize+0x30/0x88 [ 29.850134] ksize_uaf+0x168/0x5f8 [ 29.850298] kunit_try_run_case+0x170/0x3f0 [ 29.850348] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.850399] kthread+0x328/0x630 [ 29.850443] ret_from_fork+0x10/0x20 [ 29.850502] [ 29.850521] Allocated by task 227: [ 29.850552] kasan_save_stack+0x3c/0x68 [ 29.850836] kasan_save_track+0x20/0x40 [ 29.851307] kasan_save_alloc_info+0x40/0x58 [ 29.851483] __kasan_kmalloc+0xd4/0xd8 [ 29.851524] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.851605] ksize_uaf+0xb8/0x5f8 [ 29.851774] kunit_try_run_case+0x170/0x3f0 [ 29.851866] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.851982] kthread+0x328/0x630 [ 29.852018] ret_from_fork+0x10/0x20 [ 29.852065] [ 29.852084] Freed by task 227: [ 29.852112] kasan_save_stack+0x3c/0x68 [ 29.852150] kasan_save_track+0x20/0x40 [ 29.852383] kasan_save_free_info+0x4c/0x78 [ 29.852423] __kasan_slab_free+0x6c/0x98 [ 29.852722] kfree+0x214/0x3c8 [ 29.852807] ksize_uaf+0x11c/0x5f8 [ 29.852871] kunit_try_run_case+0x170/0x3f0 [ 29.852913] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.852996] kthread+0x328/0x630 [ 29.853035] ret_from_fork+0x10/0x20 [ 29.853194] [ 29.853217] The buggy address belongs to the object at fff00000c636af00 [ 29.853217] which belongs to the cache kmalloc-128 of size 128 [ 29.853300] The buggy address is located 0 bytes inside of [ 29.853300] freed 128-byte region [fff00000c636af00, fff00000c636af80) [ 29.853694] [ 29.853723] The buggy address belongs to the physical page: [ 29.853813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10636a [ 29.853944] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.854079] page_type: f5(slab) [ 29.854125] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.854215] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.854256] page dumped because: kasan: bad access detected [ 29.854287] [ 29.854307] Memory state around the buggy address: [ 29.854499] fff00000c636ae00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.854690] fff00000c636ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.854735] >fff00000c636af00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.854930] ^ [ 29.855079] fff00000c636af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.855179] fff00000c636b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.855218] ================================================================== [ 29.856553] ================================================================== [ 29.856612] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 29.856668] Read of size 1 at addr fff00000c636af00 by task kunit_try_catch/227 [ 29.856822] [ 29.856859] CPU: 0 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.856951] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.857090] Hardware name: linux,dummy-virt (DT) [ 29.857190] Call trace: [ 29.857212] show_stack+0x20/0x38 (C) [ 29.857438] dump_stack_lvl+0x8c/0xd0 [ 29.857485] print_report+0x118/0x5d0 [ 29.857529] kasan_report+0xdc/0x128 [ 29.857577] __asan_report_load1_noabort+0x20/0x30 [ 29.857801] ksize_uaf+0x598/0x5f8 [ 29.857851] kunit_try_run_case+0x170/0x3f0 [ 29.857988] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.858036] kthread+0x328/0x630 [ 29.858087] ret_from_fork+0x10/0x20 [ 29.858135] [ 29.858152] Allocated by task 227: [ 29.858222] kasan_save_stack+0x3c/0x68 [ 29.858265] kasan_save_track+0x20/0x40 [ 29.858462] kasan_save_alloc_info+0x40/0x58 [ 29.858780] __kasan_kmalloc+0xd4/0xd8 [ 29.858961] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.859200] ksize_uaf+0xb8/0x5f8 [ 29.859323] kunit_try_run_case+0x170/0x3f0 [ 29.859417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.859459] kthread+0x328/0x630 [ 29.859493] ret_from_fork+0x10/0x20 [ 29.859530] [ 29.859551] Freed by task 227: [ 29.859578] kasan_save_stack+0x3c/0x68 [ 29.859688] kasan_save_track+0x20/0x40 [ 29.859736] kasan_save_free_info+0x4c/0x78 [ 29.859813] __kasan_slab_free+0x6c/0x98 [ 29.859850] kfree+0x214/0x3c8 [ 29.859885] ksize_uaf+0x11c/0x5f8 [ 29.860336] kunit_try_run_case+0x170/0x3f0 [ 29.860379] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.860422] kthread+0x328/0x630 [ 29.860457] ret_from_fork+0x10/0x20 [ 29.860494] [ 29.860516] The buggy address belongs to the object at fff00000c636af00 [ 29.860516] which belongs to the cache kmalloc-128 of size 128 [ 29.860602] The buggy address is located 0 bytes inside of [ 29.860602] freed 128-byte region [fff00000c636af00, fff00000c636af80) [ 29.860904] [ 29.860952] The buggy address belongs to the physical page: [ 29.860993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10636a [ 29.861067] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.861117] page_type: f5(slab) [ 29.861554] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.861655] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.861695] page dumped because: kasan: bad access detected [ 29.861725] [ 29.861745] Memory state around the buggy address: [ 29.861788] fff00000c636ae00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.861830] fff00000c636ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.862023] >fff00000c636af00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.862461] ^ [ 29.862541] fff00000c636af80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.862607] fff00000c636b000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.862645] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 29.830432] ================================================================== [ 29.830480] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 29.830526] Read of size 1 at addr fff00000c636ae7f by task kunit_try_catch/225 [ 29.830588] [ 29.830619] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.831311] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.831367] Hardware name: linux,dummy-virt (DT) [ 29.831399] Call trace: [ 29.831421] show_stack+0x20/0x38 (C) [ 29.831472] dump_stack_lvl+0x8c/0xd0 [ 29.831523] print_report+0x118/0x5d0 [ 29.831724] kasan_report+0xdc/0x128 [ 29.831850] __asan_report_load1_noabort+0x20/0x30 [ 29.832019] ksize_unpoisons_memory+0x690/0x740 [ 29.832561] kunit_try_run_case+0x170/0x3f0 [ 29.832938] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.833354] kthread+0x328/0x630 [ 29.833498] ret_from_fork+0x10/0x20 [ 29.833625] [ 29.833644] Allocated by task 225: [ 29.834078] kasan_save_stack+0x3c/0x68 [ 29.834181] kasan_save_track+0x20/0x40 [ 29.834284] kasan_save_alloc_info+0x40/0x58 [ 29.834320] __kasan_kmalloc+0xd4/0xd8 [ 29.834358] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.834412] ksize_unpoisons_memory+0xc0/0x740 [ 29.834452] kunit_try_run_case+0x170/0x3f0 [ 29.834490] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.834531] kthread+0x328/0x630 [ 29.834564] ret_from_fork+0x10/0x20 [ 29.834599] [ 29.834620] The buggy address belongs to the object at fff00000c636ae00 [ 29.834620] which belongs to the cache kmalloc-128 of size 128 [ 29.834677] The buggy address is located 12 bytes to the right of [ 29.834677] allocated 115-byte region [fff00000c636ae00, fff00000c636ae73) [ 29.834741] [ 29.834761] The buggy address belongs to the physical page: [ 29.834791] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10636a [ 29.834857] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.834907] page_type: f5(slab) [ 29.835083] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.835139] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.835180] page dumped because: kasan: bad access detected [ 29.835693] [ 29.836030] Memory state around the buggy address: [ 29.836081] fff00000c636ad00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.836132] fff00000c636ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.836557] >fff00000c636ae00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.836639] ^ [ 29.836686] fff00000c636ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.837022] fff00000c636af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.837128] ================================================================== [ 29.825153] ================================================================== [ 29.825208] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 29.825261] Read of size 1 at addr fff00000c636ae78 by task kunit_try_catch/225 [ 29.825311] [ 29.825344] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.825429] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.825455] Hardware name: linux,dummy-virt (DT) [ 29.825488] Call trace: [ 29.825510] show_stack+0x20/0x38 (C) [ 29.825558] dump_stack_lvl+0x8c/0xd0 [ 29.825777] print_report+0x118/0x5d0 [ 29.826100] kasan_report+0xdc/0x128 [ 29.826155] __asan_report_load1_noabort+0x20/0x30 [ 29.826442] ksize_unpoisons_memory+0x618/0x740 [ 29.826712] kunit_try_run_case+0x170/0x3f0 [ 29.826789] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.826969] kthread+0x328/0x630 [ 29.827013] ret_from_fork+0x10/0x20 [ 29.827074] [ 29.827093] Allocated by task 225: [ 29.827344] kasan_save_stack+0x3c/0x68 [ 29.827416] kasan_save_track+0x20/0x40 [ 29.827588] kasan_save_alloc_info+0x40/0x58 [ 29.827663] __kasan_kmalloc+0xd4/0xd8 [ 29.827719] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.827835] ksize_unpoisons_memory+0xc0/0x740 [ 29.827877] kunit_try_run_case+0x170/0x3f0 [ 29.827923] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.828125] kthread+0x328/0x630 [ 29.828158] ret_from_fork+0x10/0x20 [ 29.828263] [ 29.828282] The buggy address belongs to the object at fff00000c636ae00 [ 29.828282] which belongs to the cache kmalloc-128 of size 128 [ 29.828550] The buggy address is located 5 bytes to the right of [ 29.828550] allocated 115-byte region [fff00000c636ae00, fff00000c636ae73) [ 29.828653] [ 29.828718] The buggy address belongs to the physical page: [ 29.828751] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10636a [ 29.829023] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.829133] page_type: f5(slab) [ 29.829174] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.829292] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.829335] page dumped because: kasan: bad access detected [ 29.829366] [ 29.829385] Memory state around the buggy address: [ 29.829418] fff00000c636ad00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.829468] fff00000c636ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.829554] >fff00000c636ae00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.829615] ^ [ 29.829659] fff00000c636ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.829702] fff00000c636af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.829741] ================================================================== [ 29.818663] ================================================================== [ 29.819132] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 29.819343] Read of size 1 at addr fff00000c636ae73 by task kunit_try_catch/225 [ 29.819396] [ 29.819436] CPU: 0 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.819524] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.819563] Hardware name: linux,dummy-virt (DT) [ 29.819596] Call trace: [ 29.819620] show_stack+0x20/0x38 (C) [ 29.819941] dump_stack_lvl+0x8c/0xd0 [ 29.820290] print_report+0x118/0x5d0 [ 29.820348] kasan_report+0xdc/0x128 [ 29.820417] __asan_report_load1_noabort+0x20/0x30 [ 29.820555] ksize_unpoisons_memory+0x628/0x740 [ 29.820760] kunit_try_run_case+0x170/0x3f0 [ 29.820810] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.820867] kthread+0x328/0x630 [ 29.821073] ret_from_fork+0x10/0x20 [ 29.821170] [ 29.821227] Allocated by task 225: [ 29.821270] kasan_save_stack+0x3c/0x68 [ 29.821388] kasan_save_track+0x20/0x40 [ 29.821512] kasan_save_alloc_info+0x40/0x58 [ 29.821608] __kasan_kmalloc+0xd4/0xd8 [ 29.821663] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.821710] ksize_unpoisons_memory+0xc0/0x740 [ 29.821749] kunit_try_run_case+0x170/0x3f0 [ 29.821892] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.821933] kthread+0x328/0x630 [ 29.821965] ret_from_fork+0x10/0x20 [ 29.822046] [ 29.822074] The buggy address belongs to the object at fff00000c636ae00 [ 29.822074] which belongs to the cache kmalloc-128 of size 128 [ 29.822131] The buggy address is located 0 bytes to the right of [ 29.822131] allocated 115-byte region [fff00000c636ae00, fff00000c636ae73) [ 29.822194] [ 29.822215] The buggy address belongs to the physical page: [ 29.822245] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10636a [ 29.822634] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.822688] page_type: f5(slab) [ 29.823109] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.823200] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.823344] page dumped because: kasan: bad access detected [ 29.823376] [ 29.823394] Memory state around the buggy address: [ 29.823429] fff00000c636ad00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.823683] fff00000c636ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.823735] >fff00000c636ae00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.823776] ^ [ 29.824062] fff00000c636ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.824121] fff00000c636af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.824161] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive
[ 29.799630] ================================================================== [ 29.799834] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 29.799927] Free of addr fff00000c64c1b20 by task kunit_try_catch/223 [ 29.800078] [ 29.800146] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.800382] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.800410] Hardware name: linux,dummy-virt (DT) [ 29.800442] Call trace: [ 29.800525] show_stack+0x20/0x38 (C) [ 29.800579] dump_stack_lvl+0x8c/0xd0 [ 29.800916] print_report+0x118/0x5d0 [ 29.800980] kasan_report_invalid_free+0xc0/0xe8 [ 29.801029] check_slab_allocation+0xd4/0x108 [ 29.801091] __kasan_slab_pre_free+0x2c/0x48 [ 29.801179] kfree+0xe8/0x3c8 [ 29.801383] kfree_sensitive+0x3c/0xb0 [ 29.801499] kmalloc_double_kzfree+0x168/0x308 [ 29.801660] kunit_try_run_case+0x170/0x3f0 [ 29.801707] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.801757] kthread+0x328/0x630 [ 29.801805] ret_from_fork+0x10/0x20 [ 29.801883] [ 29.801939] Allocated by task 223: [ 29.801975] kasan_save_stack+0x3c/0x68 [ 29.802163] kasan_save_track+0x20/0x40 [ 29.802206] kasan_save_alloc_info+0x40/0x58 [ 29.802244] __kasan_kmalloc+0xd4/0xd8 [ 29.802282] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.802359] kmalloc_double_kzfree+0xb8/0x308 [ 29.802543] kunit_try_run_case+0x170/0x3f0 [ 29.802689] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.802738] kthread+0x328/0x630 [ 29.802866] ret_from_fork+0x10/0x20 [ 29.802904] [ 29.802922] Freed by task 223: [ 29.802981] kasan_save_stack+0x3c/0x68 [ 29.803020] kasan_save_track+0x20/0x40 [ 29.803492] kasan_save_free_info+0x4c/0x78 [ 29.803936] __kasan_slab_free+0x6c/0x98 [ 29.804125] kfree+0x214/0x3c8 [ 29.804302] kfree_sensitive+0x80/0xb0 [ 29.804446] kmalloc_double_kzfree+0x11c/0x308 [ 29.804617] kunit_try_run_case+0x170/0x3f0 [ 29.804658] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.804699] kthread+0x328/0x630 [ 29.804731] ret_from_fork+0x10/0x20 [ 29.804823] [ 29.805130] The buggy address belongs to the object at fff00000c64c1b20 [ 29.805130] which belongs to the cache kmalloc-16 of size 16 [ 29.805226] The buggy address is located 0 bytes inside of [ 29.805226] 16-byte region [fff00000c64c1b20, fff00000c64c1b30) [ 29.805285] [ 29.805315] The buggy address belongs to the physical page: [ 29.805349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c64c1a40 pfn:0x1064c1 [ 29.805561] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.805841] page_type: f5(slab) [ 29.806198] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 29.806273] raw: fff00000c64c1a40 000000008080007f 00000000f5000000 0000000000000000 [ 29.806360] page dumped because: kasan: bad access detected [ 29.806393] [ 29.806411] Memory state around the buggy address: [ 29.806445] fff00000c64c1a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.806643] fff00000c64c1a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.806719] >fff00000c64c1b00: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 29.806914] ^ [ 29.806950] fff00000c64c1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.806992] fff00000c64c1c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.807225] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[ 29.790826] ================================================================== [ 29.791097] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 29.791218] Read of size 1 at addr fff00000c64c1b20 by task kunit_try_catch/223 [ 29.791411] [ 29.791594] CPU: 0 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.791864] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.791964] Hardware name: linux,dummy-virt (DT) [ 29.792057] Call trace: [ 29.792090] show_stack+0x20/0x38 (C) [ 29.792230] dump_stack_lvl+0x8c/0xd0 [ 29.792278] print_report+0x118/0x5d0 [ 29.792948] kasan_report+0xdc/0x128 [ 29.793012] __kasan_check_byte+0x54/0x70 [ 29.793093] kfree_sensitive+0x30/0xb0 [ 29.793144] kmalloc_double_kzfree+0x168/0x308 [ 29.793193] kunit_try_run_case+0x170/0x3f0 [ 29.793241] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.793475] kthread+0x328/0x630 [ 29.793520] ret_from_fork+0x10/0x20 [ 29.793576] [ 29.793601] Allocated by task 223: [ 29.793692] kasan_save_stack+0x3c/0x68 [ 29.793903] kasan_save_track+0x20/0x40 [ 29.794125] kasan_save_alloc_info+0x40/0x58 [ 29.794173] __kasan_kmalloc+0xd4/0xd8 [ 29.794212] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.794338] kmalloc_double_kzfree+0xb8/0x308 [ 29.794380] kunit_try_run_case+0x170/0x3f0 [ 29.794626] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.794749] kthread+0x328/0x630 [ 29.794824] ret_from_fork+0x10/0x20 [ 29.794905] [ 29.795017] Freed by task 223: [ 29.795109] kasan_save_stack+0x3c/0x68 [ 29.795151] kasan_save_track+0x20/0x40 [ 29.795189] kasan_save_free_info+0x4c/0x78 [ 29.795226] __kasan_slab_free+0x6c/0x98 [ 29.795278] kfree+0x214/0x3c8 [ 29.795314] kfree_sensitive+0x80/0xb0 [ 29.795498] kmalloc_double_kzfree+0x11c/0x308 [ 29.795539] kunit_try_run_case+0x170/0x3f0 [ 29.795628] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.795674] kthread+0x328/0x630 [ 29.795727] ret_from_fork+0x10/0x20 [ 29.795907] [ 29.795969] The buggy address belongs to the object at fff00000c64c1b20 [ 29.795969] which belongs to the cache kmalloc-16 of size 16 [ 29.796028] The buggy address is located 0 bytes inside of [ 29.796028] freed 16-byte region [fff00000c64c1b20, fff00000c64c1b30) [ 29.796380] [ 29.796408] The buggy address belongs to the physical page: [ 29.796441] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c64c1a40 pfn:0x1064c1 [ 29.796968] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.797035] page_type: f5(slab) [ 29.797089] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 29.797140] raw: fff00000c64c1a40 000000008080007f 00000000f5000000 0000000000000000 [ 29.797181] page dumped because: kasan: bad access detected [ 29.797213] [ 29.797230] Memory state around the buggy address: [ 29.797444] fff00000c64c1a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.797512] fff00000c64c1a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.797760] >fff00000c64c1b00: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 29.797800] ^ [ 29.797833] fff00000c64c1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.798165] fff00000c64c1c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.798209] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[ 29.766658] ================================================================== [ 29.766766] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 29.766833] Read of size 1 at addr fff00000c9adf1a8 by task kunit_try_catch/219 [ 29.767106] [ 29.767192] CPU: 0 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.767346] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.767375] Hardware name: linux,dummy-virt (DT) [ 29.767407] Call trace: [ 29.767438] show_stack+0x20/0x38 (C) [ 29.767533] dump_stack_lvl+0x8c/0xd0 [ 29.767766] print_report+0x118/0x5d0 [ 29.767813] kasan_report+0xdc/0x128 [ 29.767856] __asan_report_load1_noabort+0x20/0x30 [ 29.767905] kmalloc_uaf2+0x3f4/0x468 [ 29.767948] kunit_try_run_case+0x170/0x3f0 [ 29.767998] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.768058] kthread+0x328/0x630 [ 29.768100] ret_from_fork+0x10/0x20 [ 29.768149] [ 29.768216] Allocated by task 219: [ 29.768247] kasan_save_stack+0x3c/0x68 [ 29.768399] kasan_save_track+0x20/0x40 [ 29.768747] kasan_save_alloc_info+0x40/0x58 [ 29.768943] __kasan_kmalloc+0xd4/0xd8 [ 29.768986] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.769028] kmalloc_uaf2+0xc4/0x468 [ 29.769099] kunit_try_run_case+0x170/0x3f0 [ 29.769166] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.769207] kthread+0x328/0x630 [ 29.769239] ret_from_fork+0x10/0x20 [ 29.769277] [ 29.769296] Freed by task 219: [ 29.769323] kasan_save_stack+0x3c/0x68 [ 29.769769] kasan_save_track+0x20/0x40 [ 29.769845] kasan_save_free_info+0x4c/0x78 [ 29.769883] __kasan_slab_free+0x6c/0x98 [ 29.769925] kfree+0x214/0x3c8 [ 29.769959] kmalloc_uaf2+0x134/0x468 [ 29.769995] kunit_try_run_case+0x170/0x3f0 [ 29.770168] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.770210] kthread+0x328/0x630 [ 29.770242] ret_from_fork+0x10/0x20 [ 29.770279] [ 29.770299] The buggy address belongs to the object at fff00000c9adf180 [ 29.770299] which belongs to the cache kmalloc-64 of size 64 [ 29.770359] The buggy address is located 40 bytes inside of [ 29.770359] freed 64-byte region [fff00000c9adf180, fff00000c9adf1c0) [ 29.770420] [ 29.770501] The buggy address belongs to the physical page: [ 29.770539] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109adf [ 29.770870] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.770968] page_type: f5(slab) [ 29.771033] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.771094] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.771135] page dumped because: kasan: bad access detected [ 29.771378] [ 29.771451] Memory state around the buggy address: [ 29.771484] fff00000c9adf080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.771539] fff00000c9adf100: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 29.771699] >fff00000c9adf180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.771738] ^ [ 29.771772] fff00000c9adf200: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 29.771964] fff00000c9adf280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.772066] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 29.749763] ================================================================== [ 29.749847] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 29.750031] Write of size 33 at addr fff00000c9adf000 by task kunit_try_catch/217 [ 29.750115] [ 29.750198] CPU: 0 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.750338] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.750366] Hardware name: linux,dummy-virt (DT) [ 29.750463] Call trace: [ 29.750541] show_stack+0x20/0x38 (C) [ 29.750619] dump_stack_lvl+0x8c/0xd0 [ 29.750668] print_report+0x118/0x5d0 [ 29.750818] kasan_report+0xdc/0x128 [ 29.750864] kasan_check_range+0x100/0x1a8 [ 29.750909] __asan_memset+0x34/0x78 [ 29.750953] kmalloc_uaf_memset+0x170/0x310 [ 29.750998] kunit_try_run_case+0x170/0x3f0 [ 29.751067] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.751119] kthread+0x328/0x630 [ 29.751612] ret_from_fork+0x10/0x20 [ 29.751712] [ 29.751776] Allocated by task 217: [ 29.751804] kasan_save_stack+0x3c/0x68 [ 29.751900] kasan_save_track+0x20/0x40 [ 29.751939] kasan_save_alloc_info+0x40/0x58 [ 29.751975] __kasan_kmalloc+0xd4/0xd8 [ 29.752013] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.752310] kmalloc_uaf_memset+0xb8/0x310 [ 29.752557] kunit_try_run_case+0x170/0x3f0 [ 29.752630] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.752672] kthread+0x328/0x630 [ 29.752996] ret_from_fork+0x10/0x20 [ 29.753244] [ 29.753264] Freed by task 217: [ 29.753312] kasan_save_stack+0x3c/0x68 [ 29.753354] kasan_save_track+0x20/0x40 [ 29.753419] kasan_save_free_info+0x4c/0x78 [ 29.753456] __kasan_slab_free+0x6c/0x98 [ 29.753567] kfree+0x214/0x3c8 [ 29.753617] kmalloc_uaf_memset+0x11c/0x310 [ 29.753655] kunit_try_run_case+0x170/0x3f0 [ 29.753694] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.753734] kthread+0x328/0x630 [ 29.753767] ret_from_fork+0x10/0x20 [ 29.753855] [ 29.753876] The buggy address belongs to the object at fff00000c9adf000 [ 29.753876] which belongs to the cache kmalloc-64 of size 64 [ 29.753934] The buggy address is located 0 bytes inside of [ 29.753934] freed 64-byte region [fff00000c9adf000, fff00000c9adf040) [ 29.754025] [ 29.754056] The buggy address belongs to the physical page: [ 29.754089] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109adf [ 29.754145] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.754199] page_type: f5(slab) [ 29.754240] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.754290] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.754330] page dumped because: kasan: bad access detected [ 29.754361] [ 29.754378] Memory state around the buggy address: [ 29.754410] fff00000c9adef00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.755383] fff00000c9adef80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.755431] >fff00000c9adf000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.755516] ^ [ 29.755658] fff00000c9adf080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.755746] fff00000c9adf100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.755810] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[ 29.735339] ================================================================== [ 29.735822] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 29.736073] Read of size 1 at addr fff00000c64c1b08 by task kunit_try_catch/215 [ 29.736126] [ 29.736163] CPU: 0 UID: 0 PID: 215 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.736289] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.736314] Hardware name: linux,dummy-virt (DT) [ 29.736347] Call trace: [ 29.736371] show_stack+0x20/0x38 (C) [ 29.736420] dump_stack_lvl+0x8c/0xd0 [ 29.736467] print_report+0x118/0x5d0 [ 29.736508] kasan_report+0xdc/0x128 [ 29.736777] __asan_report_load1_noabort+0x20/0x30 [ 29.736835] kmalloc_uaf+0x300/0x338 [ 29.737037] kunit_try_run_case+0x170/0x3f0 [ 29.737226] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.737280] kthread+0x328/0x630 [ 29.737321] ret_from_fork+0x10/0x20 [ 29.737397] [ 29.737416] Allocated by task 215: [ 29.737451] kasan_save_stack+0x3c/0x68 [ 29.737495] kasan_save_track+0x20/0x40 [ 29.737550] kasan_save_alloc_info+0x40/0x58 [ 29.737593] __kasan_kmalloc+0xd4/0xd8 [ 29.737831] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.738031] kmalloc_uaf+0xb8/0x338 [ 29.738082] kunit_try_run_case+0x170/0x3f0 [ 29.738160] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.738213] kthread+0x328/0x630 [ 29.738287] ret_from_fork+0x10/0x20 [ 29.738460] [ 29.738481] Freed by task 215: [ 29.738507] kasan_save_stack+0x3c/0x68 [ 29.738663] kasan_save_track+0x20/0x40 [ 29.738776] kasan_save_free_info+0x4c/0x78 [ 29.738814] __kasan_slab_free+0x6c/0x98 [ 29.739177] kfree+0x214/0x3c8 [ 29.739231] kmalloc_uaf+0x11c/0x338 [ 29.739268] kunit_try_run_case+0x170/0x3f0 [ 29.739347] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.739530] kthread+0x328/0x630 [ 29.739695] ret_from_fork+0x10/0x20 [ 29.739733] [ 29.739788] The buggy address belongs to the object at fff00000c64c1b00 [ 29.739788] which belongs to the cache kmalloc-16 of size 16 [ 29.739846] The buggy address is located 8 bytes inside of [ 29.739846] freed 16-byte region [fff00000c64c1b00, fff00000c64c1b10) [ 29.739927] [ 29.740034] The buggy address belongs to the physical page: [ 29.740371] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c64c1a40 pfn:0x1064c1 [ 29.740543] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.740597] page_type: f5(slab) [ 29.740639] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 29.740801] raw: fff00000c64c1a40 000000008080007f 00000000f5000000 0000000000000000 [ 29.740845] page dumped because: kasan: bad access detected [ 29.740933] [ 29.741016] Memory state around the buggy address: [ 29.741132] fff00000c64c1a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.741177] fff00000c64c1a80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.741219] >fff00000c64c1b00: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.741312] ^ [ 29.741383] fff00000c64c1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.741453] fff00000c64c1c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.741496] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 29.719963] ================================================================== [ 29.720355] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0 [ 29.720473] Read of size 64 at addr fff00000c9ad9d04 by task kunit_try_catch/213 [ 29.720525] [ 29.720565] CPU: 0 UID: 0 PID: 213 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.720652] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.720679] Hardware name: linux,dummy-virt (DT) [ 29.720924] Call trace: [ 29.721044] show_stack+0x20/0x38 (C) [ 29.721206] dump_stack_lvl+0x8c/0xd0 [ 29.721254] print_report+0x118/0x5d0 [ 29.721298] kasan_report+0xdc/0x128 [ 29.721341] kasan_check_range+0x100/0x1a8 [ 29.721652] __asan_memmove+0x3c/0x98 [ 29.721714] kmalloc_memmove_invalid_size+0x154/0x2e0 [ 29.721773] kunit_try_run_case+0x170/0x3f0 [ 29.722005] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.722207] kthread+0x328/0x630 [ 29.722352] ret_from_fork+0x10/0x20 [ 29.722730] [ 29.722818] Allocated by task 213: [ 29.722893] kasan_save_stack+0x3c/0x68 [ 29.722955] kasan_save_track+0x20/0x40 [ 29.722995] kasan_save_alloc_info+0x40/0x58 [ 29.723042] __kasan_kmalloc+0xd4/0xd8 [ 29.723091] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.723212] kmalloc_memmove_invalid_size+0xb0/0x2e0 [ 29.723539] kunit_try_run_case+0x170/0x3f0 [ 29.723586] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.723864] kthread+0x328/0x630 [ 29.724014] ret_from_fork+0x10/0x20 [ 29.724113] [ 29.724135] The buggy address belongs to the object at fff00000c9ad9d00 [ 29.724135] which belongs to the cache kmalloc-64 of size 64 [ 29.724194] The buggy address is located 4 bytes inside of [ 29.724194] allocated 64-byte region [fff00000c9ad9d00, fff00000c9ad9d40) [ 29.724265] [ 29.724287] The buggy address belongs to the physical page: [ 29.724319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ad9 [ 29.724717] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.724918] page_type: f5(slab) [ 29.724973] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.725023] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.725265] page dumped because: kasan: bad access detected [ 29.725303] [ 29.725555] Memory state around the buggy address: [ 29.725597] fff00000c9ad9c00: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc [ 29.725653] fff00000c9ad9c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.725697] >fff00000c9ad9d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 29.725735] ^ [ 29.725805] fff00000c9ad9d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.725937] fff00000c9ad9e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.726181] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 29.702527] ================================================================== [ 29.702754] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 29.703023] Read of size 18446744073709551614 at addr fff00000c9ad9b04 by task kunit_try_catch/211 [ 29.703335] [ 29.703398] CPU: 0 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.703496] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.703523] Hardware name: linux,dummy-virt (DT) [ 29.703646] Call trace: [ 29.703822] show_stack+0x20/0x38 (C) [ 29.704068] dump_stack_lvl+0x8c/0xd0 [ 29.704167] print_report+0x118/0x5d0 [ 29.704274] kasan_report+0xdc/0x128 [ 29.704330] kasan_check_range+0x100/0x1a8 [ 29.704373] __asan_memmove+0x3c/0x98 [ 29.704415] kmalloc_memmove_negative_size+0x154/0x2e0 [ 29.704466] kunit_try_run_case+0x170/0x3f0 [ 29.704676] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.704730] kthread+0x328/0x630 [ 29.704772] ret_from_fork+0x10/0x20 [ 29.704972] [ 29.705026] Allocated by task 211: [ 29.705066] kasan_save_stack+0x3c/0x68 [ 29.705111] kasan_save_track+0x20/0x40 [ 29.705149] kasan_save_alloc_info+0x40/0x58 [ 29.705207] __kasan_kmalloc+0xd4/0xd8 [ 29.705387] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.705426] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 29.705613] kunit_try_run_case+0x170/0x3f0 [ 29.705765] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.705811] kthread+0x328/0x630 [ 29.705847] ret_from_fork+0x10/0x20 [ 29.705929] [ 29.706005] The buggy address belongs to the object at fff00000c9ad9b00 [ 29.706005] which belongs to the cache kmalloc-64 of size 64 [ 29.706071] The buggy address is located 4 bytes inside of [ 29.706071] 64-byte region [fff00000c9ad9b00, fff00000c9ad9b40) [ 29.706130] [ 29.706151] The buggy address belongs to the physical page: [ 29.706183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109ad9 [ 29.706239] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.706291] page_type: f5(slab) [ 29.706766] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.706891] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.706934] page dumped because: kasan: bad access detected [ 29.707044] [ 29.707133] Memory state around the buggy address: [ 29.707167] fff00000c9ad9a00: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc [ 29.707210] fff00000c9ad9a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.707251] >fff00000c9ad9b00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 29.707446] ^ [ 29.707478] fff00000c9ad9b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.707717] fff00000c9ad9c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.707802] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[ 29.687123] ================================================================== [ 29.687350] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 29.687800] Write of size 16 at addr fff00000c636ad69 by task kunit_try_catch/209 [ 29.687929] [ 29.687970] CPU: 0 UID: 0 PID: 209 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.688067] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.688502] Hardware name: linux,dummy-virt (DT) [ 29.688596] Call trace: [ 29.688620] show_stack+0x20/0x38 (C) [ 29.688672] dump_stack_lvl+0x8c/0xd0 [ 29.688719] print_report+0x118/0x5d0 [ 29.688763] kasan_report+0xdc/0x128 [ 29.688983] kasan_check_range+0x100/0x1a8 [ 29.689156] __asan_memset+0x34/0x78 [ 29.689258] kmalloc_oob_memset_16+0x150/0x2f8 [ 29.689394] kunit_try_run_case+0x170/0x3f0 [ 29.689463] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.689640] kthread+0x328/0x630 [ 29.689854] ret_from_fork+0x10/0x20 [ 29.689910] [ 29.689947] Allocated by task 209: [ 29.689974] kasan_save_stack+0x3c/0x68 [ 29.690015] kasan_save_track+0x20/0x40 [ 29.690062] kasan_save_alloc_info+0x40/0x58 [ 29.690099] __kasan_kmalloc+0xd4/0xd8 [ 29.690136] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.690183] kmalloc_oob_memset_16+0xb0/0x2f8 [ 29.690252] kunit_try_run_case+0x170/0x3f0 [ 29.690337] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.690380] kthread+0x328/0x630 [ 29.690419] ret_from_fork+0x10/0x20 [ 29.690545] [ 29.690564] The buggy address belongs to the object at fff00000c636ad00 [ 29.690564] which belongs to the cache kmalloc-128 of size 128 [ 29.690711] The buggy address is located 105 bytes inside of [ 29.690711] allocated 120-byte region [fff00000c636ad00, fff00000c636ad78) [ 29.690840] [ 29.690863] The buggy address belongs to the physical page: [ 29.690895] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10636a [ 29.690950] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.691055] page_type: f5(slab) [ 29.691099] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.691148] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.691688] page dumped because: kasan: bad access detected [ 29.691729] [ 29.691955] Memory state around the buggy address: [ 29.692084] fff00000c636ac00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.692324] fff00000c636ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.692369] >fff00000c636ad00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.692407] ^ [ 29.692448] fff00000c636ad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.692490] fff00000c636ae00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.692536] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[ 29.673186] ================================================================== [ 29.673583] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 29.673903] Write of size 8 at addr fff00000c636ac71 by task kunit_try_catch/207 [ 29.673953] [ 29.673991] CPU: 0 UID: 0 PID: 207 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.674088] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.674273] Hardware name: linux,dummy-virt (DT) [ 29.674383] Call trace: [ 29.674520] show_stack+0x20/0x38 (C) [ 29.674586] dump_stack_lvl+0x8c/0xd0 [ 29.674653] print_report+0x118/0x5d0 [ 29.674744] kasan_report+0xdc/0x128 [ 29.674974] kasan_check_range+0x100/0x1a8 [ 29.675020] __asan_memset+0x34/0x78 [ 29.675072] kmalloc_oob_memset_8+0x150/0x2f8 [ 29.675128] kunit_try_run_case+0x170/0x3f0 [ 29.675180] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.675797] kthread+0x328/0x630 [ 29.675931] ret_from_fork+0x10/0x20 [ 29.675981] [ 29.676000] Allocated by task 207: [ 29.676028] kasan_save_stack+0x3c/0x68 [ 29.676390] kasan_save_track+0x20/0x40 [ 29.676432] kasan_save_alloc_info+0x40/0x58 [ 29.676470] __kasan_kmalloc+0xd4/0xd8 [ 29.676508] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.676550] kmalloc_oob_memset_8+0xb0/0x2f8 [ 29.676588] kunit_try_run_case+0x170/0x3f0 [ 29.676633] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.676673] kthread+0x328/0x630 [ 29.676704] ret_from_fork+0x10/0x20 [ 29.676945] [ 29.676994] The buggy address belongs to the object at fff00000c636ac00 [ 29.676994] which belongs to the cache kmalloc-128 of size 128 [ 29.677261] The buggy address is located 113 bytes inside of [ 29.677261] allocated 120-byte region [fff00000c636ac00, fff00000c636ac78) [ 29.677711] [ 29.677805] The buggy address belongs to the physical page: [ 29.677837] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10636a [ 29.677895] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.677945] page_type: f5(slab) [ 29.677986] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.678449] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.678501] page dumped because: kasan: bad access detected [ 29.678531] [ 29.678550] Memory state around the buggy address: [ 29.678583] fff00000c636ab00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.678624] fff00000c636ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.679200] >fff00000c636ac00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.679467] ^ [ 29.679593] fff00000c636ac80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.679637] fff00000c636ad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.679673] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[ 29.650814] ================================================================== [ 29.652346] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 29.652686] Write of size 4 at addr fff00000c636ab75 by task kunit_try_catch/205 [ 29.652740] [ 29.652780] CPU: 0 UID: 0 PID: 205 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.653829] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.654080] Hardware name: linux,dummy-virt (DT) [ 29.654295] Call trace: [ 29.654703] show_stack+0x20/0x38 (C) [ 29.655204] dump_stack_lvl+0x8c/0xd0 [ 29.655255] print_report+0x118/0x5d0 [ 29.655298] kasan_report+0xdc/0x128 [ 29.655340] kasan_check_range+0x100/0x1a8 [ 29.655384] __asan_memset+0x34/0x78 [ 29.655426] kmalloc_oob_memset_4+0x150/0x300 [ 29.655473] kunit_try_run_case+0x170/0x3f0 [ 29.655522] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.656311] kthread+0x328/0x630 [ 29.657308] ret_from_fork+0x10/0x20 [ 29.657371] [ 29.657390] Allocated by task 205: [ 29.657419] kasan_save_stack+0x3c/0x68 [ 29.657601] kasan_save_track+0x20/0x40 [ 29.657641] kasan_save_alloc_info+0x40/0x58 [ 29.657730] __kasan_kmalloc+0xd4/0xd8 [ 29.657894] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.657933] kmalloc_oob_memset_4+0xb0/0x300 [ 29.658112] kunit_try_run_case+0x170/0x3f0 [ 29.658269] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.658555] kthread+0x328/0x630 [ 29.658653] ret_from_fork+0x10/0x20 [ 29.658981] [ 29.659004] The buggy address belongs to the object at fff00000c636ab00 [ 29.659004] which belongs to the cache kmalloc-128 of size 128 [ 29.659087] The buggy address is located 117 bytes inside of [ 29.659087] allocated 120-byte region [fff00000c636ab00, fff00000c636ab78) [ 29.659148] [ 29.659170] The buggy address belongs to the physical page: [ 29.659203] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10636a [ 29.659258] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.659309] page_type: f5(slab) [ 29.659856] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.660165] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.660314] page dumped because: kasan: bad access detected [ 29.660371] [ 29.660389] Memory state around the buggy address: [ 29.660422] fff00000c636aa00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.660462] fff00000c636aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.660614] >fff00000c636ab00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.660656] ^ [ 29.660740] fff00000c636ab80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.660782] fff00000c636ac00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.660866] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[ 29.621883] ================================================================== [ 29.622101] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 29.622372] Write of size 2 at addr fff00000c636aa77 by task kunit_try_catch/203 [ 29.622716] [ 29.622958] CPU: 0 UID: 0 PID: 203 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.623058] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.623083] Hardware name: linux,dummy-virt (DT) [ 29.623114] Call trace: [ 29.623137] show_stack+0x20/0x38 (C) [ 29.623190] dump_stack_lvl+0x8c/0xd0 [ 29.623236] print_report+0x118/0x5d0 [ 29.623279] kasan_report+0xdc/0x128 [ 29.623320] kasan_check_range+0x100/0x1a8 [ 29.623363] __asan_memset+0x34/0x78 [ 29.623405] kmalloc_oob_memset_2+0x150/0x2f8 [ 29.623450] kunit_try_run_case+0x170/0x3f0 [ 29.624030] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.624416] kthread+0x328/0x630 [ 29.625035] ret_from_fork+0x10/0x20 [ 29.625097] [ 29.625116] Allocated by task 203: [ 29.625143] kasan_save_stack+0x3c/0x68 [ 29.625185] kasan_save_track+0x20/0x40 [ 29.625672] kasan_save_alloc_info+0x40/0x58 [ 29.625947] __kasan_kmalloc+0xd4/0xd8 [ 29.625989] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.626284] kmalloc_oob_memset_2+0xb0/0x2f8 [ 29.626447] kunit_try_run_case+0x170/0x3f0 [ 29.627072] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.627687] kthread+0x328/0x630 [ 29.628007] ret_from_fork+0x10/0x20 [ 29.628241] [ 29.628282] The buggy address belongs to the object at fff00000c636aa00 [ 29.628282] which belongs to the cache kmalloc-128 of size 128 [ 29.628355] The buggy address is located 119 bytes inside of [ 29.628355] allocated 120-byte region [fff00000c636aa00, fff00000c636aa78) [ 29.628416] [ 29.628438] The buggy address belongs to the physical page: [ 29.628469] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10636a [ 29.628523] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.628572] page_type: f5(slab) [ 29.628614] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.628661] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.628699] page dumped because: kasan: bad access detected [ 29.628729] [ 29.628747] Memory state around the buggy address: [ 29.628779] fff00000c636a900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.628819] fff00000c636a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.628859] >fff00000c636aa00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.628895] ^ [ 29.628934] fff00000c636aa80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.628974] fff00000c636ab00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.629011] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 29.594887] ================================================================== [ 29.594982] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 29.595061] Write of size 128 at addr fff00000c636a900 by task kunit_try_catch/201 [ 29.595111] [ 29.595150] CPU: 0 UID: 0 PID: 201 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.595986] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.596367] Hardware name: linux,dummy-virt (DT) [ 29.596667] Call trace: [ 29.596706] show_stack+0x20/0x38 (C) [ 29.596764] dump_stack_lvl+0x8c/0xd0 [ 29.596812] print_report+0x118/0x5d0 [ 29.597449] kasan_report+0xdc/0x128 [ 29.597518] kasan_check_range+0x100/0x1a8 [ 29.597896] __asan_memset+0x34/0x78 [ 29.598199] kmalloc_oob_in_memset+0x144/0x2d0 [ 29.598292] kunit_try_run_case+0x170/0x3f0 [ 29.598341] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.598934] kthread+0x328/0x630 [ 29.599079] ret_from_fork+0x10/0x20 [ 29.599354] [ 29.599374] Allocated by task 201: [ 29.599752] kasan_save_stack+0x3c/0x68 [ 29.600089] kasan_save_track+0x20/0x40 [ 29.600148] kasan_save_alloc_info+0x40/0x58 [ 29.600209] __kasan_kmalloc+0xd4/0xd8 [ 29.600392] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.600434] kmalloc_oob_in_memset+0xb0/0x2d0 [ 29.600472] kunit_try_run_case+0x170/0x3f0 [ 29.601017] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.601162] kthread+0x328/0x630 [ 29.601195] ret_from_fork+0x10/0x20 [ 29.601230] [ 29.601761] The buggy address belongs to the object at fff00000c636a900 [ 29.601761] which belongs to the cache kmalloc-128 of size 128 [ 29.601884] The buggy address is located 0 bytes inside of [ 29.601884] allocated 120-byte region [fff00000c636a900, fff00000c636a978) [ 29.602131] [ 29.602396] The buggy address belongs to the physical page: [ 29.602429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10636a [ 29.602643] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.602697] page_type: f5(slab) [ 29.603345] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.603400] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.603916] page dumped because: kasan: bad access detected [ 29.604216] [ 29.604387] Memory state around the buggy address: [ 29.604427] fff00000c636a800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.604608] fff00000c636a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.604680] >fff00000c636a900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.604731] ^ [ 29.604778] fff00000c636a980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.604819] fff00000c636aa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.605144] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[ 29.562476] ================================================================== [ 29.562555] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 29.562618] Read of size 16 at addr fff00000c64c1ae0 by task kunit_try_catch/199 [ 29.562854] [ 29.562913] CPU: 0 UID: 0 PID: 199 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.562999] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.563031] Hardware name: linux,dummy-virt (DT) [ 29.563100] Call trace: [ 29.563133] show_stack+0x20/0x38 (C) [ 29.563185] dump_stack_lvl+0x8c/0xd0 [ 29.563230] print_report+0x118/0x5d0 [ 29.563272] kasan_report+0xdc/0x128 [ 29.563314] __asan_report_load16_noabort+0x20/0x30 [ 29.563362] kmalloc_uaf_16+0x3bc/0x438 [ 29.563416] kunit_try_run_case+0x170/0x3f0 [ 29.563472] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.563521] kthread+0x328/0x630 [ 29.563562] ret_from_fork+0x10/0x20 [ 29.563608] [ 29.563626] Allocated by task 199: [ 29.563822] kasan_save_stack+0x3c/0x68 [ 29.563880] kasan_save_track+0x20/0x40 [ 29.563918] kasan_save_alloc_info+0x40/0x58 [ 29.564123] __kasan_kmalloc+0xd4/0xd8 [ 29.564658] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.564894] kmalloc_uaf_16+0x140/0x438 [ 29.564944] kunit_try_run_case+0x170/0x3f0 [ 29.564984] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.565384] kthread+0x328/0x630 [ 29.565593] ret_from_fork+0x10/0x20 [ 29.565898] [ 29.565974] Freed by task 199: [ 29.566002] kasan_save_stack+0x3c/0x68 [ 29.566044] kasan_save_track+0x20/0x40 [ 29.566728] kasan_save_free_info+0x4c/0x78 [ 29.566775] __kasan_slab_free+0x6c/0x98 [ 29.567040] kfree+0x214/0x3c8 [ 29.567094] kmalloc_uaf_16+0x190/0x438 [ 29.567131] kunit_try_run_case+0x170/0x3f0 [ 29.567169] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.567947] kthread+0x328/0x630 [ 29.568009] ret_from_fork+0x10/0x20 [ 29.568472] [ 29.568654] The buggy address belongs to the object at fff00000c64c1ae0 [ 29.568654] which belongs to the cache kmalloc-16 of size 16 [ 29.568720] The buggy address is located 0 bytes inside of [ 29.568720] freed 16-byte region [fff00000c64c1ae0, fff00000c64c1af0) [ 29.568779] [ 29.569119] The buggy address belongs to the physical page: [ 29.569371] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c64c1a40 pfn:0x1064c1 [ 29.569952] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.570261] page_type: f5(slab) [ 29.570507] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 29.570655] raw: fff00000c64c1a40 000000008080007f 00000000f5000000 0000000000000000 [ 29.570957] page dumped because: kasan: bad access detected [ 29.570989] [ 29.571007] Memory state around the buggy address: [ 29.571043] fff00000c64c1980: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.571474] fff00000c64c1a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.571548] >fff00000c64c1a80: fa fb fc fc fa fb fc fc 00 00 fc fc fa fb fc fc [ 29.571585] ^ [ 29.571829] fff00000c64c1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.571872] fff00000c64c1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.571909] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[ 29.546734] ================================================================== [ 29.546807] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 29.546901] Write of size 16 at addr fff00000c64c1a80 by task kunit_try_catch/197 [ 29.546953] [ 29.546988] CPU: 0 UID: 0 PID: 197 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.547083] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.547118] Hardware name: linux,dummy-virt (DT) [ 29.547149] Call trace: [ 29.547171] show_stack+0x20/0x38 (C) [ 29.547221] dump_stack_lvl+0x8c/0xd0 [ 29.547267] print_report+0x118/0x5d0 [ 29.547309] kasan_report+0xdc/0x128 [ 29.547350] __asan_report_store16_noabort+0x20/0x30 [ 29.547435] kmalloc_oob_16+0x3a0/0x3f8 [ 29.547634] kunit_try_run_case+0x170/0x3f0 [ 29.547682] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.547730] kthread+0x328/0x630 [ 29.547772] ret_from_fork+0x10/0x20 [ 29.547818] [ 29.547835] Allocated by task 197: [ 29.547861] kasan_save_stack+0x3c/0x68 [ 29.547901] kasan_save_track+0x20/0x40 [ 29.547938] kasan_save_alloc_info+0x40/0x58 [ 29.547973] __kasan_kmalloc+0xd4/0xd8 [ 29.548009] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.548064] kmalloc_oob_16+0xb4/0x3f8 [ 29.548219] kunit_try_run_case+0x170/0x3f0 [ 29.548258] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.548297] kthread+0x328/0x630 [ 29.548328] ret_from_fork+0x10/0x20 [ 29.548364] [ 29.548382] The buggy address belongs to the object at fff00000c64c1a80 [ 29.548382] which belongs to the cache kmalloc-16 of size 16 [ 29.548437] The buggy address is located 0 bytes inside of [ 29.548437] allocated 13-byte region [fff00000c64c1a80, fff00000c64c1a8d) [ 29.548607] [ 29.548628] The buggy address belongs to the physical page: [ 29.548657] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c64c1a40 pfn:0x1064c1 [ 29.548715] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.548764] page_type: f5(slab) [ 29.548812] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 29.548861] raw: fff00000c64c1a40 000000008080007f 00000000f5000000 0000000000000000 [ 29.548900] page dumped because: kasan: bad access detected [ 29.548929] [ 29.548947] Memory state around the buggy address: [ 29.548977] fff00000c64c1980: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.549019] fff00000c64c1a00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.549069] >fff00000c64c1a80: 00 05 fc fc 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.549105] ^ [ 29.549132] fff00000c64c1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.549172] fff00000c64c1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.549225] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 29.531496] ================================================================== [ 29.531561] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 29.531704] Read of size 1 at addr fff00000c9688400 by task kunit_try_catch/195 [ 29.531769] [ 29.531802] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.531884] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.531909] Hardware name: linux,dummy-virt (DT) [ 29.531939] Call trace: [ 29.531961] show_stack+0x20/0x38 (C) [ 29.532009] dump_stack_lvl+0x8c/0xd0 [ 29.532065] print_report+0x118/0x5d0 [ 29.532120] kasan_report+0xdc/0x128 [ 29.532256] __kasan_check_byte+0x54/0x70 [ 29.532348] krealloc_noprof+0x44/0x360 [ 29.532419] krealloc_uaf+0x180/0x520 [ 29.532482] kunit_try_run_case+0x170/0x3f0 [ 29.532528] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.532576] kthread+0x328/0x630 [ 29.532616] ret_from_fork+0x10/0x20 [ 29.532663] [ 29.532681] Allocated by task 195: [ 29.532709] kasan_save_stack+0x3c/0x68 [ 29.532750] kasan_save_track+0x20/0x40 [ 29.532787] kasan_save_alloc_info+0x40/0x58 [ 29.532843] __kasan_kmalloc+0xd4/0xd8 [ 29.532880] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.532918] krealloc_uaf+0xc8/0x520 [ 29.533008] kunit_try_run_case+0x170/0x3f0 [ 29.533058] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.533098] kthread+0x328/0x630 [ 29.533131] ret_from_fork+0x10/0x20 [ 29.533166] [ 29.533199] Freed by task 195: [ 29.533247] kasan_save_stack+0x3c/0x68 [ 29.533285] kasan_save_track+0x20/0x40 [ 29.533321] kasan_save_free_info+0x4c/0x78 [ 29.533357] __kasan_slab_free+0x6c/0x98 [ 29.533394] kfree+0x214/0x3c8 [ 29.533428] krealloc_uaf+0x12c/0x520 [ 29.533472] kunit_try_run_case+0x170/0x3f0 [ 29.533670] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.533712] kthread+0x328/0x630 [ 29.533744] ret_from_fork+0x10/0x20 [ 29.533796] [ 29.533918] The buggy address belongs to the object at fff00000c9688400 [ 29.533918] which belongs to the cache kmalloc-256 of size 256 [ 29.534084] The buggy address is located 0 bytes inside of [ 29.534084] freed 256-byte region [fff00000c9688400, fff00000c9688500) [ 29.534145] [ 29.534166] The buggy address belongs to the physical page: [ 29.534197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109688 [ 29.534248] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.534294] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.534422] page_type: f5(slab) [ 29.534540] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.534710] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.534758] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.534805] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.534853] head: 0bfffe0000000001 ffffc1ffc325a201 00000000ffffffff 00000000ffffffff [ 29.534901] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 29.534940] page dumped because: kasan: bad access detected [ 29.534971] [ 29.534989] Memory state around the buggy address: [ 29.535021] fff00000c9688300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.535081] fff00000c9688380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.535121] >fff00000c9688400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.535157] ^ [ 29.535183] fff00000c9688480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.535223] fff00000c9688500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.535260] ================================================================== [ 29.536698] ================================================================== [ 29.536748] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 29.536795] Read of size 1 at addr fff00000c9688400 by task kunit_try_catch/195 [ 29.536931] [ 29.536965] CPU: 0 UID: 0 PID: 195 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.537044] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.537081] Hardware name: linux,dummy-virt (DT) [ 29.537110] Call trace: [ 29.537131] show_stack+0x20/0x38 (C) [ 29.537187] dump_stack_lvl+0x8c/0xd0 [ 29.537233] print_report+0x118/0x5d0 [ 29.537275] kasan_report+0xdc/0x128 [ 29.537316] __asan_report_load1_noabort+0x20/0x30 [ 29.537362] krealloc_uaf+0x4c8/0x520 [ 29.537407] kunit_try_run_case+0x170/0x3f0 [ 29.537453] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.537571] kthread+0x328/0x630 [ 29.537694] ret_from_fork+0x10/0x20 [ 29.537742] [ 29.537759] Allocated by task 195: [ 29.537791] kasan_save_stack+0x3c/0x68 [ 29.537864] kasan_save_track+0x20/0x40 [ 29.537901] kasan_save_alloc_info+0x40/0x58 [ 29.537936] __kasan_kmalloc+0xd4/0xd8 [ 29.537972] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.538011] krealloc_uaf+0xc8/0x520 [ 29.538045] kunit_try_run_case+0x170/0x3f0 [ 29.538091] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.538129] kthread+0x328/0x630 [ 29.538160] ret_from_fork+0x10/0x20 [ 29.538263] [ 29.538349] Freed by task 195: [ 29.538470] kasan_save_stack+0x3c/0x68 [ 29.538552] kasan_save_track+0x20/0x40 [ 29.538589] kasan_save_free_info+0x4c/0x78 [ 29.538624] __kasan_slab_free+0x6c/0x98 [ 29.538660] kfree+0x214/0x3c8 [ 29.538692] krealloc_uaf+0x12c/0x520 [ 29.538726] kunit_try_run_case+0x170/0x3f0 [ 29.538763] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.538808] kthread+0x328/0x630 [ 29.538957] ret_from_fork+0x10/0x20 [ 29.539080] [ 29.539097] The buggy address belongs to the object at fff00000c9688400 [ 29.539097] which belongs to the cache kmalloc-256 of size 256 [ 29.539153] The buggy address is located 0 bytes inside of [ 29.539153] freed 256-byte region [fff00000c9688400, fff00000c9688500) [ 29.539210] [ 29.539229] The buggy address belongs to the physical page: [ 29.539259] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109688 [ 29.539309] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.539354] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.539439] page_type: f5(slab) [ 29.539670] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.539720] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.539769] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.539816] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.539863] head: 0bfffe0000000001 ffffc1ffc325a201 00000000ffffffff 00000000ffffffff [ 29.539910] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 29.539948] page dumped because: kasan: bad access detected [ 29.539986] [ 29.540004] Memory state around the buggy address: [ 29.540034] fff00000c9688300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.540084] fff00000c9688380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.540125] >fff00000c9688400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.540183] ^ [ 29.540210] fff00000c9688480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.540250] fff00000c9688500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.540302] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 29.445135] ================================================================== [ 29.445197] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 29.445256] Write of size 1 at addr fff00000c96882c9 by task kunit_try_catch/189 [ 29.445305] [ 29.445341] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.445528] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.445554] Hardware name: linux,dummy-virt (DT) [ 29.445584] Call trace: [ 29.445612] show_stack+0x20/0x38 (C) [ 29.445717] dump_stack_lvl+0x8c/0xd0 [ 29.445854] print_report+0x118/0x5d0 [ 29.445898] kasan_report+0xdc/0x128 [ 29.445939] __asan_report_store1_noabort+0x20/0x30 [ 29.445986] krealloc_less_oob_helper+0xa48/0xc50 [ 29.446034] krealloc_less_oob+0x20/0x38 [ 29.446089] kunit_try_run_case+0x170/0x3f0 [ 29.446136] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.446184] kthread+0x328/0x630 [ 29.446225] ret_from_fork+0x10/0x20 [ 29.446272] [ 29.446290] Allocated by task 189: [ 29.446317] kasan_save_stack+0x3c/0x68 [ 29.446368] kasan_save_track+0x20/0x40 [ 29.446408] kasan_save_alloc_info+0x40/0x58 [ 29.446445] __kasan_krealloc+0x118/0x178 [ 29.446560] krealloc_noprof+0x128/0x360 [ 29.446783] krealloc_less_oob_helper+0x168/0xc50 [ 29.447114] krealloc_less_oob+0x20/0x38 [ 29.447158] kunit_try_run_case+0x170/0x3f0 [ 29.447475] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.447662] kthread+0x328/0x630 [ 29.447697] ret_from_fork+0x10/0x20 [ 29.447731] [ 29.447750] The buggy address belongs to the object at fff00000c9688200 [ 29.447750] which belongs to the cache kmalloc-256 of size 256 [ 29.448332] The buggy address is located 0 bytes to the right of [ 29.448332] allocated 201-byte region [fff00000c9688200, fff00000c96882c9) [ 29.448416] [ 29.448438] The buggy address belongs to the physical page: [ 29.448469] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109688 [ 29.448688] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.448843] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.448899] page_type: f5(slab) [ 29.448940] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.448999] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.449058] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.449501] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.449628] head: 0bfffe0000000001 ffffc1ffc325a201 00000000ffffffff 00000000ffffffff [ 29.449813] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 29.450040] page dumped because: kasan: bad access detected [ 29.450117] [ 29.450135] Memory state around the buggy address: [ 29.450202] fff00000c9688180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.450243] fff00000c9688200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.450448] >fff00000c9688280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 29.450626] ^ [ 29.450666] fff00000c9688300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.450842] fff00000c9688380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.450916] ================================================================== [ 29.461298] ================================================================== [ 29.461353] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 29.461408] Write of size 1 at addr fff00000c96882da by task kunit_try_catch/189 [ 29.461456] [ 29.461580] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.461948] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.461974] Hardware name: linux,dummy-virt (DT) [ 29.462004] Call trace: [ 29.462026] show_stack+0x20/0x38 (C) [ 29.462085] dump_stack_lvl+0x8c/0xd0 [ 29.462129] print_report+0x118/0x5d0 [ 29.462171] kasan_report+0xdc/0x128 [ 29.462213] __asan_report_store1_noabort+0x20/0x30 [ 29.462267] krealloc_less_oob_helper+0xa80/0xc50 [ 29.462490] krealloc_less_oob+0x20/0x38 [ 29.462707] kunit_try_run_case+0x170/0x3f0 [ 29.462783] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.462832] kthread+0x328/0x630 [ 29.462880] ret_from_fork+0x10/0x20 [ 29.463003] [ 29.463040] Allocated by task 189: [ 29.463336] kasan_save_stack+0x3c/0x68 [ 29.463671] kasan_save_track+0x20/0x40 [ 29.464020] kasan_save_alloc_info+0x40/0x58 [ 29.464071] __kasan_krealloc+0x118/0x178 [ 29.464109] krealloc_noprof+0x128/0x360 [ 29.464147] krealloc_less_oob_helper+0x168/0xc50 [ 29.464478] krealloc_less_oob+0x20/0x38 [ 29.464626] kunit_try_run_case+0x170/0x3f0 [ 29.464783] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.464870] kthread+0x328/0x630 [ 29.464904] ret_from_fork+0x10/0x20 [ 29.464940] [ 29.464960] The buggy address belongs to the object at fff00000c9688200 [ 29.464960] which belongs to the cache kmalloc-256 of size 256 [ 29.465018] The buggy address is located 17 bytes to the right of [ 29.465018] allocated 201-byte region [fff00000c9688200, fff00000c96882c9) [ 29.465091] [ 29.465111] The buggy address belongs to the physical page: [ 29.465168] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109688 [ 29.465219] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.465264] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.465315] page_type: f5(slab) [ 29.465352] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.465400] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.465447] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.465907] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.466025] head: 0bfffe0000000001 ffffc1ffc325a201 00000000ffffffff 00000000ffffffff [ 29.466096] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 29.466189] page dumped because: kasan: bad access detected [ 29.466289] [ 29.466307] Memory state around the buggy address: [ 29.466338] fff00000c9688180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.466387] fff00000c9688200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.466767] >fff00000c9688280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 29.466869] ^ [ 29.466922] fff00000c9688300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.467022] fff00000c9688380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.467205] ================================================================== [ 29.522835] ================================================================== [ 29.522867] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 29.522906] Write of size 1 at addr fff00000c9b060eb by task kunit_try_catch/193 [ 29.522955] [ 29.522982] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.523186] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.523286] Hardware name: linux,dummy-virt (DT) [ 29.523406] Call trace: [ 29.523460] show_stack+0x20/0x38 (C) [ 29.523505] dump_stack_lvl+0x8c/0xd0 [ 29.523700] print_report+0x118/0x5d0 [ 29.523811] kasan_report+0xdc/0x128 [ 29.523938] __asan_report_store1_noabort+0x20/0x30 [ 29.524148] krealloc_less_oob_helper+0xa58/0xc50 [ 29.524231] krealloc_large_less_oob+0x20/0x38 [ 29.524278] kunit_try_run_case+0x170/0x3f0 [ 29.524325] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.524373] kthread+0x328/0x630 [ 29.524414] ret_from_fork+0x10/0x20 [ 29.524460] [ 29.524479] The buggy address belongs to the physical page: [ 29.524508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b04 [ 29.524558] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.524602] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.524651] page_type: f8(unknown) [ 29.524715] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.524817] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.524877] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.524925] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.524972] head: 0bfffe0000000002 ffffc1ffc326c101 00000000ffffffff 00000000ffffffff [ 29.525020] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 29.525066] page dumped because: kasan: bad access detected [ 29.525095] [ 29.525156] Memory state around the buggy address: [ 29.525185] fff00000c9b05f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.525227] fff00000c9b06000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.525286] >fff00000c9b06080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 29.525321] ^ [ 29.525358] fff00000c9b06100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.525399] fff00000c9b06180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.525495] ================================================================== [ 29.518292] ================================================================== [ 29.518361] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 29.518415] Write of size 1 at addr fff00000c9b060da by task kunit_try_catch/193 [ 29.518543] [ 29.518629] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.518708] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.518732] Hardware name: linux,dummy-virt (DT) [ 29.518761] Call trace: [ 29.518781] show_stack+0x20/0x38 (C) [ 29.518826] dump_stack_lvl+0x8c/0xd0 [ 29.518870] print_report+0x118/0x5d0 [ 29.518911] kasan_report+0xdc/0x128 [ 29.518952] __asan_report_store1_noabort+0x20/0x30 [ 29.519020] krealloc_less_oob_helper+0xa80/0xc50 [ 29.519079] krealloc_large_less_oob+0x20/0x38 [ 29.519125] kunit_try_run_case+0x170/0x3f0 [ 29.519172] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.519220] kthread+0x328/0x630 [ 29.519260] ret_from_fork+0x10/0x20 [ 29.519315] [ 29.519335] The buggy address belongs to the physical page: [ 29.519364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b04 [ 29.519414] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.519458] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.519510] page_type: f8(unknown) [ 29.519546] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.519695] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.519878] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.519924] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.520128] head: 0bfffe0000000002 ffffc1ffc326c101 00000000ffffffff 00000000ffffffff [ 29.520244] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 29.520284] page dumped because: kasan: bad access detected [ 29.520313] [ 29.520330] Memory state around the buggy address: [ 29.520360] fff00000c9b05f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.520400] fff00000c9b06000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.520440] >fff00000c9b06080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 29.520475] ^ [ 29.520547] fff00000c9b06100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.520605] fff00000c9b06180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.520642] ================================================================== [ 29.473897] ================================================================== [ 29.473942] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 29.473990] Write of size 1 at addr fff00000c96882eb by task kunit_try_catch/189 [ 29.474037] [ 29.474080] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.474159] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.474194] Hardware name: linux,dummy-virt (DT) [ 29.474337] Call trace: [ 29.474360] show_stack+0x20/0x38 (C) [ 29.474407] dump_stack_lvl+0x8c/0xd0 [ 29.474450] print_report+0x118/0x5d0 [ 29.474492] kasan_report+0xdc/0x128 [ 29.474533] __asan_report_store1_noabort+0x20/0x30 [ 29.474580] krealloc_less_oob_helper+0xa58/0xc50 [ 29.474627] krealloc_less_oob+0x20/0x38 [ 29.474671] kunit_try_run_case+0x170/0x3f0 [ 29.474718] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.474766] kthread+0x328/0x630 [ 29.474806] ret_from_fork+0x10/0x20 [ 29.474858] [ 29.474882] Allocated by task 189: [ 29.474908] kasan_save_stack+0x3c/0x68 [ 29.475305] kasan_save_track+0x20/0x40 [ 29.475530] kasan_save_alloc_info+0x40/0x58 [ 29.475966] __kasan_krealloc+0x118/0x178 [ 29.476011] krealloc_noprof+0x128/0x360 [ 29.476428] krealloc_less_oob_helper+0x168/0xc50 [ 29.476684] krealloc_less_oob+0x20/0x38 [ 29.476725] kunit_try_run_case+0x170/0x3f0 [ 29.476763] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.476806] kthread+0x328/0x630 [ 29.476838] ret_from_fork+0x10/0x20 [ 29.476991] [ 29.477016] The buggy address belongs to the object at fff00000c9688200 [ 29.477016] which belongs to the cache kmalloc-256 of size 256 [ 29.477271] The buggy address is located 34 bytes to the right of [ 29.477271] allocated 201-byte region [fff00000c9688200, fff00000c96882c9) [ 29.477372] [ 29.477399] The buggy address belongs to the physical page: [ 29.477556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109688 [ 29.477664] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.477710] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.477772] page_type: f5(slab) [ 29.477905] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.477953] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.478003] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.478060] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.478108] head: 0bfffe0000000001 ffffc1ffc325a201 00000000ffffffff 00000000ffffffff [ 29.478254] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 29.478447] page dumped because: kasan: bad access detected [ 29.478481] [ 29.478633] Memory state around the buggy address: [ 29.479017] fff00000c9688180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.479268] fff00000c9688200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.479376] >fff00000c9688280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 29.479426] ^ [ 29.479500] fff00000c9688300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.479666] fff00000c9688380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.479703] ================================================================== [ 29.452232] ================================================================== [ 29.452280] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 29.452328] Write of size 1 at addr fff00000c96882d0 by task kunit_try_catch/189 [ 29.452375] [ 29.452407] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.452487] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.452512] Hardware name: linux,dummy-virt (DT) [ 29.452542] Call trace: [ 29.452563] show_stack+0x20/0x38 (C) [ 29.452990] dump_stack_lvl+0x8c/0xd0 [ 29.453064] print_report+0x118/0x5d0 [ 29.453107] kasan_report+0xdc/0x128 [ 29.453149] __asan_report_store1_noabort+0x20/0x30 [ 29.453503] krealloc_less_oob_helper+0xb9c/0xc50 [ 29.453849] krealloc_less_oob+0x20/0x38 [ 29.454037] kunit_try_run_case+0x170/0x3f0 [ 29.454111] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.454546] kthread+0x328/0x630 [ 29.454709] ret_from_fork+0x10/0x20 [ 29.455154] [ 29.455325] Allocated by task 189: [ 29.455455] kasan_save_stack+0x3c/0x68 [ 29.455499] kasan_save_track+0x20/0x40 [ 29.455560] kasan_save_alloc_info+0x40/0x58 [ 29.455926] __kasan_krealloc+0x118/0x178 [ 29.455974] krealloc_noprof+0x128/0x360 [ 29.456058] krealloc_less_oob_helper+0x168/0xc50 [ 29.456097] krealloc_less_oob+0x20/0x38 [ 29.456481] kunit_try_run_case+0x170/0x3f0 [ 29.456526] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.456565] kthread+0x328/0x630 [ 29.456597] ret_from_fork+0x10/0x20 [ 29.456703] [ 29.456722] The buggy address belongs to the object at fff00000c9688200 [ 29.456722] which belongs to the cache kmalloc-256 of size 256 [ 29.457013] The buggy address is located 7 bytes to the right of [ 29.457013] allocated 201-byte region [fff00000c9688200, fff00000c96882c9) [ 29.457158] [ 29.457180] The buggy address belongs to the physical page: [ 29.457412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109688 [ 29.457524] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.457582] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.457639] page_type: f5(slab) [ 29.457678] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.457860] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.457915] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.458094] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.458148] head: 0bfffe0000000001 ffffc1ffc325a201 00000000ffffffff 00000000ffffffff [ 29.458195] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 29.458351] page dumped because: kasan: bad access detected [ 29.458427] [ 29.458446] Memory state around the buggy address: [ 29.458481] fff00000c9688180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.458623] fff00000c9688200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.458708] >fff00000c9688280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 29.458809] ^ [ 29.458906] fff00000c9688300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.458948] fff00000c9688380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.459028] ================================================================== [ 29.509897] ================================================================== [ 29.509972] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 29.510035] Write of size 1 at addr fff00000c9b060c9 by task kunit_try_catch/193 [ 29.510098] [ 29.510136] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.510218] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.510244] Hardware name: linux,dummy-virt (DT) [ 29.510275] Call trace: [ 29.510298] show_stack+0x20/0x38 (C) [ 29.510345] dump_stack_lvl+0x8c/0xd0 [ 29.510391] print_report+0x118/0x5d0 [ 29.510433] kasan_report+0xdc/0x128 [ 29.510475] __asan_report_store1_noabort+0x20/0x30 [ 29.510522] krealloc_less_oob_helper+0xa48/0xc50 [ 29.510569] krealloc_large_less_oob+0x20/0x38 [ 29.510616] kunit_try_run_case+0x170/0x3f0 [ 29.510663] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.511008] kthread+0x328/0x630 [ 29.511323] ret_from_fork+0x10/0x20 [ 29.511752] [ 29.511920] The buggy address belongs to the physical page: [ 29.511958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b04 [ 29.512014] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.512072] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.512307] page_type: f8(unknown) [ 29.512490] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.512755] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.513018] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.513075] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.513125] head: 0bfffe0000000002 ffffc1ffc326c101 00000000ffffffff 00000000ffffffff [ 29.513193] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 29.513232] page dumped because: kasan: bad access detected [ 29.513262] [ 29.513280] Memory state around the buggy address: [ 29.513312] fff00000c9b05f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.513354] fff00000c9b06000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.513394] >fff00000c9b06080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 29.513430] ^ [ 29.513463] fff00000c9b06100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.513505] fff00000c9b06180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.513541] ================================================================== [ 29.515419] ================================================================== [ 29.515466] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 29.515517] Write of size 1 at addr fff00000c9b060d0 by task kunit_try_catch/193 [ 29.515564] [ 29.515595] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.515676] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.515701] Hardware name: linux,dummy-virt (DT) [ 29.515748] Call trace: [ 29.515782] show_stack+0x20/0x38 (C) [ 29.515838] dump_stack_lvl+0x8c/0xd0 [ 29.516091] print_report+0x118/0x5d0 [ 29.516232] kasan_report+0xdc/0x128 [ 29.516274] __asan_report_store1_noabort+0x20/0x30 [ 29.516321] krealloc_less_oob_helper+0xb9c/0xc50 [ 29.516369] krealloc_large_less_oob+0x20/0x38 [ 29.516415] kunit_try_run_case+0x170/0x3f0 [ 29.516464] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.516512] kthread+0x328/0x630 [ 29.516553] ret_from_fork+0x10/0x20 [ 29.516600] [ 29.516620] The buggy address belongs to the physical page: [ 29.516650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b04 [ 29.516702] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.516764] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.516888] page_type: f8(unknown) [ 29.516934] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.517056] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.517283] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.517330] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.517378] head: 0bfffe0000000002 ffffc1ffc326c101 00000000ffffffff 00000000ffffffff [ 29.517424] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 29.517462] page dumped because: kasan: bad access detected [ 29.517491] [ 29.517508] Memory state around the buggy address: [ 29.517537] fff00000c9b05f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.517580] fff00000c9b06000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.517627] >fff00000c9b06080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 29.517674] ^ [ 29.517708] fff00000c9b06100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.517749] fff00000c9b06180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.517872] ================================================================== [ 29.467872] ================================================================== [ 29.467941] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 29.467987] Write of size 1 at addr fff00000c96882ea by task kunit_try_catch/189 [ 29.468034] [ 29.468076] CPU: 0 UID: 0 PID: 189 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.468155] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.468215] Hardware name: linux,dummy-virt (DT) [ 29.468295] Call trace: [ 29.468317] show_stack+0x20/0x38 (C) [ 29.468492] dump_stack_lvl+0x8c/0xd0 [ 29.468542] print_report+0x118/0x5d0 [ 29.468641] kasan_report+0xdc/0x128 [ 29.468732] __asan_report_store1_noabort+0x20/0x30 [ 29.468849] krealloc_less_oob_helper+0xae4/0xc50 [ 29.468944] krealloc_less_oob+0x20/0x38 [ 29.469089] kunit_try_run_case+0x170/0x3f0 [ 29.469232] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.469320] kthread+0x328/0x630 [ 29.469448] ret_from_fork+0x10/0x20 [ 29.469523] [ 29.469542] Allocated by task 189: [ 29.469581] kasan_save_stack+0x3c/0x68 [ 29.469626] kasan_save_track+0x20/0x40 [ 29.469663] kasan_save_alloc_info+0x40/0x58 [ 29.469806] __kasan_krealloc+0x118/0x178 [ 29.470077] krealloc_noprof+0x128/0x360 [ 29.470118] krealloc_less_oob_helper+0x168/0xc50 [ 29.470202] krealloc_less_oob+0x20/0x38 [ 29.470239] kunit_try_run_case+0x170/0x3f0 [ 29.470283] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.470449] kthread+0x328/0x630 [ 29.470480] ret_from_fork+0x10/0x20 [ 29.470514] [ 29.470533] The buggy address belongs to the object at fff00000c9688200 [ 29.470533] which belongs to the cache kmalloc-256 of size 256 [ 29.470589] The buggy address is located 33 bytes to the right of [ 29.470589] allocated 201-byte region [fff00000c9688200, fff00000c96882c9) [ 29.470651] [ 29.470716] The buggy address belongs to the physical page: [ 29.470858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109688 [ 29.471068] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.471114] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.471163] page_type: f5(slab) [ 29.471252] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.471573] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.471923] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.471985] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.472036] head: 0bfffe0000000001 ffffc1ffc325a201 00000000ffffffff 00000000ffffffff [ 29.472091] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 29.472129] page dumped because: kasan: bad access detected [ 29.472368] [ 29.472453] Memory state around the buggy address: [ 29.472492] fff00000c9688180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.472535] fff00000c9688200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.472575] >fff00000c9688280: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 29.472611] ^ [ 29.472844] fff00000c9688300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.472962] fff00000c9688380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.472999] ================================================================== [ 29.520788] ================================================================== [ 29.520826] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 29.520870] Write of size 1 at addr fff00000c9b060ea by task kunit_try_catch/193 [ 29.520916] [ 29.520943] CPU: 0 UID: 0 PID: 193 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.521085] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.521113] Hardware name: linux,dummy-virt (DT) [ 29.521142] Call trace: [ 29.521162] show_stack+0x20/0x38 (C) [ 29.521208] dump_stack_lvl+0x8c/0xd0 [ 29.521263] print_report+0x118/0x5d0 [ 29.521462] kasan_report+0xdc/0x128 [ 29.521505] __asan_report_store1_noabort+0x20/0x30 [ 29.521559] krealloc_less_oob_helper+0xae4/0xc50 [ 29.521638] krealloc_large_less_oob+0x20/0x38 [ 29.521684] kunit_try_run_case+0x170/0x3f0 [ 29.521732] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.521779] kthread+0x328/0x630 [ 29.521820] ret_from_fork+0x10/0x20 [ 29.521866] [ 29.521894] The buggy address belongs to the physical page: [ 29.521995] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b04 [ 29.522071] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.522115] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.522164] page_type: f8(unknown) [ 29.522200] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.522247] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.522294] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.522341] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.522388] head: 0bfffe0000000002 ffffc1ffc326c101 00000000ffffffff 00000000ffffffff [ 29.522434] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 29.522472] page dumped because: kasan: bad access detected [ 29.522501] [ 29.522518] Memory state around the buggy address: [ 29.522547] fff00000c9b05f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.522597] fff00000c9b06000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.522638] >fff00000c9b06080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 29.522674] ^ [ 29.522710] fff00000c9b06100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.522749] fff00000c9b06180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.522784] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 29.497207] ================================================================== [ 29.497262] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 29.497317] Write of size 1 at addr fff00000c9b060f0 by task kunit_try_catch/191 [ 29.497364] [ 29.497399] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.497515] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.497543] Hardware name: linux,dummy-virt (DT) [ 29.497574] Call trace: [ 29.497603] show_stack+0x20/0x38 (C) [ 29.497655] dump_stack_lvl+0x8c/0xd0 [ 29.497703] print_report+0x118/0x5d0 [ 29.497745] kasan_report+0xdc/0x128 [ 29.498086] __asan_report_store1_noabort+0x20/0x30 [ 29.498332] krealloc_more_oob_helper+0x5c0/0x678 [ 29.498456] krealloc_large_more_oob+0x20/0x38 [ 29.498559] kunit_try_run_case+0x170/0x3f0 [ 29.498677] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.498726] kthread+0x328/0x630 [ 29.498768] ret_from_fork+0x10/0x20 [ 29.498818] [ 29.498839] The buggy address belongs to the physical page: [ 29.498991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b04 [ 29.499161] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.499319] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.499471] page_type: f8(unknown) [ 29.499528] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.499689] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.499773] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.500057] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.500240] head: 0bfffe0000000002 ffffc1ffc326c101 00000000ffffffff 00000000ffffffff [ 29.500408] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 29.500473] page dumped because: kasan: bad access detected [ 29.500570] [ 29.500635] Memory state around the buggy address: [ 29.500684] fff00000c9b05f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.500726] fff00000c9b06000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.500766] >fff00000c9b06080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 29.500802] ^ [ 29.500866] fff00000c9b06100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.500907] fff00000c9b06180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.500943] ================================================================== [ 29.421835] ================================================================== [ 29.421904] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 29.421968] Write of size 1 at addr fff00000c96880eb by task kunit_try_catch/187 [ 29.422017] [ 29.422066] CPU: 0 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.422149] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.422175] Hardware name: linux,dummy-virt (DT) [ 29.422208] Call trace: [ 29.422496] show_stack+0x20/0x38 (C) [ 29.422635] dump_stack_lvl+0x8c/0xd0 [ 29.422962] print_report+0x118/0x5d0 [ 29.423332] kasan_report+0xdc/0x128 [ 29.423742] __asan_report_store1_noabort+0x20/0x30 [ 29.424384] krealloc_more_oob_helper+0x60c/0x678 [ 29.424440] krealloc_more_oob+0x20/0x38 [ 29.424487] kunit_try_run_case+0x170/0x3f0 [ 29.424536] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.424939] kthread+0x328/0x630 [ 29.425158] ret_from_fork+0x10/0x20 [ 29.425230] [ 29.425308] Allocated by task 187: [ 29.425396] kasan_save_stack+0x3c/0x68 [ 29.425450] kasan_save_track+0x20/0x40 [ 29.425488] kasan_save_alloc_info+0x40/0x58 [ 29.425524] __kasan_krealloc+0x118/0x178 [ 29.425950] krealloc_noprof+0x128/0x360 [ 29.425991] krealloc_more_oob_helper+0x168/0x678 [ 29.426031] krealloc_more_oob+0x20/0x38 [ 29.426077] kunit_try_run_case+0x170/0x3f0 [ 29.426137] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.426243] kthread+0x328/0x630 [ 29.426291] ret_from_fork+0x10/0x20 [ 29.426373] [ 29.426441] The buggy address belongs to the object at fff00000c9688000 [ 29.426441] which belongs to the cache kmalloc-256 of size 256 [ 29.426498] The buggy address is located 0 bytes to the right of [ 29.426498] allocated 235-byte region [fff00000c9688000, fff00000c96880eb) [ 29.426618] [ 29.426695] The buggy address belongs to the physical page: [ 29.426727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109688 [ 29.426968] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.427032] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.427110] page_type: f5(slab) [ 29.427152] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.427682] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.427765] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.427992] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.428234] head: 0bfffe0000000001 ffffc1ffc325a201 00000000ffffffff 00000000ffffffff [ 29.428284] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 29.428566] page dumped because: kasan: bad access detected [ 29.428605] [ 29.428624] Memory state around the buggy address: [ 29.428663] fff00000c9687f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.428710] fff00000c9688000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.428751] >fff00000c9688080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 29.428814] ^ [ 29.428853] fff00000c9688100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.428894] fff00000c9688180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.428930] ================================================================== [ 29.490706] ================================================================== [ 29.490774] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 29.490839] Write of size 1 at addr fff00000c9b060eb by task kunit_try_catch/191 [ 29.491028] [ 29.491123] CPU: 0 UID: 0 PID: 191 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.491774] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.491915] Hardware name: linux,dummy-virt (DT) [ 29.491948] Call trace: [ 29.491971] show_stack+0x20/0x38 (C) [ 29.492025] dump_stack_lvl+0x8c/0xd0 [ 29.492090] print_report+0x118/0x5d0 [ 29.492251] kasan_report+0xdc/0x128 [ 29.492294] __asan_report_store1_noabort+0x20/0x30 [ 29.492355] krealloc_more_oob_helper+0x60c/0x678 [ 29.492727] krealloc_large_more_oob+0x20/0x38 [ 29.492778] kunit_try_run_case+0x170/0x3f0 [ 29.492828] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.492877] kthread+0x328/0x630 [ 29.492919] ret_from_fork+0x10/0x20 [ 29.493172] [ 29.493198] The buggy address belongs to the physical page: [ 29.493329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b04 [ 29.493452] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.493622] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.493677] page_type: f8(unknown) [ 29.493719] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.493767] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.493822] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.493951] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.494124] head: 0bfffe0000000002 ffffc1ffc326c101 00000000ffffffff 00000000ffffffff [ 29.494313] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 29.494397] page dumped because: kasan: bad access detected [ 29.494499] [ 29.494517] Memory state around the buggy address: [ 29.494566] fff00000c9b05f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.494608] fff00000c9b06000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.494725] >fff00000c9b06080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 29.494890] ^ [ 29.494927] fff00000c9b06100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.494968] fff00000c9b06180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.495386] ================================================================== [ 29.430301] ================================================================== [ 29.430600] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 29.431127] Write of size 1 at addr fff00000c96880f0 by task kunit_try_catch/187 [ 29.431253] [ 29.431428] CPU: 0 UID: 0 PID: 187 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.431566] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.431591] Hardware name: linux,dummy-virt (DT) [ 29.431622] Call trace: [ 29.431644] show_stack+0x20/0x38 (C) [ 29.431699] dump_stack_lvl+0x8c/0xd0 [ 29.431778] print_report+0x118/0x5d0 [ 29.431964] kasan_report+0xdc/0x128 [ 29.432080] __asan_report_store1_noabort+0x20/0x30 [ 29.432129] krealloc_more_oob_helper+0x5c0/0x678 [ 29.432229] krealloc_more_oob+0x20/0x38 [ 29.432647] kunit_try_run_case+0x170/0x3f0 [ 29.432701] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.432912] kthread+0x328/0x630 [ 29.432959] ret_from_fork+0x10/0x20 [ 29.433045] [ 29.433151] Allocated by task 187: [ 29.433189] kasan_save_stack+0x3c/0x68 [ 29.433448] kasan_save_track+0x20/0x40 [ 29.433490] kasan_save_alloc_info+0x40/0x58 [ 29.433526] __kasan_krealloc+0x118/0x178 [ 29.433563] krealloc_noprof+0x128/0x360 [ 29.433608] krealloc_more_oob_helper+0x168/0x678 [ 29.433657] krealloc_more_oob+0x20/0x38 [ 29.433693] kunit_try_run_case+0x170/0x3f0 [ 29.433959] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.434159] kthread+0x328/0x630 [ 29.434229] ret_from_fork+0x10/0x20 [ 29.434265] [ 29.434284] The buggy address belongs to the object at fff00000c9688000 [ 29.434284] which belongs to the cache kmalloc-256 of size 256 [ 29.434351] The buggy address is located 5 bytes to the right of [ 29.434351] allocated 235-byte region [fff00000c9688000, fff00000c96880eb) [ 29.434451] [ 29.434506] The buggy address belongs to the physical page: [ 29.434541] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109688 [ 29.434592] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.434802] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.435094] page_type: f5(slab) [ 29.435233] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.435376] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.435425] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 29.435472] head: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.435733] head: 0bfffe0000000001 ffffc1ffc325a201 00000000ffffffff 00000000ffffffff [ 29.435785] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 29.435824] page dumped because: kasan: bad access detected [ 29.435925] [ 29.435943] Memory state around the buggy address: [ 29.436021] fff00000c9687f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.436100] fff00000c9688000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.436201] >fff00000c9688080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 29.436237] ^ [ 29.436275] fff00000c9688100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.436769] fff00000c9688180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.436832] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 29.403312] ================================================================== [ 29.403440] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 29.403506] Read of size 1 at addr fff00000c9b40000 by task kunit_try_catch/185 [ 29.403888] [ 29.404082] CPU: 0 UID: 0 PID: 185 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.404384] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.404872] Hardware name: linux,dummy-virt (DT) [ 29.405008] Call trace: [ 29.405032] show_stack+0x20/0x38 (C) [ 29.405139] dump_stack_lvl+0x8c/0xd0 [ 29.405192] print_report+0x118/0x5d0 [ 29.405237] kasan_report+0xdc/0x128 [ 29.405279] __asan_report_load1_noabort+0x20/0x30 [ 29.405405] page_alloc_uaf+0x328/0x350 [ 29.405615] kunit_try_run_case+0x170/0x3f0 [ 29.405664] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.405715] kthread+0x328/0x630 [ 29.405757] ret_from_fork+0x10/0x20 [ 29.405872] [ 29.405978] The buggy address belongs to the physical page: [ 29.406077] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b40 [ 29.406133] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.406183] page_type: f0(buddy) [ 29.406249] raw: 0bfffe0000000000 fff00000ff6161b0 fff00000ff6161b0 0000000000000000 [ 29.407097] raw: 0000000000000000 0000000000000006 00000000f0000000 0000000000000000 [ 29.407195] page dumped because: kasan: bad access detected [ 29.407243] [ 29.407291] Memory state around the buggy address: [ 29.407878] fff00000c9b3ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.407928] fff00000c9b3ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.407970] >fff00000c9b40000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.408006] ^ [ 29.408103] fff00000c9b40080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.408254] fff00000c9b40100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.408291] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree
[ 29.370935] ================================================================== [ 29.371281] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 29.371370] Free of addr fff00000c9b00001 by task kunit_try_catch/181 [ 29.371506] [ 29.371579] CPU: 0 UID: 0 PID: 181 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.371817] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.372026] Hardware name: linux,dummy-virt (DT) [ 29.372129] Call trace: [ 29.372156] show_stack+0x20/0x38 (C) [ 29.372329] dump_stack_lvl+0x8c/0xd0 [ 29.372528] print_report+0x118/0x5d0 [ 29.372579] kasan_report_invalid_free+0xc0/0xe8 [ 29.372649] __kasan_kfree_large+0x5c/0xa8 [ 29.372705] free_large_kmalloc+0x68/0x150 [ 29.372752] kfree+0x270/0x3c8 [ 29.372794] kmalloc_large_invalid_free+0x108/0x270 [ 29.373268] kunit_try_run_case+0x170/0x3f0 [ 29.373570] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.373995] kthread+0x328/0x630 [ 29.374319] ret_from_fork+0x10/0x20 [ 29.374573] [ 29.374596] The buggy address belongs to the physical page: [ 29.375366] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b00 [ 29.376281] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.376830] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.376905] page_type: f8(unknown) [ 29.376949] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.376998] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.377056] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.377104] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.377151] head: 0bfffe0000000002 ffffc1ffc326c001 00000000ffffffff 00000000ffffffff [ 29.377198] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 29.377236] page dumped because: kasan: bad access detected [ 29.377266] [ 29.377287] Memory state around the buggy address: [ 29.377318] fff00000c9afff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.377363] fff00000c9afff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.377404] >fff00000c9b00000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.377440] ^ [ 29.377467] fff00000c9b00080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.377508] fff00000c9b00100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.377560] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 29.361332] ================================================================== [ 29.361400] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 29.361458] Read of size 1 at addr fff00000c9b00000 by task kunit_try_catch/179 [ 29.361506] [ 29.361544] CPU: 0 UID: 0 PID: 179 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.361637] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.361663] Hardware name: linux,dummy-virt (DT) [ 29.361693] Call trace: [ 29.361716] show_stack+0x20/0x38 (C) [ 29.361901] dump_stack_lvl+0x8c/0xd0 [ 29.362114] print_report+0x118/0x5d0 [ 29.362275] kasan_report+0xdc/0x128 [ 29.362373] __asan_report_load1_noabort+0x20/0x30 [ 29.362511] kmalloc_large_uaf+0x2cc/0x2f8 [ 29.362596] kunit_try_run_case+0x170/0x3f0 [ 29.362644] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.362965] kthread+0x328/0x630 [ 29.363016] ret_from_fork+0x10/0x20 [ 29.363374] [ 29.363449] The buggy address belongs to the physical page: [ 29.363566] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b00 [ 29.363681] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.363845] raw: 0bfffe0000000000 ffffc1ffc326c108 fff00000da456d00 0000000000000000 [ 29.363895] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 29.363964] page dumped because: kasan: bad access detected [ 29.364242] [ 29.364306] Memory state around the buggy address: [ 29.364413] fff00000c9afff00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.364576] fff00000c9afff80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.364661] >fff00000c9b00000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.364709] ^ [ 29.364744] fff00000c9b00080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.364881] fff00000c9b00100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 29.364937] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 29.350099] ================================================================== [ 29.350209] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 29.350261] Write of size 1 at addr fff00000c9a1a00a by task kunit_try_catch/177 [ 29.350317] [ 29.350352] CPU: 0 UID: 0 PID: 177 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.350588] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.350618] Hardware name: linux,dummy-virt (DT) [ 29.350649] Call trace: [ 29.350844] show_stack+0x20/0x38 (C) [ 29.350945] dump_stack_lvl+0x8c/0xd0 [ 29.351014] print_report+0x118/0x5d0 [ 29.351070] kasan_report+0xdc/0x128 [ 29.351128] __asan_report_store1_noabort+0x20/0x30 [ 29.351180] kmalloc_large_oob_right+0x278/0x2b8 [ 29.351226] kunit_try_run_case+0x170/0x3f0 [ 29.351282] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.351357] kthread+0x328/0x630 [ 29.351400] ret_from_fork+0x10/0x20 [ 29.351447] [ 29.351514] The buggy address belongs to the physical page: [ 29.351583] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a18 [ 29.351681] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.351747] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.351806] page_type: f8(unknown) [ 29.352039] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.352112] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.352526] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 29.352579] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 29.352811] head: 0bfffe0000000002 ffffc1ffc3268601 00000000ffffffff 00000000ffffffff [ 29.353184] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 29.353247] page dumped because: kasan: bad access detected [ 29.353335] [ 29.353415] Memory state around the buggy address: [ 29.353527] fff00000c9a19f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.353926] fff00000c9a19f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.353981] >fff00000c9a1a000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.354018] ^ [ 29.354059] fff00000c9a1a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.354110] fff00000c9a1a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 29.354148] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 29.339594] ================================================================== [ 29.339676] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 29.339760] Write of size 1 at addr fff00000c659df00 by task kunit_try_catch/175 [ 29.339826] [ 29.339883] CPU: 0 UID: 0 PID: 175 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.340175] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.340286] Hardware name: linux,dummy-virt (DT) [ 29.340457] Call trace: [ 29.340574] show_stack+0x20/0x38 (C) [ 29.340682] dump_stack_lvl+0x8c/0xd0 [ 29.340793] print_report+0x118/0x5d0 [ 29.340878] kasan_report+0xdc/0x128 [ 29.340918] __asan_report_store1_noabort+0x20/0x30 [ 29.340965] kmalloc_big_oob_right+0x2a4/0x2f0 [ 29.341033] kunit_try_run_case+0x170/0x3f0 [ 29.341091] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.341139] kthread+0x328/0x630 [ 29.341180] ret_from_fork+0x10/0x20 [ 29.341228] [ 29.341247] Allocated by task 175: [ 29.341275] kasan_save_stack+0x3c/0x68 [ 29.341316] kasan_save_track+0x20/0x40 [ 29.341496] kasan_save_alloc_info+0x40/0x58 [ 29.341608] __kasan_kmalloc+0xd4/0xd8 [ 29.341729] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.341827] kmalloc_big_oob_right+0xb8/0x2f0 [ 29.341884] kunit_try_run_case+0x170/0x3f0 [ 29.342185] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.342325] kthread+0x328/0x630 [ 29.342409] ret_from_fork+0x10/0x20 [ 29.342542] [ 29.342563] The buggy address belongs to the object at fff00000c659c000 [ 29.342563] which belongs to the cache kmalloc-8k of size 8192 [ 29.342638] The buggy address is located 0 bytes to the right of [ 29.342638] allocated 7936-byte region [fff00000c659c000, fff00000c659df00) [ 29.342722] [ 29.342745] The buggy address belongs to the physical page: [ 29.342777] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106598 [ 29.342845] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.342910] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.342980] page_type: f5(slab) [ 29.343021] raw: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 29.343079] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 29.343127] head: 0bfffe0000000040 fff00000c0002280 dead000000000122 0000000000000000 [ 29.343174] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 29.343220] head: 0bfffe0000000003 ffffc1ffc3196601 00000000ffffffff 00000000ffffffff [ 29.343266] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 29.343304] page dumped because: kasan: bad access detected [ 29.343342] [ 29.343360] Memory state around the buggy address: [ 29.343400] fff00000c659de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.343448] fff00000c659de80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.343498] >fff00000c659df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.343533] ^ [ 29.343559] fff00000c659df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.343614] fff00000c659e000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.343658] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[ 29.327939] ================================================================== [ 29.328063] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488 [ 29.328181] Write of size 1 at addr fff00000c636a878 by task kunit_try_catch/173 [ 29.328343] [ 29.328478] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.328640] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.328780] Hardware name: linux,dummy-virt (DT) [ 29.328865] Call trace: [ 29.328904] show_stack+0x20/0x38 (C) [ 29.328953] dump_stack_lvl+0x8c/0xd0 [ 29.329002] print_report+0x118/0x5d0 [ 29.329074] kasan_report+0xdc/0x128 [ 29.329119] __asan_report_store1_noabort+0x20/0x30 [ 29.329174] kmalloc_track_caller_oob_right+0x418/0x488 [ 29.329228] kunit_try_run_case+0x170/0x3f0 [ 29.329276] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.329364] kthread+0x328/0x630 [ 29.329658] ret_from_fork+0x10/0x20 [ 29.329828] [ 29.329897] Allocated by task 173: [ 29.329994] kasan_save_stack+0x3c/0x68 [ 29.330369] kasan_save_track+0x20/0x40 [ 29.330418] kasan_save_alloc_info+0x40/0x58 [ 29.330512] __kasan_kmalloc+0xd4/0xd8 [ 29.330600] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 29.330647] kmalloc_track_caller_oob_right+0x184/0x488 [ 29.330691] kunit_try_run_case+0x170/0x3f0 [ 29.330752] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.330795] kthread+0x328/0x630 [ 29.330827] ret_from_fork+0x10/0x20 [ 29.330877] [ 29.330914] The buggy address belongs to the object at fff00000c636a800 [ 29.330914] which belongs to the cache kmalloc-128 of size 128 [ 29.330985] The buggy address is located 0 bytes to the right of [ 29.330985] allocated 120-byte region [fff00000c636a800, fff00000c636a878) [ 29.331073] [ 29.331110] The buggy address belongs to the physical page: [ 29.331143] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10636a [ 29.331201] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.331268] page_type: f5(slab) [ 29.331306] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.331361] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.331404] page dumped because: kasan: bad access detected [ 29.331443] [ 29.331460] Memory state around the buggy address: [ 29.331491] fff00000c636a700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.331538] fff00000c636a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.331585] >fff00000c636a800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.331630] ^ [ 29.331673] fff00000c636a880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.331718] fff00000c636a900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.331760] ================================================================== [ 29.321899] ================================================================== [ 29.321991] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 29.322122] Write of size 1 at addr fff00000c636a778 by task kunit_try_catch/173 [ 29.322177] [ 29.322212] CPU: 0 UID: 0 PID: 173 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.322368] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.322394] Hardware name: linux,dummy-virt (DT) [ 29.322453] Call trace: [ 29.322481] show_stack+0x20/0x38 (C) [ 29.322529] dump_stack_lvl+0x8c/0xd0 [ 29.322836] print_report+0x118/0x5d0 [ 29.322896] kasan_report+0xdc/0x128 [ 29.322939] __asan_report_store1_noabort+0x20/0x30 [ 29.323077] kmalloc_track_caller_oob_right+0x40c/0x488 [ 29.323129] kunit_try_run_case+0x170/0x3f0 [ 29.323233] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.323308] kthread+0x328/0x630 [ 29.323395] ret_from_fork+0x10/0x20 [ 29.323447] [ 29.323466] Allocated by task 173: [ 29.323494] kasan_save_stack+0x3c/0x68 [ 29.323535] kasan_save_track+0x20/0x40 [ 29.323573] kasan_save_alloc_info+0x40/0x58 [ 29.323668] __kasan_kmalloc+0xd4/0xd8 [ 29.323706] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 29.323753] kmalloc_track_caller_oob_right+0xa8/0x488 [ 29.323797] kunit_try_run_case+0x170/0x3f0 [ 29.323836] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.324057] kthread+0x328/0x630 [ 29.324306] ret_from_fork+0x10/0x20 [ 29.324406] [ 29.324454] The buggy address belongs to the object at fff00000c636a700 [ 29.324454] which belongs to the cache kmalloc-128 of size 128 [ 29.324621] The buggy address is located 0 bytes to the right of [ 29.324621] allocated 120-byte region [fff00000c636a700, fff00000c636a778) [ 29.324694] [ 29.324725] The buggy address belongs to the physical page: [ 29.324761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10636a [ 29.324822] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.324874] page_type: f5(slab) [ 29.324913] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.324967] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.325011] page dumped because: kasan: bad access detected [ 29.325044] [ 29.325073] Memory state around the buggy address: [ 29.325106] fff00000c636a600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.325152] fff00000c636a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.325198] >fff00000c636a700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 29.325262] ^ [ 29.325307] fff00000c636a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.325354] fff00000c636a800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.325556] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 29.310269] ================================================================== [ 29.310332] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 29.310386] Read of size 1 at addr fff00000c8f19000 by task kunit_try_catch/171 [ 29.310481] [ 29.310515] CPU: 0 UID: 0 PID: 171 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.310857] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.310958] Hardware name: linux,dummy-virt (DT) [ 29.310994] Call trace: [ 29.311110] show_stack+0x20/0x38 (C) [ 29.311164] dump_stack_lvl+0x8c/0xd0 [ 29.311212] print_report+0x118/0x5d0 [ 29.311253] kasan_report+0xdc/0x128 [ 29.311294] __asan_report_load1_noabort+0x20/0x30 [ 29.311543] kmalloc_node_oob_right+0x2f4/0x330 [ 29.311617] kunit_try_run_case+0x170/0x3f0 [ 29.311719] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.311808] kthread+0x328/0x630 [ 29.311909] ret_from_fork+0x10/0x20 [ 29.311974] [ 29.312013] Allocated by task 171: [ 29.312099] kasan_save_stack+0x3c/0x68 [ 29.312144] kasan_save_track+0x20/0x40 [ 29.312190] kasan_save_alloc_info+0x40/0x58 [ 29.312257] __kasan_kmalloc+0xd4/0xd8 [ 29.312375] __kmalloc_cache_node_noprof+0x178/0x3d0 [ 29.312435] kmalloc_node_oob_right+0xbc/0x330 [ 29.312540] kunit_try_run_case+0x170/0x3f0 [ 29.312598] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.312676] kthread+0x328/0x630 [ 29.312707] ret_from_fork+0x10/0x20 [ 29.312741] [ 29.312759] The buggy address belongs to the object at fff00000c8f18000 [ 29.312759] which belongs to the cache kmalloc-4k of size 4096 [ 29.312960] The buggy address is located 0 bytes to the right of [ 29.312960] allocated 4096-byte region [fff00000c8f18000, fff00000c8f19000) [ 29.313023] [ 29.313043] The buggy address belongs to the physical page: [ 29.313127] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108f18 [ 29.313621] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 29.313689] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 29.313862] page_type: f5(slab) [ 29.314013] raw: 0bfffe0000000040 fff00000c0002140 dead000000000100 dead000000000122 [ 29.314160] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 29.314236] head: 0bfffe0000000040 fff00000c0002140 dead000000000100 dead000000000122 [ 29.314332] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 29.314426] head: 0bfffe0000000003 ffffc1ffc323c601 00000000ffffffff 00000000ffffffff [ 29.314476] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 29.314556] page dumped because: kasan: bad access detected [ 29.314585] [ 29.314603] Memory state around the buggy address: [ 29.314633] fff00000c8f18f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.314718] fff00000c8f18f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 29.314761] >fff00000c8f19000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.314796] ^ [ 29.314823] fff00000c8f19080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.314892] fff00000c8f19100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.314966] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 29.299790] ================================================================== [ 29.299880] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 29.299936] Read of size 1 at addr fff00000c64c1a5f by task kunit_try_catch/169 [ 29.300012] [ 29.300207] CPU: 0 UID: 0 PID: 169 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.300374] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.300497] Hardware name: linux,dummy-virt (DT) [ 29.300550] Call trace: [ 29.300609] show_stack+0x20/0x38 (C) [ 29.300695] dump_stack_lvl+0x8c/0xd0 [ 29.300772] print_report+0x118/0x5d0 [ 29.300815] kasan_report+0xdc/0x128 [ 29.300894] __asan_report_load1_noabort+0x20/0x30 [ 29.300941] kmalloc_oob_left+0x2ec/0x320 [ 29.300985] kunit_try_run_case+0x170/0x3f0 [ 29.301032] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.301093] kthread+0x328/0x630 [ 29.301134] ret_from_fork+0x10/0x20 [ 29.301182] [ 29.301200] Allocated by task 110: [ 29.301229] kasan_save_stack+0x3c/0x68 [ 29.301268] kasan_save_track+0x20/0x40 [ 29.301305] kasan_save_alloc_info+0x40/0x58 [ 29.301340] __kasan_kmalloc+0xd4/0xd8 [ 29.301375] __kmalloc_noprof+0x198/0x4c8 [ 29.301412] kunit_kmalloc_array+0x34/0x88 [ 29.301448] test_readerwriter+0x3b0/0x948 [ 29.301623] kunit_try_run_case+0x170/0x3f0 [ 29.301669] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.301797] kthread+0x328/0x630 [ 29.301916] ret_from_fork+0x10/0x20 [ 29.302013] [ 29.302148] The buggy address belongs to the object at fff00000c64c1a40 [ 29.302148] which belongs to the cache kmalloc-16 of size 16 [ 29.302223] The buggy address is located 15 bytes to the right of [ 29.302223] allocated 16-byte region [fff00000c64c1a40, fff00000c64c1a50) [ 29.302512] [ 29.302577] The buggy address belongs to the physical page: [ 29.302625] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c64c1a40 pfn:0x1064c1 [ 29.302758] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.302896] page_type: f5(slab) [ 29.302959] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 29.303311] raw: fff00000c64c1a40 000000008080007f 00000000f5000000 0000000000000000 [ 29.303423] page dumped because: kasan: bad access detected [ 29.303571] [ 29.303655] Memory state around the buggy address: [ 29.303688] fff00000c64c1900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.303784] fff00000c64c1980: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 29.304070] >fff00000c64c1a00: fa fb fc fc fa fb fc fc fa fb fc fc 00 07 fc fc [ 29.304110] ^ [ 29.304154] fff00000c64c1a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.304432] fff00000c64c1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.304566] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 29.285067] ================================================================== [ 29.285107] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 29.285188] Write of size 1 at addr fff00000c636a678 by task kunit_try_catch/167 [ 29.285264] [ 29.285323] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.285424] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.285450] Hardware name: linux,dummy-virt (DT) [ 29.285496] Call trace: [ 29.285526] show_stack+0x20/0x38 (C) [ 29.285575] dump_stack_lvl+0x8c/0xd0 [ 29.285627] print_report+0x118/0x5d0 [ 29.285669] kasan_report+0xdc/0x128 [ 29.285711] __asan_report_store1_noabort+0x20/0x30 [ 29.285879] kmalloc_oob_right+0x538/0x660 [ 29.285940] kunit_try_run_case+0x170/0x3f0 [ 29.286017] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.286079] kthread+0x328/0x630 [ 29.286158] ret_from_fork+0x10/0x20 [ 29.286258] [ 29.286276] Allocated by task 167: [ 29.286303] kasan_save_stack+0x3c/0x68 [ 29.286361] kasan_save_track+0x20/0x40 [ 29.286399] kasan_save_alloc_info+0x40/0x58 [ 29.286434] __kasan_kmalloc+0xd4/0xd8 [ 29.286469] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.286507] kmalloc_oob_right+0xb0/0x660 [ 29.286543] kunit_try_run_case+0x170/0x3f0 [ 29.286580] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.286785] kthread+0x328/0x630 [ 29.286824] ret_from_fork+0x10/0x20 [ 29.286915] [ 29.286936] The buggy address belongs to the object at fff00000c636a600 [ 29.286936] which belongs to the cache kmalloc-128 of size 128 [ 29.286996] The buggy address is located 5 bytes to the right of [ 29.286996] allocated 115-byte region [fff00000c636a600, fff00000c636a673) [ 29.287067] [ 29.287086] The buggy address belongs to the physical page: [ 29.287218] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10636a [ 29.287273] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.287321] page_type: f5(slab) [ 29.287357] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.287477] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.287517] page dumped because: kasan: bad access detected [ 29.287546] [ 29.287563] Memory state around the buggy address: [ 29.287592] fff00000c636a500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.287633] fff00000c636a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.287673] >fff00000c636a600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.287719] ^ [ 29.287757] fff00000c636a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.287796] fff00000c636a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.287831] ================================================================== [ 29.271563] ================================================================== [ 29.271883] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 29.272849] Write of size 1 at addr fff00000c636a673 by task kunit_try_catch/167 [ 29.273176] [ 29.274038] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.274199] Tainted: [N]=TEST [ 29.274231] Hardware name: linux,dummy-virt (DT) [ 29.274454] Call trace: [ 29.275005] show_stack+0x20/0x38 (C) [ 29.275342] dump_stack_lvl+0x8c/0xd0 [ 29.275398] print_report+0x118/0x5d0 [ 29.275441] kasan_report+0xdc/0x128 [ 29.275482] __asan_report_store1_noabort+0x20/0x30 [ 29.275529] kmalloc_oob_right+0x5a4/0x660 [ 29.275574] kunit_try_run_case+0x170/0x3f0 [ 29.275625] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.275673] kthread+0x328/0x630 [ 29.275715] ret_from_fork+0x10/0x20 [ 29.276151] [ 29.276201] Allocated by task 167: [ 29.276320] kasan_save_stack+0x3c/0x68 [ 29.276386] kasan_save_track+0x20/0x40 [ 29.276423] kasan_save_alloc_info+0x40/0x58 [ 29.276458] __kasan_kmalloc+0xd4/0xd8 [ 29.276494] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.276533] kmalloc_oob_right+0xb0/0x660 [ 29.276568] kunit_try_run_case+0x170/0x3f0 [ 29.276606] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.276713] kthread+0x328/0x630 [ 29.276783] ret_from_fork+0x10/0x20 [ 29.276840] [ 29.277146] The buggy address belongs to the object at fff00000c636a600 [ 29.277146] which belongs to the cache kmalloc-128 of size 128 [ 29.277413] The buggy address is located 0 bytes to the right of [ 29.277413] allocated 115-byte region [fff00000c636a600, fff00000c636a673) [ 29.277563] [ 29.277902] The buggy address belongs to the physical page: [ 29.278591] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10636a [ 29.280235] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.281322] page_type: f5(slab) [ 29.282044] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.282219] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.282496] page dumped because: kasan: bad access detected [ 29.282541] [ 29.282567] Memory state around the buggy address: [ 29.282868] fff00000c636a500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 29.282980] fff00000c636a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.283034] >fff00000c636a600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.283227] ^ [ 29.283559] fff00000c636a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.283633] fff00000c636a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.283727] ================================================================== [ 29.287960] ================================================================== [ 29.287996] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 29.288037] Read of size 1 at addr fff00000c636a680 by task kunit_try_catch/167 [ 29.288452] [ 29.288514] CPU: 0 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 29.288686] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.288723] Hardware name: linux,dummy-virt (DT) [ 29.288752] Call trace: [ 29.288774] show_stack+0x20/0x38 (C) [ 29.288821] dump_stack_lvl+0x8c/0xd0 [ 29.288865] print_report+0x118/0x5d0 [ 29.288943] kasan_report+0xdc/0x128 [ 29.288986] __asan_report_load1_noabort+0x20/0x30 [ 29.289032] kmalloc_oob_right+0x5d0/0x660 [ 29.289088] kunit_try_run_case+0x170/0x3f0 [ 29.289134] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.289181] kthread+0x328/0x630 [ 29.289223] ret_from_fork+0x10/0x20 [ 29.289268] [ 29.289285] Allocated by task 167: [ 29.289311] kasan_save_stack+0x3c/0x68 [ 29.289392] kasan_save_track+0x20/0x40 [ 29.289491] kasan_save_alloc_info+0x40/0x58 [ 29.289618] __kasan_kmalloc+0xd4/0xd8 [ 29.289756] __kmalloc_cache_noprof+0x16c/0x3c0 [ 29.289986] kmalloc_oob_right+0xb0/0x660 [ 29.290026] kunit_try_run_case+0x170/0x3f0 [ 29.290073] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.290112] kthread+0x328/0x630 [ 29.290143] ret_from_fork+0x10/0x20 [ 29.290176] [ 29.290291] The buggy address belongs to the object at fff00000c636a600 [ 29.290291] which belongs to the cache kmalloc-128 of size 128 [ 29.290472] The buggy address is located 13 bytes to the right of [ 29.290472] allocated 115-byte region [fff00000c636a600, fff00000c636a673) [ 29.290638] [ 29.290720] The buggy address belongs to the physical page: [ 29.290748] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10636a [ 29.290888] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.290936] page_type: f5(slab) [ 29.290971] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 29.291018] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 29.291238] page dumped because: kasan: bad access detected [ 29.291358] [ 29.291462] Memory state around the buggy address: [ 29.291619] fff00000c636a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.291673] fff00000c636a600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 29.291713] >fff00000c636a680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.291748] ^ [ 29.291827] fff00000c636a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.291960] fff00000c636a780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.292074] ==================================================================
Failure - log-parser-boot/exception-warning-libmathint_log-at-intlog10
------------[ cut here ]------------ [ 110.462176] WARNING: lib/math/int_log.c:120 at intlog10+0x38/0x48, CPU#0: kunit_try_catch/689 [ 110.463851] Modules linked in: [ 110.464923] CPU: 0 UID: 0 PID: 689 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 110.466750] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 110.467356] Hardware name: linux,dummy-virt (DT) [ 110.467863] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 110.468708] pc : intlog10+0x38/0x48 [ 110.469182] lr : intlog10_test+0xe4/0x200 [ 110.469748] sp : ffff800082407c10 [ 110.470153] x29: ffff800082407c90 x28: 0000000000000000 x27: 0000000000000000 [ 110.470924] x26: 1ffe0000188a6061 x25: 0000000000000000 x24: ffff800082407ce0 [ 110.471279] x23: ffff800082407d00 x22: 0000000000000000 x21: 1ffff00010480f82 [ 110.471619] x20: ffffb0784d42f2e0 x19: ffff800080087990 x18: 000000009798dd76 [ 110.471954] x17: 000000004b0ec465 x16: fff00000c932843c x15: fff00000ff616b48 [ 110.472984] x14: 00000000f1f1f1f1 x13: 1ffe00001b48e9dd x12: ffff760f0a263189 [ 110.473803] x11: 1ffff60f0a263188 x10: ffff760f0a263188 x9 : ffffb0784aa4c0cc [ 110.474585] x8 : ffffb07851318c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 110.475361] x5 : ffff700010480f82 x4 : 1ffff00010010f3b x3 : 1ffff60f09a85e5c [ 110.476136] x2 : 1ffff60f09a85e5c x1 : 0000000000000003 x0 : 0000000000000000 [ 110.477257] Call trace: [ 110.477552] intlog10+0x38/0x48 (P) [ 110.478124] kunit_try_run_case+0x170/0x3f0 [ 110.478611] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 110.479203] kthread+0x328/0x630 [ 110.479600] ret_from_fork+0x10/0x20 [ 110.480023] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-libmathint_log-at-intlog2
------------[ cut here ]------------ [ 110.420467] WARNING: lib/math/int_log.c:63 at intlog2+0xd8/0xf8, CPU#1: kunit_try_catch/671 [ 110.421357] Modules linked in: [ 110.421651] CPU: 1 UID: 0 PID: 671 Comm: kunit_try_catch Tainted: G B D N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 110.422172] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 110.422455] Hardware name: linux,dummy-virt (DT) [ 110.422676] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 110.423076] pc : intlog2+0xd8/0xf8 [ 110.423305] lr : intlog2_test+0xe4/0x200 [ 110.423521] sp : ffff800082377c10 [ 110.423732] x29: ffff800082377c90 x28: 0000000000000000 x27: 0000000000000000 [ 110.424201] x26: 1ffe0000191d2f61 x25: 0000000000000000 x24: ffff800082377ce0 [ 110.424670] x23: ffff800082377d00 x22: 0000000000000000 x21: 1ffff0001046ef82 [ 110.425144] x20: ffffb0784d42f1e0 x19: ffff800080087990 x18: 000000009f0f53ff [ 110.425633] x17: 00000000066f06ab x16: fff00000c932803c x15: fff00000ff616b48 [ 110.426036] x14: 0000000000018fff x13: 1ffe00001b48a5dd x12: ffff760f0a263189 [ 110.426442] x11: 1ffff60f0a263188 x10: ffff760f0a263188 x9 : ffffb0784aa4c2cc [ 110.426870] x8 : ffffb07851318c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 110.427310] x5 : ffff70001046ef82 x4 : 1ffff00010010f3b x3 : 1ffff60f09a85e3c [ 110.427714] x2 : 1ffff60f09a85e3c x1 : 0000000000000003 x0 : 0000000000000000 [ 110.428109] Call trace: [ 110.428297] intlog2+0xd8/0xf8 (P) [ 110.428502] kunit_try_run_case+0x170/0x3f0 [ 110.428769] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 110.429083] kthread+0x328/0x630 [ 110.429348] ret_from_fork+0x10/0x20 [ 110.429605] ---[ end trace 0000000000000000 ]---