Date
July 14, 2025, 10:38 a.m.
Failure - log-parser-boot/internal-error-oops-oops-smp
[ 178.059421] Internal error: Oops: 0000000096000005 [#1] SMP [ 178.065017] Modules linked in: [ 178.068060] CPU: 3 UID: 0 PID: 617 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 178.079170] Tainted: [B]=BAD_PAGE, [N]=TEST [ 178.083327] Hardware name: WinLink E850-96 board (DT) [ 178.088365] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 178.095306] pc : kunit_test_null_dereference+0x70/0x170 [ 178.100515] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 178.106329] sp : ffff80008a777d30 [ 178.109627] x29: ffff80008a777d90 x28: 0000000000000000 x27: 0000000000000000 [ 178.116745] x26: 1fffe0010032b301 x25: 0000000000000000 x24: 0000000000000004 [ 178.123863] x23: ffff00080195980c x22: ffff800081238b58 x21: ffff00080138e508 [ 178.130981] x20: 1ffff000114eefa6 x19: ffff800087d07990 x18: 000000004a334020 [ 178.138099] x17: 0000000000000001 x16: ffff00085af85da8 x15: ffff8000812294d0 [ 178.145217] x14: ffff8000808fff7c x13: 1fffe0010095dd94 x12: ffff600100ceedc4 [ 178.152335] x11: 1fffe00100ceedc3 x10: ffff600100ceedc3 x9 : ffff8000812302e8 [ 178.159453] x8 : ffff80008a777c18 x7 : 0000000000000000 x6 : 0000000041b58ab3 [ 178.166571] x5 : ffff7000114eefa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 178.173689] x2 : dfff800000000000 x1 : ffff000806776540 x0 : ffff800087d07990 [ 178.180809] Call trace: [ 178.183241] kunit_test_null_dereference+0x70/0x170 (P) [ 178.188448] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 178.193915] kthread+0x328/0x630 [ 178.197128] ret_from_fork+0x10/0x20 [ 178.200699] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 178.206768] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/panic-multiline-kernel-panic-not-syncing-vfs-unable-to-mount-root-fs-on-unknown-block
[ 281.045173] Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0) [ 281.053414] SMP: stopping secondary CPUs [ 281.057338] Kernel Offset: disabled [ 281.060788] CPU features: 0x20000,00000000,10023140,0400721b [ 281.066432] Memory Limit: none [ 281.069503] ---[ end Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0) ]---
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc
[ 115.433863] ================================================================== [ 115.433997] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 115.433997] [ 115.434144] Use-after-free read at 0x(____ptrval____) (in kfence-#213): [ 115.434256] test_krealloc+0x51c/0x830 [ 115.437396] kunit_try_run_case+0x170/0x3f0 [ 115.441563] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 115.447031] kthread+0x328/0x630 [ 115.450243] ret_from_fork+0x10/0x20 [ 115.453802] [ 115.455280] kfence-#213: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 115.455280] [ 115.464917] allocated by task 421 on cpu 3 at 115.433767s (0.031145s ago): [ 115.471792] test_alloc+0x29c/0x628 [ 115.475243] test_krealloc+0xc0/0x830 [ 115.478888] kunit_try_run_case+0x170/0x3f0 [ 115.483055] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 115.488524] kthread+0x328/0x630 [ 115.491735] ret_from_fork+0x10/0x20 [ 115.495296] [ 115.496772] freed by task 421 on cpu 3 at 115.433799s (0.062970s ago): [ 115.503302] krealloc_noprof+0x148/0x360 [ 115.507186] test_krealloc+0x1dc/0x830 [ 115.510919] kunit_try_run_case+0x170/0x3f0 [ 115.515086] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 115.520554] kthread+0x328/0x630 [ 115.523766] ret_from_fork+0x10/0x20 [ 115.527326] [ 115.528812] CPU: 3 UID: 0 PID: 421 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 115.539921] Tainted: [B]=BAD_PAGE, [N]=TEST [ 115.544080] Hardware name: WinLink E850-96 board (DT) [ 115.549117] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[ 115.209340] ================================================================== [ 115.209484] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 115.209484] [ 115.209651] Use-after-free read at 0x(____ptrval____) (in kfence-#211): [ 115.210540] test_memcache_typesafe_by_rcu+0x280/0x560 [ 115.215660] kunit_try_run_case+0x170/0x3f0 [ 115.219827] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 115.225295] kthread+0x328/0x630 [ 115.228507] ret_from_fork+0x10/0x20 [ 115.232066] [ 115.233544] kfence-#211: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 115.233544] [ 115.242660] allocated by task 419 on cpu 7 at 115.165812s (0.076844s ago): [ 115.249532] test_alloc+0x230/0x628 [ 115.252985] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 115.258107] kunit_try_run_case+0x170/0x3f0 [ 115.262274] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 115.267743] kthread+0x328/0x630 [ 115.270954] ret_from_fork+0x10/0x20 [ 115.274515] [ 115.275991] freed by task 419 on cpu 7 at 115.165830s (0.110158s ago): [ 115.282512] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 115.287621] kunit_try_run_case+0x170/0x3f0 [ 115.291787] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 115.297256] kthread+0x328/0x630 [ 115.300468] ret_from_fork+0x10/0x20 [ 115.304028] [ 115.305514] CPU: 7 UID: 0 PID: 419 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 115.316622] Tainted: [B]=BAD_PAGE, [N]=TEST [ 115.320781] Hardware name: WinLink E850-96 board (DT) [ 115.325818] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access
[ 91.986200] ================================================================== [ 91.986400] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 91.986400] [ 91.986562] Invalid read at 0x(____ptrval____): [ 91.987666] test_invalid_access+0xdc/0x1f0 [ 91.991892] kunit_try_run_case+0x170/0x3f0 [ 91.996050] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 92.001505] kthread+0x328/0x630 [ 92.004730] ret_from_fork+0x10/0x20 [ 92.008287] [ 92.009771] CPU: 2 UID: 0 PID: 415 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 92.020875] Tainted: [B]=BAD_PAGE, [N]=TEST [ 92.025039] Hardware name: WinLink E850-96 board (DT) [ 92.030074] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[ 91.637852] ================================================================== [ 91.637984] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 91.637984] [ 91.638135] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#206): [ 91.641818] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 91.647026] kunit_try_run_case+0x170/0x3f0 [ 91.651193] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 91.656661] kthread+0x328/0x630 [ 91.659873] ret_from_fork+0x10/0x20 [ 91.663432] [ 91.664911] kfence-#206: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96 [ 91.664911] [ 91.674547] allocated by task 409 on cpu 4 at 91.637775s (0.036770s ago): [ 91.681332] test_alloc+0x29c/0x628 [ 91.684786] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 91.689907] kunit_try_run_case+0x170/0x3f0 [ 91.694073] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 91.699544] kthread+0x328/0x630 [ 91.702754] ret_from_fork+0x10/0x20 [ 91.706315] [ 91.707791] freed by task 409 on cpu 4 at 91.637790s (0.069999s ago): [ 91.714231] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 91.719421] kunit_try_run_case+0x170/0x3f0 [ 91.723587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 91.729056] kthread+0x328/0x630 [ 91.732268] ret_from_fork+0x10/0x20 [ 91.735827] [ 91.737313] CPU: 4 UID: 0 PID: 409 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 91.748423] Tainted: [B]=BAD_PAGE, [N]=TEST [ 91.752581] Hardware name: WinLink E850-96 board (DT) [ 91.757618] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[ 91.425772] ================================================================== [ 91.425904] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 91.425904] [ 91.426073] Out-of-bounds read at 0x(____ptrval____) (105B right of kfence-#204): [ 91.431373] test_kmalloc_aligned_oob_read+0x238/0x468 [ 91.436491] kunit_try_run_case+0x170/0x3f0 [ 91.440658] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 91.446126] kthread+0x328/0x630 [ 91.449338] ret_from_fork+0x10/0x20 [ 91.452897] [ 91.454375] kfence-#204: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96 [ 91.454375] [ 91.464010] allocated by task 407 on cpu 0 at 91.425736s (0.038272s ago): [ 91.470799] test_alloc+0x29c/0x628 [ 91.474251] test_kmalloc_aligned_oob_read+0x100/0x468 [ 91.479372] kunit_try_run_case+0x170/0x3f0 [ 91.483539] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 91.489007] kthread+0x328/0x630 [ 91.492219] ret_from_fork+0x10/0x20 [ 91.495780] [ 91.497265] CPU: 0 UID: 0 PID: 407 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 91.508373] Tainted: [B]=BAD_PAGE, [N]=TEST [ 91.512533] Hardware name: WinLink E850-96 board (DT) [ 91.517569] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption
[ 86.169832] ================================================================== [ 86.169965] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 86.169965] [ 86.170103] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#154): [ 86.172499] test_corruption+0x278/0x378 [ 86.176404] kunit_try_run_case+0x170/0x3f0 [ 86.180571] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 86.186039] kthread+0x328/0x630 [ 86.189251] ret_from_fork+0x10/0x20 [ 86.192809] [ 86.194287] kfence-#154: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 86.194287] [ 86.203923] allocated by task 395 on cpu 2 at 86.169757s (0.034163s ago): [ 86.210711] test_alloc+0x29c/0x628 [ 86.214163] test_corruption+0xdc/0x378 [ 86.217982] kunit_try_run_case+0x170/0x3f0 [ 86.222150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 86.227618] kthread+0x328/0x630 [ 86.230830] ret_from_fork+0x10/0x20 [ 86.234390] [ 86.235866] freed by task 395 on cpu 2 at 86.169773s (0.066091s ago): [ 86.242312] test_corruption+0x278/0x378 [ 86.246194] kunit_try_run_case+0x170/0x3f0 [ 86.250360] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 86.255829] kthread+0x328/0x630 [ 86.259042] ret_from_fork+0x10/0x20 [ 86.262602] [ 86.264086] CPU: 2 UID: 0 PID: 395 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 86.275196] Tainted: [B]=BAD_PAGE, [N]=TEST [ 86.279354] Hardware name: WinLink E850-96 board (DT) [ 86.284391] ================================================================== [ 86.717816] ================================================================== [ 86.717940] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 86.717940] [ 86.718073] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#159): [ 86.720474] test_corruption+0x120/0x378 [ 86.724379] kunit_try_run_case+0x170/0x3f0 [ 86.728546] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 86.734014] kthread+0x328/0x630 [ 86.737226] ret_from_fork+0x10/0x20 [ 86.740785] [ 86.742263] kfence-#159: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 86.742263] [ 86.751378] allocated by task 397 on cpu 3 at 86.717744s (0.033631s ago): [ 86.758162] test_alloc+0x230/0x628 [ 86.761618] test_corruption+0xdc/0x378 [ 86.765437] kunit_try_run_case+0x170/0x3f0 [ 86.769605] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 86.775073] kthread+0x328/0x630 [ 86.778285] ret_from_fork+0x10/0x20 [ 86.781845] [ 86.783323] freed by task 397 on cpu 3 at 86.717761s (0.065558s ago): [ 86.789765] test_corruption+0x120/0x378 [ 86.793649] kunit_try_run_case+0x170/0x3f0 [ 86.797816] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 86.803284] kthread+0x328/0x630 [ 86.806496] ret_from_fork+0x10/0x20 [ 86.810056] [ 86.811542] CPU: 3 UID: 0 PID: 397 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 86.822649] Tainted: [B]=BAD_PAGE, [N]=TEST [ 86.826809] Hardware name: WinLink E850-96 board (DT) [ 86.831847] ================================================================== [ 86.497823] ================================================================== [ 86.497956] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 86.497956] [ 86.498090] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#157): [ 86.498252] test_corruption+0x284/0x378 [ 86.501789] kunit_try_run_case+0x170/0x3f0 [ 86.505955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 86.511424] kthread+0x328/0x630 [ 86.514636] ret_from_fork+0x10/0x20 [ 86.518195] [ 86.519673] kfence-#157: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 86.519673] [ 86.529309] allocated by task 395 on cpu 2 at 86.497746s (0.031561s ago): [ 86.536096] test_alloc+0x29c/0x628 [ 86.539548] test_corruption+0x198/0x378 [ 86.543455] kunit_try_run_case+0x170/0x3f0 [ 86.547621] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 86.553090] kthread+0x328/0x630 [ 86.556304] ret_from_fork+0x10/0x20 [ 86.559862] [ 86.561341] freed by task 395 on cpu 2 at 86.497761s (0.063575s ago): [ 86.567778] test_corruption+0x284/0x378 [ 86.571669] kunit_try_run_case+0x170/0x3f0 [ 86.575833] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 86.581301] kthread+0x328/0x630 [ 86.584513] ret_from_fork+0x10/0x20 [ 86.588074] [ 86.589558] CPU: 2 UID: 0 PID: 395 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 86.600668] Tainted: [B]=BAD_PAGE, [N]=TEST [ 86.604826] Hardware name: WinLink E850-96 board (DT) [ 86.609863] ================================================================== [ 86.941818] ================================================================== [ 86.941943] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 86.941943] [ 86.942077] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#161): [ 86.942246] test_corruption+0x1d8/0x378 [ 86.945776] kunit_try_run_case+0x170/0x3f0 [ 86.949942] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 86.955411] kthread+0x328/0x630 [ 86.958623] ret_from_fork+0x10/0x20 [ 86.962181] [ 86.963659] kfence-#161: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 86.963659] [ 86.972774] allocated by task 397 on cpu 3 at 86.941747s (0.031025s ago): [ 86.979559] test_alloc+0x230/0x628 [ 86.983016] test_corruption+0x198/0x378 [ 86.986921] kunit_try_run_case+0x170/0x3f0 [ 86.991087] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 86.996556] kthread+0x328/0x630 [ 86.999768] ret_from_fork+0x10/0x20 [ 87.003328] [ 87.004805] freed by task 397 on cpu 3 at 86.941761s (0.063041s ago): [ 87.011247] test_corruption+0x1d8/0x378 [ 87.015132] kunit_try_run_case+0x170/0x3f0 [ 87.019299] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 87.024768] kthread+0x328/0x630 [ 87.027979] ret_from_fork+0x10/0x20 [ 87.031540] [ 87.033024] CPU: 3 UID: 0 PID: 397 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 87.044133] Tainted: [B]=BAD_PAGE, [N]=TEST [ 87.048293] Hardware name: WinLink E850-96 board (DT) [ 87.053330] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[ 85.753807] ================================================================== [ 85.753939] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 85.753939] [ 85.754079] Invalid free of 0x(____ptrval____) (in kfence-#150): [ 85.754183] test_invalid_addr_free+0x1ac/0x238 [ 85.757685] kunit_try_run_case+0x170/0x3f0 [ 85.761852] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 85.767321] kthread+0x328/0x630 [ 85.770532] ret_from_fork+0x10/0x20 [ 85.774091] [ 85.775570] kfence-#150: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 85.775570] [ 85.785205] allocated by task 391 on cpu 2 at 85.753750s (0.031452s ago): [ 85.791992] test_alloc+0x29c/0x628 [ 85.795445] test_invalid_addr_free+0xd4/0x238 [ 85.799872] kunit_try_run_case+0x170/0x3f0 [ 85.804038] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 85.809509] kthread+0x328/0x630 [ 85.812719] ret_from_fork+0x10/0x20 [ 85.816279] [ 85.817765] CPU: 2 UID: 0 PID: 391 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 85.828873] Tainted: [B]=BAD_PAGE, [N]=TEST [ 85.833033] Hardware name: WinLink E850-96 board (DT) [ 85.838069] ================================================================== [ 85.961805] ================================================================== [ 85.961934] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 85.961934] [ 85.962066] Invalid free of 0x(____ptrval____) (in kfence-#152): [ 85.962176] test_invalid_addr_free+0xec/0x238 [ 85.965507] kunit_try_run_case+0x170/0x3f0 [ 85.969674] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 85.975143] kthread+0x328/0x630 [ 85.978354] ret_from_fork+0x10/0x20 [ 85.981913] [ 85.983391] kfence-#152: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 85.983391] [ 85.992506] allocated by task 393 on cpu 3 at 85.961745s (0.030759s ago): [ 85.999292] test_alloc+0x230/0x628 [ 86.002746] test_invalid_addr_free+0xd4/0x238 [ 86.007174] kunit_try_run_case+0x170/0x3f0 [ 86.011340] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 86.016808] kthread+0x328/0x630 [ 86.020020] ret_from_fork+0x10/0x20 [ 86.023580] [ 86.025066] CPU: 3 UID: 0 PID: 393 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 86.036175] Tainted: [B]=BAD_PAGE, [N]=TEST [ 86.040334] Hardware name: WinLink E850-96 board (DT) [ 86.045370] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free
[ 85.313843] ================================================================== [ 85.313978] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 85.313978] [ 85.314106] Invalid free of 0x(____ptrval____) (in kfence-#146): [ 85.314210] test_double_free+0x1bc/0x238 [ 85.316683] kunit_try_run_case+0x170/0x3f0 [ 85.320850] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 85.326318] kthread+0x328/0x630 [ 85.329530] ret_from_fork+0x10/0x20 [ 85.333089] [ 85.334567] kfence-#146: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 85.334567] [ 85.344202] allocated by task 387 on cpu 5 at 85.313761s (0.030439s ago): [ 85.350986] test_alloc+0x29c/0x628 [ 85.354443] test_double_free+0xd4/0x238 [ 85.358349] kunit_try_run_case+0x170/0x3f0 [ 85.362516] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 85.367984] kthread+0x328/0x630 [ 85.371197] ret_from_fork+0x10/0x20 [ 85.374757] [ 85.376234] freed by task 387 on cpu 5 at 85.313777s (0.062452s ago): [ 85.382675] test_double_free+0x1ac/0x238 [ 85.386648] kunit_try_run_case+0x170/0x3f0 [ 85.390814] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 85.396283] kthread+0x328/0x630 [ 85.399494] ret_from_fork+0x10/0x20 [ 85.403055] [ 85.404540] CPU: 5 UID: 0 PID: 387 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 85.415648] Tainted: [B]=BAD_PAGE, [N]=TEST [ 85.419808] Hardware name: WinLink E850-96 board (DT) [ 85.424845] ================================================================== [ 85.533824] ================================================================== [ 85.533954] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 85.533954] [ 85.534091] Invalid free of 0x(____ptrval____) (in kfence-#148): [ 85.534196] test_double_free+0x100/0x238 [ 85.536659] kunit_try_run_case+0x170/0x3f0 [ 85.540825] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 85.546294] kthread+0x328/0x630 [ 85.549506] ret_from_fork+0x10/0x20 [ 85.553065] [ 85.554543] kfence-#148: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 85.554543] [ 85.563657] allocated by task 389 on cpu 2 at 85.533747s (0.029908s ago): [ 85.570445] test_alloc+0x230/0x628 [ 85.573898] test_double_free+0xd4/0x238 [ 85.577804] kunit_try_run_case+0x170/0x3f0 [ 85.581971] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 85.587440] kthread+0x328/0x630 [ 85.590651] ret_from_fork+0x10/0x20 [ 85.594211] [ 85.595690] freed by task 389 on cpu 2 at 85.533763s (0.061922s ago): [ 85.602130] test_double_free+0xf0/0x238 [ 85.606016] kunit_try_run_case+0x170/0x3f0 [ 85.610183] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 85.615651] kthread+0x328/0x630 [ 85.618863] ret_from_fork+0x10/0x20 [ 85.622423] [ 85.623909] CPU: 2 UID: 0 PID: 389 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 85.635018] Tainted: [B]=BAD_PAGE, [N]=TEST [ 85.639176] Hardware name: WinLink E850-96 board (DT) [ 85.644212] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[ 84.657811] ================================================================== [ 84.657949] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 84.657949] [ 84.658108] Use-after-free read at 0x(____ptrval____) (in kfence-#140): [ 84.658570] test_use_after_free_read+0x114/0x248 [ 84.663257] kunit_try_run_case+0x170/0x3f0 [ 84.667423] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 84.672892] kthread+0x328/0x630 [ 84.676104] ret_from_fork+0x10/0x20 [ 84.679664] [ 84.681142] kfence-#140: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 84.681142] [ 84.690776] allocated by task 379 on cpu 2 at 84.657752s (0.033022s ago): [ 84.697564] test_alloc+0x29c/0x628 [ 84.701017] test_use_after_free_read+0xd0/0x248 [ 84.705617] kunit_try_run_case+0x170/0x3f0 [ 84.709785] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 84.715254] kthread+0x328/0x630 [ 84.718464] ret_from_fork+0x10/0x20 [ 84.722025] [ 84.723501] freed by task 379 on cpu 2 at 84.657768s (0.065730s ago): [ 84.729942] test_use_after_free_read+0x1c0/0x248 [ 84.734610] kunit_try_run_case+0x170/0x3f0 [ 84.738776] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 84.744245] kthread+0x328/0x630 [ 84.747457] ret_from_fork+0x10/0x20 [ 84.751017] [ 84.752503] CPU: 2 UID: 0 PID: 379 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 84.763610] Tainted: [B]=BAD_PAGE, [N]=TEST [ 84.767770] Hardware name: WinLink E850-96 board (DT) [ 84.772807] ================================================================== [ 84.881814] ================================================================== [ 84.881944] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 84.881944] [ 84.882103] Use-after-free read at 0x(____ptrval____) (in kfence-#142): [ 84.882565] test_use_after_free_read+0x114/0x248 [ 84.887252] kunit_try_run_case+0x170/0x3f0 [ 84.891418] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 84.896887] kthread+0x328/0x630 [ 84.900099] ret_from_fork+0x10/0x20 [ 84.903657] [ 84.905137] kfence-#142: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 84.905137] [ 84.914251] allocated by task 381 on cpu 3 at 84.881760s (0.032488s ago): [ 84.921040] test_alloc+0x230/0x628 [ 84.924491] test_use_after_free_read+0xd0/0x248 [ 84.929092] kunit_try_run_case+0x170/0x3f0 [ 84.933258] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 84.938728] kthread+0x328/0x630 [ 84.941939] ret_from_fork+0x10/0x20 [ 84.945499] [ 84.946975] freed by task 381 on cpu 3 at 84.881774s (0.065199s ago): [ 84.953418] test_use_after_free_read+0xf0/0x248 [ 84.957997] kunit_try_run_case+0x170/0x3f0 [ 84.962164] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 84.967632] kthread+0x328/0x630 [ 84.970845] ret_from_fork+0x10/0x20 [ 84.974405] [ 84.975890] CPU: 3 UID: 0 PID: 381 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 84.987001] Tainted: [B]=BAD_PAGE, [N]=TEST [ 84.991158] Hardware name: WinLink E850-96 board (DT) [ 84.996195] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[ 84.449772] ================================================================== [ 84.449900] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 84.449900] [ 84.450060] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#138): [ 84.451218] test_out_of_bounds_write+0x100/0x240 [ 84.455903] kunit_try_run_case+0x170/0x3f0 [ 84.460069] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 84.465538] kthread+0x328/0x630 [ 84.468750] ret_from_fork+0x10/0x20 [ 84.472309] [ 84.473788] kfence-#138: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 84.473788] [ 84.482902] allocated by task 377 on cpu 3 at 84.449738s (0.033160s ago): [ 84.489691] test_alloc+0x230/0x628 [ 84.493142] test_out_of_bounds_write+0xc8/0x240 [ 84.497743] kunit_try_run_case+0x170/0x3f0 [ 84.501909] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 84.507378] kthread+0x328/0x630 [ 84.510589] ret_from_fork+0x10/0x20 [ 84.514150] [ 84.515634] CPU: 3 UID: 0 PID: 377 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 84.526744] Tainted: [B]=BAD_PAGE, [N]=TEST [ 84.530903] Hardware name: WinLink E850-96 board (DT) [ 84.535940] ================================================================== [ 84.241786] ================================================================== [ 84.241933] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 84.241933] [ 84.242091] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#136): [ 84.243249] test_out_of_bounds_write+0x100/0x240 [ 84.247934] kunit_try_run_case+0x170/0x3f0 [ 84.252101] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 84.257570] kthread+0x328/0x630 [ 84.260782] ret_from_fork+0x10/0x20 [ 84.264341] [ 84.265819] kfence-#136: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 84.265819] [ 84.275454] allocated by task 375 on cpu 2 at 84.241748s (0.033704s ago): [ 84.282242] test_alloc+0x29c/0x628 [ 84.285695] test_out_of_bounds_write+0xc8/0x240 [ 84.290296] kunit_try_run_case+0x170/0x3f0 [ 84.294462] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 84.299930] kthread+0x328/0x630 [ 84.303142] ret_from_fork+0x10/0x20 [ 84.306703] [ 84.308188] CPU: 2 UID: 0 PID: 375 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 84.319297] Tainted: [B]=BAD_PAGE, [N]=TEST [ 84.323456] Hardware name: WinLink E850-96 board (DT) [ 84.328492] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[ 83.929777] ================================================================== [ 83.929910] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 83.929910] [ 83.930065] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#133): [ 83.931140] test_out_of_bounds_read+0x1c8/0x3e0 [ 83.935739] kunit_try_run_case+0x170/0x3f0 [ 83.939905] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 83.945374] kthread+0x328/0x630 [ 83.948586] ret_from_fork+0x10/0x20 [ 83.952145] [ 83.953623] kfence-#133: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 83.953623] [ 83.962736] allocated by task 373 on cpu 2 at 83.929743s (0.032990s ago): [ 83.969525] test_alloc+0x230/0x628 [ 83.972978] test_out_of_bounds_read+0x198/0x3e0 [ 83.977578] kunit_try_run_case+0x170/0x3f0 [ 83.981745] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 83.987214] kthread+0x328/0x630 [ 83.990427] ret_from_fork+0x10/0x20 [ 83.993986] [ 83.995472] CPU: 2 UID: 0 PID: 373 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 84.006579] Tainted: [B]=BAD_PAGE, [N]=TEST [ 84.010739] Hardware name: WinLink E850-96 board (DT) [ 84.015776] ================================================================== [ 83.617783] ================================================================== [ 83.617916] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 83.617916] [ 83.618074] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#130): [ 83.618973] test_out_of_bounds_read+0x114/0x3e0 [ 83.623572] kunit_try_run_case+0x170/0x3f0 [ 83.627739] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 83.633208] kthread+0x328/0x630 [ 83.636419] ret_from_fork+0x10/0x20 [ 83.639978] [ 83.641458] kfence-#130: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 83.641458] [ 83.650571] allocated by task 373 on cpu 2 at 83.617748s (0.032820s ago): [ 83.657359] test_alloc+0x230/0x628 [ 83.660811] test_out_of_bounds_read+0xdc/0x3e0 [ 83.665325] kunit_try_run_case+0x170/0x3f0 [ 83.669492] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 83.674961] kthread+0x328/0x630 [ 83.678172] ret_from_fork+0x10/0x20 [ 83.681733] [ 83.683218] CPU: 2 UID: 0 PID: 373 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 83.694328] Tainted: [B]=BAD_PAGE, [N]=TEST [ 83.698486] Hardware name: WinLink E850-96 board (DT) [ 83.703522] ================================================================== [ 83.097782] ================================================================== [ 83.097903] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 83.097903] [ 83.098063] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#125): [ 83.098964] test_out_of_bounds_read+0x114/0x3e0 [ 83.103562] kunit_try_run_case+0x170/0x3f0 [ 83.107728] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 83.113197] kthread+0x328/0x630 [ 83.116409] ret_from_fork+0x10/0x20 [ 83.119967] [ 83.121446] kfence-#125: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 83.121446] [ 83.131083] allocated by task 371 on cpu 3 at 83.097748s (0.033330s ago): [ 83.137870] test_alloc+0x29c/0x628 [ 83.141321] test_out_of_bounds_read+0xdc/0x3e0 [ 83.145835] kunit_try_run_case+0x170/0x3f0 [ 83.150002] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 83.155470] kthread+0x328/0x630 [ 83.158682] ret_from_fork+0x10/0x20 [ 83.162243] [ 83.163728] CPU: 3 UID: 0 PID: 371 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 83.174836] Tainted: [B]=BAD_PAGE, [N]=TEST [ 83.178996] Hardware name: WinLink E850-96 board (DT) [ 83.184033] ================================================================== [ 83.305778] ================================================================== [ 83.305902] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 83.305902] [ 83.306053] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#127): [ 83.307133] test_out_of_bounds_read+0x1c8/0x3e0 [ 83.311732] kunit_try_run_case+0x170/0x3f0 [ 83.315899] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 83.321368] kthread+0x328/0x630 [ 83.324579] ret_from_fork+0x10/0x20 [ 83.328138] [ 83.329617] kfence-#127: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 83.329617] [ 83.339251] allocated by task 371 on cpu 3 at 83.305747s (0.033503s ago): [ 83.346041] test_alloc+0x29c/0x628 [ 83.349492] test_out_of_bounds_read+0x198/0x3e0 [ 83.354093] kunit_try_run_case+0x170/0x3f0 [ 83.358259] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 83.363728] kthread+0x328/0x630 [ 83.366940] ret_from_fork+0x10/0x20 [ 83.370500] [ 83.371985] CPU: 3 UID: 0 PID: 371 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 83.383093] Tainted: [B]=BAD_PAGE, [N]=TEST [ 83.387253] Hardware name: WinLink E850-96 board (DT) [ 83.392290] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-krealloc_less_oob_helper
[ 39.780355] ================================================================== [ 39.802609] BUG: KFENCE: memory corruption in krealloc_less_oob_helper+0x4d0/0xc50 [ 39.802609] [ 39.811636] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#66): [ 39.821013] krealloc_less_oob_helper+0x4d0/0xc50 [ 39.825698] krealloc_less_oob+0x20/0x38 [ 39.829604] kunit_try_run_case+0x170/0x3f0 [ 39.833771] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.839239] kthread+0x328/0x630 [ 39.842451] ret_from_fork+0x10/0x20 [ 39.846010] [ 39.847488] kfence-#66: 0x(____ptrval____)-0x(____ptrval____), size=235, cache=kmalloc-256 [ 39.847488] [ 39.857210] allocated by task 242 on cpu 2 at 39.713821s (0.143386s ago): [ 39.863997] krealloc_less_oob_helper+0x108/0xc50 [ 39.868666] krealloc_less_oob+0x20/0x38 [ 39.872572] kunit_try_run_case+0x170/0x3f0 [ 39.876739] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.882209] kthread+0x328/0x630 [ 39.885419] ret_from_fork+0x10/0x20 [ 39.888980] [ 39.890456] freed by task 242 on cpu 2 at 39.780297s (0.110156s ago): [ 39.896902] krealloc_less_oob_helper+0x4d0/0xc50 [ 39.901564] krealloc_less_oob+0x20/0x38 [ 39.905471] kunit_try_run_case+0x170/0x3f0 [ 39.909638] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.915108] kthread+0x328/0x630 [ 39.918318] ret_from_fork+0x10/0x20 [ 39.921879] [ 39.923362] CPU: 2 UID: 0 PID: 242 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 39.934472] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.938631] Hardware name: WinLink E850-96 board (DT) [ 39.943668] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-kmalloc_track_caller_oob_right
[ 37.788207] ================================================================== [ 37.810887] BUG: KFENCE: memory corruption in kmalloc_track_caller_oob_right+0x224/0x488 [ 37.810887] [ 37.820433] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . ] (in kfence-#58): [ 37.828421] kmalloc_track_caller_oob_right+0x224/0x488 [ 37.833627] kunit_try_run_case+0x170/0x3f0 [ 37.837794] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.843262] kthread+0x328/0x630 [ 37.846474] ret_from_fork+0x10/0x20 [ 37.850033] [ 37.851513] kfence-#58: 0x(____ptrval____)-0x(____ptrval____), size=120, cache=kmalloc-128 [ 37.851513] [ 37.861235] allocated by task 226 on cpu 2 at 37.787858s (0.073373s ago): [ 37.868021] kmalloc_track_caller_oob_right+0x184/0x488 [ 37.873209] kunit_try_run_case+0x170/0x3f0 [ 37.877376] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.882845] kthread+0x328/0x630 [ 37.886057] ret_from_fork+0x10/0x20 [ 37.889618] [ 37.891094] freed by task 226 on cpu 2 at 37.788160s (0.102931s ago): [ 37.897536] kmalloc_track_caller_oob_right+0x224/0x488 [ 37.902723] kunit_try_run_case+0x170/0x3f0 [ 37.906890] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.912359] kthread+0x328/0x630 [ 37.915572] ret_from_fork+0x10/0x20 [ 37.919131] [ 37.920614] CPU: 2 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 37.931727] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.935884] Hardware name: WinLink E850-96 board (DT) [ 37.940920] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[ 82.688843] ================================================================== [ 82.695926] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 82.702870] Write of size 1 at addr ffff0008074f9378 by task kunit_try_catch/369 [ 82.710248] [ 82.711732] CPU: 2 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 82.711783] Tainted: [B]=BAD_PAGE, [N]=TEST [ 82.711800] Hardware name: WinLink E850-96 board (DT) [ 82.711820] Call trace: [ 82.711831] show_stack+0x20/0x38 (C) [ 82.711862] dump_stack_lvl+0x8c/0xd0 [ 82.711894] print_report+0x118/0x5d0 [ 82.711921] kasan_report+0xdc/0x128 [ 82.711948] __asan_report_store1_noabort+0x20/0x30 [ 82.711982] strncpy_from_user+0x270/0x2a0 [ 82.712017] copy_user_test_oob+0x5c0/0xec8 [ 82.712051] kunit_try_run_case+0x170/0x3f0 [ 82.712086] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 82.712120] kthread+0x328/0x630 [ 82.712151] ret_from_fork+0x10/0x20 [ 82.712181] [ 82.779951] Allocated by task 369: [ 82.783337] kasan_save_stack+0x3c/0x68 [ 82.787156] kasan_save_track+0x20/0x40 [ 82.790976] kasan_save_alloc_info+0x40/0x58 [ 82.795229] __kasan_kmalloc+0xd4/0xd8 [ 82.798962] __kmalloc_noprof+0x198/0x4c8 [ 82.802955] kunit_kmalloc_array+0x34/0x88 [ 82.807034] copy_user_test_oob+0xac/0xec8 [ 82.811114] kunit_try_run_case+0x170/0x3f0 [ 82.815281] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 82.820750] kthread+0x328/0x630 [ 82.823961] ret_from_fork+0x10/0x20 [ 82.827520] [ 82.828996] The buggy address belongs to the object at ffff0008074f9300 [ 82.828996] which belongs to the cache kmalloc-128 of size 128 [ 82.841498] The buggy address is located 0 bytes to the right of [ 82.841498] allocated 120-byte region [ffff0008074f9300, ffff0008074f9378) [ 82.854430] [ 82.855907] The buggy address belongs to the physical page: [ 82.861462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8874f8 [ 82.869447] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 82.877085] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 82.884030] page_type: f5(slab) [ 82.887163] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 82.894887] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 82.902614] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 82.910425] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 82.918238] head: 0bfffe0000000001 fffffdffe01d3e01 00000000ffffffff 00000000ffffffff [ 82.926050] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 82.933856] page dumped because: kasan: bad access detected [ 82.939411] [ 82.940887] Memory state around the buggy address: [ 82.945665] ffff0008074f9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 82.952869] ffff0008074f9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.960074] >ffff0008074f9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 82.967275] ^ [ 82.974397] ffff0008074f9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.981602] ffff0008074f9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.988803] ================================================================== [ 82.378794] ================================================================== [ 82.385862] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 82.392718] Write of size 121 at addr ffff0008074f9300 by task kunit_try_catch/369 [ 82.400270] [ 82.401754] CPU: 2 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 82.401804] Tainted: [B]=BAD_PAGE, [N]=TEST [ 82.401820] Hardware name: WinLink E850-96 board (DT) [ 82.401841] Call trace: [ 82.401855] show_stack+0x20/0x38 (C) [ 82.401887] dump_stack_lvl+0x8c/0xd0 [ 82.401920] print_report+0x118/0x5d0 [ 82.401948] kasan_report+0xdc/0x128 [ 82.401975] kasan_check_range+0x100/0x1a8 [ 82.402005] __kasan_check_write+0x20/0x30 [ 82.402036] strncpy_from_user+0x3c/0x2a0 [ 82.402073] copy_user_test_oob+0x5c0/0xec8 [ 82.402108] kunit_try_run_case+0x170/0x3f0 [ 82.402144] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 82.402178] kthread+0x328/0x630 [ 82.402207] ret_from_fork+0x10/0x20 [ 82.402239] [ 82.473185] Allocated by task 369: [ 82.476572] kasan_save_stack+0x3c/0x68 [ 82.480390] kasan_save_track+0x20/0x40 [ 82.484209] kasan_save_alloc_info+0x40/0x58 [ 82.488463] __kasan_kmalloc+0xd4/0xd8 [ 82.492196] __kmalloc_noprof+0x198/0x4c8 [ 82.496189] kunit_kmalloc_array+0x34/0x88 [ 82.500268] copy_user_test_oob+0xac/0xec8 [ 82.504348] kunit_try_run_case+0x170/0x3f0 [ 82.508515] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 82.513983] kthread+0x328/0x630 [ 82.517195] ret_from_fork+0x10/0x20 [ 82.520754] [ 82.522229] The buggy address belongs to the object at ffff0008074f9300 [ 82.522229] which belongs to the cache kmalloc-128 of size 128 [ 82.534732] The buggy address is located 0 bytes inside of [ 82.534732] allocated 120-byte region [ffff0008074f9300, ffff0008074f9378) [ 82.547143] [ 82.548620] The buggy address belongs to the physical page: [ 82.554176] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8874f8 [ 82.562160] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 82.569798] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 82.576743] page_type: f5(slab) [ 82.579878] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 82.587600] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 82.595326] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 82.603138] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 82.610951] head: 0bfffe0000000001 fffffdffe01d3e01 00000000ffffffff 00000000ffffffff [ 82.618762] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 82.626569] page dumped because: kasan: bad access detected [ 82.632124] [ 82.633600] Memory state around the buggy address: [ 82.638379] ffff0008074f9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 82.645582] ffff0008074f9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.652787] >ffff0008074f9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 82.659988] ^ [ 82.667110] ffff0008074f9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.674314] ffff0008074f9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.681516] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[ 82.072803] ================================================================== [ 82.079793] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 82.086820] Read of size 121 at addr ffff0008074f9300 by task kunit_try_catch/369 [ 82.094285] [ 82.095770] CPU: 2 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 82.095825] Tainted: [B]=BAD_PAGE, [N]=TEST [ 82.095839] Hardware name: WinLink E850-96 board (DT) [ 82.095859] Call trace: [ 82.095874] show_stack+0x20/0x38 (C) [ 82.095908] dump_stack_lvl+0x8c/0xd0 [ 82.095940] print_report+0x118/0x5d0 [ 82.095966] kasan_report+0xdc/0x128 [ 82.095991] kasan_check_range+0x100/0x1a8 [ 82.096025] __kasan_check_read+0x20/0x30 [ 82.096055] copy_user_test_oob+0x4a0/0xec8 [ 82.096089] kunit_try_run_case+0x170/0x3f0 [ 82.096123] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 82.096157] kthread+0x328/0x630 [ 82.096186] ret_from_fork+0x10/0x20 [ 82.096219] [ 82.163120] Allocated by task 369: [ 82.166508] kasan_save_stack+0x3c/0x68 [ 82.170325] kasan_save_track+0x20/0x40 [ 82.174145] kasan_save_alloc_info+0x40/0x58 [ 82.178398] __kasan_kmalloc+0xd4/0xd8 [ 82.182131] __kmalloc_noprof+0x198/0x4c8 [ 82.186123] kunit_kmalloc_array+0x34/0x88 [ 82.190203] copy_user_test_oob+0xac/0xec8 [ 82.194283] kunit_try_run_case+0x170/0x3f0 [ 82.198450] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 82.203918] kthread+0x328/0x630 [ 82.207130] ret_from_fork+0x10/0x20 [ 82.210689] [ 82.212165] The buggy address belongs to the object at ffff0008074f9300 [ 82.212165] which belongs to the cache kmalloc-128 of size 128 [ 82.224666] The buggy address is located 0 bytes inside of [ 82.224666] allocated 120-byte region [ffff0008074f9300, ffff0008074f9378) [ 82.237078] [ 82.238555] The buggy address belongs to the physical page: [ 82.244113] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8874f8 [ 82.252095] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 82.259734] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 82.266678] page_type: f5(slab) [ 82.269812] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 82.277535] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 82.285262] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 82.293073] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 82.300886] head: 0bfffe0000000001 fffffdffe01d3e01 00000000ffffffff 00000000ffffffff [ 82.308697] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 82.316504] page dumped because: kasan: bad access detected [ 82.322059] [ 82.323535] Memory state around the buggy address: [ 82.328315] ffff0008074f9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 82.335518] ffff0008074f9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.342722] >ffff0008074f9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 82.349923] ^ [ 82.357045] ffff0008074f9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.364250] ffff0008074f9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.371451] ================================================================== [ 80.848610] ================================================================== [ 80.855163] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 80.862186] Read of size 121 at addr ffff0008074f9300 by task kunit_try_catch/369 [ 80.869650] [ 80.871136] CPU: 2 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 80.871194] Tainted: [B]=BAD_PAGE, [N]=TEST [ 80.871213] Hardware name: WinLink E850-96 board (DT) [ 80.871235] Call trace: [ 80.871250] show_stack+0x20/0x38 (C) [ 80.871288] dump_stack_lvl+0x8c/0xd0 [ 80.871322] print_report+0x118/0x5d0 [ 80.871354] kasan_report+0xdc/0x128 [ 80.871382] kasan_check_range+0x100/0x1a8 [ 80.871412] __kasan_check_read+0x20/0x30 [ 80.871446] copy_user_test_oob+0x728/0xec8 [ 80.871480] kunit_try_run_case+0x170/0x3f0 [ 80.871519] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 80.871554] kthread+0x328/0x630 [ 80.871582] ret_from_fork+0x10/0x20 [ 80.871619] [ 80.938487] Allocated by task 369: [ 80.941873] kasan_save_stack+0x3c/0x68 [ 80.945691] kasan_save_track+0x20/0x40 [ 80.949512] kasan_save_alloc_info+0x40/0x58 [ 80.953764] __kasan_kmalloc+0xd4/0xd8 [ 80.957496] __kmalloc_noprof+0x198/0x4c8 [ 80.961489] kunit_kmalloc_array+0x34/0x88 [ 80.965569] copy_user_test_oob+0xac/0xec8 [ 80.969649] kunit_try_run_case+0x170/0x3f0 [ 80.973816] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 80.979284] kthread+0x328/0x630 [ 80.982496] ret_from_fork+0x10/0x20 [ 80.986055] [ 80.987532] The buggy address belongs to the object at ffff0008074f9300 [ 80.987532] which belongs to the cache kmalloc-128 of size 128 [ 81.000033] The buggy address is located 0 bytes inside of [ 81.000033] allocated 120-byte region [ffff0008074f9300, ffff0008074f9378) [ 81.012443] [ 81.013922] The buggy address belongs to the physical page: [ 81.019479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8874f8 [ 81.027461] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 81.035104] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 81.042046] page_type: f5(slab) [ 81.045182] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 81.052901] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 81.060627] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 81.068438] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 81.076252] head: 0bfffe0000000001 fffffdffe01d3e01 00000000ffffffff 00000000ffffffff [ 81.084063] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 81.091869] page dumped because: kasan: bad access detected [ 81.097425] [ 81.098900] Memory state around the buggy address: [ 81.103680] ffff0008074f9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 81.110883] ffff0008074f9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.118088] >ffff0008074f9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 81.125289] ^ [ 81.132411] ffff0008074f9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.139616] ffff0008074f9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.146816] ================================================================== [ 81.460406] ================================================================== [ 81.467478] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 81.474503] Read of size 121 at addr ffff0008074f9300 by task kunit_try_catch/369 [ 81.481968] [ 81.483453] CPU: 2 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 81.483505] Tainted: [B]=BAD_PAGE, [N]=TEST [ 81.483523] Hardware name: WinLink E850-96 board (DT) [ 81.483543] Call trace: [ 81.483557] show_stack+0x20/0x38 (C) [ 81.483591] dump_stack_lvl+0x8c/0xd0 [ 81.483623] print_report+0x118/0x5d0 [ 81.483652] kasan_report+0xdc/0x128 [ 81.483680] kasan_check_range+0x100/0x1a8 [ 81.483711] __kasan_check_read+0x20/0x30 [ 81.483743] copy_user_test_oob+0x3c8/0xec8 [ 81.483779] kunit_try_run_case+0x170/0x3f0 [ 81.483818] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 81.483851] kthread+0x328/0x630 [ 81.483882] ret_from_fork+0x10/0x20 [ 81.483917] [ 81.550803] Allocated by task 369: [ 81.554191] kasan_save_stack+0x3c/0x68 [ 81.558008] kasan_save_track+0x20/0x40 [ 81.561827] kasan_save_alloc_info+0x40/0x58 [ 81.566081] __kasan_kmalloc+0xd4/0xd8 [ 81.569814] __kmalloc_noprof+0x198/0x4c8 [ 81.573807] kunit_kmalloc_array+0x34/0x88 [ 81.577886] copy_user_test_oob+0xac/0xec8 [ 81.581966] kunit_try_run_case+0x170/0x3f0 [ 81.586133] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 81.591602] kthread+0x328/0x630 [ 81.594813] ret_from_fork+0x10/0x20 [ 81.598372] [ 81.599849] The buggy address belongs to the object at ffff0008074f9300 [ 81.599849] which belongs to the cache kmalloc-128 of size 128 [ 81.612351] The buggy address is located 0 bytes inside of [ 81.612351] allocated 120-byte region [ffff0008074f9300, ffff0008074f9378) [ 81.624761] [ 81.626238] The buggy address belongs to the physical page: [ 81.631796] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8874f8 [ 81.639778] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 81.647419] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 81.654361] page_type: f5(slab) [ 81.657497] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 81.665218] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 81.672944] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 81.680756] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 81.688569] head: 0bfffe0000000001 fffffdffe01d3e01 00000000ffffffff 00000000ffffffff [ 81.696381] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 81.704186] page dumped because: kasan: bad access detected [ 81.709742] [ 81.711217] Memory state around the buggy address: [ 81.715999] ffff0008074f9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 81.723200] ffff0008074f9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.730405] >ffff0008074f9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 81.737606] ^ [ 81.744728] ffff0008074f9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.751932] ffff0008074f9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.759134] ================================================================== [ 80.536556] ================================================================== [ 80.548913] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 80.555940] Write of size 121 at addr ffff0008074f9300 by task kunit_try_catch/369 [ 80.563492] [ 80.564979] CPU: 2 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 80.565039] Tainted: [B]=BAD_PAGE, [N]=TEST [ 80.565058] Hardware name: WinLink E850-96 board (DT) [ 80.565081] Call trace: [ 80.565097] show_stack+0x20/0x38 (C) [ 80.565136] dump_stack_lvl+0x8c/0xd0 [ 80.565172] print_report+0x118/0x5d0 [ 80.565201] kasan_report+0xdc/0x128 [ 80.565229] kasan_check_range+0x100/0x1a8 [ 80.565262] __kasan_check_write+0x20/0x30 [ 80.565296] copy_user_test_oob+0x234/0xec8 [ 80.565331] kunit_try_run_case+0x170/0x3f0 [ 80.565370] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 80.565405] kthread+0x328/0x630 [ 80.565436] ret_from_fork+0x10/0x20 [ 80.565473] [ 80.632416] Allocated by task 369: [ 80.635803] kasan_save_stack+0x3c/0x68 [ 80.639619] kasan_save_track+0x20/0x40 [ 80.643440] kasan_save_alloc_info+0x40/0x58 [ 80.647692] __kasan_kmalloc+0xd4/0xd8 [ 80.651424] __kmalloc_noprof+0x198/0x4c8 [ 80.655418] kunit_kmalloc_array+0x34/0x88 [ 80.659497] copy_user_test_oob+0xac/0xec8 [ 80.663577] kunit_try_run_case+0x170/0x3f0 [ 80.667744] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 80.673212] kthread+0x328/0x630 [ 80.676424] ret_from_fork+0x10/0x20 [ 80.679983] [ 80.681460] The buggy address belongs to the object at ffff0008074f9300 [ 80.681460] which belongs to the cache kmalloc-128 of size 128 [ 80.693962] The buggy address is located 0 bytes inside of [ 80.693962] allocated 120-byte region [ffff0008074f9300, ffff0008074f9378) [ 80.706371] [ 80.707850] The buggy address belongs to the physical page: [ 80.713408] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8874f8 [ 80.721391] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 80.729031] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 80.735973] page_type: f5(slab) [ 80.739110] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 80.746829] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 80.754557] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 80.762367] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 80.770180] head: 0bfffe0000000001 fffffdffe01d3e01 00000000ffffffff 00000000ffffffff [ 80.777992] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 80.785799] page dumped because: kasan: bad access detected [ 80.791352] [ 80.792828] Memory state around the buggy address: [ 80.797607] ffff0008074f9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 80.804811] ffff0008074f9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.812018] >ffff0008074f9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 80.819219] ^ [ 80.826339] ffff0008074f9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.833545] ffff0008074f9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.840746] ================================================================== [ 81.154371] ================================================================== [ 81.161230] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 81.168257] Write of size 121 at addr ffff0008074f9300 by task kunit_try_catch/369 [ 81.175809] [ 81.177294] CPU: 2 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 81.177347] Tainted: [B]=BAD_PAGE, [N]=TEST [ 81.177365] Hardware name: WinLink E850-96 board (DT) [ 81.177384] Call trace: [ 81.177398] show_stack+0x20/0x38 (C) [ 81.177435] dump_stack_lvl+0x8c/0xd0 [ 81.177470] print_report+0x118/0x5d0 [ 81.177498] kasan_report+0xdc/0x128 [ 81.177526] kasan_check_range+0x100/0x1a8 [ 81.177556] __kasan_check_write+0x20/0x30 [ 81.177589] copy_user_test_oob+0x35c/0xec8 [ 81.177622] kunit_try_run_case+0x170/0x3f0 [ 81.177660] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 81.177692] kthread+0x328/0x630 [ 81.177719] ret_from_fork+0x10/0x20 [ 81.177753] [ 81.244732] Allocated by task 369: [ 81.248119] kasan_save_stack+0x3c/0x68 [ 81.251936] kasan_save_track+0x20/0x40 [ 81.255756] kasan_save_alloc_info+0x40/0x58 [ 81.260009] __kasan_kmalloc+0xd4/0xd8 [ 81.263742] __kmalloc_noprof+0x198/0x4c8 [ 81.267735] kunit_kmalloc_array+0x34/0x88 [ 81.271815] copy_user_test_oob+0xac/0xec8 [ 81.275894] kunit_try_run_case+0x170/0x3f0 [ 81.280061] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 81.285530] kthread+0x328/0x630 [ 81.288741] ret_from_fork+0x10/0x20 [ 81.292300] [ 81.293777] The buggy address belongs to the object at ffff0008074f9300 [ 81.293777] which belongs to the cache kmalloc-128 of size 128 [ 81.306278] The buggy address is located 0 bytes inside of [ 81.306278] allocated 120-byte region [ffff0008074f9300, ffff0008074f9378) [ 81.318689] [ 81.320167] The buggy address belongs to the physical page: [ 81.325725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8874f8 [ 81.333707] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 81.341345] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 81.348290] page_type: f5(slab) [ 81.351425] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 81.359146] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 81.366873] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 81.374684] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 81.382497] head: 0bfffe0000000001 fffffdffe01d3e01 00000000ffffffff 00000000ffffffff [ 81.390309] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 81.398115] page dumped because: kasan: bad access detected [ 81.403670] [ 81.405146] Memory state around the buggy address: [ 81.409925] ffff0008074f9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 81.417128] ffff0008074f9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.424333] >ffff0008074f9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 81.431534] ^ [ 81.438656] ffff0008074f9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.445860] ffff0008074f9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.453062] ================================================================== [ 81.766677] ================================================================== [ 81.773551] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 81.780574] Write of size 121 at addr ffff0008074f9300 by task kunit_try_catch/369 [ 81.788126] [ 81.789610] CPU: 2 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 81.789666] Tainted: [B]=BAD_PAGE, [N]=TEST [ 81.789683] Hardware name: WinLink E850-96 board (DT) [ 81.789704] Call trace: [ 81.789720] show_stack+0x20/0x38 (C) [ 81.789756] dump_stack_lvl+0x8c/0xd0 [ 81.789787] print_report+0x118/0x5d0 [ 81.789815] kasan_report+0xdc/0x128 [ 81.789842] kasan_check_range+0x100/0x1a8 [ 81.789874] __kasan_check_write+0x20/0x30 [ 81.789905] copy_user_test_oob+0x434/0xec8 [ 81.789938] kunit_try_run_case+0x170/0x3f0 [ 81.789974] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 81.790009] kthread+0x328/0x630 [ 81.790038] ret_from_fork+0x10/0x20 [ 81.790073] [ 81.857049] Allocated by task 369: [ 81.860436] kasan_save_stack+0x3c/0x68 [ 81.864254] kasan_save_track+0x20/0x40 [ 81.868073] kasan_save_alloc_info+0x40/0x58 [ 81.872326] __kasan_kmalloc+0xd4/0xd8 [ 81.876059] __kmalloc_noprof+0x198/0x4c8 [ 81.880052] kunit_kmalloc_array+0x34/0x88 [ 81.884132] copy_user_test_oob+0xac/0xec8 [ 81.888211] kunit_try_run_case+0x170/0x3f0 [ 81.892378] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 81.897847] kthread+0x328/0x630 [ 81.901059] ret_from_fork+0x10/0x20 [ 81.904618] [ 81.906093] The buggy address belongs to the object at ffff0008074f9300 [ 81.906093] which belongs to the cache kmalloc-128 of size 128 [ 81.918596] The buggy address is located 0 bytes inside of [ 81.918596] allocated 120-byte region [ffff0008074f9300, ffff0008074f9378) [ 81.931006] [ 81.932483] The buggy address belongs to the physical page: [ 81.938041] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8874f8 [ 81.946023] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 81.953665] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 81.960606] page_type: f5(slab) [ 81.963742] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 81.971463] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 81.979190] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 81.987001] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 81.994814] head: 0bfffe0000000001 fffffdffe01d3e01 00000000ffffffff 00000000ffffffff [ 82.002626] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 82.010432] page dumped because: kasan: bad access detected [ 82.015987] [ 82.017463] Memory state around the buggy address: [ 82.022243] ffff0008074f9200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 82.029446] ffff0008074f9280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.036651] >ffff0008074f9300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 82.043852] ^ [ 82.050973] ffff0008074f9380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.058178] ffff0008074f9400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.065379] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[ 79.909051] ================================================================== [ 79.923314] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 79.930690] Read of size 8 at addr ffff000801e0bf78 by task kunit_try_catch/365 [ 79.937981] [ 79.939469] CPU: 5 UID: 0 PID: 365 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 79.939525] Tainted: [B]=BAD_PAGE, [N]=TEST [ 79.939542] Hardware name: WinLink E850-96 board (DT) [ 79.939567] Call trace: [ 79.939581] show_stack+0x20/0x38 (C) [ 79.939620] dump_stack_lvl+0x8c/0xd0 [ 79.939656] print_report+0x118/0x5d0 [ 79.939686] kasan_report+0xdc/0x128 [ 79.939715] __asan_report_load8_noabort+0x20/0x30 [ 79.939753] copy_to_kernel_nofault+0x204/0x250 [ 79.939789] copy_to_kernel_nofault_oob+0x158/0x418 [ 79.939824] kunit_try_run_case+0x170/0x3f0 [ 79.939864] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 79.939898] kthread+0x328/0x630 [ 79.939930] ret_from_fork+0x10/0x20 [ 79.939969] [ 80.008727] Allocated by task 365: [ 80.012113] kasan_save_stack+0x3c/0x68 [ 80.015930] kasan_save_track+0x20/0x40 [ 80.019750] kasan_save_alloc_info+0x40/0x58 [ 80.024003] __kasan_kmalloc+0xd4/0xd8 [ 80.027736] __kmalloc_cache_noprof+0x16c/0x3c0 [ 80.032250] copy_to_kernel_nofault_oob+0xc8/0x418 [ 80.037024] kunit_try_run_case+0x170/0x3f0 [ 80.041190] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 80.046659] kthread+0x328/0x630 [ 80.049871] ret_from_fork+0x10/0x20 [ 80.053430] [ 80.054907] The buggy address belongs to the object at ffff000801e0bf00 [ 80.054907] which belongs to the cache kmalloc-128 of size 128 [ 80.067409] The buggy address is located 0 bytes to the right of [ 80.067409] allocated 120-byte region [ffff000801e0bf00, ffff000801e0bf78) [ 80.080340] [ 80.081819] The buggy address belongs to the physical page: [ 80.087376] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e0a [ 80.095359] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 80.102998] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 80.109941] page_type: f5(slab) [ 80.113078] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 80.120797] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 80.128525] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 80.136334] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 80.144147] head: 0bfffe0000000001 fffffdffe0078281 00000000ffffffff 00000000ffffffff [ 80.151960] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 80.159767] page dumped because: kasan: bad access detected [ 80.165321] [ 80.166798] Memory state around the buggy address: [ 80.171578] ffff000801e0be00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 80.178779] ffff000801e0be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.185985] >ffff000801e0bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 80.193185] ^ [ 80.200306] ffff000801e0bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.207512] ffff000801e0c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 80.214714] ================================================================== [ 80.222149] ================================================================== [ 80.229126] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 80.236413] Write of size 8 at addr ffff000801e0bf78 by task kunit_try_catch/365 [ 80.243792] [ 80.245278] CPU: 5 UID: 0 PID: 365 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 80.245335] Tainted: [B]=BAD_PAGE, [N]=TEST [ 80.245350] Hardware name: WinLink E850-96 board (DT) [ 80.245372] Call trace: [ 80.245387] show_stack+0x20/0x38 (C) [ 80.245422] dump_stack_lvl+0x8c/0xd0 [ 80.245456] print_report+0x118/0x5d0 [ 80.245486] kasan_report+0xdc/0x128 [ 80.245516] kasan_check_range+0x100/0x1a8 [ 80.245548] __kasan_check_write+0x20/0x30 [ 80.245581] copy_to_kernel_nofault+0x8c/0x250 [ 80.245616] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 80.245650] kunit_try_run_case+0x170/0x3f0 [ 80.245686] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 80.245718] kthread+0x328/0x630 [ 80.245747] ret_from_fork+0x10/0x20 [ 80.245781] [ 80.317836] Allocated by task 365: [ 80.321223] kasan_save_stack+0x3c/0x68 [ 80.325040] kasan_save_track+0x20/0x40 [ 80.328860] kasan_save_alloc_info+0x40/0x58 [ 80.333113] __kasan_kmalloc+0xd4/0xd8 [ 80.336846] __kmalloc_cache_noprof+0x16c/0x3c0 [ 80.341360] copy_to_kernel_nofault_oob+0xc8/0x418 [ 80.346134] kunit_try_run_case+0x170/0x3f0 [ 80.350301] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 80.355769] kthread+0x328/0x630 [ 80.358981] ret_from_fork+0x10/0x20 [ 80.362540] [ 80.364017] The buggy address belongs to the object at ffff000801e0bf00 [ 80.364017] which belongs to the cache kmalloc-128 of size 128 [ 80.376517] The buggy address is located 0 bytes to the right of [ 80.376517] allocated 120-byte region [ffff000801e0bf00, ffff000801e0bf78) [ 80.389449] [ 80.390928] The buggy address belongs to the physical page: [ 80.396485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e0a [ 80.404467] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 80.412106] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 80.419050] page_type: f5(slab) [ 80.422186] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 80.429907] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 80.437633] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 80.445445] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 80.453258] head: 0bfffe0000000001 fffffdffe0078281 00000000ffffffff 00000000ffffffff [ 80.461070] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 80.468877] page dumped because: kasan: bad access detected [ 80.474431] [ 80.475908] Memory state around the buggy address: [ 80.480686] ffff000801e0be00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 80.487889] ffff000801e0be80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.495094] >ffff000801e0bf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 80.502295] ^ [ 80.509418] ffff000801e0bf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.516623] ffff000801e0c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 80.523822] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 79.485248] ================================================================== [ 79.499710] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 79.506390] Read of size 1 at addr ffff800087c7d7f3 by task kunit_try_catch/353 [ 79.513683] [ 79.515168] CPU: 6 UID: 0 PID: 353 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 79.515222] Tainted: [B]=BAD_PAGE, [N]=TEST [ 79.515239] Hardware name: WinLink E850-96 board (DT) [ 79.515262] Call trace: [ 79.515280] show_stack+0x20/0x38 (C) [ 79.515317] dump_stack_lvl+0x8c/0xd0 [ 79.515351] print_report+0x310/0x5d0 [ 79.515381] kasan_report+0xdc/0x128 [ 79.515411] __asan_report_load1_noabort+0x20/0x30 [ 79.515446] vmalloc_oob+0x578/0x5d0 [ 79.515479] kunit_try_run_case+0x170/0x3f0 [ 79.515517] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 79.515552] kthread+0x328/0x630 [ 79.515585] ret_from_fork+0x10/0x20 [ 79.515623] [ 79.578614] The buggy address ffff800087c7d7f3 belongs to a vmalloc virtual mapping [ 79.586253] The buggy address belongs to the physical page: [ 79.591810] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8847c6 [ 79.599793] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 79.606314] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 79.614034] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 79.621753] page dumped because: kasan: bad access detected [ 79.627308] [ 79.628783] Memory state around the buggy address: [ 79.633565] ffff800087c7d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 79.640766] ffff800087c7d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 79.647972] >ffff800087c7d780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 79.655172] ^ [ 79.662035] ffff800087c7d800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 79.669238] ffff800087c7d880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 79.676440] ================================================================== [ 79.683837] ================================================================== [ 79.690853] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 79.697534] Read of size 1 at addr ffff800087c7d7f8 by task kunit_try_catch/353 [ 79.704824] [ 79.706309] CPU: 6 UID: 0 PID: 353 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 79.706362] Tainted: [B]=BAD_PAGE, [N]=TEST [ 79.706379] Hardware name: WinLink E850-96 board (DT) [ 79.706399] Call trace: [ 79.706413] show_stack+0x20/0x38 (C) [ 79.706447] dump_stack_lvl+0x8c/0xd0 [ 79.706480] print_report+0x310/0x5d0 [ 79.706508] kasan_report+0xdc/0x128 [ 79.706535] __asan_report_load1_noabort+0x20/0x30 [ 79.706572] vmalloc_oob+0x51c/0x5d0 [ 79.706607] kunit_try_run_case+0x170/0x3f0 [ 79.706644] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 79.706677] kthread+0x328/0x630 [ 79.706708] ret_from_fork+0x10/0x20 [ 79.706744] [ 79.769756] The buggy address ffff800087c7d7f8 belongs to a vmalloc virtual mapping [ 79.777395] The buggy address belongs to the physical page: [ 79.782949] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8847c6 [ 79.790937] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 79.797456] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 79.805176] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 79.812895] page dumped because: kasan: bad access detected [ 79.818451] [ 79.819926] Memory state around the buggy address: [ 79.824705] ffff800087c7d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 79.831909] ffff800087c7d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 79.839114] >ffff800087c7d780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 79.846315] ^ [ 79.853438] ffff800087c7d800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 79.860641] ffff800087c7d880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 79.867842] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 66.800594] ================================================================== [ 66.807623] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858 [ 66.814914] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 66.822292] [ 66.823773] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 66.823822] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.823838] Hardware name: WinLink E850-96 board (DT) [ 66.823857] Call trace: [ 66.823870] show_stack+0x20/0x38 (C) [ 66.823902] dump_stack_lvl+0x8c/0xd0 [ 66.823937] print_report+0x118/0x5d0 [ 66.823963] kasan_report+0xdc/0x128 [ 66.823990] kasan_check_range+0x100/0x1a8 [ 66.824020] __kasan_check_write+0x20/0x30 [ 66.824054] kasan_atomics_helper+0x760/0x4858 [ 66.824088] kasan_atomics+0x198/0x2e0 [ 66.824120] kunit_try_run_case+0x170/0x3f0 [ 66.824154] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.824188] kthread+0x328/0x630 [ 66.824217] ret_from_fork+0x10/0x20 [ 66.824251] [ 66.895207] Allocated by task 349: [ 66.898596] kasan_save_stack+0x3c/0x68 [ 66.902412] kasan_save_track+0x20/0x40 [ 66.906232] kasan_save_alloc_info+0x40/0x58 [ 66.910485] __kasan_kmalloc+0xd4/0xd8 [ 66.914217] __kmalloc_cache_noprof+0x16c/0x3c0 [ 66.918732] kasan_atomics+0xb8/0x2e0 [ 66.922377] kunit_try_run_case+0x170/0x3f0 [ 66.926544] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.932013] kthread+0x328/0x630 [ 66.935224] ret_from_fork+0x10/0x20 [ 66.938783] [ 66.940259] The buggy address belongs to the object at ffff000808448180 [ 66.940259] which belongs to the cache kmalloc-64 of size 64 [ 66.952585] The buggy address is located 0 bytes to the right of [ 66.952585] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 66.965432] [ 66.966908] The buggy address belongs to the physical page: [ 66.972465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 66.980449] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 66.986960] page_type: f5(slab) [ 66.990094] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 66.997817] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 67.005536] page dumped because: kasan: bad access detected [ 67.011091] [ 67.012567] Memory state around the buggy address: [ 67.017347] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.024550] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.031754] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 67.038955] ^ [ 67.043733] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.050938] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.058139] ================================================================== [ 72.867464] ================================================================== [ 72.874546] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 72.881836] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 72.889215] [ 72.890696] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 72.890746] Tainted: [B]=BAD_PAGE, [N]=TEST [ 72.890762] Hardware name: WinLink E850-96 board (DT) [ 72.890781] Call trace: [ 72.890796] show_stack+0x20/0x38 (C) [ 72.890828] dump_stack_lvl+0x8c/0xd0 [ 72.890862] print_report+0x118/0x5d0 [ 72.890891] kasan_report+0xdc/0x128 [ 72.890918] kasan_check_range+0x100/0x1a8 [ 72.890947] __kasan_check_write+0x20/0x30 [ 72.890980] kasan_atomics_helper+0xf20/0x4858 [ 72.891013] kasan_atomics+0x198/0x2e0 [ 72.891046] kunit_try_run_case+0x170/0x3f0 [ 72.891080] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.891116] kthread+0x328/0x630 [ 72.891146] ret_from_fork+0x10/0x20 [ 72.891177] [ 72.962130] Allocated by task 349: [ 72.965515] kasan_save_stack+0x3c/0x68 [ 72.969335] kasan_save_track+0x20/0x40 [ 72.973155] kasan_save_alloc_info+0x40/0x58 [ 72.977408] __kasan_kmalloc+0xd4/0xd8 [ 72.981140] __kmalloc_cache_noprof+0x16c/0x3c0 [ 72.985654] kasan_atomics+0xb8/0x2e0 [ 72.989300] kunit_try_run_case+0x170/0x3f0 [ 72.993467] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.998935] kthread+0x328/0x630 [ 73.002147] ret_from_fork+0x10/0x20 [ 73.005706] [ 73.007181] The buggy address belongs to the object at ffff000808448180 [ 73.007181] which belongs to the cache kmalloc-64 of size 64 [ 73.019510] The buggy address is located 0 bytes to the right of [ 73.019510] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 73.032355] [ 73.033831] The buggy address belongs to the physical page: [ 73.039388] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 73.047373] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 73.053882] page_type: f5(slab) [ 73.057017] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 73.064740] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 73.072458] page dumped because: kasan: bad access detected [ 73.078014] [ 73.079490] Memory state around the buggy address: [ 73.084267] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.091472] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.098677] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.105878] ^ [ 73.110656] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.117860] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.125062] ================================================================== [ 63.627851] ================================================================== [ 63.634928] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 63.642305] Read of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 63.649597] [ 63.651078] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 63.651132] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.651146] Hardware name: WinLink E850-96 board (DT) [ 63.651165] Call trace: [ 63.651178] show_stack+0x20/0x38 (C) [ 63.651211] dump_stack_lvl+0x8c/0xd0 [ 63.651242] print_report+0x118/0x5d0 [ 63.651268] kasan_report+0xdc/0x128 [ 63.651294] __asan_report_load4_noabort+0x20/0x30 [ 63.651329] kasan_atomics_helper+0x40fc/0x4858 [ 63.651363] kasan_atomics+0x198/0x2e0 [ 63.651397] kunit_try_run_case+0x170/0x3f0 [ 63.651431] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.651464] kthread+0x328/0x630 [ 63.651493] ret_from_fork+0x10/0x20 [ 63.651523] [ 63.719213] Allocated by task 349: [ 63.722599] kasan_save_stack+0x3c/0x68 [ 63.726418] kasan_save_track+0x20/0x40 [ 63.730238] kasan_save_alloc_info+0x40/0x58 [ 63.734491] __kasan_kmalloc+0xd4/0xd8 [ 63.738224] __kmalloc_cache_noprof+0x16c/0x3c0 [ 63.742737] kasan_atomics+0xb8/0x2e0 [ 63.746384] kunit_try_run_case+0x170/0x3f0 [ 63.750550] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.756018] kthread+0x328/0x630 [ 63.759230] ret_from_fork+0x10/0x20 [ 63.762789] [ 63.764265] The buggy address belongs to the object at ffff000808448180 [ 63.764265] which belongs to the cache kmalloc-64 of size 64 [ 63.776592] The buggy address is located 0 bytes to the right of [ 63.776592] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 63.789438] [ 63.790914] The buggy address belongs to the physical page: [ 63.796470] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 63.804456] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.810966] page_type: f5(slab) [ 63.814100] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 63.821823] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.829541] page dumped because: kasan: bad access detected [ 63.835097] [ 63.836572] Memory state around the buggy address: [ 63.841351] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.848555] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.855760] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 63.862961] ^ [ 63.867740] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.874944] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.882145] ================================================================== [ 71.814213] ================================================================== [ 71.821263] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 71.828640] Read of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 71.835932] [ 71.837415] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 71.837464] Tainted: [B]=BAD_PAGE, [N]=TEST [ 71.837481] Hardware name: WinLink E850-96 board (DT) [ 71.837498] Call trace: [ 71.837511] show_stack+0x20/0x38 (C) [ 71.837543] dump_stack_lvl+0x8c/0xd0 [ 71.837575] print_report+0x118/0x5d0 [ 71.837603] kasan_report+0xdc/0x128 [ 71.837630] __asan_report_load8_noabort+0x20/0x30 [ 71.837665] kasan_atomics_helper+0x3f58/0x4858 [ 71.837701] kasan_atomics+0x198/0x2e0 [ 71.837733] kunit_try_run_case+0x170/0x3f0 [ 71.837769] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.837804] kthread+0x328/0x630 [ 71.837832] ret_from_fork+0x10/0x20 [ 71.837866] [ 71.905549] Allocated by task 349: [ 71.908936] kasan_save_stack+0x3c/0x68 [ 71.912754] kasan_save_track+0x20/0x40 [ 71.916573] kasan_save_alloc_info+0x40/0x58 [ 71.920826] __kasan_kmalloc+0xd4/0xd8 [ 71.924559] __kmalloc_cache_noprof+0x16c/0x3c0 [ 71.929073] kasan_atomics+0xb8/0x2e0 [ 71.932719] kunit_try_run_case+0x170/0x3f0 [ 71.936885] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.942354] kthread+0x328/0x630 [ 71.945566] ret_from_fork+0x10/0x20 [ 71.949125] [ 71.950600] The buggy address belongs to the object at ffff000808448180 [ 71.950600] which belongs to the cache kmalloc-64 of size 64 [ 71.962927] The buggy address is located 0 bytes to the right of [ 71.962927] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 71.975774] [ 71.977251] The buggy address belongs to the physical page: [ 71.982805] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 71.990791] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 71.997301] page_type: f5(slab) [ 72.000434] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 72.008158] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 72.015877] page dumped because: kasan: bad access detected [ 72.021433] [ 72.022908] Memory state around the buggy address: [ 72.027686] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.034891] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.042096] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 72.049297] ^ [ 72.054075] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.061279] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.068480] ================================================================== [ 68.916773] ================================================================== [ 68.923740] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 68.931028] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 68.938406] [ 68.939890] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 68.939941] Tainted: [B]=BAD_PAGE, [N]=TEST [ 68.939957] Hardware name: WinLink E850-96 board (DT) [ 68.939980] Call trace: [ 68.939994] show_stack+0x20/0x38 (C) [ 68.940027] dump_stack_lvl+0x8c/0xd0 [ 68.940060] print_report+0x118/0x5d0 [ 68.940088] kasan_report+0xdc/0x128 [ 68.940115] kasan_check_range+0x100/0x1a8 [ 68.940145] __kasan_check_write+0x20/0x30 [ 68.940176] kasan_atomics_helper+0xad4/0x4858 [ 68.940211] kasan_atomics+0x198/0x2e0 [ 68.940244] kunit_try_run_case+0x170/0x3f0 [ 68.940279] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.940312] kthread+0x328/0x630 [ 68.940345] ret_from_fork+0x10/0x20 [ 68.940377] [ 69.011321] Allocated by task 349: [ 69.014707] kasan_save_stack+0x3c/0x68 [ 69.018526] kasan_save_track+0x20/0x40 [ 69.022346] kasan_save_alloc_info+0x40/0x58 [ 69.026599] __kasan_kmalloc+0xd4/0xd8 [ 69.030332] __kmalloc_cache_noprof+0x16c/0x3c0 [ 69.034845] kasan_atomics+0xb8/0x2e0 [ 69.038491] kunit_try_run_case+0x170/0x3f0 [ 69.042658] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.048128] kthread+0x328/0x630 [ 69.051338] ret_from_fork+0x10/0x20 [ 69.054897] [ 69.056373] The buggy address belongs to the object at ffff000808448180 [ 69.056373] which belongs to the cache kmalloc-64 of size 64 [ 69.068700] The buggy address is located 0 bytes to the right of [ 69.068700] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 69.081546] [ 69.083023] The buggy address belongs to the physical page: [ 69.088580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 69.096565] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 69.103074] page_type: f5(slab) [ 69.106210] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 69.113931] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 69.121650] page dumped because: kasan: bad access detected [ 69.127205] [ 69.128681] Memory state around the buggy address: [ 69.133461] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.140664] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.147868] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 69.155069] ^ [ 69.159847] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.167052] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.174253] ================================================================== [ 76.839974] ================================================================== [ 76.847056] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 76.854433] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 76.861812] [ 76.863295] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 76.863344] Tainted: [B]=BAD_PAGE, [N]=TEST [ 76.863358] Hardware name: WinLink E850-96 board (DT) [ 76.863378] Call trace: [ 76.863390] show_stack+0x20/0x38 (C) [ 76.863424] dump_stack_lvl+0x8c/0xd0 [ 76.863457] print_report+0x118/0x5d0 [ 76.863485] kasan_report+0xdc/0x128 [ 76.863514] kasan_check_range+0x100/0x1a8 [ 76.863545] __kasan_check_write+0x20/0x30 [ 76.863578] kasan_atomics_helper+0x154c/0x4858 [ 76.863615] kasan_atomics+0x198/0x2e0 [ 76.863647] kunit_try_run_case+0x170/0x3f0 [ 76.863683] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.863716] kthread+0x328/0x630 [ 76.863746] ret_from_fork+0x10/0x20 [ 76.863781] [ 76.934814] Allocated by task 349: [ 76.938201] kasan_save_stack+0x3c/0x68 [ 76.942018] kasan_save_track+0x20/0x40 [ 76.945838] kasan_save_alloc_info+0x40/0x58 [ 76.950091] __kasan_kmalloc+0xd4/0xd8 [ 76.953824] __kmalloc_cache_noprof+0x16c/0x3c0 [ 76.958338] kasan_atomics+0xb8/0x2e0 [ 76.961983] kunit_try_run_case+0x170/0x3f0 [ 76.966150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.971619] kthread+0x328/0x630 [ 76.974830] ret_from_fork+0x10/0x20 [ 76.978389] [ 76.979865] The buggy address belongs to the object at ffff000808448180 [ 76.979865] which belongs to the cache kmalloc-64 of size 64 [ 76.992192] The buggy address is located 0 bytes to the right of [ 76.992192] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 77.005038] [ 77.006514] The buggy address belongs to the physical page: [ 77.012071] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 77.020056] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 77.026566] page_type: f5(slab) [ 77.029699] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 77.037423] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 77.045142] page dumped because: kasan: bad access detected [ 77.050697] [ 77.052173] Memory state around the buggy address: [ 77.056951] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 77.064156] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 77.071360] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 77.078562] ^ [ 77.083339] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.090544] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.097745] ================================================================== [ 64.681185] ================================================================== [ 64.688212] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 64.695501] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 64.702879] [ 64.704361] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 64.704413] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.704430] Hardware name: WinLink E850-96 board (DT) [ 64.704450] Call trace: [ 64.704463] show_stack+0x20/0x38 (C) [ 64.704497] dump_stack_lvl+0x8c/0xd0 [ 64.704529] print_report+0x118/0x5d0 [ 64.704557] kasan_report+0xdc/0x128 [ 64.704584] kasan_check_range+0x100/0x1a8 [ 64.704614] __kasan_check_write+0x20/0x30 [ 64.704644] kasan_atomics_helper+0x414/0x4858 [ 64.704678] kasan_atomics+0x198/0x2e0 [ 64.704710] kunit_try_run_case+0x170/0x3f0 [ 64.704745] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.704778] kthread+0x328/0x630 [ 64.704804] ret_from_fork+0x10/0x20 [ 64.704836] [ 64.775794] Allocated by task 349: [ 64.779182] kasan_save_stack+0x3c/0x68 [ 64.783000] kasan_save_track+0x20/0x40 [ 64.786819] kasan_save_alloc_info+0x40/0x58 [ 64.791073] __kasan_kmalloc+0xd4/0xd8 [ 64.794805] __kmalloc_cache_noprof+0x16c/0x3c0 [ 64.799319] kasan_atomics+0xb8/0x2e0 [ 64.802964] kunit_try_run_case+0x170/0x3f0 [ 64.807131] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.812600] kthread+0x328/0x630 [ 64.815811] ret_from_fork+0x10/0x20 [ 64.819371] [ 64.820846] The buggy address belongs to the object at ffff000808448180 [ 64.820846] which belongs to the cache kmalloc-64 of size 64 [ 64.833172] The buggy address is located 0 bytes to the right of [ 64.833172] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 64.846019] [ 64.847495] The buggy address belongs to the physical page: [ 64.853053] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 64.861037] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 64.867547] page_type: f5(slab) [ 64.870680] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 64.878404] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.886123] page dumped because: kasan: bad access detected [ 64.891678] [ 64.893154] Memory state around the buggy address: [ 64.897932] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.905137] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.912341] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 64.919543] ^ [ 64.924320] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.931525] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.938727] ================================================================== [ 76.044790] ================================================================== [ 76.051757] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 76.059133] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 76.066511] [ 76.067994] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 76.068044] Tainted: [B]=BAD_PAGE, [N]=TEST [ 76.068059] Hardware name: WinLink E850-96 board (DT) [ 76.068082] Call trace: [ 76.068097] show_stack+0x20/0x38 (C) [ 76.068127] dump_stack_lvl+0x8c/0xd0 [ 76.068160] print_report+0x118/0x5d0 [ 76.068190] kasan_report+0xdc/0x128 [ 76.068219] kasan_check_range+0x100/0x1a8 [ 76.068250] __kasan_check_write+0x20/0x30 [ 76.068284] kasan_atomics_helper+0x1414/0x4858 [ 76.068319] kasan_atomics+0x198/0x2e0 [ 76.068351] kunit_try_run_case+0x170/0x3f0 [ 76.068388] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.068421] kthread+0x328/0x630 [ 76.068452] ret_from_fork+0x10/0x20 [ 76.068488] [ 76.139513] Allocated by task 349: [ 76.142900] kasan_save_stack+0x3c/0x68 [ 76.146718] kasan_save_track+0x20/0x40 [ 76.150537] kasan_save_alloc_info+0x40/0x58 [ 76.154791] __kasan_kmalloc+0xd4/0xd8 [ 76.158523] __kmalloc_cache_noprof+0x16c/0x3c0 [ 76.163037] kasan_atomics+0xb8/0x2e0 [ 76.166683] kunit_try_run_case+0x170/0x3f0 [ 76.170850] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.176319] kthread+0x328/0x630 [ 76.179530] ret_from_fork+0x10/0x20 [ 76.183089] [ 76.184564] The buggy address belongs to the object at ffff000808448180 [ 76.184564] which belongs to the cache kmalloc-64 of size 64 [ 76.196891] The buggy address is located 0 bytes to the right of [ 76.196891] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 76.209738] [ 76.211214] The buggy address belongs to the physical page: [ 76.216771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 76.224755] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 76.231265] page_type: f5(slab) [ 76.234400] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 76.242122] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 76.249841] page dumped because: kasan: bad access detected [ 76.255397] [ 76.256872] Memory state around the buggy address: [ 76.261653] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 76.268855] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 76.276060] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 76.283261] ^ [ 76.288040] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.295243] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.302445] ================================================================== [ 68.651764] ================================================================== [ 68.658811] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 68.666101] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 68.673479] [ 68.674963] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 68.675012] Tainted: [B]=BAD_PAGE, [N]=TEST [ 68.675032] Hardware name: WinLink E850-96 board (DT) [ 68.675051] Call trace: [ 68.675063] show_stack+0x20/0x38 (C) [ 68.675096] dump_stack_lvl+0x8c/0xd0 [ 68.675130] print_report+0x118/0x5d0 [ 68.675158] kasan_report+0xdc/0x128 [ 68.675187] kasan_check_range+0x100/0x1a8 [ 68.675216] __kasan_check_write+0x20/0x30 [ 68.675249] kasan_atomics_helper+0xa6c/0x4858 [ 68.675283] kasan_atomics+0x198/0x2e0 [ 68.675315] kunit_try_run_case+0x170/0x3f0 [ 68.675350] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.675386] kthread+0x328/0x630 [ 68.675414] ret_from_fork+0x10/0x20 [ 68.675448] [ 68.746395] Allocated by task 349: [ 68.749780] kasan_save_stack+0x3c/0x68 [ 68.753600] kasan_save_track+0x20/0x40 [ 68.757419] kasan_save_alloc_info+0x40/0x58 [ 68.761673] __kasan_kmalloc+0xd4/0xd8 [ 68.765405] __kmalloc_cache_noprof+0x16c/0x3c0 [ 68.769919] kasan_atomics+0xb8/0x2e0 [ 68.773564] kunit_try_run_case+0x170/0x3f0 [ 68.777731] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.783201] kthread+0x328/0x630 [ 68.786412] ret_from_fork+0x10/0x20 [ 68.789971] [ 68.791446] The buggy address belongs to the object at ffff000808448180 [ 68.791446] which belongs to the cache kmalloc-64 of size 64 [ 68.803773] The buggy address is located 0 bytes to the right of [ 68.803773] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 68.816619] [ 68.818095] The buggy address belongs to the physical page: [ 68.823653] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 68.831637] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 68.838147] page_type: f5(slab) [ 68.841281] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 68.849004] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 68.856723] page dumped because: kasan: bad access detected [ 68.862278] [ 68.863754] Memory state around the buggy address: [ 68.868532] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.875737] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.882942] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 68.890143] ^ [ 68.894921] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.902125] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.909327] ================================================================== [ 63.098166] ================================================================== [ 63.105249] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 63.112540] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 63.119917] [ 63.121400] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 63.121455] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.121473] Hardware name: WinLink E850-96 board (DT) [ 63.121494] Call trace: [ 63.121510] show_stack+0x20/0x38 (C) [ 63.121544] dump_stack_lvl+0x8c/0xd0 [ 63.121580] print_report+0x118/0x5d0 [ 63.121607] kasan_report+0xdc/0x128 [ 63.121634] kasan_check_range+0x100/0x1a8 [ 63.121663] __kasan_check_write+0x20/0x30 [ 63.121695] kasan_atomics_helper+0x24c/0x4858 [ 63.121730] kasan_atomics+0x198/0x2e0 [ 63.121763] kunit_try_run_case+0x170/0x3f0 [ 63.121801] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.121833] kthread+0x328/0x630 [ 63.121862] ret_from_fork+0x10/0x20 [ 63.121894] [ 63.192832] Allocated by task 349: [ 63.196220] kasan_save_stack+0x3c/0x68 [ 63.200038] kasan_save_track+0x20/0x40 [ 63.203857] kasan_save_alloc_info+0x40/0x58 [ 63.208110] __kasan_kmalloc+0xd4/0xd8 [ 63.211843] __kmalloc_cache_noprof+0x16c/0x3c0 [ 63.216356] kasan_atomics+0xb8/0x2e0 [ 63.220002] kunit_try_run_case+0x170/0x3f0 [ 63.224169] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.229638] kthread+0x328/0x630 [ 63.232849] ret_from_fork+0x10/0x20 [ 63.236408] [ 63.237884] The buggy address belongs to the object at ffff000808448180 [ 63.237884] which belongs to the cache kmalloc-64 of size 64 [ 63.250211] The buggy address is located 0 bytes to the right of [ 63.250211] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 63.263057] [ 63.264535] The buggy address belongs to the physical page: [ 63.270090] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 63.278075] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.284585] page_type: f5(slab) [ 63.287719] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 63.295442] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.303161] page dumped because: kasan: bad access detected [ 63.308716] [ 63.310192] Memory state around the buggy address: [ 63.314970] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.322175] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.329379] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 63.336580] ^ [ 63.341359] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.348563] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.355764] ================================================================== [ 65.740864] ================================================================== [ 65.747917] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 65.755207] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 65.762586] [ 65.764065] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 65.764114] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.764132] Hardware name: WinLink E850-96 board (DT) [ 65.764151] Call trace: [ 65.764163] show_stack+0x20/0x38 (C) [ 65.764195] dump_stack_lvl+0x8c/0xd0 [ 65.764229] print_report+0x118/0x5d0 [ 65.764256] kasan_report+0xdc/0x128 [ 65.764284] kasan_check_range+0x100/0x1a8 [ 65.764313] __kasan_check_write+0x20/0x30 [ 65.764344] kasan_atomics_helper+0x5b4/0x4858 [ 65.764380] kasan_atomics+0x198/0x2e0 [ 65.764411] kunit_try_run_case+0x170/0x3f0 [ 65.764445] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.764481] kthread+0x328/0x630 [ 65.764509] ret_from_fork+0x10/0x20 [ 65.764540] [ 65.835501] Allocated by task 349: [ 65.838886] kasan_save_stack+0x3c/0x68 [ 65.842706] kasan_save_track+0x20/0x40 [ 65.846525] kasan_save_alloc_info+0x40/0x58 [ 65.850779] __kasan_kmalloc+0xd4/0xd8 [ 65.854511] __kmalloc_cache_noprof+0x16c/0x3c0 [ 65.859025] kasan_atomics+0xb8/0x2e0 [ 65.862671] kunit_try_run_case+0x170/0x3f0 [ 65.866837] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.872306] kthread+0x328/0x630 [ 65.875518] ret_from_fork+0x10/0x20 [ 65.879077] [ 65.880552] The buggy address belongs to the object at ffff000808448180 [ 65.880552] which belongs to the cache kmalloc-64 of size 64 [ 65.892879] The buggy address is located 0 bytes to the right of [ 65.892879] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 65.905726] [ 65.907202] The buggy address belongs to the physical page: [ 65.912759] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 65.920743] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 65.927253] page_type: f5(slab) [ 65.930386] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 65.938110] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.945829] page dumped because: kasan: bad access detected [ 65.951385] [ 65.952860] Memory state around the buggy address: [ 65.957638] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.964843] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.972048] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 65.979249] ^ [ 65.984027] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.991231] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.998433] ================================================================== [ 77.370202] ================================================================== [ 77.377257] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 77.384633] Read of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 77.391925] [ 77.393408] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 77.393457] Tainted: [B]=BAD_PAGE, [N]=TEST [ 77.393472] Hardware name: WinLink E850-96 board (DT) [ 77.393491] Call trace: [ 77.393506] show_stack+0x20/0x38 (C) [ 77.393538] dump_stack_lvl+0x8c/0xd0 [ 77.393569] print_report+0x118/0x5d0 [ 77.393597] kasan_report+0xdc/0x128 [ 77.393625] __asan_report_load8_noabort+0x20/0x30 [ 77.393660] kasan_atomics_helper+0x3db0/0x4858 [ 77.393695] kasan_atomics+0x198/0x2e0 [ 77.393730] kunit_try_run_case+0x170/0x3f0 [ 77.393767] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.393802] kthread+0x328/0x630 [ 77.393829] ret_from_fork+0x10/0x20 [ 77.393863] [ 77.461542] Allocated by task 349: [ 77.464929] kasan_save_stack+0x3c/0x68 [ 77.468747] kasan_save_track+0x20/0x40 [ 77.472566] kasan_save_alloc_info+0x40/0x58 [ 77.476819] __kasan_kmalloc+0xd4/0xd8 [ 77.480552] __kmalloc_cache_noprof+0x16c/0x3c0 [ 77.485066] kasan_atomics+0xb8/0x2e0 [ 77.488712] kunit_try_run_case+0x170/0x3f0 [ 77.492878] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.498347] kthread+0x328/0x630 [ 77.501559] ret_from_fork+0x10/0x20 [ 77.505118] [ 77.506593] The buggy address belongs to the object at ffff000808448180 [ 77.506593] which belongs to the cache kmalloc-64 of size 64 [ 77.518920] The buggy address is located 0 bytes to the right of [ 77.518920] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 77.531766] [ 77.533242] The buggy address belongs to the physical page: [ 77.538798] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 77.546784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 77.553294] page_type: f5(slab) [ 77.556428] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 77.564151] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 77.571870] page dumped because: kasan: bad access detected [ 77.577425] [ 77.578901] Memory state around the buggy address: [ 77.583679] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 77.590884] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 77.598089] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 77.605290] ^ [ 77.610068] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.617272] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.624473] ================================================================== [ 74.722703] ================================================================== [ 74.729727] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 74.737104] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 74.744482] [ 74.745964] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 74.746014] Tainted: [B]=BAD_PAGE, [N]=TEST [ 74.746031] Hardware name: WinLink E850-96 board (DT) [ 74.746052] Call trace: [ 74.746065] show_stack+0x20/0x38 (C) [ 74.746096] dump_stack_lvl+0x8c/0xd0 [ 74.746128] print_report+0x118/0x5d0 [ 74.746157] kasan_report+0xdc/0x128 [ 74.746183] kasan_check_range+0x100/0x1a8 [ 74.746212] __kasan_check_write+0x20/0x30 [ 74.746247] kasan_atomics_helper+0x11f8/0x4858 [ 74.746283] kasan_atomics+0x198/0x2e0 [ 74.746316] kunit_try_run_case+0x170/0x3f0 [ 74.746351] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.746386] kthread+0x328/0x630 [ 74.746416] ret_from_fork+0x10/0x20 [ 74.746450] [ 74.817484] Allocated by task 349: [ 74.820870] kasan_save_stack+0x3c/0x68 [ 74.824689] kasan_save_track+0x20/0x40 [ 74.828509] kasan_save_alloc_info+0x40/0x58 [ 74.832762] __kasan_kmalloc+0xd4/0xd8 [ 74.836494] __kmalloc_cache_noprof+0x16c/0x3c0 [ 74.841009] kasan_atomics+0xb8/0x2e0 [ 74.844654] kunit_try_run_case+0x170/0x3f0 [ 74.848820] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.854291] kthread+0x328/0x630 [ 74.857501] ret_from_fork+0x10/0x20 [ 74.861060] [ 74.862535] The buggy address belongs to the object at ffff000808448180 [ 74.862535] which belongs to the cache kmalloc-64 of size 64 [ 74.874864] The buggy address is located 0 bytes to the right of [ 74.874864] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 74.887709] [ 74.889185] The buggy address belongs to the physical page: [ 74.894741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 74.902727] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 74.909236] page_type: f5(slab) [ 74.912369] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 74.920093] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 74.927813] page dumped because: kasan: bad access detected [ 74.933368] [ 74.934844] Memory state around the buggy address: [ 74.939623] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.946826] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.954031] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 74.961232] ^ [ 74.966010] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.973215] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.980416] ================================================================== [ 66.270698] ================================================================== [ 66.277770] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 66.285061] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 66.292439] [ 66.293922] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 66.293970] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.293988] Hardware name: WinLink E850-96 board (DT) [ 66.294008] Call trace: [ 66.294022] show_stack+0x20/0x38 (C) [ 66.294055] dump_stack_lvl+0x8c/0xd0 [ 66.294088] print_report+0x118/0x5d0 [ 66.294115] kasan_report+0xdc/0x128 [ 66.294143] kasan_check_range+0x100/0x1a8 [ 66.294172] __kasan_check_write+0x20/0x30 [ 66.294207] kasan_atomics_helper+0x684/0x4858 [ 66.294242] kasan_atomics+0x198/0x2e0 [ 66.294274] kunit_try_run_case+0x170/0x3f0 [ 66.294308] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.294343] kthread+0x328/0x630 [ 66.294374] ret_from_fork+0x10/0x20 [ 66.294409] [ 66.365354] Allocated by task 349: [ 66.368742] kasan_save_stack+0x3c/0x68 [ 66.372559] kasan_save_track+0x20/0x40 [ 66.376379] kasan_save_alloc_info+0x40/0x58 [ 66.380632] __kasan_kmalloc+0xd4/0xd8 [ 66.384365] __kmalloc_cache_noprof+0x16c/0x3c0 [ 66.388878] kasan_atomics+0xb8/0x2e0 [ 66.392524] kunit_try_run_case+0x170/0x3f0 [ 66.396691] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.402159] kthread+0x328/0x630 [ 66.405371] ret_from_fork+0x10/0x20 [ 66.408930] [ 66.410405] The buggy address belongs to the object at ffff000808448180 [ 66.410405] which belongs to the cache kmalloc-64 of size 64 [ 66.422732] The buggy address is located 0 bytes to the right of [ 66.422732] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 66.435579] [ 66.437057] The buggy address belongs to the physical page: [ 66.442613] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 66.450598] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 66.457107] page_type: f5(slab) [ 66.460240] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 66.467964] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.475683] page dumped because: kasan: bad access detected [ 66.481238] [ 66.482714] Memory state around the buggy address: [ 66.487493] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.494696] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.501901] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 66.509102] ^ [ 66.513880] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.521085] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.528286] ================================================================== [ 71.549457] ================================================================== [ 71.556510] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 71.563801] Read of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 71.571092] [ 71.572577] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 71.572627] Tainted: [B]=BAD_PAGE, [N]=TEST [ 71.572642] Hardware name: WinLink E850-96 board (DT) [ 71.572662] Call trace: [ 71.572677] show_stack+0x20/0x38 (C) [ 71.572708] dump_stack_lvl+0x8c/0xd0 [ 71.572741] print_report+0x118/0x5d0 [ 71.572769] kasan_report+0xdc/0x128 [ 71.572795] kasan_check_range+0x100/0x1a8 [ 71.572827] __kasan_check_read+0x20/0x30 [ 71.572858] kasan_atomics_helper+0xdd4/0x4858 [ 71.572894] kasan_atomics+0x198/0x2e0 [ 71.572925] kunit_try_run_case+0x170/0x3f0 [ 71.572962] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.572995] kthread+0x328/0x630 [ 71.573025] ret_from_fork+0x10/0x20 [ 71.573055] [ 71.643921] Allocated by task 349: [ 71.647308] kasan_save_stack+0x3c/0x68 [ 71.651125] kasan_save_track+0x20/0x40 [ 71.654945] kasan_save_alloc_info+0x40/0x58 [ 71.659198] __kasan_kmalloc+0xd4/0xd8 [ 71.662931] __kmalloc_cache_noprof+0x16c/0x3c0 [ 71.667445] kasan_atomics+0xb8/0x2e0 [ 71.671091] kunit_try_run_case+0x170/0x3f0 [ 71.675257] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.680726] kthread+0x328/0x630 [ 71.683938] ret_from_fork+0x10/0x20 [ 71.687497] [ 71.688972] The buggy address belongs to the object at ffff000808448180 [ 71.688972] which belongs to the cache kmalloc-64 of size 64 [ 71.701299] The buggy address is located 0 bytes to the right of [ 71.701299] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 71.714146] [ 71.715623] The buggy address belongs to the physical page: [ 71.721178] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 71.729163] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 71.735673] page_type: f5(slab) [ 71.738806] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 71.746530] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 71.754249] page dumped because: kasan: bad access detected [ 71.759804] [ 71.761280] Memory state around the buggy address: [ 71.766058] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.773263] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.780468] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 71.787668] ^ [ 71.792446] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.799651] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.806852] ================================================================== [ 70.761273] ================================================================== [ 70.768330] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 70.775705] Read of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 70.782996] [ 70.784479] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 70.784529] Tainted: [B]=BAD_PAGE, [N]=TEST [ 70.784544] Hardware name: WinLink E850-96 board (DT) [ 70.784565] Call trace: [ 70.784577] show_stack+0x20/0x38 (C) [ 70.784608] dump_stack_lvl+0x8c/0xd0 [ 70.784640] print_report+0x118/0x5d0 [ 70.784669] kasan_report+0xdc/0x128 [ 70.784698] __asan_report_load4_noabort+0x20/0x30 [ 70.784731] kasan_atomics_helper+0x3dd8/0x4858 [ 70.784766] kasan_atomics+0x198/0x2e0 [ 70.784798] kunit_try_run_case+0x170/0x3f0 [ 70.784834] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.784867] kthread+0x328/0x630 [ 70.784897] ret_from_fork+0x10/0x20 [ 70.784929] [ 70.852613] Allocated by task 349: [ 70.856000] kasan_save_stack+0x3c/0x68 [ 70.859818] kasan_save_track+0x20/0x40 [ 70.863638] kasan_save_alloc_info+0x40/0x58 [ 70.867891] __kasan_kmalloc+0xd4/0xd8 [ 70.871624] __kmalloc_cache_noprof+0x16c/0x3c0 [ 70.876138] kasan_atomics+0xb8/0x2e0 [ 70.879783] kunit_try_run_case+0x170/0x3f0 [ 70.883949] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.889418] kthread+0x328/0x630 [ 70.892630] ret_from_fork+0x10/0x20 [ 70.896189] [ 70.897664] The buggy address belongs to the object at ffff000808448180 [ 70.897664] which belongs to the cache kmalloc-64 of size 64 [ 70.909991] The buggy address is located 0 bytes to the right of [ 70.909991] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 70.922838] [ 70.924314] The buggy address belongs to the physical page: [ 70.929870] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 70.937856] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 70.944365] page_type: f5(slab) [ 70.947500] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 70.955223] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 70.962941] page dumped because: kasan: bad access detected [ 70.968497] [ 70.969972] Memory state around the buggy address: [ 70.974750] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.981955] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.989160] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 70.996361] ^ [ 71.001139] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.008344] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.015545] ================================================================== [ 64.946178] ================================================================== [ 64.953141] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 64.960428] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 64.967806] [ 64.969289] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 64.969339] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.969356] Hardware name: WinLink E850-96 board (DT) [ 64.969377] Call trace: [ 64.969389] show_stack+0x20/0x38 (C) [ 64.969421] dump_stack_lvl+0x8c/0xd0 [ 64.969456] print_report+0x118/0x5d0 [ 64.969485] kasan_report+0xdc/0x128 [ 64.969513] kasan_check_range+0x100/0x1a8 [ 64.969544] __kasan_check_write+0x20/0x30 [ 64.969575] kasan_atomics_helper+0x47c/0x4858 [ 64.969608] kasan_atomics+0x198/0x2e0 [ 64.969639] kunit_try_run_case+0x170/0x3f0 [ 64.969672] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.969705] kthread+0x328/0x630 [ 64.969736] ret_from_fork+0x10/0x20 [ 64.969767] [ 65.040721] Allocated by task 349: [ 65.044107] kasan_save_stack+0x3c/0x68 [ 65.047926] kasan_save_track+0x20/0x40 [ 65.051746] kasan_save_alloc_info+0x40/0x58 [ 65.055999] __kasan_kmalloc+0xd4/0xd8 [ 65.059732] __kmalloc_cache_noprof+0x16c/0x3c0 [ 65.064246] kasan_atomics+0xb8/0x2e0 [ 65.067891] kunit_try_run_case+0x170/0x3f0 [ 65.072057] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.077526] kthread+0x328/0x630 [ 65.080738] ret_from_fork+0x10/0x20 [ 65.084297] [ 65.085772] The buggy address belongs to the object at ffff000808448180 [ 65.085772] which belongs to the cache kmalloc-64 of size 64 [ 65.098099] The buggy address is located 0 bytes to the right of [ 65.098099] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 65.110946] [ 65.112424] The buggy address belongs to the physical page: [ 65.117979] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 65.125965] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 65.132474] page_type: f5(slab) [ 65.135608] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 65.143331] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.151050] page dumped because: kasan: bad access detected [ 65.156605] [ 65.158080] Memory state around the buggy address: [ 65.162859] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.170063] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.177268] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 65.184469] ^ [ 65.189247] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.196452] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.203653] ================================================================== [ 67.595318] ================================================================== [ 67.602405] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 67.609780] Read of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 67.617072] [ 67.618556] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 67.618607] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.618623] Hardware name: WinLink E850-96 board (DT) [ 67.618643] Call trace: [ 67.618655] show_stack+0x20/0x38 (C) [ 67.618688] dump_stack_lvl+0x8c/0xd0 [ 67.618723] print_report+0x118/0x5d0 [ 67.618751] kasan_report+0xdc/0x128 [ 67.618777] __asan_report_load4_noabort+0x20/0x30 [ 67.618812] kasan_atomics_helper+0x42d8/0x4858 [ 67.618848] kasan_atomics+0x198/0x2e0 [ 67.618880] kunit_try_run_case+0x170/0x3f0 [ 67.618918] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.618953] kthread+0x328/0x630 [ 67.618983] ret_from_fork+0x10/0x20 [ 67.619013] [ 67.686689] Allocated by task 349: [ 67.690076] kasan_save_stack+0x3c/0x68 [ 67.693894] kasan_save_track+0x20/0x40 [ 67.697713] kasan_save_alloc_info+0x40/0x58 [ 67.701966] __kasan_kmalloc+0xd4/0xd8 [ 67.705699] __kmalloc_cache_noprof+0x16c/0x3c0 [ 67.710212] kasan_atomics+0xb8/0x2e0 [ 67.713858] kunit_try_run_case+0x170/0x3f0 [ 67.718025] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.723494] kthread+0x328/0x630 [ 67.726705] ret_from_fork+0x10/0x20 [ 67.730265] [ 67.731740] The buggy address belongs to the object at ffff000808448180 [ 67.731740] which belongs to the cache kmalloc-64 of size 64 [ 67.744067] The buggy address is located 0 bytes to the right of [ 67.744067] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 67.756913] [ 67.758389] The buggy address belongs to the physical page: [ 67.763946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 67.771930] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 67.778441] page_type: f5(slab) [ 67.781573] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 67.789298] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 67.797017] page dumped because: kasan: bad access detected [ 67.802572] [ 67.804048] Memory state around the buggy address: [ 67.808827] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.816031] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.823235] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 67.830437] ^ [ 67.835214] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.842419] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.849620] ================================================================== [ 71.287829] ================================================================== [ 71.294882] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 71.302259] Read of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 71.309551] [ 71.311036] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 71.311086] Tainted: [B]=BAD_PAGE, [N]=TEST [ 71.311103] Hardware name: WinLink E850-96 board (DT) [ 71.311122] Call trace: [ 71.311136] show_stack+0x20/0x38 (C) [ 71.311168] dump_stack_lvl+0x8c/0xd0 [ 71.311201] print_report+0x118/0x5d0 [ 71.311230] kasan_report+0xdc/0x128 [ 71.311258] __asan_report_load4_noabort+0x20/0x30 [ 71.311294] kasan_atomics_helper+0x3e04/0x4858 [ 71.311329] kasan_atomics+0x198/0x2e0 [ 71.311362] kunit_try_run_case+0x170/0x3f0 [ 71.311397] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.311431] kthread+0x328/0x630 [ 71.311460] ret_from_fork+0x10/0x20 [ 71.311494] [ 71.379168] Allocated by task 349: [ 71.382555] kasan_save_stack+0x3c/0x68 [ 71.386372] kasan_save_track+0x20/0x40 [ 71.390192] kasan_save_alloc_info+0x40/0x58 [ 71.394445] __kasan_kmalloc+0xd4/0xd8 [ 71.398178] __kmalloc_cache_noprof+0x16c/0x3c0 [ 71.402692] kasan_atomics+0xb8/0x2e0 [ 71.406338] kunit_try_run_case+0x170/0x3f0 [ 71.410504] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.415973] kthread+0x328/0x630 [ 71.419185] ret_from_fork+0x10/0x20 [ 71.422744] [ 71.424219] The buggy address belongs to the object at ffff000808448180 [ 71.424219] which belongs to the cache kmalloc-64 of size 64 [ 71.436546] The buggy address is located 0 bytes to the right of [ 71.436546] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 71.449393] [ 71.450870] The buggy address belongs to the physical page: [ 71.456424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 71.464410] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 71.470920] page_type: f5(slab) [ 71.474055] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 71.481777] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 71.489496] page dumped because: kasan: bad access detected [ 71.495051] [ 71.496527] Memory state around the buggy address: [ 71.501305] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.508510] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.515715] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 71.522916] ^ [ 71.527694] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.534898] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.542100] ================================================================== [ 70.496372] ================================================================== [ 70.503403] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 70.510692] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 70.518070] [ 70.519553] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 70.519604] Tainted: [B]=BAD_PAGE, [N]=TEST [ 70.519621] Hardware name: WinLink E850-96 board (DT) [ 70.519644] Call trace: [ 70.519658] show_stack+0x20/0x38 (C) [ 70.519688] dump_stack_lvl+0x8c/0xd0 [ 70.519718] print_report+0x118/0x5d0 [ 70.519746] kasan_report+0xdc/0x128 [ 70.519774] kasan_check_range+0x100/0x1a8 [ 70.519803] __kasan_check_write+0x20/0x30 [ 70.519837] kasan_atomics_helper+0xca0/0x4858 [ 70.519871] kasan_atomics+0x198/0x2e0 [ 70.519904] kunit_try_run_case+0x170/0x3f0 [ 70.519939] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.519975] kthread+0x328/0x630 [ 70.520003] ret_from_fork+0x10/0x20 [ 70.520034] [ 70.590985] Allocated by task 349: [ 70.594372] kasan_save_stack+0x3c/0x68 [ 70.598190] kasan_save_track+0x20/0x40 [ 70.602010] kasan_save_alloc_info+0x40/0x58 [ 70.606263] __kasan_kmalloc+0xd4/0xd8 [ 70.609996] __kmalloc_cache_noprof+0x16c/0x3c0 [ 70.614509] kasan_atomics+0xb8/0x2e0 [ 70.618155] kunit_try_run_case+0x170/0x3f0 [ 70.622322] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.627792] kthread+0x328/0x630 [ 70.631002] ret_from_fork+0x10/0x20 [ 70.634561] [ 70.636036] The buggy address belongs to the object at ffff000808448180 [ 70.636036] which belongs to the cache kmalloc-64 of size 64 [ 70.648363] The buggy address is located 0 bytes to the right of [ 70.648363] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 70.661210] [ 70.662686] The buggy address belongs to the physical page: [ 70.668243] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 70.676227] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 70.682737] page_type: f5(slab) [ 70.685870] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 70.693595] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 70.701314] page dumped because: kasan: bad access detected [ 70.706869] [ 70.708344] Memory state around the buggy address: [ 70.713124] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.720327] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.727532] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 70.734733] ^ [ 70.739511] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.746716] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.753917] ================================================================== [ 73.662304] ================================================================== [ 73.669326] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 73.676703] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 73.684081] [ 73.685564] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 73.685616] Tainted: [B]=BAD_PAGE, [N]=TEST [ 73.685634] Hardware name: WinLink E850-96 board (DT) [ 73.685655] Call trace: [ 73.685667] show_stack+0x20/0x38 (C) [ 73.685702] dump_stack_lvl+0x8c/0xd0 [ 73.685734] print_report+0x118/0x5d0 [ 73.685761] kasan_report+0xdc/0x128 [ 73.685788] kasan_check_range+0x100/0x1a8 [ 73.685818] __kasan_check_write+0x20/0x30 [ 73.685850] kasan_atomics_helper+0x1058/0x4858 [ 73.685886] kasan_atomics+0x198/0x2e0 [ 73.685918] kunit_try_run_case+0x170/0x3f0 [ 73.685954] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.685990] kthread+0x328/0x630 [ 73.686019] ret_from_fork+0x10/0x20 [ 73.686052] [ 73.757083] Allocated by task 349: [ 73.760469] kasan_save_stack+0x3c/0x68 [ 73.764289] kasan_save_track+0x20/0x40 [ 73.768108] kasan_save_alloc_info+0x40/0x58 [ 73.772361] __kasan_kmalloc+0xd4/0xd8 [ 73.776094] __kmalloc_cache_noprof+0x16c/0x3c0 [ 73.780607] kasan_atomics+0xb8/0x2e0 [ 73.784253] kunit_try_run_case+0x170/0x3f0 [ 73.788420] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.793889] kthread+0x328/0x630 [ 73.797100] ret_from_fork+0x10/0x20 [ 73.800659] [ 73.802136] The buggy address belongs to the object at ffff000808448180 [ 73.802136] which belongs to the cache kmalloc-64 of size 64 [ 73.814463] The buggy address is located 0 bytes to the right of [ 73.814463] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 73.827308] [ 73.828784] The buggy address belongs to the physical page: [ 73.834343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 73.842326] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 73.848836] page_type: f5(slab) [ 73.851970] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 73.859693] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 73.867412] page dumped because: kasan: bad access detected [ 73.872967] [ 73.874443] Memory state around the buggy address: [ 73.879221] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.886425] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.893630] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.900831] ^ [ 73.905609] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.912814] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.920015] ================================================================== [ 73.132446] ================================================================== [ 73.139475] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 73.146763] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 73.154141] [ 73.155624] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 73.155675] Tainted: [B]=BAD_PAGE, [N]=TEST [ 73.155690] Hardware name: WinLink E850-96 board (DT) [ 73.155712] Call trace: [ 73.155724] show_stack+0x20/0x38 (C) [ 73.155755] dump_stack_lvl+0x8c/0xd0 [ 73.155788] print_report+0x118/0x5d0 [ 73.155816] kasan_report+0xdc/0x128 [ 73.155844] kasan_check_range+0x100/0x1a8 [ 73.155873] __kasan_check_write+0x20/0x30 [ 73.155906] kasan_atomics_helper+0xf88/0x4858 [ 73.155942] kasan_atomics+0x198/0x2e0 [ 73.155975] kunit_try_run_case+0x170/0x3f0 [ 73.156007] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.156041] kthread+0x328/0x630 [ 73.156067] ret_from_fork+0x10/0x20 [ 73.156102] [ 73.227057] Allocated by task 349: [ 73.230442] kasan_save_stack+0x3c/0x68 [ 73.234262] kasan_save_track+0x20/0x40 [ 73.238081] kasan_save_alloc_info+0x40/0x58 [ 73.242335] __kasan_kmalloc+0xd4/0xd8 [ 73.246067] __kmalloc_cache_noprof+0x16c/0x3c0 [ 73.250581] kasan_atomics+0xb8/0x2e0 [ 73.254227] kunit_try_run_case+0x170/0x3f0 [ 73.258393] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.263863] kthread+0x328/0x630 [ 73.267074] ret_from_fork+0x10/0x20 [ 73.270633] [ 73.272108] The buggy address belongs to the object at ffff000808448180 [ 73.272108] which belongs to the cache kmalloc-64 of size 64 [ 73.284436] The buggy address is located 0 bytes to the right of [ 73.284436] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 73.297281] [ 73.298757] The buggy address belongs to the physical page: [ 73.304315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 73.312299] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 73.318809] page_type: f5(slab) [ 73.321943] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 73.329666] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 73.337385] page dumped because: kasan: bad access detected [ 73.342940] [ 73.344416] Memory state around the buggy address: [ 73.349194] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.356399] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.363604] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.370805] ^ [ 73.375582] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.382787] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.389988] ================================================================== [ 69.708164] ================================================================== [ 69.715220] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 69.722596] Read of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 69.729887] [ 69.731370] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 69.731422] Tainted: [B]=BAD_PAGE, [N]=TEST [ 69.731437] Hardware name: WinLink E850-96 board (DT) [ 69.731456] Call trace: [ 69.731471] show_stack+0x20/0x38 (C) [ 69.731503] dump_stack_lvl+0x8c/0xd0 [ 69.731535] print_report+0x118/0x5d0 [ 69.731563] kasan_report+0xdc/0x128 [ 69.731591] __asan_report_load4_noabort+0x20/0x30 [ 69.731626] kasan_atomics_helper+0x3dbc/0x4858 [ 69.731660] kasan_atomics+0x198/0x2e0 [ 69.731693] kunit_try_run_case+0x170/0x3f0 [ 69.731730] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.731765] kthread+0x328/0x630 [ 69.731796] ret_from_fork+0x10/0x20 [ 69.731826] [ 69.799504] Allocated by task 349: [ 69.802891] kasan_save_stack+0x3c/0x68 [ 69.806709] kasan_save_track+0x20/0x40 [ 69.810528] kasan_save_alloc_info+0x40/0x58 [ 69.814782] __kasan_kmalloc+0xd4/0xd8 [ 69.818514] __kmalloc_cache_noprof+0x16c/0x3c0 [ 69.823028] kasan_atomics+0xb8/0x2e0 [ 69.826674] kunit_try_run_case+0x170/0x3f0 [ 69.830840] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.836309] kthread+0x328/0x630 [ 69.839521] ret_from_fork+0x10/0x20 [ 69.843080] [ 69.844555] The buggy address belongs to the object at ffff000808448180 [ 69.844555] which belongs to the cache kmalloc-64 of size 64 [ 69.856882] The buggy address is located 0 bytes to the right of [ 69.856882] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 69.869729] [ 69.871205] The buggy address belongs to the physical page: [ 69.876762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 69.884746] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 69.891256] page_type: f5(slab) [ 69.894391] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 69.902114] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 69.909832] page dumped because: kasan: bad access detected [ 69.915388] [ 69.916863] Memory state around the buggy address: [ 69.921643] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.928846] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.936051] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 69.943252] ^ [ 69.948030] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.955234] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.962436] ================================================================== [ 74.192473] ================================================================== [ 74.199527] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 74.206904] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 74.214282] [ 74.215764] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 74.215813] Tainted: [B]=BAD_PAGE, [N]=TEST [ 74.215831] Hardware name: WinLink E850-96 board (DT) [ 74.215847] Call trace: [ 74.215857] show_stack+0x20/0x38 (C) [ 74.215889] dump_stack_lvl+0x8c/0xd0 [ 74.215922] print_report+0x118/0x5d0 [ 74.215952] kasan_report+0xdc/0x128 [ 74.215980] kasan_check_range+0x100/0x1a8 [ 74.216011] __kasan_check_write+0x20/0x30 [ 74.216044] kasan_atomics_helper+0x1128/0x4858 [ 74.216080] kasan_atomics+0x198/0x2e0 [ 74.216111] kunit_try_run_case+0x170/0x3f0 [ 74.216145] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.216180] kthread+0x328/0x630 [ 74.216208] ret_from_fork+0x10/0x20 [ 74.216240] [ 74.287284] Allocated by task 349: [ 74.290670] kasan_save_stack+0x3c/0x68 [ 74.294489] kasan_save_track+0x20/0x40 [ 74.298308] kasan_save_alloc_info+0x40/0x58 [ 74.302562] __kasan_kmalloc+0xd4/0xd8 [ 74.306294] __kmalloc_cache_noprof+0x16c/0x3c0 [ 74.310808] kasan_atomics+0xb8/0x2e0 [ 74.314454] kunit_try_run_case+0x170/0x3f0 [ 74.318620] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.324090] kthread+0x328/0x630 [ 74.327301] ret_from_fork+0x10/0x20 [ 74.330860] [ 74.332335] The buggy address belongs to the object at ffff000808448180 [ 74.332335] which belongs to the cache kmalloc-64 of size 64 [ 74.344663] The buggy address is located 0 bytes to the right of [ 74.344663] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 74.357509] [ 74.358984] The buggy address belongs to the physical page: [ 74.364542] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 74.372526] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 74.379036] page_type: f5(slab) [ 74.382169] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 74.389893] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 74.397612] page dumped because: kasan: bad access detected [ 74.403168] [ 74.404643] Memory state around the buggy address: [ 74.409423] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.416626] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.423831] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 74.431031] ^ [ 74.435811] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.443014] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.450216] ================================================================== [ 76.309827] ================================================================== [ 76.316857] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 76.324233] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 76.331611] [ 76.333094] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 76.333143] Tainted: [B]=BAD_PAGE, [N]=TEST [ 76.333159] Hardware name: WinLink E850-96 board (DT) [ 76.333179] Call trace: [ 76.333193] show_stack+0x20/0x38 (C) [ 76.333225] dump_stack_lvl+0x8c/0xd0 [ 76.333257] print_report+0x118/0x5d0 [ 76.333285] kasan_report+0xdc/0x128 [ 76.333313] kasan_check_range+0x100/0x1a8 [ 76.333345] __kasan_check_write+0x20/0x30 [ 76.333377] kasan_atomics_helper+0x147c/0x4858 [ 76.333413] kasan_atomics+0x198/0x2e0 [ 76.333447] kunit_try_run_case+0x170/0x3f0 [ 76.333483] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.333516] kthread+0x328/0x630 [ 76.333545] ret_from_fork+0x10/0x20 [ 76.333579] [ 76.404613] Allocated by task 349: [ 76.408000] kasan_save_stack+0x3c/0x68 [ 76.411818] kasan_save_track+0x20/0x40 [ 76.415637] kasan_save_alloc_info+0x40/0x58 [ 76.419891] __kasan_kmalloc+0xd4/0xd8 [ 76.423624] __kmalloc_cache_noprof+0x16c/0x3c0 [ 76.428137] kasan_atomics+0xb8/0x2e0 [ 76.431783] kunit_try_run_case+0x170/0x3f0 [ 76.435950] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.441418] kthread+0x328/0x630 [ 76.444630] ret_from_fork+0x10/0x20 [ 76.448189] [ 76.449664] The buggy address belongs to the object at ffff000808448180 [ 76.449664] which belongs to the cache kmalloc-64 of size 64 [ 76.461991] The buggy address is located 0 bytes to the right of [ 76.461991] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 76.474838] [ 76.476313] The buggy address belongs to the physical page: [ 76.481870] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 76.489856] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 76.496366] page_type: f5(slab) [ 76.499498] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 76.507222] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 76.514941] page dumped because: kasan: bad access detected [ 76.520497] [ 76.521972] Memory state around the buggy address: [ 76.526750] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 76.533956] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 76.541160] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 76.548361] ^ [ 76.553139] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.560343] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.567545] ================================================================== [ 70.234694] ================================================================== [ 70.241775] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 70.249150] Read of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 70.256442] [ 70.257925] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 70.257977] Tainted: [B]=BAD_PAGE, [N]=TEST [ 70.257993] Hardware name: WinLink E850-96 board (DT) [ 70.258012] Call trace: [ 70.258025] show_stack+0x20/0x38 (C) [ 70.258057] dump_stack_lvl+0x8c/0xd0 [ 70.258089] print_report+0x118/0x5d0 [ 70.258119] kasan_report+0xdc/0x128 [ 70.258146] __asan_report_load4_noabort+0x20/0x30 [ 70.258182] kasan_atomics_helper+0x3de4/0x4858 [ 70.258221] kasan_atomics+0x198/0x2e0 [ 70.258252] kunit_try_run_case+0x170/0x3f0 [ 70.258288] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.258322] kthread+0x328/0x630 [ 70.258350] ret_from_fork+0x10/0x20 [ 70.258381] [ 70.326058] Allocated by task 349: [ 70.329445] kasan_save_stack+0x3c/0x68 [ 70.333264] kasan_save_track+0x20/0x40 [ 70.337083] kasan_save_alloc_info+0x40/0x58 [ 70.341336] __kasan_kmalloc+0xd4/0xd8 [ 70.345069] __kmalloc_cache_noprof+0x16c/0x3c0 [ 70.349583] kasan_atomics+0xb8/0x2e0 [ 70.353229] kunit_try_run_case+0x170/0x3f0 [ 70.357395] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.362865] kthread+0x328/0x630 [ 70.366076] ret_from_fork+0x10/0x20 [ 70.369634] [ 70.371110] The buggy address belongs to the object at ffff000808448180 [ 70.371110] which belongs to the cache kmalloc-64 of size 64 [ 70.383437] The buggy address is located 0 bytes to the right of [ 70.383437] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 70.396283] [ 70.397759] The buggy address belongs to the physical page: [ 70.403315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 70.411303] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 70.417811] page_type: f5(slab) [ 70.420947] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 70.428668] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 70.436387] page dumped because: kasan: bad access detected [ 70.441942] [ 70.443418] Memory state around the buggy address: [ 70.448197] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.455401] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.462605] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 70.469807] ^ [ 70.474584] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.481789] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.488990] ================================================================== [ 73.397352] ================================================================== [ 73.404401] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 73.411690] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 73.419068] [ 73.420551] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 73.420601] Tainted: [B]=BAD_PAGE, [N]=TEST [ 73.420618] Hardware name: WinLink E850-96 board (DT) [ 73.420638] Call trace: [ 73.420651] show_stack+0x20/0x38 (C) [ 73.420684] dump_stack_lvl+0x8c/0xd0 [ 73.420717] print_report+0x118/0x5d0 [ 73.420746] kasan_report+0xdc/0x128 [ 73.420773] kasan_check_range+0x100/0x1a8 [ 73.420804] __kasan_check_write+0x20/0x30 [ 73.420836] kasan_atomics_helper+0xff0/0x4858 [ 73.420872] kasan_atomics+0x198/0x2e0 [ 73.420904] kunit_try_run_case+0x170/0x3f0 [ 73.420939] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.420973] kthread+0x328/0x630 [ 73.421004] ret_from_fork+0x10/0x20 [ 73.421035] [ 73.491983] Allocated by task 349: [ 73.495369] kasan_save_stack+0x3c/0x68 [ 73.499188] kasan_save_track+0x20/0x40 [ 73.503007] kasan_save_alloc_info+0x40/0x58 [ 73.507261] __kasan_kmalloc+0xd4/0xd8 [ 73.510994] __kmalloc_cache_noprof+0x16c/0x3c0 [ 73.515507] kasan_atomics+0xb8/0x2e0 [ 73.519153] kunit_try_run_case+0x170/0x3f0 [ 73.523320] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.528788] kthread+0x328/0x630 [ 73.532000] ret_from_fork+0x10/0x20 [ 73.535559] [ 73.537034] The buggy address belongs to the object at ffff000808448180 [ 73.537034] which belongs to the cache kmalloc-64 of size 64 [ 73.549363] The buggy address is located 0 bytes to the right of [ 73.549363] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 73.562208] [ 73.563684] The buggy address belongs to the physical page: [ 73.569243] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 73.577226] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 73.583735] page_type: f5(slab) [ 73.586868] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 73.594593] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 73.602312] page dumped because: kasan: bad access detected [ 73.607867] [ 73.609342] Memory state around the buggy address: [ 73.614121] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.621326] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.628530] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.635731] ^ [ 73.640509] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.647714] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.654915] ================================================================== [ 73.927458] ================================================================== [ 73.934429] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 73.941803] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 73.949182] [ 73.950667] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 73.950719] Tainted: [B]=BAD_PAGE, [N]=TEST [ 73.950737] Hardware name: WinLink E850-96 board (DT) [ 73.950756] Call trace: [ 73.950770] show_stack+0x20/0x38 (C) [ 73.950805] dump_stack_lvl+0x8c/0xd0 [ 73.950836] print_report+0x118/0x5d0 [ 73.950864] kasan_report+0xdc/0x128 [ 73.950891] kasan_check_range+0x100/0x1a8 [ 73.950920] __kasan_check_write+0x20/0x30 [ 73.950953] kasan_atomics_helper+0x10c0/0x4858 [ 73.950989] kasan_atomics+0x198/0x2e0 [ 73.951021] kunit_try_run_case+0x170/0x3f0 [ 73.951057] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.951092] kthread+0x328/0x630 [ 73.951120] ret_from_fork+0x10/0x20 [ 73.951152] [ 74.022183] Allocated by task 349: [ 74.025571] kasan_save_stack+0x3c/0x68 [ 74.029389] kasan_save_track+0x20/0x40 [ 74.033208] kasan_save_alloc_info+0x40/0x58 [ 74.037461] __kasan_kmalloc+0xd4/0xd8 [ 74.041194] __kmalloc_cache_noprof+0x16c/0x3c0 [ 74.045708] kasan_atomics+0xb8/0x2e0 [ 74.049353] kunit_try_run_case+0x170/0x3f0 [ 74.053520] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.058990] kthread+0x328/0x630 [ 74.062201] ret_from_fork+0x10/0x20 [ 74.065760] [ 74.067235] The buggy address belongs to the object at ffff000808448180 [ 74.067235] which belongs to the cache kmalloc-64 of size 64 [ 74.079563] The buggy address is located 0 bytes to the right of [ 74.079563] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 74.092408] [ 74.093885] The buggy address belongs to the physical page: [ 74.099443] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 74.107427] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 74.113936] page_type: f5(slab) [ 74.117070] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 74.124793] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 74.132512] page dumped because: kasan: bad access detected [ 74.138067] [ 74.139543] Memory state around the buggy address: [ 74.144323] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.151526] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.158731] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 74.165932] ^ [ 74.170711] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.177914] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.185115] ================================================================== [ 78.685310] ================================================================== [ 78.692343] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 78.699718] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 78.707096] [ 78.708579] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 78.708630] Tainted: [B]=BAD_PAGE, [N]=TEST [ 78.708647] Hardware name: WinLink E850-96 board (DT) [ 78.708667] Call trace: [ 78.708681] show_stack+0x20/0x38 (C) [ 78.708714] dump_stack_lvl+0x8c/0xd0 [ 78.708746] print_report+0x118/0x5d0 [ 78.708774] kasan_report+0xdc/0x128 [ 78.708801] kasan_check_range+0x100/0x1a8 [ 78.708832] __kasan_check_write+0x20/0x30 [ 78.708866] kasan_atomics_helper+0x175c/0x4858 [ 78.708902] kasan_atomics+0x198/0x2e0 [ 78.708933] kunit_try_run_case+0x170/0x3f0 [ 78.708970] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 78.709005] kthread+0x328/0x630 [ 78.709034] ret_from_fork+0x10/0x20 [ 78.709069] [ 78.780098] Allocated by task 349: [ 78.783485] kasan_save_stack+0x3c/0x68 [ 78.787303] kasan_save_track+0x20/0x40 [ 78.791123] kasan_save_alloc_info+0x40/0x58 [ 78.795376] __kasan_kmalloc+0xd4/0xd8 [ 78.799109] __kmalloc_cache_noprof+0x16c/0x3c0 [ 78.803623] kasan_atomics+0xb8/0x2e0 [ 78.807268] kunit_try_run_case+0x170/0x3f0 [ 78.811435] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 78.816905] kthread+0x328/0x630 [ 78.820115] ret_from_fork+0x10/0x20 [ 78.823674] [ 78.825149] The buggy address belongs to the object at ffff000808448180 [ 78.825149] which belongs to the cache kmalloc-64 of size 64 [ 78.837477] The buggy address is located 0 bytes to the right of [ 78.837477] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 78.850323] [ 78.851799] The buggy address belongs to the physical page: [ 78.857356] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 78.865341] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 78.871851] page_type: f5(slab) [ 78.874983] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 78.882708] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 78.890427] page dumped because: kasan: bad access detected [ 78.895982] [ 78.897458] Memory state around the buggy address: [ 78.902236] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 78.909441] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 78.916645] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 78.923846] ^ [ 78.928624] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.935829] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.943030] ================================================================== [ 64.154445] ================================================================== [ 64.161484] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 64.168860] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 64.176238] [ 64.177719] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 64.177767] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.177784] Hardware name: WinLink E850-96 board (DT) [ 64.177803] Call trace: [ 64.177816] show_stack+0x20/0x38 (C) [ 64.177851] dump_stack_lvl+0x8c/0xd0 [ 64.177883] print_report+0x118/0x5d0 [ 64.177912] kasan_report+0xdc/0x128 [ 64.177938] __asan_report_store4_noabort+0x20/0x30 [ 64.177974] kasan_atomics_helper+0x3f94/0x4858 [ 64.178009] kasan_atomics+0x198/0x2e0 [ 64.178040] kunit_try_run_case+0x170/0x3f0 [ 64.178075] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.178111] kthread+0x328/0x630 [ 64.178140] ret_from_fork+0x10/0x20 [ 64.178172] [ 64.245941] Allocated by task 349: [ 64.249328] kasan_save_stack+0x3c/0x68 [ 64.253147] kasan_save_track+0x20/0x40 [ 64.256965] kasan_save_alloc_info+0x40/0x58 [ 64.261219] __kasan_kmalloc+0xd4/0xd8 [ 64.264952] __kmalloc_cache_noprof+0x16c/0x3c0 [ 64.269466] kasan_atomics+0xb8/0x2e0 [ 64.273111] kunit_try_run_case+0x170/0x3f0 [ 64.277278] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.282748] kthread+0x328/0x630 [ 64.285958] ret_from_fork+0x10/0x20 [ 64.289518] [ 64.290993] The buggy address belongs to the object at ffff000808448180 [ 64.290993] which belongs to the cache kmalloc-64 of size 64 [ 64.303320] The buggy address is located 0 bytes to the right of [ 64.303320] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 64.316166] [ 64.317642] The buggy address belongs to the physical page: [ 64.323200] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 64.331184] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 64.337694] page_type: f5(slab) [ 64.340827] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 64.348551] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.356270] page dumped because: kasan: bad access detected [ 64.361825] [ 64.363301] Memory state around the buggy address: [ 64.368079] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.375284] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.382488] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 64.389690] ^ [ 64.394467] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.401672] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.408874] ================================================================== [ 79.212046] ================================================================== [ 79.219071] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 79.226446] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 79.233824] [ 79.235308] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 79.235357] Tainted: [B]=BAD_PAGE, [N]=TEST [ 79.235376] Hardware name: WinLink E850-96 board (DT) [ 79.235395] Call trace: [ 79.235407] show_stack+0x20/0x38 (C) [ 79.235438] dump_stack_lvl+0x8c/0xd0 [ 79.235472] print_report+0x118/0x5d0 [ 79.235501] kasan_report+0xdc/0x128 [ 79.235529] kasan_check_range+0x100/0x1a8 [ 79.235561] __kasan_check_write+0x20/0x30 [ 79.235594] kasan_atomics_helper+0x17ec/0x4858 [ 79.235627] kasan_atomics+0x198/0x2e0 [ 79.235662] kunit_try_run_case+0x170/0x3f0 [ 79.235698] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 79.235730] kthread+0x328/0x630 [ 79.235761] ret_from_fork+0x10/0x20 [ 79.235794] [ 79.306828] Allocated by task 349: [ 79.310214] kasan_save_stack+0x3c/0x68 [ 79.314032] kasan_save_track+0x20/0x40 [ 79.317851] kasan_save_alloc_info+0x40/0x58 [ 79.322104] __kasan_kmalloc+0xd4/0xd8 [ 79.325837] __kmalloc_cache_noprof+0x16c/0x3c0 [ 79.330350] kasan_atomics+0xb8/0x2e0 [ 79.333997] kunit_try_run_case+0x170/0x3f0 [ 79.338163] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 79.343631] kthread+0x328/0x630 [ 79.346843] ret_from_fork+0x10/0x20 [ 79.350403] [ 79.351878] The buggy address belongs to the object at ffff000808448180 [ 79.351878] which belongs to the cache kmalloc-64 of size 64 [ 79.364205] The buggy address is located 0 bytes to the right of [ 79.364205] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 79.377052] [ 79.378529] The buggy address belongs to the physical page: [ 79.384083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 79.392069] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 79.398579] page_type: f5(slab) [ 79.401712] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 79.409436] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 79.417155] page dumped because: kasan: bad access detected [ 79.422710] [ 79.424186] Memory state around the buggy address: [ 79.428966] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 79.436169] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 79.443373] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 79.450574] ^ [ 79.455354] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.462557] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.469758] ================================================================== [ 74.457572] ================================================================== [ 74.464629] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 74.472004] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 74.479382] [ 74.480864] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 74.480913] Tainted: [B]=BAD_PAGE, [N]=TEST [ 74.480929] Hardware name: WinLink E850-96 board (DT) [ 74.480946] Call trace: [ 74.480960] show_stack+0x20/0x38 (C) [ 74.480991] dump_stack_lvl+0x8c/0xd0 [ 74.481025] print_report+0x118/0x5d0 [ 74.481053] kasan_report+0xdc/0x128 [ 74.481080] kasan_check_range+0x100/0x1a8 [ 74.481109] __kasan_check_write+0x20/0x30 [ 74.481141] kasan_atomics_helper+0x1190/0x4858 [ 74.481175] kasan_atomics+0x198/0x2e0 [ 74.481209] kunit_try_run_case+0x170/0x3f0 [ 74.481245] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.481278] kthread+0x328/0x630 [ 74.481307] ret_from_fork+0x10/0x20 [ 74.481338] [ 74.552384] Allocated by task 349: [ 74.555771] kasan_save_stack+0x3c/0x68 [ 74.559589] kasan_save_track+0x20/0x40 [ 74.563408] kasan_save_alloc_info+0x40/0x58 [ 74.567662] __kasan_kmalloc+0xd4/0xd8 [ 74.571394] __kmalloc_cache_noprof+0x16c/0x3c0 [ 74.575908] kasan_atomics+0xb8/0x2e0 [ 74.579554] kunit_try_run_case+0x170/0x3f0 [ 74.583720] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.589190] kthread+0x328/0x630 [ 74.592401] ret_from_fork+0x10/0x20 [ 74.595960] [ 74.597437] The buggy address belongs to the object at ffff000808448180 [ 74.597437] which belongs to the cache kmalloc-64 of size 64 [ 74.609764] The buggy address is located 0 bytes to the right of [ 74.609764] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 74.622609] [ 74.624084] The buggy address belongs to the physical page: [ 74.629640] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 74.637626] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 74.644137] page_type: f5(slab) [ 74.647271] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 74.654994] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 74.662713] page dumped because: kasan: bad access detected [ 74.668268] [ 74.669743] Memory state around the buggy address: [ 74.674523] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.681726] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.688931] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 74.696132] ^ [ 74.700911] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.708115] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.715315] ================================================================== [ 75.517946] ================================================================== [ 75.525029] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 75.532404] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 75.539783] [ 75.541265] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 75.541317] Tainted: [B]=BAD_PAGE, [N]=TEST [ 75.541334] Hardware name: WinLink E850-96 board (DT) [ 75.541355] Call trace: [ 75.541369] show_stack+0x20/0x38 (C) [ 75.541399] dump_stack_lvl+0x8c/0xd0 [ 75.541431] print_report+0x118/0x5d0 [ 75.541461] kasan_report+0xdc/0x128 [ 75.541487] kasan_check_range+0x100/0x1a8 [ 75.541517] __kasan_check_write+0x20/0x30 [ 75.541550] kasan_atomics_helper+0x1384/0x4858 [ 75.541584] kasan_atomics+0x198/0x2e0 [ 75.541616] kunit_try_run_case+0x170/0x3f0 [ 75.541651] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.541686] kthread+0x328/0x630 [ 75.541716] ret_from_fork+0x10/0x20 [ 75.541748] [ 75.612785] Allocated by task 349: [ 75.616170] kasan_save_stack+0x3c/0x68 [ 75.619990] kasan_save_track+0x20/0x40 [ 75.623809] kasan_save_alloc_info+0x40/0x58 [ 75.628062] __kasan_kmalloc+0xd4/0xd8 [ 75.631795] __kmalloc_cache_noprof+0x16c/0x3c0 [ 75.636309] kasan_atomics+0xb8/0x2e0 [ 75.639955] kunit_try_run_case+0x170/0x3f0 [ 75.644121] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.649590] kthread+0x328/0x630 [ 75.652802] ret_from_fork+0x10/0x20 [ 75.656361] [ 75.657836] The buggy address belongs to the object at ffff000808448180 [ 75.657836] which belongs to the cache kmalloc-64 of size 64 [ 75.670163] The buggy address is located 0 bytes to the right of [ 75.670163] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 75.683010] [ 75.684486] The buggy address belongs to the physical page: [ 75.690042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 75.698027] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 75.704537] page_type: f5(slab) [ 75.707672] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 75.715394] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 75.723113] page dumped because: kasan: bad access detected [ 75.728668] [ 75.730144] Memory state around the buggy address: [ 75.734924] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.742127] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.749332] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 75.756533] ^ [ 75.761311] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.768515] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.775717] ================================================================== [ 69.443274] ================================================================== [ 69.450292] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 69.457582] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 69.464960] [ 69.466444] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 69.466495] Tainted: [B]=BAD_PAGE, [N]=TEST [ 69.466513] Hardware name: WinLink E850-96 board (DT) [ 69.466532] Call trace: [ 69.466546] show_stack+0x20/0x38 (C) [ 69.466583] dump_stack_lvl+0x8c/0xd0 [ 69.466615] print_report+0x118/0x5d0 [ 69.466642] kasan_report+0xdc/0x128 [ 69.466669] kasan_check_range+0x100/0x1a8 [ 69.466699] __kasan_check_write+0x20/0x30 [ 69.466733] kasan_atomics_helper+0xb70/0x4858 [ 69.466768] kasan_atomics+0x198/0x2e0 [ 69.466800] kunit_try_run_case+0x170/0x3f0 [ 69.466838] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.466871] kthread+0x328/0x630 [ 69.466900] ret_from_fork+0x10/0x20 [ 69.466931] [ 69.537876] Allocated by task 349: [ 69.541263] kasan_save_stack+0x3c/0x68 [ 69.545081] kasan_save_track+0x20/0x40 [ 69.548900] kasan_save_alloc_info+0x40/0x58 [ 69.553154] __kasan_kmalloc+0xd4/0xd8 [ 69.556886] __kmalloc_cache_noprof+0x16c/0x3c0 [ 69.561400] kasan_atomics+0xb8/0x2e0 [ 69.565046] kunit_try_run_case+0x170/0x3f0 [ 69.569213] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.574683] kthread+0x328/0x630 [ 69.577893] ret_from_fork+0x10/0x20 [ 69.581452] [ 69.582927] The buggy address belongs to the object at ffff000808448180 [ 69.582927] which belongs to the cache kmalloc-64 of size 64 [ 69.595254] The buggy address is located 0 bytes to the right of [ 69.595254] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 69.608101] [ 69.609578] The buggy address belongs to the physical page: [ 69.615136] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 69.623119] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 69.629628] page_type: f5(slab) [ 69.632764] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 69.640486] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 69.648204] page dumped because: kasan: bad access detected [ 69.653760] [ 69.655235] Memory state around the buggy address: [ 69.660015] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.667218] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.674423] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 69.681624] ^ [ 69.686402] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.693606] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.700808] ================================================================== [ 78.950470] ================================================================== [ 78.957443] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 78.964818] Read of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 78.972110] [ 78.973593] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 78.973642] Tainted: [B]=BAD_PAGE, [N]=TEST [ 78.973659] Hardware name: WinLink E850-96 board (DT) [ 78.973679] Call trace: [ 78.973696] show_stack+0x20/0x38 (C) [ 78.973730] dump_stack_lvl+0x8c/0xd0 [ 78.973765] print_report+0x118/0x5d0 [ 78.973795] kasan_report+0xdc/0x128 [ 78.973821] __asan_report_load8_noabort+0x20/0x30 [ 78.973856] kasan_atomics_helper+0x3e20/0x4858 [ 78.973892] kasan_atomics+0x198/0x2e0 [ 78.973924] kunit_try_run_case+0x170/0x3f0 [ 78.973959] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 78.973993] kthread+0x328/0x630 [ 78.974024] ret_from_fork+0x10/0x20 [ 78.974060] [ 79.041726] Allocated by task 349: [ 79.045114] kasan_save_stack+0x3c/0x68 [ 79.048931] kasan_save_track+0x20/0x40 [ 79.052751] kasan_save_alloc_info+0x40/0x58 [ 79.057004] __kasan_kmalloc+0xd4/0xd8 [ 79.060737] __kmalloc_cache_noprof+0x16c/0x3c0 [ 79.065250] kasan_atomics+0xb8/0x2e0 [ 79.068896] kunit_try_run_case+0x170/0x3f0 [ 79.073063] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 79.078533] kthread+0x328/0x630 [ 79.081743] ret_from_fork+0x10/0x20 [ 79.085302] [ 79.086778] The buggy address belongs to the object at ffff000808448180 [ 79.086778] which belongs to the cache kmalloc-64 of size 64 [ 79.099104] The buggy address is located 0 bytes to the right of [ 79.099104] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 79.111951] [ 79.113428] The buggy address belongs to the physical page: [ 79.118984] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 79.126969] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 79.133479] page_type: f5(slab) [ 79.136613] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 79.144336] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 79.152055] page dumped because: kasan: bad access detected [ 79.157610] [ 79.159085] Memory state around the buggy address: [ 79.163865] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 79.171068] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 79.178273] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 79.185474] ^ [ 79.190254] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.197457] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.204658] ================================================================== [ 77.631858] ================================================================== [ 77.638887] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 77.646262] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 77.653640] [ 77.655123] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 77.655172] Tainted: [B]=BAD_PAGE, [N]=TEST [ 77.655187] Hardware name: WinLink E850-96 board (DT) [ 77.655207] Call trace: [ 77.655220] show_stack+0x20/0x38 (C) [ 77.655252] dump_stack_lvl+0x8c/0xd0 [ 77.655285] print_report+0x118/0x5d0 [ 77.655313] kasan_report+0xdc/0x128 [ 77.655341] kasan_check_range+0x100/0x1a8 [ 77.655375] __kasan_check_write+0x20/0x30 [ 77.655407] kasan_atomics_helper+0x1644/0x4858 [ 77.655443] kasan_atomics+0x198/0x2e0 [ 77.655476] kunit_try_run_case+0x170/0x3f0 [ 77.655511] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.655545] kthread+0x328/0x630 [ 77.655574] ret_from_fork+0x10/0x20 [ 77.655607] [ 77.726642] Allocated by task 349: [ 77.730029] kasan_save_stack+0x3c/0x68 [ 77.733847] kasan_save_track+0x20/0x40 [ 77.737666] kasan_save_alloc_info+0x40/0x58 [ 77.741920] __kasan_kmalloc+0xd4/0xd8 [ 77.745652] __kmalloc_cache_noprof+0x16c/0x3c0 [ 77.750166] kasan_atomics+0xb8/0x2e0 [ 77.753812] kunit_try_run_case+0x170/0x3f0 [ 77.757978] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.763447] kthread+0x328/0x630 [ 77.766659] ret_from_fork+0x10/0x20 [ 77.770218] [ 77.771693] The buggy address belongs to the object at ffff000808448180 [ 77.771693] which belongs to the cache kmalloc-64 of size 64 [ 77.784020] The buggy address is located 0 bytes to the right of [ 77.784020] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 77.796867] [ 77.798343] The buggy address belongs to the physical page: [ 77.803898] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 77.811884] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 77.818394] page_type: f5(slab) [ 77.821529] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 77.829251] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 77.836970] page dumped because: kasan: bad access detected [ 77.842526] [ 77.844001] Memory state around the buggy address: [ 77.848779] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 77.855984] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 77.863189] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 77.870390] ^ [ 77.875168] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.882373] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.889573] ================================================================== [ 64.416259] ================================================================== [ 64.423286] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858 [ 64.430575] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 64.437953] [ 64.439434] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 64.439486] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.439503] Hardware name: WinLink E850-96 board (DT) [ 64.439521] Call trace: [ 64.439536] show_stack+0x20/0x38 (C) [ 64.439568] dump_stack_lvl+0x8c/0xd0 [ 64.439601] print_report+0x118/0x5d0 [ 64.439631] kasan_report+0xdc/0x128 [ 64.439658] kasan_check_range+0x100/0x1a8 [ 64.439687] __kasan_check_write+0x20/0x30 [ 64.439719] kasan_atomics_helper+0x3ac/0x4858 [ 64.439754] kasan_atomics+0x198/0x2e0 [ 64.439785] kunit_try_run_case+0x170/0x3f0 [ 64.439820] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.439854] kthread+0x328/0x630 [ 64.439882] ret_from_fork+0x10/0x20 [ 64.439914] [ 64.510868] Allocated by task 349: [ 64.514255] kasan_save_stack+0x3c/0x68 [ 64.518073] kasan_save_track+0x20/0x40 [ 64.521893] kasan_save_alloc_info+0x40/0x58 [ 64.526146] __kasan_kmalloc+0xd4/0xd8 [ 64.529878] __kmalloc_cache_noprof+0x16c/0x3c0 [ 64.534392] kasan_atomics+0xb8/0x2e0 [ 64.538038] kunit_try_run_case+0x170/0x3f0 [ 64.542205] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.547673] kthread+0x328/0x630 [ 64.550885] ret_from_fork+0x10/0x20 [ 64.554444] [ 64.555919] The buggy address belongs to the object at ffff000808448180 [ 64.555919] which belongs to the cache kmalloc-64 of size 64 [ 64.568246] The buggy address is located 0 bytes to the right of [ 64.568246] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 64.581093] [ 64.582568] The buggy address belongs to the physical page: [ 64.588126] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 64.596110] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 64.602621] page_type: f5(slab) [ 64.605753] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 64.613477] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.621197] page dumped because: kasan: bad access detected [ 64.626752] [ 64.628228] Memory state around the buggy address: [ 64.633006] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.640210] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.647415] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 64.654616] ^ [ 64.659394] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.666599] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.673800] ================================================================== [ 71.023019] ================================================================== [ 71.029958] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 71.037246] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 71.044624] [ 71.046108] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 71.046161] Tainted: [B]=BAD_PAGE, [N]=TEST [ 71.046177] Hardware name: WinLink E850-96 board (DT) [ 71.046197] Call trace: [ 71.046212] show_stack+0x20/0x38 (C) [ 71.046247] dump_stack_lvl+0x8c/0xd0 [ 71.046279] print_report+0x118/0x5d0 [ 71.046307] kasan_report+0xdc/0x128 [ 71.046334] kasan_check_range+0x100/0x1a8 [ 71.046362] __kasan_check_write+0x20/0x30 [ 71.046396] kasan_atomics_helper+0xd3c/0x4858 [ 71.046433] kasan_atomics+0x198/0x2e0 [ 71.046465] kunit_try_run_case+0x170/0x3f0 [ 71.046502] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.046537] kthread+0x328/0x630 [ 71.046566] ret_from_fork+0x10/0x20 [ 71.046602] [ 71.117540] Allocated by task 349: [ 71.120927] kasan_save_stack+0x3c/0x68 [ 71.124745] kasan_save_track+0x20/0x40 [ 71.128564] kasan_save_alloc_info+0x40/0x58 [ 71.132817] __kasan_kmalloc+0xd4/0xd8 [ 71.136550] __kmalloc_cache_noprof+0x16c/0x3c0 [ 71.141064] kasan_atomics+0xb8/0x2e0 [ 71.144710] kunit_try_run_case+0x170/0x3f0 [ 71.148876] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.154345] kthread+0x328/0x630 [ 71.157557] ret_from_fork+0x10/0x20 [ 71.161116] [ 71.162591] The buggy address belongs to the object at ffff000808448180 [ 71.162591] which belongs to the cache kmalloc-64 of size 64 [ 71.174918] The buggy address is located 0 bytes to the right of [ 71.174918] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 71.187764] [ 71.189240] The buggy address belongs to the physical page: [ 71.194798] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 71.202782] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 71.209292] page_type: f5(slab) [ 71.212427] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 71.220149] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 71.227868] page dumped because: kasan: bad access detected [ 71.233423] [ 71.234899] Memory state around the buggy address: [ 71.239679] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.246882] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.254087] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 71.261288] ^ [ 71.266065] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.273270] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.280472] ================================================================== [ 72.075946] ================================================================== [ 72.082895] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 72.090182] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 72.097560] [ 72.099044] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 72.099093] Tainted: [B]=BAD_PAGE, [N]=TEST [ 72.099111] Hardware name: WinLink E850-96 board (DT) [ 72.099132] Call trace: [ 72.099146] show_stack+0x20/0x38 (C) [ 72.099179] dump_stack_lvl+0x8c/0xd0 [ 72.099210] print_report+0x118/0x5d0 [ 72.099239] kasan_report+0xdc/0x128 [ 72.099267] kasan_check_range+0x100/0x1a8 [ 72.099298] __kasan_check_write+0x20/0x30 [ 72.099331] kasan_atomics_helper+0xe44/0x4858 [ 72.099365] kasan_atomics+0x198/0x2e0 [ 72.099397] kunit_try_run_case+0x170/0x3f0 [ 72.099432] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.099469] kthread+0x328/0x630 [ 72.099498] ret_from_fork+0x10/0x20 [ 72.099532] [ 72.170475] Allocated by task 349: [ 72.173862] kasan_save_stack+0x3c/0x68 [ 72.177680] kasan_save_track+0x20/0x40 [ 72.181500] kasan_save_alloc_info+0x40/0x58 [ 72.185753] __kasan_kmalloc+0xd4/0xd8 [ 72.189486] __kmalloc_cache_noprof+0x16c/0x3c0 [ 72.194000] kasan_atomics+0xb8/0x2e0 [ 72.197645] kunit_try_run_case+0x170/0x3f0 [ 72.201812] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.207280] kthread+0x328/0x630 [ 72.210492] ret_from_fork+0x10/0x20 [ 72.214051] [ 72.215527] The buggy address belongs to the object at ffff000808448180 [ 72.215527] which belongs to the cache kmalloc-64 of size 64 [ 72.227855] The buggy address is located 0 bytes to the right of [ 72.227855] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 72.240700] [ 72.242177] The buggy address belongs to the physical page: [ 72.247733] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 72.255719] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 72.262228] page_type: f5(slab) [ 72.265364] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 72.273085] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 72.280804] page dumped because: kasan: bad access detected [ 72.286359] [ 72.287835] Memory state around the buggy address: [ 72.292616] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.299818] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.307022] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 72.314223] ^ [ 72.319001] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.326206] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.333407] ================================================================== [ 68.386858] ================================================================== [ 68.393886] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 68.401174] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 68.408552] [ 68.410036] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 68.410087] Tainted: [B]=BAD_PAGE, [N]=TEST [ 68.410104] Hardware name: WinLink E850-96 board (DT) [ 68.410123] Call trace: [ 68.410136] show_stack+0x20/0x38 (C) [ 68.410169] dump_stack_lvl+0x8c/0xd0 [ 68.410201] print_report+0x118/0x5d0 [ 68.410232] kasan_report+0xdc/0x128 [ 68.410261] kasan_check_range+0x100/0x1a8 [ 68.410290] __kasan_check_write+0x20/0x30 [ 68.410321] kasan_atomics_helper+0xa04/0x4858 [ 68.410354] kasan_atomics+0x198/0x2e0 [ 68.410385] kunit_try_run_case+0x170/0x3f0 [ 68.410424] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.410457] kthread+0x328/0x630 [ 68.410488] ret_from_fork+0x10/0x20 [ 68.410519] [ 68.481468] Allocated by task 349: [ 68.484855] kasan_save_stack+0x3c/0x68 [ 68.488673] kasan_save_track+0x20/0x40 [ 68.492492] kasan_save_alloc_info+0x40/0x58 [ 68.496746] __kasan_kmalloc+0xd4/0xd8 [ 68.500479] __kmalloc_cache_noprof+0x16c/0x3c0 [ 68.504992] kasan_atomics+0xb8/0x2e0 [ 68.508638] kunit_try_run_case+0x170/0x3f0 [ 68.512805] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.518274] kthread+0x328/0x630 [ 68.521485] ret_from_fork+0x10/0x20 [ 68.525044] [ 68.526520] The buggy address belongs to the object at ffff000808448180 [ 68.526520] which belongs to the cache kmalloc-64 of size 64 [ 68.538846] The buggy address is located 0 bytes to the right of [ 68.538846] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 68.551693] [ 68.553170] The buggy address belongs to the physical page: [ 68.558724] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 68.566711] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 68.573221] page_type: f5(slab) [ 68.576353] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 68.584078] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 68.591797] page dumped because: kasan: bad access detected [ 68.597352] [ 68.598828] Memory state around the buggy address: [ 68.603606] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.610810] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.618015] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 68.625216] ^ [ 68.629994] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.637199] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.644400] ================================================================== [ 63.889571] ================================================================== [ 63.896558] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 63.903846] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 63.911225] [ 63.912708] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 63.912760] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.912775] Hardware name: WinLink E850-96 board (DT) [ 63.912796] Call trace: [ 63.912809] show_stack+0x20/0x38 (C) [ 63.912844] dump_stack_lvl+0x8c/0xd0 [ 63.912877] print_report+0x118/0x5d0 [ 63.912904] kasan_report+0xdc/0x128 [ 63.912931] kasan_check_range+0x100/0x1a8 [ 63.912961] __kasan_check_write+0x20/0x30 [ 63.912993] kasan_atomics_helper+0x32c/0x4858 [ 63.913029] kasan_atomics+0x198/0x2e0 [ 63.913061] kunit_try_run_case+0x170/0x3f0 [ 63.913096] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.913130] kthread+0x328/0x630 [ 63.913158] ret_from_fork+0x10/0x20 [ 63.913190] [ 63.984140] Allocated by task 349: [ 63.987527] kasan_save_stack+0x3c/0x68 [ 63.991345] kasan_save_track+0x20/0x40 [ 63.995164] kasan_save_alloc_info+0x40/0x58 [ 63.999418] __kasan_kmalloc+0xd4/0xd8 [ 64.003150] __kmalloc_cache_noprof+0x16c/0x3c0 [ 64.007664] kasan_atomics+0xb8/0x2e0 [ 64.011310] kunit_try_run_case+0x170/0x3f0 [ 64.015477] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.020947] kthread+0x328/0x630 [ 64.024157] ret_from_fork+0x10/0x20 [ 64.027716] [ 64.029191] The buggy address belongs to the object at ffff000808448180 [ 64.029191] which belongs to the cache kmalloc-64 of size 64 [ 64.041518] The buggy address is located 0 bytes to the right of [ 64.041518] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 64.054364] [ 64.055841] The buggy address belongs to the physical page: [ 64.061398] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 64.069382] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 64.075892] page_type: f5(slab) [ 64.079029] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 64.086749] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.094468] page dumped because: kasan: bad access detected [ 64.100024] [ 64.101499] Memory state around the buggy address: [ 64.106278] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.113482] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.120687] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 64.127888] ^ [ 64.132667] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.139871] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.147072] ================================================================== [ 63.363093] ================================================================== [ 63.370175] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 63.377465] Read of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 63.384757] [ 63.386239] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 63.386291] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.386309] Hardware name: WinLink E850-96 board (DT) [ 63.386328] Call trace: [ 63.386343] show_stack+0x20/0x38 (C) [ 63.386379] dump_stack_lvl+0x8c/0xd0 [ 63.386411] print_report+0x118/0x5d0 [ 63.386438] kasan_report+0xdc/0x128 [ 63.386467] kasan_check_range+0x100/0x1a8 [ 63.386496] __kasan_check_read+0x20/0x30 [ 63.386531] kasan_atomics_helper+0x2b0/0x4858 [ 63.386565] kasan_atomics+0x198/0x2e0 [ 63.386598] kunit_try_run_case+0x170/0x3f0 [ 63.386637] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.386668] kthread+0x328/0x630 [ 63.386700] ret_from_fork+0x10/0x20 [ 63.386734] [ 63.457585] Allocated by task 349: [ 63.460973] kasan_save_stack+0x3c/0x68 [ 63.464790] kasan_save_track+0x20/0x40 [ 63.468610] kasan_save_alloc_info+0x40/0x58 [ 63.472863] __kasan_kmalloc+0xd4/0xd8 [ 63.476596] __kmalloc_cache_noprof+0x16c/0x3c0 [ 63.481109] kasan_atomics+0xb8/0x2e0 [ 63.484755] kunit_try_run_case+0x170/0x3f0 [ 63.488922] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.494390] kthread+0x328/0x630 [ 63.497601] ret_from_fork+0x10/0x20 [ 63.501161] [ 63.502636] The buggy address belongs to the object at ffff000808448180 [ 63.502636] which belongs to the cache kmalloc-64 of size 64 [ 63.514964] The buggy address is located 0 bytes to the right of [ 63.514964] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 63.527810] [ 63.529287] The buggy address belongs to the physical page: [ 63.534842] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 63.542829] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.549338] page_type: f5(slab) [ 63.552472] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 63.560195] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.567913] page dumped because: kasan: bad access detected [ 63.573469] [ 63.574945] Memory state around the buggy address: [ 63.579723] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.586927] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.594132] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 63.601333] ^ [ 63.606113] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.613316] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.620517] ================================================================== [ 66.535647] ================================================================== [ 66.542701] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 66.549987] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 66.557365] [ 66.558846] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 66.558895] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.558912] Hardware name: WinLink E850-96 board (DT) [ 66.558930] Call trace: [ 66.558945] show_stack+0x20/0x38 (C) [ 66.558978] dump_stack_lvl+0x8c/0xd0 [ 66.559012] print_report+0x118/0x5d0 [ 66.559040] kasan_report+0xdc/0x128 [ 66.559066] kasan_check_range+0x100/0x1a8 [ 66.559097] __kasan_check_write+0x20/0x30 [ 66.559129] kasan_atomics_helper+0x6ec/0x4858 [ 66.559163] kasan_atomics+0x198/0x2e0 [ 66.559195] kunit_try_run_case+0x170/0x3f0 [ 66.559229] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.559265] kthread+0x328/0x630 [ 66.559294] ret_from_fork+0x10/0x20 [ 66.559325] [ 66.630280] Allocated by task 349: [ 66.633668] kasan_save_stack+0x3c/0x68 [ 66.637486] kasan_save_track+0x20/0x40 [ 66.641305] kasan_save_alloc_info+0x40/0x58 [ 66.645558] __kasan_kmalloc+0xd4/0xd8 [ 66.649291] __kmalloc_cache_noprof+0x16c/0x3c0 [ 66.653805] kasan_atomics+0xb8/0x2e0 [ 66.657451] kunit_try_run_case+0x170/0x3f0 [ 66.661617] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.667086] kthread+0x328/0x630 [ 66.670298] ret_from_fork+0x10/0x20 [ 66.673856] [ 66.675332] The buggy address belongs to the object at ffff000808448180 [ 66.675332] which belongs to the cache kmalloc-64 of size 64 [ 66.687659] The buggy address is located 0 bytes to the right of [ 66.687659] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 66.700505] [ 66.701981] The buggy address belongs to the physical page: [ 66.707539] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 66.715523] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 66.722033] page_type: f5(slab) [ 66.725166] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 66.732890] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.740609] page dumped because: kasan: bad access detected [ 66.746165] [ 66.747640] Memory state around the buggy address: [ 66.752419] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.759623] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.766828] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 66.774029] ^ [ 66.778806] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.786011] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.793212] ================================================================== [ 65.211018] ================================================================== [ 65.218064] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 65.225354] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 65.232732] [ 65.234215] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 65.234263] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.234281] Hardware name: WinLink E850-96 board (DT) [ 65.234299] Call trace: [ 65.234312] show_stack+0x20/0x38 (C) [ 65.234344] dump_stack_lvl+0x8c/0xd0 [ 65.234376] print_report+0x118/0x5d0 [ 65.234403] kasan_report+0xdc/0x128 [ 65.234431] kasan_check_range+0x100/0x1a8 [ 65.234460] __kasan_check_write+0x20/0x30 [ 65.234493] kasan_atomics_helper+0x4e4/0x4858 [ 65.234528] kasan_atomics+0x198/0x2e0 [ 65.234561] kunit_try_run_case+0x170/0x3f0 [ 65.234595] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.234632] kthread+0x328/0x630 [ 65.234661] ret_from_fork+0x10/0x20 [ 65.234692] [ 65.305648] Allocated by task 349: [ 65.309033] kasan_save_stack+0x3c/0x68 [ 65.312853] kasan_save_track+0x20/0x40 [ 65.316672] kasan_save_alloc_info+0x40/0x58 [ 65.320926] __kasan_kmalloc+0xd4/0xd8 [ 65.324658] __kmalloc_cache_noprof+0x16c/0x3c0 [ 65.329172] kasan_atomics+0xb8/0x2e0 [ 65.332818] kunit_try_run_case+0x170/0x3f0 [ 65.336984] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.342453] kthread+0x328/0x630 [ 65.345665] ret_from_fork+0x10/0x20 [ 65.349224] [ 65.350700] The buggy address belongs to the object at ffff000808448180 [ 65.350700] which belongs to the cache kmalloc-64 of size 64 [ 65.363026] The buggy address is located 0 bytes to the right of [ 65.363026] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 65.375873] [ 65.377348] The buggy address belongs to the physical page: [ 65.382906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 65.390890] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 65.397400] page_type: f5(slab) [ 65.400535] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 65.408257] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.415976] page dumped because: kasan: bad access detected [ 65.421532] [ 65.423007] Memory state around the buggy address: [ 65.427785] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.434990] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.442195] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 65.449396] ^ [ 65.454174] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.461378] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.468580] ================================================================== [ 74.987859] ================================================================== [ 74.994828] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 75.002204] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 75.009582] [ 75.011064] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 75.011112] Tainted: [B]=BAD_PAGE, [N]=TEST [ 75.011128] Hardware name: WinLink E850-96 board (DT) [ 75.011147] Call trace: [ 75.011161] show_stack+0x20/0x38 (C) [ 75.011194] dump_stack_lvl+0x8c/0xd0 [ 75.011228] print_report+0x118/0x5d0 [ 75.011258] kasan_report+0xdc/0x128 [ 75.011284] kasan_check_range+0x100/0x1a8 [ 75.011315] __kasan_check_write+0x20/0x30 [ 75.011348] kasan_atomics_helper+0x126c/0x4858 [ 75.011382] kasan_atomics+0x198/0x2e0 [ 75.011416] kunit_try_run_case+0x170/0x3f0 [ 75.011451] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.011486] kthread+0x328/0x630 [ 75.011518] ret_from_fork+0x10/0x20 [ 75.011551] [ 75.082584] Allocated by task 349: [ 75.085972] kasan_save_stack+0x3c/0x68 [ 75.089789] kasan_save_track+0x20/0x40 [ 75.093609] kasan_save_alloc_info+0x40/0x58 [ 75.097862] __kasan_kmalloc+0xd4/0xd8 [ 75.101595] __kmalloc_cache_noprof+0x16c/0x3c0 [ 75.106108] kasan_atomics+0xb8/0x2e0 [ 75.109754] kunit_try_run_case+0x170/0x3f0 [ 75.113921] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.119390] kthread+0x328/0x630 [ 75.122601] ret_from_fork+0x10/0x20 [ 75.126160] [ 75.127636] The buggy address belongs to the object at ffff000808448180 [ 75.127636] which belongs to the cache kmalloc-64 of size 64 [ 75.139964] The buggy address is located 0 bytes to the right of [ 75.139964] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 75.152809] [ 75.154287] The buggy address belongs to the physical page: [ 75.159844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 75.167828] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 75.174337] page_type: f5(slab) [ 75.177471] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 75.185194] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 75.192913] page dumped because: kasan: bad access detected [ 75.198468] [ 75.199944] Memory state around the buggy address: [ 75.204723] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.211927] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.219132] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 75.226332] ^ [ 75.231110] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.238315] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.245516] ================================================================== [ 62.571633] ================================================================== [ 62.578697] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 62.586071] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 62.593451] [ 62.594933] CPU: 5 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 62.594988] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.595007] Hardware name: WinLink E850-96 board (DT) [ 62.595028] Call trace: [ 62.595043] show_stack+0x20/0x38 (C) [ 62.595084] dump_stack_lvl+0x8c/0xd0 [ 62.595116] print_report+0x118/0x5d0 [ 62.595144] kasan_report+0xdc/0x128 [ 62.595171] __asan_report_store4_noabort+0x20/0x30 [ 62.595207] kasan_atomics_helper+0x3f7c/0x4858 [ 62.595244] kasan_atomics+0x198/0x2e0 [ 62.595276] kunit_try_run_case+0x170/0x3f0 [ 62.595313] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.595348] kthread+0x328/0x630 [ 62.595381] ret_from_fork+0x10/0x20 [ 62.595415] [ 62.663153] Allocated by task 349: [ 62.666539] kasan_save_stack+0x3c/0x68 [ 62.670359] kasan_save_track+0x20/0x40 [ 62.674177] kasan_save_alloc_info+0x40/0x58 [ 62.678431] __kasan_kmalloc+0xd4/0xd8 [ 62.682163] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.686677] kasan_atomics+0xb8/0x2e0 [ 62.690323] kunit_try_run_case+0x170/0x3f0 [ 62.694489] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.699959] kthread+0x328/0x630 [ 62.703170] ret_from_fork+0x10/0x20 [ 62.706729] [ 62.708206] The buggy address belongs to the object at ffff000808448180 [ 62.708206] which belongs to the cache kmalloc-64 of size 64 [ 62.720532] The buggy address is located 0 bytes to the right of [ 62.720532] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 62.733378] [ 62.734855] The buggy address belongs to the physical page: [ 62.740413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 62.748398] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.754905] page_type: f5(slab) [ 62.758042] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 62.765762] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.773481] page dumped because: kasan: bad access detected [ 62.779037] [ 62.780512] Memory state around the buggy address: [ 62.785293] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.792495] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.799700] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.806901] ^ [ 62.811680] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.818885] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.826085] ================================================================== [ 68.121907] ================================================================== [ 68.128959] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 68.136248] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 68.143626] [ 68.145109] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 68.145159] Tainted: [B]=BAD_PAGE, [N]=TEST [ 68.145177] Hardware name: WinLink E850-96 board (DT) [ 68.145195] Call trace: [ 68.145209] show_stack+0x20/0x38 (C) [ 68.145241] dump_stack_lvl+0x8c/0xd0 [ 68.145274] print_report+0x118/0x5d0 [ 68.145300] kasan_report+0xdc/0x128 [ 68.145327] kasan_check_range+0x100/0x1a8 [ 68.145357] __kasan_check_write+0x20/0x30 [ 68.145389] kasan_atomics_helper+0x99c/0x4858 [ 68.145425] kasan_atomics+0x198/0x2e0 [ 68.145456] kunit_try_run_case+0x170/0x3f0 [ 68.145493] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.145527] kthread+0x328/0x630 [ 68.145557] ret_from_fork+0x10/0x20 [ 68.145591] [ 68.216542] Allocated by task 349: [ 68.219929] kasan_save_stack+0x3c/0x68 [ 68.223746] kasan_save_track+0x20/0x40 [ 68.227566] kasan_save_alloc_info+0x40/0x58 [ 68.231819] __kasan_kmalloc+0xd4/0xd8 [ 68.235552] __kmalloc_cache_noprof+0x16c/0x3c0 [ 68.240066] kasan_atomics+0xb8/0x2e0 [ 68.243712] kunit_try_run_case+0x170/0x3f0 [ 68.247878] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.253347] kthread+0x328/0x630 [ 68.256559] ret_from_fork+0x10/0x20 [ 68.260118] [ 68.261593] The buggy address belongs to the object at ffff000808448180 [ 68.261593] which belongs to the cache kmalloc-64 of size 64 [ 68.273920] The buggy address is located 0 bytes to the right of [ 68.273920] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 68.286766] [ 68.288242] The buggy address belongs to the physical page: [ 68.293800] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 68.301786] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 68.308294] page_type: f5(slab) [ 68.311428] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 68.319151] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 68.326870] page dumped because: kasan: bad access detected [ 68.332425] [ 68.333901] Memory state around the buggy address: [ 68.338679] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.345884] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.353088] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 68.360289] ^ [ 68.365068] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.372272] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.379473] ================================================================== [ 75.783094] ================================================================== [ 75.790129] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 75.797505] Read of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 75.804796] [ 75.806277] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 75.806325] Tainted: [B]=BAD_PAGE, [N]=TEST [ 75.806343] Hardware name: WinLink E850-96 board (DT) [ 75.806364] Call trace: [ 75.806377] show_stack+0x20/0x38 (C) [ 75.806408] dump_stack_lvl+0x8c/0xd0 [ 75.806440] print_report+0x118/0x5d0 [ 75.806467] kasan_report+0xdc/0x128 [ 75.806495] __asan_report_load8_noabort+0x20/0x30 [ 75.806528] kasan_atomics_helper+0x3f04/0x4858 [ 75.806564] kasan_atomics+0x198/0x2e0 [ 75.806598] kunit_try_run_case+0x170/0x3f0 [ 75.806633] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.806668] kthread+0x328/0x630 [ 75.806699] ret_from_fork+0x10/0x20 [ 75.806733] [ 75.874413] Allocated by task 349: [ 75.877800] kasan_save_stack+0x3c/0x68 [ 75.881618] kasan_save_track+0x20/0x40 [ 75.885437] kasan_save_alloc_info+0x40/0x58 [ 75.889690] __kasan_kmalloc+0xd4/0xd8 [ 75.893423] __kmalloc_cache_noprof+0x16c/0x3c0 [ 75.897937] kasan_atomics+0xb8/0x2e0 [ 75.901583] kunit_try_run_case+0x170/0x3f0 [ 75.905749] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.911218] kthread+0x328/0x630 [ 75.914430] ret_from_fork+0x10/0x20 [ 75.917989] [ 75.919466] The buggy address belongs to the object at ffff000808448180 [ 75.919466] which belongs to the cache kmalloc-64 of size 64 [ 75.931791] The buggy address is located 0 bytes to the right of [ 75.931791] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 75.944638] [ 75.946114] The buggy address belongs to the physical page: [ 75.951671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 75.959655] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 75.966165] page_type: f5(slab) [ 75.969299] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 75.977022] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 75.984741] page dumped because: kasan: bad access detected [ 75.990297] [ 75.991772] Memory state around the buggy address: [ 75.996552] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 76.003755] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 76.010959] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 76.018161] ^ [ 76.022938] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.030143] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.037345] ================================================================== [ 77.896930] ================================================================== [ 77.903987] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 77.911362] Read of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 77.918653] [ 77.920135] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 77.920188] Tainted: [B]=BAD_PAGE, [N]=TEST [ 77.920204] Hardware name: WinLink E850-96 board (DT) [ 77.920225] Call trace: [ 77.920239] show_stack+0x20/0x38 (C) [ 77.920271] dump_stack_lvl+0x8c/0xd0 [ 77.920303] print_report+0x118/0x5d0 [ 77.920333] kasan_report+0xdc/0x128 [ 77.920360] __asan_report_load8_noabort+0x20/0x30 [ 77.920396] kasan_atomics_helper+0x3df4/0x4858 [ 77.920432] kasan_atomics+0x198/0x2e0 [ 77.920464] kunit_try_run_case+0x170/0x3f0 [ 77.920501] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.920536] kthread+0x328/0x630 [ 77.920563] ret_from_fork+0x10/0x20 [ 77.920594] [ 77.988270] Allocated by task 349: [ 77.991657] kasan_save_stack+0x3c/0x68 [ 77.995475] kasan_save_track+0x20/0x40 [ 77.999294] kasan_save_alloc_info+0x40/0x58 [ 78.003548] __kasan_kmalloc+0xd4/0xd8 [ 78.007280] __kmalloc_cache_noprof+0x16c/0x3c0 [ 78.011794] kasan_atomics+0xb8/0x2e0 [ 78.015440] kunit_try_run_case+0x170/0x3f0 [ 78.019607] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 78.025075] kthread+0x328/0x630 [ 78.028287] ret_from_fork+0x10/0x20 [ 78.031846] [ 78.033321] The buggy address belongs to the object at ffff000808448180 [ 78.033321] which belongs to the cache kmalloc-64 of size 64 [ 78.045648] The buggy address is located 0 bytes to the right of [ 78.045648] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 78.058495] [ 78.059973] The buggy address belongs to the physical page: [ 78.065528] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 78.073512] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 78.080022] page_type: f5(slab) [ 78.083157] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 78.090879] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 78.098598] page dumped because: kasan: bad access detected [ 78.104154] [ 78.105629] Memory state around the buggy address: [ 78.110407] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 78.117612] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 78.124817] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 78.132018] ^ [ 78.136796] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.144000] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.151202] ================================================================== [ 76.574902] ================================================================== [ 76.581956] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 76.589333] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 76.596711] [ 76.598194] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 76.598243] Tainted: [B]=BAD_PAGE, [N]=TEST [ 76.598259] Hardware name: WinLink E850-96 board (DT) [ 76.598277] Call trace: [ 76.598293] show_stack+0x20/0x38 (C) [ 76.598325] dump_stack_lvl+0x8c/0xd0 [ 76.598357] print_report+0x118/0x5d0 [ 76.598386] kasan_report+0xdc/0x128 [ 76.598414] kasan_check_range+0x100/0x1a8 [ 76.598446] __kasan_check_write+0x20/0x30 [ 76.598479] kasan_atomics_helper+0x14e4/0x4858 [ 76.598513] kasan_atomics+0x198/0x2e0 [ 76.598545] kunit_try_run_case+0x170/0x3f0 [ 76.598581] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.598615] kthread+0x328/0x630 [ 76.598645] ret_from_fork+0x10/0x20 [ 76.598678] [ 76.669713] Allocated by task 349: [ 76.673101] kasan_save_stack+0x3c/0x68 [ 76.676919] kasan_save_track+0x20/0x40 [ 76.680738] kasan_save_alloc_info+0x40/0x58 [ 76.684991] __kasan_kmalloc+0xd4/0xd8 [ 76.688724] __kmalloc_cache_noprof+0x16c/0x3c0 [ 76.693237] kasan_atomics+0xb8/0x2e0 [ 76.696883] kunit_try_run_case+0x170/0x3f0 [ 76.701050] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.706518] kthread+0x328/0x630 [ 76.709730] ret_from_fork+0x10/0x20 [ 76.713289] [ 76.714764] The buggy address belongs to the object at ffff000808448180 [ 76.714764] which belongs to the cache kmalloc-64 of size 64 [ 76.727093] The buggy address is located 0 bytes to the right of [ 76.727093] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 76.739938] [ 76.741414] The buggy address belongs to the physical page: [ 76.746970] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 76.754956] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 76.761466] page_type: f5(slab) [ 76.764600] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 76.772323] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 76.780042] page dumped because: kasan: bad access detected [ 76.785597] [ 76.787073] Memory state around the buggy address: [ 76.791850] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 76.799055] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 76.806260] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 76.813461] ^ [ 76.818239] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.825444] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.832645] ================================================================== [ 62.302886] ================================================================== [ 62.317070] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 62.324443] Read of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 62.331736] [ 62.333223] CPU: 5 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 62.333286] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.333305] Hardware name: WinLink E850-96 board (DT) [ 62.333329] Call trace: [ 62.333343] show_stack+0x20/0x38 (C) [ 62.333383] dump_stack_lvl+0x8c/0xd0 [ 62.333420] print_report+0x118/0x5d0 [ 62.333451] kasan_report+0xdc/0x128 [ 62.333479] __asan_report_load4_noabort+0x20/0x30 [ 62.333515] kasan_atomics_helper+0x40a8/0x4858 [ 62.333554] kasan_atomics+0x198/0x2e0 [ 62.333588] kunit_try_run_case+0x170/0x3f0 [ 62.333627] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.333662] kthread+0x328/0x630 [ 62.333695] ret_from_fork+0x10/0x20 [ 62.333734] [ 62.401353] Allocated by task 349: [ 62.404740] kasan_save_stack+0x3c/0x68 [ 62.408556] kasan_save_track+0x20/0x40 [ 62.412376] kasan_save_alloc_info+0x40/0x58 [ 62.416629] __kasan_kmalloc+0xd4/0xd8 [ 62.420362] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.424875] kasan_atomics+0xb8/0x2e0 [ 62.428521] kunit_try_run_case+0x170/0x3f0 [ 62.432688] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.438158] kthread+0x328/0x630 [ 62.441368] ret_from_fork+0x10/0x20 [ 62.444927] [ 62.446404] The buggy address belongs to the object at ffff000808448180 [ 62.446404] which belongs to the cache kmalloc-64 of size 64 [ 62.458733] The buggy address is located 0 bytes to the right of [ 62.458733] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 62.471576] [ 62.473055] The buggy address belongs to the physical page: [ 62.478612] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 62.486596] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.493106] page_type: f5(slab) [ 62.496242] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 62.503960] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 62.511681] page dumped because: kasan: bad access detected [ 62.517235] [ 62.518712] Memory state around the buggy address: [ 62.523490] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.530693] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 62.537900] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 62.545099] ^ [ 62.549878] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.557082] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.564283] ================================================================== [ 65.475968] ================================================================== [ 65.482990] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 65.490281] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 65.497659] [ 65.499138] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 65.499186] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.499203] Hardware name: WinLink E850-96 board (DT) [ 65.499221] Call trace: [ 65.499232] show_stack+0x20/0x38 (C) [ 65.499265] dump_stack_lvl+0x8c/0xd0 [ 65.499299] print_report+0x118/0x5d0 [ 65.499327] kasan_report+0xdc/0x128 [ 65.499354] kasan_check_range+0x100/0x1a8 [ 65.499385] __kasan_check_write+0x20/0x30 [ 65.499417] kasan_atomics_helper+0x54c/0x4858 [ 65.499451] kasan_atomics+0x198/0x2e0 [ 65.499484] kunit_try_run_case+0x170/0x3f0 [ 65.499517] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.499550] kthread+0x328/0x630 [ 65.499579] ret_from_fork+0x10/0x20 [ 65.499610] [ 65.570575] Allocated by task 349: [ 65.573960] kasan_save_stack+0x3c/0x68 [ 65.577779] kasan_save_track+0x20/0x40 [ 65.581599] kasan_save_alloc_info+0x40/0x58 [ 65.585852] __kasan_kmalloc+0xd4/0xd8 [ 65.589585] __kmalloc_cache_noprof+0x16c/0x3c0 [ 65.594099] kasan_atomics+0xb8/0x2e0 [ 65.597744] kunit_try_run_case+0x170/0x3f0 [ 65.601911] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.607380] kthread+0x328/0x630 [ 65.610591] ret_from_fork+0x10/0x20 [ 65.614150] [ 65.615626] The buggy address belongs to the object at ffff000808448180 [ 65.615626] which belongs to the cache kmalloc-64 of size 64 [ 65.627953] The buggy address is located 0 bytes to the right of [ 65.627953] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 65.640799] [ 65.642275] The buggy address belongs to the physical page: [ 65.647833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 65.655817] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 65.662327] page_type: f5(slab) [ 65.665460] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 65.673184] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.680903] page dumped because: kasan: bad access detected [ 65.686458] [ 65.687934] Memory state around the buggy address: [ 65.692711] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.699916] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.707121] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 65.714323] ^ [ 65.719100] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.726305] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.733506] ================================================================== [ 66.005913] ================================================================== [ 66.012845] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 66.020136] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 66.027512] [ 66.028995] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 66.029044] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.029061] Hardware name: WinLink E850-96 board (DT) [ 66.029077] Call trace: [ 66.029091] show_stack+0x20/0x38 (C) [ 66.029123] dump_stack_lvl+0x8c/0xd0 [ 66.029155] print_report+0x118/0x5d0 [ 66.029183] kasan_report+0xdc/0x128 [ 66.029210] kasan_check_range+0x100/0x1a8 [ 66.029243] __kasan_check_write+0x20/0x30 [ 66.029273] kasan_atomics_helper+0x61c/0x4858 [ 66.029308] kasan_atomics+0x198/0x2e0 [ 66.029340] kunit_try_run_case+0x170/0x3f0 [ 66.029376] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.029409] kthread+0x328/0x630 [ 66.029442] ret_from_fork+0x10/0x20 [ 66.029474] [ 66.100428] Allocated by task 349: [ 66.103815] kasan_save_stack+0x3c/0x68 [ 66.107632] kasan_save_track+0x20/0x40 [ 66.111452] kasan_save_alloc_info+0x40/0x58 [ 66.115705] __kasan_kmalloc+0xd4/0xd8 [ 66.119438] __kmalloc_cache_noprof+0x16c/0x3c0 [ 66.123952] kasan_atomics+0xb8/0x2e0 [ 66.127598] kunit_try_run_case+0x170/0x3f0 [ 66.131764] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.137233] kthread+0x328/0x630 [ 66.140444] ret_from_fork+0x10/0x20 [ 66.144004] [ 66.145479] The buggy address belongs to the object at ffff000808448180 [ 66.145479] which belongs to the cache kmalloc-64 of size 64 [ 66.157806] The buggy address is located 0 bytes to the right of [ 66.157806] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 66.170652] [ 66.172128] The buggy address belongs to the physical page: [ 66.177686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 66.185670] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 66.192180] page_type: f5(slab) [ 66.195313] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 66.203037] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.210756] page dumped because: kasan: bad access detected [ 66.216311] [ 66.217787] Memory state around the buggy address: [ 66.222565] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.229770] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.236974] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 66.244176] ^ [ 66.248953] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.256158] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.263359] ================================================================== [ 77.105212] ================================================================== [ 77.112158] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 77.119533] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 77.126911] [ 77.128394] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 77.128443] Tainted: [B]=BAD_PAGE, [N]=TEST [ 77.128459] Hardware name: WinLink E850-96 board (DT) [ 77.128479] Call trace: [ 77.128494] show_stack+0x20/0x38 (C) [ 77.128530] dump_stack_lvl+0x8c/0xd0 [ 77.128563] print_report+0x118/0x5d0 [ 77.128594] kasan_report+0xdc/0x128 [ 77.128622] kasan_check_range+0x100/0x1a8 [ 77.128652] __kasan_check_write+0x20/0x30 [ 77.128685] kasan_atomics_helper+0x15b4/0x4858 [ 77.128720] kasan_atomics+0x198/0x2e0 [ 77.128752] kunit_try_run_case+0x170/0x3f0 [ 77.128787] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.128819] kthread+0x328/0x630 [ 77.128849] ret_from_fork+0x10/0x20 [ 77.128885] [ 77.199913] Allocated by task 349: [ 77.203301] kasan_save_stack+0x3c/0x68 [ 77.207119] kasan_save_track+0x20/0x40 [ 77.210938] kasan_save_alloc_info+0x40/0x58 [ 77.215191] __kasan_kmalloc+0xd4/0xd8 [ 77.218924] __kmalloc_cache_noprof+0x16c/0x3c0 [ 77.223438] kasan_atomics+0xb8/0x2e0 [ 77.227084] kunit_try_run_case+0x170/0x3f0 [ 77.231250] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.236719] kthread+0x328/0x630 [ 77.239930] ret_from_fork+0x10/0x20 [ 77.243489] [ 77.244965] The buggy address belongs to the object at ffff000808448180 [ 77.244965] which belongs to the cache kmalloc-64 of size 64 [ 77.257293] The buggy address is located 0 bytes to the right of [ 77.257293] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 77.270139] [ 77.271615] The buggy address belongs to the physical page: [ 77.277172] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 77.285157] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 77.291666] page_type: f5(slab) [ 77.294801] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 77.302523] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 77.310242] page dumped because: kasan: bad access detected [ 77.315797] [ 77.317273] Memory state around the buggy address: [ 77.322052] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 77.329256] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 77.336461] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 77.343662] ^ [ 77.348439] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.355644] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.362846] ================================================================== [ 67.857097] ================================================================== [ 67.864034] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 67.871322] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 67.878700] [ 67.880183] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 67.880233] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.880250] Hardware name: WinLink E850-96 board (DT) [ 67.880269] Call trace: [ 67.880284] show_stack+0x20/0x38 (C) [ 67.880317] dump_stack_lvl+0x8c/0xd0 [ 67.880351] print_report+0x118/0x5d0 [ 67.880379] kasan_report+0xdc/0x128 [ 67.880409] kasan_check_range+0x100/0x1a8 [ 67.880440] __kasan_check_write+0x20/0x30 [ 67.880471] kasan_atomics_helper+0x934/0x4858 [ 67.880506] kasan_atomics+0x198/0x2e0 [ 67.880539] kunit_try_run_case+0x170/0x3f0 [ 67.880575] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.880612] kthread+0x328/0x630 [ 67.880642] ret_from_fork+0x10/0x20 [ 67.880673] [ 67.951615] Allocated by task 349: [ 67.955003] kasan_save_stack+0x3c/0x68 [ 67.958820] kasan_save_track+0x20/0x40 [ 67.962639] kasan_save_alloc_info+0x40/0x58 [ 67.966893] __kasan_kmalloc+0xd4/0xd8 [ 67.970625] __kmalloc_cache_noprof+0x16c/0x3c0 [ 67.975139] kasan_atomics+0xb8/0x2e0 [ 67.978785] kunit_try_run_case+0x170/0x3f0 [ 67.982952] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.988420] kthread+0x328/0x630 [ 67.991632] ret_from_fork+0x10/0x20 [ 67.995191] [ 67.996666] The buggy address belongs to the object at ffff000808448180 [ 67.996666] which belongs to the cache kmalloc-64 of size 64 [ 68.008993] The buggy address is located 0 bytes to the right of [ 68.008993] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 68.021840] [ 68.023316] The buggy address belongs to the physical page: [ 68.028873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 68.036857] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 68.043367] page_type: f5(slab) [ 68.046501] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 68.054225] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 68.061943] page dumped because: kasan: bad access detected [ 68.067499] [ 68.068974] Memory state around the buggy address: [ 68.073754] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.080957] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.088162] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 68.095363] ^ [ 68.100141] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.107346] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.114547] ================================================================== [ 69.969908] ================================================================== [ 69.976850] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 69.984137] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 69.991515] [ 69.992999] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 69.993051] Tainted: [B]=BAD_PAGE, [N]=TEST [ 69.993067] Hardware name: WinLink E850-96 board (DT) [ 69.993088] Call trace: [ 69.993102] show_stack+0x20/0x38 (C) [ 69.993135] dump_stack_lvl+0x8c/0xd0 [ 69.993168] print_report+0x118/0x5d0 [ 69.993196] kasan_report+0xdc/0x128 [ 69.993221] kasan_check_range+0x100/0x1a8 [ 69.993253] __kasan_check_write+0x20/0x30 [ 69.993283] kasan_atomics_helper+0xc08/0x4858 [ 69.993318] kasan_atomics+0x198/0x2e0 [ 69.993351] kunit_try_run_case+0x170/0x3f0 [ 69.993385] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.993421] kthread+0x328/0x630 [ 69.993449] ret_from_fork+0x10/0x20 [ 69.993481] [ 70.064430] Allocated by task 349: [ 70.067818] kasan_save_stack+0x3c/0x68 [ 70.071636] kasan_save_track+0x20/0x40 [ 70.075455] kasan_save_alloc_info+0x40/0x58 [ 70.079708] __kasan_kmalloc+0xd4/0xd8 [ 70.083441] __kmalloc_cache_noprof+0x16c/0x3c0 [ 70.087955] kasan_atomics+0xb8/0x2e0 [ 70.091601] kunit_try_run_case+0x170/0x3f0 [ 70.095767] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.101237] kthread+0x328/0x630 [ 70.104448] ret_from_fork+0x10/0x20 [ 70.108007] [ 70.109482] The buggy address belongs to the object at ffff000808448180 [ 70.109482] which belongs to the cache kmalloc-64 of size 64 [ 70.121809] The buggy address is located 0 bytes to the right of [ 70.121809] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 70.134655] [ 70.136132] The buggy address belongs to the physical page: [ 70.141689] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 70.149673] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 70.156183] page_type: f5(slab) [ 70.159319] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 70.167040] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 70.174759] page dumped because: kasan: bad access detected [ 70.180314] [ 70.181790] Memory state around the buggy address: [ 70.186570] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.193773] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.200977] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 70.208179] ^ [ 70.212956] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.220161] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.227362] ================================================================== [ 62.833469] ================================================================== [ 62.840499] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 62.847786] Read of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 62.855077] [ 62.856562] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 62.856618] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.856636] Hardware name: WinLink E850-96 board (DT) [ 62.856658] Call trace: [ 62.856673] show_stack+0x20/0x38 (C) [ 62.856711] dump_stack_lvl+0x8c/0xd0 [ 62.856745] print_report+0x118/0x5d0 [ 62.856776] kasan_report+0xdc/0x128 [ 62.856804] kasan_check_range+0x100/0x1a8 [ 62.856834] __kasan_check_read+0x20/0x30 [ 62.856868] kasan_atomics_helper+0x1ec/0x4858 [ 62.856905] kasan_atomics+0x198/0x2e0 [ 62.856936] kunit_try_run_case+0x170/0x3f0 [ 62.856973] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.857008] kthread+0x328/0x630 [ 62.857038] ret_from_fork+0x10/0x20 [ 62.857074] [ 62.927906] Allocated by task 349: [ 62.931295] kasan_save_stack+0x3c/0x68 [ 62.935111] kasan_save_track+0x20/0x40 [ 62.938930] kasan_save_alloc_info+0x40/0x58 [ 62.943183] __kasan_kmalloc+0xd4/0xd8 [ 62.946916] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.951430] kasan_atomics+0xb8/0x2e0 [ 62.955076] kunit_try_run_case+0x170/0x3f0 [ 62.959243] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.964712] kthread+0x328/0x630 [ 62.967923] ret_from_fork+0x10/0x20 [ 62.971483] [ 62.972959] The buggy address belongs to the object at ffff000808448180 [ 62.972959] which belongs to the cache kmalloc-64 of size 64 [ 62.985287] The buggy address is located 0 bytes to the right of [ 62.985287] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 62.998130] [ 62.999609] The buggy address belongs to the physical page: [ 63.005166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 63.013149] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.019658] page_type: f5(slab) [ 63.022794] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 63.030515] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.038235] page dumped because: kasan: bad access detected [ 63.043790] [ 63.045265] Memory state around the buggy address: [ 63.050044] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.057248] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.064453] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 63.071654] ^ [ 63.076433] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.083636] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.090838] ================================================================== [ 72.340770] ================================================================== [ 72.347820] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 72.355195] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 72.362573] [ 72.364056] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 72.364107] Tainted: [B]=BAD_PAGE, [N]=TEST [ 72.364123] Hardware name: WinLink E850-96 board (DT) [ 72.364143] Call trace: [ 72.364157] show_stack+0x20/0x38 (C) [ 72.364191] dump_stack_lvl+0x8c/0xd0 [ 72.364223] print_report+0x118/0x5d0 [ 72.364252] kasan_report+0xdc/0x128 [ 72.364281] __asan_report_store8_noabort+0x20/0x30 [ 72.364316] kasan_atomics_helper+0x3e5c/0x4858 [ 72.364351] kasan_atomics+0x198/0x2e0 [ 72.364384] kunit_try_run_case+0x170/0x3f0 [ 72.364417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.364449] kthread+0x328/0x630 [ 72.364478] ret_from_fork+0x10/0x20 [ 72.364510] [ 72.432277] Allocated by task 349: [ 72.435664] kasan_save_stack+0x3c/0x68 [ 72.439482] kasan_save_track+0x20/0x40 [ 72.443301] kasan_save_alloc_info+0x40/0x58 [ 72.447555] __kasan_kmalloc+0xd4/0xd8 [ 72.451287] __kmalloc_cache_noprof+0x16c/0x3c0 [ 72.455801] kasan_atomics+0xb8/0x2e0 [ 72.459447] kunit_try_run_case+0x170/0x3f0 [ 72.463613] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.469082] kthread+0x328/0x630 [ 72.472294] ret_from_fork+0x10/0x20 [ 72.475853] [ 72.477328] The buggy address belongs to the object at ffff000808448180 [ 72.477328] which belongs to the cache kmalloc-64 of size 64 [ 72.489655] The buggy address is located 0 bytes to the right of [ 72.489655] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 72.502502] [ 72.503979] The buggy address belongs to the physical page: [ 72.509534] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 72.517520] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 72.524029] page_type: f5(slab) [ 72.527162] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 72.534887] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 72.542605] page dumped because: kasan: bad access detected [ 72.548160] [ 72.549636] Memory state around the buggy address: [ 72.554416] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.561619] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.568824] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 72.576025] ^ [ 72.580803] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.588007] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.595209] ================================================================== [ 69.181701] ================================================================== [ 69.188667] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 69.196041] Read of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 69.203332] [ 69.204815] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 69.204863] Tainted: [B]=BAD_PAGE, [N]=TEST [ 69.204880] Hardware name: WinLink E850-96 board (DT) [ 69.204903] Call trace: [ 69.204917] show_stack+0x20/0x38 (C) [ 69.204951] dump_stack_lvl+0x8c/0xd0 [ 69.204982] print_report+0x118/0x5d0 [ 69.205010] kasan_report+0xdc/0x128 [ 69.205037] __asan_report_load4_noabort+0x20/0x30 [ 69.205072] kasan_atomics_helper+0x3dcc/0x4858 [ 69.205106] kasan_atomics+0x198/0x2e0 [ 69.205138] kunit_try_run_case+0x170/0x3f0 [ 69.205174] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.205209] kthread+0x328/0x630 [ 69.205239] ret_from_fork+0x10/0x20 [ 69.205273] [ 69.272949] Allocated by task 349: [ 69.276337] kasan_save_stack+0x3c/0x68 [ 69.280155] kasan_save_track+0x20/0x40 [ 69.283974] kasan_save_alloc_info+0x40/0x58 [ 69.288227] __kasan_kmalloc+0xd4/0xd8 [ 69.291960] __kmalloc_cache_noprof+0x16c/0x3c0 [ 69.296474] kasan_atomics+0xb8/0x2e0 [ 69.300120] kunit_try_run_case+0x170/0x3f0 [ 69.304286] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.309756] kthread+0x328/0x630 [ 69.312966] ret_from_fork+0x10/0x20 [ 69.316525] [ 69.318001] The buggy address belongs to the object at ffff000808448180 [ 69.318001] which belongs to the cache kmalloc-64 of size 64 [ 69.330327] The buggy address is located 0 bytes to the right of [ 69.330327] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 69.343174] [ 69.344652] The buggy address belongs to the physical page: [ 69.350207] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 69.358192] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 69.364701] page_type: f5(slab) [ 69.367836] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 69.375559] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 69.383277] page dumped because: kasan: bad access detected [ 69.388833] [ 69.390309] Memory state around the buggy address: [ 69.395088] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.402292] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.409496] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 69.416697] ^ [ 69.421475] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.428680] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.435881] ================================================================== [ 72.602593] ================================================================== [ 72.609624] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 72.616910] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 72.624288] [ 72.625771] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 72.625822] Tainted: [B]=BAD_PAGE, [N]=TEST [ 72.625837] Hardware name: WinLink E850-96 board (DT) [ 72.625857] Call trace: [ 72.625871] show_stack+0x20/0x38 (C) [ 72.625902] dump_stack_lvl+0x8c/0xd0 [ 72.625933] print_report+0x118/0x5d0 [ 72.625961] kasan_report+0xdc/0x128 [ 72.625990] kasan_check_range+0x100/0x1a8 [ 72.626020] __kasan_check_write+0x20/0x30 [ 72.626054] kasan_atomics_helper+0xeb8/0x4858 [ 72.626093] kasan_atomics+0x198/0x2e0 [ 72.626124] kunit_try_run_case+0x170/0x3f0 [ 72.626159] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.626194] kthread+0x328/0x630 [ 72.626223] ret_from_fork+0x10/0x20 [ 72.626255] [ 72.697203] Allocated by task 349: [ 72.700591] kasan_save_stack+0x3c/0x68 [ 72.704408] kasan_save_track+0x20/0x40 [ 72.708228] kasan_save_alloc_info+0x40/0x58 [ 72.712481] __kasan_kmalloc+0xd4/0xd8 [ 72.716214] __kmalloc_cache_noprof+0x16c/0x3c0 [ 72.720728] kasan_atomics+0xb8/0x2e0 [ 72.724373] kunit_try_run_case+0x170/0x3f0 [ 72.728540] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.734008] kthread+0x328/0x630 [ 72.737220] ret_from_fork+0x10/0x20 [ 72.740779] [ 72.742255] The buggy address belongs to the object at ffff000808448180 [ 72.742255] which belongs to the cache kmalloc-64 of size 64 [ 72.754582] The buggy address is located 0 bytes to the right of [ 72.754582] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 72.767428] [ 72.768904] The buggy address belongs to the physical page: [ 72.774460] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 72.782446] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 72.788955] page_type: f5(slab) [ 72.792091] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 72.799813] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 72.807532] page dumped because: kasan: bad access detected [ 72.813087] [ 72.814563] Memory state around the buggy address: [ 72.819343] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.826545] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.833750] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 72.840952] ^ [ 72.845729] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.852934] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.860135] ================================================================== [ 78.158555] ================================================================== [ 78.165615] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 78.172990] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 78.180368] [ 78.181851] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 78.181900] Tainted: [B]=BAD_PAGE, [N]=TEST [ 78.181918] Hardware name: WinLink E850-96 board (DT) [ 78.181936] Call trace: [ 78.181950] show_stack+0x20/0x38 (C) [ 78.181983] dump_stack_lvl+0x8c/0xd0 [ 78.182017] print_report+0x118/0x5d0 [ 78.182046] kasan_report+0xdc/0x128 [ 78.182074] kasan_check_range+0x100/0x1a8 [ 78.182105] __kasan_check_write+0x20/0x30 [ 78.182139] kasan_atomics_helper+0x16d0/0x4858 [ 78.182173] kasan_atomics+0x198/0x2e0 [ 78.182204] kunit_try_run_case+0x170/0x3f0 [ 78.182242] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 78.182279] kthread+0x328/0x630 [ 78.182309] ret_from_fork+0x10/0x20 [ 78.182341] [ 78.253370] Allocated by task 349: [ 78.256757] kasan_save_stack+0x3c/0x68 [ 78.260575] kasan_save_track+0x20/0x40 [ 78.264395] kasan_save_alloc_info+0x40/0x58 [ 78.268648] __kasan_kmalloc+0xd4/0xd8 [ 78.272380] __kmalloc_cache_noprof+0x16c/0x3c0 [ 78.276894] kasan_atomics+0xb8/0x2e0 [ 78.280540] kunit_try_run_case+0x170/0x3f0 [ 78.284707] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 78.290175] kthread+0x328/0x630 [ 78.293387] ret_from_fork+0x10/0x20 [ 78.296946] [ 78.298421] The buggy address belongs to the object at ffff000808448180 [ 78.298421] which belongs to the cache kmalloc-64 of size 64 [ 78.310748] The buggy address is located 0 bytes to the right of [ 78.310748] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 78.323595] [ 78.325072] The buggy address belongs to the physical page: [ 78.330628] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 78.338612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 78.345122] page_type: f5(slab) [ 78.348255] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 78.355980] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 78.363699] page dumped because: kasan: bad access detected [ 78.369254] [ 78.370729] Memory state around the buggy address: [ 78.375508] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 78.382712] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 78.389917] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 78.397118] ^ [ 78.401896] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.409101] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.416302] ================================================================== [ 75.252911] ================================================================== [ 75.259927] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 75.267304] Write of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 75.274683] [ 75.276166] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 75.276215] Tainted: [B]=BAD_PAGE, [N]=TEST [ 75.276231] Hardware name: WinLink E850-96 board (DT) [ 75.276253] Call trace: [ 75.276266] show_stack+0x20/0x38 (C) [ 75.276299] dump_stack_lvl+0x8c/0xd0 [ 75.276332] print_report+0x118/0x5d0 [ 75.276359] kasan_report+0xdc/0x128 [ 75.276387] kasan_check_range+0x100/0x1a8 [ 75.276416] __kasan_check_write+0x20/0x30 [ 75.276449] kasan_atomics_helper+0x12d8/0x4858 [ 75.276487] kasan_atomics+0x198/0x2e0 [ 75.276519] kunit_try_run_case+0x170/0x3f0 [ 75.276554] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.276590] kthread+0x328/0x630 [ 75.276619] ret_from_fork+0x10/0x20 [ 75.276651] [ 75.347685] Allocated by task 349: [ 75.351070] kasan_save_stack+0x3c/0x68 [ 75.354889] kasan_save_track+0x20/0x40 [ 75.358709] kasan_save_alloc_info+0x40/0x58 [ 75.362962] __kasan_kmalloc+0xd4/0xd8 [ 75.366695] __kmalloc_cache_noprof+0x16c/0x3c0 [ 75.371209] kasan_atomics+0xb8/0x2e0 [ 75.374854] kunit_try_run_case+0x170/0x3f0 [ 75.379021] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.384490] kthread+0x328/0x630 [ 75.387701] ret_from_fork+0x10/0x20 [ 75.391260] [ 75.392736] The buggy address belongs to the object at ffff000808448180 [ 75.392736] which belongs to the cache kmalloc-64 of size 64 [ 75.405064] The buggy address is located 0 bytes to the right of [ 75.405064] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 75.417909] [ 75.419387] The buggy address belongs to the physical page: [ 75.424944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 75.432927] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 75.439437] page_type: f5(slab) [ 75.442571] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 75.450294] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 75.458013] page dumped because: kasan: bad access detected [ 75.463568] [ 75.465044] Memory state around the buggy address: [ 75.469824] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.477027] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.484232] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 75.491433] ^ [ 75.496210] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.503415] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.510616] ================================================================== [ 67.330452] ================================================================== [ 67.337477] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 67.344767] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 67.352145] [ 67.353627] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 67.353675] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.353691] Hardware name: WinLink E850-96 board (DT) [ 67.353710] Call trace: [ 67.353722] show_stack+0x20/0x38 (C) [ 67.353758] dump_stack_lvl+0x8c/0xd0 [ 67.353789] print_report+0x118/0x5d0 [ 67.353815] kasan_report+0xdc/0x128 [ 67.353844] kasan_check_range+0x100/0x1a8 [ 67.353873] __kasan_check_write+0x20/0x30 [ 67.353906] kasan_atomics_helper+0x894/0x4858 [ 67.353943] kasan_atomics+0x198/0x2e0 [ 67.353975] kunit_try_run_case+0x170/0x3f0 [ 67.354012] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.354047] kthread+0x328/0x630 [ 67.354079] ret_from_fork+0x10/0x20 [ 67.354109] [ 67.425060] Allocated by task 349: [ 67.428447] kasan_save_stack+0x3c/0x68 [ 67.432266] kasan_save_track+0x20/0x40 [ 67.436085] kasan_save_alloc_info+0x40/0x58 [ 67.440338] __kasan_kmalloc+0xd4/0xd8 [ 67.444071] __kmalloc_cache_noprof+0x16c/0x3c0 [ 67.448585] kasan_atomics+0xb8/0x2e0 [ 67.452230] kunit_try_run_case+0x170/0x3f0 [ 67.456397] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.461867] kthread+0x328/0x630 [ 67.465077] ret_from_fork+0x10/0x20 [ 67.468637] [ 67.470112] The buggy address belongs to the object at ffff000808448180 [ 67.470112] which belongs to the cache kmalloc-64 of size 64 [ 67.482440] The buggy address is located 0 bytes to the right of [ 67.482440] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 67.495285] [ 67.496763] The buggy address belongs to the physical page: [ 67.502318] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 67.510303] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 67.516813] page_type: f5(slab) [ 67.519947] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 67.527670] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 67.535389] page dumped because: kasan: bad access detected [ 67.540944] [ 67.542420] Memory state around the buggy address: [ 67.547201] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.554403] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.561607] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 67.568808] ^ [ 67.573586] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.580791] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.587992] ================================================================== [ 67.065586] ================================================================== [ 67.072553] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 67.079840] Write of size 4 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 67.087218] [ 67.088701] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 67.088749] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.088765] Hardware name: WinLink E850-96 board (DT) [ 67.088786] Call trace: [ 67.088799] show_stack+0x20/0x38 (C) [ 67.088835] dump_stack_lvl+0x8c/0xd0 [ 67.088868] print_report+0x118/0x5d0 [ 67.088897] kasan_report+0xdc/0x128 [ 67.088924] kasan_check_range+0x100/0x1a8 [ 67.088955] __kasan_check_write+0x20/0x30 [ 67.088988] kasan_atomics_helper+0x7cc/0x4858 [ 67.089024] kasan_atomics+0x198/0x2e0 [ 67.089057] kunit_try_run_case+0x170/0x3f0 [ 67.089093] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.089127] kthread+0x328/0x630 [ 67.089157] ret_from_fork+0x10/0x20 [ 67.089189] [ 67.160134] Allocated by task 349: [ 67.163521] kasan_save_stack+0x3c/0x68 [ 67.167339] kasan_save_track+0x20/0x40 [ 67.171158] kasan_save_alloc_info+0x40/0x58 [ 67.175412] __kasan_kmalloc+0xd4/0xd8 [ 67.179144] __kmalloc_cache_noprof+0x16c/0x3c0 [ 67.183658] kasan_atomics+0xb8/0x2e0 [ 67.187304] kunit_try_run_case+0x170/0x3f0 [ 67.191470] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.196939] kthread+0x328/0x630 [ 67.200151] ret_from_fork+0x10/0x20 [ 67.203710] [ 67.205185] The buggy address belongs to the object at ffff000808448180 [ 67.205185] which belongs to the cache kmalloc-64 of size 64 [ 67.217512] The buggy address is located 0 bytes to the right of [ 67.217512] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 67.230359] [ 67.231836] The buggy address belongs to the physical page: [ 67.237392] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 67.245376] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 67.251886] page_type: f5(slab) [ 67.255020] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 67.262743] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 67.270462] page dumped because: kasan: bad access detected [ 67.276018] [ 67.277493] Memory state around the buggy address: [ 67.282273] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.289476] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.296681] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 67.303882] ^ [ 67.308660] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.315865] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.323066] ================================================================== [ 78.423658] ================================================================== [ 78.430714] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 78.438090] Read of size 8 at addr ffff0008084481b0 by task kunit_try_catch/349 [ 78.445381] [ 78.446865] CPU: 0 UID: 0 PID: 349 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 78.446917] Tainted: [B]=BAD_PAGE, [N]=TEST [ 78.446932] Hardware name: WinLink E850-96 board (DT) [ 78.446953] Call trace: [ 78.446967] show_stack+0x20/0x38 (C) [ 78.447002] dump_stack_lvl+0x8c/0xd0 [ 78.447036] print_report+0x118/0x5d0 [ 78.447062] kasan_report+0xdc/0x128 [ 78.447090] __asan_report_load8_noabort+0x20/0x30 [ 78.447125] kasan_atomics_helper+0x3e10/0x4858 [ 78.447161] kasan_atomics+0x198/0x2e0 [ 78.447194] kunit_try_run_case+0x170/0x3f0 [ 78.447230] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 78.447265] kthread+0x328/0x630 [ 78.447296] ret_from_fork+0x10/0x20 [ 78.447327] [ 78.514998] Allocated by task 349: [ 78.518385] kasan_save_stack+0x3c/0x68 [ 78.522203] kasan_save_track+0x20/0x40 [ 78.526023] kasan_save_alloc_info+0x40/0x58 [ 78.530276] __kasan_kmalloc+0xd4/0xd8 [ 78.534009] __kmalloc_cache_noprof+0x16c/0x3c0 [ 78.538522] kasan_atomics+0xb8/0x2e0 [ 78.542168] kunit_try_run_case+0x170/0x3f0 [ 78.546335] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 78.551805] kthread+0x328/0x630 [ 78.555017] ret_from_fork+0x10/0x20 [ 78.558574] [ 78.560049] The buggy address belongs to the object at ffff000808448180 [ 78.560049] which belongs to the cache kmalloc-64 of size 64 [ 78.572376] The buggy address is located 0 bytes to the right of [ 78.572376] allocated 48-byte region [ffff000808448180, ffff0008084481b0) [ 78.585223] [ 78.586699] The buggy address belongs to the physical page: [ 78.592256] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888448 [ 78.600241] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 78.606751] page_type: f5(slab) [ 78.609885] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 78.617607] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 78.625327] page dumped because: kasan: bad access detected [ 78.630882] [ 78.632358] Memory state around the buggy address: [ 78.637136] ffff000808448080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 78.644340] ffff000808448100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 78.651545] >ffff000808448180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 78.658746] ^ [ 78.663524] ffff000808448200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.670729] ffff000808448280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.677930] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 61.488137] ================================================================== [ 61.495203] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 61.504143] Write of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345 [ 61.511521] [ 61.513002] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 61.513047] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.513063] Hardware name: WinLink E850-96 board (DT) [ 61.513081] Call trace: [ 61.513092] show_stack+0x20/0x38 (C) [ 61.513123] dump_stack_lvl+0x8c/0xd0 [ 61.513157] print_report+0x118/0x5d0 [ 61.513186] kasan_report+0xdc/0x128 [ 61.513214] kasan_check_range+0x100/0x1a8 [ 61.513243] __kasan_check_write+0x20/0x30 [ 61.513272] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 61.513311] kasan_bitops_generic+0x11c/0x1c8 [ 61.513345] kunit_try_run_case+0x170/0x3f0 [ 61.513380] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.513412] kthread+0x328/0x630 [ 61.513439] ret_from_fork+0x10/0x20 [ 61.513469] [ 61.586693] Allocated by task 345: [ 61.590079] kasan_save_stack+0x3c/0x68 [ 61.593898] kasan_save_track+0x20/0x40 [ 61.597718] kasan_save_alloc_info+0x40/0x58 [ 61.601971] __kasan_kmalloc+0xd4/0xd8 [ 61.605703] __kmalloc_cache_noprof+0x16c/0x3c0 [ 61.610218] kasan_bitops_generic+0xa0/0x1c8 [ 61.614471] kunit_try_run_case+0x170/0x3f0 [ 61.618637] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.624106] kthread+0x328/0x630 [ 61.627318] ret_from_fork+0x10/0x20 [ 61.630877] [ 61.632352] The buggy address belongs to the object at ffff000806e5df40 [ 61.632352] which belongs to the cache kmalloc-16 of size 16 [ 61.644679] The buggy address is located 8 bytes inside of [ 61.644679] allocated 9-byte region [ffff000806e5df40, ffff000806e5df49) [ 61.656918] [ 61.658394] The buggy address belongs to the physical page: [ 61.663950] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d [ 61.671937] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.678446] page_type: f5(slab) [ 61.681578] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 61.689303] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 61.697022] page dumped because: kasan: bad access detected [ 61.702577] [ 61.704053] Memory state around the buggy address: [ 61.708831] ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 61.716035] ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 61.723240] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 61.730441] ^ [ 61.736000] ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.743205] ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 61.750406] ================================================================== [ 60.952383] ================================================================== [ 60.959447] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 60.968387] Write of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345 [ 60.975765] [ 60.977246] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 60.977294] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.977312] Hardware name: WinLink E850-96 board (DT) [ 60.977331] Call trace: [ 60.977345] show_stack+0x20/0x38 (C) [ 60.977376] dump_stack_lvl+0x8c/0xd0 [ 60.977407] print_report+0x118/0x5d0 [ 60.977436] kasan_report+0xdc/0x128 [ 60.977463] kasan_check_range+0x100/0x1a8 [ 60.977494] __kasan_check_write+0x20/0x30 [ 60.977525] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 60.977566] kasan_bitops_generic+0x11c/0x1c8 [ 60.977601] kunit_try_run_case+0x170/0x3f0 [ 60.977634] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.977668] kthread+0x328/0x630 [ 60.977695] ret_from_fork+0x10/0x20 [ 60.977727] [ 61.050937] Allocated by task 345: [ 61.054323] kasan_save_stack+0x3c/0x68 [ 61.058142] kasan_save_track+0x20/0x40 [ 61.061962] kasan_save_alloc_info+0x40/0x58 [ 61.066215] __kasan_kmalloc+0xd4/0xd8 [ 61.069948] __kmalloc_cache_noprof+0x16c/0x3c0 [ 61.074462] kasan_bitops_generic+0xa0/0x1c8 [ 61.078715] kunit_try_run_case+0x170/0x3f0 [ 61.082883] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.088350] kthread+0x328/0x630 [ 61.091562] ret_from_fork+0x10/0x20 [ 61.095121] [ 61.096596] The buggy address belongs to the object at ffff000806e5df40 [ 61.096596] which belongs to the cache kmalloc-16 of size 16 [ 61.108923] The buggy address is located 8 bytes inside of [ 61.108923] allocated 9-byte region [ffff000806e5df40, ffff000806e5df49) [ 61.121162] [ 61.122638] The buggy address belongs to the physical page: [ 61.128194] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d [ 61.136181] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.142690] page_type: f5(slab) [ 61.145822] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 61.153547] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 61.161266] page dumped because: kasan: bad access detected [ 61.166821] [ 61.168297] Memory state around the buggy address: [ 61.173075] ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 61.180280] ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 61.187484] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 61.194685] ^ [ 61.200244] ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.207449] ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 61.214650] ================================================================== [ 61.221995] ================================================================== [ 61.229061] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 61.238001] Read of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345 [ 61.245292] [ 61.246773] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 61.246820] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.246835] Hardware name: WinLink E850-96 board (DT) [ 61.246855] Call trace: [ 61.246867] show_stack+0x20/0x38 (C) [ 61.246898] dump_stack_lvl+0x8c/0xd0 [ 61.246930] print_report+0x118/0x5d0 [ 61.246958] kasan_report+0xdc/0x128 [ 61.246985] __asan_report_load8_noabort+0x20/0x30 [ 61.247018] kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 61.247057] kasan_bitops_generic+0x11c/0x1c8 [ 61.247093] kunit_try_run_case+0x170/0x3f0 [ 61.247127] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.247158] kthread+0x328/0x630 [ 61.247185] ret_from_fork+0x10/0x20 [ 61.247216] [ 61.317079] Allocated by task 345: [ 61.320465] kasan_save_stack+0x3c/0x68 [ 61.324284] kasan_save_track+0x20/0x40 [ 61.328105] kasan_save_alloc_info+0x40/0x58 [ 61.332357] __kasan_kmalloc+0xd4/0xd8 [ 61.336089] __kmalloc_cache_noprof+0x16c/0x3c0 [ 61.340605] kasan_bitops_generic+0xa0/0x1c8 [ 61.344857] kunit_try_run_case+0x170/0x3f0 [ 61.349024] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.354492] kthread+0x328/0x630 [ 61.357704] ret_from_fork+0x10/0x20 [ 61.361263] [ 61.362738] The buggy address belongs to the object at ffff000806e5df40 [ 61.362738] which belongs to the cache kmalloc-16 of size 16 [ 61.375065] The buggy address is located 8 bytes inside of [ 61.375065] allocated 9-byte region [ffff000806e5df40, ffff000806e5df49) [ 61.387304] [ 61.388780] The buggy address belongs to the physical page: [ 61.394336] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d [ 61.402321] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.408831] page_type: f5(slab) [ 61.411964] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 61.419689] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 61.427408] page dumped because: kasan: bad access detected [ 61.432963] [ 61.434438] Memory state around the buggy address: [ 61.439217] ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 61.446421] ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 61.453626] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 61.460827] ^ [ 61.466386] ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 61.473591] ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 61.480792] ================================================================== [ 62.023897] ================================================================== [ 62.030959] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 62.039898] Read of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345 [ 62.047190] [ 62.048671] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 62.048720] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.048737] Hardware name: WinLink E850-96 board (DT) [ 62.048755] Call trace: [ 62.048770] show_stack+0x20/0x38 (C) [ 62.048801] dump_stack_lvl+0x8c/0xd0 [ 62.048833] print_report+0x118/0x5d0 [ 62.048861] kasan_report+0xdc/0x128 [ 62.048891] __asan_report_load8_noabort+0x20/0x30 [ 62.048928] kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 62.048966] kasan_bitops_generic+0x11c/0x1c8 [ 62.049001] kunit_try_run_case+0x170/0x3f0 [ 62.049036] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.049070] kthread+0x328/0x630 [ 62.049099] ret_from_fork+0x10/0x20 [ 62.049129] [ 62.118977] Allocated by task 345: [ 62.122363] kasan_save_stack+0x3c/0x68 [ 62.126182] kasan_save_track+0x20/0x40 [ 62.130001] kasan_save_alloc_info+0x40/0x58 [ 62.134255] __kasan_kmalloc+0xd4/0xd8 [ 62.137987] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.142501] kasan_bitops_generic+0xa0/0x1c8 [ 62.146754] kunit_try_run_case+0x170/0x3f0 [ 62.150921] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.156390] kthread+0x328/0x630 [ 62.159601] ret_from_fork+0x10/0x20 [ 62.163160] [ 62.164636] The buggy address belongs to the object at ffff000806e5df40 [ 62.164636] which belongs to the cache kmalloc-16 of size 16 [ 62.176963] The buggy address is located 8 bytes inside of [ 62.176963] allocated 9-byte region [ffff000806e5df40, ffff000806e5df49) [ 62.189202] [ 62.190678] The buggy address belongs to the physical page: [ 62.196234] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d [ 62.204221] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.210729] page_type: f5(slab) [ 62.213862] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 62.221586] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 62.229305] page dumped because: kasan: bad access detected [ 62.234861] [ 62.236336] Memory state around the buggy address: [ 62.241114] ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 62.248319] ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 62.255524] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 62.262725] ^ [ 62.268284] ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.275489] ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 62.282690] ================================================================== [ 59.881018] ================================================================== [ 59.888109] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 59.896962] Write of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345 [ 59.904340] [ 59.905821] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 59.905869] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.905885] Hardware name: WinLink E850-96 board (DT) [ 59.905904] Call trace: [ 59.905918] show_stack+0x20/0x38 (C) [ 59.905951] dump_stack_lvl+0x8c/0xd0 [ 59.905980] print_report+0x118/0x5d0 [ 59.906009] kasan_report+0xdc/0x128 [ 59.906037] kasan_check_range+0x100/0x1a8 [ 59.906067] __kasan_check_write+0x20/0x30 [ 59.906098] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 59.906138] kasan_bitops_generic+0x11c/0x1c8 [ 59.906172] kunit_try_run_case+0x170/0x3f0 [ 59.906206] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.906239] kthread+0x328/0x630 [ 59.906267] ret_from_fork+0x10/0x20 [ 59.906299] [ 59.979426] Allocated by task 345: [ 59.982813] kasan_save_stack+0x3c/0x68 [ 59.986631] kasan_save_track+0x20/0x40 [ 59.990450] kasan_save_alloc_info+0x40/0x58 [ 59.994703] __kasan_kmalloc+0xd4/0xd8 [ 59.998436] __kmalloc_cache_noprof+0x16c/0x3c0 [ 60.002950] kasan_bitops_generic+0xa0/0x1c8 [ 60.007203] kunit_try_run_case+0x170/0x3f0 [ 60.011370] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.016838] kthread+0x328/0x630 [ 60.020050] ret_from_fork+0x10/0x20 [ 60.023609] [ 60.025085] The buggy address belongs to the object at ffff000806e5df40 [ 60.025085] which belongs to the cache kmalloc-16 of size 16 [ 60.037411] The buggy address is located 8 bytes inside of [ 60.037411] allocated 9-byte region [ffff000806e5df40, ffff000806e5df49) [ 60.049650] [ 60.051126] The buggy address belongs to the physical page: [ 60.056682] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d [ 60.064668] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.071178] page_type: f5(slab) [ 60.074311] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 60.082035] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 60.089754] page dumped because: kasan: bad access detected [ 60.095310] [ 60.096785] Memory state around the buggy address: [ 60.101563] ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 60.108768] ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 60.115973] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 60.123174] ^ [ 60.128733] ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.135938] ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 60.143139] ================================================================== [ 60.416623] ================================================================== [ 60.423692] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 60.432631] Write of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345 [ 60.440009] [ 60.441490] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 60.441537] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.441553] Hardware name: WinLink E850-96 board (DT) [ 60.441571] Call trace: [ 60.441583] show_stack+0x20/0x38 (C) [ 60.441617] dump_stack_lvl+0x8c/0xd0 [ 60.441647] print_report+0x118/0x5d0 [ 60.441674] kasan_report+0xdc/0x128 [ 60.441701] kasan_check_range+0x100/0x1a8 [ 60.441732] __kasan_check_write+0x20/0x30 [ 60.441761] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 60.441800] kasan_bitops_generic+0x11c/0x1c8 [ 60.441832] kunit_try_run_case+0x170/0x3f0 [ 60.441864] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.441899] kthread+0x328/0x630 [ 60.441925] ret_from_fork+0x10/0x20 [ 60.441956] [ 60.515181] Allocated by task 345: [ 60.518569] kasan_save_stack+0x3c/0x68 [ 60.522387] kasan_save_track+0x20/0x40 [ 60.526206] kasan_save_alloc_info+0x40/0x58 [ 60.530459] __kasan_kmalloc+0xd4/0xd8 [ 60.534192] __kmalloc_cache_noprof+0x16c/0x3c0 [ 60.538706] kasan_bitops_generic+0xa0/0x1c8 [ 60.542959] kunit_try_run_case+0x170/0x3f0 [ 60.547125] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.552594] kthread+0x328/0x630 [ 60.555806] ret_from_fork+0x10/0x20 [ 60.559365] [ 60.560841] The buggy address belongs to the object at ffff000806e5df40 [ 60.560841] which belongs to the cache kmalloc-16 of size 16 [ 60.573167] The buggy address is located 8 bytes inside of [ 60.573167] allocated 9-byte region [ffff000806e5df40, ffff000806e5df49) [ 60.585406] [ 60.586882] The buggy address belongs to the physical page: [ 60.592438] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d [ 60.600424] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.606934] page_type: f5(slab) [ 60.610066] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 60.617791] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 60.625510] page dumped because: kasan: bad access detected [ 60.631065] [ 60.632541] Memory state around the buggy address: [ 60.637319] ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 60.644524] ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 60.651728] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 60.658930] ^ [ 60.664489] ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.671693] ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 60.678894] ================================================================== [ 61.757777] ================================================================== [ 61.764817] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 61.773757] Read of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345 [ 61.781048] [ 61.782529] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 61.782578] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.782594] Hardware name: WinLink E850-96 board (DT) [ 61.782613] Call trace: [ 61.782628] show_stack+0x20/0x38 (C) [ 61.782661] dump_stack_lvl+0x8c/0xd0 [ 61.782694] print_report+0x118/0x5d0 [ 61.782721] kasan_report+0xdc/0x128 [ 61.782748] __asan_report_load8_noabort+0x20/0x30 [ 61.782782] kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 61.782822] kasan_bitops_generic+0x11c/0x1c8 [ 61.782857] kunit_try_run_case+0x170/0x3f0 [ 61.782892] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.782923] kthread+0x328/0x630 [ 61.782951] ret_from_fork+0x10/0x20 [ 61.782983] [ 61.852835] Allocated by task 345: [ 61.856221] kasan_save_stack+0x3c/0x68 [ 61.860040] kasan_save_track+0x20/0x40 [ 61.863860] kasan_save_alloc_info+0x40/0x58 [ 61.868113] __kasan_kmalloc+0xd4/0xd8 [ 61.871846] __kmalloc_cache_noprof+0x16c/0x3c0 [ 61.876359] kasan_bitops_generic+0xa0/0x1c8 [ 61.880612] kunit_try_run_case+0x170/0x3f0 [ 61.884779] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.890248] kthread+0x328/0x630 [ 61.893460] ret_from_fork+0x10/0x20 [ 61.897018] [ 61.898494] The buggy address belongs to the object at ffff000806e5df40 [ 61.898494] which belongs to the cache kmalloc-16 of size 16 [ 61.910821] The buggy address is located 8 bytes inside of [ 61.910821] allocated 9-byte region [ffff000806e5df40, ffff000806e5df49) [ 61.923060] [ 61.924536] The buggy address belongs to the physical page: [ 61.930091] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d [ 61.938078] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.944587] page_type: f5(slab) [ 61.947720] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 61.955445] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 61.963163] page dumped because: kasan: bad access detected [ 61.968719] [ 61.970194] Memory state around the buggy address: [ 61.974972] ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 61.982177] ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 61.989382] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 61.996583] ^ [ 62.002142] ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 62.009347] ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 62.016550] ================================================================== [ 60.150511] ================================================================== [ 60.157549] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 60.166489] Read of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345 [ 60.173780] [ 60.175262] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 60.175312] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.175327] Hardware name: WinLink E850-96 board (DT) [ 60.175347] Call trace: [ 60.175361] show_stack+0x20/0x38 (C) [ 60.175393] dump_stack_lvl+0x8c/0xd0 [ 60.175425] print_report+0x118/0x5d0 [ 60.175455] kasan_report+0xdc/0x128 [ 60.175482] __asan_report_load8_noabort+0x20/0x30 [ 60.175516] kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 60.175554] kasan_bitops_generic+0x11c/0x1c8 [ 60.175587] kunit_try_run_case+0x170/0x3f0 [ 60.175624] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.175657] kthread+0x328/0x630 [ 60.175686] ret_from_fork+0x10/0x20 [ 60.175717] [ 60.245568] Allocated by task 345: [ 60.248955] kasan_save_stack+0x3c/0x68 [ 60.252772] kasan_save_track+0x20/0x40 [ 60.256592] kasan_save_alloc_info+0x40/0x58 [ 60.260845] __kasan_kmalloc+0xd4/0xd8 [ 60.264578] __kmalloc_cache_noprof+0x16c/0x3c0 [ 60.269092] kasan_bitops_generic+0xa0/0x1c8 [ 60.273345] kunit_try_run_case+0x170/0x3f0 [ 60.277512] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.282980] kthread+0x328/0x630 [ 60.286192] ret_from_fork+0x10/0x20 [ 60.289751] [ 60.291227] The buggy address belongs to the object at ffff000806e5df40 [ 60.291227] which belongs to the cache kmalloc-16 of size 16 [ 60.303555] The buggy address is located 8 bytes inside of [ 60.303555] allocated 9-byte region [ffff000806e5df40, ffff000806e5df49) [ 60.315792] [ 60.317268] The buggy address belongs to the physical page: [ 60.322824] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d [ 60.330809] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.337320] page_type: f5(slab) [ 60.340452] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 60.348177] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 60.355896] page dumped because: kasan: bad access detected [ 60.361451] [ 60.362927] Memory state around the buggy address: [ 60.367705] ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 60.374910] ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 60.382114] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 60.389316] ^ [ 60.394875] ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.402079] ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 60.409281] ================================================================== [ 60.686267] ================================================================== [ 60.693306] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 60.702245] Read of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345 [ 60.709536] [ 60.711017] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 60.711067] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.711085] Hardware name: WinLink E850-96 board (DT) [ 60.711104] Call trace: [ 60.711116] show_stack+0x20/0x38 (C) [ 60.711149] dump_stack_lvl+0x8c/0xd0 [ 60.711180] print_report+0x118/0x5d0 [ 60.711209] kasan_report+0xdc/0x128 [ 60.711235] __asan_report_load8_noabort+0x20/0x30 [ 60.711269] kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 60.711309] kasan_bitops_generic+0x11c/0x1c8 [ 60.711341] kunit_try_run_case+0x170/0x3f0 [ 60.711377] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.711409] kthread+0x328/0x630 [ 60.711436] ret_from_fork+0x10/0x20 [ 60.711469] [ 60.781323] Allocated by task 345: [ 60.784709] kasan_save_stack+0x3c/0x68 [ 60.788530] kasan_save_track+0x20/0x40 [ 60.792348] kasan_save_alloc_info+0x40/0x58 [ 60.796601] __kasan_kmalloc+0xd4/0xd8 [ 60.800334] __kmalloc_cache_noprof+0x16c/0x3c0 [ 60.804847] kasan_bitops_generic+0xa0/0x1c8 [ 60.809101] kunit_try_run_case+0x170/0x3f0 [ 60.813268] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.818736] kthread+0x328/0x630 [ 60.821948] ret_from_fork+0x10/0x20 [ 60.825507] [ 60.826982] The buggy address belongs to the object at ffff000806e5df40 [ 60.826982] which belongs to the cache kmalloc-16 of size 16 [ 60.839309] The buggy address is located 8 bytes inside of [ 60.839309] allocated 9-byte region [ffff000806e5df40, ffff000806e5df49) [ 60.851548] [ 60.853024] The buggy address belongs to the physical page: [ 60.858581] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d [ 60.866567] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.873076] page_type: f5(slab) [ 60.876208] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 60.883933] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 60.891652] page dumped because: kasan: bad access detected [ 60.897207] [ 60.898683] Memory state around the buggy address: [ 60.903461] ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 60.910665] ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 60.917870] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 60.925071] ^ [ 60.930630] ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 60.937835] ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 60.945036] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[ 59.616494] ================================================================== [ 59.623530] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 59.631688] Read of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345 [ 59.638979] [ 59.640461] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 59.640508] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.640524] Hardware name: WinLink E850-96 board (DT) [ 59.640544] Call trace: [ 59.640556] show_stack+0x20/0x38 (C) [ 59.640591] dump_stack_lvl+0x8c/0xd0 [ 59.640623] print_report+0x118/0x5d0 [ 59.640652] kasan_report+0xdc/0x128 [ 59.640681] __asan_report_load8_noabort+0x20/0x30 [ 59.640713] kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 59.640750] kasan_bitops_generic+0x110/0x1c8 [ 59.640786] kunit_try_run_case+0x170/0x3f0 [ 59.640820] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.640853] kthread+0x328/0x630 [ 59.640881] ret_from_fork+0x10/0x20 [ 59.640911] [ 59.709985] Allocated by task 345: [ 59.713372] kasan_save_stack+0x3c/0x68 [ 59.717190] kasan_save_track+0x20/0x40 [ 59.721010] kasan_save_alloc_info+0x40/0x58 [ 59.725263] __kasan_kmalloc+0xd4/0xd8 [ 59.728996] __kmalloc_cache_noprof+0x16c/0x3c0 [ 59.733509] kasan_bitops_generic+0xa0/0x1c8 [ 59.737763] kunit_try_run_case+0x170/0x3f0 [ 59.741929] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.747398] kthread+0x328/0x630 [ 59.750610] ret_from_fork+0x10/0x20 [ 59.754169] [ 59.755644] The buggy address belongs to the object at ffff000806e5df40 [ 59.755644] which belongs to the cache kmalloc-16 of size 16 [ 59.767971] The buggy address is located 8 bytes inside of [ 59.767971] allocated 9-byte region [ffff000806e5df40, ffff000806e5df49) [ 59.780210] [ 59.781686] The buggy address belongs to the physical page: [ 59.787244] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d [ 59.795227] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.801737] page_type: f5(slab) [ 59.804870] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 59.812595] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 59.820314] page dumped because: kasan: bad access detected [ 59.825869] [ 59.827345] Memory state around the buggy address: [ 59.832123] ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 59.839327] ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 59.846532] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 59.853733] ^ [ 59.859292] ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.866497] ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 59.873698] ================================================================== [ 59.348420] ================================================================== [ 59.355480] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 59.363637] Write of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345 [ 59.371015] [ 59.372495] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 59.372543] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.372561] Hardware name: WinLink E850-96 board (DT) [ 59.372580] Call trace: [ 59.372593] show_stack+0x20/0x38 (C) [ 59.372630] dump_stack_lvl+0x8c/0xd0 [ 59.372662] print_report+0x118/0x5d0 [ 59.372691] kasan_report+0xdc/0x128 [ 59.372720] kasan_check_range+0x100/0x1a8 [ 59.372749] __kasan_check_write+0x20/0x30 [ 59.372779] kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 59.372817] kasan_bitops_generic+0x110/0x1c8 [ 59.372852] kunit_try_run_case+0x170/0x3f0 [ 59.372885] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.372917] kthread+0x328/0x630 [ 59.372945] ret_from_fork+0x10/0x20 [ 59.372977] [ 59.445406] Allocated by task 345: [ 59.448793] kasan_save_stack+0x3c/0x68 [ 59.452611] kasan_save_track+0x20/0x40 [ 59.456430] kasan_save_alloc_info+0x40/0x58 [ 59.460684] __kasan_kmalloc+0xd4/0xd8 [ 59.464416] __kmalloc_cache_noprof+0x16c/0x3c0 [ 59.468930] kasan_bitops_generic+0xa0/0x1c8 [ 59.473183] kunit_try_run_case+0x170/0x3f0 [ 59.477350] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.482819] kthread+0x328/0x630 [ 59.486031] ret_from_fork+0x10/0x20 [ 59.489590] [ 59.491065] The buggy address belongs to the object at ffff000806e5df40 [ 59.491065] which belongs to the cache kmalloc-16 of size 16 [ 59.503392] The buggy address is located 8 bytes inside of [ 59.503392] allocated 9-byte region [ffff000806e5df40, ffff000806e5df49) [ 59.515631] [ 59.517106] The buggy address belongs to the physical page: [ 59.522663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d [ 59.530650] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.537158] page_type: f5(slab) [ 59.540291] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 59.548015] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 59.555735] page dumped because: kasan: bad access detected [ 59.561290] [ 59.562765] Memory state around the buggy address: [ 59.567543] ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 59.574748] ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 59.581953] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 59.589154] ^ [ 59.594713] ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.601918] ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 59.609119] ================================================================== [ 58.547673] ================================================================== [ 58.554796] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 58.562954] Write of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345 [ 58.570333] [ 58.571815] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 58.571861] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.571877] Hardware name: WinLink E850-96 board (DT) [ 58.571896] Call trace: [ 58.571912] show_stack+0x20/0x38 (C) [ 58.571945] dump_stack_lvl+0x8c/0xd0 [ 58.571979] print_report+0x118/0x5d0 [ 58.572007] kasan_report+0xdc/0x128 [ 58.572036] kasan_check_range+0x100/0x1a8 [ 58.572067] __kasan_check_write+0x20/0x30 [ 58.572097] kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 58.572133] kasan_bitops_generic+0x110/0x1c8 [ 58.572168] kunit_try_run_case+0x170/0x3f0 [ 58.572202] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.572234] kthread+0x328/0x630 [ 58.572264] ret_from_fork+0x10/0x20 [ 58.572295] [ 58.644724] Allocated by task 345: [ 58.648111] kasan_save_stack+0x3c/0x68 [ 58.651928] kasan_save_track+0x20/0x40 [ 58.655748] kasan_save_alloc_info+0x40/0x58 [ 58.660001] __kasan_kmalloc+0xd4/0xd8 [ 58.663734] __kmalloc_cache_noprof+0x16c/0x3c0 [ 58.668248] kasan_bitops_generic+0xa0/0x1c8 [ 58.672501] kunit_try_run_case+0x170/0x3f0 [ 58.676667] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.682136] kthread+0x328/0x630 [ 58.685348] ret_from_fork+0x10/0x20 [ 58.688907] [ 58.690383] The buggy address belongs to the object at ffff000806e5df40 [ 58.690383] which belongs to the cache kmalloc-16 of size 16 [ 58.702709] The buggy address is located 8 bytes inside of [ 58.702709] allocated 9-byte region [ffff000806e5df40, ffff000806e5df49) [ 58.714948] [ 58.716424] The buggy address belongs to the physical page: [ 58.721980] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d [ 58.729969] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.736476] page_type: f5(slab) [ 58.739609] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 58.747333] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 58.755052] page dumped because: kasan: bad access detected [ 58.760607] [ 58.762083] Memory state around the buggy address: [ 58.766861] ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 58.774066] ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 58.781270] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 58.788472] ^ [ 58.794030] ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.801236] ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 58.808437] ================================================================== [ 58.815737] ================================================================== [ 58.822848] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 58.831006] Read of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345 [ 58.838297] [ 58.839778] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 58.839829] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.839846] Hardware name: WinLink E850-96 board (DT) [ 58.839867] Call trace: [ 58.839880] show_stack+0x20/0x38 (C) [ 58.839915] dump_stack_lvl+0x8c/0xd0 [ 58.839947] print_report+0x118/0x5d0 [ 58.839973] kasan_report+0xdc/0x128 [ 58.840000] __asan_report_load8_noabort+0x20/0x30 [ 58.840035] kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 58.840074] kasan_bitops_generic+0x110/0x1c8 [ 58.840109] kunit_try_run_case+0x170/0x3f0 [ 58.840141] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.840175] kthread+0x328/0x630 [ 58.840204] ret_from_fork+0x10/0x20 [ 58.840238] [ 58.909303] Allocated by task 345: [ 58.912690] kasan_save_stack+0x3c/0x68 [ 58.916508] kasan_save_track+0x20/0x40 [ 58.920327] kasan_save_alloc_info+0x40/0x58 [ 58.924581] __kasan_kmalloc+0xd4/0xd8 [ 58.928313] __kmalloc_cache_noprof+0x16c/0x3c0 [ 58.932827] kasan_bitops_generic+0xa0/0x1c8 [ 58.937080] kunit_try_run_case+0x170/0x3f0 [ 58.941247] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.946716] kthread+0x328/0x630 [ 58.949927] ret_from_fork+0x10/0x20 [ 58.953487] [ 58.954962] The buggy address belongs to the object at ffff000806e5df40 [ 58.954962] which belongs to the cache kmalloc-16 of size 16 [ 58.967289] The buggy address is located 8 bytes inside of [ 58.967289] allocated 9-byte region [ffff000806e5df40, ffff000806e5df49) [ 58.979528] [ 58.981004] The buggy address belongs to the physical page: [ 58.986560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d [ 58.994548] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.001055] page_type: f5(slab) [ 59.004188] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 59.011912] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 59.019631] page dumped because: kasan: bad access detected [ 59.025187] [ 59.026662] Memory state around the buggy address: [ 59.031441] ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 59.038645] ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 59.045850] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 59.053051] ^ [ 59.058610] ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.065815] ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 59.073016] ================================================================== [ 58.279634] ================================================================== [ 58.286746] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 58.294903] Write of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345 [ 58.302281] [ 58.303763] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 58.303816] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.303833] Hardware name: WinLink E850-96 board (DT) [ 58.303853] Call trace: [ 58.303865] show_stack+0x20/0x38 (C) [ 58.303900] dump_stack_lvl+0x8c/0xd0 [ 58.303933] print_report+0x118/0x5d0 [ 58.303961] kasan_report+0xdc/0x128 [ 58.303990] kasan_check_range+0x100/0x1a8 [ 58.304020] __kasan_check_write+0x20/0x30 [ 58.304051] kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 58.304089] kasan_bitops_generic+0x110/0x1c8 [ 58.304122] kunit_try_run_case+0x170/0x3f0 [ 58.304157] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.304191] kthread+0x328/0x630 [ 58.304220] ret_from_fork+0x10/0x20 [ 58.304251] [ 58.376673] Allocated by task 345: [ 58.380059] kasan_save_stack+0x3c/0x68 [ 58.383877] kasan_save_track+0x20/0x40 [ 58.387697] kasan_save_alloc_info+0x40/0x58 [ 58.391950] __kasan_kmalloc+0xd4/0xd8 [ 58.395682] __kmalloc_cache_noprof+0x16c/0x3c0 [ 58.400196] kasan_bitops_generic+0xa0/0x1c8 [ 58.404449] kunit_try_run_case+0x170/0x3f0 [ 58.408616] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.414085] kthread+0x328/0x630 [ 58.417297] ret_from_fork+0x10/0x20 [ 58.420856] [ 58.422331] The buggy address belongs to the object at ffff000806e5df40 [ 58.422331] which belongs to the cache kmalloc-16 of size 16 [ 58.434658] The buggy address is located 8 bytes inside of [ 58.434658] allocated 9-byte region [ffff000806e5df40, ffff000806e5df49) [ 58.446897] [ 58.448373] The buggy address belongs to the physical page: [ 58.453928] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d [ 58.461916] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.468424] page_type: f5(slab) [ 58.471559] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 58.479282] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 58.487000] page dumped because: kasan: bad access detected [ 58.492556] [ 58.494031] Memory state around the buggy address: [ 58.498810] ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 58.506014] ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 58.513219] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 58.520420] ^ [ 58.525979] ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.533184] ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 58.540385] ================================================================== [ 59.080421] ================================================================== [ 59.087427] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 59.095585] Write of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345 [ 59.102963] [ 59.104445] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 59.104493] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.104509] Hardware name: WinLink E850-96 board (DT) [ 59.104529] Call trace: [ 59.104543] show_stack+0x20/0x38 (C) [ 59.104577] dump_stack_lvl+0x8c/0xd0 [ 59.104612] print_report+0x118/0x5d0 [ 59.104641] kasan_report+0xdc/0x128 [ 59.104669] kasan_check_range+0x100/0x1a8 [ 59.104698] __kasan_check_write+0x20/0x30 [ 59.104729] kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 59.104766] kasan_bitops_generic+0x110/0x1c8 [ 59.104800] kunit_try_run_case+0x170/0x3f0 [ 59.104833] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.104866] kthread+0x328/0x630 [ 59.104895] ret_from_fork+0x10/0x20 [ 59.104928] [ 59.177355] Allocated by task 345: [ 59.180742] kasan_save_stack+0x3c/0x68 [ 59.184560] kasan_save_track+0x20/0x40 [ 59.188379] kasan_save_alloc_info+0x40/0x58 [ 59.192632] __kasan_kmalloc+0xd4/0xd8 [ 59.196365] __kmalloc_cache_noprof+0x16c/0x3c0 [ 59.200879] kasan_bitops_generic+0xa0/0x1c8 [ 59.205132] kunit_try_run_case+0x170/0x3f0 [ 59.209298] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.214767] kthread+0x328/0x630 [ 59.217979] ret_from_fork+0x10/0x20 [ 59.221538] [ 59.223014] The buggy address belongs to the object at ffff000806e5df40 [ 59.223014] which belongs to the cache kmalloc-16 of size 16 [ 59.235340] The buggy address is located 8 bytes inside of [ 59.235340] allocated 9-byte region [ffff000806e5df40, ffff000806e5df49) [ 59.247579] [ 59.249056] The buggy address belongs to the physical page: [ 59.254611] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d [ 59.262598] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.269107] page_type: f5(slab) [ 59.272240] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 59.279964] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 59.287683] page dumped because: kasan: bad access detected [ 59.293238] [ 59.294714] Memory state around the buggy address: [ 59.299492] ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 59.306696] ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 59.313901] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 59.321103] ^ [ 59.326662] ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 59.333866] ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 59.341067] ================================================================== [ 57.482511] ================================================================== [ 57.489537] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 57.497692] Read of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345 [ 57.504984] [ 57.506470] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 57.506531] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.506550] Hardware name: WinLink E850-96 board (DT) [ 57.506571] Call trace: [ 57.506584] show_stack+0x20/0x38 (C) [ 57.506619] dump_stack_lvl+0x8c/0xd0 [ 57.506654] print_report+0x118/0x5d0 [ 57.506681] kasan_report+0xdc/0x128 [ 57.506708] __asan_report_load8_noabort+0x20/0x30 [ 57.506745] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 57.506783] kasan_bitops_generic+0x110/0x1c8 [ 57.506818] kunit_try_run_case+0x170/0x3f0 [ 57.506855] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.506889] kthread+0x328/0x630 [ 57.506920] ret_from_fork+0x10/0x20 [ 57.506954] [ 57.575991] Allocated by task 345: [ 57.579377] kasan_save_stack+0x3c/0x68 [ 57.583194] kasan_save_track+0x20/0x40 [ 57.587014] kasan_save_alloc_info+0x40/0x58 [ 57.591267] __kasan_kmalloc+0xd4/0xd8 [ 57.595000] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.599514] kasan_bitops_generic+0xa0/0x1c8 [ 57.603767] kunit_try_run_case+0x170/0x3f0 [ 57.607934] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.613402] kthread+0x328/0x630 [ 57.616614] ret_from_fork+0x10/0x20 [ 57.620173] [ 57.621650] The buggy address belongs to the object at ffff000806e5df40 [ 57.621650] which belongs to the cache kmalloc-16 of size 16 [ 57.633975] The buggy address is located 8 bytes inside of [ 57.633975] allocated 9-byte region [ffff000806e5df40, ffff000806e5df49) [ 57.646214] [ 57.647693] The buggy address belongs to the physical page: [ 57.653248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d [ 57.661235] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.667742] page_type: f5(slab) [ 57.670878] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 57.678599] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 57.686318] page dumped because: kasan: bad access detected [ 57.691873] [ 57.693349] Memory state around the buggy address: [ 57.698127] ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 57.705332] ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 57.712538] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 57.719738] ^ [ 57.725297] ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.732503] ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 57.739703] ================================================================== [ 57.747013] ================================================================== [ 57.754113] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 57.762272] Write of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345 [ 57.769650] [ 57.771134] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 57.771190] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.771210] Hardware name: WinLink E850-96 board (DT) [ 57.771227] Call trace: [ 57.771241] show_stack+0x20/0x38 (C) [ 57.771275] dump_stack_lvl+0x8c/0xd0 [ 57.771310] print_report+0x118/0x5d0 [ 57.771340] kasan_report+0xdc/0x128 [ 57.771367] kasan_check_range+0x100/0x1a8 [ 57.771399] __kasan_check_write+0x20/0x30 [ 57.771431] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 57.771467] kasan_bitops_generic+0x110/0x1c8 [ 57.771502] kunit_try_run_case+0x170/0x3f0 [ 57.771538] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.771572] kthread+0x328/0x630 [ 57.771601] ret_from_fork+0x10/0x20 [ 57.771634] [ 57.844041] Allocated by task 345: [ 57.847428] kasan_save_stack+0x3c/0x68 [ 57.851246] kasan_save_track+0x20/0x40 [ 57.855066] kasan_save_alloc_info+0x40/0x58 [ 57.859319] __kasan_kmalloc+0xd4/0xd8 [ 57.863051] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.867565] kasan_bitops_generic+0xa0/0x1c8 [ 57.871819] kunit_try_run_case+0x170/0x3f0 [ 57.875985] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.881454] kthread+0x328/0x630 [ 57.884666] ret_from_fork+0x10/0x20 [ 57.888225] [ 57.889701] The buggy address belongs to the object at ffff000806e5df40 [ 57.889701] which belongs to the cache kmalloc-16 of size 16 [ 57.902027] The buggy address is located 8 bytes inside of [ 57.902027] allocated 9-byte region [ffff000806e5df40, ffff000806e5df49) [ 57.914266] [ 57.915743] The buggy address belongs to the physical page: [ 57.921299] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d [ 57.929286] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.935793] page_type: f5(slab) [ 57.938928] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 57.946651] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 57.954370] page dumped because: kasan: bad access detected [ 57.959925] [ 57.961401] Memory state around the buggy address: [ 57.966179] ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 57.973383] ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 57.980591] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 57.987789] ^ [ 57.993348] ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.000553] ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 58.007754] ================================================================== [ 58.015050] ================================================================== [ 58.022165] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 58.030323] Read of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345 [ 58.037614] [ 58.039098] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 58.039153] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.039172] Hardware name: WinLink E850-96 board (DT) [ 58.039191] Call trace: [ 58.039204] show_stack+0x20/0x38 (C) [ 58.039243] dump_stack_lvl+0x8c/0xd0 [ 58.039278] print_report+0x118/0x5d0 [ 58.039307] kasan_report+0xdc/0x128 [ 58.039334] __asan_report_load8_noabort+0x20/0x30 [ 58.039368] kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 58.039405] kasan_bitops_generic+0x110/0x1c8 [ 58.039440] kunit_try_run_case+0x170/0x3f0 [ 58.039475] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.039509] kthread+0x328/0x630 [ 58.039537] ret_from_fork+0x10/0x20 [ 58.039567] [ 58.108621] Allocated by task 345: [ 58.112007] kasan_save_stack+0x3c/0x68 [ 58.115825] kasan_save_track+0x20/0x40 [ 58.119645] kasan_save_alloc_info+0x40/0x58 [ 58.123898] __kasan_kmalloc+0xd4/0xd8 [ 58.127631] __kmalloc_cache_noprof+0x16c/0x3c0 [ 58.132145] kasan_bitops_generic+0xa0/0x1c8 [ 58.136398] kunit_try_run_case+0x170/0x3f0 [ 58.140565] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.146033] kthread+0x328/0x630 [ 58.149245] ret_from_fork+0x10/0x20 [ 58.152804] [ 58.154280] The buggy address belongs to the object at ffff000806e5df40 [ 58.154280] which belongs to the cache kmalloc-16 of size 16 [ 58.166606] The buggy address is located 8 bytes inside of [ 58.166606] allocated 9-byte region [ffff000806e5df40, ffff000806e5df49) [ 58.178845] [ 58.180321] The buggy address belongs to the physical page: [ 58.185879] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d [ 58.193865] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.200373] page_type: f5(slab) [ 58.203507] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 58.211230] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 58.218949] page dumped because: kasan: bad access detected [ 58.224504] [ 58.225980] Memory state around the buggy address: [ 58.230758] ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 58.237963] ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 58.245168] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 58.252368] ^ [ 58.257928] ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 58.265132] ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 58.272334] ================================================================== [ 57.211887] ================================================================== [ 57.221485] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 57.229642] Write of size 8 at addr ffff000806e5df48 by task kunit_try_catch/345 [ 57.237019] [ 57.238507] CPU: 4 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 57.238566] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.238586] Hardware name: WinLink E850-96 board (DT) [ 57.238609] Call trace: [ 57.238624] show_stack+0x20/0x38 (C) [ 57.238664] dump_stack_lvl+0x8c/0xd0 [ 57.238698] print_report+0x118/0x5d0 [ 57.238729] kasan_report+0xdc/0x128 [ 57.238757] kasan_check_range+0x100/0x1a8 [ 57.238791] __kasan_check_write+0x20/0x30 [ 57.238822] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 57.238858] kasan_bitops_generic+0x110/0x1c8 [ 57.238894] kunit_try_run_case+0x170/0x3f0 [ 57.238935] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.238970] kthread+0x328/0x630 [ 57.239001] ret_from_fork+0x10/0x20 [ 57.239037] [ 57.311412] Allocated by task 345: [ 57.314799] kasan_save_stack+0x3c/0x68 [ 57.318615] kasan_save_track+0x20/0x40 [ 57.322435] kasan_save_alloc_info+0x40/0x58 [ 57.326688] __kasan_kmalloc+0xd4/0xd8 [ 57.330422] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.334935] kasan_bitops_generic+0xa0/0x1c8 [ 57.339188] kunit_try_run_case+0x170/0x3f0 [ 57.343354] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.348823] kthread+0x328/0x630 [ 57.352035] ret_from_fork+0x10/0x20 [ 57.355594] [ 57.357072] The buggy address belongs to the object at ffff000806e5df40 [ 57.357072] which belongs to the cache kmalloc-16 of size 16 [ 57.369399] The buggy address is located 8 bytes inside of [ 57.369399] allocated 9-byte region [ffff000806e5df40, ffff000806e5df49) [ 57.381635] [ 57.383114] The buggy address belongs to the physical page: [ 57.388671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886e5d [ 57.396655] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.403164] page_type: f5(slab) [ 57.406300] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 57.414020] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 57.421740] page dumped because: kasan: bad access detected [ 57.427294] [ 57.428769] Memory state around the buggy address: [ 57.433551] ffff000806e5de00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 57.440753] ffff000806e5de80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 57.447959] >ffff000806e5df00: fa fb fc fc fa fb fc fc 00 01 fc fc fc fc fc fc [ 57.455158] ^ [ 57.460718] ffff000806e5df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.467923] ffff000806e5e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 57.475124] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strnlen
[ 56.910296] ================================================================== [ 56.917322] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88 [ 56.923309] Read of size 1 at addr ffff000808564890 by task kunit_try_catch/343 [ 56.930600] [ 56.932085] CPU: 2 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 56.932139] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.932156] Hardware name: WinLink E850-96 board (DT) [ 56.932178] Call trace: [ 56.932193] show_stack+0x20/0x38 (C) [ 56.932225] dump_stack_lvl+0x8c/0xd0 [ 56.932257] print_report+0x118/0x5d0 [ 56.932286] kasan_report+0xdc/0x128 [ 56.932314] __asan_report_load1_noabort+0x20/0x30 [ 56.932351] strnlen+0x80/0x88 [ 56.932384] kasan_strings+0x478/0xb00 [ 56.932416] kunit_try_run_case+0x170/0x3f0 [ 56.932452] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.932487] kthread+0x328/0x630 [ 56.932518] ret_from_fork+0x10/0x20 [ 56.932552] [ 56.998741] Allocated by task 343: [ 57.002128] kasan_save_stack+0x3c/0x68 [ 57.005946] kasan_save_track+0x20/0x40 [ 57.009766] kasan_save_alloc_info+0x40/0x58 [ 57.014019] __kasan_kmalloc+0xd4/0xd8 [ 57.017752] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.022265] kasan_strings+0xc8/0xb00 [ 57.025911] kunit_try_run_case+0x170/0x3f0 [ 57.030079] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.035547] kthread+0x328/0x630 [ 57.038758] ret_from_fork+0x10/0x20 [ 57.042317] [ 57.043793] Freed by task 343: [ 57.046831] kasan_save_stack+0x3c/0x68 [ 57.050650] kasan_save_track+0x20/0x40 [ 57.054469] kasan_save_free_info+0x4c/0x78 [ 57.058636] __kasan_slab_free+0x6c/0x98 [ 57.062543] kfree+0x214/0x3c8 [ 57.065581] kasan_strings+0x24c/0xb00 [ 57.069313] kunit_try_run_case+0x170/0x3f0 [ 57.073480] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.078948] kthread+0x328/0x630 [ 57.082160] ret_from_fork+0x10/0x20 [ 57.085719] [ 57.087195] The buggy address belongs to the object at ffff000808564880 [ 57.087195] which belongs to the cache kmalloc-32 of size 32 [ 57.099522] The buggy address is located 16 bytes inside of [ 57.099522] freed 32-byte region [ffff000808564880, ffff0008085648a0) [ 57.111587] [ 57.113065] The buggy address belongs to the physical page: [ 57.118620] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888564 [ 57.126605] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.133114] page_type: f5(slab) [ 57.136249] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 57.143971] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 57.151692] page dumped because: kasan: bad access detected [ 57.157246] [ 57.158721] Memory state around the buggy address: [ 57.163500] ffff000808564780: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 57.170704] ffff000808564800: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 57.177909] >ffff000808564880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 57.185110] ^ [ 57.188846] ffff000808564900: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 57.196051] ffff000808564980: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 57.203252] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[ 55.468662] ================================================================== [ 55.478454] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340 [ 55.486009] Read of size 1 at addr ffff800089637b4a by task kunit_try_catch/337 [ 55.493296] [ 55.494781] CPU: 4 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 55.494835] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.494853] Hardware name: WinLink E850-96 board (DT) [ 55.494876] Call trace: [ 55.494890] show_stack+0x20/0x38 (C) [ 55.494926] dump_stack_lvl+0x8c/0xd0 [ 55.494960] print_report+0x310/0x5d0 [ 55.494990] kasan_report+0xdc/0x128 [ 55.495016] __asan_report_load1_noabort+0x20/0x30 [ 55.495048] kasan_alloca_oob_right+0x2dc/0x340 [ 55.495081] kunit_try_run_case+0x170/0x3f0 [ 55.495119] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.495150] kthread+0x328/0x630 [ 55.495181] ret_from_fork+0x10/0x20 [ 55.495215] [ 55.559182] The buggy address belongs to stack of task kunit_try_catch/337 [ 55.566060] [ 55.567513] The buggy address ffff800089637b4a belongs to a vmalloc virtual mapping [ 55.575156] The buggy address belongs to the physical page: [ 55.580711] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8847b2 [ 55.588696] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.595215] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 55.602936] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 55.610656] page dumped because: kasan: bad access detected [ 55.616209] [ 55.617686] Memory state around the buggy address: [ 55.622467] ffff800089637a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 55.629668] ffff800089637a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 55.636875] >ffff800089637b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 55.644074] ^ [ 55.649633] ffff800089637b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 55.656839] ffff800089637c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 55.664040] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strlen
[ 56.610076] ================================================================== [ 56.617151] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0 [ 56.623053] Read of size 1 at addr ffff000808564890 by task kunit_try_catch/343 [ 56.630344] [ 56.631829] CPU: 2 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 56.631879] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.631899] Hardware name: WinLink E850-96 board (DT) [ 56.631919] Call trace: [ 56.631933] show_stack+0x20/0x38 (C) [ 56.631970] dump_stack_lvl+0x8c/0xd0 [ 56.632001] print_report+0x118/0x5d0 [ 56.632032] kasan_report+0xdc/0x128 [ 56.632060] __asan_report_load1_noabort+0x20/0x30 [ 56.632095] strlen+0xa8/0xb0 [ 56.632127] kasan_strings+0x418/0xb00 [ 56.632159] kunit_try_run_case+0x170/0x3f0 [ 56.632197] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.632230] kthread+0x328/0x630 [ 56.632261] ret_from_fork+0x10/0x20 [ 56.632296] [ 56.698400] Allocated by task 343: [ 56.701786] kasan_save_stack+0x3c/0x68 [ 56.705602] kasan_save_track+0x20/0x40 [ 56.709423] kasan_save_alloc_info+0x40/0x58 [ 56.713676] __kasan_kmalloc+0xd4/0xd8 [ 56.717409] __kmalloc_cache_noprof+0x16c/0x3c0 [ 56.721923] kasan_strings+0xc8/0xb00 [ 56.725569] kunit_try_run_case+0x170/0x3f0 [ 56.729735] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.735204] kthread+0x328/0x630 [ 56.738416] ret_from_fork+0x10/0x20 [ 56.741974] [ 56.743450] Freed by task 343: [ 56.746488] kasan_save_stack+0x3c/0x68 [ 56.750308] kasan_save_track+0x20/0x40 [ 56.754127] kasan_save_free_info+0x4c/0x78 [ 56.758294] __kasan_slab_free+0x6c/0x98 [ 56.762200] kfree+0x214/0x3c8 [ 56.765238] kasan_strings+0x24c/0xb00 [ 56.768971] kunit_try_run_case+0x170/0x3f0 [ 56.773137] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.778606] kthread+0x328/0x630 [ 56.781818] ret_from_fork+0x10/0x20 [ 56.785377] [ 56.786852] The buggy address belongs to the object at ffff000808564880 [ 56.786852] which belongs to the cache kmalloc-32 of size 32 [ 56.799182] The buggy address is located 16 bytes inside of [ 56.799182] freed 32-byte region [ffff000808564880, ffff0008085648a0) [ 56.811244] [ 56.812723] The buggy address belongs to the physical page: [ 56.818278] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888564 [ 56.826263] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.832772] page_type: f5(slab) [ 56.835907] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 56.843629] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 56.851348] page dumped because: kasan: bad access detected [ 56.856903] [ 56.858378] Memory state around the buggy address: [ 56.863160] ffff000808564780: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 56.870362] ffff000808564800: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 56.877566] >ffff000808564880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 56.884767] ^ [ 56.888504] ffff000808564900: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 56.895708] ffff000808564980: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 56.902910] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[ 56.312095] ================================================================== [ 56.319154] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00 [ 56.325837] Read of size 1 at addr ffff000808564890 by task kunit_try_catch/343 [ 56.333128] [ 56.334612] CPU: 2 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 56.334667] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.334686] Hardware name: WinLink E850-96 board (DT) [ 56.334707] Call trace: [ 56.334720] show_stack+0x20/0x38 (C) [ 56.334755] dump_stack_lvl+0x8c/0xd0 [ 56.334789] print_report+0x118/0x5d0 [ 56.334817] kasan_report+0xdc/0x128 [ 56.334844] __asan_report_load1_noabort+0x20/0x30 [ 56.334879] kasan_strings+0x95c/0xb00 [ 56.334913] kunit_try_run_case+0x170/0x3f0 [ 56.334951] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.334983] kthread+0x328/0x630 [ 56.335013] ret_from_fork+0x10/0x20 [ 56.335050] [ 56.398229] Allocated by task 343: [ 56.401616] kasan_save_stack+0x3c/0x68 [ 56.405435] kasan_save_track+0x20/0x40 [ 56.409254] kasan_save_alloc_info+0x40/0x58 [ 56.413507] __kasan_kmalloc+0xd4/0xd8 [ 56.417240] __kmalloc_cache_noprof+0x16c/0x3c0 [ 56.421754] kasan_strings+0xc8/0xb00 [ 56.425399] kunit_try_run_case+0x170/0x3f0 [ 56.429566] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.435035] kthread+0x328/0x630 [ 56.438246] ret_from_fork+0x10/0x20 [ 56.441806] [ 56.443281] Freed by task 343: [ 56.446321] kasan_save_stack+0x3c/0x68 [ 56.450139] kasan_save_track+0x20/0x40 [ 56.453958] kasan_save_free_info+0x4c/0x78 [ 56.458125] __kasan_slab_free+0x6c/0x98 [ 56.462031] kfree+0x214/0x3c8 [ 56.465069] kasan_strings+0x24c/0xb00 [ 56.468802] kunit_try_run_case+0x170/0x3f0 [ 56.472968] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.478437] kthread+0x328/0x630 [ 56.481648] ret_from_fork+0x10/0x20 [ 56.485207] [ 56.486684] The buggy address belongs to the object at ffff000808564880 [ 56.486684] which belongs to the cache kmalloc-32 of size 32 [ 56.499011] The buggy address is located 16 bytes inside of [ 56.499011] freed 32-byte region [ffff000808564880, ffff0008085648a0) [ 56.511075] [ 56.512553] The buggy address belongs to the physical page: [ 56.518109] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888564 [ 56.526094] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.532603] page_type: f5(slab) [ 56.535737] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 56.543460] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 56.551179] page dumped because: kasan: bad access detected [ 56.556734] [ 56.558210] Memory state around the buggy address: [ 56.562989] ffff000808564780: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 56.570193] ffff000808564800: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 56.577399] >ffff000808564880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 56.584598] ^ [ 56.588335] ffff000808564900: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 56.595539] ffff000808564980: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 56.602741] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp
[ 55.995299] ================================================================== [ 56.018987] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 [ 56.024885] Read of size 1 at addr ffff000808564890 by task kunit_try_catch/343 [ 56.032176] [ 56.033664] CPU: 2 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 56.033725] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.033744] Hardware name: WinLink E850-96 board (DT) [ 56.033766] Call trace: [ 56.033783] show_stack+0x20/0x38 (C) [ 56.033823] dump_stack_lvl+0x8c/0xd0 [ 56.033854] print_report+0x118/0x5d0 [ 56.033886] kasan_report+0xdc/0x128 [ 56.033913] __asan_report_load1_noabort+0x20/0x30 [ 56.033951] strcmp+0xc0/0xc8 [ 56.033984] kasan_strings+0x340/0xb00 [ 56.034019] kunit_try_run_case+0x170/0x3f0 [ 56.034058] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.034093] kthread+0x328/0x630 [ 56.034124] ret_from_fork+0x10/0x20 [ 56.034162] [ 56.100232] Allocated by task 343: [ 56.103620] kasan_save_stack+0x3c/0x68 [ 56.107435] kasan_save_track+0x20/0x40 [ 56.111255] kasan_save_alloc_info+0x40/0x58 [ 56.115508] __kasan_kmalloc+0xd4/0xd8 [ 56.119241] __kmalloc_cache_noprof+0x16c/0x3c0 [ 56.123754] kasan_strings+0xc8/0xb00 [ 56.127402] kunit_try_run_case+0x170/0x3f0 [ 56.131567] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.137036] kthread+0x328/0x630 [ 56.140247] ret_from_fork+0x10/0x20 [ 56.143806] [ 56.145283] Freed by task 343: [ 56.148323] kasan_save_stack+0x3c/0x68 [ 56.152139] kasan_save_track+0x20/0x40 [ 56.155959] kasan_save_free_info+0x4c/0x78 [ 56.160126] __kasan_slab_free+0x6c/0x98 [ 56.164033] kfree+0x214/0x3c8 [ 56.167070] kasan_strings+0x24c/0xb00 [ 56.170803] kunit_try_run_case+0x170/0x3f0 [ 56.174969] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.180438] kthread+0x328/0x630 [ 56.183650] ret_from_fork+0x10/0x20 [ 56.187208] [ 56.188686] The buggy address belongs to the object at ffff000808564880 [ 56.188686] which belongs to the cache kmalloc-32 of size 32 [ 56.201012] The buggy address is located 16 bytes inside of [ 56.201012] freed 32-byte region [ffff000808564880, ffff0008085648a0) [ 56.213076] [ 56.214556] The buggy address belongs to the physical page: [ 56.220112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888564 [ 56.228097] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.234606] page_type: f5(slab) [ 56.237742] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 56.245461] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 56.253181] page dumped because: kasan: bad access detected [ 56.258735] [ 56.260212] Memory state around the buggy address: [ 56.264993] ffff000808564780: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 56.272194] ffff000808564800: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 56.279399] >ffff000808564880: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 56.286599] ^ [ 56.290335] ffff000808564900: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 56.297540] ffff000808564980: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 56.304742] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[ 55.693497] ================================================================== [ 55.703798] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 55.709787] Read of size 1 at addr ffff000805f39f58 by task kunit_try_catch/341 [ 55.717077] [ 55.718564] CPU: 7 UID: 0 PID: 341 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 55.718622] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.718643] Hardware name: WinLink E850-96 board (DT) [ 55.718664] Call trace: [ 55.718678] show_stack+0x20/0x38 (C) [ 55.718717] dump_stack_lvl+0x8c/0xd0 [ 55.718750] print_report+0x118/0x5d0 [ 55.718784] kasan_report+0xdc/0x128 [ 55.718814] __asan_report_load1_noabort+0x20/0x30 [ 55.718852] memcmp+0x198/0x1d8 [ 55.718886] kasan_memcmp+0x16c/0x300 [ 55.718919] kunit_try_run_case+0x170/0x3f0 [ 55.718962] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.718995] kthread+0x328/0x630 [ 55.719026] ret_from_fork+0x10/0x20 [ 55.719067] [ 55.785220] Allocated by task 341: [ 55.788605] kasan_save_stack+0x3c/0x68 [ 55.792422] kasan_save_track+0x20/0x40 [ 55.796242] kasan_save_alloc_info+0x40/0x58 [ 55.800495] __kasan_kmalloc+0xd4/0xd8 [ 55.804228] __kmalloc_cache_noprof+0x16c/0x3c0 [ 55.808742] kasan_memcmp+0xbc/0x300 [ 55.812301] kunit_try_run_case+0x170/0x3f0 [ 55.816467] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.821936] kthread+0x328/0x630 [ 55.825148] ret_from_fork+0x10/0x20 [ 55.828710] [ 55.830184] The buggy address belongs to the object at ffff000805f39f40 [ 55.830184] which belongs to the cache kmalloc-32 of size 32 [ 55.842512] The buggy address is located 0 bytes to the right of [ 55.842512] allocated 24-byte region [ffff000805f39f40, ffff000805f39f58) [ 55.855356] [ 55.856835] The buggy address belongs to the physical page: [ 55.862391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f39 [ 55.870377] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.876886] page_type: f5(slab) [ 55.880022] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 55.887741] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 55.895461] page dumped because: kasan: bad access detected [ 55.901015] [ 55.902492] Memory state around the buggy address: [ 55.907274] ffff000805f39e00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 55.914475] ffff000805f39e80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 55.921679] >ffff000805f39f00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 55.928880] ^ [ 55.934959] ffff000805f39f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.942165] ffff000805f3a000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 55.949366] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[ 55.264777] ================================================================== [ 55.273946] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 55.281407] Read of size 1 at addr ffff800089617b5f by task kunit_try_catch/335 [ 55.288698] [ 55.290185] CPU: 6 UID: 0 PID: 335 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 55.290241] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.290260] Hardware name: WinLink E850-96 board (DT) [ 55.290281] Call trace: [ 55.290295] show_stack+0x20/0x38 (C) [ 55.290337] dump_stack_lvl+0x8c/0xd0 [ 55.290372] print_report+0x310/0x5d0 [ 55.290401] kasan_report+0xdc/0x128 [ 55.290429] __asan_report_load1_noabort+0x20/0x30 [ 55.290462] kasan_alloca_oob_left+0x2b8/0x310 [ 55.290494] kunit_try_run_case+0x170/0x3f0 [ 55.290531] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.290566] kthread+0x328/0x630 [ 55.290597] ret_from_fork+0x10/0x20 [ 55.290635] [ 55.354496] The buggy address belongs to stack of task kunit_try_catch/335 [ 55.361377] [ 55.362829] The buggy address ffff800089617b5f belongs to a vmalloc virtual mapping [ 55.370471] The buggy address belongs to the physical page: [ 55.376027] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88479d [ 55.384012] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.390532] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 55.398252] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 55.405972] page dumped because: kasan: bad access detected [ 55.411525] [ 55.413001] Memory state around the buggy address: [ 55.417782] ffff800089617a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 55.424984] ffff800089617a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 55.432190] >ffff800089617b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 55.439390] ^ [ 55.445470] ffff800089617b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 55.452676] ffff800089617c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 55.459877] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 55.030935] ================================================================== [ 55.045304] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 55.052156] Read of size 1 at addr ffff8000895f7c2a by task kunit_try_catch/333 [ 55.059448] [ 55.060933] CPU: 3 UID: 0 PID: 333 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 55.060990] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.061008] Hardware name: WinLink E850-96 board (DT) [ 55.061032] Call trace: [ 55.061046] show_stack+0x20/0x38 (C) [ 55.061083] dump_stack_lvl+0x8c/0xd0 [ 55.061116] print_report+0x310/0x5d0 [ 55.061146] kasan_report+0xdc/0x128 [ 55.061173] __asan_report_load1_noabort+0x20/0x30 [ 55.061206] kasan_stack_oob+0x238/0x270 [ 55.061235] kunit_try_run_case+0x170/0x3f0 [ 55.061276] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.061308] kthread+0x328/0x630 [ 55.061337] ret_from_fork+0x10/0x20 [ 55.061370] [ 55.124727] The buggy address belongs to stack of task kunit_try_catch/333 [ 55.131583] and is located at offset 138 in frame: [ 55.136442] kasan_stack_oob+0x0/0x270 [ 55.140180] [ 55.141651] This frame has 4 objects: [ 55.145300] [48, 49) '__assertion' [ 55.145324] [64, 72) 'array' [ 55.148772] [96, 112) '__assertion' [ 55.151722] [128, 138) 'stack_array' [ 55.155279] [ 55.160401] The buggy address ffff8000895f7c2a belongs to a vmalloc virtual mapping [ 55.168042] The buggy address belongs to the physical page: [ 55.173600] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884788 [ 55.181584] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.188105] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 55.195823] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 55.203543] page dumped because: kasan: bad access detected [ 55.209098] [ 55.210574] Memory state around the buggy address: [ 55.215353] ffff8000895f7b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 55.222556] ffff8000895f7b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 55.229762] >ffff8000895f7c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 55.236962] ^ [ 55.241479] ffff8000895f7c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 [ 55.248684] ffff8000895f7d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 55.255887] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 54.819916] ================================================================== [ 54.830896] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 54.838444] Read of size 1 at addr ffff800087b4e6cd by task kunit_try_catch/329 [ 54.845735] [ 54.847222] CPU: 6 UID: 0 PID: 329 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 54.847275] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.847292] Hardware name: WinLink E850-96 board (DT) [ 54.847315] Call trace: [ 54.847327] show_stack+0x20/0x38 (C) [ 54.847362] dump_stack_lvl+0x8c/0xd0 [ 54.847397] print_report+0x310/0x5d0 [ 54.847429] kasan_report+0xdc/0x128 [ 54.847456] __asan_report_load1_noabort+0x20/0x30 [ 54.847490] kasan_global_oob_right+0x230/0x270 [ 54.847523] kunit_try_run_case+0x170/0x3f0 [ 54.847564] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.847597] kthread+0x328/0x630 [ 54.847625] ret_from_fork+0x10/0x20 [ 54.847661] [ 54.911620] The buggy address belongs to the variable: [ 54.916741] global_array+0xd/0x40 [ 54.920126] [ 54.921601] The buggy address ffff800087b4e6cd belongs to a vmalloc virtual mapping [ 54.929245] The buggy address belongs to the physical page: [ 54.934801] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x87b4e [ 54.942699] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 54.950001] raw: 03fffe0000002000 fffffdffc01ed388 fffffdffc01ed388 0000000000000000 [ 54.957720] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 54.965438] page dumped because: kasan: bad access detected [ 54.970994] [ 54.972469] Memory state around the buggy address: [ 54.977250] ffff800087b4e580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 54.984454] ffff800087b4e600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 54.991657] >ffff800087b4e680: 02 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 [ 54.998858] ^ [ 55.004417] ffff800087b4e700: 04 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 [ 55.011622] ffff800087b4e780: 01 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00 [ 55.018823] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 54.579969] ================================================================== [ 54.590099] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 54.598083] Free of addr ffff000808920001 by task kunit_try_catch/327 [ 54.604506] [ 54.605994] CPU: 4 UID: 0 PID: 327 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 54.606049] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.606067] Hardware name: WinLink E850-96 board (DT) [ 54.606089] Call trace: [ 54.606104] show_stack+0x20/0x38 (C) [ 54.606140] dump_stack_lvl+0x8c/0xd0 [ 54.606177] print_report+0x118/0x5d0 [ 54.606206] kasan_report_invalid_free+0xc0/0xe8 [ 54.606236] __kasan_mempool_poison_object+0xfc/0x150 [ 54.606277] mempool_free+0x28c/0x328 [ 54.606307] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 54.606346] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 54.606382] kunit_try_run_case+0x170/0x3f0 [ 54.606421] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.606453] kthread+0x328/0x630 [ 54.606483] ret_from_fork+0x10/0x20 [ 54.606519] [ 54.681940] The buggy address belongs to the physical page: [ 54.687497] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888920 [ 54.695479] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 54.703118] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 54.710062] page_type: f8(unknown) [ 54.713459] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 54.721177] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 54.728904] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 54.736716] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 54.744529] head: 0bfffe0000000002 fffffdffe0224801 00000000ffffffff 00000000ffffffff [ 54.752341] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 54.760148] page dumped because: kasan: bad access detected [ 54.765702] [ 54.767179] Memory state around the buggy address: [ 54.771959] ffff00080891ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 54.779160] ffff00080891ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 54.786365] >ffff000808920000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 54.793566] ^ [ 54.796781] ffff000808920080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 54.803986] ffff000808920100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 54.811189] ================================================================== [ 54.252759] ================================================================== [ 54.263283] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 54.271265] Free of addr ffff000801e0bd01 by task kunit_try_catch/325 [ 54.277688] [ 54.279175] CPU: 5 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 54.279231] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.279249] Hardware name: WinLink E850-96 board (DT) [ 54.279271] Call trace: [ 54.279284] show_stack+0x20/0x38 (C) [ 54.279320] dump_stack_lvl+0x8c/0xd0 [ 54.279352] print_report+0x118/0x5d0 [ 54.279379] kasan_report_invalid_free+0xc0/0xe8 [ 54.279410] check_slab_allocation+0xfc/0x108 [ 54.279446] __kasan_mempool_poison_object+0x78/0x150 [ 54.279487] mempool_free+0x28c/0x328 [ 54.279522] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 54.279559] mempool_kmalloc_invalid_free+0xc0/0x118 [ 54.279593] kunit_try_run_case+0x170/0x3f0 [ 54.279632] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.279666] kthread+0x328/0x630 [ 54.279697] ret_from_fork+0x10/0x20 [ 54.279731] [ 54.358939] Allocated by task 325: [ 54.362323] kasan_save_stack+0x3c/0x68 [ 54.366142] kasan_save_track+0x20/0x40 [ 54.369961] kasan_save_alloc_info+0x40/0x58 [ 54.374215] __kasan_mempool_unpoison_object+0x11c/0x180 [ 54.379511] remove_element+0x130/0x1f8 [ 54.383329] mempool_alloc_preallocated+0x58/0xc0 [ 54.388017] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 54.393572] mempool_kmalloc_invalid_free+0xc0/0x118 [ 54.398520] kunit_try_run_case+0x170/0x3f0 [ 54.402686] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.408155] kthread+0x328/0x630 [ 54.411367] ret_from_fork+0x10/0x20 [ 54.414926] [ 54.416403] The buggy address belongs to the object at ffff000801e0bd00 [ 54.416403] which belongs to the cache kmalloc-128 of size 128 [ 54.428904] The buggy address is located 1 bytes inside of [ 54.428904] 128-byte region [ffff000801e0bd00, ffff000801e0bd80) [ 54.440446] [ 54.441926] The buggy address belongs to the physical page: [ 54.447483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e0a [ 54.455466] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 54.463104] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 54.470048] page_type: f5(slab) [ 54.473184] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 54.480904] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.488630] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 54.496442] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 54.504254] head: 0bfffe0000000001 fffffdffe0078281 00000000ffffffff 00000000ffffffff [ 54.512067] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 54.519874] page dumped because: kasan: bad access detected [ 54.525428] [ 54.526904] Memory state around the buggy address: [ 54.531684] ffff000801e0bc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 54.538886] ffff000801e0bc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.546092] >ffff000801e0bd00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 54.553292] ^ [ 54.556507] ffff000801e0bd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.563712] ffff000801e0be00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 54.570913] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 53.443481] ================================================================== [ 53.453398] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 53.460514] Free of addr ffff000801e64400 by task kunit_try_catch/319 [ 53.466937] [ 53.468424] CPU: 6 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 53.468483] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.468502] Hardware name: WinLink E850-96 board (DT) [ 53.468523] Call trace: [ 53.468539] show_stack+0x20/0x38 (C) [ 53.468577] dump_stack_lvl+0x8c/0xd0 [ 53.468612] print_report+0x118/0x5d0 [ 53.468641] kasan_report_invalid_free+0xc0/0xe8 [ 53.468673] check_slab_allocation+0xd4/0x108 [ 53.468713] __kasan_mempool_poison_object+0x78/0x150 [ 53.468753] mempool_free+0x28c/0x328 [ 53.468785] mempool_double_free_helper+0x150/0x2e8 [ 53.468824] mempool_kmalloc_double_free+0xc0/0x118 [ 53.468858] kunit_try_run_case+0x170/0x3f0 [ 53.468897] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.468930] kthread+0x328/0x630 [ 53.468959] ret_from_fork+0x10/0x20 [ 53.468994] [ 53.547319] Allocated by task 319: [ 53.550707] kasan_save_stack+0x3c/0x68 [ 53.554522] kasan_save_track+0x20/0x40 [ 53.558341] kasan_save_alloc_info+0x40/0x58 [ 53.562595] __kasan_mempool_unpoison_object+0x11c/0x180 [ 53.567890] remove_element+0x130/0x1f8 [ 53.571709] mempool_alloc_preallocated+0x58/0xc0 [ 53.576398] mempool_double_free_helper+0x94/0x2e8 [ 53.581171] mempool_kmalloc_double_free+0xc0/0x118 [ 53.586032] kunit_try_run_case+0x170/0x3f0 [ 53.590199] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.595667] kthread+0x328/0x630 [ 53.598879] ret_from_fork+0x10/0x20 [ 53.602438] [ 53.603915] Freed by task 319: [ 53.606953] kasan_save_stack+0x3c/0x68 [ 53.610771] kasan_save_track+0x20/0x40 [ 53.614592] kasan_save_free_info+0x4c/0x78 [ 53.618757] __kasan_mempool_poison_object+0xc0/0x150 [ 53.623792] mempool_free+0x28c/0x328 [ 53.627438] mempool_double_free_helper+0x100/0x2e8 [ 53.632299] mempool_kmalloc_double_free+0xc0/0x118 [ 53.637160] kunit_try_run_case+0x170/0x3f0 [ 53.641326] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.646795] kthread+0x328/0x630 [ 53.650008] ret_from_fork+0x10/0x20 [ 53.653566] [ 53.655043] The buggy address belongs to the object at ffff000801e64400 [ 53.655043] which belongs to the cache kmalloc-128 of size 128 [ 53.667544] The buggy address is located 0 bytes inside of [ 53.667544] 128-byte region [ffff000801e64400, ffff000801e64480) [ 53.679086] [ 53.680566] The buggy address belongs to the physical page: [ 53.686123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e64 [ 53.694105] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 53.701746] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 53.708688] page_type: f5(slab) [ 53.711825] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 53.719544] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.727270] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 53.735081] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.742894] head: 0bfffe0000000001 fffffdffe0079901 00000000ffffffff 00000000ffffffff [ 53.750706] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 53.758514] page dumped because: kasan: bad access detected [ 53.764068] [ 53.765544] Memory state around the buggy address: [ 53.770326] ffff000801e64300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 53.777526] ffff000801e64380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.784732] >ffff000801e64400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 53.791932] ^ [ 53.795147] ffff000801e64480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.802352] ffff000801e64500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 53.809555] ================================================================== [ 54.056920] ================================================================== [ 54.067715] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 54.074827] Free of addr ffff000808920000 by task kunit_try_catch/323 [ 54.081252] [ 54.082738] CPU: 4 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 54.082794] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.082812] Hardware name: WinLink E850-96 board (DT) [ 54.082833] Call trace: [ 54.082846] show_stack+0x20/0x38 (C) [ 54.082880] dump_stack_lvl+0x8c/0xd0 [ 54.082914] print_report+0x118/0x5d0 [ 54.082942] kasan_report_invalid_free+0xc0/0xe8 [ 54.082973] __kasan_mempool_poison_pages+0xe0/0xe8 [ 54.083014] mempool_free+0x24c/0x328 [ 54.083047] mempool_double_free_helper+0x150/0x2e8 [ 54.083084] mempool_page_alloc_double_free+0xbc/0x118 [ 54.083124] kunit_try_run_case+0x170/0x3f0 [ 54.083160] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.083193] kthread+0x328/0x630 [ 54.083223] ret_from_fork+0x10/0x20 [ 54.083258] [ 54.157381] The buggy address belongs to the physical page: [ 54.162938] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888920 [ 54.170922] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.177443] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 54.185162] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 54.192881] page dumped because: kasan: bad access detected [ 54.198436] [ 54.199911] Memory state around the buggy address: [ 54.204692] ffff00080891ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 54.211895] ffff00080891ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 54.219100] >ffff000808920000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 54.226300] ^ [ 54.229515] ffff000808920080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 54.236720] ffff000808920100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 54.243923] ================================================================== [ 53.818641] ================================================================== [ 53.828653] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 53.835770] Free of addr ffff000805f94000 by task kunit_try_catch/321 [ 53.842194] [ 53.843678] CPU: 5 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 53.843730] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.843750] Hardware name: WinLink E850-96 board (DT) [ 53.843772] Call trace: [ 53.843785] show_stack+0x20/0x38 (C) [ 53.843821] dump_stack_lvl+0x8c/0xd0 [ 53.843854] print_report+0x118/0x5d0 [ 53.843882] kasan_report_invalid_free+0xc0/0xe8 [ 53.843913] __kasan_mempool_poison_object+0x14c/0x150 [ 53.843953] mempool_free+0x28c/0x328 [ 53.843985] mempool_double_free_helper+0x150/0x2e8 [ 53.844022] mempool_kmalloc_large_double_free+0xc0/0x118 [ 53.844059] kunit_try_run_case+0x170/0x3f0 [ 53.844100] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.844132] kthread+0x328/0x630 [ 53.844160] ret_from_fork+0x10/0x20 [ 53.844195] [ 53.918842] The buggy address belongs to the physical page: [ 53.924400] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f94 [ 53.932383] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 53.940022] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 53.946966] page_type: f8(unknown) [ 53.950363] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 53.958082] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 53.965810] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 53.973618] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 53.981433] head: 0bfffe0000000002 fffffdffe017e501 00000000ffffffff 00000000ffffffff [ 53.989245] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 53.997052] page dumped because: kasan: bad access detected [ 54.002605] [ 54.004081] Memory state around the buggy address: [ 54.008861] ffff000805f93f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 54.016064] ffff000805f93f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 54.023270] >ffff000805f94000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 54.030470] ^ [ 54.033685] ffff000805f94080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 54.040890] ffff000805f94100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 54.048093] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 52.698289] ================================================================== [ 52.707837] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 52.714519] Read of size 1 at addr ffff000805f94000 by task kunit_try_catch/313 [ 52.721809] [ 52.723297] CPU: 5 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 52.723351] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.723369] Hardware name: WinLink E850-96 board (DT) [ 52.723392] Call trace: [ 52.723406] show_stack+0x20/0x38 (C) [ 52.723444] dump_stack_lvl+0x8c/0xd0 [ 52.723478] print_report+0x118/0x5d0 [ 52.723508] kasan_report+0xdc/0x128 [ 52.723535] __asan_report_load1_noabort+0x20/0x30 [ 52.723569] mempool_uaf_helper+0x314/0x340 [ 52.723600] mempool_kmalloc_large_uaf+0xc4/0x120 [ 52.723635] kunit_try_run_case+0x170/0x3f0 [ 52.723675] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.723708] kthread+0x328/0x630 [ 52.723739] ret_from_fork+0x10/0x20 [ 52.723778] [ 52.792035] The buggy address belongs to the physical page: [ 52.797594] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885f94 [ 52.805577] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 52.813216] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 52.820159] page_type: f8(unknown) [ 52.823556] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 52.831276] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 52.839002] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 52.846813] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 52.854626] head: 0bfffe0000000002 fffffdffe017e501 00000000ffffffff 00000000ffffffff [ 52.862438] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 52.870246] page dumped because: kasan: bad access detected [ 52.875799] [ 52.877276] Memory state around the buggy address: [ 52.882054] ffff000805f93f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 52.889258] ffff000805f93f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 52.896464] >ffff000805f94000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 52.903664] ^ [ 52.906879] ffff000805f94080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 52.914084] ffff000805f94100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 52.921287] ================================================================== [ 53.268136] ================================================================== [ 53.268311] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 53.270933] Read of size 1 at addr ffff0008088e4000 by task kunit_try_catch/317 [ 53.278226] [ 53.279711] CPU: 7 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 53.279768] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.279785] Hardware name: WinLink E850-96 board (DT) [ 53.279807] Call trace: [ 53.279820] show_stack+0x20/0x38 (C) [ 53.279857] dump_stack_lvl+0x8c/0xd0 [ 53.279891] print_report+0x118/0x5d0 [ 53.279920] kasan_report+0xdc/0x128 [ 53.279949] __asan_report_load1_noabort+0x20/0x30 [ 53.279985] mempool_uaf_helper+0x314/0x340 [ 53.280020] mempool_page_alloc_uaf+0xc0/0x118 [ 53.280054] kunit_try_run_case+0x170/0x3f0 [ 53.280095] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.280128] kthread+0x328/0x630 [ 53.280158] ret_from_fork+0x10/0x20 [ 53.280193] [ 53.348192] The buggy address belongs to the physical page: [ 53.353749] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8888e4 [ 53.361733] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.368253] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 53.375972] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 53.383693] page dumped because: kasan: bad access detected [ 53.389247] [ 53.390724] Memory state around the buggy address: [ 53.395503] ffff0008088e3f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 53.402705] ffff0008088e3f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 53.409911] >ffff0008088e4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 53.417111] ^ [ 53.420326] ffff0008088e4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 53.427531] ffff0008088e4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 53.434734] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 52.348121] ================================================================== [ 52.348302] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 52.352459] Read of size 1 at addr ffff000800dac400 by task kunit_try_catch/311 [ 52.359750] [ 52.361236] CPU: 7 UID: 0 PID: 311 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 52.361293] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.361311] Hardware name: WinLink E850-96 board (DT) [ 52.361335] Call trace: [ 52.361348] show_stack+0x20/0x38 (C) [ 52.361386] dump_stack_lvl+0x8c/0xd0 [ 52.361422] print_report+0x118/0x5d0 [ 52.361450] kasan_report+0xdc/0x128 [ 52.361478] __asan_report_load1_noabort+0x20/0x30 [ 52.361515] mempool_uaf_helper+0x314/0x340 [ 52.361549] mempool_kmalloc_uaf+0xc4/0x120 [ 52.361583] kunit_try_run_case+0x170/0x3f0 [ 52.361621] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.361653] kthread+0x328/0x630 [ 52.361683] ret_from_fork+0x10/0x20 [ 52.361718] [ 52.429453] Allocated by task 311: [ 52.432840] kasan_save_stack+0x3c/0x68 [ 52.436659] kasan_save_track+0x20/0x40 [ 52.440476] kasan_save_alloc_info+0x40/0x58 [ 52.444730] __kasan_mempool_unpoison_object+0x11c/0x180 [ 52.450025] remove_element+0x130/0x1f8 [ 52.453844] mempool_alloc_preallocated+0x58/0xc0 [ 52.458532] mempool_uaf_helper+0xa4/0x340 [ 52.462611] mempool_kmalloc_uaf+0xc4/0x120 [ 52.466779] kunit_try_run_case+0x170/0x3f0 [ 52.470946] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.476414] kthread+0x328/0x630 [ 52.479625] ret_from_fork+0x10/0x20 [ 52.483184] [ 52.484661] Freed by task 311: [ 52.487700] kasan_save_stack+0x3c/0x68 [ 52.491517] kasan_save_track+0x20/0x40 [ 52.495337] kasan_save_free_info+0x4c/0x78 [ 52.499503] __kasan_mempool_poison_object+0xc0/0x150 [ 52.504538] mempool_free+0x28c/0x328 [ 52.508184] mempool_uaf_helper+0x104/0x340 [ 52.512350] mempool_kmalloc_uaf+0xc4/0x120 [ 52.516517] kunit_try_run_case+0x170/0x3f0 [ 52.520685] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.526152] kthread+0x328/0x630 [ 52.529364] ret_from_fork+0x10/0x20 [ 52.532923] [ 52.534400] The buggy address belongs to the object at ffff000800dac400 [ 52.534400] which belongs to the cache kmalloc-128 of size 128 [ 52.546902] The buggy address is located 0 bytes inside of [ 52.546902] freed 128-byte region [ffff000800dac400, ffff000800dac480) [ 52.558964] [ 52.560444] The buggy address belongs to the physical page: [ 52.566001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880dac [ 52.573983] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 52.581623] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 52.588566] page_type: f5(slab) [ 52.591704] raw: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122 [ 52.599422] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.607148] head: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122 [ 52.614960] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.622772] head: 0bfffe0000000001 fffffdffe0036b01 00000000ffffffff 00000000ffffffff [ 52.630584] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 52.638391] page dumped because: kasan: bad access detected [ 52.643945] [ 52.645422] Memory state around the buggy address: [ 52.650203] ffff000800dac300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 52.657404] ffff000800dac380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.664612] >ffff000800dac400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 52.671810] ^ [ 52.675025] ffff000800dac480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.682230] ffff000800dac500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 52.689432] ================================================================== [ 52.930736] ================================================================== [ 52.940212] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 52.947327] Read of size 1 at addr ffff000808765240 by task kunit_try_catch/315 [ 52.954618] [ 52.956106] CPU: 3 UID: 0 PID: 315 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 52.956161] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.956178] Hardware name: WinLink E850-96 board (DT) [ 52.956200] Call trace: [ 52.956214] show_stack+0x20/0x38 (C) [ 52.956250] dump_stack_lvl+0x8c/0xd0 [ 52.956285] print_report+0x118/0x5d0 [ 52.956313] kasan_report+0xdc/0x128 [ 52.956341] __asan_report_load1_noabort+0x20/0x30 [ 52.956376] mempool_uaf_helper+0x314/0x340 [ 52.956407] mempool_slab_uaf+0xc0/0x118 [ 52.956442] kunit_try_run_case+0x170/0x3f0 [ 52.956481] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.956514] kthread+0x328/0x630 [ 52.956542] ret_from_fork+0x10/0x20 [ 52.956580] [ 53.024063] Allocated by task 315: [ 53.027450] kasan_save_stack+0x3c/0x68 [ 53.031266] kasan_save_track+0x20/0x40 [ 53.035085] kasan_save_alloc_info+0x40/0x58 [ 53.039339] __kasan_mempool_unpoison_object+0xbc/0x180 [ 53.044547] remove_element+0x16c/0x1f8 [ 53.048366] mempool_alloc_preallocated+0x58/0xc0 [ 53.053054] mempool_uaf_helper+0xa4/0x340 [ 53.057134] mempool_slab_uaf+0xc0/0x118 [ 53.061040] kunit_try_run_case+0x170/0x3f0 [ 53.065206] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.070675] kthread+0x328/0x630 [ 53.073887] ret_from_fork+0x10/0x20 [ 53.077446] [ 53.078923] Freed by task 315: [ 53.081960] kasan_save_stack+0x3c/0x68 [ 53.085779] kasan_save_track+0x20/0x40 [ 53.089599] kasan_save_free_info+0x4c/0x78 [ 53.093765] __kasan_mempool_poison_object+0xc0/0x150 [ 53.098800] mempool_free+0x28c/0x328 [ 53.102446] mempool_uaf_helper+0x104/0x340 [ 53.106612] mempool_slab_uaf+0xc0/0x118 [ 53.110518] kunit_try_run_case+0x170/0x3f0 [ 53.114685] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.120154] kthread+0x328/0x630 [ 53.123365] ret_from_fork+0x10/0x20 [ 53.126924] [ 53.128400] The buggy address belongs to the object at ffff000808765240 [ 53.128400] which belongs to the cache test_cache of size 123 [ 53.140815] The buggy address is located 0 bytes inside of [ 53.140815] freed 123-byte region [ffff000808765240, ffff0008087652bb) [ 53.152879] [ 53.154357] The buggy address belongs to the physical page: [ 53.159915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888765 [ 53.167899] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.174409] page_type: f5(slab) [ 53.177542] raw: 0bfffe0000000000 ffff0008019bc280 dead000000000122 0000000000000000 [ 53.185264] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 53.192983] page dumped because: kasan: bad access detected [ 53.198538] [ 53.200013] Memory state around the buggy address: [ 53.204794] ffff000808765100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.211996] ffff000808765180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 53.219201] >ffff000808765200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 53.226402] ^ [ 53.231700] ffff000808765280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.238906] ffff000808765300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.246107] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 51.822388] ================================================================== [ 51.832329] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 51.839880] Read of size 1 at addr ffff000804a82001 by task kunit_try_catch/307 [ 51.847169] [ 51.848657] CPU: 3 UID: 0 PID: 307 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 51.848713] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.848730] Hardware name: WinLink E850-96 board (DT) [ 51.848750] Call trace: [ 51.848765] show_stack+0x20/0x38 (C) [ 51.848803] dump_stack_lvl+0x8c/0xd0 [ 51.848839] print_report+0x118/0x5d0 [ 51.848868] kasan_report+0xdc/0x128 [ 51.848895] __asan_report_load1_noabort+0x20/0x30 [ 51.848929] mempool_oob_right_helper+0x2ac/0x2f0 [ 51.848962] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 51.849000] kunit_try_run_case+0x170/0x3f0 [ 51.849039] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.849072] kthread+0x328/0x630 [ 51.849102] ret_from_fork+0x10/0x20 [ 51.849139] [ 51.918440] The buggy address belongs to the physical page: [ 51.923996] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884a80 [ 51.931979] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 51.939619] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 51.946562] page_type: f8(unknown) [ 51.949957] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 51.957678] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 51.965404] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 51.973216] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 51.981029] head: 0bfffe0000000002 fffffdffe012a001 00000000ffffffff 00000000ffffffff [ 51.988840] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 51.996647] page dumped because: kasan: bad access detected [ 52.002202] [ 52.003679] Memory state around the buggy address: [ 52.008457] ffff000804a81f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 52.015660] ffff000804a81f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 52.022866] >ffff000804a82000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 52.030066] ^ [ 52.033281] ffff000804a82080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 52.040486] ffff000804a82100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 52.047688] ================================================================== [ 52.057098] ================================================================== [ 52.067140] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 52.074684] Read of size 1 at addr ffff0008088082bb by task kunit_try_catch/309 [ 52.081975] [ 52.083462] CPU: 6 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 52.083520] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.083536] Hardware name: WinLink E850-96 board (DT) [ 52.083557] Call trace: [ 52.083572] show_stack+0x20/0x38 (C) [ 52.083609] dump_stack_lvl+0x8c/0xd0 [ 52.083641] print_report+0x118/0x5d0 [ 52.083669] kasan_report+0xdc/0x128 [ 52.083696] __asan_report_load1_noabort+0x20/0x30 [ 52.083732] mempool_oob_right_helper+0x2ac/0x2f0 [ 52.083767] mempool_slab_oob_right+0xc0/0x118 [ 52.083805] kunit_try_run_case+0x170/0x3f0 [ 52.083846] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.083878] kthread+0x328/0x630 [ 52.083906] ret_from_fork+0x10/0x20 [ 52.083941] [ 52.152463] Allocated by task 309: [ 52.155847] kasan_save_stack+0x3c/0x68 [ 52.159664] kasan_save_track+0x20/0x40 [ 52.163484] kasan_save_alloc_info+0x40/0x58 [ 52.167737] __kasan_mempool_unpoison_object+0xbc/0x180 [ 52.172947] remove_element+0x16c/0x1f8 [ 52.176765] mempool_alloc_preallocated+0x58/0xc0 [ 52.181452] mempool_oob_right_helper+0x98/0x2f0 [ 52.186053] mempool_slab_oob_right+0xc0/0x118 [ 52.190480] kunit_try_run_case+0x170/0x3f0 [ 52.194647] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.200115] kthread+0x328/0x630 [ 52.203327] ret_from_fork+0x10/0x20 [ 52.206886] [ 52.208363] The buggy address belongs to the object at ffff000808808240 [ 52.208363] which belongs to the cache test_cache of size 123 [ 52.220777] The buggy address is located 0 bytes to the right of [ 52.220777] allocated 123-byte region [ffff000808808240, ffff0008088082bb) [ 52.233709] [ 52.235187] The buggy address belongs to the physical page: [ 52.240745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888808 [ 52.248729] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.255239] page_type: f5(slab) [ 52.258375] raw: 0bfffe0000000000 ffff000801e66140 dead000000000122 0000000000000000 [ 52.266094] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 52.273814] page dumped because: kasan: bad access detected [ 52.279367] [ 52.280843] Memory state around the buggy address: [ 52.285623] ffff000808808180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 52.292827] ffff000808808200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 52.300031] >ffff000808808280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 52.307232] ^ [ 52.312270] ffff000808808300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.319475] ffff000808808380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.326676] ================================================================== [ 51.519986] ================================================================== [ 51.520158] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 51.520295] Read of size 1 at addr ffff000801e0b973 by task kunit_try_catch/305 [ 51.526861] [ 51.528350] CPU: 5 UID: 0 PID: 305 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 51.528407] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.528426] Hardware name: WinLink E850-96 board (DT) [ 51.528447] Call trace: [ 51.528461] show_stack+0x20/0x38 (C) [ 51.528499] dump_stack_lvl+0x8c/0xd0 [ 51.528532] print_report+0x118/0x5d0 [ 51.528560] kasan_report+0xdc/0x128 [ 51.528586] __asan_report_load1_noabort+0x20/0x30 [ 51.528624] mempool_oob_right_helper+0x2ac/0x2f0 [ 51.528655] mempool_kmalloc_oob_right+0xc4/0x120 [ 51.528688] kunit_try_run_case+0x170/0x3f0 [ 51.528726] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.528759] kthread+0x328/0x630 [ 51.528790] ret_from_fork+0x10/0x20 [ 51.528826] [ 51.597607] Allocated by task 305: [ 51.600995] kasan_save_stack+0x3c/0x68 [ 51.604812] kasan_save_track+0x20/0x40 [ 51.608633] kasan_save_alloc_info+0x40/0x58 [ 51.612885] __kasan_mempool_unpoison_object+0x11c/0x180 [ 51.618180] remove_element+0x130/0x1f8 [ 51.621999] mempool_alloc_preallocated+0x58/0xc0 [ 51.626687] mempool_oob_right_helper+0x98/0x2f0 [ 51.631287] mempool_kmalloc_oob_right+0xc4/0x120 [ 51.635975] kunit_try_run_case+0x170/0x3f0 [ 51.640141] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.645609] kthread+0x328/0x630 [ 51.648821] ret_from_fork+0x10/0x20 [ 51.652381] [ 51.653858] The buggy address belongs to the object at ffff000801e0b900 [ 51.653858] which belongs to the cache kmalloc-128 of size 128 [ 51.666360] The buggy address is located 0 bytes to the right of [ 51.666360] allocated 115-byte region [ffff000801e0b900, ffff000801e0b973) [ 51.679290] [ 51.680770] The buggy address belongs to the physical page: [ 51.686326] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e0a [ 51.694309] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 51.701950] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 51.708891] page_type: f5(slab) [ 51.712029] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 51.719748] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.727475] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 51.735285] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 51.743098] head: 0bfffe0000000001 fffffdffe0078281 00000000ffffffff 00000000ffffffff [ 51.750910] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 51.758717] page dumped because: kasan: bad access detected [ 51.764271] [ 51.765748] Memory state around the buggy address: [ 51.770527] ffff000801e0b800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 51.777730] ffff000801e0b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.784937] >ffff000801e0b900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 51.792135] ^ [ 51.798996] ffff000801e0b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.806201] ffff000801e0ba00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 51.813404] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 50.620669] ================================================================== [ 50.620859] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300 [ 50.621005] Read of size 1 at addr ffff000801b48640 by task kunit_try_catch/299 [ 50.624555] [ 50.626042] CPU: 4 UID: 0 PID: 299 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 50.626099] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.626115] Hardware name: WinLink E850-96 board (DT) [ 50.626139] Call trace: [ 50.626151] show_stack+0x20/0x38 (C) [ 50.626188] dump_stack_lvl+0x8c/0xd0 [ 50.626223] print_report+0x118/0x5d0 [ 50.626253] kasan_report+0xdc/0x128 [ 50.626281] __kasan_check_byte+0x54/0x70 [ 50.626311] kmem_cache_destroy+0x34/0x218 [ 50.626346] kmem_cache_double_destroy+0x174/0x300 [ 50.626383] kunit_try_run_case+0x170/0x3f0 [ 50.626419] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.626454] kthread+0x328/0x630 [ 50.626485] ret_from_fork+0x10/0x20 [ 50.626523] [ 50.693998] Allocated by task 299: [ 50.697385] kasan_save_stack+0x3c/0x68 [ 50.701202] kasan_save_track+0x20/0x40 [ 50.705023] kasan_save_alloc_info+0x40/0x58 [ 50.709275] __kasan_slab_alloc+0xa8/0xb0 [ 50.713270] kmem_cache_alloc_noprof+0x10c/0x398 [ 50.717869] __kmem_cache_create_args+0x178/0x280 [ 50.722556] kmem_cache_double_destroy+0xc0/0x300 [ 50.727244] kunit_try_run_case+0x170/0x3f0 [ 50.731412] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.736879] kthread+0x328/0x630 [ 50.740091] ret_from_fork+0x10/0x20 [ 50.743649] [ 50.745126] Freed by task 299: [ 50.748165] kasan_save_stack+0x3c/0x68 [ 50.751984] kasan_save_track+0x20/0x40 [ 50.755802] kasan_save_free_info+0x4c/0x78 [ 50.759969] __kasan_slab_free+0x6c/0x98 [ 50.763876] kmem_cache_free+0x260/0x468 [ 50.767781] slab_kmem_cache_release+0x38/0x50 [ 50.772208] kmem_cache_release+0x1c/0x30 [ 50.776201] kobject_put+0x17c/0x420 [ 50.779760] sysfs_slab_release+0x1c/0x30 [ 50.783753] kmem_cache_destroy+0x118/0x218 [ 50.787920] kmem_cache_double_destroy+0x128/0x300 [ 50.792694] kunit_try_run_case+0x170/0x3f0 [ 50.796861] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.802329] kthread+0x328/0x630 [ 50.805541] ret_from_fork+0x10/0x20 [ 50.809100] [ 50.810577] The buggy address belongs to the object at ffff000801b48640 [ 50.810577] which belongs to the cache kmem_cache of size 208 [ 50.822991] The buggy address is located 0 bytes inside of [ 50.822991] freed 208-byte region [ffff000801b48640, ffff000801b48710) [ 50.835054] [ 50.836534] The buggy address belongs to the physical page: [ 50.842091] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881b48 [ 50.850074] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 50.857714] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 50.864658] page_type: f5(slab) [ 50.867793] raw: 0bfffe0000000040 ffff000800002000 dead000000000122 0000000000000000 [ 50.875512] raw: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000 [ 50.883240] head: 0bfffe0000000040 ffff000800002000 dead000000000122 0000000000000000 [ 50.891050] head: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000 [ 50.898863] head: 0bfffe0000000001 fffffdffe006d201 00000000ffffffff 00000000ffffffff [ 50.906675] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 50.914482] page dumped because: kasan: bad access detected [ 50.920036] [ 50.921513] Memory state around the buggy address: [ 50.926295] ffff000801b48500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 50.933494] ffff000801b48580: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 50.940701] >ffff000801b48600: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 50.947900] ^ [ 50.953198] ffff000801b48680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 50.960403] ffff000801b48700: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.967606] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 50.205785] ================================================================== [ 50.205983] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468 [ 50.206114] Read of size 1 at addr ffff000801e68000 by task kunit_try_catch/297 [ 50.209497] [ 50.210986] CPU: 6 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 50.211044] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.211062] Hardware name: WinLink E850-96 board (DT) [ 50.211086] Call trace: [ 50.211100] show_stack+0x20/0x38 (C) [ 50.211139] dump_stack_lvl+0x8c/0xd0 [ 50.211172] print_report+0x118/0x5d0 [ 50.211202] kasan_report+0xdc/0x128 [ 50.211230] __asan_report_load1_noabort+0x20/0x30 [ 50.211265] kmem_cache_rcu_uaf+0x388/0x468 [ 50.211298] kunit_try_run_case+0x170/0x3f0 [ 50.211337] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.211369] kthread+0x328/0x630 [ 50.211398] ret_from_fork+0x10/0x20 [ 50.211435] [ 50.275036] Allocated by task 297: [ 50.278422] kasan_save_stack+0x3c/0x68 [ 50.282239] kasan_save_track+0x20/0x40 [ 50.286059] kasan_save_alloc_info+0x40/0x58 [ 50.290312] __kasan_slab_alloc+0xa8/0xb0 [ 50.294305] kmem_cache_alloc_noprof+0x10c/0x398 [ 50.298906] kmem_cache_rcu_uaf+0x12c/0x468 [ 50.303073] kunit_try_run_case+0x170/0x3f0 [ 50.307240] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.312709] kthread+0x328/0x630 [ 50.315919] ret_from_fork+0x10/0x20 [ 50.319478] [ 50.320955] Freed by task 0: [ 50.323822] kasan_save_stack+0x3c/0x68 [ 50.327638] kasan_save_track+0x20/0x40 [ 50.331459] kasan_save_free_info+0x4c/0x78 [ 50.335624] __kasan_slab_free+0x6c/0x98 [ 50.339530] slab_free_after_rcu_debug+0xd4/0x2f8 [ 50.344218] rcu_core+0x9f4/0x1e20 [ 50.347603] rcu_core_si+0x18/0x30 [ 50.350988] handle_softirqs+0x374/0xb28 [ 50.354894] __do_softirq+0x1c/0x28 [ 50.358367] [ 50.359844] Last potentially related work creation: [ 50.364705] kasan_save_stack+0x3c/0x68 [ 50.368523] kasan_record_aux_stack+0xb4/0xc8 [ 50.372864] kmem_cache_free+0x120/0x468 [ 50.376769] kmem_cache_rcu_uaf+0x16c/0x468 [ 50.380936] kunit_try_run_case+0x170/0x3f0 [ 50.385102] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.390571] kthread+0x328/0x630 [ 50.393783] ret_from_fork+0x10/0x20 [ 50.397341] [ 50.398817] The buggy address belongs to the object at ffff000801e68000 [ 50.398817] which belongs to the cache test_cache of size 200 [ 50.411234] The buggy address is located 0 bytes inside of [ 50.411234] freed 200-byte region [ffff000801e68000, ffff000801e680c8) [ 50.423296] [ 50.424776] The buggy address belongs to the physical page: [ 50.430333] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881e68 [ 50.438316] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 50.445957] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 50.452898] page_type: f5(slab) [ 50.456035] raw: 0bfffe0000000040 ffff000801e66000 dead000000000122 0000000000000000 [ 50.463754] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 50.471480] head: 0bfffe0000000040 ffff000801e66000 dead000000000122 0000000000000000 [ 50.479292] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 50.487105] head: 0bfffe0000000001 fffffdffe0079a01 00000000ffffffff 00000000ffffffff [ 50.494917] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 50.502724] page dumped because: kasan: bad access detected [ 50.508278] [ 50.509753] Memory state around the buggy address: [ 50.514533] ffff000801e67f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.521736] ffff000801e67f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.528942] >ffff000801e68000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 50.536142] ^ [ 50.539357] ffff000801e68080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 50.546562] ffff000801e68100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.553765] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 49.801581] ================================================================== [ 49.801766] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 49.808647] Free of addr ffff000801b6c001 by task kunit_try_catch/295 [ 49.815069] [ 49.816556] CPU: 4 UID: 0 PID: 295 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 49.816610] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.816629] Hardware name: WinLink E850-96 board (DT) [ 49.816651] Call trace: [ 49.816664] show_stack+0x20/0x38 (C) [ 49.816701] dump_stack_lvl+0x8c/0xd0 [ 49.816734] print_report+0x118/0x5d0 [ 49.816765] kasan_report_invalid_free+0xc0/0xe8 [ 49.816798] check_slab_allocation+0xfc/0x108 [ 49.816836] __kasan_slab_pre_free+0x2c/0x48 [ 49.816871] kmem_cache_free+0xf0/0x468 [ 49.816909] kmem_cache_invalid_free+0x184/0x3c8 [ 49.816945] kunit_try_run_case+0x170/0x3f0 [ 49.816986] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.817018] kthread+0x328/0x630 [ 49.817048] ret_from_fork+0x10/0x20 [ 49.817086] [ 49.889721] Allocated by task 295: [ 49.893108] kasan_save_stack+0x3c/0x68 [ 49.896925] kasan_save_track+0x20/0x40 [ 49.900746] kasan_save_alloc_info+0x40/0x58 [ 49.904999] __kasan_slab_alloc+0xa8/0xb0 [ 49.908991] kmem_cache_alloc_noprof+0x10c/0x398 [ 49.913591] kmem_cache_invalid_free+0x12c/0x3c8 [ 49.918193] kunit_try_run_case+0x170/0x3f0 [ 49.922358] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.927827] kthread+0x328/0x630 [ 49.931038] ret_from_fork+0x10/0x20 [ 49.934598] [ 49.936076] The buggy address belongs to the object at ffff000801b6c000 [ 49.936076] which belongs to the cache test_cache of size 200 [ 49.948489] The buggy address is located 1 bytes inside of [ 49.948489] 200-byte region [ffff000801b6c000, ffff000801b6c0c8) [ 49.960031] [ 49.961511] The buggy address belongs to the physical page: [ 49.967068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881b6c [ 49.975051] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 49.982690] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 49.989633] page_type: f5(slab) [ 49.992770] raw: 0bfffe0000000040 ffff000801b48500 dead000000000122 0000000000000000 [ 50.000489] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 50.008217] head: 0bfffe0000000040 ffff000801b48500 dead000000000122 0000000000000000 [ 50.016027] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 50.023840] head: 0bfffe0000000001 fffffdffe006db01 00000000ffffffff 00000000ffffffff [ 50.031651] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 50.039460] page dumped because: kasan: bad access detected [ 50.045013] [ 50.046489] Memory state around the buggy address: [ 50.051268] ffff000801b6bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.058471] ffff000801b6bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.065676] >ffff000801b6c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 50.072877] ^ [ 50.076092] ffff000801b6c080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 50.083297] ffff000801b6c100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.090501] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 49.461016] ================================================================== [ 49.461202] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 49.461328] Free of addr ffff000801b6a000 by task kunit_try_catch/293 [ 49.462731] [ 49.464219] CPU: 4 UID: 0 PID: 293 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 49.464278] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.464296] Hardware name: WinLink E850-96 board (DT) [ 49.464319] Call trace: [ 49.464335] show_stack+0x20/0x38 (C) [ 49.464374] dump_stack_lvl+0x8c/0xd0 [ 49.464409] print_report+0x118/0x5d0 [ 49.464439] kasan_report_invalid_free+0xc0/0xe8 [ 49.464470] check_slab_allocation+0xd4/0x108 [ 49.464509] __kasan_slab_pre_free+0x2c/0x48 [ 49.464543] kmem_cache_free+0xf0/0x468 [ 49.464581] kmem_cache_double_free+0x190/0x3c8 [ 49.464616] kunit_try_run_case+0x170/0x3f0 [ 49.464653] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.464687] kthread+0x328/0x630 [ 49.464718] ret_from_fork+0x10/0x20 [ 49.464755] [ 49.537296] Allocated by task 293: [ 49.540684] kasan_save_stack+0x3c/0x68 [ 49.544499] kasan_save_track+0x20/0x40 [ 49.548319] kasan_save_alloc_info+0x40/0x58 [ 49.552572] __kasan_slab_alloc+0xa8/0xb0 [ 49.556565] kmem_cache_alloc_noprof+0x10c/0x398 [ 49.561166] kmem_cache_double_free+0x12c/0x3c8 [ 49.565680] kunit_try_run_case+0x170/0x3f0 [ 49.569846] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.575315] kthread+0x328/0x630 [ 49.578527] ret_from_fork+0x10/0x20 [ 49.582086] [ 49.583563] Freed by task 293: [ 49.586600] kasan_save_stack+0x3c/0x68 [ 49.590419] kasan_save_track+0x20/0x40 [ 49.594240] kasan_save_free_info+0x4c/0x78 [ 49.598405] __kasan_slab_free+0x6c/0x98 [ 49.602311] kmem_cache_free+0x260/0x468 [ 49.606217] kmem_cache_double_free+0x140/0x3c8 [ 49.610731] kunit_try_run_case+0x170/0x3f0 [ 49.614898] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.620366] kthread+0x328/0x630 [ 49.623578] ret_from_fork+0x10/0x20 [ 49.627137] [ 49.628612] The buggy address belongs to the object at ffff000801b6a000 [ 49.628612] which belongs to the cache test_cache of size 200 [ 49.641029] The buggy address is located 0 bytes inside of [ 49.641029] 200-byte region [ffff000801b6a000, ffff000801b6a0c8) [ 49.652571] [ 49.654050] The buggy address belongs to the physical page: [ 49.659607] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881b6a [ 49.667590] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 49.675230] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 49.682174] page_type: f5(slab) [ 49.685310] raw: 0bfffe0000000040 ffff000801b483c0 dead000000000122 0000000000000000 [ 49.693028] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 49.700756] head: 0bfffe0000000040 ffff000801b483c0 dead000000000122 0000000000000000 [ 49.708566] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 49.716379] head: 0bfffe0000000001 fffffdffe006da81 00000000ffffffff 00000000ffffffff [ 49.724191] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 49.731998] page dumped because: kasan: bad access detected [ 49.737552] [ 49.739027] Memory state around the buggy address: [ 49.743809] ffff000801b69f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.751012] ffff000801b69f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.758220] >ffff000801b6a000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 49.765416] ^ [ 49.768632] ffff000801b6a080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 49.775836] ffff000801b6a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.783041] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 49.116859] ================================================================== [ 49.126352] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430 [ 49.133028] Read of size 1 at addr ffff0008019be0c8 by task kunit_try_catch/291 [ 49.140320] [ 49.141807] CPU: 3 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 49.141864] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.141884] Hardware name: WinLink E850-96 board (DT) [ 49.141907] Call trace: [ 49.141920] show_stack+0x20/0x38 (C) [ 49.141957] dump_stack_lvl+0x8c/0xd0 [ 49.141990] print_report+0x118/0x5d0 [ 49.142019] kasan_report+0xdc/0x128 [ 49.142046] __asan_report_load1_noabort+0x20/0x30 [ 49.142080] kmem_cache_oob+0x344/0x430 [ 49.142114] kunit_try_run_case+0x170/0x3f0 [ 49.142150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.142184] kthread+0x328/0x630 [ 49.142218] ret_from_fork+0x10/0x20 [ 49.142253] [ 49.205508] Allocated by task 291: [ 49.208897] kasan_save_stack+0x3c/0x68 [ 49.212713] kasan_save_track+0x20/0x40 [ 49.216534] kasan_save_alloc_info+0x40/0x58 [ 49.220786] __kasan_slab_alloc+0xa8/0xb0 [ 49.224779] kmem_cache_alloc_noprof+0x10c/0x398 [ 49.229379] kmem_cache_oob+0x12c/0x430 [ 49.233198] kunit_try_run_case+0x170/0x3f0 [ 49.237366] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.242835] kthread+0x328/0x630 [ 49.246046] ret_from_fork+0x10/0x20 [ 49.249604] [ 49.251082] The buggy address belongs to the object at ffff0008019be000 [ 49.251082] which belongs to the cache test_cache of size 200 [ 49.263497] The buggy address is located 0 bytes to the right of [ 49.263497] allocated 200-byte region [ffff0008019be000, ffff0008019be0c8) [ 49.276427] [ 49.277907] The buggy address belongs to the physical page: [ 49.283464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8819be [ 49.291446] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 49.299086] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 49.306029] page_type: f5(slab) [ 49.309166] raw: 0bfffe0000000040 ffff0008019bc000 dead000000000122 0000000000000000 [ 49.316885] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 49.324613] head: 0bfffe0000000040 ffff0008019bc000 dead000000000122 0000000000000000 [ 49.332422] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 49.340235] head: 0bfffe0000000001 fffffdffe0066f81 00000000ffffffff 00000000ffffffff [ 49.348047] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 49.355854] page dumped because: kasan: bad access detected [ 49.361408] [ 49.362884] Memory state around the buggy address: [ 49.367664] ffff0008019bdf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.374867] ffff0008019be000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 49.382073] >ffff0008019be080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 49.389273] ^ [ 49.394832] ffff0008019be100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.402037] ffff0008019be180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.409239] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 48.768249] ================================================================== [ 48.776008] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 48.782687] Read of size 8 at addr ffff000808564740 by task kunit_try_catch/284 [ 48.789976] [ 48.791462] CPU: 2 UID: 0 PID: 284 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 48.791517] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.791535] Hardware name: WinLink E850-96 board (DT) [ 48.791555] Call trace: [ 48.791571] show_stack+0x20/0x38 (C) [ 48.791610] dump_stack_lvl+0x8c/0xd0 [ 48.791647] print_report+0x118/0x5d0 [ 48.791679] kasan_report+0xdc/0x128 [ 48.791707] __asan_report_load8_noabort+0x20/0x30 [ 48.791741] workqueue_uaf+0x480/0x4a8 [ 48.791771] kunit_try_run_case+0x170/0x3f0 [ 48.791807] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.791842] kthread+0x328/0x630 [ 48.791873] ret_from_fork+0x10/0x20 [ 48.791907] [ 48.855082] Allocated by task 284: [ 48.858468] kasan_save_stack+0x3c/0x68 [ 48.862285] kasan_save_track+0x20/0x40 [ 48.866106] kasan_save_alloc_info+0x40/0x58 [ 48.870357] __kasan_kmalloc+0xd4/0xd8 [ 48.874091] __kmalloc_cache_noprof+0x16c/0x3c0 [ 48.878603] workqueue_uaf+0x13c/0x4a8 [ 48.882336] kunit_try_run_case+0x170/0x3f0 [ 48.886504] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.891971] kthread+0x328/0x630 [ 48.895183] ret_from_fork+0x10/0x20 [ 48.898742] [ 48.900217] Freed by task 121: [ 48.903257] kasan_save_stack+0x3c/0x68 [ 48.907075] kasan_save_track+0x20/0x40 [ 48.910895] kasan_save_free_info+0x4c/0x78 [ 48.915061] __kasan_slab_free+0x6c/0x98 [ 48.918967] kfree+0x214/0x3c8 [ 48.922006] workqueue_uaf_work+0x18/0x30 [ 48.926000] process_one_work+0x530/0xf98 [ 48.929991] worker_thread+0x618/0xf38 [ 48.933724] kthread+0x328/0x630 [ 48.936936] ret_from_fork+0x10/0x20 [ 48.940494] [ 48.941972] Last potentially related work creation: [ 48.946833] kasan_save_stack+0x3c/0x68 [ 48.950651] kasan_record_aux_stack+0xb4/0xc8 [ 48.954991] __queue_work+0x65c/0xfe0 [ 48.958637] queue_work_on+0xbc/0xf8 [ 48.962196] workqueue_uaf+0x210/0x4a8 [ 48.965928] kunit_try_run_case+0x170/0x3f0 [ 48.970095] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.975563] kthread+0x328/0x630 [ 48.978775] ret_from_fork+0x10/0x20 [ 48.982334] [ 48.983811] The buggy address belongs to the object at ffff000808564740 [ 48.983811] which belongs to the cache kmalloc-32 of size 32 [ 48.996140] The buggy address is located 0 bytes inside of [ 48.996140] freed 32-byte region [ffff000808564740, ffff000808564760) [ 49.008117] [ 49.009596] The buggy address belongs to the physical page: [ 49.015151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888564 [ 49.023136] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 49.029644] page_type: f5(slab) [ 49.032781] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 49.040500] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 49.048220] page dumped because: kasan: bad access detected [ 49.053774] [ 49.055249] Memory state around the buggy address: [ 49.060032] ffff000808564600: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 49.067233] ffff000808564680: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 49.074439] >ffff000808564700: 00 00 00 07 fc fc fc fc fa fb fb fb fc fc fc fc [ 49.081638] ^ [ 49.086937] ffff000808564780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.094143] ffff000808564800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.101344] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[ 48.401648] ================================================================== [ 48.401818] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 48.401937] Read of size 4 at addr ffff000807bb5d80 by task swapper/3/0 [ 48.403003] [ 48.404489] CPU: 3 UID: 0 PID: 0 Comm: swapper/3 Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 48.404545] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.404561] Hardware name: WinLink E850-96 board (DT) [ 48.404581] Call trace: [ 48.404594] show_stack+0x20/0x38 (C) [ 48.404630] dump_stack_lvl+0x8c/0xd0 [ 48.404665] print_report+0x118/0x5d0 [ 48.404694] kasan_report+0xdc/0x128 [ 48.404721] __asan_report_load4_noabort+0x20/0x30 [ 48.404755] rcu_uaf_reclaim+0x64/0x70 [ 48.404785] rcu_core+0x9f4/0x1e20 [ 48.404819] rcu_core_si+0x18/0x30 [ 48.404847] handle_softirqs+0x374/0xb28 [ 48.404882] __do_softirq+0x1c/0x28 [ 48.404913] ____do_softirq+0x18/0x30 [ 48.404947] call_on_irq_stack+0x24/0x30 [ 48.404977] do_softirq_own_stack+0x24/0x38 [ 48.405008] __irq_exit_rcu+0x1fc/0x318 [ 48.405038] irq_exit_rcu+0x1c/0x80 [ 48.405066] el1_interrupt+0x38/0x58 [ 48.405100] el1h_64_irq_handler+0x18/0x28 [ 48.405135] el1h_64_irq+0x6c/0x70 [ 48.405164] arch_local_irq_enable+0x4/0x8 (P) [ 48.405199] do_idle+0x384/0x4e8 [ 48.405231] cpu_startup_entry+0x68/0x80 [ 48.405264] secondary_start_kernel+0x28c/0x340 [ 48.405295] __secondary_switched+0xc0/0xc8 [ 48.405336] [ 48.515416] Allocated by task 282: [ 48.518802] kasan_save_stack+0x3c/0x68 [ 48.522619] kasan_save_track+0x20/0x40 [ 48.526439] kasan_save_alloc_info+0x40/0x58 [ 48.530692] __kasan_kmalloc+0xd4/0xd8 [ 48.534426] __kmalloc_cache_noprof+0x16c/0x3c0 [ 48.538938] rcu_uaf+0xb0/0x2d8 [ 48.542065] kunit_try_run_case+0x170/0x3f0 [ 48.546231] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.551700] kthread+0x328/0x630 [ 48.554910] ret_from_fork+0x10/0x20 [ 48.558471] [ 48.559946] Freed by task 0: [ 48.562813] kasan_save_stack+0x3c/0x68 [ 48.566629] kasan_save_track+0x20/0x40 [ 48.570448] kasan_save_free_info+0x4c/0x78 [ 48.574615] __kasan_slab_free+0x6c/0x98 [ 48.578521] kfree+0x214/0x3c8 [ 48.581559] rcu_uaf_reclaim+0x28/0x70 [ 48.585292] rcu_core+0x9f4/0x1e20 [ 48.588677] rcu_core_si+0x18/0x30 [ 48.592064] handle_softirqs+0x374/0xb28 [ 48.595969] __do_softirq+0x1c/0x28 [ 48.599441] [ 48.600916] Last potentially related work creation: [ 48.605779] kasan_save_stack+0x3c/0x68 [ 48.609597] kasan_record_aux_stack+0xb4/0xc8 [ 48.613937] __call_rcu_common.constprop.0+0x74/0x8c8 [ 48.618972] call_rcu+0x18/0x30 [ 48.622097] rcu_uaf+0x14c/0x2d8 [ 48.625309] kunit_try_run_case+0x170/0x3f0 [ 48.629476] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.634944] kthread+0x328/0x630 [ 48.638156] ret_from_fork+0x10/0x20 [ 48.641715] [ 48.643191] The buggy address belongs to the object at ffff000807bb5d80 [ 48.643191] which belongs to the cache kmalloc-32 of size 32 [ 48.655520] The buggy address is located 0 bytes inside of [ 48.655520] freed 32-byte region [ffff000807bb5d80, ffff000807bb5da0) [ 48.667496] [ 48.668973] The buggy address belongs to the physical page: [ 48.674531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887bb5 [ 48.682514] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 48.689024] page_type: f5(slab) [ 48.692161] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 48.699880] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 48.707599] page dumped because: kasan: bad access detected [ 48.713154] [ 48.714631] Memory state around the buggy address: [ 48.719409] ffff000807bb5c80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 48.726613] ffff000807bb5d00: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 48.733819] >ffff000807bb5d80: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 48.741019] ^ [ 48.744235] ffff000807bb5e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.751439] ffff000807bb5e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.758641] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 47.348264] ================================================================== [ 47.358054] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 47.364387] Read of size 1 at addr ffff0008074f9100 by task kunit_try_catch/280 [ 47.371678] [ 47.373164] CPU: 2 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 47.373218] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.373235] Hardware name: WinLink E850-96 board (DT) [ 47.373256] Call trace: [ 47.373269] show_stack+0x20/0x38 (C) [ 47.373304] dump_stack_lvl+0x8c/0xd0 [ 47.373340] print_report+0x118/0x5d0 [ 47.373367] kasan_report+0xdc/0x128 [ 47.373392] __kasan_check_byte+0x54/0x70 [ 47.373420] ksize+0x30/0x88 [ 47.373452] ksize_uaf+0x168/0x5f8 [ 47.373481] kunit_try_run_case+0x170/0x3f0 [ 47.373518] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.373551] kthread+0x328/0x630 [ 47.373582] ret_from_fork+0x10/0x20 [ 47.373614] [ 47.438518] Allocated by task 280: [ 47.441907] kasan_save_stack+0x3c/0x68 [ 47.445722] kasan_save_track+0x20/0x40 [ 47.449542] kasan_save_alloc_info+0x40/0x58 [ 47.453795] __kasan_kmalloc+0xd4/0xd8 [ 47.457528] __kmalloc_cache_noprof+0x16c/0x3c0 [ 47.462041] ksize_uaf+0xb8/0x5f8 [ 47.465340] kunit_try_run_case+0x170/0x3f0 [ 47.469506] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.474977] kthread+0x328/0x630 [ 47.478187] ret_from_fork+0x10/0x20 [ 47.481746] [ 47.483221] Freed by task 280: [ 47.486260] kasan_save_stack+0x3c/0x68 [ 47.490079] kasan_save_track+0x20/0x40 [ 47.493900] kasan_save_free_info+0x4c/0x78 [ 47.498065] __kasan_slab_free+0x6c/0x98 [ 47.501972] kfree+0x214/0x3c8 [ 47.505010] ksize_uaf+0x11c/0x5f8 [ 47.508395] kunit_try_run_case+0x170/0x3f0 [ 47.512562] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.518030] kthread+0x328/0x630 [ 47.521242] ret_from_fork+0x10/0x20 [ 47.524801] [ 47.526278] The buggy address belongs to the object at ffff0008074f9100 [ 47.526278] which belongs to the cache kmalloc-128 of size 128 [ 47.538780] The buggy address is located 0 bytes inside of [ 47.538780] freed 128-byte region [ffff0008074f9100, ffff0008074f9180) [ 47.550842] [ 47.552320] The buggy address belongs to the physical page: [ 47.557878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8874f8 [ 47.565861] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 47.573500] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 47.580444] page_type: f5(slab) [ 47.583581] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 47.591300] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.599026] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 47.606838] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.614651] head: 0bfffe0000000001 fffffdffe01d3e01 00000000ffffffff 00000000ffffffff [ 47.622463] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 47.630269] page dumped because: kasan: bad access detected [ 47.635824] [ 47.637301] Memory state around the buggy address: [ 47.642080] ffff0008074f9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 47.649282] ffff0008074f9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.656488] >ffff0008074f9100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 47.663687] ^ [ 47.666903] ffff0008074f9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.674109] ffff0008074f9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.681312] ================================================================== [ 48.024250] ================================================================== [ 48.031313] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 48.037641] Read of size 1 at addr ffff0008074f9178 by task kunit_try_catch/280 [ 48.044932] [ 48.046417] CPU: 2 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 48.046470] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.046486] Hardware name: WinLink E850-96 board (DT) [ 48.046506] Call trace: [ 48.046520] show_stack+0x20/0x38 (C) [ 48.046555] dump_stack_lvl+0x8c/0xd0 [ 48.046588] print_report+0x118/0x5d0 [ 48.046616] kasan_report+0xdc/0x128 [ 48.046642] __asan_report_load1_noabort+0x20/0x30 [ 48.046674] ksize_uaf+0x544/0x5f8 [ 48.046708] kunit_try_run_case+0x170/0x3f0 [ 48.046743] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.046776] kthread+0x328/0x630 [ 48.046805] ret_from_fork+0x10/0x20 [ 48.046839] [ 48.109688] Allocated by task 280: [ 48.113075] kasan_save_stack+0x3c/0x68 [ 48.116893] kasan_save_track+0x20/0x40 [ 48.120712] kasan_save_alloc_info+0x40/0x58 [ 48.124966] __kasan_kmalloc+0xd4/0xd8 [ 48.128698] __kmalloc_cache_noprof+0x16c/0x3c0 [ 48.133212] ksize_uaf+0xb8/0x5f8 [ 48.136512] kunit_try_run_case+0x170/0x3f0 [ 48.140677] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.146146] kthread+0x328/0x630 [ 48.149357] ret_from_fork+0x10/0x20 [ 48.152916] [ 48.154392] Freed by task 280: [ 48.157431] kasan_save_stack+0x3c/0x68 [ 48.161250] kasan_save_track+0x20/0x40 [ 48.165069] kasan_save_free_info+0x4c/0x78 [ 48.169236] __kasan_slab_free+0x6c/0x98 [ 48.173142] kfree+0x214/0x3c8 [ 48.176180] ksize_uaf+0x11c/0x5f8 [ 48.179566] kunit_try_run_case+0x170/0x3f0 [ 48.183732] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.189201] kthread+0x328/0x630 [ 48.192412] ret_from_fork+0x10/0x20 [ 48.195972] [ 48.197447] The buggy address belongs to the object at ffff0008074f9100 [ 48.197447] which belongs to the cache kmalloc-128 of size 128 [ 48.209950] The buggy address is located 120 bytes inside of [ 48.209950] freed 128-byte region [ffff0008074f9100, ffff0008074f9180) [ 48.222186] [ 48.223664] The buggy address belongs to the physical page: [ 48.229222] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8874f8 [ 48.237204] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 48.244844] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 48.251786] page_type: f5(slab) [ 48.254924] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 48.262643] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.270370] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 48.278181] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.285994] head: 0bfffe0000000001 fffffdffe01d3e01 00000000ffffffff 00000000ffffffff [ 48.293807] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 48.301613] page dumped because: kasan: bad access detected [ 48.307168] [ 48.308643] Memory state around the buggy address: [ 48.313423] ffff0008074f9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 48.320626] ffff0008074f9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.327833] >ffff0008074f9100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 48.335032] ^ [ 48.342153] ffff0008074f9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.349359] ffff0008074f9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.356559] ================================================================== [ 47.688890] ================================================================== [ 47.695725] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 47.702055] Read of size 1 at addr ffff0008074f9100 by task kunit_try_catch/280 [ 47.709347] [ 47.710833] CPU: 2 UID: 0 PID: 280 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 47.710886] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.710904] Hardware name: WinLink E850-96 board (DT) [ 47.710923] Call trace: [ 47.710938] show_stack+0x20/0x38 (C) [ 47.710973] dump_stack_lvl+0x8c/0xd0 [ 47.711007] print_report+0x118/0x5d0 [ 47.711035] kasan_report+0xdc/0x128 [ 47.711063] __asan_report_load1_noabort+0x20/0x30 [ 47.711096] ksize_uaf+0x598/0x5f8 [ 47.711125] kunit_try_run_case+0x170/0x3f0 [ 47.711159] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.711192] kthread+0x328/0x630 [ 47.711222] ret_from_fork+0x10/0x20 [ 47.711257] [ 47.774102] Allocated by task 280: [ 47.777490] kasan_save_stack+0x3c/0x68 [ 47.781307] kasan_save_track+0x20/0x40 [ 47.785127] kasan_save_alloc_info+0x40/0x58 [ 47.789380] __kasan_kmalloc+0xd4/0xd8 [ 47.793113] __kmalloc_cache_noprof+0x16c/0x3c0 [ 47.797626] ksize_uaf+0xb8/0x5f8 [ 47.800925] kunit_try_run_case+0x170/0x3f0 [ 47.805092] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.810562] kthread+0x328/0x630 [ 47.813772] ret_from_fork+0x10/0x20 [ 47.817331] [ 47.818807] Freed by task 280: [ 47.821845] kasan_save_stack+0x3c/0x68 [ 47.825665] kasan_save_track+0x20/0x40 [ 47.829484] kasan_save_free_info+0x4c/0x78 [ 47.833649] __kasan_slab_free+0x6c/0x98 [ 47.837557] kfree+0x214/0x3c8 [ 47.840595] ksize_uaf+0x11c/0x5f8 [ 47.843980] kunit_try_run_case+0x170/0x3f0 [ 47.848147] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.853615] kthread+0x328/0x630 [ 47.856829] ret_from_fork+0x10/0x20 [ 47.860386] [ 47.861863] The buggy address belongs to the object at ffff0008074f9100 [ 47.861863] which belongs to the cache kmalloc-128 of size 128 [ 47.874366] The buggy address is located 0 bytes inside of [ 47.874366] freed 128-byte region [ffff0008074f9100, ffff0008074f9180) [ 47.886427] [ 47.887906] The buggy address belongs to the physical page: [ 47.893463] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8874f8 [ 47.901445] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 47.909085] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 47.916028] page_type: f5(slab) [ 47.919166] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 47.926885] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.934611] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 47.942423] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.950236] head: 0bfffe0000000001 fffffdffe01d3e01 00000000ffffffff 00000000ffffffff [ 47.958048] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 47.965853] page dumped because: kasan: bad access detected [ 47.971409] [ 47.972884] Memory state around the buggy address: [ 47.977664] ffff0008074f9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 47.984867] ffff0008074f9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.992073] >ffff0008074f9100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 47.999273] ^ [ 48.002488] ffff0008074f9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.009694] ffff0008074f9200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.016894] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 47.046004] ================================================================== [ 47.053110] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 47.060488] Read of size 1 at addr ffff0008019add7f by task kunit_try_catch/278 [ 47.067779] [ 47.069260] CPU: 3 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 47.069314] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.069331] Hardware name: WinLink E850-96 board (DT) [ 47.069349] Call trace: [ 47.069362] show_stack+0x20/0x38 (C) [ 47.069397] dump_stack_lvl+0x8c/0xd0 [ 47.069431] print_report+0x118/0x5d0 [ 47.069459] kasan_report+0xdc/0x128 [ 47.069485] __asan_report_load1_noabort+0x20/0x30 [ 47.069519] ksize_unpoisons_memory+0x690/0x740 [ 47.069554] kunit_try_run_case+0x170/0x3f0 [ 47.069587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.069619] kthread+0x328/0x630 [ 47.069645] ret_from_fork+0x10/0x20 [ 47.069677] [ 47.133661] Allocated by task 278: [ 47.137048] kasan_save_stack+0x3c/0x68 [ 47.140866] kasan_save_track+0x20/0x40 [ 47.144685] kasan_save_alloc_info+0x40/0x58 [ 47.148939] __kasan_kmalloc+0xd4/0xd8 [ 47.152671] __kmalloc_cache_noprof+0x16c/0x3c0 [ 47.157185] ksize_unpoisons_memory+0xc0/0x740 [ 47.161611] kunit_try_run_case+0x170/0x3f0 [ 47.165779] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.171247] kthread+0x328/0x630 [ 47.174459] ret_from_fork+0x10/0x20 [ 47.178018] [ 47.179495] The buggy address belongs to the object at ffff0008019add00 [ 47.179495] which belongs to the cache kmalloc-128 of size 128 [ 47.191996] The buggy address is located 12 bytes to the right of [ 47.191996] allocated 115-byte region [ffff0008019add00, ffff0008019add73) [ 47.205014] [ 47.206492] The buggy address belongs to the physical page: [ 47.212051] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8819ac [ 47.220032] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 47.227673] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 47.234615] page_type: f5(slab) [ 47.237751] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 47.245472] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.253198] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 47.261009] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.268822] head: 0bfffe0000000001 fffffdffe0066b01 00000000ffffffff 00000000ffffffff [ 47.276634] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 47.284440] page dumped because: kasan: bad access detected [ 47.289995] [ 47.291471] Memory state around the buggy address: [ 47.296252] ffff0008019adc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 47.303454] ffff0008019adc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.310659] >ffff0008019add00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 47.317860] ^ [ 47.324981] ffff0008019add80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.332187] ffff0008019ade00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.339389] ================================================================== [ 46.745408] ================================================================== [ 46.752508] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 46.759882] Read of size 1 at addr ffff0008019add78 by task kunit_try_catch/278 [ 46.767174] [ 46.768660] CPU: 3 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 46.768714] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.768731] Hardware name: WinLink E850-96 board (DT) [ 46.768751] Call trace: [ 46.768764] show_stack+0x20/0x38 (C) [ 46.768796] dump_stack_lvl+0x8c/0xd0 [ 46.768827] print_report+0x118/0x5d0 [ 46.768855] kasan_report+0xdc/0x128 [ 46.768882] __asan_report_load1_noabort+0x20/0x30 [ 46.768913] ksize_unpoisons_memory+0x618/0x740 [ 46.768947] kunit_try_run_case+0x170/0x3f0 [ 46.768983] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.769014] kthread+0x328/0x630 [ 46.769042] ret_from_fork+0x10/0x20 [ 46.769077] [ 46.833058] Allocated by task 278: [ 46.836443] kasan_save_stack+0x3c/0x68 [ 46.840263] kasan_save_track+0x20/0x40 [ 46.844082] kasan_save_alloc_info+0x40/0x58 [ 46.848335] __kasan_kmalloc+0xd4/0xd8 [ 46.852068] __kmalloc_cache_noprof+0x16c/0x3c0 [ 46.856582] ksize_unpoisons_memory+0xc0/0x740 [ 46.861009] kunit_try_run_case+0x170/0x3f0 [ 46.865175] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.870644] kthread+0x328/0x630 [ 46.873856] ret_from_fork+0x10/0x20 [ 46.877415] [ 46.878890] The buggy address belongs to the object at ffff0008019add00 [ 46.878890] which belongs to the cache kmalloc-128 of size 128 [ 46.891393] The buggy address is located 5 bytes to the right of [ 46.891393] allocated 115-byte region [ffff0008019add00, ffff0008019add73) [ 46.904324] [ 46.905802] The buggy address belongs to the physical page: [ 46.911358] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8819ac [ 46.919342] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 46.926983] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 46.933926] page_type: f5(slab) [ 46.937059] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 46.944782] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 46.952508] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 46.960319] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 46.968132] head: 0bfffe0000000001 fffffdffe0066b01 00000000ffffffff 00000000ffffffff [ 46.975944] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 46.983750] page dumped because: kasan: bad access detected [ 46.989305] [ 46.990781] Memory state around the buggy address: [ 46.995562] ffff0008019adc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 47.002764] ffff0008019adc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.009969] >ffff0008019add00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 47.017169] ^ [ 47.024291] ffff0008019add80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.031497] ffff0008019ade00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.038697] ================================================================== [ 46.442373] ================================================================== [ 46.452166] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 46.459540] Read of size 1 at addr ffff0008019add73 by task kunit_try_catch/278 [ 46.466832] [ 46.468316] CPU: 3 UID: 0 PID: 278 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 46.468371] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.468388] Hardware name: WinLink E850-96 board (DT) [ 46.468408] Call trace: [ 46.468420] show_stack+0x20/0x38 (C) [ 46.468455] dump_stack_lvl+0x8c/0xd0 [ 46.468488] print_report+0x118/0x5d0 [ 46.468517] kasan_report+0xdc/0x128 [ 46.468545] __asan_report_load1_noabort+0x20/0x30 [ 46.468580] ksize_unpoisons_memory+0x628/0x740 [ 46.468612] kunit_try_run_case+0x170/0x3f0 [ 46.468648] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.468681] kthread+0x328/0x630 [ 46.468712] ret_from_fork+0x10/0x20 [ 46.468746] [ 46.532715] Allocated by task 278: [ 46.536104] kasan_save_stack+0x3c/0x68 [ 46.539920] kasan_save_track+0x20/0x40 [ 46.543739] kasan_save_alloc_info+0x40/0x58 [ 46.547993] __kasan_kmalloc+0xd4/0xd8 [ 46.551727] __kmalloc_cache_noprof+0x16c/0x3c0 [ 46.556239] ksize_unpoisons_memory+0xc0/0x740 [ 46.560667] kunit_try_run_case+0x170/0x3f0 [ 46.564833] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.570301] kthread+0x328/0x630 [ 46.573513] ret_from_fork+0x10/0x20 [ 46.577075] [ 46.578551] The buggy address belongs to the object at ffff0008019add00 [ 46.578551] which belongs to the cache kmalloc-128 of size 128 [ 46.591051] The buggy address is located 0 bytes to the right of [ 46.591051] allocated 115-byte region [ffff0008019add00, ffff0008019add73) [ 46.603981] [ 46.605459] The buggy address belongs to the physical page: [ 46.611018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8819ac [ 46.619001] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 46.626641] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 46.633584] page_type: f5(slab) [ 46.636720] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 46.644439] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 46.652165] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 46.659977] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 46.667790] head: 0bfffe0000000001 fffffdffe0066b01 00000000ffffffff 00000000ffffffff [ 46.675602] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 46.683410] page dumped because: kasan: bad access detected [ 46.688963] [ 46.690438] Memory state around the buggy address: [ 46.695220] ffff0008019adc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 46.702421] ffff0008019adc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.709625] >ffff0008019add00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 46.716827] ^ [ 46.723688] ffff0008019add80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.730894] ffff0008019ade00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.738095] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive
[ 46.126271] ================================================================== [ 46.133245] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 46.139231] Free of addr ffff000802fe65c0 by task kunit_try_catch/276 [ 46.145655] [ 46.147139] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 46.147195] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.147213] Hardware name: WinLink E850-96 board (DT) [ 46.147234] Call trace: [ 46.147247] show_stack+0x20/0x38 (C) [ 46.147280] dump_stack_lvl+0x8c/0xd0 [ 46.147311] print_report+0x118/0x5d0 [ 46.147339] kasan_report_invalid_free+0xc0/0xe8 [ 46.147369] check_slab_allocation+0xd4/0x108 [ 46.147406] __kasan_slab_pre_free+0x2c/0x48 [ 46.147441] kfree+0xe8/0x3c8 [ 46.147473] kfree_sensitive+0x3c/0xb0 [ 46.147507] kmalloc_double_kzfree+0x168/0x308 [ 46.147540] kunit_try_run_case+0x170/0x3f0 [ 46.147576] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.147609] kthread+0x328/0x630 [ 46.147638] ret_from_fork+0x10/0x20 [ 46.147675] [ 46.222997] Allocated by task 276: [ 46.226385] kasan_save_stack+0x3c/0x68 [ 46.230202] kasan_save_track+0x20/0x40 [ 46.234023] kasan_save_alloc_info+0x40/0x58 [ 46.238275] __kasan_kmalloc+0xd4/0xd8 [ 46.242008] __kmalloc_cache_noprof+0x16c/0x3c0 [ 46.246521] kmalloc_double_kzfree+0xb8/0x308 [ 46.250862] kunit_try_run_case+0x170/0x3f0 [ 46.255028] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.260497] kthread+0x328/0x630 [ 46.263709] ret_from_fork+0x10/0x20 [ 46.267268] [ 46.268743] Freed by task 276: [ 46.271783] kasan_save_stack+0x3c/0x68 [ 46.275601] kasan_save_track+0x20/0x40 [ 46.279420] kasan_save_free_info+0x4c/0x78 [ 46.283587] __kasan_slab_free+0x6c/0x98 [ 46.287494] kfree+0x214/0x3c8 [ 46.290531] kfree_sensitive+0x80/0xb0 [ 46.294264] kmalloc_double_kzfree+0x11c/0x308 [ 46.298691] kunit_try_run_case+0x170/0x3f0 [ 46.302857] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.308326] kthread+0x328/0x630 [ 46.311538] ret_from_fork+0x10/0x20 [ 46.315097] [ 46.316574] The buggy address belongs to the object at ffff000802fe65c0 [ 46.316574] which belongs to the cache kmalloc-16 of size 16 [ 46.328899] The buggy address is located 0 bytes inside of [ 46.328899] 16-byte region [ffff000802fe65c0, ffff000802fe65d0) [ 46.340357] [ 46.341835] The buggy address belongs to the physical page: [ 46.347392] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882fe6 [ 46.355378] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.361886] page_type: f5(slab) [ 46.365021] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 46.372742] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 46.380462] page dumped because: kasan: bad access detected [ 46.386016] [ 46.387491] Memory state around the buggy address: [ 46.392271] ffff000802fe6480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 46.399474] ffff000802fe6500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 46.406679] >ffff000802fe6580: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc [ 46.413880] ^ [ 46.419180] ffff000802fe6600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.426383] ffff000802fe6680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.433585] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[ 45.810611] ================================================================== [ 45.824314] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 45.831686] Read of size 1 at addr ffff000802fe65c0 by task kunit_try_catch/276 [ 45.838976] [ 45.840462] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 45.840518] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.840536] Hardware name: WinLink E850-96 board (DT) [ 45.840558] Call trace: [ 45.840572] show_stack+0x20/0x38 (C) [ 45.840607] dump_stack_lvl+0x8c/0xd0 [ 45.840639] print_report+0x118/0x5d0 [ 45.840668] kasan_report+0xdc/0x128 [ 45.840695] __kasan_check_byte+0x54/0x70 [ 45.840722] kfree_sensitive+0x30/0xb0 [ 45.840760] kmalloc_double_kzfree+0x168/0x308 [ 45.840794] kunit_try_run_case+0x170/0x3f0 [ 45.840834] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.840869] kthread+0x328/0x630 [ 45.840898] ret_from_fork+0x10/0x20 [ 45.840933] [ 45.907726] Allocated by task 276: [ 45.911114] kasan_save_stack+0x3c/0x68 [ 45.914929] kasan_save_track+0x20/0x40 [ 45.918750] kasan_save_alloc_info+0x40/0x58 [ 45.923002] __kasan_kmalloc+0xd4/0xd8 [ 45.926735] __kmalloc_cache_noprof+0x16c/0x3c0 [ 45.931248] kmalloc_double_kzfree+0xb8/0x308 [ 45.935589] kunit_try_run_case+0x170/0x3f0 [ 45.939756] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.945224] kthread+0x328/0x630 [ 45.948436] ret_from_fork+0x10/0x20 [ 45.951996] [ 45.953471] Freed by task 276: [ 45.956510] kasan_save_stack+0x3c/0x68 [ 45.960328] kasan_save_track+0x20/0x40 [ 45.964149] kasan_save_free_info+0x4c/0x78 [ 45.968314] __kasan_slab_free+0x6c/0x98 [ 45.972222] kfree+0x214/0x3c8 [ 45.975258] kfree_sensitive+0x80/0xb0 [ 45.978991] kmalloc_double_kzfree+0x11c/0x308 [ 45.983418] kunit_try_run_case+0x170/0x3f0 [ 45.987585] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.993053] kthread+0x328/0x630 [ 45.996265] ret_from_fork+0x10/0x20 [ 45.999824] [ 46.001301] The buggy address belongs to the object at ffff000802fe65c0 [ 46.001301] which belongs to the cache kmalloc-16 of size 16 [ 46.013626] The buggy address is located 0 bytes inside of [ 46.013626] freed 16-byte region [ffff000802fe65c0, ffff000802fe65d0) [ 46.025604] [ 46.027083] The buggy address belongs to the physical page: [ 46.032640] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882fe6 [ 46.040625] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.047135] page_type: f5(slab) [ 46.050271] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 46.057992] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 46.065711] page dumped because: kasan: bad access detected [ 46.071264] [ 46.072741] Memory state around the buggy address: [ 46.077520] ffff000802fe6480: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 46.084722] ffff000802fe6500: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 46.091927] >ffff000802fe6580: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc [ 46.099129] ^ [ 46.104428] ffff000802fe6600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.111631] ffff000802fe6680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.118835] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[ 45.505679] ================================================================== [ 45.515289] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 45.521881] Read of size 1 at addr ffff000804a478a8 by task kunit_try_catch/272 [ 45.529171] [ 45.530657] CPU: 2 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 45.530714] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.530731] Hardware name: WinLink E850-96 board (DT) [ 45.530753] Call trace: [ 45.530765] show_stack+0x20/0x38 (C) [ 45.530801] dump_stack_lvl+0x8c/0xd0 [ 45.530832] print_report+0x118/0x5d0 [ 45.530860] kasan_report+0xdc/0x128 [ 45.530888] __asan_report_load1_noabort+0x20/0x30 [ 45.530922] kmalloc_uaf2+0x3f4/0x468 [ 45.530952] kunit_try_run_case+0x170/0x3f0 [ 45.530991] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.531022] kthread+0x328/0x630 [ 45.531052] ret_from_fork+0x10/0x20 [ 45.531086] [ 45.594189] Allocated by task 272: [ 45.597576] kasan_save_stack+0x3c/0x68 [ 45.601393] kasan_save_track+0x20/0x40 [ 45.605213] kasan_save_alloc_info+0x40/0x58 [ 45.609465] __kasan_kmalloc+0xd4/0xd8 [ 45.613197] __kmalloc_cache_noprof+0x16c/0x3c0 [ 45.617711] kmalloc_uaf2+0xc4/0x468 [ 45.621271] kunit_try_run_case+0x170/0x3f0 [ 45.625437] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.630906] kthread+0x328/0x630 [ 45.634118] ret_from_fork+0x10/0x20 [ 45.637677] [ 45.639153] Freed by task 272: [ 45.642190] kasan_save_stack+0x3c/0x68 [ 45.646009] kasan_save_track+0x20/0x40 [ 45.649829] kasan_save_free_info+0x4c/0x78 [ 45.653996] __kasan_slab_free+0x6c/0x98 [ 45.657902] kfree+0x214/0x3c8 [ 45.660940] kmalloc_uaf2+0x134/0x468 [ 45.664586] kunit_try_run_case+0x170/0x3f0 [ 45.668753] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.674221] kthread+0x328/0x630 [ 45.677433] ret_from_fork+0x10/0x20 [ 45.680992] [ 45.682469] The buggy address belongs to the object at ffff000804a47880 [ 45.682469] which belongs to the cache kmalloc-64 of size 64 [ 45.694797] The buggy address is located 40 bytes inside of [ 45.694797] freed 64-byte region [ffff000804a47880, ffff000804a478c0) [ 45.706859] [ 45.708337] The buggy address belongs to the physical page: [ 45.713895] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884a47 [ 45.721879] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 45.728390] page_type: f5(slab) [ 45.731525] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 45.739244] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 45.746964] page dumped because: kasan: bad access detected [ 45.752519] [ 45.753995] Memory state around the buggy address: [ 45.758774] ffff000804a47780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 45.765977] ffff000804a47800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 45.773182] >ffff000804a47880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 45.780382] ^ [ 45.784900] ffff000804a47900: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 45.792105] ffff000804a47980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.799307] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 45.200165] ================================================================== [ 45.209217] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 45.216331] Write of size 33 at addr ffff000807bb4c00 by task kunit_try_catch/270 [ 45.223794] [ 45.225280] CPU: 3 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 45.225337] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.225354] Hardware name: WinLink E850-96 board (DT) [ 45.225375] Call trace: [ 45.225388] show_stack+0x20/0x38 (C) [ 45.225422] dump_stack_lvl+0x8c/0xd0 [ 45.225453] print_report+0x118/0x5d0 [ 45.225479] kasan_report+0xdc/0x128 [ 45.225503] kasan_check_range+0x100/0x1a8 [ 45.225531] __asan_memset+0x34/0x78 [ 45.225560] kmalloc_uaf_memset+0x170/0x310 [ 45.225589] kunit_try_run_case+0x170/0x3f0 [ 45.225625] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.225654] kthread+0x328/0x630 [ 45.225685] ret_from_fork+0x10/0x20 [ 45.225720] [ 45.292195] Allocated by task 270: [ 45.295583] kasan_save_stack+0x3c/0x68 [ 45.299400] kasan_save_track+0x20/0x40 [ 45.303220] kasan_save_alloc_info+0x40/0x58 [ 45.307475] __kasan_kmalloc+0xd4/0xd8 [ 45.311206] __kmalloc_cache_noprof+0x16c/0x3c0 [ 45.315719] kmalloc_uaf_memset+0xb8/0x310 [ 45.319799] kunit_try_run_case+0x170/0x3f0 [ 45.323966] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.329434] kthread+0x328/0x630 [ 45.332646] ret_from_fork+0x10/0x20 [ 45.336205] [ 45.337681] Freed by task 270: [ 45.340720] kasan_save_stack+0x3c/0x68 [ 45.344539] kasan_save_track+0x20/0x40 [ 45.348358] kasan_save_free_info+0x4c/0x78 [ 45.352524] __kasan_slab_free+0x6c/0x98 [ 45.356431] kfree+0x214/0x3c8 [ 45.359469] kmalloc_uaf_memset+0x11c/0x310 [ 45.363635] kunit_try_run_case+0x170/0x3f0 [ 45.367802] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.373272] kthread+0x328/0x630 [ 45.376483] ret_from_fork+0x10/0x20 [ 45.380041] [ 45.381518] The buggy address belongs to the object at ffff000807bb4c00 [ 45.381518] which belongs to the cache kmalloc-64 of size 64 [ 45.393847] The buggy address is located 0 bytes inside of [ 45.393847] freed 64-byte region [ffff000807bb4c00, ffff000807bb4c40) [ 45.405822] [ 45.407301] The buggy address belongs to the physical page: [ 45.412858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887bb4 [ 45.420843] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 45.427353] page_type: f5(slab) [ 45.430488] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 45.438207] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 45.445927] page dumped because: kasan: bad access detected [ 45.451481] [ 45.452957] Memory state around the buggy address: [ 45.457738] ffff000807bb4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 45.464940] ffff000807bb4b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 45.472145] >ffff000807bb4c00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 45.479346] ^ [ 45.482561] ffff000807bb4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.489766] ffff000807bb4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.496968] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[ 44.897589] ================================================================== [ 44.907917] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 44.914424] Read of size 1 at addr ffff000804b5a0a8 by task kunit_try_catch/268 [ 44.921715] [ 44.923202] CPU: 2 UID: 0 PID: 268 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 44.923263] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.923280] Hardware name: WinLink E850-96 board (DT) [ 44.923299] Call trace: [ 44.923312] show_stack+0x20/0x38 (C) [ 44.923348] dump_stack_lvl+0x8c/0xd0 [ 44.923380] print_report+0x118/0x5d0 [ 44.923409] kasan_report+0xdc/0x128 [ 44.923436] __asan_report_load1_noabort+0x20/0x30 [ 44.923470] kmalloc_uaf+0x300/0x338 [ 44.923499] kunit_try_run_case+0x170/0x3f0 [ 44.923540] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.923572] kthread+0x328/0x630 [ 44.923600] ret_from_fork+0x10/0x20 [ 44.923636] [ 44.986646] Allocated by task 268: [ 44.990034] kasan_save_stack+0x3c/0x68 [ 44.993849] kasan_save_track+0x20/0x40 [ 44.997670] kasan_save_alloc_info+0x40/0x58 [ 45.001922] __kasan_kmalloc+0xd4/0xd8 [ 45.005655] __kmalloc_cache_noprof+0x16c/0x3c0 [ 45.010169] kmalloc_uaf+0xb8/0x338 [ 45.013641] kunit_try_run_case+0x170/0x3f0 [ 45.017807] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.023276] kthread+0x328/0x630 [ 45.026488] ret_from_fork+0x10/0x20 [ 45.030047] [ 45.031525] Freed by task 268: [ 45.034562] kasan_save_stack+0x3c/0x68 [ 45.038380] kasan_save_track+0x20/0x40 [ 45.042199] kasan_save_free_info+0x4c/0x78 [ 45.046366] __kasan_slab_free+0x6c/0x98 [ 45.050272] kfree+0x214/0x3c8 [ 45.053310] kmalloc_uaf+0x11c/0x338 [ 45.056869] kunit_try_run_case+0x170/0x3f0 [ 45.061036] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.066504] kthread+0x328/0x630 [ 45.069717] ret_from_fork+0x10/0x20 [ 45.073275] [ 45.074752] The buggy address belongs to the object at ffff000804b5a0a0 [ 45.074752] which belongs to the cache kmalloc-16 of size 16 [ 45.087080] The buggy address is located 8 bytes inside of [ 45.087080] freed 16-byte region [ffff000804b5a0a0, ffff000804b5a0b0) [ 45.099056] [ 45.100534] The buggy address belongs to the physical page: [ 45.106092] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884b5a [ 45.114076] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 45.120587] page_type: f5(slab) [ 45.123721] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 45.131441] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 45.139162] page dumped because: kasan: bad access detected [ 45.144715] [ 45.146192] Memory state around the buggy address: [ 45.150970] ffff000804b59f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 45.158175] ffff000804b5a000: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 45.165378] >ffff000804b5a080: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 45.172579] ^ [ 45.177097] ffff000804b5a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.184302] ffff000804b5a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.191505] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 44.629385] ================================================================== [ 44.639865] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0 [ 44.647761] Read of size 64 at addr ffff000804a47804 by task kunit_try_catch/266 [ 44.655139] [ 44.656625] CPU: 2 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 44.656679] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.656699] Hardware name: WinLink E850-96 board (DT) [ 44.656721] Call trace: [ 44.656733] show_stack+0x20/0x38 (C) [ 44.656766] dump_stack_lvl+0x8c/0xd0 [ 44.656797] print_report+0x118/0x5d0 [ 44.656825] kasan_report+0xdc/0x128 [ 44.656852] kasan_check_range+0x100/0x1a8 [ 44.656882] __asan_memmove+0x3c/0x98 [ 44.656913] kmalloc_memmove_invalid_size+0x154/0x2e0 [ 44.656950] kunit_try_run_case+0x170/0x3f0 [ 44.656987] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.657020] kthread+0x328/0x630 [ 44.657049] ret_from_fork+0x10/0x20 [ 44.657083] [ 44.724497] Allocated by task 266: [ 44.727885] kasan_save_stack+0x3c/0x68 [ 44.731700] kasan_save_track+0x20/0x40 [ 44.735520] kasan_save_alloc_info+0x40/0x58 [ 44.739773] __kasan_kmalloc+0xd4/0xd8 [ 44.743506] __kmalloc_cache_noprof+0x16c/0x3c0 [ 44.748020] kmalloc_memmove_invalid_size+0xb0/0x2e0 [ 44.752969] kunit_try_run_case+0x170/0x3f0 [ 44.757134] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.762603] kthread+0x328/0x630 [ 44.765815] ret_from_fork+0x10/0x20 [ 44.769375] [ 44.770850] The buggy address belongs to the object at ffff000804a47800 [ 44.770850] which belongs to the cache kmalloc-64 of size 64 [ 44.783179] The buggy address is located 4 bytes inside of [ 44.783179] allocated 64-byte region [ffff000804a47800, ffff000804a47840) [ 44.795501] [ 44.796980] The buggy address belongs to the physical page: [ 44.802537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884a47 [ 44.810521] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 44.817032] page_type: f5(slab) [ 44.820167] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 44.827886] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 44.835605] page dumped because: kasan: bad access detected [ 44.841161] [ 44.842636] Memory state around the buggy address: [ 44.847416] ffff000804a47700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 44.854619] ffff000804a47780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 44.861825] >ffff000804a47800: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 44.869025] ^ [ 44.874324] ffff000804a47880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.881528] ffff000804a47900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.888731] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 44.363605] ================================================================== [ 44.373289] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 44.380838] Read of size 18446744073709551614 at addr ffff000807bb4b84 by task kunit_try_catch/264 [ 44.389779] [ 44.391265] CPU: 3 UID: 0 PID: 264 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 44.391319] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.391335] Hardware name: WinLink E850-96 board (DT) [ 44.391354] Call trace: [ 44.391368] show_stack+0x20/0x38 (C) [ 44.391402] dump_stack_lvl+0x8c/0xd0 [ 44.391436] print_report+0x118/0x5d0 [ 44.391463] kasan_report+0xdc/0x128 [ 44.391491] kasan_check_range+0x100/0x1a8 [ 44.391521] __asan_memmove+0x3c/0x98 [ 44.391552] kmalloc_memmove_negative_size+0x154/0x2e0 [ 44.391587] kunit_try_run_case+0x170/0x3f0 [ 44.391625] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.391656] kthread+0x328/0x630 [ 44.391685] ret_from_fork+0x10/0x20 [ 44.391717] [ 44.459224] Allocated by task 264: [ 44.462610] kasan_save_stack+0x3c/0x68 [ 44.466427] kasan_save_track+0x20/0x40 [ 44.470246] kasan_save_alloc_info+0x40/0x58 [ 44.474499] __kasan_kmalloc+0xd4/0xd8 [ 44.478232] __kmalloc_cache_noprof+0x16c/0x3c0 [ 44.482746] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 44.487781] kunit_try_run_case+0x170/0x3f0 [ 44.491947] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.497416] kthread+0x328/0x630 [ 44.500627] ret_from_fork+0x10/0x20 [ 44.504187] [ 44.505664] The buggy address belongs to the object at ffff000807bb4b80 [ 44.505664] which belongs to the cache kmalloc-64 of size 64 [ 44.517991] The buggy address is located 4 bytes inside of [ 44.517991] 64-byte region [ffff000807bb4b80, ffff000807bb4bc0) [ 44.529446] [ 44.530924] The buggy address belongs to the physical page: [ 44.536482] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887bb4 [ 44.544466] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 44.550977] page_type: f5(slab) [ 44.554112] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 44.561831] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 44.569550] page dumped because: kasan: bad access detected [ 44.575106] [ 44.576583] Memory state around the buggy address: [ 44.581362] ffff000807bb4a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 44.588564] ffff000807bb4b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 44.595770] >ffff000807bb4b80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 44.602970] ^ [ 44.606186] ffff000807bb4c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.613390] ffff000807bb4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.620592] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[ 44.056329] ================================================================== [ 44.066090] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 44.073379] Write of size 16 at addr ffff0008074f9069 by task kunit_try_catch/262 [ 44.080844] [ 44.082329] CPU: 2 UID: 0 PID: 262 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 44.082384] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.082398] Hardware name: WinLink E850-96 board (DT) [ 44.082417] Call trace: [ 44.082429] show_stack+0x20/0x38 (C) [ 44.082465] dump_stack_lvl+0x8c/0xd0 [ 44.082496] print_report+0x118/0x5d0 [ 44.082524] kasan_report+0xdc/0x128 [ 44.082551] kasan_check_range+0x100/0x1a8 [ 44.082581] __asan_memset+0x34/0x78 [ 44.082613] kmalloc_oob_memset_16+0x150/0x2f8 [ 44.082645] kunit_try_run_case+0x170/0x3f0 [ 44.082680] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.082711] kthread+0x328/0x630 [ 44.082738] ret_from_fork+0x10/0x20 [ 44.082774] [ 44.149506] Allocated by task 262: [ 44.152892] kasan_save_stack+0x3c/0x68 [ 44.156709] kasan_save_track+0x20/0x40 [ 44.160529] kasan_save_alloc_info+0x40/0x58 [ 44.164782] __kasan_kmalloc+0xd4/0xd8 [ 44.168514] __kmalloc_cache_noprof+0x16c/0x3c0 [ 44.173028] kmalloc_oob_memset_16+0xb0/0x2f8 [ 44.177370] kunit_try_run_case+0x170/0x3f0 [ 44.181535] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.187004] kthread+0x328/0x630 [ 44.190215] ret_from_fork+0x10/0x20 [ 44.193774] [ 44.195253] The buggy address belongs to the object at ffff0008074f9000 [ 44.195253] which belongs to the cache kmalloc-128 of size 128 [ 44.207753] The buggy address is located 105 bytes inside of [ 44.207753] allocated 120-byte region [ffff0008074f9000, ffff0008074f9078) [ 44.220337] [ 44.221814] The buggy address belongs to the physical page: [ 44.227372] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8874f8 [ 44.235355] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 44.242996] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 44.249940] page_type: f5(slab) [ 44.253076] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 44.260794] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 44.268521] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 44.276332] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 44.284145] head: 0bfffe0000000001 fffffdffe01d3e01 00000000ffffffff 00000000ffffffff [ 44.291957] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 44.299764] page dumped because: kasan: bad access detected [ 44.305318] [ 44.306793] Memory state around the buggy address: [ 44.311575] ffff0008074f8f00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 44.318776] ffff0008074f8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.325983] >ffff0008074f9000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 44.333182] ^ [ 44.340304] ffff0008074f9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.347509] ffff0008074f9100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.354711] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[ 43.749495] ================================================================== [ 43.759327] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 43.766527] Write of size 8 at addr ffff0008019adc71 by task kunit_try_catch/260 [ 43.773903] [ 43.775389] CPU: 3 UID: 0 PID: 260 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 43.775444] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.775461] Hardware name: WinLink E850-96 board (DT) [ 43.775482] Call trace: [ 43.775495] show_stack+0x20/0x38 (C) [ 43.775531] dump_stack_lvl+0x8c/0xd0 [ 43.775564] print_report+0x118/0x5d0 [ 43.775591] kasan_report+0xdc/0x128 [ 43.775620] kasan_check_range+0x100/0x1a8 [ 43.775650] __asan_memset+0x34/0x78 [ 43.775680] kmalloc_oob_memset_8+0x150/0x2f8 [ 43.775712] kunit_try_run_case+0x170/0x3f0 [ 43.775752] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.775783] kthread+0x328/0x630 [ 43.775813] ret_from_fork+0x10/0x20 [ 43.775847] [ 43.842479] Allocated by task 260: [ 43.845865] kasan_save_stack+0x3c/0x68 [ 43.849682] kasan_save_track+0x20/0x40 [ 43.853502] kasan_save_alloc_info+0x40/0x58 [ 43.857755] __kasan_kmalloc+0xd4/0xd8 [ 43.861488] __kmalloc_cache_noprof+0x16c/0x3c0 [ 43.866002] kmalloc_oob_memset_8+0xb0/0x2f8 [ 43.870255] kunit_try_run_case+0x170/0x3f0 [ 43.874421] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.879890] kthread+0x328/0x630 [ 43.883102] ret_from_fork+0x10/0x20 [ 43.886661] [ 43.888138] The buggy address belongs to the object at ffff0008019adc00 [ 43.888138] which belongs to the cache kmalloc-128 of size 128 [ 43.900640] The buggy address is located 113 bytes inside of [ 43.900640] allocated 120-byte region [ffff0008019adc00, ffff0008019adc78) [ 43.913223] [ 43.914701] The buggy address belongs to the physical page: [ 43.920259] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8819ac [ 43.928242] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 43.935882] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 43.942825] page_type: f5(slab) [ 43.945962] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 43.953681] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 43.961407] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 43.969218] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 43.977031] head: 0bfffe0000000001 fffffdffe0066b01 00000000ffffffff 00000000ffffffff [ 43.984843] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 43.992651] page dumped because: kasan: bad access detected [ 43.998205] [ 43.999680] Memory state around the buggy address: [ 44.004460] ffff0008019adb00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 44.011663] ffff0008019adb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.018871] >ffff0008019adc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 44.026069] ^ [ 44.033190] ffff0008019adc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.040395] ffff0008019add00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.047598] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[ 43.442916] ================================================================== [ 43.452558] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 43.459760] Write of size 4 at addr ffff0008074f8f75 by task kunit_try_catch/258 [ 43.467136] [ 43.468623] CPU: 2 UID: 0 PID: 258 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 43.468678] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.468694] Hardware name: WinLink E850-96 board (DT) [ 43.468715] Call trace: [ 43.468730] show_stack+0x20/0x38 (C) [ 43.468767] dump_stack_lvl+0x8c/0xd0 [ 43.468800] print_report+0x118/0x5d0 [ 43.468828] kasan_report+0xdc/0x128 [ 43.468853] kasan_check_range+0x100/0x1a8 [ 43.468882] __asan_memset+0x34/0x78 [ 43.468910] kmalloc_oob_memset_4+0x150/0x300 [ 43.468941] kunit_try_run_case+0x170/0x3f0 [ 43.468981] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.469013] kthread+0x328/0x630 [ 43.469041] ret_from_fork+0x10/0x20 [ 43.469074] [ 43.535713] Allocated by task 258: [ 43.539099] kasan_save_stack+0x3c/0x68 [ 43.542918] kasan_save_track+0x20/0x40 [ 43.546735] kasan_save_alloc_info+0x40/0x58 [ 43.550989] __kasan_kmalloc+0xd4/0xd8 [ 43.554722] __kmalloc_cache_noprof+0x16c/0x3c0 [ 43.559235] kmalloc_oob_memset_4+0xb0/0x300 [ 43.563490] kunit_try_run_case+0x170/0x3f0 [ 43.567656] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.573124] kthread+0x328/0x630 [ 43.576336] ret_from_fork+0x10/0x20 [ 43.579895] [ 43.581372] The buggy address belongs to the object at ffff0008074f8f00 [ 43.581372] which belongs to the cache kmalloc-128 of size 128 [ 43.593874] The buggy address is located 117 bytes inside of [ 43.593874] allocated 120-byte region [ffff0008074f8f00, ffff0008074f8f78) [ 43.606457] [ 43.607935] The buggy address belongs to the physical page: [ 43.613493] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8874f8 [ 43.621476] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 43.629116] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 43.636059] page_type: f5(slab) [ 43.639196] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 43.646915] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 43.654641] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 43.662453] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 43.670265] head: 0bfffe0000000001 fffffdffe01d3e01 00000000ffffffff 00000000ffffffff [ 43.678077] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 43.685884] page dumped because: kasan: bad access detected [ 43.691438] [ 43.692913] Memory state around the buggy address: [ 43.697695] ffff0008074f8e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 43.704896] ffff0008074f8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.712102] >ffff0008074f8f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 43.719302] ^ [ 43.726424] ffff0008074f8f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.733630] ffff0008074f9000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.740831] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[ 43.136024] ================================================================== [ 43.145792] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 43.152994] Write of size 2 at addr ffff0008074f8e77 by task kunit_try_catch/256 [ 43.160370] [ 43.161855] CPU: 2 UID: 0 PID: 256 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 43.161909] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.161925] Hardware name: WinLink E850-96 board (DT) [ 43.161945] Call trace: [ 43.161957] show_stack+0x20/0x38 (C) [ 43.161992] dump_stack_lvl+0x8c/0xd0 [ 43.162027] print_report+0x118/0x5d0 [ 43.162055] kasan_report+0xdc/0x128 [ 43.162081] kasan_check_range+0x100/0x1a8 [ 43.162110] __asan_memset+0x34/0x78 [ 43.162141] kmalloc_oob_memset_2+0x150/0x2f8 [ 43.162171] kunit_try_run_case+0x170/0x3f0 [ 43.162209] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.162241] kthread+0x328/0x630 [ 43.162270] ret_from_fork+0x10/0x20 [ 43.162305] [ 43.228947] Allocated by task 256: [ 43.232335] kasan_save_stack+0x3c/0x68 [ 43.236150] kasan_save_track+0x20/0x40 [ 43.239970] kasan_save_alloc_info+0x40/0x58 [ 43.244223] __kasan_kmalloc+0xd4/0xd8 [ 43.247956] __kmalloc_cache_noprof+0x16c/0x3c0 [ 43.252469] kmalloc_oob_memset_2+0xb0/0x2f8 [ 43.256723] kunit_try_run_case+0x170/0x3f0 [ 43.260889] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.266358] kthread+0x328/0x630 [ 43.269570] ret_from_fork+0x10/0x20 [ 43.273129] [ 43.274606] The buggy address belongs to the object at ffff0008074f8e00 [ 43.274606] which belongs to the cache kmalloc-128 of size 128 [ 43.287107] The buggy address is located 119 bytes inside of [ 43.287107] allocated 120-byte region [ffff0008074f8e00, ffff0008074f8e78) [ 43.299691] [ 43.301169] The buggy address belongs to the physical page: [ 43.306727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8874f8 [ 43.314710] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 43.322350] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 43.329293] page_type: f5(slab) [ 43.332429] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 43.340148] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 43.347876] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 43.355686] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 43.363499] head: 0bfffe0000000001 fffffdffe01d3e01 00000000ffffffff 00000000ffffffff [ 43.371311] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 43.379118] page dumped because: kasan: bad access detected [ 43.384672] [ 43.386149] Memory state around the buggy address: [ 43.390927] ffff0008074f8d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 43.398130] ffff0008074f8d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.405336] >ffff0008074f8e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 43.412536] ^ [ 43.419658] ffff0008074f8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.426862] ffff0008074f8f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.434064] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 42.829501] ================================================================== [ 42.838677] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 42.845967] Write of size 128 at addr ffff0008019adb00 by task kunit_try_catch/254 [ 42.853518] [ 42.855002] CPU: 3 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 42.855055] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.855071] Hardware name: WinLink E850-96 board (DT) [ 42.855091] Call trace: [ 42.855105] show_stack+0x20/0x38 (C) [ 42.855142] dump_stack_lvl+0x8c/0xd0 [ 42.855175] print_report+0x118/0x5d0 [ 42.855203] kasan_report+0xdc/0x128 [ 42.855228] kasan_check_range+0x100/0x1a8 [ 42.855258] __asan_memset+0x34/0x78 [ 42.855287] kmalloc_oob_in_memset+0x144/0x2d0 [ 42.855320] kunit_try_run_case+0x170/0x3f0 [ 42.855354] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.855386] kthread+0x328/0x630 [ 42.855417] ret_from_fork+0x10/0x20 [ 42.855451] [ 42.922180] Allocated by task 254: [ 42.925568] kasan_save_stack+0x3c/0x68 [ 42.929384] kasan_save_track+0x20/0x40 [ 42.933203] kasan_save_alloc_info+0x40/0x58 [ 42.937457] __kasan_kmalloc+0xd4/0xd8 [ 42.941189] __kmalloc_cache_noprof+0x16c/0x3c0 [ 42.945703] kmalloc_oob_in_memset+0xb0/0x2d0 [ 42.950045] kunit_try_run_case+0x170/0x3f0 [ 42.954211] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.959679] kthread+0x328/0x630 [ 42.962890] ret_from_fork+0x10/0x20 [ 42.966449] [ 42.967928] The buggy address belongs to the object at ffff0008019adb00 [ 42.967928] which belongs to the cache kmalloc-128 of size 128 [ 42.980428] The buggy address is located 0 bytes inside of [ 42.980428] allocated 120-byte region [ffff0008019adb00, ffff0008019adb78) [ 42.992838] [ 42.994317] The buggy address belongs to the physical page: [ 42.999874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8819ac [ 43.007857] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 43.015498] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 43.022439] page_type: f5(slab) [ 43.025576] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 43.033295] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 43.041022] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 43.048833] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 43.056646] head: 0bfffe0000000001 fffffdffe0066b01 00000000ffffffff 00000000ffffffff [ 43.064458] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 43.072265] page dumped because: kasan: bad access detected [ 43.077819] [ 43.079296] Memory state around the buggy address: [ 43.084076] ffff0008019ada00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 43.091277] ffff0008019ada80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.098482] >ffff0008019adb00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 43.105683] ^ [ 43.112805] ffff0008019adb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.120011] ffff0008019adc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.127212] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[ 42.527865] ================================================================== [ 42.537122] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 42.543888] Read of size 16 at addr ffff000804b5a080 by task kunit_try_catch/252 [ 42.551265] [ 42.552750] CPU: 2 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 42.552801] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.552819] Hardware name: WinLink E850-96 board (DT) [ 42.552839] Call trace: [ 42.552854] show_stack+0x20/0x38 (C) [ 42.552887] dump_stack_lvl+0x8c/0xd0 [ 42.552919] print_report+0x118/0x5d0 [ 42.552946] kasan_report+0xdc/0x128 [ 42.552973] __asan_report_load16_noabort+0x20/0x30 [ 42.553007] kmalloc_uaf_16+0x3bc/0x438 [ 42.553036] kunit_try_run_case+0x170/0x3f0 [ 42.553073] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.553105] kthread+0x328/0x630 [ 42.553135] ret_from_fork+0x10/0x20 [ 42.553168] [ 42.616542] Allocated by task 252: [ 42.619930] kasan_save_stack+0x3c/0x68 [ 42.623746] kasan_save_track+0x20/0x40 [ 42.627565] kasan_save_alloc_info+0x40/0x58 [ 42.631818] __kasan_kmalloc+0xd4/0xd8 [ 42.635552] __kmalloc_cache_noprof+0x16c/0x3c0 [ 42.640065] kmalloc_uaf_16+0x140/0x438 [ 42.643884] kunit_try_run_case+0x170/0x3f0 [ 42.648051] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.653521] kthread+0x328/0x630 [ 42.656731] ret_from_fork+0x10/0x20 [ 42.660291] [ 42.661766] Freed by task 252: [ 42.664805] kasan_save_stack+0x3c/0x68 [ 42.668624] kasan_save_track+0x20/0x40 [ 42.672445] kasan_save_free_info+0x4c/0x78 [ 42.676610] __kasan_slab_free+0x6c/0x98 [ 42.680516] kfree+0x214/0x3c8 [ 42.683554] kmalloc_uaf_16+0x190/0x438 [ 42.687374] kunit_try_run_case+0x170/0x3f0 [ 42.691540] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.697009] kthread+0x328/0x630 [ 42.700221] ret_from_fork+0x10/0x20 [ 42.703779] [ 42.705255] The buggy address belongs to the object at ffff000804b5a080 [ 42.705255] which belongs to the cache kmalloc-16 of size 16 [ 42.717585] The buggy address is located 0 bytes inside of [ 42.717585] freed 16-byte region [ffff000804b5a080, ffff000804b5a090) [ 42.729560] [ 42.731038] The buggy address belongs to the physical page: [ 42.736596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884b5a [ 42.744581] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.751091] page_type: f5(slab) [ 42.754226] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 42.761945] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 42.769666] page dumped because: kasan: bad access detected [ 42.775219] [ 42.776695] Memory state around the buggy address: [ 42.781477] ffff000804b59f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 42.788679] ffff000804b5a000: fa fb fc fc fa fb fc fc fa fb fc fc 00 00 fc fc [ 42.795883] >ffff000804b5a080: fa fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.803084] ^ [ 42.806299] ffff000804b5a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.813504] ffff000804b5a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.820706] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[ 42.267203] ================================================================== [ 42.276359] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 42.283041] Write of size 16 at addr ffff0008079d3ec0 by task kunit_try_catch/250 [ 42.290506] [ 42.291990] CPU: 3 UID: 0 PID: 250 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 42.292045] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.292061] Hardware name: WinLink E850-96 board (DT) [ 42.292081] Call trace: [ 42.292094] show_stack+0x20/0x38 (C) [ 42.292130] dump_stack_lvl+0x8c/0xd0 [ 42.292164] print_report+0x118/0x5d0 [ 42.292193] kasan_report+0xdc/0x128 [ 42.292224] __asan_report_store16_noabort+0x20/0x30 [ 42.292259] kmalloc_oob_16+0x3a0/0x3f8 [ 42.292288] kunit_try_run_case+0x170/0x3f0 [ 42.292324] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.292361] kthread+0x328/0x630 [ 42.292390] ret_from_fork+0x10/0x20 [ 42.292424] [ 42.355869] Allocated by task 250: [ 42.359258] kasan_save_stack+0x3c/0x68 [ 42.363073] kasan_save_track+0x20/0x40 [ 42.366892] kasan_save_alloc_info+0x40/0x58 [ 42.371146] __kasan_kmalloc+0xd4/0xd8 [ 42.374878] __kmalloc_cache_noprof+0x16c/0x3c0 [ 42.379392] kmalloc_oob_16+0xb4/0x3f8 [ 42.383125] kunit_try_run_case+0x170/0x3f0 [ 42.387291] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.392760] kthread+0x328/0x630 [ 42.395972] ret_from_fork+0x10/0x20 [ 42.399530] [ 42.401008] The buggy address belongs to the object at ffff0008079d3ec0 [ 42.401008] which belongs to the cache kmalloc-16 of size 16 [ 42.413336] The buggy address is located 0 bytes inside of [ 42.413336] allocated 13-byte region [ffff0008079d3ec0, ffff0008079d3ecd) [ 42.425659] [ 42.427137] The buggy address belongs to the physical page: [ 42.432694] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8879d3 [ 42.440679] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.447189] page_type: f5(slab) [ 42.450325] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 42.458043] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 42.465762] page dumped because: kasan: bad access detected [ 42.471318] [ 42.472795] Memory state around the buggy address: [ 42.477573] ffff0008079d3d80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 42.484777] ffff0008079d3e00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 42.491981] >ffff0008079d3e80: fa fb fc fc 00 05 fc fc 00 05 fc fc 00 00 fc fc [ 42.499182] ^ [ 42.504741] ffff0008079d3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.511946] ffff0008079d3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.519148] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 41.586779] ================================================================== [ 41.596682] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 41.603275] Read of size 1 at addr ffff0008042d2400 by task kunit_try_catch/248 [ 41.610567] [ 41.612051] CPU: 2 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 41.612100] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.612116] Hardware name: WinLink E850-96 board (DT) [ 41.612135] Call trace: [ 41.612148] show_stack+0x20/0x38 (C) [ 41.612184] dump_stack_lvl+0x8c/0xd0 [ 41.612217] print_report+0x118/0x5d0 [ 41.612242] kasan_report+0xdc/0x128 [ 41.612271] __kasan_check_byte+0x54/0x70 [ 41.612297] krealloc_noprof+0x44/0x360 [ 41.612335] krealloc_uaf+0x180/0x520 [ 41.612365] kunit_try_run_case+0x170/0x3f0 [ 41.612401] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.612434] kthread+0x328/0x630 [ 41.612464] ret_from_fork+0x10/0x20 [ 41.612497] [ 41.678623] Allocated by task 248: [ 41.682009] kasan_save_stack+0x3c/0x68 [ 41.685826] kasan_save_track+0x20/0x40 [ 41.689646] kasan_save_alloc_info+0x40/0x58 [ 41.693899] __kasan_kmalloc+0xd4/0xd8 [ 41.697631] __kmalloc_cache_noprof+0x16c/0x3c0 [ 41.702145] krealloc_uaf+0xc8/0x520 [ 41.705704] kunit_try_run_case+0x170/0x3f0 [ 41.709871] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.715339] kthread+0x328/0x630 [ 41.718552] ret_from_fork+0x10/0x20 [ 41.722110] [ 41.723587] Freed by task 248: [ 41.726624] kasan_save_stack+0x3c/0x68 [ 41.730443] kasan_save_track+0x20/0x40 [ 41.734263] kasan_save_free_info+0x4c/0x78 [ 41.738430] __kasan_slab_free+0x6c/0x98 [ 41.742337] kfree+0x214/0x3c8 [ 41.745374] krealloc_uaf+0x12c/0x520 [ 41.749020] kunit_try_run_case+0x170/0x3f0 [ 41.753186] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.758655] kthread+0x328/0x630 [ 41.761867] ret_from_fork+0x10/0x20 [ 41.765426] [ 41.766903] The buggy address belongs to the object at ffff0008042d2400 [ 41.766903] which belongs to the cache kmalloc-256 of size 256 [ 41.779404] The buggy address is located 0 bytes inside of [ 41.779404] freed 256-byte region [ffff0008042d2400, ffff0008042d2500) [ 41.791467] [ 41.792945] The buggy address belongs to the physical page: [ 41.798503] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8842d0 [ 41.806486] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 41.814126] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 41.821070] page_type: f5(slab) [ 41.824205] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 41.831924] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 41.839651] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 41.847462] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 41.855275] head: 0bfffe0000000002 fffffdffe010b401 00000000ffffffff 00000000ffffffff [ 41.863087] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 41.870893] page dumped because: kasan: bad access detected [ 41.876448] [ 41.877925] Memory state around the buggy address: [ 41.882705] ffff0008042d2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.889907] ffff0008042d2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.897111] >ffff0008042d2400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 41.904313] ^ [ 41.907528] ffff0008042d2480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 41.914732] ffff0008042d2500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.921935] ================================================================== [ 41.929346] ================================================================== [ 41.936348] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 41.942941] Read of size 1 at addr ffff0008042d2400 by task kunit_try_catch/248 [ 41.950232] [ 41.951717] CPU: 2 UID: 0 PID: 248 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 41.951768] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.951782] Hardware name: WinLink E850-96 board (DT) [ 41.951801] Call trace: [ 41.951814] show_stack+0x20/0x38 (C) [ 41.951849] dump_stack_lvl+0x8c/0xd0 [ 41.951881] print_report+0x118/0x5d0 [ 41.951908] kasan_report+0xdc/0x128 [ 41.951933] __asan_report_load1_noabort+0x20/0x30 [ 41.951968] krealloc_uaf+0x4c8/0x520 [ 41.951998] kunit_try_run_case+0x170/0x3f0 [ 41.952034] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.952065] kthread+0x328/0x630 [ 41.952093] ret_from_fork+0x10/0x20 [ 41.952125] [ 42.015248] Allocated by task 248: [ 42.018634] kasan_save_stack+0x3c/0x68 [ 42.022453] kasan_save_track+0x20/0x40 [ 42.026273] kasan_save_alloc_info+0x40/0x58 [ 42.030526] __kasan_kmalloc+0xd4/0xd8 [ 42.034258] __kmalloc_cache_noprof+0x16c/0x3c0 [ 42.038772] krealloc_uaf+0xc8/0x520 [ 42.042331] kunit_try_run_case+0x170/0x3f0 [ 42.046498] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.051966] kthread+0x328/0x630 [ 42.055178] ret_from_fork+0x10/0x20 [ 42.058737] [ 42.060213] Freed by task 248: [ 42.063251] kasan_save_stack+0x3c/0x68 [ 42.067070] kasan_save_track+0x20/0x40 [ 42.070890] kasan_save_free_info+0x4c/0x78 [ 42.075056] __kasan_slab_free+0x6c/0x98 [ 42.078963] kfree+0x214/0x3c8 [ 42.082001] krealloc_uaf+0x12c/0x520 [ 42.085647] kunit_try_run_case+0x170/0x3f0 [ 42.089813] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.095282] kthread+0x328/0x630 [ 42.098494] ret_from_fork+0x10/0x20 [ 42.102053] [ 42.103529] The buggy address belongs to the object at ffff0008042d2400 [ 42.103529] which belongs to the cache kmalloc-256 of size 256 [ 42.116031] The buggy address is located 0 bytes inside of [ 42.116031] freed 256-byte region [ffff0008042d2400, ffff0008042d2500) [ 42.128094] [ 42.129572] The buggy address belongs to the physical page: [ 42.135127] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8842d0 [ 42.143113] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 42.150753] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 42.157695] page_type: f5(slab) [ 42.160830] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 42.168551] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 42.176278] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 42.184089] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 42.191902] head: 0bfffe0000000002 fffffdffe010b401 00000000ffffffff 00000000ffffffff [ 42.199714] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 42.207519] page dumped because: kasan: bad access detected [ 42.213075] [ 42.214551] Memory state around the buggy address: [ 42.219330] ffff0008042d2300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.226533] ffff0008042d2380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.233738] >ffff0008042d2400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 42.240939] ^ [ 42.244155] ffff0008042d2480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 42.251359] ffff0008042d2500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.258561] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 40.888234] ================================================================== [ 40.895219] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 40.902767] Write of size 1 at addr ffff000806cce0da by task kunit_try_catch/246 [ 40.910143] [ 40.911628] CPU: 2 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 40.911682] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.911697] Hardware name: WinLink E850-96 board (DT) [ 40.911715] Call trace: [ 40.911728] show_stack+0x20/0x38 (C) [ 40.911760] dump_stack_lvl+0x8c/0xd0 [ 40.911795] print_report+0x118/0x5d0 [ 40.911821] kasan_report+0xdc/0x128 [ 40.911848] __asan_report_store1_noabort+0x20/0x30 [ 40.911883] krealloc_less_oob_helper+0xa80/0xc50 [ 40.911917] krealloc_large_less_oob+0x20/0x38 [ 40.911949] kunit_try_run_case+0x170/0x3f0 [ 40.911987] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.912019] kthread+0x328/0x630 [ 40.912047] ret_from_fork+0x10/0x20 [ 40.912081] [ 40.980717] The buggy address belongs to the physical page: [ 40.986275] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886ccc [ 40.994257] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 41.001898] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 41.008840] page_type: f8(unknown) [ 41.012236] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 41.019957] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 41.027684] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 41.035495] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 41.043308] head: 0bfffe0000000002 fffffdffe01b3301 00000000ffffffff 00000000ffffffff [ 41.051120] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 41.058926] page dumped because: kasan: bad access detected [ 41.064481] [ 41.065957] Memory state around the buggy address: [ 41.070738] ffff000806ccdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.077939] ffff000806cce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.085144] >ffff000806cce080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 41.092345] ^ [ 41.098425] ffff000806cce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 41.105630] ffff000806cce180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 41.112833] ================================================================== [ 41.352722] ================================================================== [ 41.359794] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 41.367342] Write of size 1 at addr ffff000806cce0eb by task kunit_try_catch/246 [ 41.374719] [ 41.376205] CPU: 2 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 41.376252] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.376267] Hardware name: WinLink E850-96 board (DT) [ 41.376283] Call trace: [ 41.376296] show_stack+0x20/0x38 (C) [ 41.376328] dump_stack_lvl+0x8c/0xd0 [ 41.376360] print_report+0x118/0x5d0 [ 41.376388] kasan_report+0xdc/0x128 [ 41.376415] __asan_report_store1_noabort+0x20/0x30 [ 41.376449] krealloc_less_oob_helper+0xa58/0xc50 [ 41.376483] krealloc_large_less_oob+0x20/0x38 [ 41.376515] kunit_try_run_case+0x170/0x3f0 [ 41.376552] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.376586] kthread+0x328/0x630 [ 41.376614] ret_from_fork+0x10/0x20 [ 41.376647] [ 41.445293] The buggy address belongs to the physical page: [ 41.450850] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886ccc [ 41.458833] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 41.466473] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 41.473416] page_type: f8(unknown) [ 41.476813] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 41.484533] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 41.492260] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 41.500071] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 41.507884] head: 0bfffe0000000002 fffffdffe01b3301 00000000ffffffff 00000000ffffffff [ 41.515696] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 41.523502] page dumped because: kasan: bad access detected [ 41.529057] [ 41.530533] Memory state around the buggy address: [ 41.535313] ffff000806ccdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.542516] ffff000806cce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.549720] >ffff000806cce080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 41.556922] ^ [ 41.563522] ffff000806cce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 41.570727] ffff000806cce180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 41.577928] ================================================================== [ 40.656358] ================================================================== [ 40.663447] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 40.670998] Write of size 1 at addr ffff000806cce0d0 by task kunit_try_catch/246 [ 40.678376] [ 40.679864] CPU: 2 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 40.679915] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.679931] Hardware name: WinLink E850-96 board (DT) [ 40.679949] Call trace: [ 40.679961] show_stack+0x20/0x38 (C) [ 40.679995] dump_stack_lvl+0x8c/0xd0 [ 40.680026] print_report+0x118/0x5d0 [ 40.680054] kasan_report+0xdc/0x128 [ 40.680083] __asan_report_store1_noabort+0x20/0x30 [ 40.680115] krealloc_less_oob_helper+0xb9c/0xc50 [ 40.680148] krealloc_large_less_oob+0x20/0x38 [ 40.680180] kunit_try_run_case+0x170/0x3f0 [ 40.680216] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.680250] kthread+0x328/0x630 [ 40.680278] ret_from_fork+0x10/0x20 [ 40.680311] [ 40.748950] The buggy address belongs to the physical page: [ 40.754506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886ccc [ 40.762490] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 40.770130] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 40.777073] page_type: f8(unknown) [ 40.780469] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 40.788190] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 40.795916] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 40.803728] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 40.811541] head: 0bfffe0000000002 fffffdffe01b3301 00000000ffffffff 00000000ffffffff [ 40.819353] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 40.827158] page dumped because: kasan: bad access detected [ 40.832714] [ 40.834189] Memory state around the buggy address: [ 40.838969] ffff000806ccdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.846172] ffff000806cce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.853377] >ffff000806cce080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 40.860578] ^ [ 40.866397] ffff000806cce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 40.873601] ffff000806cce180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 40.880803] ================================================================== [ 40.422036] ================================================================== [ 40.431941] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 40.439491] Write of size 1 at addr ffff000806cce0c9 by task kunit_try_catch/246 [ 40.446869] [ 40.448354] CPU: 2 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 40.448407] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.448424] Hardware name: WinLink E850-96 board (DT) [ 40.448443] Call trace: [ 40.448455] show_stack+0x20/0x38 (C) [ 40.448489] dump_stack_lvl+0x8c/0xd0 [ 40.448524] print_report+0x118/0x5d0 [ 40.448554] kasan_report+0xdc/0x128 [ 40.448581] __asan_report_store1_noabort+0x20/0x30 [ 40.448615] krealloc_less_oob_helper+0xa48/0xc50 [ 40.448648] krealloc_large_less_oob+0x20/0x38 [ 40.448681] kunit_try_run_case+0x170/0x3f0 [ 40.448719] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.448753] kthread+0x328/0x630 [ 40.448783] ret_from_fork+0x10/0x20 [ 40.448816] [ 40.517443] The buggy address belongs to the physical page: [ 40.522999] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886ccc [ 40.530984] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 40.538623] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 40.545567] page_type: f8(unknown) [ 40.548962] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 40.556683] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 40.564409] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 40.572220] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 40.580034] head: 0bfffe0000000002 fffffdffe01b3301 00000000ffffffff 00000000ffffffff [ 40.587846] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 40.595651] page dumped because: kasan: bad access detected [ 40.601207] [ 40.602682] Memory state around the buggy address: [ 40.607463] ffff000806ccdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.614665] ffff000806cce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.621872] >ffff000806cce080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 40.629071] ^ [ 40.634630] ffff000806cce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 40.641835] ffff000806cce180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 40.649038] ================================================================== [ 41.120364] ================================================================== [ 41.127246] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 41.134793] Write of size 1 at addr ffff000806cce0ea by task kunit_try_catch/246 [ 41.142171] [ 41.143656] CPU: 2 UID: 0 PID: 246 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 41.143705] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.143721] Hardware name: WinLink E850-96 board (DT) [ 41.143739] Call trace: [ 41.143752] show_stack+0x20/0x38 (C) [ 41.143785] dump_stack_lvl+0x8c/0xd0 [ 41.143817] print_report+0x118/0x5d0 [ 41.143844] kasan_report+0xdc/0x128 [ 41.143871] __asan_report_store1_noabort+0x20/0x30 [ 41.143904] krealloc_less_oob_helper+0xae4/0xc50 [ 41.143937] krealloc_large_less_oob+0x20/0x38 [ 41.143971] kunit_try_run_case+0x170/0x3f0 [ 41.144007] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.144037] kthread+0x328/0x630 [ 41.144065] ret_from_fork+0x10/0x20 [ 41.144097] [ 41.212745] The buggy address belongs to the physical page: [ 41.218301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886ccc [ 41.226285] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 41.233926] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 41.240867] page_type: f8(unknown) [ 41.244264] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 41.251985] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 41.259711] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 41.267523] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 41.275336] head: 0bfffe0000000002 fffffdffe01b3301 00000000ffffffff 00000000ffffffff [ 41.283148] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 41.290954] page dumped because: kasan: bad access detected [ 41.296509] [ 41.297984] Memory state around the buggy address: [ 41.302766] ffff000806ccdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.309967] ffff000806cce000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.317172] >ffff000806cce080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 41.324373] ^ [ 41.330974] ffff000806cce100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 41.338178] ffff000806cce180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 41.345380] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 39.403911] ================================================================== [ 39.410780] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 39.418326] Write of size 1 at addr ffff000804a77ef0 by task kunit_try_catch/240 [ 39.425704] [ 39.427189] CPU: 3 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 39.427241] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.427257] Hardware name: WinLink E850-96 board (DT) [ 39.427276] Call trace: [ 39.427289] show_stack+0x20/0x38 (C) [ 39.427323] dump_stack_lvl+0x8c/0xd0 [ 39.427355] print_report+0x118/0x5d0 [ 39.427386] kasan_report+0xdc/0x128 [ 39.427413] __asan_report_store1_noabort+0x20/0x30 [ 39.427447] krealloc_more_oob_helper+0x5c0/0x678 [ 39.427483] krealloc_more_oob+0x20/0x38 [ 39.427514] kunit_try_run_case+0x170/0x3f0 [ 39.427549] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.427581] kthread+0x328/0x630 [ 39.427611] ret_from_fork+0x10/0x20 [ 39.427645] [ 39.495755] Allocated by task 240: [ 39.499143] kasan_save_stack+0x3c/0x68 [ 39.502959] kasan_save_track+0x20/0x40 [ 39.506779] kasan_save_alloc_info+0x40/0x58 [ 39.511033] __kasan_krealloc+0x118/0x178 [ 39.515025] krealloc_noprof+0x128/0x360 [ 39.518932] krealloc_more_oob_helper+0x168/0x678 [ 39.523619] krealloc_more_oob+0x20/0x38 [ 39.527525] kunit_try_run_case+0x170/0x3f0 [ 39.531691] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.537160] kthread+0x328/0x630 [ 39.540372] ret_from_fork+0x10/0x20 [ 39.543931] [ 39.545408] The buggy address belongs to the object at ffff000804a77e00 [ 39.545408] which belongs to the cache kmalloc-256 of size 256 [ 39.557910] The buggy address is located 5 bytes to the right of [ 39.557910] allocated 235-byte region [ffff000804a77e00, ffff000804a77eeb) [ 39.570841] [ 39.572319] The buggy address belongs to the physical page: [ 39.577876] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884a74 [ 39.585858] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 39.593500] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 39.600441] page_type: f5(slab) [ 39.603577] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 39.611298] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.619024] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 39.626836] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.634649] head: 0bfffe0000000002 fffffdffe0129d01 00000000ffffffff 00000000ffffffff [ 39.642461] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 39.650266] page dumped because: kasan: bad access detected [ 39.655822] [ 39.657297] Memory state around the buggy address: [ 39.662077] ffff000804a77d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.669282] ffff000804a77e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.676485] >ffff000804a77e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 39.683686] ^ [ 39.690547] ffff000804a77f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.697752] ffff000804a77f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.704953] ================================================================== [ 39.952469] ================================================================== [ 39.962247] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 39.969793] Write of size 1 at addr ffff000804a7a0eb by task kunit_try_catch/244 [ 39.977173] [ 39.978657] CPU: 3 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 39.978713] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.978730] Hardware name: WinLink E850-96 board (DT) [ 39.978752] Call trace: [ 39.978764] show_stack+0x20/0x38 (C) [ 39.978800] dump_stack_lvl+0x8c/0xd0 [ 39.978834] print_report+0x118/0x5d0 [ 39.978865] kasan_report+0xdc/0x128 [ 39.978893] __asan_report_store1_noabort+0x20/0x30 [ 39.978929] krealloc_more_oob_helper+0x60c/0x678 [ 39.978962] krealloc_large_more_oob+0x20/0x38 [ 39.978994] kunit_try_run_case+0x170/0x3f0 [ 39.979034] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.979064] kthread+0x328/0x630 [ 39.979093] ret_from_fork+0x10/0x20 [ 39.979126] [ 40.047746] The buggy address belongs to the physical page: [ 40.053304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884a78 [ 40.061286] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 40.068926] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 40.075869] page_type: f8(unknown) [ 40.079266] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 40.086985] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 40.094711] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 40.102523] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 40.110336] head: 0bfffe0000000002 fffffdffe0129e01 00000000ffffffff 00000000ffffffff [ 40.118148] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 40.125955] page dumped because: kasan: bad access detected [ 40.131509] [ 40.132986] Memory state around the buggy address: [ 40.137765] ffff000804a79f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.144967] ffff000804a7a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.152174] >ffff000804a7a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 40.159373] ^ [ 40.165974] ffff000804a7a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 40.173179] ffff000804a7a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 40.180381] ================================================================== [ 40.187900] ================================================================== [ 40.194795] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 40.202342] Write of size 1 at addr ffff000804a7a0f0 by task kunit_try_catch/244 [ 40.209720] [ 40.211205] CPU: 3 UID: 0 PID: 244 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 40.211257] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.211275] Hardware name: WinLink E850-96 board (DT) [ 40.211292] Call trace: [ 40.211305] show_stack+0x20/0x38 (C) [ 40.211340] dump_stack_lvl+0x8c/0xd0 [ 40.211373] print_report+0x118/0x5d0 [ 40.211401] kasan_report+0xdc/0x128 [ 40.211432] __asan_report_store1_noabort+0x20/0x30 [ 40.211465] krealloc_more_oob_helper+0x5c0/0x678 [ 40.211498] krealloc_large_more_oob+0x20/0x38 [ 40.211530] kunit_try_run_case+0x170/0x3f0 [ 40.211568] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.211599] kthread+0x328/0x630 [ 40.211628] ret_from_fork+0x10/0x20 [ 40.211661] [ 40.280294] The buggy address belongs to the physical page: [ 40.285851] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884a78 [ 40.293835] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 40.301473] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 40.308416] page_type: f8(unknown) [ 40.311814] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 40.319533] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 40.327260] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 40.335072] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 40.342885] head: 0bfffe0000000002 fffffdffe0129e01 00000000ffffffff 00000000ffffffff [ 40.350697] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 40.358502] page dumped because: kasan: bad access detected [ 40.364058] [ 40.365533] Memory state around the buggy address: [ 40.370312] ffff000804a79f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.377516] ffff000804a7a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.384722] >ffff000804a7a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 40.391922] ^ [ 40.398783] ffff000804a7a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 40.405988] ffff000804a7a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 40.413189] ================================================================== [ 39.093302] ================================================================== [ 39.102453] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 39.109997] Write of size 1 at addr ffff000804a77eeb by task kunit_try_catch/240 [ 39.117375] [ 39.118861] CPU: 3 UID: 0 PID: 240 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 39.118918] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.118935] Hardware name: WinLink E850-96 board (DT) [ 39.118958] Call trace: [ 39.118973] show_stack+0x20/0x38 (C) [ 39.119008] dump_stack_lvl+0x8c/0xd0 [ 39.119044] print_report+0x118/0x5d0 [ 39.119075] kasan_report+0xdc/0x128 [ 39.119102] __asan_report_store1_noabort+0x20/0x30 [ 39.119137] krealloc_more_oob_helper+0x60c/0x678 [ 39.119171] krealloc_more_oob+0x20/0x38 [ 39.119200] kunit_try_run_case+0x170/0x3f0 [ 39.119236] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.119267] kthread+0x328/0x630 [ 39.119294] ret_from_fork+0x10/0x20 [ 39.119329] [ 39.187428] Allocated by task 240: [ 39.190815] kasan_save_stack+0x3c/0x68 [ 39.194631] kasan_save_track+0x20/0x40 [ 39.198452] kasan_save_alloc_info+0x40/0x58 [ 39.202704] __kasan_krealloc+0x118/0x178 [ 39.206696] krealloc_noprof+0x128/0x360 [ 39.210603] krealloc_more_oob_helper+0x168/0x678 [ 39.215290] krealloc_more_oob+0x20/0x38 [ 39.219197] kunit_try_run_case+0x170/0x3f0 [ 39.223363] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.228832] kthread+0x328/0x630 [ 39.232043] ret_from_fork+0x10/0x20 [ 39.235602] [ 39.237080] The buggy address belongs to the object at ffff000804a77e00 [ 39.237080] which belongs to the cache kmalloc-256 of size 256 [ 39.249581] The buggy address is located 0 bytes to the right of [ 39.249581] allocated 235-byte region [ffff000804a77e00, ffff000804a77eeb) [ 39.262512] [ 39.263990] The buggy address belongs to the physical page: [ 39.269548] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884a74 [ 39.277531] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 39.285171] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 39.292114] page_type: f5(slab) [ 39.295249] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 39.302969] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.310696] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 39.318507] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.326320] head: 0bfffe0000000002 fffffdffe0129d01 00000000ffffffff 00000000ffffffff [ 39.334132] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 39.341939] page dumped because: kasan: bad access detected [ 39.347493] [ 39.348970] Memory state around the buggy address: [ 39.353749] ffff000804a77d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.360953] ffff000804a77e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.368156] >ffff000804a77e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 39.375357] ^ [ 39.381958] ffff000804a77f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.389163] ffff000804a77f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.396364] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 38.901456] ================================================================== [ 38.915907] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 38.922239] Read of size 1 at addr ffff000808600000 by task kunit_try_catch/238 [ 38.929532] [ 38.931016] CPU: 2 UID: 0 PID: 238 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 38.931069] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.931085] Hardware name: WinLink E850-96 board (DT) [ 38.931106] Call trace: [ 38.931122] show_stack+0x20/0x38 (C) [ 38.931156] dump_stack_lvl+0x8c/0xd0 [ 38.931191] print_report+0x118/0x5d0 [ 38.931221] kasan_report+0xdc/0x128 [ 38.931246] __asan_report_load1_noabort+0x20/0x30 [ 38.931278] page_alloc_uaf+0x328/0x350 [ 38.931311] kunit_try_run_case+0x170/0x3f0 [ 38.931352] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.931384] kthread+0x328/0x630 [ 38.931416] ret_from_fork+0x10/0x20 [ 38.931448] [ 38.994724] The buggy address belongs to the physical page: [ 39.000281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888600 [ 39.008264] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.014775] page_type: f0(buddy) [ 39.017997] raw: 0bfffe0000000000 ffff00087f61bea8 ffff00087f61bea8 0000000000000000 [ 39.025716] raw: 0000000000000000 0000000000000009 00000000f0000000 0000000000000000 [ 39.033437] page dumped because: kasan: bad access detected [ 39.038991] [ 39.040466] Memory state around the buggy address: [ 39.045246] ffff0008085fff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.052449] ffff0008085fff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.059655] >ffff000808600000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.066855] ^ [ 39.070070] ffff000808600080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.077275] ffff000808600100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.084478] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree
[ 38.664971] ================================================================== [ 38.674414] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 38.679797] Free of addr ffff000804a78001 by task kunit_try_catch/234 [ 38.686220] [ 38.687704] CPU: 3 UID: 0 PID: 234 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 38.687762] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.687780] Hardware name: WinLink E850-96 board (DT) [ 38.687801] Call trace: [ 38.687813] show_stack+0x20/0x38 (C) [ 38.687848] dump_stack_lvl+0x8c/0xd0 [ 38.687878] print_report+0x118/0x5d0 [ 38.687907] kasan_report_invalid_free+0xc0/0xe8 [ 38.687939] __kasan_kfree_large+0x5c/0xa8 [ 38.687980] free_large_kmalloc+0x68/0x150 [ 38.688014] kfree+0x270/0x3c8 [ 38.688042] kmalloc_large_invalid_free+0x108/0x270 [ 38.688078] kunit_try_run_case+0x170/0x3f0 [ 38.688114] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.688148] kthread+0x328/0x630 [ 38.688179] ret_from_fork+0x10/0x20 [ 38.688211] [ 38.759917] The buggy address belongs to the physical page: [ 38.765476] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884a78 [ 38.773457] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 38.781097] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 38.788041] page_type: f8(unknown) [ 38.791438] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 38.799157] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 38.806883] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 38.814695] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 38.822508] head: 0bfffe0000000002 fffffdffe0129e01 00000000ffffffff 00000000ffffffff [ 38.830320] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 38.838127] page dumped because: kasan: bad access detected [ 38.843681] [ 38.845157] Memory state around the buggy address: [ 38.849937] ffff000804a77f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.857140] ffff000804a77f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.864345] >ffff000804a78000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.871545] ^ [ 38.874762] ffff000804a78080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.881965] ffff000804a78100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.889168] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 38.480358] ================================================================== [ 38.490393] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 38.496987] Read of size 1 at addr ffff000806cc8000 by task kunit_try_catch/232 [ 38.504277] [ 38.505762] CPU: 2 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 38.505813] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.505830] Hardware name: WinLink E850-96 board (DT) [ 38.505851] Call trace: [ 38.505867] show_stack+0x20/0x38 (C) [ 38.505902] dump_stack_lvl+0x8c/0xd0 [ 38.505935] print_report+0x118/0x5d0 [ 38.505962] kasan_report+0xdc/0x128 [ 38.505989] __asan_report_load1_noabort+0x20/0x30 [ 38.506022] kmalloc_large_uaf+0x2cc/0x2f8 [ 38.506052] kunit_try_run_case+0x170/0x3f0 [ 38.506090] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.506124] kthread+0x328/0x630 [ 38.506153] ret_from_fork+0x10/0x20 [ 38.506188] [ 38.569729] The buggy address belongs to the physical page: [ 38.575287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886cc8 [ 38.583272] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.589793] raw: 0bfffe0000000000 fffffdffe01b3308 ffff00085af67fc0 0000000000000000 [ 38.597511] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 38.605230] page dumped because: kasan: bad access detected [ 38.610785] [ 38.612262] Memory state around the buggy address: [ 38.617041] ffff000806cc7f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.624244] ffff000806cc7f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.631450] >ffff000806cc8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.638650] ^ [ 38.641865] ffff000806cc8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.649070] ffff000806cc8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.656272] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 38.251501] ================================================================== [ 38.261316] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 38.268777] Write of size 1 at addr ffff000804a7a00a by task kunit_try_catch/230 [ 38.276155] [ 38.277641] CPU: 3 UID: 0 PID: 230 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 38.277694] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.277710] Hardware name: WinLink E850-96 board (DT) [ 38.277731] Call trace: [ 38.277743] show_stack+0x20/0x38 (C) [ 38.277781] dump_stack_lvl+0x8c/0xd0 [ 38.277813] print_report+0x118/0x5d0 [ 38.277840] kasan_report+0xdc/0x128 [ 38.277868] __asan_report_store1_noabort+0x20/0x30 [ 38.277900] kmalloc_large_oob_right+0x278/0x2b8 [ 38.277932] kunit_try_run_case+0x170/0x3f0 [ 38.277968] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.278002] kthread+0x328/0x630 [ 38.278034] ret_from_fork+0x10/0x20 [ 38.278068] [ 38.342216] The buggy address belongs to the physical page: [ 38.347773] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884a78 [ 38.355755] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 38.363396] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 38.370339] page_type: f8(unknown) [ 38.373734] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 38.381455] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 38.389181] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 38.396993] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 38.404806] head: 0bfffe0000000002 fffffdffe0129e01 00000000ffffffff 00000000ffffffff [ 38.412618] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 38.420423] page dumped because: kasan: bad access detected [ 38.425979] [ 38.427456] Memory state around the buggy address: [ 38.432235] ffff000804a79f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.439438] ffff000804a79f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.446644] >ffff000804a7a000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 38.453844] ^ [ 38.457319] ffff000804a7a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 38.464524] ffff000804a7a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 38.471726] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 37.949707] ================================================================== [ 37.960547] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 37.967826] Write of size 1 at addr ffff000807751f00 by task kunit_try_catch/228 [ 37.975205] [ 37.976692] CPU: 2 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 37.976750] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.976767] Hardware name: WinLink E850-96 board (DT) [ 37.976788] Call trace: [ 37.976801] show_stack+0x20/0x38 (C) [ 37.976836] dump_stack_lvl+0x8c/0xd0 [ 37.976868] print_report+0x118/0x5d0 [ 37.976896] kasan_report+0xdc/0x128 [ 37.976922] __asan_report_store1_noabort+0x20/0x30 [ 37.976956] kmalloc_big_oob_right+0x2a4/0x2f0 [ 37.976987] kunit_try_run_case+0x170/0x3f0 [ 37.977024] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.977056] kthread+0x328/0x630 [ 37.977087] ret_from_fork+0x10/0x20 [ 37.977122] [ 38.041091] Allocated by task 228: [ 38.044477] kasan_save_stack+0x3c/0x68 [ 38.048294] kasan_save_track+0x20/0x40 [ 38.052113] kasan_save_alloc_info+0x40/0x58 [ 38.056367] __kasan_kmalloc+0xd4/0xd8 [ 38.060099] __kmalloc_cache_noprof+0x16c/0x3c0 [ 38.064613] kmalloc_big_oob_right+0xb8/0x2f0 [ 38.068953] kunit_try_run_case+0x170/0x3f0 [ 38.073120] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.078589] kthread+0x328/0x630 [ 38.081800] ret_from_fork+0x10/0x20 [ 38.085359] [ 38.086838] The buggy address belongs to the object at ffff000807750000 [ 38.086838] which belongs to the cache kmalloc-8k of size 8192 [ 38.099338] The buggy address is located 0 bytes to the right of [ 38.099338] allocated 7936-byte region [ffff000807750000, ffff000807751f00) [ 38.112355] [ 38.113835] The buggy address belongs to the physical page: [ 38.119392] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887750 [ 38.127377] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 38.135013] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 38.141959] page_type: f5(slab) [ 38.145094] raw: 0bfffe0000000040 ffff000800003180 dead000000000122 0000000000000000 [ 38.152814] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 38.160539] head: 0bfffe0000000040 ffff000800003180 dead000000000122 0000000000000000 [ 38.168351] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 38.176164] head: 0bfffe0000000003 fffffdffe01dd401 00000000ffffffff 00000000ffffffff [ 38.183976] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 38.191783] page dumped because: kasan: bad access detected [ 38.197336] [ 38.198812] Memory state around the buggy address: [ 38.203594] ffff000807751e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.210795] ffff000807751e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.218001] >ffff000807751f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.225201] ^ [ 38.228416] ffff000807751f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.235622] ffff000807752000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.242824] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[ 37.480804] ================================================================== [ 37.490756] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 37.498823] Write of size 1 at addr ffff0008074f8778 by task kunit_try_catch/226 [ 37.506202] [ 37.507687] CPU: 2 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 37.507742] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.507759] Hardware name: WinLink E850-96 board (DT) [ 37.507780] Call trace: [ 37.507792] show_stack+0x20/0x38 (C) [ 37.507828] dump_stack_lvl+0x8c/0xd0 [ 37.507859] print_report+0x118/0x5d0 [ 37.507888] kasan_report+0xdc/0x128 [ 37.507913] __asan_report_store1_noabort+0x20/0x30 [ 37.507948] kmalloc_track_caller_oob_right+0x40c/0x488 [ 37.507986] kunit_try_run_case+0x170/0x3f0 [ 37.508021] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.508053] kthread+0x328/0x630 [ 37.508081] ret_from_fork+0x10/0x20 [ 37.508115] [ 37.572870] Allocated by task 226: [ 37.576255] kasan_save_stack+0x3c/0x68 [ 37.580072] kasan_save_track+0x20/0x40 [ 37.583891] kasan_save_alloc_info+0x40/0x58 [ 37.588145] __kasan_kmalloc+0xd4/0xd8 [ 37.591877] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 37.597433] kmalloc_track_caller_oob_right+0xa8/0x488 [ 37.602554] kunit_try_run_case+0x170/0x3f0 [ 37.606721] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.612191] kthread+0x328/0x630 [ 37.615401] ret_from_fork+0x10/0x20 [ 37.618960] [ 37.620437] The buggy address belongs to the object at ffff0008074f8700 [ 37.620437] which belongs to the cache kmalloc-128 of size 128 [ 37.632939] The buggy address is located 0 bytes to the right of [ 37.632939] allocated 120-byte region [ffff0008074f8700, ffff0008074f8778) [ 37.645870] [ 37.647348] The buggy address belongs to the physical page: [ 37.652905] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8874f8 [ 37.660887] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 37.668528] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 37.675470] page_type: f5(slab) [ 37.678608] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 37.686327] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.694053] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 37.701864] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.709678] head: 0bfffe0000000001 fffffdffe01d3e01 00000000ffffffff 00000000ffffffff [ 37.717490] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 37.725295] page dumped because: kasan: bad access detected [ 37.730851] [ 37.732326] Memory state around the buggy address: [ 37.737106] ffff0008074f8600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.744309] ffff0008074f8680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.751515] >ffff0008074f8700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.758715] ^ [ 37.765836] ffff0008074f8780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.773043] ffff0008074f8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.780243] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 37.180037] ================================================================== [ 37.189376] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 37.196746] Read of size 1 at addr ffff00080806b000 by task kunit_try_catch/224 [ 37.204036] [ 37.205522] CPU: 3 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 37.205575] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.205593] Hardware name: WinLink E850-96 board (DT) [ 37.205610] Call trace: [ 37.205623] show_stack+0x20/0x38 (C) [ 37.205660] dump_stack_lvl+0x8c/0xd0 [ 37.205693] print_report+0x118/0x5d0 [ 37.205722] kasan_report+0xdc/0x128 [ 37.205747] __asan_report_load1_noabort+0x20/0x30 [ 37.205779] kmalloc_node_oob_right+0x2f4/0x330 [ 37.205813] kunit_try_run_case+0x170/0x3f0 [ 37.205852] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.205883] kthread+0x328/0x630 [ 37.205911] ret_from_fork+0x10/0x20 [ 37.205946] [ 37.269922] Allocated by task 224: [ 37.273309] kasan_save_stack+0x3c/0x68 [ 37.277125] kasan_save_track+0x20/0x40 [ 37.280944] kasan_save_alloc_info+0x40/0x58 [ 37.285198] __kasan_kmalloc+0xd4/0xd8 [ 37.288932] __kmalloc_cache_node_noprof+0x178/0x3d0 [ 37.293878] kmalloc_node_oob_right+0xbc/0x330 [ 37.298305] kunit_try_run_case+0x170/0x3f0 [ 37.302472] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.307941] kthread+0x328/0x630 [ 37.311152] ret_from_fork+0x10/0x20 [ 37.314711] [ 37.316190] The buggy address belongs to the object at ffff00080806a000 [ 37.316190] which belongs to the cache kmalloc-4k of size 4096 [ 37.328690] The buggy address is located 0 bytes to the right of [ 37.328690] allocated 4096-byte region [ffff00080806a000, ffff00080806b000) [ 37.341707] [ 37.343186] The buggy address belongs to the physical page: [ 37.348744] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888068 [ 37.356726] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 37.364365] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 37.371309] page_type: f5(slab) [ 37.374446] raw: 0bfffe0000000040 ffff000800003040 dead000000000122 0000000000000000 [ 37.382165] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 37.389891] head: 0bfffe0000000040 ffff000800003040 dead000000000122 0000000000000000 [ 37.397702] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 37.405516] head: 0bfffe0000000003 fffffdffe0201a01 00000000ffffffff 00000000ffffffff [ 37.413327] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 37.421133] page dumped because: kasan: bad access detected [ 37.426690] [ 37.428166] Memory state around the buggy address: [ 37.432945] ffff00080806af00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.440147] ffff00080806af80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.447354] >ffff00080806b000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.454554] ^ [ 37.457768] ffff00080806b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.464973] ffff00080806b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.472174] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 36.858018] ================================================================== [ 36.867155] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 36.874006] Read of size 1 at addr ffff000804b5a03f by task kunit_try_catch/222 [ 36.881298] [ 36.882784] CPU: 2 UID: 0 PID: 222 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 36.882836] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.882852] Hardware name: WinLink E850-96 board (DT) [ 36.882874] Call trace: [ 36.882887] show_stack+0x20/0x38 (C) [ 36.882924] dump_stack_lvl+0x8c/0xd0 [ 36.882959] print_report+0x118/0x5d0 [ 36.882986] kasan_report+0xdc/0x128 [ 36.883013] __asan_report_load1_noabort+0x20/0x30 [ 36.883046] kmalloc_oob_left+0x2ec/0x320 [ 36.883077] kunit_try_run_case+0x170/0x3f0 [ 36.883113] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.883144] kthread+0x328/0x630 [ 36.883175] ret_from_fork+0x10/0x20 [ 36.883211] [ 36.946664] Allocated by task 152: [ 36.950050] kasan_save_stack+0x3c/0x68 [ 36.953867] kasan_save_track+0x20/0x40 [ 36.957687] kasan_save_alloc_info+0x40/0x58 [ 36.961939] __kasan_kmalloc+0xd4/0xd8 [ 36.965671] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 36.971227] kvasprintf+0xe0/0x180 [ 36.974612] kasprintf+0xd0/0x110 [ 36.977910] miscdev_test_can_open+0xac/0x2c8 [ 36.982251] miscdev_test_conflict+0x1e0/0x338 [ 36.986678] kunit_try_run_case+0x170/0x3f0 [ 36.990846] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.996313] kthread+0x328/0x630 [ 36.999525] ret_from_fork+0x10/0x20 [ 37.003084] [ 37.004561] Freed by task 152: [ 37.007601] kasan_save_stack+0x3c/0x68 [ 37.011417] kasan_save_track+0x20/0x40 [ 37.015238] kasan_save_free_info+0x4c/0x78 [ 37.019403] __kasan_slab_free+0x6c/0x98 [ 37.023309] kfree+0x214/0x3c8 [ 37.026347] miscdev_test_can_open+0x138/0x2c8 [ 37.030774] miscdev_test_conflict+0x1e0/0x338 [ 37.035201] kunit_try_run_case+0x170/0x3f0 [ 37.039368] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.044837] kthread+0x328/0x630 [ 37.048050] ret_from_fork+0x10/0x20 [ 37.051607] [ 37.053086] The buggy address belongs to the object at ffff000804b5a020 [ 37.053086] which belongs to the cache kmalloc-16 of size 16 [ 37.065413] The buggy address is located 15 bytes to the right of [ 37.065413] allocated 16-byte region [ffff000804b5a020, ffff000804b5a030) [ 37.078343] [ 37.079821] The buggy address belongs to the physical page: [ 37.085378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x884b5a [ 37.093365] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.099872] page_type: f5(slab) [ 37.103009] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 37.110728] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 37.118448] page dumped because: kasan: bad access detected [ 37.124002] [ 37.125478] Memory state around the buggy address: [ 37.130259] ffff000804b59f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.137460] ffff000804b59f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.144667] >ffff000804b5a000: fa fb fc fc fa fb fc fc 00 07 fc fc fc fc fc fc [ 37.151866] ^ [ 37.156904] ffff000804b5a080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.164109] ffff000804b5a100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.171312] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 36.560863] ================================================================== [ 36.567940] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 36.574878] Read of size 1 at addr ffff000801ff7480 by task kunit_try_catch/220 [ 36.582170] [ 36.583655] CPU: 0 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 36.583706] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.583725] Hardware name: WinLink E850-96 board (DT) [ 36.583743] Call trace: [ 36.583754] show_stack+0x20/0x38 (C) [ 36.583789] dump_stack_lvl+0x8c/0xd0 [ 36.583820] print_report+0x118/0x5d0 [ 36.583847] kasan_report+0xdc/0x128 [ 36.583873] __asan_report_load1_noabort+0x20/0x30 [ 36.583906] kmalloc_oob_right+0x5d0/0x660 [ 36.583938] kunit_try_run_case+0x170/0x3f0 [ 36.583972] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.584003] kthread+0x328/0x630 [ 36.584035] ret_from_fork+0x10/0x20 [ 36.584069] [ 36.647621] Allocated by task 220: [ 36.651008] kasan_save_stack+0x3c/0x68 [ 36.654825] kasan_save_track+0x20/0x40 [ 36.658645] kasan_save_alloc_info+0x40/0x58 [ 36.662898] __kasan_kmalloc+0xd4/0xd8 [ 36.666630] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.671144] kmalloc_oob_right+0xb0/0x660 [ 36.675137] kunit_try_run_case+0x170/0x3f0 [ 36.679304] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.684773] kthread+0x328/0x630 [ 36.687985] ret_from_fork+0x10/0x20 [ 36.691544] [ 36.693020] The buggy address belongs to the object at ffff000801ff7400 [ 36.693020] which belongs to the cache kmalloc-128 of size 128 [ 36.705520] The buggy address is located 13 bytes to the right of [ 36.705520] allocated 115-byte region [ffff000801ff7400, ffff000801ff7473) [ 36.718539] [ 36.720017] The buggy address belongs to the physical page: [ 36.725575] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ff6 [ 36.733557] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.741197] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.748140] page_type: f5(slab) [ 36.751277] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 36.758997] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.766724] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 36.774535] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.782348] head: 0bfffe0000000001 fffffdffe007fd81 00000000ffffffff 00000000ffffffff [ 36.790160] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 36.797965] page dumped because: kasan: bad access detected [ 36.803521] [ 36.804996] Memory state around the buggy address: [ 36.809775] ffff000801ff7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.816980] ffff000801ff7400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 36.824185] >ffff000801ff7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.831385] ^ [ 36.834600] ffff000801ff7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.841805] ffff000801ff7580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.849006] ================================================================== [ 36.261308] ================================================================== [ 36.268464] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 36.275404] Write of size 1 at addr ffff000801ff7478 by task kunit_try_catch/220 [ 36.282782] [ 36.284268] CPU: 0 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 36.284321] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.284337] Hardware name: WinLink E850-96 board (DT) [ 36.284356] Call trace: [ 36.284370] show_stack+0x20/0x38 (C) [ 36.284403] dump_stack_lvl+0x8c/0xd0 [ 36.284435] print_report+0x118/0x5d0 [ 36.284465] kasan_report+0xdc/0x128 [ 36.284490] __asan_report_store1_noabort+0x20/0x30 [ 36.284525] kmalloc_oob_right+0x538/0x660 [ 36.284558] kunit_try_run_case+0x170/0x3f0 [ 36.284595] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.284625] kthread+0x328/0x630 [ 36.284655] ret_from_fork+0x10/0x20 [ 36.284691] [ 36.348319] Allocated by task 220: [ 36.351708] kasan_save_stack+0x3c/0x68 [ 36.355524] kasan_save_track+0x20/0x40 [ 36.359343] kasan_save_alloc_info+0x40/0x58 [ 36.363597] __kasan_kmalloc+0xd4/0xd8 [ 36.367330] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.371843] kmalloc_oob_right+0xb0/0x660 [ 36.375836] kunit_try_run_case+0x170/0x3f0 [ 36.380003] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.385472] kthread+0x328/0x630 [ 36.388683] ret_from_fork+0x10/0x20 [ 36.392243] [ 36.393719] The buggy address belongs to the object at ffff000801ff7400 [ 36.393719] which belongs to the cache kmalloc-128 of size 128 [ 36.406221] The buggy address is located 5 bytes to the right of [ 36.406221] allocated 115-byte region [ffff000801ff7400, ffff000801ff7473) [ 36.419151] [ 36.420629] The buggy address belongs to the physical page: [ 36.426187] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ff6 [ 36.434169] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.441810] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.448754] page_type: f5(slab) [ 36.451888] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 36.459609] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.467336] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 36.475147] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.482960] head: 0bfffe0000000001 fffffdffe007fd81 00000000ffffffff 00000000ffffffff [ 36.490772] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 36.498579] page dumped because: kasan: bad access detected [ 36.504133] [ 36.505608] Memory state around the buggy address: [ 36.510388] ffff000801ff7300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.517591] ffff000801ff7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.524798] >ffff000801ff7400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 36.531997] ^ [ 36.539119] ffff000801ff7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.546324] ffff000801ff7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.553525] ================================================================== [ 35.958593] ================================================================== [ 35.965171] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 35.972111] Write of size 1 at addr ffff000801ff7473 by task kunit_try_catch/220 [ 35.979489] [ 35.980975] CPU: 0 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 35.981028] Tainted: [N]=TEST [ 35.981043] Hardware name: WinLink E850-96 board (DT) [ 35.981063] Call trace: [ 35.981080] show_stack+0x20/0x38 (C) [ 35.981116] dump_stack_lvl+0x8c/0xd0 [ 35.981149] print_report+0x118/0x5d0 [ 35.981178] kasan_report+0xdc/0x128 [ 35.981205] __asan_report_store1_noabort+0x20/0x30 [ 35.981241] kmalloc_oob_right+0x5a4/0x660 [ 35.981271] kunit_try_run_case+0x170/0x3f0 [ 35.981311] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.981344] kthread+0x328/0x630 [ 35.981372] ret_from_fork+0x10/0x20 [ 35.981408] [ 36.043811] Allocated by task 220: [ 36.047198] kasan_save_stack+0x3c/0x68 [ 36.051015] kasan_save_track+0x20/0x40 [ 36.054834] kasan_save_alloc_info+0x40/0x58 [ 36.059088] __kasan_kmalloc+0xd4/0xd8 [ 36.062822] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.067336] kmalloc_oob_right+0xb0/0x660 [ 36.071327] kunit_try_run_case+0x170/0x3f0 [ 36.075494] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.080962] kthread+0x328/0x630 [ 36.084174] ret_from_fork+0x10/0x20 [ 36.087735] [ 36.089210] The buggy address belongs to the object at ffff000801ff7400 [ 36.089210] which belongs to the cache kmalloc-128 of size 128 [ 36.101711] The buggy address is located 0 bytes to the right of [ 36.101711] allocated 115-byte region [ffff000801ff7400, ffff000801ff7473) [ 36.114642] [ 36.116122] The buggy address belongs to the physical page: [ 36.121679] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881ff6 [ 36.129662] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.137301] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.144245] page_type: f5(slab) [ 36.147381] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 36.155100] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.162826] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 36.170638] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.178450] head: 0bfffe0000000001 fffffdffe007fd81 00000000ffffffff 00000000ffffffff [ 36.186262] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 36.194070] page dumped because: kasan: bad access detected [ 36.199623] [ 36.201099] Memory state around the buggy address: [ 36.205881] ffff000801ff7300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.213082] ffff000801ff7380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.220291] >ffff000801ff7400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 36.227488] ^ [ 36.234349] ffff000801ff7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.241554] ffff000801ff7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.248756] ==================================================================
Failure - log-parser-boot/exception-warning-libmathint_log-at-intlog10
------------[ cut here ]------------ [ 179.394806] WARNING: lib/math/int_log.c:120 at intlog10+0x38/0x48, CPU#3: kunit_try_catch/743 [ 179.403312] Modules linked in: [ 179.406359] CPU: 3 UID: 0 PID: 743 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 179.417475] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 179.423276] Hardware name: WinLink E850-96 board (DT) [ 179.428314] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 179.435253] pc : intlog10+0x38/0x48 [ 179.438727] lr : intlog10_test+0xe4/0x200 [ 179.442718] sp : ffff80008af67c10 [ 179.446017] x29: ffff80008af67c90 x28: 0000000000000000 x27: 0000000000000000 [ 179.453135] x26: 1fffe00100d59fa1 x25: 0000000000000000 x24: ffff80008af67ce0 [ 179.460253] x23: ffff80008af67d00 x22: 0000000000000000 x21: 1ffff000115ecf82 [ 179.467371] x20: ffff800083c2f2e0 x19: ffff800087d07990 x18: 00000000e7e12ca6 [ 179.474489] x17: 0000000000000001 x16: ffff00085af85da8 x15: 0000000000000000 [ 179.481606] x14: 00000000f1f1f1f1 x13: 1fffe0010095dd94 x12: ffff700010f63189 [ 179.488725] x11: 1ffff00010f63188 x10: ffff700010f63188 x9 : ffff80008124c0cc [ 179.495843] x8 : ffff800087b18c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 179.502960] x5 : ffff7000115ecf82 x4 : 1ffff00010fa0f3b x3 : 1ffff00010785e5c [ 179.510079] x2 : 1ffff00010785e5c x1 : 0000000000000003 x0 : 0000000000000000 [ 179.517199] Call trace: [ 179.519630] intlog10+0x38/0x48 (P) [ 179.523101] kunit_try_run_case+0x170/0x3f0 [ 179.527268] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 179.532734] kthread+0x328/0x630 [ 179.535948] ret_from_fork+0x10/0x20 [ 179.539509] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-libmathint_log-at-intlog2
------------[ cut here ]------------ [ 179.190123] WARNING: lib/math/int_log.c:63 at intlog2+0xd8/0xf8, CPU#4: kunit_try_catch/725 [ 179.198454] Modules linked in: [ 179.201503] CPU: 4 UID: 0 PID: 725 Comm: kunit_try_catch Tainted: G B D N 6.16.0-rc6-next-20250714 #1 PREEMPT [ 179.212612] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 179.217550] Hardware name: WinLink E850-96 board (DT) [ 179.222587] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 179.229527] pc : intlog2+0xd8/0xf8 [ 179.232913] lr : intlog2_test+0xe4/0x200 [ 179.236819] sp : ffff80008ae47c10 [ 179.240117] x29: ffff80008ae47c90 x28: 0000000000000000 x27: 0000000000000000 [ 179.247236] x26: 1fffe00100d59321 x25: 0000000000000000 x24: ffff80008ae47ce0 [ 179.254353] x23: ffff80008ae47d00 x22: 0000000000000000 x21: 1ffff000115c8f82 [ 179.261471] x20: ffff800083c2f1e0 x19: ffff800087d07990 x18: 00000000c34a9bf9 [ 179.268589] x17: 0000000000000001 x16: ffff00085afa7da8 x15: 0000000000000000 [ 179.275707] x14: 00000000f1f1f1f1 x13: 1fffe0010095dd14 x12: ffff700010f63189 [ 179.282825] x11: 1ffff00010f63188 x10: ffff700010f63188 x9 : ffff80008124c2cc [ 179.289943] x8 : ffff800087b18c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 179.297061] x5 : ffff7000115c8f82 x4 : 1ffff00010fa0f3b x3 : 1ffff00010785e3c [ 179.304179] x2 : 1ffff00010785e3c x1 : 0000000000000003 x0 : 0000000000000000 [ 179.311299] Call trace: [ 179.313729] intlog2+0xd8/0xf8 (P) [ 179.317115] kunit_try_run_case+0x170/0x3f0 [ 179.321281] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 179.326748] kthread+0x328/0x630 [ 179.329960] ret_from_fork+0x10/0x20 [ 179.333522] ---[ end trace 0000000000000000 ]---
Failure - lava/job
(no logs available)
Failure - lava/fastboot-boot
(no logs available)
Failure - lava/auto-login-action
(no logs available)
Failure - lava/login-action
(no logs available)
Failure - boot/gcc-13-lkftconfig-kunit
(no logs available)