Date
July 15, 2025, 11:35 a.m.
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 33.119607] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 33.272052] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 33.267386] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 33.178643] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 33.201689] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
Failure - log-parser-boot/bug-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 33.099226] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0
Failure - log-parser-boot/internal-error-oops-oops-smp
[ 109.017013] Internal error: Oops: 0000000096000005 [#1] SMP [ 109.025411] Modules linked in: [ 109.026215] CPU: 0 UID: 0 PID: 564 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 109.027151] Tainted: [B]=BAD_PAGE, [N]=TEST [ 109.027680] Hardware name: linux,dummy-virt (DT) [ 109.028395] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 109.029117] pc : kunit_test_null_dereference+0x70/0x170 [ 109.029776] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 109.030450] sp : ffff800082017d30 [ 109.030850] x29: ffff800082017d90 x28: 0000000000000000 x27: 0000000000000000 [ 109.031392] x26: 1ffe000018b94741 x25: 0000000000000000 x24: 0000000000000004 [ 109.031759] x23: fff00000c5ca3a0c x22: ffff95f548c3e580 x21: fff00000c1200b08 [ 109.032101] x20: 1ffff00010402fa6 x19: ffff800080087990 x18: 00000000801fb5ba [ 109.032463] x17: 0000000000000000 x16: fff00000da450da8 x15: fff00000ff616b48 [ 109.033208] x14: 0000000000018fff x13: 1ffe000018c99004 x12: fffd8000197b162c [ 109.034109] x11: 1ffe0000197b162b x10: fffd8000197b162b x9 : ffff95f548c35d10 [ 109.035076] x8 : ffff800082017c18 x7 : 0000000000000001 x6 : 0000000041b58ab3 [ 109.035865] x5 : ffff700010402fa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 109.036603] x2 : dfff800000000000 x1 : fff00000cbd8a880 x0 : ffff800080087990 [ 109.037363] Call trace: [ 109.037710] kunit_test_null_dereference+0x70/0x170 (P) [ 109.038356] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 109.038949] kthread+0x328/0x630 [ 109.039324] ret_from_fork+0x10/0x20 [ 109.039962] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 109.040882] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc
[ 65.471425] ================================================================== [ 65.471513] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 65.471513] [ 65.471609] Use-after-free read at 0x000000005e76e40e (in kfence-#204): [ 65.471661] test_krealloc+0x51c/0x830 [ 65.471710] kunit_try_run_case+0x170/0x3f0 [ 65.471756] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.471800] kthread+0x328/0x630 [ 65.471840] ret_from_fork+0x10/0x20 [ 65.471882] [ 65.471905] kfence-#204: 0x000000005e76e40e-0x00000000ed53f551, size=32, cache=kmalloc-32 [ 65.471905] [ 65.471957] allocated by task 369 on cpu 0 at 65.470771s (0.001182s ago): [ 65.472029] test_alloc+0x29c/0x628 [ 65.472071] test_krealloc+0xc0/0x830 [ 65.472112] kunit_try_run_case+0x170/0x3f0 [ 65.472152] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.472195] kthread+0x328/0x630 [ 65.472231] ret_from_fork+0x10/0x20 [ 65.472270] [ 65.472294] freed by task 369 on cpu 0 at 65.471018s (0.001272s ago): [ 65.472355] krealloc_noprof+0x148/0x360 [ 65.472397] test_krealloc+0x1dc/0x830 [ 65.472448] kunit_try_run_case+0x170/0x3f0 [ 65.472487] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.472530] kthread+0x328/0x630 [ 65.472565] ret_from_fork+0x10/0x20 [ 65.472603] [ 65.472649] CPU: 0 UID: 0 PID: 369 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 65.472726] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.472756] Hardware name: linux,dummy-virt (DT) [ 65.472790] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[ 65.394123] ================================================================== [ 65.394224] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 65.394224] [ 65.394329] Use-after-free read at 0x00000000e3967b31 (in kfence-#203): [ 65.394383] test_memcache_typesafe_by_rcu+0x280/0x560 [ 65.394431] kunit_try_run_case+0x170/0x3f0 [ 65.394496] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.394541] kthread+0x328/0x630 [ 65.394580] ret_from_fork+0x10/0x20 [ 65.394622] [ 65.394647] kfence-#203: 0x00000000e3967b31-0x00000000752872e9, size=32, cache=test [ 65.394647] [ 65.394698] allocated by task 367 on cpu 1 at 65.362850s (0.031844s ago): [ 65.394771] test_alloc+0x230/0x628 [ 65.394813] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 65.394857] kunit_try_run_case+0x170/0x3f0 [ 65.394896] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.394938] kthread+0x328/0x630 [ 65.394977] ret_from_fork+0x10/0x20 [ 65.395015] [ 65.395038] freed by task 367 on cpu 1 at 65.362944s (0.032091s ago): [ 65.395096] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 65.395141] kunit_try_run_case+0x170/0x3f0 [ 65.395181] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.395224] kthread+0x328/0x630 [ 65.395260] ret_from_fork+0x10/0x20 [ 65.395298] [ 65.395347] CPU: 1 UID: 0 PID: 367 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 65.395427] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.395468] Hardware name: linux,dummy-virt (DT) [ 65.395501] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access
[ 42.610411] ================================================================== [ 42.610580] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 42.610580] [ 42.610682] Invalid read at 0x00000000abd61c0e: [ 42.611018] test_invalid_access+0xdc/0x1f0 [ 42.611078] kunit_try_run_case+0x170/0x3f0 [ 42.613221] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.613304] kthread+0x328/0x630 [ 42.613375] ret_from_fork+0x10/0x20 [ 42.613470] [ 42.613547] CPU: 0 UID: 0 PID: 363 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 42.613659] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.613879] Hardware name: linux,dummy-virt (DT) [ 42.613957] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[ 34.970502] ================================================================== [ 34.970585] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 34.970585] [ 34.971061] Out-of-bounds write at 0x00000000769d978e (1B left of kfence-#128): [ 34.971134] test_out_of_bounds_write+0x100/0x240 [ 34.971186] kunit_try_run_case+0x170/0x3f0 [ 34.971232] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.971277] kthread+0x328/0x630 [ 34.971315] ret_from_fork+0x10/0x20 [ 34.971356] [ 34.971380] kfence-#128: 0x00000000ab7166a3-0x0000000024ef8551, size=32, cache=test [ 34.971380] [ 34.971429] allocated by task 325 on cpu 1 at 34.970344s (0.001082s ago): [ 34.971512] test_alloc+0x230/0x628 [ 34.971555] test_out_of_bounds_write+0xc8/0x240 [ 34.971598] kunit_try_run_case+0x170/0x3f0 [ 34.971638] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.971681] kthread+0x328/0x630 [ 34.971716] ret_from_fork+0x10/0x20 [ 34.971755] [ 34.971797] CPU: 1 UID: 0 PID: 325 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 34.971874] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.971903] Hardware name: linux,dummy-virt (DT) [ 34.971935] ================================================================== [ 34.758953] ================================================================== [ 34.759080] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 34.759080] [ 34.759182] Out-of-bounds write at 0x000000001345a9b6 (1B left of kfence-#126): [ 34.759250] test_out_of_bounds_write+0x100/0x240 [ 34.759299] kunit_try_run_case+0x170/0x3f0 [ 34.759343] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.759385] kthread+0x328/0x630 [ 34.759665] ret_from_fork+0x10/0x20 [ 34.759722] [ 34.759748] kfence-#126: 0x00000000633f9b0e-0x00000000cb91990b, size=32, cache=kmalloc-32 [ 34.759748] [ 34.759831] allocated by task 323 on cpu 1 at 34.758784s (0.001012s ago): [ 34.759903] test_alloc+0x29c/0x628 [ 34.759944] test_out_of_bounds_write+0xc8/0x240 [ 34.760169] kunit_try_run_case+0x170/0x3f0 [ 34.760252] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.760296] kthread+0x328/0x630 [ 34.760334] ret_from_fork+0x10/0x20 [ 34.760423] [ 34.760497] CPU: 1 UID: 0 PID: 323 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 34.760667] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.760716] Hardware name: linux,dummy-virt (DT) [ 34.760775] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[ 42.378296] ================================================================== [ 42.378388] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 42.378388] [ 42.378471] Corrupted memory at 0x00000000352cff21 [ ! . . . . . . . . . . . . . . . ] (in kfence-#199): [ 42.378782] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 42.378833] kunit_try_run_case+0x170/0x3f0 [ 42.378873] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.378916] kthread+0x328/0x630 [ 42.378953] ret_from_fork+0x10/0x20 [ 42.378994] [ 42.379017] kfence-#199: 0x000000004d68ca4b-0x000000009d860e4e, size=73, cache=kmalloc-96 [ 42.379017] [ 42.379070] allocated by task 357 on cpu 0 at 42.378061s (0.001005s ago): [ 42.379142] test_alloc+0x29c/0x628 [ 42.379183] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 42.379227] kunit_try_run_case+0x170/0x3f0 [ 42.379269] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.379312] kthread+0x328/0x630 [ 42.379349] ret_from_fork+0x10/0x20 [ 42.379390] [ 42.379413] freed by task 357 on cpu 0 at 42.378204s (0.001205s ago): [ 42.379487] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 42.379532] kunit_try_run_case+0x170/0x3f0 [ 42.379572] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.379615] kthread+0x328/0x630 [ 42.379652] ret_from_fork+0x10/0x20 [ 42.379691] [ 42.379733] CPU: 0 UID: 0 PID: 357 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 42.379812] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.379842] Hardware name: linux,dummy-virt (DT) [ 42.379875] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[ 42.170299] ================================================================== [ 42.170399] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 42.170399] [ 42.170519] Out-of-bounds read at 0x0000000097e63288 (105B right of kfence-#197): [ 42.170580] test_kmalloc_aligned_oob_read+0x238/0x468 [ 42.170630] kunit_try_run_case+0x170/0x3f0 [ 42.170673] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.170718] kthread+0x328/0x630 [ 42.170758] ret_from_fork+0x10/0x20 [ 42.170800] [ 42.170824] kfence-#197: 0x00000000078d9283-0x0000000047d657d2, size=73, cache=kmalloc-96 [ 42.170824] [ 42.170876] allocated by task 355 on cpu 0 at 42.170043s (0.000828s ago): [ 42.170946] test_alloc+0x29c/0x628 [ 42.170987] test_kmalloc_aligned_oob_read+0x100/0x468 [ 42.171030] kunit_try_run_case+0x170/0x3f0 [ 42.171069] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.171116] kthread+0x328/0x630 [ 42.171153] ret_from_fork+0x10/0x20 [ 42.171191] [ 42.171239] CPU: 0 UID: 0 PID: 355 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 42.171318] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.171346] Hardware name: linux,dummy-virt (DT) [ 42.171380] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption
[ 36.554179] ================================================================== [ 36.554277] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 36.554277] [ 36.554344] Corrupted memory at 0x00000000e6ccf6bc [ ! . . . . . . . . . . . . . . . ] (in kfence-#143): [ 36.554669] test_corruption+0x120/0x378 [ 36.554718] kunit_try_run_case+0x170/0x3f0 [ 36.554761] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.554806] kthread+0x328/0x630 [ 36.554844] ret_from_fork+0x10/0x20 [ 36.554885] [ 36.554908] kfence-#143: 0x000000008bb1148e-0x000000005cc069ec, size=32, cache=test [ 36.554908] [ 36.554963] allocated by task 345 on cpu 0 at 36.554027s (0.000931s ago): [ 36.555026] test_alloc+0x230/0x628 [ 36.555066] test_corruption+0xdc/0x378 [ 36.555112] kunit_try_run_case+0x170/0x3f0 [ 36.555153] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.555196] kthread+0x328/0x630 [ 36.555232] ret_from_fork+0x10/0x20 [ 36.555271] [ 36.555293] freed by task 345 on cpu 0 at 36.554088s (0.001202s ago): [ 36.555355] test_corruption+0x120/0x378 [ 36.555399] kunit_try_run_case+0x170/0x3f0 [ 36.555447] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.555490] kthread+0x328/0x630 [ 36.555525] ret_from_fork+0x10/0x20 [ 36.555564] [ 36.555607] CPU: 0 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 36.555684] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.555714] Hardware name: linux,dummy-virt (DT) [ 36.555748] ================================================================== [ 36.346328] ================================================================== [ 36.346410] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 36.346410] [ 36.346487] Corrupted memory at 0x0000000012a5ba25 [ ! ] (in kfence-#141): [ 36.346613] test_corruption+0x284/0x378 [ 36.346662] kunit_try_run_case+0x170/0x3f0 [ 36.346702] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.346749] kthread+0x328/0x630 [ 36.346786] ret_from_fork+0x10/0x20 [ 36.346827] [ 36.346851] kfence-#141: 0x0000000019bd46ad-0x00000000000a3bd2, size=32, cache=kmalloc-32 [ 36.346851] [ 36.346906] allocated by task 343 on cpu 0 at 36.346059s (0.000843s ago): [ 36.346967] test_alloc+0x29c/0x628 [ 36.347009] test_corruption+0x198/0x378 [ 36.347050] kunit_try_run_case+0x170/0x3f0 [ 36.347090] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.347141] kthread+0x328/0x630 [ 36.347176] ret_from_fork+0x10/0x20 [ 36.347216] [ 36.347238] freed by task 343 on cpu 0 at 36.346156s (0.001079s ago): [ 36.347301] test_corruption+0x284/0x378 [ 36.347342] kunit_try_run_case+0x170/0x3f0 [ 36.347380] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.347423] kthread+0x328/0x630 [ 36.347470] ret_from_fork+0x10/0x20 [ 36.347509] [ 36.347553] CPU: 0 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 36.347632] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.347667] Hardware name: linux,dummy-virt (DT) [ 36.347703] ================================================================== [ 36.762190] ================================================================== [ 36.762281] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 36.762281] [ 36.762345] Corrupted memory at 0x000000007b446c25 [ ! ] (in kfence-#145): [ 36.762472] test_corruption+0x1d8/0x378 [ 36.762521] kunit_try_run_case+0x170/0x3f0 [ 36.762562] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.762607] kthread+0x328/0x630 [ 36.762644] ret_from_fork+0x10/0x20 [ 36.762685] [ 36.762708] kfence-#145: 0x0000000093171a28-0x00000000eb489662, size=32, cache=test [ 36.762708] [ 36.762762] allocated by task 345 on cpu 0 at 36.762044s (0.000715s ago): [ 36.762822] test_alloc+0x230/0x628 [ 36.762864] test_corruption+0x198/0x378 [ 36.762906] kunit_try_run_case+0x170/0x3f0 [ 36.762946] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.762989] kthread+0x328/0x630 [ 36.763025] ret_from_fork+0x10/0x20 [ 36.763065] [ 36.763089] freed by task 345 on cpu 0 at 36.762101s (0.000984s ago): [ 36.763155] test_corruption+0x1d8/0x378 [ 36.763197] kunit_try_run_case+0x170/0x3f0 [ 36.763236] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.763280] kthread+0x328/0x630 [ 36.763315] ret_from_fork+0x10/0x20 [ 36.763355] [ 36.763395] CPU: 0 UID: 0 PID: 345 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 36.763483] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.763513] Hardware name: linux,dummy-virt (DT) [ 36.763546] ================================================================== [ 36.242398] ================================================================== [ 36.242533] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 36.242533] [ 36.242608] Corrupted memory at 0x0000000037f7c8de [ ! . . . . . . . . . . . . . . . ] (in kfence-#140): [ 36.243728] test_corruption+0x278/0x378 [ 36.243785] kunit_try_run_case+0x170/0x3f0 [ 36.243830] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.243874] kthread+0x328/0x630 [ 36.243915] ret_from_fork+0x10/0x20 [ 36.243958] [ 36.243981] kfence-#140: 0x00000000b97bb9f4-0x000000005cb0dd19, size=32, cache=kmalloc-32 [ 36.243981] [ 36.244042] allocated by task 343 on cpu 0 at 36.242090s (0.001948s ago): [ 36.244106] test_alloc+0x29c/0x628 [ 36.244149] test_corruption+0xdc/0x378 [ 36.244191] kunit_try_run_case+0x170/0x3f0 [ 36.244231] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.244274] kthread+0x328/0x630 [ 36.244309] ret_from_fork+0x10/0x20 [ 36.244350] [ 36.244373] freed by task 343 on cpu 0 at 36.242188s (0.002182s ago): [ 36.244447] test_corruption+0x278/0x378 [ 36.244488] kunit_try_run_case+0x170/0x3f0 [ 36.244526] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.244569] kthread+0x328/0x630 [ 36.244604] ret_from_fork+0x10/0x20 [ 36.244643] [ 36.244693] CPU: 0 UID: 0 PID: 343 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 36.244771] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.244801] Hardware name: linux,dummy-virt (DT) [ 36.244836] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[ 35.722156] ================================================================== [ 35.722236] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 35.722236] [ 35.722297] Invalid free of 0x00000000d8f4fd26 (in kfence-#135): [ 35.722348] test_invalid_addr_free+0x1ac/0x238 [ 35.722397] kunit_try_run_case+0x170/0x3f0 [ 35.722457] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.722502] kthread+0x328/0x630 [ 35.722544] ret_from_fork+0x10/0x20 [ 35.722586] [ 35.722609] kfence-#135: 0x00000000997ae51e-0x00000000de6a9ff1, size=32, cache=kmalloc-32 [ 35.722609] [ 35.722663] allocated by task 339 on cpu 1 at 35.722019s (0.000640s ago): [ 35.722727] test_alloc+0x29c/0x628 [ 35.722769] test_invalid_addr_free+0xd4/0x238 [ 35.722813] kunit_try_run_case+0x170/0x3f0 [ 35.722852] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.722895] kthread+0x328/0x630 [ 35.722933] ret_from_fork+0x10/0x20 [ 35.722974] [ 35.723016] CPU: 1 UID: 0 PID: 339 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 35.723096] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.723149] Hardware name: linux,dummy-virt (DT) [ 35.723183] ================================================================== [ 35.826083] ================================================================== [ 35.826166] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 35.826166] [ 35.826228] Invalid free of 0x0000000008f1e645 (in kfence-#136): [ 35.826279] test_invalid_addr_free+0xec/0x238 [ 35.826328] kunit_try_run_case+0x170/0x3f0 [ 35.826371] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.826415] kthread+0x328/0x630 [ 35.826471] ret_from_fork+0x10/0x20 [ 35.826512] [ 35.826535] kfence-#136: 0x0000000075c6a28b-0x0000000044878f7b, size=32, cache=test [ 35.826535] [ 35.826586] allocated by task 341 on cpu 1 at 35.825967s (0.000615s ago): [ 35.826648] test_alloc+0x230/0x628 [ 35.826691] test_invalid_addr_free+0xd4/0x238 [ 35.826733] kunit_try_run_case+0x170/0x3f0 [ 35.826773] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.826815] kthread+0x328/0x630 [ 35.826851] ret_from_fork+0x10/0x20 [ 35.826890] [ 35.826932] CPU: 1 UID: 0 PID: 341 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 35.827009] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.827039] Hardware name: linux,dummy-virt (DT) [ 35.827071] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free
[ 35.618428] ================================================================== [ 35.618540] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 35.618540] [ 35.618616] Invalid free of 0x000000006248b1dc (in kfence-#134): [ 35.618689] test_double_free+0x100/0x238 [ 35.618745] kunit_try_run_case+0x170/0x3f0 [ 35.618815] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.618860] kthread+0x328/0x630 [ 35.618917] ret_from_fork+0x10/0x20 [ 35.618986] [ 35.619015] kfence-#134: 0x000000006248b1dc-0x0000000080390fac, size=32, cache=test [ 35.619015] [ 35.619129] allocated by task 337 on cpu 1 at 35.618189s (0.000901s ago): [ 35.619196] test_alloc+0x230/0x628 [ 35.619241] test_double_free+0xd4/0x238 [ 35.619298] kunit_try_run_case+0x170/0x3f0 [ 35.619338] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.619381] kthread+0x328/0x630 [ 35.619416] ret_from_fork+0x10/0x20 [ 35.619737] [ 35.619771] freed by task 337 on cpu 1 at 35.618244s (0.001523s ago): [ 35.619859] test_double_free+0xf0/0x238 [ 35.620060] kunit_try_run_case+0x170/0x3f0 [ 35.620108] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.620154] kthread+0x328/0x630 [ 35.620228] ret_from_fork+0x10/0x20 [ 35.620292] [ 35.620362] CPU: 1 UID: 0 PID: 337 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 35.620494] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.620522] Hardware name: linux,dummy-virt (DT) [ 35.620581] ================================================================== [ 35.511931] ================================================================== [ 35.512034] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 35.512034] [ 35.512102] Invalid free of 0x000000001312013a (in kfence-#133): [ 35.512322] test_double_free+0x1bc/0x238 [ 35.512413] kunit_try_run_case+0x170/0x3f0 [ 35.512492] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.512555] kthread+0x328/0x630 [ 35.512601] ret_from_fork+0x10/0x20 [ 35.512644] [ 35.512669] kfence-#133: 0x000000001312013a-0x0000000015469428, size=32, cache=kmalloc-32 [ 35.512669] [ 35.512755] allocated by task 335 on cpu 1 at 35.511277s (0.001457s ago): [ 35.512820] test_alloc+0x29c/0x628 [ 35.512886] test_double_free+0xd4/0x238 [ 35.512929] kunit_try_run_case+0x170/0x3f0 [ 35.512966] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.513010] kthread+0x328/0x630 [ 35.513047] ret_from_fork+0x10/0x20 [ 35.513086] [ 35.513111] freed by task 335 on cpu 1 at 35.511344s (0.001763s ago): [ 35.513271] test_double_free+0x1ac/0x238 [ 35.513376] kunit_try_run_case+0x170/0x3f0 [ 35.513429] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.513483] kthread+0x328/0x630 [ 35.513520] ret_from_fork+0x10/0x20 [ 35.513576] [ 35.513836] CPU: 1 UID: 0 PID: 335 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 35.513932] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.513962] Hardware name: linux,dummy-virt (DT) [ 35.513995] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[ 35.078617] ================================================================== [ 35.078721] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 35.078721] [ 35.078816] Use-after-free read at 0x0000000085cab558 (in kfence-#129): [ 35.079043] test_use_after_free_read+0x114/0x248 [ 35.079119] kunit_try_run_case+0x170/0x3f0 [ 35.079170] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.079215] kthread+0x328/0x630 [ 35.079273] ret_from_fork+0x10/0x20 [ 35.079346] [ 35.079371] kfence-#129: 0x0000000085cab558-0x000000005b8915e4, size=32, cache=kmalloc-32 [ 35.079371] [ 35.079457] allocated by task 327 on cpu 1 at 35.078261s (0.001191s ago): [ 35.079529] test_alloc+0x29c/0x628 [ 35.079570] test_use_after_free_read+0xd0/0x248 [ 35.079740] kunit_try_run_case+0x170/0x3f0 [ 35.079808] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.079853] kthread+0x328/0x630 [ 35.079905] ret_from_fork+0x10/0x20 [ 35.079956] [ 35.080119] freed by task 327 on cpu 1 at 35.078332s (0.001704s ago): [ 35.080504] test_use_after_free_read+0x1c0/0x248 [ 35.080574] kunit_try_run_case+0x170/0x3f0 [ 35.080664] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.080707] kthread+0x328/0x630 [ 35.080742] ret_from_fork+0x10/0x20 [ 35.080839] [ 35.080907] CPU: 1 UID: 0 PID: 327 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 35.080990] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.081019] Hardware name: linux,dummy-virt (DT) [ 35.081053] ================================================================== [ 35.187552] ================================================================== [ 35.187666] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 35.187666] [ 35.187753] Use-after-free read at 0x00000000c231628f (in kfence-#130): [ 35.187829] test_use_after_free_read+0x114/0x248 [ 35.187896] kunit_try_run_case+0x170/0x3f0 [ 35.187953] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.187997] kthread+0x328/0x630 [ 35.188074] ret_from_fork+0x10/0x20 [ 35.188150] [ 35.188176] kfence-#130: 0x00000000c231628f-0x00000000f7edd4a8, size=32, cache=test [ 35.188176] [ 35.188252] allocated by task 329 on cpu 1 at 35.187364s (0.000867s ago): [ 35.188352] test_alloc+0x230/0x628 [ 35.188420] test_use_after_free_read+0xd0/0x248 [ 35.188497] kunit_try_run_case+0x170/0x3f0 [ 35.188694] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.188741] kthread+0x328/0x630 [ 35.188910] ret_from_fork+0x10/0x20 [ 35.188964] [ 35.189098] freed by task 329 on cpu 1 at 35.187422s (0.001644s ago): [ 35.189232] test_use_after_free_read+0xf0/0x248 [ 35.189319] kunit_try_run_case+0x170/0x3f0 [ 35.189363] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.189492] kthread+0x328/0x630 [ 35.189542] ret_from_fork+0x10/0x20 [ 35.189598] [ 35.189656] CPU: 1 UID: 0 PID: 329 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 35.189822] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.189862] Hardware name: linux,dummy-virt (DT) [ 35.189894] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[ 34.322674] ================================================================== [ 34.322752] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 34.322752] [ 34.323212] Out-of-bounds read at 0x00000000403207d7 (1B left of kfence-#122): [ 34.323509] test_out_of_bounds_read+0x114/0x3e0 [ 34.323640] kunit_try_run_case+0x170/0x3f0 [ 34.323707] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.323754] kthread+0x328/0x630 [ 34.323988] ret_from_fork+0x10/0x20 [ 34.324043] [ 34.324161] kfence-#122: 0x00000000bfb0626a-0x0000000046d8c3c3, size=32, cache=test [ 34.324161] [ 34.324314] allocated by task 321 on cpu 1 at 34.322504s (0.001779s ago): [ 34.324516] test_alloc+0x230/0x628 [ 34.324570] test_out_of_bounds_read+0xdc/0x3e0 [ 34.324614] kunit_try_run_case+0x170/0x3f0 [ 34.324884] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.325040] kthread+0x328/0x630 [ 34.325279] ret_from_fork+0x10/0x20 [ 34.325349] [ 34.325395] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 34.325712] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.325853] Hardware name: linux,dummy-virt (DT) [ 34.325888] ================================================================== [ 34.214913] ================================================================== [ 34.215009] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 34.215009] [ 34.215158] Out-of-bounds read at 0x00000000267f2a28 (32B right of kfence-#121): [ 34.215217] test_out_of_bounds_read+0x1c8/0x3e0 [ 34.215286] kunit_try_run_case+0x170/0x3f0 [ 34.215457] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.215619] kthread+0x328/0x630 [ 34.215718] ret_from_fork+0x10/0x20 [ 34.215761] [ 34.215827] kfence-#121: 0x000000003af453e6-0x000000002d4758f5, size=32, cache=kmalloc-32 [ 34.215827] [ 34.215915] allocated by task 319 on cpu 1 at 34.214381s (0.001514s ago): [ 34.215987] test_alloc+0x29c/0x628 [ 34.216031] test_out_of_bounds_read+0x198/0x3e0 [ 34.216273] kunit_try_run_case+0x170/0x3f0 [ 34.216357] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.216403] kthread+0x328/0x630 [ 34.216516] ret_from_fork+0x10/0x20 [ 34.216562] [ 34.216607] CPU: 1 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 34.216688] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.216715] Hardware name: linux,dummy-virt (DT) [ 34.216748] ================================================================== [ 34.109466] ================================================================== [ 34.109638] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 34.109638] [ 34.109889] Out-of-bounds read at 0x00000000e39724b9 (1B left of kfence-#120): [ 34.110370] test_out_of_bounds_read+0x114/0x3e0 [ 34.110536] kunit_try_run_case+0x170/0x3f0 [ 34.110649] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.110717] kthread+0x328/0x630 [ 34.110870] ret_from_fork+0x10/0x20 [ 34.110921] [ 34.111124] kfence-#120: 0x0000000037ee6bdb-0x000000005c1d47f7, size=32, cache=kmalloc-32 [ 34.111124] [ 34.111326] allocated by task 319 on cpu 1 at 34.108465s (0.002801s ago): [ 34.112140] test_alloc+0x29c/0x628 [ 34.112236] test_out_of_bounds_read+0xdc/0x3e0 [ 34.112282] kunit_try_run_case+0x170/0x3f0 [ 34.112351] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.112394] kthread+0x328/0x630 [ 34.112430] ret_from_fork+0x10/0x20 [ 34.112654] [ 34.112820] CPU: 1 UID: 0 PID: 319 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 34.112970] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.113038] Hardware name: linux,dummy-virt (DT) [ 34.113103] ================================================================== [ 34.538655] ================================================================== [ 34.538879] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 34.538879] [ 34.538969] Out-of-bounds read at 0x000000007c9b0f48 (32B right of kfence-#124): [ 34.539256] test_out_of_bounds_read+0x1c8/0x3e0 [ 34.539533] kunit_try_run_case+0x170/0x3f0 [ 34.539600] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.539647] kthread+0x328/0x630 [ 34.539691] ret_from_fork+0x10/0x20 [ 34.539887] [ 34.539925] kfence-#124: 0x000000001b52b65d-0x000000001f22bcb0, size=32, cache=test [ 34.539925] [ 34.539978] allocated by task 321 on cpu 1 at 34.538354s (0.001620s ago): [ 34.540171] test_alloc+0x230/0x628 [ 34.540327] test_out_of_bounds_read+0x198/0x3e0 [ 34.540447] kunit_try_run_case+0x170/0x3f0 [ 34.540737] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.541000] kthread+0x328/0x630 [ 34.541310] ret_from_fork+0x10/0x20 [ 34.541378] [ 34.541758] CPU: 1 UID: 0 PID: 321 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 34.542312] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.542349] Hardware name: linux,dummy-virt (DT) [ 34.542749] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[ 33.783973] ================================================================== [ 33.784024] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 33.784079] Write of size 121 at addr fff00000c64f9600 by task kunit_try_catch/317 [ 33.784132] [ 33.784163] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.784247] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.785235] Hardware name: linux,dummy-virt (DT) [ 33.785610] Call trace: [ 33.786074] show_stack+0x20/0x38 (C) [ 33.786134] dump_stack_lvl+0x8c/0xd0 [ 33.786407] print_report+0x118/0x5d0 [ 33.786481] kasan_report+0xdc/0x128 [ 33.786527] kasan_check_range+0x100/0x1a8 [ 33.786575] __kasan_check_write+0x20/0x30 [ 33.786624] strncpy_from_user+0x3c/0x2a0 [ 33.787443] copy_user_test_oob+0x5c0/0xec8 [ 33.787499] kunit_try_run_case+0x170/0x3f0 [ 33.787548] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.787604] kthread+0x328/0x630 [ 33.787648] ret_from_fork+0x10/0x20 [ 33.788636] [ 33.788675] Allocated by task 317: [ 33.788705] kasan_save_stack+0x3c/0x68 [ 33.789044] kasan_save_track+0x20/0x40 [ 33.789095] kasan_save_alloc_info+0x40/0x58 [ 33.789364] __kasan_kmalloc+0xd4/0xd8 [ 33.789405] __kmalloc_noprof+0x198/0x4c8 [ 33.789457] kunit_kmalloc_array+0x34/0x88 [ 33.789496] copy_user_test_oob+0xac/0xec8 [ 33.789775] kunit_try_run_case+0x170/0x3f0 [ 33.790403] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.791059] kthread+0x328/0x630 [ 33.791114] ret_from_fork+0x10/0x20 [ 33.791157] [ 33.791180] The buggy address belongs to the object at fff00000c64f9600 [ 33.791180] which belongs to the cache kmalloc-128 of size 128 [ 33.791242] The buggy address is located 0 bytes inside of [ 33.791242] allocated 120-byte region [fff00000c64f9600, fff00000c64f9678) [ 33.791307] [ 33.791456] The buggy address belongs to the physical page: [ 33.791768] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f9 [ 33.792202] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.792413] page_type: f5(slab) [ 33.792466] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.792520] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.792563] page dumped because: kasan: bad access detected [ 33.792598] [ 33.792617] Memory state around the buggy address: [ 33.792652] fff00000c64f9500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.792704] fff00000c64f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.793272] >fff00000c64f9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.793444] ^ [ 33.793659] fff00000c64f9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.794019] fff00000c64f9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.794254] ================================================================== [ 33.797683] ================================================================== [ 33.797743] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 33.797795] Write of size 1 at addr fff00000c64f9678 by task kunit_try_catch/317 [ 33.797845] [ 33.797882] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.798025] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.798057] Hardware name: linux,dummy-virt (DT) [ 33.798091] Call trace: [ 33.798116] show_stack+0x20/0x38 (C) [ 33.798168] dump_stack_lvl+0x8c/0xd0 [ 33.798228] print_report+0x118/0x5d0 [ 33.798313] kasan_report+0xdc/0x128 [ 33.798358] __asan_report_store1_noabort+0x20/0x30 [ 33.798429] strncpy_from_user+0x270/0x2a0 [ 33.798487] copy_user_test_oob+0x5c0/0xec8 [ 33.798536] kunit_try_run_case+0x170/0x3f0 [ 33.798584] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.798638] kthread+0x328/0x630 [ 33.798681] ret_from_fork+0x10/0x20 [ 33.798870] [ 33.798935] Allocated by task 317: [ 33.798964] kasan_save_stack+0x3c/0x68 [ 33.799057] kasan_save_track+0x20/0x40 [ 33.799100] kasan_save_alloc_info+0x40/0x58 [ 33.799171] __kasan_kmalloc+0xd4/0xd8 [ 33.799362] __kmalloc_noprof+0x198/0x4c8 [ 33.799523] kunit_kmalloc_array+0x34/0x88 [ 33.799563] copy_user_test_oob+0xac/0xec8 [ 33.799609] kunit_try_run_case+0x170/0x3f0 [ 33.799656] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.799849] kthread+0x328/0x630 [ 33.799891] ret_from_fork+0x10/0x20 [ 33.800046] [ 33.800101] The buggy address belongs to the object at fff00000c64f9600 [ 33.800101] which belongs to the cache kmalloc-128 of size 128 [ 33.800161] The buggy address is located 0 bytes to the right of [ 33.800161] allocated 120-byte region [fff00000c64f9600, fff00000c64f9678) [ 33.800256] [ 33.800330] The buggy address belongs to the physical page: [ 33.800408] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f9 [ 33.800806] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.800923] page_type: f5(slab) [ 33.801077] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.801162] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.801205] page dumped because: kasan: bad access detected [ 33.801490] [ 33.801516] Memory state around the buggy address: [ 33.801702] fff00000c64f9500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.801752] fff00000c64f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.802276] >fff00000c64f9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.802328] ^ [ 33.802372] fff00000c64f9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.802417] fff00000c64f9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.803002] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[ 33.718299] ================================================================== [ 33.718380] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 33.718522] Read of size 121 at addr fff00000c64f9600 by task kunit_try_catch/317 [ 33.718576] [ 33.718639] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.719150] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.719217] Hardware name: linux,dummy-virt (DT) [ 33.719549] Call trace: [ 33.719659] show_stack+0x20/0x38 (C) [ 33.719930] dump_stack_lvl+0x8c/0xd0 [ 33.719984] print_report+0x118/0x5d0 [ 33.720747] kasan_report+0xdc/0x128 [ 33.720822] kasan_check_range+0x100/0x1a8 [ 33.720872] __kasan_check_read+0x20/0x30 [ 33.720922] copy_user_test_oob+0x728/0xec8 [ 33.721500] kunit_try_run_case+0x170/0x3f0 [ 33.721676] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.721742] kthread+0x328/0x630 [ 33.721803] ret_from_fork+0x10/0x20 [ 33.722133] [ 33.722157] Allocated by task 317: [ 33.722187] kasan_save_stack+0x3c/0x68 [ 33.722390] kasan_save_track+0x20/0x40 [ 33.722576] kasan_save_alloc_info+0x40/0x58 [ 33.722759] __kasan_kmalloc+0xd4/0xd8 [ 33.722993] __kmalloc_noprof+0x198/0x4c8 [ 33.723079] kunit_kmalloc_array+0x34/0x88 [ 33.723173] copy_user_test_oob+0xac/0xec8 [ 33.723344] kunit_try_run_case+0x170/0x3f0 [ 33.723386] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.723764] kthread+0x328/0x630 [ 33.724096] ret_from_fork+0x10/0x20 [ 33.724269] [ 33.724412] The buggy address belongs to the object at fff00000c64f9600 [ 33.724412] which belongs to the cache kmalloc-128 of size 128 [ 33.724815] The buggy address is located 0 bytes inside of [ 33.724815] allocated 120-byte region [fff00000c64f9600, fff00000c64f9678) [ 33.725100] [ 33.725180] The buggy address belongs to the physical page: [ 33.725378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f9 [ 33.725501] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.725567] page_type: f5(slab) [ 33.725684] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.725860] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.726110] page dumped because: kasan: bad access detected [ 33.726166] [ 33.726187] Memory state around the buggy address: [ 33.726232] fff00000c64f9500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.726446] fff00000c64f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.726640] >fff00000c64f9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.726880] ^ [ 33.727022] fff00000c64f9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.727343] fff00000c64f9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.727394] ================================================================== [ 33.696278] ================================================================== [ 33.699258] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 33.699379] Write of size 121 at addr fff00000c64f9600 by task kunit_try_catch/317 [ 33.699445] [ 33.699498] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.699589] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.699618] Hardware name: linux,dummy-virt (DT) [ 33.699653] Call trace: [ 33.699682] show_stack+0x20/0x38 (C) [ 33.699739] dump_stack_lvl+0x8c/0xd0 [ 33.699795] print_report+0x118/0x5d0 [ 33.699840] kasan_report+0xdc/0x128 [ 33.699888] kasan_check_range+0x100/0x1a8 [ 33.699939] __kasan_check_write+0x20/0x30 [ 33.699986] copy_user_test_oob+0x234/0xec8 [ 33.700037] kunit_try_run_case+0x170/0x3f0 [ 33.700089] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.700146] kthread+0x328/0x630 [ 33.700193] ret_from_fork+0x10/0x20 [ 33.700246] [ 33.700269] Allocated by task 317: [ 33.700300] kasan_save_stack+0x3c/0x68 [ 33.700348] kasan_save_track+0x20/0x40 [ 33.700388] kasan_save_alloc_info+0x40/0x58 [ 33.700429] __kasan_kmalloc+0xd4/0xd8 [ 33.700480] __kmalloc_noprof+0x198/0x4c8 [ 33.700525] kunit_kmalloc_array+0x34/0x88 [ 33.700573] copy_user_test_oob+0xac/0xec8 [ 33.700615] kunit_try_run_case+0x170/0x3f0 [ 33.700665] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.700710] kthread+0x328/0x630 [ 33.700807] ret_from_fork+0x10/0x20 [ 33.700948] [ 33.701012] The buggy address belongs to the object at fff00000c64f9600 [ 33.701012] which belongs to the cache kmalloc-128 of size 128 [ 33.701111] The buggy address is located 0 bytes inside of [ 33.701111] allocated 120-byte region [fff00000c64f9600, fff00000c64f9678) [ 33.701544] [ 33.701579] The buggy address belongs to the physical page: [ 33.701618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f9 [ 33.701977] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.702060] page_type: f5(slab) [ 33.702116] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.702175] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.702218] page dumped because: kasan: bad access detected [ 33.702255] [ 33.702276] Memory state around the buggy address: [ 33.702313] fff00000c64f9500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.703001] fff00000c64f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.703061] >fff00000c64f9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.703103] ^ [ 33.703157] fff00000c64f9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.703410] fff00000c64f9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.703650] ================================================================== [ 33.741078] ================================================================== [ 33.741139] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 33.742025] Write of size 121 at addr fff00000c64f9600 by task kunit_try_catch/317 [ 33.742118] [ 33.742166] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.742254] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.742309] Hardware name: linux,dummy-virt (DT) [ 33.742343] Call trace: [ 33.742384] show_stack+0x20/0x38 (C) [ 33.742661] dump_stack_lvl+0x8c/0xd0 [ 33.742917] print_report+0x118/0x5d0 [ 33.743410] kasan_report+0xdc/0x128 [ 33.743712] kasan_check_range+0x100/0x1a8 [ 33.744045] __kasan_check_write+0x20/0x30 [ 33.744494] copy_user_test_oob+0x35c/0xec8 [ 33.744673] kunit_try_run_case+0x170/0x3f0 [ 33.744723] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.745276] kthread+0x328/0x630 [ 33.745363] ret_from_fork+0x10/0x20 [ 33.745416] [ 33.745737] Allocated by task 317: [ 33.745791] kasan_save_stack+0x3c/0x68 [ 33.745839] kasan_save_track+0x20/0x40 [ 33.745891] kasan_save_alloc_info+0x40/0x58 [ 33.745931] __kasan_kmalloc+0xd4/0xd8 [ 33.746073] __kmalloc_noprof+0x198/0x4c8 [ 33.746121] kunit_kmalloc_array+0x34/0x88 [ 33.746183] copy_user_test_oob+0xac/0xec8 [ 33.746448] kunit_try_run_case+0x170/0x3f0 [ 33.746498] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.746550] kthread+0x328/0x630 [ 33.746586] ret_from_fork+0x10/0x20 [ 33.746625] [ 33.747053] The buggy address belongs to the object at fff00000c64f9600 [ 33.747053] which belongs to the cache kmalloc-128 of size 128 [ 33.747141] The buggy address is located 0 bytes inside of [ 33.747141] allocated 120-byte region [fff00000c64f9600, fff00000c64f9678) [ 33.747319] [ 33.747517] The buggy address belongs to the physical page: [ 33.747554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f9 [ 33.747613] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.748041] page_type: f5(slab) [ 33.748095] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.748165] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.748362] page dumped because: kasan: bad access detected [ 33.748397] [ 33.748418] Memory state around the buggy address: [ 33.748462] fff00000c64f9500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.748511] fff00000c64f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.748557] >fff00000c64f9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.748598] ^ [ 33.748924] fff00000c64f9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.748988] fff00000c64f9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.749028] ================================================================== [ 33.774196] ================================================================== [ 33.774258] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 33.774750] Read of size 121 at addr fff00000c64f9600 by task kunit_try_catch/317 [ 33.775020] [ 33.775227] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.775359] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.775824] Hardware name: linux,dummy-virt (DT) [ 33.775875] Call trace: [ 33.775899] show_stack+0x20/0x38 (C) [ 33.775953] dump_stack_lvl+0x8c/0xd0 [ 33.776144] print_report+0x118/0x5d0 [ 33.776347] kasan_report+0xdc/0x128 [ 33.776516] kasan_check_range+0x100/0x1a8 [ 33.776663] __kasan_check_read+0x20/0x30 [ 33.776899] copy_user_test_oob+0x4a0/0xec8 [ 33.776976] kunit_try_run_case+0x170/0x3f0 [ 33.777109] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.777167] kthread+0x328/0x630 [ 33.777210] ret_from_fork+0x10/0x20 [ 33.777925] [ 33.777969] Allocated by task 317: [ 33.778088] kasan_save_stack+0x3c/0x68 [ 33.778137] kasan_save_track+0x20/0x40 [ 33.778181] kasan_save_alloc_info+0x40/0x58 [ 33.778236] __kasan_kmalloc+0xd4/0xd8 [ 33.778279] __kmalloc_noprof+0x198/0x4c8 [ 33.778321] kunit_kmalloc_array+0x34/0x88 [ 33.779133] copy_user_test_oob+0xac/0xec8 [ 33.779482] kunit_try_run_case+0x170/0x3f0 [ 33.779693] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.779886] kthread+0x328/0x630 [ 33.779923] ret_from_fork+0x10/0x20 [ 33.780225] [ 33.780520] The buggy address belongs to the object at fff00000c64f9600 [ 33.780520] which belongs to the cache kmalloc-128 of size 128 [ 33.780808] The buggy address is located 0 bytes inside of [ 33.780808] allocated 120-byte region [fff00000c64f9600, fff00000c64f9678) [ 33.781113] [ 33.781138] The buggy address belongs to the physical page: [ 33.781457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f9 [ 33.781736] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.781806] page_type: f5(slab) [ 33.781847] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.781901] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.781943] page dumped because: kasan: bad access detected [ 33.781977] [ 33.781998] Memory state around the buggy address: [ 33.782031] fff00000c64f9500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.782076] fff00000c64f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.782257] >fff00000c64f9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.782334] ^ [ 33.782467] fff00000c64f9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.782514] fff00000c64f9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.782555] ================================================================== [ 33.750861] ================================================================== [ 33.750916] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 33.750969] Read of size 121 at addr fff00000c64f9600 by task kunit_try_catch/317 [ 33.751019] [ 33.751716] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.752295] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.752338] Hardware name: linux,dummy-virt (DT) [ 33.752371] Call trace: [ 33.752395] show_stack+0x20/0x38 (C) [ 33.752764] dump_stack_lvl+0x8c/0xd0 [ 33.752870] print_report+0x118/0x5d0 [ 33.752918] kasan_report+0xdc/0x128 [ 33.753039] kasan_check_range+0x100/0x1a8 [ 33.753300] __kasan_check_read+0x20/0x30 [ 33.753651] copy_user_test_oob+0x3c8/0xec8 [ 33.753973] kunit_try_run_case+0x170/0x3f0 [ 33.754024] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.754078] kthread+0x328/0x630 [ 33.754121] ret_from_fork+0x10/0x20 [ 33.754171] [ 33.754191] Allocated by task 317: [ 33.754219] kasan_save_stack+0x3c/0x68 [ 33.754265] kasan_save_track+0x20/0x40 [ 33.754307] kasan_save_alloc_info+0x40/0x58 [ 33.754707] __kasan_kmalloc+0xd4/0xd8 [ 33.754887] __kmalloc_noprof+0x198/0x4c8 [ 33.754929] kunit_kmalloc_array+0x34/0x88 [ 33.754969] copy_user_test_oob+0xac/0xec8 [ 33.755256] kunit_try_run_case+0x170/0x3f0 [ 33.755596] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.755670] kthread+0x328/0x630 [ 33.755977] ret_from_fork+0x10/0x20 [ 33.756186] [ 33.756303] The buggy address belongs to the object at fff00000c64f9600 [ 33.756303] which belongs to the cache kmalloc-128 of size 128 [ 33.756370] The buggy address is located 0 bytes inside of [ 33.756370] allocated 120-byte region [fff00000c64f9600, fff00000c64f9678) [ 33.756724] [ 33.757033] The buggy address belongs to the physical page: [ 33.757381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f9 [ 33.757459] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.757545] page_type: f5(slab) [ 33.757586] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.758191] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.758649] page dumped because: kasan: bad access detected [ 33.758690] [ 33.758711] Memory state around the buggy address: [ 33.758872] fff00000c64f9500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.758921] fff00000c64f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.759155] >fff00000c64f9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.759554] ^ [ 33.759780] fff00000c64f9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.759999] fff00000c64f9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.760040] ================================================================== [ 33.761247] ================================================================== [ 33.761592] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 33.762019] Write of size 121 at addr fff00000c64f9600 by task kunit_try_catch/317 [ 33.762213] [ 33.762248] CPU: 1 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.762672] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.762706] Hardware name: linux,dummy-virt (DT) [ 33.763051] Call trace: [ 33.763261] show_stack+0x20/0x38 (C) [ 33.763479] dump_stack_lvl+0x8c/0xd0 [ 33.763542] print_report+0x118/0x5d0 [ 33.763864] kasan_report+0xdc/0x128 [ 33.764198] kasan_check_range+0x100/0x1a8 [ 33.764255] __kasan_check_write+0x20/0x30 [ 33.764376] copy_user_test_oob+0x434/0xec8 [ 33.764536] kunit_try_run_case+0x170/0x3f0 [ 33.765070] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.765328] kthread+0x328/0x630 [ 33.765390] ret_from_fork+0x10/0x20 [ 33.765965] [ 33.766246] Allocated by task 317: [ 33.766286] kasan_save_stack+0x3c/0x68 [ 33.766379] kasan_save_track+0x20/0x40 [ 33.766445] kasan_save_alloc_info+0x40/0x58 [ 33.766622] __kasan_kmalloc+0xd4/0xd8 [ 33.766667] __kmalloc_noprof+0x198/0x4c8 [ 33.766710] kunit_kmalloc_array+0x34/0x88 [ 33.767194] copy_user_test_oob+0xac/0xec8 [ 33.767474] kunit_try_run_case+0x170/0x3f0 [ 33.767772] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.767867] kthread+0x328/0x630 [ 33.768001] ret_from_fork+0x10/0x20 [ 33.768048] [ 33.768423] The buggy address belongs to the object at fff00000c64f9600 [ 33.768423] which belongs to the cache kmalloc-128 of size 128 [ 33.768658] The buggy address is located 0 bytes inside of [ 33.768658] allocated 120-byte region [fff00000c64f9600, fff00000c64f9678) [ 33.768788] [ 33.768934] The buggy address belongs to the physical page: [ 33.769208] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f9 [ 33.769297] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.769412] page_type: f5(slab) [ 33.769529] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.769590] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.770038] page dumped because: kasan: bad access detected [ 33.770263] [ 33.770545] Memory state around the buggy address: [ 33.770600] fff00000c64f9500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.770654] fff00000c64f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.770705] >fff00000c64f9600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.771264] ^ [ 33.771332] fff00000c64f9680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.771444] fff00000c64f9700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.771783] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[ 33.635239] ================================================================== [ 33.635297] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 33.635352] Write of size 8 at addr fff00000c64f9578 by task kunit_try_catch/313 [ 33.635404] [ 33.637859] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.637965] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.637993] Hardware name: linux,dummy-virt (DT) [ 33.638027] Call trace: [ 33.638051] show_stack+0x20/0x38 (C) [ 33.638109] dump_stack_lvl+0x8c/0xd0 [ 33.638161] print_report+0x118/0x5d0 [ 33.638206] kasan_report+0xdc/0x128 [ 33.638253] kasan_check_range+0x100/0x1a8 [ 33.638301] __kasan_check_write+0x20/0x30 [ 33.638351] copy_to_kernel_nofault+0x8c/0x250 [ 33.638405] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 33.638927] kunit_try_run_case+0x170/0x3f0 [ 33.639306] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.639487] kthread+0x328/0x630 [ 33.639538] ret_from_fork+0x10/0x20 [ 33.639998] [ 33.640031] Allocated by task 313: [ 33.640246] kasan_save_stack+0x3c/0x68 [ 33.640499] kasan_save_track+0x20/0x40 [ 33.640710] kasan_save_alloc_info+0x40/0x58 [ 33.640763] __kasan_kmalloc+0xd4/0xd8 [ 33.640812] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.640856] copy_to_kernel_nofault_oob+0xc8/0x418 [ 33.640900] kunit_try_run_case+0x170/0x3f0 [ 33.640939] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.640983] kthread+0x328/0x630 [ 33.641414] ret_from_fork+0x10/0x20 [ 33.641793] [ 33.641828] The buggy address belongs to the object at fff00000c64f9500 [ 33.641828] which belongs to the cache kmalloc-128 of size 128 [ 33.641923] The buggy address is located 0 bytes to the right of [ 33.641923] allocated 120-byte region [fff00000c64f9500, fff00000c64f9578) [ 33.641989] [ 33.642206] The buggy address belongs to the physical page: [ 33.642266] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f9 [ 33.642323] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.642736] page_type: f5(slab) [ 33.642849] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.642982] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.643323] page dumped because: kasan: bad access detected [ 33.643528] [ 33.643608] Memory state around the buggy address: [ 33.643826] fff00000c64f9400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.643915] fff00000c64f9480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.644183] >fff00000c64f9500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.644409] ^ [ 33.644470] fff00000c64f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.644516] fff00000c64f9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.644557] ================================================================== [ 33.622977] ================================================================== [ 33.623047] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 33.623127] Read of size 8 at addr fff00000c64f9578 by task kunit_try_catch/313 [ 33.623179] [ 33.623221] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.623312] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.623340] Hardware name: linux,dummy-virt (DT) [ 33.623375] Call trace: [ 33.623401] show_stack+0x20/0x38 (C) [ 33.623586] dump_stack_lvl+0x8c/0xd0 [ 33.623758] print_report+0x118/0x5d0 [ 33.624307] kasan_report+0xdc/0x128 [ 33.624377] __asan_report_load8_noabort+0x20/0x30 [ 33.624928] copy_to_kernel_nofault+0x204/0x250 [ 33.625000] copy_to_kernel_nofault_oob+0x158/0x418 [ 33.625055] kunit_try_run_case+0x170/0x3f0 [ 33.625632] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.625840] kthread+0x328/0x630 [ 33.625938] ret_from_fork+0x10/0x20 [ 33.626000] [ 33.626029] Allocated by task 313: [ 33.626063] kasan_save_stack+0x3c/0x68 [ 33.626132] kasan_save_track+0x20/0x40 [ 33.626175] kasan_save_alloc_info+0x40/0x58 [ 33.626216] __kasan_kmalloc+0xd4/0xd8 [ 33.626256] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.626621] copy_to_kernel_nofault_oob+0xc8/0x418 [ 33.626668] kunit_try_run_case+0x170/0x3f0 [ 33.626715] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.626904] kthread+0x328/0x630 [ 33.626945] ret_from_fork+0x10/0x20 [ 33.626994] [ 33.627334] The buggy address belongs to the object at fff00000c64f9500 [ 33.627334] which belongs to the cache kmalloc-128 of size 128 [ 33.627743] The buggy address is located 0 bytes to the right of [ 33.627743] allocated 120-byte region [fff00000c64f9500, fff00000c64f9578) [ 33.627891] [ 33.628132] The buggy address belongs to the physical page: [ 33.628634] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f9 [ 33.629056] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.629699] page_type: f5(slab) [ 33.629854] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 33.629911] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 33.630356] page dumped because: kasan: bad access detected [ 33.630927] [ 33.631105] Memory state around the buggy address: [ 33.631506] fff00000c64f9400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.631556] fff00000c64f9480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.632145] >fff00000c64f9500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 33.632543] ^ [ 33.632780] fff00000c64f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.633276] fff00000c64f9600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.633580] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 33.561343] ================================================================== [ 33.561420] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 33.561503] Read of size 1 at addr ffff8000800fe7f3 by task kunit_try_catch/301 [ 33.561556] [ 33.561594] CPU: 1 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.561690] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.561717] Hardware name: linux,dummy-virt (DT) [ 33.562245] Call trace: [ 33.562287] show_stack+0x20/0x38 (C) [ 33.562689] dump_stack_lvl+0x8c/0xd0 [ 33.562838] print_report+0x310/0x5d0 [ 33.562953] kasan_report+0xdc/0x128 [ 33.563120] __asan_report_load1_noabort+0x20/0x30 [ 33.563171] vmalloc_oob+0x578/0x5d0 [ 33.563219] kunit_try_run_case+0x170/0x3f0 [ 33.563270] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.563324] kthread+0x328/0x630 [ 33.563372] ret_from_fork+0x10/0x20 [ 33.563424] [ 33.563460] The buggy address ffff8000800fe7f3 belongs to a vmalloc virtual mapping [ 33.563522] The buggy address belongs to the physical page: [ 33.563557] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f6 [ 33.563790] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.563969] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 33.564184] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.564323] page dumped because: kasan: bad access detected [ 33.564390] [ 33.564874] Memory state around the buggy address: [ 33.565136] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.565652] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.565707] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 33.565748] ^ [ 33.565948] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 33.566250] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 33.566301] ================================================================== [ 33.569000] ================================================================== [ 33.569055] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 33.569576] Read of size 1 at addr ffff8000800fe7f8 by task kunit_try_catch/301 [ 33.569691] [ 33.569726] CPU: 1 UID: 0 PID: 301 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.569813] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.569866] Hardware name: linux,dummy-virt (DT) [ 33.569900] Call trace: [ 33.569973] show_stack+0x20/0x38 (C) [ 33.570112] dump_stack_lvl+0x8c/0xd0 [ 33.570532] print_report+0x310/0x5d0 [ 33.570777] kasan_report+0xdc/0x128 [ 33.570845] __asan_report_load1_noabort+0x20/0x30 [ 33.570895] vmalloc_oob+0x51c/0x5d0 [ 33.570943] kunit_try_run_case+0x170/0x3f0 [ 33.571137] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.571342] kthread+0x328/0x630 [ 33.571392] ret_from_fork+0x10/0x20 [ 33.571791] [ 33.571822] The buggy address ffff8000800fe7f8 belongs to a vmalloc virtual mapping [ 33.571967] The buggy address belongs to the physical page: [ 33.572020] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f6 [ 33.572075] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.572141] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 33.572193] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 33.572234] page dumped because: kasan: bad access detected [ 33.572267] [ 33.572308] Memory state around the buggy address: [ 33.572474] ffff8000800fe680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.572595] ffff8000800fe700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 33.572641] >ffff8000800fe780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 33.572791] ^ [ 33.572833] ffff8000800fe800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 33.572915] ffff8000800fe880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 33.573068] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 33.240841] ================================================================== [ 33.240893] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 33.241107] Write of size 4 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.241170] [ 33.241338] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.241470] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.241507] Hardware name: linux,dummy-virt (DT) [ 33.241541] Call trace: [ 33.241586] show_stack+0x20/0x38 (C) [ 33.241648] dump_stack_lvl+0x8c/0xd0 [ 33.241698] print_report+0x118/0x5d0 [ 33.241745] kasan_report+0xdc/0x128 [ 33.241958] kasan_check_range+0x100/0x1a8 [ 33.242064] __kasan_check_write+0x20/0x30 [ 33.242196] kasan_atomics_helper+0xad4/0x4858 [ 33.242260] kasan_atomics+0x198/0x2e0 [ 33.242321] kunit_try_run_case+0x170/0x3f0 [ 33.242379] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.242464] kthread+0x328/0x630 [ 33.242512] ret_from_fork+0x10/0x20 [ 33.242562] [ 33.242604] Allocated by task 297: [ 33.242634] kasan_save_stack+0x3c/0x68 [ 33.242884] kasan_save_track+0x20/0x40 [ 33.242941] kasan_save_alloc_info+0x40/0x58 [ 33.242982] __kasan_kmalloc+0xd4/0xd8 [ 33.243024] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.243121] kasan_atomics+0xb8/0x2e0 [ 33.243212] kunit_try_run_case+0x170/0x3f0 [ 33.243360] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.243511] kthread+0x328/0x630 [ 33.243712] ret_from_fork+0x10/0x20 [ 33.243933] [ 33.244033] The buggy address belongs to the object at fff00000c64f7f00 [ 33.244033] which belongs to the cache kmalloc-64 of size 64 [ 33.244141] The buggy address is located 0 bytes to the right of [ 33.244141] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.244274] [ 33.244351] The buggy address belongs to the physical page: [ 33.244385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.244451] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.244770] page_type: f5(slab) [ 33.244870] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.244950] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.245163] page dumped because: kasan: bad access detected [ 33.245199] [ 33.245326] Memory state around the buggy address: [ 33.245375] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.245467] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.245597] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.245744] ^ [ 33.245814] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.245872] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.245912] ================================================================== [ 33.446610] ================================================================== [ 33.446694] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 33.447254] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.447399] [ 33.447479] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.447766] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.448034] Hardware name: linux,dummy-virt (DT) [ 33.448293] Call trace: [ 33.448344] show_stack+0x20/0x38 (C) [ 33.448415] dump_stack_lvl+0x8c/0xd0 [ 33.448851] print_report+0x118/0x5d0 [ 33.449079] kasan_report+0xdc/0x128 [ 33.449144] kasan_check_range+0x100/0x1a8 [ 33.449200] __kasan_check_write+0x20/0x30 [ 33.449354] kasan_atomics_helper+0x1414/0x4858 [ 33.449783] kasan_atomics+0x198/0x2e0 [ 33.449834] kunit_try_run_case+0x170/0x3f0 [ 33.449884] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.449940] kthread+0x328/0x630 [ 33.449985] ret_from_fork+0x10/0x20 [ 33.450037] [ 33.450246] Allocated by task 297: [ 33.450296] kasan_save_stack+0x3c/0x68 [ 33.450535] kasan_save_track+0x20/0x40 [ 33.451359] kasan_save_alloc_info+0x40/0x58 [ 33.451616] __kasan_kmalloc+0xd4/0xd8 [ 33.451671] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.451716] kasan_atomics+0xb8/0x2e0 [ 33.451756] kunit_try_run_case+0x170/0x3f0 [ 33.452024] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.452400] kthread+0x328/0x630 [ 33.452452] ret_from_fork+0x10/0x20 [ 33.452848] [ 33.452876] The buggy address belongs to the object at fff00000c64f7f00 [ 33.452876] which belongs to the cache kmalloc-64 of size 64 [ 33.453180] The buggy address is located 0 bytes to the right of [ 33.453180] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.453546] [ 33.453575] The buggy address belongs to the physical page: [ 33.453834] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.454098] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.454150] page_type: f5(slab) [ 33.454300] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.454522] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.454566] page dumped because: kasan: bad access detected [ 33.455091] [ 33.455314] Memory state around the buggy address: [ 33.455585] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.455655] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.455699] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.455738] ^ [ 33.455775] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.456407] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.456471] ================================================================== [ 33.501480] ================================================================== [ 33.501536] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 33.501951] Read of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.502019] [ 33.502058] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.502153] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.502951] Hardware name: linux,dummy-virt (DT) [ 33.503018] Call trace: [ 33.503041] show_stack+0x20/0x38 (C) [ 33.503096] dump_stack_lvl+0x8c/0xd0 [ 33.503754] print_report+0x118/0x5d0 [ 33.503933] kasan_report+0xdc/0x128 [ 33.504266] __asan_report_load8_noabort+0x20/0x30 [ 33.504335] kasan_atomics_helper+0x3db0/0x4858 [ 33.504390] kasan_atomics+0x198/0x2e0 [ 33.504738] kunit_try_run_case+0x170/0x3f0 [ 33.505119] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.505526] kthread+0x328/0x630 [ 33.505893] ret_from_fork+0x10/0x20 [ 33.506205] [ 33.506232] Allocated by task 297: [ 33.506433] kasan_save_stack+0x3c/0x68 [ 33.506832] kasan_save_track+0x20/0x40 [ 33.507084] kasan_save_alloc_info+0x40/0x58 [ 33.507344] __kasan_kmalloc+0xd4/0xd8 [ 33.507673] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.508010] kasan_atomics+0xb8/0x2e0 [ 33.508055] kunit_try_run_case+0x170/0x3f0 [ 33.508930] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.509034] kthread+0x328/0x630 [ 33.509405] ret_from_fork+0x10/0x20 [ 33.509595] [ 33.509811] The buggy address belongs to the object at fff00000c64f7f00 [ 33.509811] which belongs to the cache kmalloc-64 of size 64 [ 33.510337] The buggy address is located 0 bytes to the right of [ 33.510337] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.510465] [ 33.510489] The buggy address belongs to the physical page: [ 33.510581] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.510694] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.510843] page_type: f5(slab) [ 33.510987] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.511059] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.511102] page dumped because: kasan: bad access detected [ 33.511147] [ 33.511258] Memory state around the buggy address: [ 33.511422] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.511583] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.511735] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.511840] ^ [ 33.512007] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.512084] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.512171] ================================================================== [ 33.470015] ================================================================== [ 33.470071] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 33.470125] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.470175] [ 33.470212] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.470299] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.470326] Hardware name: linux,dummy-virt (DT) [ 33.470359] Call trace: [ 33.471059] show_stack+0x20/0x38 (C) [ 33.471212] dump_stack_lvl+0x8c/0xd0 [ 33.471732] print_report+0x118/0x5d0 [ 33.471783] kasan_report+0xdc/0x128 [ 33.471830] kasan_check_range+0x100/0x1a8 [ 33.471877] __kasan_check_write+0x20/0x30 [ 33.472585] kasan_atomics_helper+0x14e4/0x4858 [ 33.472688] kasan_atomics+0x198/0x2e0 [ 33.473113] kunit_try_run_case+0x170/0x3f0 [ 33.473331] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.473386] kthread+0x328/0x630 [ 33.473431] ret_from_fork+0x10/0x20 [ 33.473626] [ 33.473674] Allocated by task 297: [ 33.473705] kasan_save_stack+0x3c/0x68 [ 33.473753] kasan_save_track+0x20/0x40 [ 33.474021] kasan_save_alloc_info+0x40/0x58 [ 33.474255] __kasan_kmalloc+0xd4/0xd8 [ 33.474400] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.474469] kasan_atomics+0xb8/0x2e0 [ 33.475004] kunit_try_run_case+0x170/0x3f0 [ 33.475139] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.475322] kthread+0x328/0x630 [ 33.475658] ret_from_fork+0x10/0x20 [ 33.475711] [ 33.475897] The buggy address belongs to the object at fff00000c64f7f00 [ 33.475897] which belongs to the cache kmalloc-64 of size 64 [ 33.476055] The buggy address is located 0 bytes to the right of [ 33.476055] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.476228] [ 33.476251] The buggy address belongs to the physical page: [ 33.476285] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.476556] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.477087] page_type: f5(slab) [ 33.477237] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.477544] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.477716] page dumped because: kasan: bad access detected [ 33.478232] [ 33.478391] Memory state around the buggy address: [ 33.478433] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.478505] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.478657] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.478996] ^ [ 33.479161] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.479238] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.479408] ================================================================== [ 33.380961] ================================================================== [ 33.381016] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 33.381068] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.381119] [ 33.381151] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.381236] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.381263] Hardware name: linux,dummy-virt (DT) [ 33.381296] Call trace: [ 33.381320] show_stack+0x20/0x38 (C) [ 33.381370] dump_stack_lvl+0x8c/0xd0 [ 33.382172] print_report+0x118/0x5d0 [ 33.382255] kasan_report+0xdc/0x128 [ 33.382307] kasan_check_range+0x100/0x1a8 [ 33.382356] __kasan_check_write+0x20/0x30 [ 33.382691] kasan_atomics_helper+0x1190/0x4858 [ 33.383221] kasan_atomics+0x198/0x2e0 [ 33.383594] kunit_try_run_case+0x170/0x3f0 [ 33.383797] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.383868] kthread+0x328/0x630 [ 33.384162] ret_from_fork+0x10/0x20 [ 33.384472] [ 33.384499] Allocated by task 297: [ 33.384531] kasan_save_stack+0x3c/0x68 [ 33.384580] kasan_save_track+0x20/0x40 [ 33.385019] kasan_save_alloc_info+0x40/0x58 [ 33.385347] __kasan_kmalloc+0xd4/0xd8 [ 33.385738] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.385982] kasan_atomics+0xb8/0x2e0 [ 33.386035] kunit_try_run_case+0x170/0x3f0 [ 33.386198] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.386246] kthread+0x328/0x630 [ 33.386283] ret_from_fork+0x10/0x20 [ 33.386530] [ 33.386603] The buggy address belongs to the object at fff00000c64f7f00 [ 33.386603] which belongs to the cache kmalloc-64 of size 64 [ 33.387019] The buggy address is located 0 bytes to the right of [ 33.387019] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.387600] [ 33.387874] The buggy address belongs to the physical page: [ 33.387971] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.388471] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.388524] page_type: f5(slab) [ 33.388563] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.388615] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.388657] page dumped because: kasan: bad access detected [ 33.389152] [ 33.389339] Memory state around the buggy address: [ 33.389420] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.389478] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.389529] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.389568] ^ [ 33.389768] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.389887] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.389935] ================================================================== [ 33.133403] ================================================================== [ 33.133516] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 33.133742] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.133905] Call trace: [ 33.134317] print_report+0x118/0x5d0 [ 33.134970] kasan_check_range+0x100/0x1a8 [ 33.135067] kasan_atomics_helper+0x1ec/0x4858 [ 33.135293] kthread+0x328/0x630 [ 33.135387] [ 33.135492] kasan_save_track+0x20/0x40 [ 33.136133] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.136333] The buggy address is located 0 bytes to the right of [ 33.136333] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.136601] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.137608] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.138507] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 33.138560] Write of size 4 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.138642] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.138911] print_report+0x118/0x5d0 [ 33.138958] kasan_report+0xdc/0x128 [ 33.139098] kasan_atomics_helper+0x24c/0x4858 [ 33.139204] kunit_try_run_case+0x170/0x3f0 [ 33.139305] kthread+0x328/0x630 [ 33.139472] kasan_save_stack+0x3c/0x68 [ 33.139776] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.139982] The buggy address is located 0 bytes to the right of [ 33.139982] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.140099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.140369] [ 33.140528] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.140830] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 33.140926] [ 33.140954] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.141263] kasan_report+0xdc/0x128 [ 33.141377] __kasan_check_read+0x20/0x30 [ 33.141584] kunit_try_run_case+0x170/0x3f0 [ 33.142001] [ 33.142116] kasan_save_track+0x20/0x40 [ 33.142357] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.142712] The buggy address is located 0 bytes to the right of [ 33.142712] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.143777] page dumped because: kasan: bad access detected [ 33.144121] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.144160] ^ [ 33.144471] ================================================================== [ 33.402521] ================================================================== [ 33.402572] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 33.402624] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.402677] [ 33.402709] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.402837] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.402941] Hardware name: linux,dummy-virt (DT) [ 33.403942] Call trace: [ 33.403980] show_stack+0x20/0x38 (C) [ 33.404046] dump_stack_lvl+0x8c/0xd0 [ 33.404223] print_report+0x118/0x5d0 [ 33.404271] kasan_report+0xdc/0x128 [ 33.404699] kasan_check_range+0x100/0x1a8 [ 33.405027] __kasan_check_write+0x20/0x30 [ 33.405099] kasan_atomics_helper+0x126c/0x4858 [ 33.405510] kasan_atomics+0x198/0x2e0 [ 33.405612] kunit_try_run_case+0x170/0x3f0 [ 33.405827] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.405908] kthread+0x328/0x630 [ 33.406601] ret_from_fork+0x10/0x20 [ 33.406710] [ 33.406732] Allocated by task 297: [ 33.406763] kasan_save_stack+0x3c/0x68 [ 33.406808] kasan_save_track+0x20/0x40 [ 33.407406] kasan_save_alloc_info+0x40/0x58 [ 33.407718] __kasan_kmalloc+0xd4/0xd8 [ 33.408045] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.408216] kasan_atomics+0xb8/0x2e0 [ 33.408490] kunit_try_run_case+0x170/0x3f0 [ 33.408714] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.408771] kthread+0x328/0x630 [ 33.409227] ret_from_fork+0x10/0x20 [ 33.409344] [ 33.409659] The buggy address belongs to the object at fff00000c64f7f00 [ 33.409659] which belongs to the cache kmalloc-64 of size 64 [ 33.409913] The buggy address is located 0 bytes to the right of [ 33.409913] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.409988] [ 33.410010] The buggy address belongs to the physical page: [ 33.410612] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.410714] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.411167] page_type: f5(slab) [ 33.411785] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.411936] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.412292] page dumped because: kasan: bad access detected [ 33.412453] [ 33.412475] Memory state around the buggy address: [ 33.412510] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.412559] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.412603] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.413239] ^ [ 33.413299] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.413678] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.413722] ================================================================== [ 33.301231] ================================================================== [ 33.301303] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 33.301379] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.301455] [ 33.301488] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.301573] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.301602] Hardware name: linux,dummy-virt (DT) [ 33.301769] Call trace: [ 33.301799] show_stack+0x20/0x38 (C) [ 33.301959] dump_stack_lvl+0x8c/0xd0 [ 33.302120] print_report+0x118/0x5d0 [ 33.302199] kasan_report+0xdc/0x128 [ 33.302525] kasan_check_range+0x100/0x1a8 [ 33.302584] __kasan_check_write+0x20/0x30 [ 33.302633] kasan_atomics_helper+0xe44/0x4858 [ 33.302685] kasan_atomics+0x198/0x2e0 [ 33.303194] kunit_try_run_case+0x170/0x3f0 [ 33.303317] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.303534] kthread+0x328/0x630 [ 33.303666] ret_from_fork+0x10/0x20 [ 33.303822] [ 33.303883] Allocated by task 297: [ 33.303936] kasan_save_stack+0x3c/0x68 [ 33.303982] kasan_save_track+0x20/0x40 [ 33.304297] kasan_save_alloc_info+0x40/0x58 [ 33.304455] __kasan_kmalloc+0xd4/0xd8 [ 33.304570] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.304847] kasan_atomics+0xb8/0x2e0 [ 33.304977] kunit_try_run_case+0x170/0x3f0 [ 33.305052] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.305262] kthread+0x328/0x630 [ 33.305370] ret_from_fork+0x10/0x20 [ 33.305525] [ 33.305623] The buggy address belongs to the object at fff00000c64f7f00 [ 33.305623] which belongs to the cache kmalloc-64 of size 64 [ 33.305714] The buggy address is located 0 bytes to the right of [ 33.305714] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.305999] [ 33.306106] The buggy address belongs to the physical page: [ 33.306232] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.306322] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.306415] page_type: f5(slab) [ 33.306482] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.306556] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.306599] page dumped because: kasan: bad access detected [ 33.306633] [ 33.306653] Memory state around the buggy address: [ 33.306686] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.306729] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.306977] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.307047] ^ [ 33.307143] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.307287] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.307402] ================================================================== [ 33.312925] ================================================================== [ 33.312984] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 33.313110] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.313161] [ 33.313193] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.313317] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.313575] Hardware name: linux,dummy-virt (DT) [ 33.313705] Call trace: [ 33.313741] show_stack+0x20/0x38 (C) [ 33.313806] dump_stack_lvl+0x8c/0xd0 [ 33.313857] print_report+0x118/0x5d0 [ 33.313910] kasan_report+0xdc/0x128 [ 33.313963] kasan_check_range+0x100/0x1a8 [ 33.314034] __kasan_check_write+0x20/0x30 [ 33.314094] kasan_atomics_helper+0xeb8/0x4858 [ 33.314145] kasan_atomics+0x198/0x2e0 [ 33.314194] kunit_try_run_case+0x170/0x3f0 [ 33.314259] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.314312] kthread+0x328/0x630 [ 33.314358] ret_from_fork+0x10/0x20 [ 33.314413] [ 33.314454] Allocated by task 297: [ 33.314491] kasan_save_stack+0x3c/0x68 [ 33.314537] kasan_save_track+0x20/0x40 [ 33.314579] kasan_save_alloc_info+0x40/0x58 [ 33.314620] __kasan_kmalloc+0xd4/0xd8 [ 33.314669] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.314713] kasan_atomics+0xb8/0x2e0 [ 33.314761] kunit_try_run_case+0x170/0x3f0 [ 33.314804] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.314851] kthread+0x328/0x630 [ 33.314887] ret_from_fork+0x10/0x20 [ 33.314935] [ 33.314977] The buggy address belongs to the object at fff00000c64f7f00 [ 33.314977] which belongs to the cache kmalloc-64 of size 64 [ 33.315037] The buggy address is located 0 bytes to the right of [ 33.315037] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.315103] [ 33.315134] The buggy address belongs to the physical page: [ 33.315182] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.315232] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.315289] page_type: f5(slab) [ 33.315334] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.315385] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.315427] page dumped because: kasan: bad access detected [ 33.315470] [ 33.315490] Memory state around the buggy address: [ 33.315524] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.315567] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.315643] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.315684] ^ [ 33.315718] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.315761] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.315801] ================================================================== [ 33.323458] ================================================================== [ 33.323506] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 33.323556] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.323606] [ 33.323637] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.323721] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.323750] Hardware name: linux,dummy-virt (DT) [ 33.323780] Call trace: [ 33.323803] show_stack+0x20/0x38 (C) [ 33.323852] dump_stack_lvl+0x8c/0xd0 [ 33.323899] print_report+0x118/0x5d0 [ 33.323946] kasan_report+0xdc/0x128 [ 33.323990] kasan_check_range+0x100/0x1a8 [ 33.324036] __kasan_check_write+0x20/0x30 [ 33.324084] kasan_atomics_helper+0xf88/0x4858 [ 33.324135] kasan_atomics+0x198/0x2e0 [ 33.324184] kunit_try_run_case+0x170/0x3f0 [ 33.324232] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.324286] kthread+0x328/0x630 [ 33.324331] ret_from_fork+0x10/0x20 [ 33.324380] [ 33.324400] Allocated by task 297: [ 33.324429] kasan_save_stack+0x3c/0x68 [ 33.327217] kasan_save_track+0x20/0x40 [ 33.327263] kasan_save_alloc_info+0x40/0x58 [ 33.327304] __kasan_kmalloc+0xd4/0xd8 [ 33.327345] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.327388] kasan_atomics+0xb8/0x2e0 [ 33.327428] kunit_try_run_case+0x170/0x3f0 [ 33.327482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.327528] kthread+0x328/0x630 [ 33.327564] ret_from_fork+0x10/0x20 [ 33.327603] [ 33.327627] The buggy address belongs to the object at fff00000c64f7f00 [ 33.327627] which belongs to the cache kmalloc-64 of size 64 [ 33.327687] The buggy address is located 0 bytes to the right of [ 33.327687] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.327751] [ 33.327774] The buggy address belongs to the physical page: [ 33.327807] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.327857] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.327905] page_type: f5(slab) [ 33.327944] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.327995] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.328036] page dumped because: kasan: bad access detected [ 33.328069] [ 33.328088] Memory state around the buggy address: [ 33.328122] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.328166] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.328209] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.328250] ^ [ 33.328286] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.328329] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.328369] ================================================================== [ 33.246562] ================================================================== [ 33.246783] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 33.246853] Read of size 4 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.246939] [ 33.246987] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.247088] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.247125] Hardware name: linux,dummy-virt (DT) [ 33.247168] Call trace: [ 33.247193] show_stack+0x20/0x38 (C) [ 33.247245] dump_stack_lvl+0x8c/0xd0 [ 33.247294] print_report+0x118/0x5d0 [ 33.247341] kasan_report+0xdc/0x128 [ 33.247387] __asan_report_load4_noabort+0x20/0x30 [ 33.247459] kasan_atomics_helper+0x3dcc/0x4858 [ 33.247512] kasan_atomics+0x198/0x2e0 [ 33.247560] kunit_try_run_case+0x170/0x3f0 [ 33.247608] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.247663] kthread+0x328/0x630 [ 33.247718] ret_from_fork+0x10/0x20 [ 33.247769] [ 33.247791] Allocated by task 297: [ 33.247820] kasan_save_stack+0x3c/0x68 [ 33.247869] kasan_save_track+0x20/0x40 [ 33.247911] kasan_save_alloc_info+0x40/0x58 [ 33.247952] __kasan_kmalloc+0xd4/0xd8 [ 33.247992] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.248036] kasan_atomics+0xb8/0x2e0 [ 33.248084] kunit_try_run_case+0x170/0x3f0 [ 33.248129] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.248174] kthread+0x328/0x630 [ 33.248209] ret_from_fork+0x10/0x20 [ 33.248247] [ 33.248276] The buggy address belongs to the object at fff00000c64f7f00 [ 33.248276] which belongs to the cache kmalloc-64 of size 64 [ 33.248333] The buggy address is located 0 bytes to the right of [ 33.248333] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.248396] [ 33.248423] The buggy address belongs to the physical page: [ 33.248465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.248517] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.248915] page_type: f5(slab) [ 33.249070] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.249129] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.249179] page dumped because: kasan: bad access detected [ 33.249212] [ 33.249234] Memory state around the buggy address: [ 33.249283] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.249347] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.249391] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.249449] ^ [ 33.249486] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.249675] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.249778] ================================================================== [ 33.275472] ================================================================== [ 33.275517] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 33.275568] Read of size 4 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.275660] [ 33.275694] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.276025] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.276086] Hardware name: linux,dummy-virt (DT) [ 33.276139] Call trace: [ 33.276168] show_stack+0x20/0x38 (C) [ 33.276242] dump_stack_lvl+0x8c/0xd0 [ 33.276449] print_report+0x118/0x5d0 [ 33.276566] kasan_report+0xdc/0x128 [ 33.276619] __asan_report_load4_noabort+0x20/0x30 [ 33.276672] kasan_atomics_helper+0x3dd8/0x4858 [ 33.276764] kasan_atomics+0x198/0x2e0 [ 33.276831] kunit_try_run_case+0x170/0x3f0 [ 33.276888] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.276960] kthread+0x328/0x630 [ 33.277007] ret_from_fork+0x10/0x20 [ 33.277057] [ 33.277187] Allocated by task 297: [ 33.277219] kasan_save_stack+0x3c/0x68 [ 33.277265] kasan_save_track+0x20/0x40 [ 33.277385] kasan_save_alloc_info+0x40/0x58 [ 33.277447] __kasan_kmalloc+0xd4/0xd8 [ 33.277559] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.277644] kasan_atomics+0xb8/0x2e0 [ 33.277708] kunit_try_run_case+0x170/0x3f0 [ 33.277983] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.278150] kthread+0x328/0x630 [ 33.278189] ret_from_fork+0x10/0x20 [ 33.278229] [ 33.278250] The buggy address belongs to the object at fff00000c64f7f00 [ 33.278250] which belongs to the cache kmalloc-64 of size 64 [ 33.278311] The buggy address is located 0 bytes to the right of [ 33.278311] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.278659] [ 33.278721] The buggy address belongs to the physical page: [ 33.278811] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.278918] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.279245] page_type: f5(slab) [ 33.279337] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.279493] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.279598] page dumped because: kasan: bad access detected [ 33.279687] [ 33.279780] Memory state around the buggy address: [ 33.280020] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.280173] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.280273] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.280366] ^ [ 33.280492] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.280585] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.280646] ================================================================== [ 33.234794] ================================================================== [ 33.234869] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 33.234923] Write of size 4 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.235008] [ 33.235238] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.235463] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.235496] Hardware name: linux,dummy-virt (DT) [ 33.235526] Call trace: [ 33.235784] show_stack+0x20/0x38 (C) [ 33.235889] dump_stack_lvl+0x8c/0xd0 [ 33.235941] print_report+0x118/0x5d0 [ 33.235987] kasan_report+0xdc/0x128 [ 33.236063] kasan_check_range+0x100/0x1a8 [ 33.236130] __kasan_check_write+0x20/0x30 [ 33.236212] kasan_atomics_helper+0xa6c/0x4858 [ 33.236418] kasan_atomics+0x198/0x2e0 [ 33.236544] kunit_try_run_case+0x170/0x3f0 [ 33.236600] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.236655] kthread+0x328/0x630 [ 33.236717] ret_from_fork+0x10/0x20 [ 33.236998] [ 33.237071] Allocated by task 297: [ 33.237109] kasan_save_stack+0x3c/0x68 [ 33.237182] kasan_save_track+0x20/0x40 [ 33.237225] kasan_save_alloc_info+0x40/0x58 [ 33.237283] __kasan_kmalloc+0xd4/0xd8 [ 33.237535] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.237664] kasan_atomics+0xb8/0x2e0 [ 33.237793] kunit_try_run_case+0x170/0x3f0 [ 33.237834] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.237897] kthread+0x328/0x630 [ 33.237933] ret_from_fork+0x10/0x20 [ 33.237970] [ 33.237993] The buggy address belongs to the object at fff00000c64f7f00 [ 33.237993] which belongs to the cache kmalloc-64 of size 64 [ 33.238090] The buggy address is located 0 bytes to the right of [ 33.238090] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.238153] [ 33.238176] The buggy address belongs to the physical page: [ 33.238306] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.238375] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.238471] page_type: f5(slab) [ 33.238528] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.238647] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.238938] page dumped because: kasan: bad access detected [ 33.238978] [ 33.238998] Memory state around the buggy address: [ 33.239032] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.239077] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.239270] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.239361] ^ [ 33.239445] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.239560] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.239635] ================================================================== [ 33.281054] ================================================================== [ 33.281108] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 33.281228] Write of size 4 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.281314] [ 33.281362] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.281629] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.281738] Hardware name: linux,dummy-virt (DT) [ 33.281772] Call trace: [ 33.281813] show_stack+0x20/0x38 (C) [ 33.281948] dump_stack_lvl+0x8c/0xd0 [ 33.282057] print_report+0x118/0x5d0 [ 33.282172] kasan_report+0xdc/0x128 [ 33.282236] kasan_check_range+0x100/0x1a8 [ 33.282290] __kasan_check_write+0x20/0x30 [ 33.282348] kasan_atomics_helper+0xd3c/0x4858 [ 33.282400] kasan_atomics+0x198/0x2e0 [ 33.282476] kunit_try_run_case+0x170/0x3f0 [ 33.282536] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.282591] kthread+0x328/0x630 [ 33.282638] ret_from_fork+0x10/0x20 [ 33.282706] [ 33.282733] Allocated by task 297: [ 33.282771] kasan_save_stack+0x3c/0x68 [ 33.282825] kasan_save_track+0x20/0x40 [ 33.282868] kasan_save_alloc_info+0x40/0x58 [ 33.282909] __kasan_kmalloc+0xd4/0xd8 [ 33.282957] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.283001] kasan_atomics+0xb8/0x2e0 [ 33.283040] kunit_try_run_case+0x170/0x3f0 [ 33.283086] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.283135] kthread+0x328/0x630 [ 33.283172] ret_from_fork+0x10/0x20 [ 33.283212] [ 33.283233] The buggy address belongs to the object at fff00000c64f7f00 [ 33.283233] which belongs to the cache kmalloc-64 of size 64 [ 33.283294] The buggy address is located 0 bytes to the right of [ 33.283294] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.283366] [ 33.283396] The buggy address belongs to the physical page: [ 33.283426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.283890] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.283946] page_type: f5(slab) [ 33.283985] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.284037] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.284139] page dumped because: kasan: bad access detected [ 33.284175] [ 33.284370] Memory state around the buggy address: [ 33.284427] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.284593] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.284658] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.284962] ^ [ 33.285005] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.285096] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.285227] ================================================================== [ 33.516761] ================================================================== [ 33.516810] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 33.516861] Read of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.516911] [ 33.516942] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.517026] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.517055] Hardware name: linux,dummy-virt (DT) [ 33.517087] Call trace: [ 33.517111] show_stack+0x20/0x38 (C) [ 33.517160] dump_stack_lvl+0x8c/0xd0 [ 33.517210] print_report+0x118/0x5d0 [ 33.517255] kasan_report+0xdc/0x128 [ 33.517301] __asan_report_load8_noabort+0x20/0x30 [ 33.517361] kasan_atomics_helper+0x3df4/0x4858 [ 33.517659] kasan_atomics+0x198/0x2e0 [ 33.517712] kunit_try_run_case+0x170/0x3f0 [ 33.517828] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.517919] kthread+0x328/0x630 [ 33.517966] ret_from_fork+0x10/0x20 [ 33.518017] [ 33.518038] Allocated by task 297: [ 33.518068] kasan_save_stack+0x3c/0x68 [ 33.518192] kasan_save_track+0x20/0x40 [ 33.518235] kasan_save_alloc_info+0x40/0x58 [ 33.518275] __kasan_kmalloc+0xd4/0xd8 [ 33.518325] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.518500] kasan_atomics+0xb8/0x2e0 [ 33.518541] kunit_try_run_case+0x170/0x3f0 [ 33.518581] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.518626] kthread+0x328/0x630 [ 33.518661] ret_from_fork+0x10/0x20 [ 33.518710] [ 33.518805] The buggy address belongs to the object at fff00000c64f7f00 [ 33.518805] which belongs to the cache kmalloc-64 of size 64 [ 33.518960] The buggy address is located 0 bytes to the right of [ 33.518960] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.519060] [ 33.519083] The buggy address belongs to the physical page: [ 33.519123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.519225] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.519287] page_type: f5(slab) [ 33.519389] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.519449] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.519489] page dumped because: kasan: bad access detected [ 33.519591] [ 33.519685] Memory state around the buggy address: [ 33.519719] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.519881] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.519926] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.519966] ^ [ 33.520042] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.520087] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.520128] ================================================================== [ 33.490449] ================================================================== [ 33.490505] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 33.490562] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.490721] [ 33.490935] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.491034] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.491068] Hardware name: linux,dummy-virt (DT) [ 33.491709] Call trace: [ 33.491736] show_stack+0x20/0x38 (C) [ 33.491990] dump_stack_lvl+0x8c/0xd0 [ 33.492151] print_report+0x118/0x5d0 [ 33.492371] kasan_report+0xdc/0x128 [ 33.492581] kasan_check_range+0x100/0x1a8 [ 33.492635] __kasan_check_write+0x20/0x30 [ 33.492682] kasan_atomics_helper+0x15b4/0x4858 [ 33.493114] kasan_atomics+0x198/0x2e0 [ 33.493367] kunit_try_run_case+0x170/0x3f0 [ 33.493637] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.493755] kthread+0x328/0x630 [ 33.493855] ret_from_fork+0x10/0x20 [ 33.494161] [ 33.494226] Allocated by task 297: [ 33.494259] kasan_save_stack+0x3c/0x68 [ 33.494317] kasan_save_track+0x20/0x40 [ 33.494363] kasan_save_alloc_info+0x40/0x58 [ 33.495261] __kasan_kmalloc+0xd4/0xd8 [ 33.495328] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.495681] kasan_atomics+0xb8/0x2e0 [ 33.495862] kunit_try_run_case+0x170/0x3f0 [ 33.495930] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.496458] kthread+0x328/0x630 [ 33.496749] ret_from_fork+0x10/0x20 [ 33.496923] [ 33.497134] The buggy address belongs to the object at fff00000c64f7f00 [ 33.497134] which belongs to the cache kmalloc-64 of size 64 [ 33.497612] The buggy address is located 0 bytes to the right of [ 33.497612] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.497860] [ 33.497890] The buggy address belongs to the physical page: [ 33.497938] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.498005] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.498056] page_type: f5(slab) [ 33.498275] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.498330] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.498373] page dumped because: kasan: bad access detected [ 33.498806] [ 33.498896] Memory state around the buggy address: [ 33.498934] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.498981] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.499542] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.499590] ^ [ 33.499733] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.499873] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.499914] ================================================================== [ 33.215764] ================================================================== [ 33.215818] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 33.215871] Read of size 4 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.215921] [ 33.215952] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.216044] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.216072] Hardware name: linux,dummy-virt (DT) [ 33.216168] Call trace: [ 33.216240] show_stack+0x20/0x38 (C) [ 33.216296] dump_stack_lvl+0x8c/0xd0 [ 33.216344] print_report+0x118/0x5d0 [ 33.216389] kasan_report+0xdc/0x128 [ 33.216689] __asan_report_load4_noabort+0x20/0x30 [ 33.216767] kasan_atomics_helper+0x42d8/0x4858 [ 33.216852] kasan_atomics+0x198/0x2e0 [ 33.216941] kunit_try_run_case+0x170/0x3f0 [ 33.216997] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.217133] kthread+0x328/0x630 [ 33.217209] ret_from_fork+0x10/0x20 [ 33.217279] [ 33.217318] Allocated by task 297: [ 33.217380] kasan_save_stack+0x3c/0x68 [ 33.217425] kasan_save_track+0x20/0x40 [ 33.217496] kasan_save_alloc_info+0x40/0x58 [ 33.217538] __kasan_kmalloc+0xd4/0xd8 [ 33.217709] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.217925] kasan_atomics+0xb8/0x2e0 [ 33.218365] The buggy address is located 0 bytes to the right of [ 33.218365] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.218632] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.218706] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.219594] Memory state around the buggy address: [ 33.219936] ^ [ 33.220318] ================================================================== [ 33.285584] ================================================================== [ 33.285694] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 33.285788] Read of size 4 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.285874] [ 33.285913] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.285999] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.286028] Hardware name: linux,dummy-virt (DT) [ 33.286205] Call trace: [ 33.286264] show_stack+0x20/0x38 (C) [ 33.286350] dump_stack_lvl+0x8c/0xd0 [ 33.286528] print_report+0x118/0x5d0 [ 33.286656] kasan_report+0xdc/0x128 [ 33.286764] __asan_report_load4_noabort+0x20/0x30 [ 33.287073] kasan_atomics_helper+0x3e04/0x4858 [ 33.287188] kasan_atomics+0x198/0x2e0 [ 33.287322] kunit_try_run_case+0x170/0x3f0 [ 33.287407] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.287474] kthread+0x328/0x630 [ 33.287521] ret_from_fork+0x10/0x20 [ 33.287572] [ 33.287592] Allocated by task 297: [ 33.287623] kasan_save_stack+0x3c/0x68 [ 33.287843] kasan_save_track+0x20/0x40 [ 33.287931] kasan_save_alloc_info+0x40/0x58 [ 33.288056] __kasan_kmalloc+0xd4/0xd8 [ 33.288145] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.288205] kasan_atomics+0xb8/0x2e0 [ 33.288493] kunit_try_run_case+0x170/0x3f0 [ 33.288634] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.288682] kthread+0x328/0x630 [ 33.288977] ret_from_fork+0x10/0x20 [ 33.289104] [ 33.289169] The buggy address belongs to the object at fff00000c64f7f00 [ 33.289169] which belongs to the cache kmalloc-64 of size 64 [ 33.289456] The buggy address is located 0 bytes to the right of [ 33.289456] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.289602] [ 33.289667] The buggy address belongs to the physical page: [ 33.289728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.289825] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.289974] page_type: f5(slab) [ 33.290017] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.290080] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.290123] page dumped because: kasan: bad access detected [ 33.290155] [ 33.290444] Memory state around the buggy address: [ 33.290613] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.290688] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.290750] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.291055] ^ [ 33.291125] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.291226] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.291304] ================================================================== [ 33.414431] ================================================================== [ 33.414493] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 33.414545] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.414595] [ 33.414627] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.414713] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.414742] Hardware name: linux,dummy-virt (DT) [ 33.414772] Call trace: [ 33.414798] show_stack+0x20/0x38 (C) [ 33.414846] dump_stack_lvl+0x8c/0xd0 [ 33.416564] print_report+0x118/0x5d0 [ 33.416696] kasan_report+0xdc/0x128 [ 33.416745] kasan_check_range+0x100/0x1a8 [ 33.416794] __kasan_check_write+0x20/0x30 [ 33.416871] kasan_atomics_helper+0x12d8/0x4858 [ 33.416923] kasan_atomics+0x198/0x2e0 [ 33.416970] kunit_try_run_case+0x170/0x3f0 [ 33.417018] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.417074] kthread+0x328/0x630 [ 33.417122] ret_from_fork+0x10/0x20 [ 33.417173] [ 33.418071] Allocated by task 297: [ 33.418124] kasan_save_stack+0x3c/0x68 [ 33.418241] kasan_save_track+0x20/0x40 [ 33.418325] kasan_save_alloc_info+0x40/0x58 [ 33.418719] __kasan_kmalloc+0xd4/0xd8 [ 33.418770] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.419286] kasan_atomics+0xb8/0x2e0 [ 33.419400] kunit_try_run_case+0x170/0x3f0 [ 33.419531] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.419577] kthread+0x328/0x630 [ 33.419615] ret_from_fork+0x10/0x20 [ 33.420249] [ 33.420279] The buggy address belongs to the object at fff00000c64f7f00 [ 33.420279] which belongs to the cache kmalloc-64 of size 64 [ 33.420485] The buggy address is located 0 bytes to the right of [ 33.420485] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.420578] [ 33.420866] The buggy address belongs to the physical page: [ 33.421319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.421647] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.421695] page_type: f5(slab) [ 33.421832] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.421938] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.422381] page dumped because: kasan: bad access detected [ 33.422429] [ 33.422589] Memory state around the buggy address: [ 33.422786] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.422907] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.423268] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.423310] ^ [ 33.423346] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.423825] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.423884] ================================================================== [ 33.524773] ================================================================== [ 33.524822] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 33.524872] Read of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.524952] [ 33.524995] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.525198] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.525334] Hardware name: linux,dummy-virt (DT) [ 33.525367] Call trace: [ 33.525390] show_stack+0x20/0x38 (C) [ 33.525452] dump_stack_lvl+0x8c/0xd0 [ 33.525500] print_report+0x118/0x5d0 [ 33.525547] kasan_report+0xdc/0x128 [ 33.525599] __asan_report_load8_noabort+0x20/0x30 [ 33.525708] kasan_atomics_helper+0x3e10/0x4858 [ 33.525815] kasan_atomics+0x198/0x2e0 [ 33.525967] kunit_try_run_case+0x170/0x3f0 [ 33.526016] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.526076] kthread+0x328/0x630 [ 33.526140] ret_from_fork+0x10/0x20 [ 33.526206] [ 33.526228] Allocated by task 297: [ 33.526267] kasan_save_stack+0x3c/0x68 [ 33.526515] kasan_save_track+0x20/0x40 [ 33.526559] kasan_save_alloc_info+0x40/0x58 [ 33.526599] __kasan_kmalloc+0xd4/0xd8 [ 33.526678] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.526798] kasan_atomics+0xb8/0x2e0 [ 33.526889] kunit_try_run_case+0x170/0x3f0 [ 33.526948] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.527087] kthread+0x328/0x630 [ 33.527173] ret_from_fork+0x10/0x20 [ 33.527341] [ 33.527370] The buggy address belongs to the object at fff00000c64f7f00 [ 33.527370] which belongs to the cache kmalloc-64 of size 64 [ 33.527430] The buggy address is located 0 bytes to the right of [ 33.527430] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.527979] [ 33.528011] The buggy address belongs to the physical page: [ 33.528045] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.528457] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.528524] page_type: f5(slab) [ 33.528567] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.528898] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.528943] page dumped because: kasan: bad access detected [ 33.528977] [ 33.528998] Memory state around the buggy address: [ 33.529377] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.529428] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.529486] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.529667] ^ [ 33.529706] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.530074] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.530119] ================================================================== [ 33.480268] ================================================================== [ 33.480324] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 33.480381] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.480432] [ 33.480480] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.480567] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.480594] Hardware name: linux,dummy-virt (DT) [ 33.481323] Call trace: [ 33.481364] show_stack+0x20/0x38 (C) [ 33.481822] dump_stack_lvl+0x8c/0xd0 [ 33.482290] print_report+0x118/0x5d0 [ 33.482354] kasan_report+0xdc/0x128 [ 33.482402] kasan_check_range+0x100/0x1a8 [ 33.482625] __kasan_check_write+0x20/0x30 [ 33.482674] kasan_atomics_helper+0x154c/0x4858 [ 33.482727] kasan_atomics+0x198/0x2e0 [ 33.482776] kunit_try_run_case+0x170/0x3f0 [ 33.483303] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.483401] kthread+0x328/0x630 [ 33.483463] ret_from_fork+0x10/0x20 [ 33.483931] [ 33.484101] Allocated by task 297: [ 33.484135] kasan_save_stack+0x3c/0x68 [ 33.484415] kasan_save_track+0x20/0x40 [ 33.484468] kasan_save_alloc_info+0x40/0x58 [ 33.484509] __kasan_kmalloc+0xd4/0xd8 [ 33.484551] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.484596] kasan_atomics+0xb8/0x2e0 [ 33.484847] kunit_try_run_case+0x170/0x3f0 [ 33.485176] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.485561] kthread+0x328/0x630 [ 33.485601] ret_from_fork+0x10/0x20 [ 33.485641] [ 33.485664] The buggy address belongs to the object at fff00000c64f7f00 [ 33.485664] which belongs to the cache kmalloc-64 of size 64 [ 33.485724] The buggy address is located 0 bytes to the right of [ 33.485724] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.485973] [ 33.486003] The buggy address belongs to the physical page: [ 33.486093] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.486200] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.486249] page_type: f5(slab) [ 33.486579] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.486980] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.487318] page dumped because: kasan: bad access detected [ 33.487357] [ 33.487913] Memory state around the buggy address: [ 33.488334] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.488623] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.488728] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.489060] ^ [ 33.489106] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.489155] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.489492] ================================================================== [ 33.368633] ================================================================== [ 33.368685] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 33.369599] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.369681] [ 33.369719] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.370160] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.370223] Hardware name: linux,dummy-virt (DT) [ 33.370256] Call trace: [ 33.370282] show_stack+0x20/0x38 (C) [ 33.370851] dump_stack_lvl+0x8c/0xd0 [ 33.371199] print_report+0x118/0x5d0 [ 33.371255] kasan_report+0xdc/0x128 [ 33.371303] kasan_check_range+0x100/0x1a8 [ 33.371350] __kasan_check_write+0x20/0x30 [ 33.371400] kasan_atomics_helper+0x1128/0x4858 [ 33.371461] kasan_atomics+0x198/0x2e0 [ 33.371509] kunit_try_run_case+0x170/0x3f0 [ 33.371558] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.372369] kthread+0x328/0x630 [ 33.372546] ret_from_fork+0x10/0x20 [ 33.373176] [ 33.373205] Allocated by task 297: [ 33.373842] kasan_save_stack+0x3c/0x68 [ 33.373980] kasan_save_track+0x20/0x40 [ 33.374030] kasan_save_alloc_info+0x40/0x58 [ 33.374543] __kasan_kmalloc+0xd4/0xd8 [ 33.374595] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.374640] kasan_atomics+0xb8/0x2e0 [ 33.374680] kunit_try_run_case+0x170/0x3f0 [ 33.374720] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.374766] kthread+0x328/0x630 [ 33.375586] ret_from_fork+0x10/0x20 [ 33.375703] [ 33.375732] The buggy address belongs to the object at fff00000c64f7f00 [ 33.375732] which belongs to the cache kmalloc-64 of size 64 [ 33.375795] The buggy address is located 0 bytes to the right of [ 33.375795] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.375860] [ 33.375883] The buggy address belongs to the physical page: [ 33.375916] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.376798] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.376877] page_type: f5(slab) [ 33.377122] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.377566] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.377857] page dumped because: kasan: bad access detected [ 33.377896] [ 33.377916] Memory state around the buggy address: [ 33.378334] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.378655] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.378707] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.379238] ^ [ 33.379598] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.379656] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.379697] ================================================================== [ 33.457487] ================================================================== [ 33.457549] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 33.457845] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.458021] [ 33.458627] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.459134] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.459165] Hardware name: linux,dummy-virt (DT) [ 33.459554] Call trace: [ 33.459777] show_stack+0x20/0x38 (C) [ 33.460058] dump_stack_lvl+0x8c/0xd0 [ 33.460125] print_report+0x118/0x5d0 [ 33.460179] kasan_report+0xdc/0x128 [ 33.460388] kasan_check_range+0x100/0x1a8 [ 33.460833] __kasan_check_write+0x20/0x30 [ 33.461310] kasan_atomics_helper+0x147c/0x4858 [ 33.461493] kasan_atomics+0x198/0x2e0 [ 33.461769] kunit_try_run_case+0x170/0x3f0 [ 33.462246] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.462320] kthread+0x328/0x630 [ 33.462370] ret_from_fork+0x10/0x20 [ 33.462422] [ 33.462454] Allocated by task 297: [ 33.462709] kasan_save_stack+0x3c/0x68 [ 33.462833] kasan_save_track+0x20/0x40 [ 33.463206] kasan_save_alloc_info+0x40/0x58 [ 33.463253] __kasan_kmalloc+0xd4/0xd8 [ 33.463491] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.464007] kasan_atomics+0xb8/0x2e0 [ 33.464222] kunit_try_run_case+0x170/0x3f0 [ 33.464270] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.464609] kthread+0x328/0x630 [ 33.464650] ret_from_fork+0x10/0x20 [ 33.464891] [ 33.464993] The buggy address belongs to the object at fff00000c64f7f00 [ 33.464993] which belongs to the cache kmalloc-64 of size 64 [ 33.465324] The buggy address is located 0 bytes to the right of [ 33.465324] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.465412] [ 33.465679] The buggy address belongs to the physical page: [ 33.465821] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.466170] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.466279] page_type: f5(slab) [ 33.466337] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.466757] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.467014] page dumped because: kasan: bad access detected [ 33.467269] [ 33.467424] Memory state around the buggy address: [ 33.467522] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.467622] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.467734] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.467773] ^ [ 33.467808] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.467854] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.468737] ================================================================== [ 33.357098] ================================================================== [ 33.357152] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 33.357727] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.357911] [ 33.357948] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.358043] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.358071] Hardware name: linux,dummy-virt (DT) [ 33.358289] Call trace: [ 33.358319] show_stack+0x20/0x38 (C) [ 33.358544] dump_stack_lvl+0x8c/0xd0 [ 33.359023] print_report+0x118/0x5d0 [ 33.359156] kasan_report+0xdc/0x128 [ 33.359204] kasan_check_range+0x100/0x1a8 [ 33.359251] __kasan_check_write+0x20/0x30 [ 33.359298] kasan_atomics_helper+0x10c0/0x4858 [ 33.359351] kasan_atomics+0x198/0x2e0 [ 33.359401] kunit_try_run_case+0x170/0x3f0 [ 33.359461] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.360299] kthread+0x328/0x630 [ 33.360417] ret_from_fork+0x10/0x20 [ 33.360650] [ 33.360671] Allocated by task 297: [ 33.360702] kasan_save_stack+0x3c/0x68 [ 33.361600] kasan_save_track+0x20/0x40 [ 33.361655] kasan_save_alloc_info+0x40/0x58 [ 33.361709] __kasan_kmalloc+0xd4/0xd8 [ 33.361750] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.362338] kasan_atomics+0xb8/0x2e0 [ 33.362396] kunit_try_run_case+0x170/0x3f0 [ 33.362460] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.362507] kthread+0x328/0x630 [ 33.362545] ret_from_fork+0x10/0x20 [ 33.362586] [ 33.362609] The buggy address belongs to the object at fff00000c64f7f00 [ 33.362609] which belongs to the cache kmalloc-64 of size 64 [ 33.362970] The buggy address is located 0 bytes to the right of [ 33.362970] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.363599] [ 33.363785] The buggy address belongs to the physical page: [ 33.364100] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.364740] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.364857] page_type: f5(slab) [ 33.365168] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.365396] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.365824] page dumped because: kasan: bad access detected [ 33.366035] [ 33.366223] Memory state around the buggy address: [ 33.366262] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.366418] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.366473] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.367021] ^ [ 33.367348] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.367488] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.367532] ================================================================== [ 33.531188] ================================================================== [ 33.531245] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 33.531297] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.531347] [ 33.531389] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.531632] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.531665] Hardware name: linux,dummy-virt (DT) [ 33.531977] Call trace: [ 33.532004] show_stack+0x20/0x38 (C) [ 33.532055] dump_stack_lvl+0x8c/0xd0 [ 33.532105] print_report+0x118/0x5d0 [ 33.532150] kasan_report+0xdc/0x128 [ 33.532494] kasan_check_range+0x100/0x1a8 [ 33.532799] __kasan_check_write+0x20/0x30 [ 33.532931] kasan_atomics_helper+0x175c/0x4858 [ 33.532983] kasan_atomics+0x198/0x2e0 [ 33.533030] kunit_try_run_case+0x170/0x3f0 [ 33.533078] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.533139] kthread+0x328/0x630 [ 33.533339] ret_from_fork+0x10/0x20 [ 33.533649] [ 33.533755] Allocated by task 297: [ 33.533787] kasan_save_stack+0x3c/0x68 [ 33.533951] kasan_save_track+0x20/0x40 [ 33.533994] kasan_save_alloc_info+0x40/0x58 [ 33.534035] __kasan_kmalloc+0xd4/0xd8 [ 33.534074] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.534117] kasan_atomics+0xb8/0x2e0 [ 33.534157] kunit_try_run_case+0x170/0x3f0 [ 33.534210] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.534279] kthread+0x328/0x630 [ 33.534315] ret_from_fork+0x10/0x20 [ 33.534355] [ 33.534378] The buggy address belongs to the object at fff00000c64f7f00 [ 33.534378] which belongs to the cache kmalloc-64 of size 64 [ 33.534447] The buggy address is located 0 bytes to the right of [ 33.534447] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.534513] [ 33.534536] The buggy address belongs to the physical page: [ 33.534569] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.534687] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.534739] page_type: f5(slab) [ 33.534790] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.534950] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.534992] page dumped because: kasan: bad access detected [ 33.535032] [ 33.535076] Memory state around the buggy address: [ 33.535113] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.535156] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.535246] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.535452] ^ [ 33.535563] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.535639] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.535682] ================================================================== [ 33.520397] ================================================================== [ 33.520703] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 33.520766] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.521051] [ 33.521091] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.521287] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.521315] Hardware name: linux,dummy-virt (DT) [ 33.521347] Call trace: [ 33.521371] show_stack+0x20/0x38 (C) [ 33.521499] dump_stack_lvl+0x8c/0xd0 [ 33.521554] print_report+0x118/0x5d0 [ 33.521601] kasan_report+0xdc/0x128 [ 33.521651] kasan_check_range+0x100/0x1a8 [ 33.521700] __kasan_check_write+0x20/0x30 [ 33.521749] kasan_atomics_helper+0x16d0/0x4858 [ 33.521799] kasan_atomics+0x198/0x2e0 [ 33.521880] kunit_try_run_case+0x170/0x3f0 [ 33.521933] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.521991] kthread+0x328/0x630 [ 33.522085] ret_from_fork+0x10/0x20 [ 33.522148] [ 33.522170] Allocated by task 297: [ 33.522200] kasan_save_stack+0x3c/0x68 [ 33.522244] kasan_save_track+0x20/0x40 [ 33.522285] kasan_save_alloc_info+0x40/0x58 [ 33.522325] __kasan_kmalloc+0xd4/0xd8 [ 33.522393] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.522449] kasan_atomics+0xb8/0x2e0 [ 33.522490] kunit_try_run_case+0x170/0x3f0 [ 33.522530] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.522633] kthread+0x328/0x630 [ 33.522773] ret_from_fork+0x10/0x20 [ 33.522816] [ 33.522864] The buggy address belongs to the object at fff00000c64f7f00 [ 33.522864] which belongs to the cache kmalloc-64 of size 64 [ 33.523144] The buggy address is located 0 bytes to the right of [ 33.523144] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.523287] [ 33.523312] The buggy address belongs to the physical page: [ 33.523395] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.523542] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.523591] page_type: f5(slab) [ 33.523666] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.523718] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.523757] page dumped because: kasan: bad access detected [ 33.523807] [ 33.523847] Memory state around the buggy address: [ 33.523935] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.524042] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.524142] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.524226] ^ [ 33.524314] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.524449] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.524490] ================================================================== [ 33.226664] ================================================================== [ 33.226753] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 33.226807] Write of size 4 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.226883] [ 33.226950] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.227052] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.227100] Hardware name: linux,dummy-virt (DT) [ 33.227162] Call trace: [ 33.227186] show_stack+0x20/0x38 (C) [ 33.227238] dump_stack_lvl+0x8c/0xd0 [ 33.227325] print_report+0x118/0x5d0 [ 33.227505] kasan_report+0xdc/0x128 [ 33.227560] kasan_check_range+0x100/0x1a8 [ 33.227637] __kasan_check_write+0x20/0x30 [ 33.227703] kasan_atomics_helper+0x99c/0x4858 [ 33.227756] kasan_atomics+0x198/0x2e0 [ 33.227803] kunit_try_run_case+0x170/0x3f0 [ 33.227869] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.227922] kthread+0x328/0x630 [ 33.227974] ret_from_fork+0x10/0x20 [ 33.228040] [ 33.228069] Allocated by task 297: [ 33.228139] kasan_save_stack+0x3c/0x68 [ 33.228185] kasan_save_track+0x20/0x40 [ 33.228231] kasan_save_alloc_info+0x40/0x58 [ 33.228480] __kasan_kmalloc+0xd4/0xd8 [ 33.228583] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.228636] kasan_atomics+0xb8/0x2e0 [ 33.228706] kunit_try_run_case+0x170/0x3f0 [ 33.228787] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.228852] kthread+0x328/0x630 [ 33.228903] ret_from_fork+0x10/0x20 [ 33.228967] [ 33.228990] The buggy address belongs to the object at fff00000c64f7f00 [ 33.228990] which belongs to the cache kmalloc-64 of size 64 [ 33.229265] The buggy address is located 0 bytes to the right of [ 33.229265] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.229344] [ 33.229404] The buggy address belongs to the physical page: [ 33.229471] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.229526] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.229602] page_type: f5(slab) [ 33.229745] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.229922] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.229968] page dumped because: kasan: bad access detected [ 33.230014] [ 33.230035] Memory state around the buggy address: [ 33.230086] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.230130] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.230195] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.230237] ^ [ 33.230272] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.230348] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.230389] ================================================================== [ 33.329868] ================================================================== [ 33.330079] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 33.330147] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.330199] [ 33.330637] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.330897] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.331049] Hardware name: linux,dummy-virt (DT) [ 33.331201] Call trace: [ 33.331248] show_stack+0x20/0x38 (C) [ 33.331303] dump_stack_lvl+0x8c/0xd0 [ 33.331351] print_report+0x118/0x5d0 [ 33.331398] kasan_report+0xdc/0x128 [ 33.331465] kasan_check_range+0x100/0x1a8 [ 33.331534] __kasan_check_write+0x20/0x30 [ 33.331583] kasan_atomics_helper+0xff0/0x4858 [ 33.331635] kasan_atomics+0x198/0x2e0 [ 33.331693] kunit_try_run_case+0x170/0x3f0 [ 33.331994] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.332106] kthread+0x328/0x630 [ 33.332154] ret_from_fork+0x10/0x20 [ 33.333522] [ 33.333627] Allocated by task 297: [ 33.333936] kasan_save_stack+0x3c/0x68 [ 33.333996] kasan_save_track+0x20/0x40 [ 33.334355] kasan_save_alloc_info+0x40/0x58 [ 33.334887] __kasan_kmalloc+0xd4/0xd8 [ 33.335052] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.335098] kasan_atomics+0xb8/0x2e0 [ 33.335145] kunit_try_run_case+0x170/0x3f0 [ 33.335185] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.335232] kthread+0x328/0x630 [ 33.335269] ret_from_fork+0x10/0x20 [ 33.336770] [ 33.336802] The buggy address belongs to the object at fff00000c64f7f00 [ 33.336802] which belongs to the cache kmalloc-64 of size 64 [ 33.337885] The buggy address is located 0 bytes to the right of [ 33.337885] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.338564] [ 33.338668] The buggy address belongs to the physical page: [ 33.338704] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.338879] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.339173] page_type: f5(slab) [ 33.340017] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.340193] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.340715] page dumped because: kasan: bad access detected [ 33.340991] [ 33.341298] Memory state around the buggy address: [ 33.341337] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.341893] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.342131] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.342205] ^ [ 33.342600] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.343132] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.344146] ================================================================== [ 33.307913] ================================================================== [ 33.307962] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 33.308027] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.308113] [ 33.308172] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.308257] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.308285] Hardware name: linux,dummy-virt (DT) [ 33.308617] Call trace: [ 33.308661] show_stack+0x20/0x38 (C) [ 33.308714] dump_stack_lvl+0x8c/0xd0 [ 33.308799] print_report+0x118/0x5d0 [ 33.308935] kasan_report+0xdc/0x128 [ 33.308984] __asan_report_store8_noabort+0x20/0x30 [ 33.309142] kasan_atomics_helper+0x3e5c/0x4858 [ 33.309225] kasan_atomics+0x198/0x2e0 [ 33.309292] kunit_try_run_case+0x170/0x3f0 [ 33.309343] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.309398] kthread+0x328/0x630 [ 33.309467] ret_from_fork+0x10/0x20 [ 33.309518] [ 33.309538] Allocated by task 297: [ 33.309566] kasan_save_stack+0x3c/0x68 [ 33.309611] kasan_save_track+0x20/0x40 [ 33.309683] kasan_save_alloc_info+0x40/0x58 [ 33.309723] __kasan_kmalloc+0xd4/0xd8 [ 33.309894] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.310046] kasan_atomics+0xb8/0x2e0 [ 33.310138] kunit_try_run_case+0x170/0x3f0 [ 33.310281] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.310384] kthread+0x328/0x630 [ 33.310670] ret_from_fork+0x10/0x20 [ 33.310854] [ 33.310905] The buggy address belongs to the object at fff00000c64f7f00 [ 33.310905] which belongs to the cache kmalloc-64 of size 64 [ 33.311006] The buggy address is located 0 bytes to the right of [ 33.311006] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.311072] [ 33.311094] The buggy address belongs to the physical page: [ 33.311140] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.311191] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.311239] page_type: f5(slab) [ 33.311282] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.311335] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.311573] page dumped because: kasan: bad access detected [ 33.311649] [ 33.311796] Memory state around the buggy address: [ 33.312116] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.312175] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.312240] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.312310] ^ [ 33.312422] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.312507] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.312657] ================================================================== [ 33.250222] ================================================================== [ 33.250270] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 33.250319] Write of size 4 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.250369] [ 33.250399] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.250709] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.250752] Hardware name: linux,dummy-virt (DT) [ 33.250785] Call trace: [ 33.250810] show_stack+0x20/0x38 (C) [ 33.250864] dump_stack_lvl+0x8c/0xd0 [ 33.250912] print_report+0x118/0x5d0 [ 33.250958] kasan_report+0xdc/0x128 [ 33.251004] kasan_check_range+0x100/0x1a8 [ 33.251052] __kasan_check_write+0x20/0x30 [ 33.251101] kasan_atomics_helper+0xb70/0x4858 [ 33.251160] kasan_atomics+0x198/0x2e0 [ 33.251209] kunit_try_run_case+0x170/0x3f0 [ 33.251257] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.251310] kthread+0x328/0x630 [ 33.251355] ret_from_fork+0x10/0x20 [ 33.251406] [ 33.251426] Allocated by task 297: [ 33.251514] kasan_save_stack+0x3c/0x68 [ 33.251570] kasan_save_track+0x20/0x40 [ 33.251612] kasan_save_alloc_info+0x40/0x58 [ 33.251659] __kasan_kmalloc+0xd4/0xd8 [ 33.251701] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.251743] kasan_atomics+0xb8/0x2e0 [ 33.251918] kunit_try_run_case+0x170/0x3f0 [ 33.251961] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.252007] kthread+0x328/0x630 [ 33.252249] ret_from_fork+0x10/0x20 [ 33.252341] [ 33.252381] The buggy address belongs to the object at fff00000c64f7f00 [ 33.252381] which belongs to the cache kmalloc-64 of size 64 [ 33.252472] The buggy address is located 0 bytes to the right of [ 33.252472] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.252544] [ 33.252572] The buggy address belongs to the physical page: [ 33.252605] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.252679] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.252888] page_type: f5(slab) [ 33.252945] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.253086] page dumped because: kasan: bad access detected [ 33.253145] Memory state around the buggy address: [ 33.253516] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.253841] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.254955] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 33.255068] [ 33.255203] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.255234] Hardware name: linux,dummy-virt (DT) [ 33.256019] kasan_atomics+0x198/0x2e0 [ 33.257359] kasan_save_alloc_info+0x40/0x58 [ 33.258476] ret_from_fork+0x10/0x20 [ 33.258829] [ 33.258888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.258951] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.259154] page_type: f5(slab) [ 33.259220] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.259468] [ 33.259705] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.259910] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.261208] Write of size 4 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.261484] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.261682] Call trace: [ 33.262074] kasan_report+0xdc/0x128 [ 33.262366] kasan_atomics_helper+0xc08/0x4858 [ 33.264456] [ 33.264744] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.264800] page_type: f5(slab) [ 33.265076] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.265770] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.266286] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.267315] ================================================================== [ 33.539994] ================================================================== [ 33.540223] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 33.540326] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.540536] [ 33.540578] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.540780] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.540824] Hardware name: linux,dummy-virt (DT) [ 33.540857] Call trace: [ 33.540881] show_stack+0x20/0x38 (C) [ 33.540931] dump_stack_lvl+0x8c/0xd0 [ 33.540984] print_report+0x118/0x5d0 [ 33.541210] kasan_report+0xdc/0x128 [ 33.541421] kasan_check_range+0x100/0x1a8 [ 33.541491] __kasan_check_write+0x20/0x30 [ 33.541538] kasan_atomics_helper+0x17ec/0x4858 [ 33.541591] kasan_atomics+0x198/0x2e0 [ 33.541738] kunit_try_run_case+0x170/0x3f0 [ 33.541820] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.541875] kthread+0x328/0x630 [ 33.541919] ret_from_fork+0x10/0x20 [ 33.541970] [ 33.541992] Allocated by task 297: [ 33.542114] kasan_save_stack+0x3c/0x68 [ 33.542160] kasan_save_track+0x20/0x40 [ 33.542201] kasan_save_alloc_info+0x40/0x58 [ 33.542242] __kasan_kmalloc+0xd4/0xd8 [ 33.542305] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.542350] kasan_atomics+0xb8/0x2e0 [ 33.542407] kunit_try_run_case+0x170/0x3f0 [ 33.542457] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.542503] kthread+0x328/0x630 [ 33.542537] ret_from_fork+0x10/0x20 [ 33.542576] [ 33.542599] The buggy address belongs to the object at fff00000c64f7f00 [ 33.542599] which belongs to the cache kmalloc-64 of size 64 [ 33.542658] The buggy address is located 0 bytes to the right of [ 33.542658] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.542723] [ 33.542746] The buggy address belongs to the physical page: [ 33.542778] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.542830] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.543213] page_type: f5(slab) [ 33.543347] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.543398] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.543459] page dumped because: kasan: bad access detected [ 33.543491] [ 33.543510] Memory state around the buggy address: [ 33.543692] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.543781] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.543826] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.543932] ^ [ 33.543966] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.544011] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.544051] ================================================================== [ 33.316819] ================================================================== [ 33.316875] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 33.316926] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.316983] [ 33.317020] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.317105] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.317132] Hardware name: linux,dummy-virt (DT) [ 33.317177] Call trace: [ 33.317216] show_stack+0x20/0x38 (C) [ 33.317272] dump_stack_lvl+0x8c/0xd0 [ 33.317538] print_report+0x118/0x5d0 [ 33.317597] kasan_report+0xdc/0x128 [ 33.317907] kasan_check_range+0x100/0x1a8 [ 33.317980] __kasan_check_write+0x20/0x30 [ 33.318029] kasan_atomics_helper+0xf20/0x4858 [ 33.318081] kasan_atomics+0x198/0x2e0 [ 33.318188] kunit_try_run_case+0x170/0x3f0 [ 33.318239] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.318294] kthread+0x328/0x630 [ 33.318338] ret_from_fork+0x10/0x20 [ 33.318524] [ 33.318548] Allocated by task 297: [ 33.318580] kasan_save_stack+0x3c/0x68 [ 33.318625] kasan_save_track+0x20/0x40 [ 33.318667] kasan_save_alloc_info+0x40/0x58 [ 33.318707] __kasan_kmalloc+0xd4/0xd8 [ 33.318748] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.318791] kasan_atomics+0xb8/0x2e0 [ 33.318831] kunit_try_run_case+0x170/0x3f0 [ 33.318874] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.318919] kthread+0x328/0x630 [ 33.318955] ret_from_fork+0x10/0x20 [ 33.318993] [ 33.319016] The buggy address belongs to the object at fff00000c64f7f00 [ 33.319016] which belongs to the cache kmalloc-64 of size 64 [ 33.320389] The buggy address is located 0 bytes to the right of [ 33.320389] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.322582] [ 33.322621] The buggy address belongs to the physical page: [ 33.322656] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.322710] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.322759] page_type: f5(slab) [ 33.322797] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.322850] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.322892] page dumped because: kasan: bad access detected [ 33.322926] [ 33.322946] Memory state around the buggy address: [ 33.322979] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.323023] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.323066] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.323106] ^ [ 33.323150] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.323194] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.323233] ================================================================== [ 33.535874] ================================================================== [ 33.535919] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 33.536047] Read of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.536099] [ 33.536142] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.536325] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.536356] Hardware name: linux,dummy-virt (DT) [ 33.536387] Call trace: [ 33.536411] show_stack+0x20/0x38 (C) [ 33.536588] dump_stack_lvl+0x8c/0xd0 [ 33.536646] print_report+0x118/0x5d0 [ 33.536723] kasan_report+0xdc/0x128 [ 33.536769] __asan_report_load8_noabort+0x20/0x30 [ 33.536826] kasan_atomics_helper+0x3e20/0x4858 [ 33.537056] kasan_atomics+0x198/0x2e0 [ 33.537105] kunit_try_run_case+0x170/0x3f0 [ 33.537187] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.537417] kthread+0x328/0x630 [ 33.537481] ret_from_fork+0x10/0x20 [ 33.537687] [ 33.537709] Allocated by task 297: [ 33.537739] kasan_save_stack+0x3c/0x68 [ 33.537815] kasan_save_track+0x20/0x40 [ 33.537935] kasan_save_alloc_info+0x40/0x58 [ 33.537989] __kasan_kmalloc+0xd4/0xd8 [ 33.538030] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.538073] kasan_atomics+0xb8/0x2e0 [ 33.538136] kunit_try_run_case+0x170/0x3f0 [ 33.538177] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.538222] kthread+0x328/0x630 [ 33.538257] ret_from_fork+0x10/0x20 [ 33.538297] [ 33.538384] The buggy address belongs to the object at fff00000c64f7f00 [ 33.538384] which belongs to the cache kmalloc-64 of size 64 [ 33.538463] The buggy address is located 0 bytes to the right of [ 33.538463] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.538530] [ 33.538554] The buggy address belongs to the physical page: [ 33.538586] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.538664] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.538742] page_type: f5(slab) [ 33.538788] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.538852] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.539011] page dumped because: kasan: bad access detected [ 33.539042] [ 33.539061] Memory state around the buggy address: [ 33.539095] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.539236] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.539296] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.539337] ^ [ 33.539381] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.539461] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.539610] ================================================================== [ 33.391002] ================================================================== [ 33.391135] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 33.391489] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.391541] [ 33.391571] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.391656] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.391684] Hardware name: linux,dummy-virt (DT) [ 33.392550] Call trace: [ 33.392741] show_stack+0x20/0x38 (C) [ 33.392933] dump_stack_lvl+0x8c/0xd0 [ 33.393129] print_report+0x118/0x5d0 [ 33.393176] kasan_report+0xdc/0x128 [ 33.393222] kasan_check_range+0x100/0x1a8 [ 33.393271] __kasan_check_write+0x20/0x30 [ 33.393317] kasan_atomics_helper+0x11f8/0x4858 [ 33.393370] kasan_atomics+0x198/0x2e0 [ 33.393925] kunit_try_run_case+0x170/0x3f0 [ 33.394132] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.394666] kthread+0x328/0x630 [ 33.394730] ret_from_fork+0x10/0x20 [ 33.395182] [ 33.395423] Allocated by task 297: [ 33.395744] kasan_save_stack+0x3c/0x68 [ 33.395798] kasan_save_track+0x20/0x40 [ 33.396075] kasan_save_alloc_info+0x40/0x58 [ 33.396369] __kasan_kmalloc+0xd4/0xd8 [ 33.396422] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.396817] kasan_atomics+0xb8/0x2e0 [ 33.396876] kunit_try_run_case+0x170/0x3f0 [ 33.397373] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.397754] kthread+0x328/0x630 [ 33.397928] ret_from_fork+0x10/0x20 [ 33.398149] [ 33.398177] The buggy address belongs to the object at fff00000c64f7f00 [ 33.398177] which belongs to the cache kmalloc-64 of size 64 [ 33.398582] The buggy address is located 0 bytes to the right of [ 33.398582] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.398736] [ 33.398758] The buggy address belongs to the physical page: [ 33.398791] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.399405] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.399559] page_type: f5(slab) [ 33.399600] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.399652] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.399695] page dumped because: kasan: bad access detected [ 33.400770] [ 33.400997] Memory state around the buggy address: [ 33.401035] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.401126] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.401627] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.401717] ^ [ 33.401757] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.401809] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.402100] ================================================================== [ 33.344596] ================================================================== [ 33.345330] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 33.345831] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.346193] [ 33.346230] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.346317] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.346345] Hardware name: linux,dummy-virt (DT) [ 33.346774] Call trace: [ 33.346814] show_stack+0x20/0x38 (C) [ 33.347233] dump_stack_lvl+0x8c/0xd0 [ 33.347384] print_report+0x118/0x5d0 [ 33.347588] kasan_report+0xdc/0x128 [ 33.347639] kasan_check_range+0x100/0x1a8 [ 33.348027] __kasan_check_write+0x20/0x30 [ 33.348473] kasan_atomics_helper+0x1058/0x4858 [ 33.348538] kasan_atomics+0x198/0x2e0 [ 33.348588] kunit_try_run_case+0x170/0x3f0 [ 33.348638] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.348692] kthread+0x328/0x630 [ 33.348740] ret_from_fork+0x10/0x20 [ 33.349953] [ 33.349999] Allocated by task 297: [ 33.350165] kasan_save_stack+0x3c/0x68 [ 33.350222] kasan_save_track+0x20/0x40 [ 33.350263] kasan_save_alloc_info+0x40/0x58 [ 33.350304] __kasan_kmalloc+0xd4/0xd8 [ 33.350344] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.350389] kasan_atomics+0xb8/0x2e0 [ 33.350429] kunit_try_run_case+0x170/0x3f0 [ 33.350482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.351170] kthread+0x328/0x630 [ 33.351355] ret_from_fork+0x10/0x20 [ 33.351779] [ 33.351805] The buggy address belongs to the object at fff00000c64f7f00 [ 33.351805] which belongs to the cache kmalloc-64 of size 64 [ 33.352310] The buggy address is located 0 bytes to the right of [ 33.352310] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.352567] [ 33.352881] The buggy address belongs to the physical page: [ 33.353043] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.353106] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.353504] page_type: f5(slab) [ 33.353975] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.354045] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.354479] page dumped because: kasan: bad access detected [ 33.354518] [ 33.354537] Memory state around the buggy address: [ 33.354715] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.355234] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.355288] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.355845] ^ [ 33.355968] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.356292] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.356335] ================================================================== [ 33.436590] ================================================================== [ 33.436650] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 33.436849] Read of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.437187] [ 33.437425] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.437527] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.437555] Hardware name: linux,dummy-virt (DT) [ 33.437653] Call trace: [ 33.437683] show_stack+0x20/0x38 (C) [ 33.437787] dump_stack_lvl+0x8c/0xd0 [ 33.437990] print_report+0x118/0x5d0 [ 33.438448] kasan_report+0xdc/0x128 [ 33.438500] __asan_report_load8_noabort+0x20/0x30 [ 33.438971] kasan_atomics_helper+0x3f04/0x4858 [ 33.439167] kasan_atomics+0x198/0x2e0 [ 33.439503] kunit_try_run_case+0x170/0x3f0 [ 33.439681] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.439739] kthread+0x328/0x630 [ 33.440007] ret_from_fork+0x10/0x20 [ 33.440402] [ 33.440430] Allocated by task 297: [ 33.440753] kasan_save_stack+0x3c/0x68 [ 33.440954] kasan_save_track+0x20/0x40 [ 33.441001] kasan_save_alloc_info+0x40/0x58 [ 33.441042] __kasan_kmalloc+0xd4/0xd8 [ 33.441084] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.441576] kasan_atomics+0xb8/0x2e0 [ 33.441642] kunit_try_run_case+0x170/0x3f0 [ 33.441683] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.441911] kthread+0x328/0x630 [ 33.442108] ret_from_fork+0x10/0x20 [ 33.442272] [ 33.442307] The buggy address belongs to the object at fff00000c64f7f00 [ 33.442307] which belongs to the cache kmalloc-64 of size 64 [ 33.442507] The buggy address is located 0 bytes to the right of [ 33.442507] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.442598] [ 33.442799] The buggy address belongs to the physical page: [ 33.442974] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.443604] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.443745] page_type: f5(slab) [ 33.443787] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.443839] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.444632] page dumped because: kasan: bad access detected [ 33.444959] [ 33.445013] Memory state around the buggy address: [ 33.445221] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.445281] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.445379] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.445446] ^ [ 33.445481] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.445528] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.445569] ================================================================== [ 33.230691] ================================================================== [ 33.230787] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 33.230840] Write of size 4 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.230907] [ 33.230961] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.231048] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.231076] Hardware name: linux,dummy-virt (DT) [ 33.231115] Call trace: [ 33.231141] show_stack+0x20/0x38 (C) [ 33.231341] dump_stack_lvl+0x8c/0xd0 [ 33.231397] print_report+0x118/0x5d0 [ 33.231457] kasan_report+0xdc/0x128 [ 33.231514] kasan_check_range+0x100/0x1a8 [ 33.231562] __kasan_check_write+0x20/0x30 [ 33.231609] kasan_atomics_helper+0xa04/0x4858 [ 33.231660] kasan_atomics+0x198/0x2e0 [ 33.231707] kunit_try_run_case+0x170/0x3f0 [ 33.231755] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.231808] kthread+0x328/0x630 [ 33.231854] ret_from_fork+0x10/0x20 [ 33.231912] [ 33.231947] Allocated by task 297: [ 33.231993] kasan_save_stack+0x3c/0x68 [ 33.232036] kasan_save_track+0x20/0x40 [ 33.232079] kasan_save_alloc_info+0x40/0x58 [ 33.232242] kunit_try_run_case+0x170/0x3f0 [ 33.232861] The buggy address is located 0 bytes to the right of [ 33.232861] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.232981] [ 33.233019] The buggy address belongs to the physical page: [ 33.233052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.233103] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.233265] page_type: f5(slab) [ 33.233429] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.233502] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.233570] page dumped because: kasan: bad access detected [ 33.233606] [ 33.233780] Memory state around the buggy address: [ 33.233839] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.233884] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.233944] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.233984] ^ [ 33.234052] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.234098] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.234140] ================================================================== [ 33.512664] ================================================================== [ 33.512809] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 33.512866] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.512916] [ 33.512952] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.513038] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.513067] Hardware name: linux,dummy-virt (DT) [ 33.513098] Call trace: [ 33.513123] show_stack+0x20/0x38 (C) [ 33.513180] dump_stack_lvl+0x8c/0xd0 [ 33.513288] print_report+0x118/0x5d0 [ 33.513433] kasan_report+0xdc/0x128 [ 33.513529] kasan_check_range+0x100/0x1a8 [ 33.513578] __kasan_check_write+0x20/0x30 [ 33.513652] kasan_atomics_helper+0x1644/0x4858 [ 33.513740] kasan_atomics+0x198/0x2e0 [ 33.513789] kunit_try_run_case+0x170/0x3f0 [ 33.513849] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.513904] kthread+0x328/0x630 [ 33.513949] ret_from_fork+0x10/0x20 [ 33.514016] [ 33.514038] Allocated by task 297: [ 33.514068] kasan_save_stack+0x3c/0x68 [ 33.514189] kasan_save_track+0x20/0x40 [ 33.514281] kasan_save_alloc_info+0x40/0x58 [ 33.514420] __kasan_kmalloc+0xd4/0xd8 [ 33.514471] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.514515] kasan_atomics+0xb8/0x2e0 [ 33.514586] kunit_try_run_case+0x170/0x3f0 [ 33.514626] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.514705] kthread+0x328/0x630 [ 33.514767] ret_from_fork+0x10/0x20 [ 33.514827] [ 33.514996] The buggy address belongs to the object at fff00000c64f7f00 [ 33.514996] which belongs to the cache kmalloc-64 of size 64 [ 33.515056] The buggy address is located 0 bytes to the right of [ 33.515056] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.515126] [ 33.515147] The buggy address belongs to the physical page: [ 33.515180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.515245] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.515292] page_type: f5(slab) [ 33.515517] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.515575] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.515863] page dumped because: kasan: bad access detected [ 33.515899] [ 33.515969] Memory state around the buggy address: [ 33.516002] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.516048] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.516139] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.516198] ^ [ 33.516295] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.516341] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.516380] ================================================================== [ 33.425101] ================================================================== [ 33.425374] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 33.425557] Write of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.425613] [ 33.425702] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.426073] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.426219] Hardware name: linux,dummy-virt (DT) [ 33.426551] Call trace: [ 33.426714] show_stack+0x20/0x38 (C) [ 33.426851] dump_stack_lvl+0x8c/0xd0 [ 33.427300] print_report+0x118/0x5d0 [ 33.427761] kasan_report+0xdc/0x128 [ 33.427825] kasan_check_range+0x100/0x1a8 [ 33.427874] __kasan_check_write+0x20/0x30 [ 33.428318] kasan_atomics_helper+0x1384/0x4858 [ 33.428466] kasan_atomics+0x198/0x2e0 [ 33.428516] kunit_try_run_case+0x170/0x3f0 [ 33.429060] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.429182] kthread+0x328/0x630 [ 33.429229] ret_from_fork+0x10/0x20 [ 33.429280] [ 33.429730] Allocated by task 297: [ 33.429768] kasan_save_stack+0x3c/0x68 [ 33.430270] kasan_save_track+0x20/0x40 [ 33.430455] kasan_save_alloc_info+0x40/0x58 [ 33.430791] __kasan_kmalloc+0xd4/0xd8 [ 33.430835] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.430887] kasan_atomics+0xb8/0x2e0 [ 33.430929] kunit_try_run_case+0x170/0x3f0 [ 33.431527] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.431605] kthread+0x328/0x630 [ 33.431643] ret_from_fork+0x10/0x20 [ 33.431683] [ 33.431705] The buggy address belongs to the object at fff00000c64f7f00 [ 33.431705] which belongs to the cache kmalloc-64 of size 64 [ 33.432358] The buggy address is located 0 bytes to the right of [ 33.432358] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.432465] [ 33.432488] The buggy address belongs to the physical page: [ 33.432911] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.433131] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.433181] page_type: f5(slab) [ 33.433225] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.433574] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.433652] page dumped because: kasan: bad access detected [ 33.434265] [ 33.434337] Memory state around the buggy address: [ 33.434503] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.434688] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.434737] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.434814] ^ [ 33.434876] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.434922] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.435344] ================================================================== [ 33.295991] ================================================================== [ 33.296036] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 33.296085] Read of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.296136] [ 33.296165] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.296248] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.296279] Hardware name: linux,dummy-virt (DT) [ 33.296329] Call trace: [ 33.296352] show_stack+0x20/0x38 (C) [ 33.296403] dump_stack_lvl+0x8c/0xd0 [ 33.296820] print_report+0x118/0x5d0 [ 33.296926] kasan_report+0xdc/0x128 [ 33.297002] __asan_report_load8_noabort+0x20/0x30 [ 33.297055] kasan_atomics_helper+0x3f58/0x4858 [ 33.297108] kasan_atomics+0x198/0x2e0 [ 33.297172] kunit_try_run_case+0x170/0x3f0 [ 33.297221] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.297277] kthread+0x328/0x630 [ 33.297354] ret_from_fork+0x10/0x20 [ 33.297407] [ 33.297550] Allocated by task 297: [ 33.297608] kasan_save_stack+0x3c/0x68 [ 33.297694] kasan_save_track+0x20/0x40 [ 33.297772] kasan_save_alloc_info+0x40/0x58 [ 33.297853] __kasan_kmalloc+0xd4/0xd8 [ 33.298171] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.298258] kasan_atomics+0xb8/0x2e0 [ 33.298337] kunit_try_run_case+0x170/0x3f0 [ 33.298514] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.298602] kthread+0x328/0x630 [ 33.298638] ret_from_fork+0x10/0x20 [ 33.298699] [ 33.298722] The buggy address belongs to the object at fff00000c64f7f00 [ 33.298722] which belongs to the cache kmalloc-64 of size 64 [ 33.298781] The buggy address is located 0 bytes to the right of [ 33.298781] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.298847] [ 33.298868] The buggy address belongs to the physical page: [ 33.298898] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.299065] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.299172] page_type: f5(slab) [ 33.299240] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.299532] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.299589] page dumped because: kasan: bad access detected [ 33.299700] [ 33.299815] Memory state around the buggy address: [ 33.299882] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.299970] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.300035] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.300101] ^ [ 33.300155] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.300203] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.300291] ================================================================== [ 33.291580] ================================================================== [ 33.291630] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 33.291743] Read of size 8 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.291797] [ 33.291844] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.291957] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.292005] Hardware name: linux,dummy-virt (DT) [ 33.292067] Call trace: [ 33.292093] show_stack+0x20/0x38 (C) [ 33.292141] dump_stack_lvl+0x8c/0xd0 [ 33.292190] print_report+0x118/0x5d0 [ 33.292520] kasan_report+0xdc/0x128 [ 33.292622] kasan_check_range+0x100/0x1a8 [ 33.292971] __kasan_check_read+0x20/0x30 [ 33.293041] kasan_atomics_helper+0xdd4/0x4858 [ 33.293135] kasan_atomics+0x198/0x2e0 [ 33.293212] kunit_try_run_case+0x170/0x3f0 [ 33.293261] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.293315] kthread+0x328/0x630 [ 33.293367] ret_from_fork+0x10/0x20 [ 33.293418] [ 33.293451] Allocated by task 297: [ 33.293479] kasan_save_stack+0x3c/0x68 [ 33.293524] kasan_save_track+0x20/0x40 [ 33.293705] kasan_save_alloc_info+0x40/0x58 [ 33.293830] __kasan_kmalloc+0xd4/0xd8 [ 33.293939] __kmalloc_cache_noprof+0x16c/0x3c0 [ 33.294068] kasan_atomics+0xb8/0x2e0 [ 33.294182] kunit_try_run_case+0x170/0x3f0 [ 33.294495] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 33.294581] kthread+0x328/0x630 [ 33.294618] ret_from_fork+0x10/0x20 [ 33.294680] [ 33.294702] The buggy address belongs to the object at fff00000c64f7f00 [ 33.294702] which belongs to the cache kmalloc-64 of size 64 [ 33.294762] The buggy address is located 0 bytes to the right of [ 33.294762] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.294825] [ 33.294847] The buggy address belongs to the physical page: [ 33.295058] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f7 [ 33.295152] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.295201] page_type: f5(slab) [ 33.295249] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 33.295300] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.295342] page dumped because: kasan: bad access detected [ 33.295375] [ 33.295394] Memory state around the buggy address: [ 33.295453] fff00000c64f7e00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.295500] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.295563] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.295602] ^ [ 33.295645] fff00000c64f7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.295688] fff00000c64f8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.295737] ================================================================== [ 33.159051] ================================================================== [ 33.159735] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858 [ 33.159897] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.160061] Call trace: [ 33.160346] __kasan_check_write+0x20/0x30 [ 33.160523] kunit_try_run_case+0x170/0x3f0 [ 33.160625] kthread+0x328/0x630 [ 33.160824] kasan_save_track+0x20/0x40 [ 33.161137] kthread+0x328/0x630 [ 33.161295] The buggy address is located 0 bytes to the right of [ 33.161295] allocated 48-byte region [fff00000c64f7f00, fff00000c64f7f30) [ 33.161759] page dumped because: kasan: bad access detected [ 33.162247] fff00000c64f7e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.162309] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.163394] Write of size 4 at addr fff00000c64f7f30 by task kunit_try_catch/297 [ 33.163570] [ 33.163603] CPU: 1 UID: 0 PID: 297 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 33.163773] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.163858] Call trace: [ 33.163972] dump_stack_lvl+0x8c/0xd0 [ 33.164685] kthread+0x328/0x630 [ 33.164813] [ 33.165126] kasan_save_alloc_info+0x40/0x58 [ 33.165770] [ 33.166030] [ 33.166100] The buggy address belongs to the physical page: [ 33.166361] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.166801] >fff00000c64f7f00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.167022] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strlen
[ 32.960334] ================================================================== [ 32.960389] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0 [ 32.960448] Read of size 1 at addr fff00000c64fae50 by task kunit_try_catch/291 [ 32.960712] [ 32.960919] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 32.961086] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.961146] Hardware name: linux,dummy-virt (DT) [ 32.961181] Call trace: [ 32.961220] show_stack+0x20/0x38 (C) [ 32.961275] dump_stack_lvl+0x8c/0xd0 [ 32.961325] print_report+0x118/0x5d0 [ 32.961371] kasan_report+0xdc/0x128 [ 32.961422] __asan_report_load1_noabort+0x20/0x30 [ 32.961487] strlen+0xa8/0xb0 [ 32.961530] kasan_strings+0x418/0xb00 [ 32.961588] kunit_try_run_case+0x170/0x3f0 [ 32.962391] ret_from_fork+0x10/0x20 [ 32.964400] kthread+0x328/0x630 [ 32.966385] ret_from_fork+0x10/0x20 [ 32.967575] [ 32.970536] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88 [ 32.971658] dump_stack_lvl+0x8c/0xd0 [ 32.972324] kasan_save_alloc_info+0x40/0x58 [ 32.974245] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.976338] raw: 0000000000000000 0000000000400040 00000000f5000000 0000000000000000 [ 32.990979] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 32.994308] kunit_try_run_case+0x170/0x3f0 [ 32.995994] kasan_bitops_generic+0xa0/0x1c8 [ 32.996817] page_type: f5(slab) [ 32.999567] [ 33.003208] ret_from_fork+0x10/0x20 [ 33.005303] fff00000c912f200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 33.008663] Call trace: [ 33.009852] kasan_bitops_generic+0x110/0x1c8 [ 33.010286] kasan_save_alloc_info+0x40/0x58 [ 33.010950] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 33.013466] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[ 32.948616] ================================================================== [ 32.948670] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00 [ 32.948723] Read of size 1 at addr fff00000c64fae50 by task kunit_try_catch/291 [ 32.948774] [ 32.948805] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 32.948892] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.948920] Hardware name: linux,dummy-virt (DT) [ 32.949169] Call trace: [ 32.949207] show_stack+0x20/0x38 (C) [ 32.949271] dump_stack_lvl+0x8c/0xd0 [ 32.949322] print_report+0x118/0x5d0 [ 32.949375] kasan_report+0xdc/0x128 [ 32.949423] __asan_report_load1_noabort+0x20/0x30 [ 32.950761] kasan_strings+0x95c/0xb00 [ 32.950867] kunit_try_run_case+0x170/0x3f0 [ 32.951074] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.951303] kthread+0x328/0x630 [ 32.951445] ret_from_fork+0x10/0x20 [ 32.951618] [ 32.951671] Allocated by task 291: [ 32.951703] kasan_save_stack+0x3c/0x68 [ 32.951956] kasan_save_track+0x20/0x40 [ 32.952276] kasan_save_alloc_info+0x40/0x58 [ 32.952540] __kasan_kmalloc+0xd4/0xd8 [ 32.953141] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.953234] kasan_strings+0xc8/0xb00 [ 32.953296] kunit_try_run_case+0x170/0x3f0 [ 32.953417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.953574] kthread+0x328/0x630 [ 32.953660] ret_from_fork+0x10/0x20 [ 32.953843] [ 32.953944] Freed by task 291: [ 32.953978] kasan_save_stack+0x3c/0x68 [ 32.954030] kasan_save_track+0x20/0x40 [ 32.954072] kasan_save_free_info+0x4c/0x78 [ 32.954478] __kasan_slab_free+0x6c/0x98 [ 32.954630] kfree+0x214/0x3c8 [ 32.954727] kasan_strings+0x24c/0xb00 [ 32.954812] kunit_try_run_case+0x170/0x3f0 [ 32.954931] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.955048] kthread+0x328/0x630 [ 32.955253] ret_from_fork+0x10/0x20 [ 32.955337] [ 32.955664] The buggy address belongs to the object at fff00000c64fae40 [ 32.955664] which belongs to the cache kmalloc-32 of size 32 [ 32.955888] The buggy address is located 16 bytes inside of [ 32.955888] freed 32-byte region [fff00000c64fae40, fff00000c64fae60) [ 32.956013] [ 32.956280] The buggy address belongs to the physical page: [ 32.956492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064fa [ 32.956594] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.956784] page_type: f5(slab) [ 32.957031] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 32.957278] raw: 0000000000000000 0000000000400040 00000000f5000000 0000000000000000 [ 32.957515] page dumped because: kasan: bad access detected [ 32.957688] [ 32.957945] Memory state around the buggy address: [ 32.958024] fff00000c64fad00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 32.958093] fff00000c64fad80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 32.958420] >fff00000c64fae00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 32.958554] ^ [ 32.958690] fff00000c64fae80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 32.958737] fff00000c64faf00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 32.958917] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp
[ 32.937572] ================================================================== [ 32.938213] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 [ 32.938560] Read of size 1 at addr fff00000c64fae50 by task kunit_try_catch/291 [ 32.938723] [ 32.938857] CPU: 1 UID: 0 PID: 291 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 32.938968] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.939022] Hardware name: linux,dummy-virt (DT) [ 32.939148] Call trace: [ 32.939195] show_stack+0x20/0x38 (C) [ 32.939408] dump_stack_lvl+0x8c/0xd0 [ 32.939651] print_report+0x118/0x5d0 [ 32.939731] kasan_report+0xdc/0x128 [ 32.939913] __asan_report_load1_noabort+0x20/0x30 [ 32.940101] strcmp+0xc0/0xc8 [ 32.940334] kasan_strings+0x340/0xb00 [ 32.940553] kunit_try_run_case+0x170/0x3f0 [ 32.940710] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.940816] kthread+0x328/0x630 [ 32.940893] ret_from_fork+0x10/0x20 [ 32.941058] [ 32.941128] Allocated by task 291: [ 32.941232] kasan_save_stack+0x3c/0x68 [ 32.941331] kasan_save_track+0x20/0x40 [ 32.941549] kasan_save_alloc_info+0x40/0x58 [ 32.941633] __kasan_kmalloc+0xd4/0xd8 [ 32.941802] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.941940] kasan_strings+0xc8/0xb00 [ 32.942046] kunit_try_run_case+0x170/0x3f0 [ 32.942226] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.942275] kthread+0x328/0x630 [ 32.942311] ret_from_fork+0x10/0x20 [ 32.942355] [ 32.942537] Freed by task 291: [ 32.942737] kasan_save_stack+0x3c/0x68 [ 32.942829] kasan_save_track+0x20/0x40 [ 32.942980] kasan_save_free_info+0x4c/0x78 [ 32.943142] __kasan_slab_free+0x6c/0x98 [ 32.943240] kfree+0x214/0x3c8 [ 32.943335] kasan_strings+0x24c/0xb00 [ 32.943517] kunit_try_run_case+0x170/0x3f0 [ 32.943702] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.943922] kthread+0x328/0x630 [ 32.944051] ret_from_fork+0x10/0x20 [ 32.944329] [ 32.944384] The buggy address belongs to the object at fff00000c64fae40 [ 32.944384] which belongs to the cache kmalloc-32 of size 32 [ 32.944732] The buggy address is located 16 bytes inside of [ 32.944732] freed 32-byte region [fff00000c64fae40, fff00000c64fae60) [ 32.944979] [ 32.945014] The buggy address belongs to the physical page: [ 32.945344] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064fa [ 32.945633] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.945866] page_type: f5(slab) [ 32.945954] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 32.946006] raw: 0000000000000000 0000000000400040 00000000f5000000 0000000000000000 [ 32.946049] page dumped because: kasan: bad access detected [ 32.946084] [ 32.946291] Memory state around the buggy address: [ 32.946659] fff00000c64fad00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 32.946828] fff00000c64fad80: 00 00 00 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 32.946903] >fff00000c64fae00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 32.947129] ^ [ 32.947315] fff00000c64fae80: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 32.947490] fff00000c64faf00: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 32.947585] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[ 32.916099] ================================================================== [ 32.916410] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 32.916611] Read of size 1 at addr fff00000c64fac98 by task kunit_try_catch/289 [ 32.916717] [ 32.916792] CPU: 1 UID: 0 PID: 289 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 32.917055] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.917250] Hardware name: linux,dummy-virt (DT) [ 32.917295] Call trace: [ 32.917323] show_stack+0x20/0x38 (C) [ 32.917456] dump_stack_lvl+0x8c/0xd0 [ 32.917508] print_report+0x118/0x5d0 [ 32.917562] kasan_report+0xdc/0x128 [ 32.917609] __asan_report_load1_noabort+0x20/0x30 [ 32.917784] memcmp+0x198/0x1d8 [ 32.917829] kasan_memcmp+0x16c/0x300 [ 32.917884] kunit_try_run_case+0x170/0x3f0 [ 32.918102] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.918290] kthread+0x328/0x630 [ 32.918344] ret_from_fork+0x10/0x20 [ 32.918662] [ 32.918852] Allocated by task 289: [ 32.918993] kasan_save_stack+0x3c/0x68 [ 32.919177] kasan_save_track+0x20/0x40 [ 32.919261] kasan_save_alloc_info+0x40/0x58 [ 32.919345] __kasan_kmalloc+0xd4/0xd8 [ 32.919641] __kmalloc_cache_noprof+0x16c/0x3c0 [ 32.919891] kasan_memcmp+0xbc/0x300 [ 32.920078] kunit_try_run_case+0x170/0x3f0 [ 32.920175] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.920457] kthread+0x328/0x630 [ 32.920644] ret_from_fork+0x10/0x20 [ 32.920782] [ 32.920864] The buggy address belongs to the object at fff00000c64fac80 [ 32.920864] which belongs to the cache kmalloc-32 of size 32 [ 32.921037] The buggy address is located 0 bytes to the right of [ 32.921037] allocated 24-byte region [fff00000c64fac80, fff00000c64fac98) [ 32.921110] [ 32.921132] The buggy address belongs to the physical page: [ 32.921429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064fa [ 32.922233] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.922325] page_type: f5(slab) [ 32.922382] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 32.922447] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 32.922509] page dumped because: kasan: bad access detected [ 32.922550] [ 32.922571] Memory state around the buggy address: [ 32.922627] fff00000c64fab80: 00 00 00 04 fc fc fc fc 00 00 07 fc fc fc fc fc [ 32.922706] fff00000c64fac00: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 32.922761] >fff00000c64fac80: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.922802] ^ [ 32.922835] fff00000c64fad00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.922899] fff00000c64fad80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.922939] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[ 32.891384] ================================================================== [ 32.891480] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340 [ 32.891552] Read of size 1 at addr ffff800080b67b4a by task kunit_try_catch/285 [ 32.891614] [ 32.891655] CPU: 1 UID: 0 PID: 285 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 32.891745] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.891773] Hardware name: linux,dummy-virt (DT) [ 32.891806] Call trace: [ 32.891833] show_stack+0x20/0x38 (C) [ 32.891885] dump_stack_lvl+0x8c/0xd0 [ 32.891936] print_report+0x310/0x5d0 [ 32.891987] kasan_report+0xdc/0x128 [ 32.892033] __asan_report_load1_noabort+0x20/0x30 [ 32.892085] kasan_alloca_oob_right+0x2dc/0x340 [ 32.892143] kunit_try_run_case+0x170/0x3f0 [ 32.892194] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.892249] kthread+0x328/0x630 [ 32.892293] ret_from_fork+0x10/0x20 [ 32.892345] [ 32.892369] The buggy address belongs to stack of task kunit_try_catch/285 [ 32.892422] [ 32.893030] The buggy address ffff800080b67b4a belongs to a vmalloc virtual mapping [ 32.893093] The buggy address belongs to the physical page: [ 32.893131] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106534 [ 32.893211] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.893282] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 32.893333] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.893589] page dumped because: kasan: bad access detected [ 32.893640] [ 32.893827] Memory state around the buggy address: [ 32.893899] ffff800080b67a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.894097] ffff800080b67a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.894330] >ffff800080b67b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 32.894482] ^ [ 32.894569] ffff800080b67b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 32.894695] ffff800080b67c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 32.894737] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[ 32.872318] ================================================================== [ 32.872396] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 32.873590] Read of size 1 at addr ffff800080b67b5f by task kunit_try_catch/283 [ 32.873708] [ 32.873855] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 32.874000] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.874102] Hardware name: linux,dummy-virt (DT) [ 32.874138] Call trace: [ 32.874162] show_stack+0x20/0x38 (C) [ 32.874226] dump_stack_lvl+0x8c/0xd0 [ 32.874584] print_report+0x310/0x5d0 [ 32.874721] kasan_report+0xdc/0x128 [ 32.874794] __asan_report_load1_noabort+0x20/0x30 [ 32.874914] kasan_alloca_oob_left+0x2b8/0x310 [ 32.875009] kunit_try_run_case+0x170/0x3f0 [ 32.875173] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.875251] kthread+0x328/0x630 [ 32.875679] ret_from_fork+0x10/0x20 [ 32.875850] [ 32.875908] The buggy address belongs to stack of task kunit_try_catch/283 [ 32.876074] [ 32.876153] The buggy address ffff800080b67b5f belongs to a vmalloc virtual mapping [ 32.876219] The buggy address belongs to the physical page: [ 32.876255] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106534 [ 32.876668] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.876871] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 32.877243] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.877599] page dumped because: kasan: bad access detected [ 32.877775] [ 32.877859] Memory state around the buggy address: [ 32.877933] ffff800080b67a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.877996] ffff800080b67a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.878043] >ffff800080b67b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 32.878369] ^ [ 32.878536] ffff800080b67b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 32.878631] ffff800080b67c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 32.878785] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 32.857521] ================================================================== [ 32.857649] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 32.858082] Read of size 1 at addr ffff800080b67c2a by task kunit_try_catch/281 [ 32.858195] [ 32.858264] CPU: 1 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 32.858379] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.858423] Hardware name: linux,dummy-virt (DT) [ 32.858474] Call trace: [ 32.858501] show_stack+0x20/0x38 (C) [ 32.858558] dump_stack_lvl+0x8c/0xd0 [ 32.858830] print_report+0x310/0x5d0 [ 32.858996] kasan_report+0xdc/0x128 [ 32.859127] __asan_report_load1_noabort+0x20/0x30 [ 32.859232] kasan_stack_oob+0x238/0x270 [ 32.859376] kunit_try_run_case+0x170/0x3f0 [ 32.859541] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.859600] kthread+0x328/0x630 [ 32.859882] ret_from_fork+0x10/0x20 [ 32.859984] [ 32.860357] The buggy address belongs to stack of task kunit_try_catch/281 [ 32.860751] and is located at offset 138 in frame: [ 32.860827] kasan_stack_oob+0x0/0x270 [ 32.861236] [ 32.861359] This frame has 4 objects: [ 32.861736] [48, 49) '__assertion' [ 32.861784] [64, 72) 'array' [ 32.861825] [96, 112) '__assertion' [ 32.861867] [128, 138) 'stack_array' [ 32.862252] [ 32.862287] The buggy address ffff800080b67c2a belongs to a vmalloc virtual mapping [ 32.862672] The buggy address belongs to the physical page: [ 32.862718] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106534 [ 32.862846] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.863018] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 32.863157] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.863232] page dumped because: kasan: bad access detected [ 32.863335] [ 32.863431] Memory state around the buggy address: [ 32.863529] ffff800080b67b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.863654] ffff800080b67b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 32.863725] >ffff800080b67c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 32.863976] ^ [ 32.864052] ffff800080b67c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 [ 32.864122] ffff800080b67d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 32.864230] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 32.837839] ================================================================== [ 32.838133] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 32.838211] Read of size 1 at addr ffff95f54f55870d by task kunit_try_catch/277 [ 32.838262] [ 32.838321] CPU: 1 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 32.838481] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.838560] Hardware name: linux,dummy-virt (DT) [ 32.838839] Call trace: [ 32.839013] show_stack+0x20/0x38 (C) [ 32.839171] dump_stack_lvl+0x8c/0xd0 [ 32.839279] print_report+0x310/0x5d0 [ 32.839416] kasan_report+0xdc/0x128 [ 32.839489] __asan_report_load1_noabort+0x20/0x30 [ 32.839670] kasan_global_oob_right+0x230/0x270 [ 32.839794] kunit_try_run_case+0x170/0x3f0 [ 32.839920] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.840018] kthread+0x328/0x630 [ 32.840166] ret_from_fork+0x10/0x20 [ 32.840298] [ 32.840584] The buggy address belongs to the variable: [ 32.840624] global_array+0xd/0x40 [ 32.840703] [ 32.841118] The buggy address ffff95f54f55870d belongs to a vmalloc virtual mapping [ 32.841388] The buggy address belongs to the physical page: [ 32.841506] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x47d58 [ 32.841661] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 32.841855] raw: 03fffe0000002000 ffffc1ffc01f5608 ffffc1ffc01f5608 0000000000000000 [ 32.841976] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.842159] page dumped because: kasan: bad access detected [ 32.842262] [ 32.842323] Memory state around the buggy address: [ 32.842474] ffff95f54f558600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.842560] ffff95f54f558680: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9 [ 32.842691] >ffff95f54f558700: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 [ 32.842869] ^ [ 32.842904] ffff95f54f558780: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 [ 32.842956] ffff95f54f558800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.843196] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 32.808875] ================================================================== [ 32.808958] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 32.809034] Free of addr fff00000c64f9101 by task kunit_try_catch/273 [ 32.809077] [ 32.809117] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 32.809203] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.809231] Hardware name: linux,dummy-virt (DT) [ 32.809263] Call trace: [ 32.809287] show_stack+0x20/0x38 (C) [ 32.809337] dump_stack_lvl+0x8c/0xd0 [ 32.809388] print_report+0x118/0x5d0 [ 32.809433] kasan_report_invalid_free+0xc0/0xe8 [ 32.809541] check_slab_allocation+0xfc/0x108 [ 32.809605] __kasan_mempool_poison_object+0x78/0x150 [ 32.809687] mempool_free+0x28c/0x328 [ 32.809746] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 32.809810] mempool_kmalloc_invalid_free+0xc0/0x118 [ 32.809870] kunit_try_run_case+0x170/0x3f0 [ 32.809921] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.809983] kthread+0x328/0x630 [ 32.810027] ret_from_fork+0x10/0x20 [ 32.810078] [ 32.810096] Allocated by task 273: [ 32.810126] kasan_save_stack+0x3c/0x68 [ 32.810179] kasan_save_track+0x20/0x40 [ 32.810217] kasan_save_alloc_info+0x40/0x58 [ 32.810256] __kasan_mempool_unpoison_object+0x11c/0x180 [ 32.810332] remove_element+0x130/0x1f8 [ 32.810791] mempool_alloc_preallocated+0x58/0xc0 [ 32.811260] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 32.811809] mempool_kmalloc_invalid_free+0xc0/0x118 [ 32.812390] kunit_try_run_case+0x170/0x3f0 [ 32.812520] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.812661] kthread+0x328/0x630 [ 32.812696] ret_from_fork+0x10/0x20 [ 32.813007] [ 32.813091] The buggy address belongs to the object at fff00000c64f9100 [ 32.813091] which belongs to the cache kmalloc-128 of size 128 [ 32.813170] The buggy address is located 1 bytes inside of [ 32.813170] 128-byte region [fff00000c64f9100, fff00000c64f9180) [ 32.813229] [ 32.813250] The buggy address belongs to the physical page: [ 32.813551] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f9 [ 32.813694] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.813762] page_type: f5(slab) [ 32.813880] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 32.813991] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.814071] page dumped because: kasan: bad access detected [ 32.814202] [ 32.814244] Memory state around the buggy address: [ 32.814433] fff00000c64f9000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.814496] fff00000c64f9080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.814539] >fff00000c64f9100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.814584] ^ [ 32.814706] fff00000c64f9180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.814785] fff00000c64f9200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.814975] ================================================================== [ 32.826277] ================================================================== [ 32.826347] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 32.826521] Free of addr fff00000c9b2c001 by task kunit_try_catch/275 [ 32.826599] [ 32.826685] CPU: 1 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 32.826773] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.826866] Hardware name: linux,dummy-virt (DT) [ 32.826945] Call trace: [ 32.827056] show_stack+0x20/0x38 (C) [ 32.827221] dump_stack_lvl+0x8c/0xd0 [ 32.827329] print_report+0x118/0x5d0 [ 32.827475] kasan_report_invalid_free+0xc0/0xe8 [ 32.827561] __kasan_mempool_poison_object+0xfc/0x150 [ 32.827766] mempool_free+0x28c/0x328 [ 32.828025] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 32.828106] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 32.828302] kunit_try_run_case+0x170/0x3f0 [ 32.828394] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.828544] kthread+0x328/0x630 [ 32.828691] ret_from_fork+0x10/0x20 [ 32.828796] [ 32.828905] The buggy address belongs to the physical page: [ 32.829045] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b2c [ 32.829137] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.829226] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.829316] page_type: f8(unknown) [ 32.829419] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.829481] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.829565] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.829732] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.829831] head: 0bfffe0000000002 ffffc1ffc326cb01 00000000ffffffff 00000000ffffffff [ 32.829920] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.830016] page dumped because: kasan: bad access detected [ 32.830074] [ 32.830136] Memory state around the buggy address: [ 32.830174] fff00000c9b2bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.830250] fff00000c9b2bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.830549] >fff00000c9b2c000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.830693] ^ [ 32.830770] fff00000c9b2c080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.830877] fff00000c9b2c100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.830951] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 32.740742] ================================================================== [ 32.740808] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 32.740870] Free of addr fff00000c9b28000 by task kunit_try_catch/269 [ 32.740914] [ 32.740948] CPU: 1 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 32.741169] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.741254] Hardware name: linux,dummy-virt (DT) [ 32.741287] Call trace: [ 32.741311] show_stack+0x20/0x38 (C) [ 32.741982] dump_stack_lvl+0x8c/0xd0 [ 32.742178] print_report+0x118/0x5d0 [ 32.742227] kasan_report_invalid_free+0xc0/0xe8 [ 32.742622] __kasan_mempool_poison_object+0x14c/0x150 [ 32.742714] mempool_free+0x28c/0x328 [ 32.742890] mempool_double_free_helper+0x150/0x2e8 [ 32.743098] mempool_kmalloc_large_double_free+0xc0/0x118 [ 32.743195] kunit_try_run_case+0x170/0x3f0 [ 32.743267] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.743427] kthread+0x328/0x630 [ 32.743482] ret_from_fork+0x10/0x20 [ 32.743530] [ 32.743799] The buggy address belongs to the physical page: [ 32.743869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b28 [ 32.744183] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.744240] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.744295] page_type: f8(unknown) [ 32.744336] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.744646] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.744874] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.744926] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.744975] head: 0bfffe0000000002 ffffc1ffc326ca01 00000000ffffffff 00000000ffffffff [ 32.745057] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.745105] page dumped because: kasan: bad access detected [ 32.745342] [ 32.745577] Memory state around the buggy address: [ 32.745660] fff00000c9b27f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.745704] fff00000c9b27f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.745746] >fff00000c9b28000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.745785] ^ [ 32.745837] fff00000c9b28080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.745881] fff00000c9b28100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.745921] ================================================================== [ 32.780127] ================================================================== [ 32.780204] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 32.780367] Free of addr fff00000c9b2c000 by task kunit_try_catch/271 [ 32.782153] [ 32.782292] CPU: 1 UID: 0 PID: 271 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 32.783516] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.783554] Hardware name: linux,dummy-virt (DT) [ 32.783692] Call trace: [ 32.784149] show_stack+0x20/0x38 (C) [ 32.784565] dump_stack_lvl+0x8c/0xd0 [ 32.784815] print_report+0x118/0x5d0 [ 32.784898] kasan_report_invalid_free+0xc0/0xe8 [ 32.785305] __kasan_mempool_poison_pages+0xe0/0xe8 [ 32.785397] mempool_free+0x24c/0x328 [ 32.786517] mempool_double_free_helper+0x150/0x2e8 [ 32.786993] mempool_page_alloc_double_free+0xbc/0x118 [ 32.787318] kunit_try_run_case+0x170/0x3f0 [ 32.787432] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.787498] kthread+0x328/0x630 [ 32.787544] ret_from_fork+0x10/0x20 [ 32.787596] [ 32.788353] The buggy address belongs to the physical page: [ 32.788835] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b2c [ 32.789188] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.789543] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 32.789594] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.790503] page dumped because: kasan: bad access detected [ 32.791243] [ 32.791308] Memory state around the buggy address: [ 32.791344] fff00000c9b2bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.791848] fff00000c9b2bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.792083] >fff00000c9b2c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.792925] ^ [ 32.793142] fff00000c9b2c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.793270] fff00000c9b2c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.793557] ================================================================== [ 32.722882] ================================================================== [ 32.723257] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 32.723478] Free of addr fff00000c9147e00 by task kunit_try_catch/267 [ 32.723591] [ 32.723624] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 32.723708] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.723733] Hardware name: linux,dummy-virt (DT) [ 32.723788] Call trace: [ 32.723917] show_stack+0x20/0x38 (C) [ 32.723977] dump_stack_lvl+0x8c/0xd0 [ 32.724026] print_report+0x118/0x5d0 [ 32.724070] kasan_report_invalid_free+0xc0/0xe8 [ 32.724119] check_slab_allocation+0xd4/0x108 [ 32.724172] __kasan_mempool_poison_object+0x78/0x150 [ 32.724314] mempool_free+0x28c/0x328 [ 32.724848] mempool_double_free_helper+0x150/0x2e8 [ 32.724990] mempool_kmalloc_double_free+0xc0/0x118 [ 32.725345] kunit_try_run_case+0x170/0x3f0 [ 32.725401] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.725465] kthread+0x328/0x630 [ 32.725510] ret_from_fork+0x10/0x20 [ 32.725971] [ 32.726218] Allocated by task 267: [ 32.726359] kasan_save_stack+0x3c/0x68 [ 32.726406] kasan_save_track+0x20/0x40 [ 32.726459] kasan_save_alloc_info+0x40/0x58 [ 32.726615] __kasan_mempool_unpoison_object+0x11c/0x180 [ 32.726805] remove_element+0x130/0x1f8 [ 32.726848] mempool_alloc_preallocated+0x58/0xc0 [ 32.726909] mempool_double_free_helper+0x94/0x2e8 [ 32.727012] mempool_kmalloc_double_free+0xc0/0x118 [ 32.727055] kunit_try_run_case+0x170/0x3f0 [ 32.727091] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.727139] kthread+0x328/0x630 [ 32.727184] ret_from_fork+0x10/0x20 [ 32.727243] [ 32.727262] Freed by task 267: [ 32.727589] kasan_save_stack+0x3c/0x68 [ 32.727639] kasan_save_track+0x20/0x40 [ 32.727961] kasan_save_free_info+0x4c/0x78 [ 32.728143] __kasan_mempool_poison_object+0xc0/0x150 [ 32.728197] mempool_free+0x28c/0x328 [ 32.728232] mempool_double_free_helper+0x100/0x2e8 [ 32.728301] mempool_kmalloc_double_free+0xc0/0x118 [ 32.728383] kunit_try_run_case+0x170/0x3f0 [ 32.728447] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.728490] kthread+0x328/0x630 [ 32.728522] ret_from_fork+0x10/0x20 [ 32.728560] [ 32.728580] The buggy address belongs to the object at fff00000c9147e00 [ 32.728580] which belongs to the cache kmalloc-128 of size 128 [ 32.728642] The buggy address is located 0 bytes inside of [ 32.728642] 128-byte region [fff00000c9147e00, fff00000c9147e80) [ 32.728711] [ 32.728733] The buggy address belongs to the physical page: [ 32.728766] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109147 [ 32.729230] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.729285] page_type: f5(slab) [ 32.729326] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 32.729682] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.729797] page dumped because: kasan: bad access detected [ 32.729887] [ 32.729911] Memory state around the buggy address: [ 32.729945] fff00000c9147d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.729988] fff00000c9147d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.730029] >fff00000c9147e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.730170] ^ [ 32.730204] fff00000c9147e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.730366] fff00000c9147f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.730473] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 32.649604] ================================================================== [ 32.649665] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 32.649725] Read of size 1 at addr fff00000c6398000 by task kunit_try_catch/261 [ 32.649774] [ 32.649811] CPU: 1 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 32.649898] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.649925] Hardware name: linux,dummy-virt (DT) [ 32.649958] Call trace: [ 32.649983] show_stack+0x20/0x38 (C) [ 32.650041] dump_stack_lvl+0x8c/0xd0 [ 32.650283] print_report+0x118/0x5d0 [ 32.650413] kasan_report+0xdc/0x128 [ 32.650465] __asan_report_load1_noabort+0x20/0x30 [ 32.650514] mempool_uaf_helper+0x314/0x340 [ 32.650560] mempool_kmalloc_large_uaf+0xc4/0x120 [ 32.650608] kunit_try_run_case+0x170/0x3f0 [ 32.650787] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.651113] kthread+0x328/0x630 [ 32.651215] ret_from_fork+0x10/0x20 [ 32.651569] [ 32.651592] The buggy address belongs to the physical page: [ 32.651626] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106398 [ 32.651792] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.651848] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.651903] page_type: f8(unknown) [ 32.651944] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.652135] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.652185] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.652412] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.652473] head: 0bfffe0000000002 ffffc1ffc318e601 00000000ffffffff 00000000ffffffff [ 32.652550] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.652605] page dumped because: kasan: bad access detected [ 32.652726] [ 32.652745] Memory state around the buggy address: [ 32.652777] fff00000c6397f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.652819] fff00000c6397f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.652902] >fff00000c6398000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.653452] ^ [ 32.653582] fff00000c6398080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.653761] fff00000c6398100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.653803] ================================================================== [ 32.713571] ================================================================== [ 32.713664] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 32.714338] Read of size 1 at addr fff00000c9b28000 by task kunit_try_catch/265 [ 32.714431] [ 32.714539] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 32.714845] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.714876] Hardware name: linux,dummy-virt (DT) [ 32.714910] Call trace: [ 32.714937] show_stack+0x20/0x38 (C) [ 32.715091] dump_stack_lvl+0x8c/0xd0 [ 32.715157] print_report+0x118/0x5d0 [ 32.715202] kasan_report+0xdc/0x128 [ 32.715255] __asan_report_load1_noabort+0x20/0x30 [ 32.715466] mempool_uaf_helper+0x314/0x340 [ 32.715532] mempool_page_alloc_uaf+0xc0/0x118 [ 32.715602] kunit_try_run_case+0x170/0x3f0 [ 32.715653] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.715846] kthread+0x328/0x630 [ 32.715902] ret_from_fork+0x10/0x20 [ 32.715950] [ 32.715972] The buggy address belongs to the physical page: [ 32.716248] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b28 [ 32.716353] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.716495] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 32.716625] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 32.716710] page dumped because: kasan: bad access detected [ 32.716853] [ 32.716871] Memory state around the buggy address: [ 32.716964] fff00000c9b27f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.717044] fff00000c9b27f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.717134] >fff00000c9b28000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.717185] ^ [ 32.717249] fff00000c9b28080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.717407] fff00000c9b28100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 32.717477] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 32.669263] ================================================================== [ 32.669487] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 32.669649] Read of size 1 at addr fff00000c64c4240 by task kunit_try_catch/263 [ 32.669699] [ 32.669858] CPU: 1 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 32.669994] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.670053] Hardware name: linux,dummy-virt (DT) [ 32.670169] Call trace: [ 32.670252] show_stack+0x20/0x38 (C) [ 32.670365] dump_stack_lvl+0x8c/0xd0 [ 32.670561] print_report+0x118/0x5d0 [ 32.670607] kasan_report+0xdc/0x128 [ 32.670657] __asan_report_load1_noabort+0x20/0x30 [ 32.670964] mempool_uaf_helper+0x314/0x340 [ 32.671032] mempool_slab_uaf+0xc0/0x118 [ 32.671363] kunit_try_run_case+0x170/0x3f0 [ 32.671579] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.671749] kthread+0x328/0x630 [ 32.671821] ret_from_fork+0x10/0x20 [ 32.671879] [ 32.671963] Allocated by task 263: [ 32.672016] kasan_save_stack+0x3c/0x68 [ 32.672077] kasan_save_track+0x20/0x40 [ 32.672118] kasan_save_alloc_info+0x40/0x58 [ 32.672157] __kasan_mempool_unpoison_object+0xbc/0x180 [ 32.672199] remove_element+0x16c/0x1f8 [ 32.672277] mempool_alloc_preallocated+0x58/0xc0 [ 32.672351] mempool_uaf_helper+0xa4/0x340 [ 32.672512] mempool_slab_uaf+0xc0/0x118 [ 32.672554] kunit_try_run_case+0x170/0x3f0 [ 32.672596] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.672693] kthread+0x328/0x630 [ 32.672798] ret_from_fork+0x10/0x20 [ 32.672880] [ 32.672946] Freed by task 263: [ 32.673018] kasan_save_stack+0x3c/0x68 [ 32.673058] kasan_save_track+0x20/0x40 [ 32.673099] kasan_save_free_info+0x4c/0x78 [ 32.673138] __kasan_mempool_poison_object+0xc0/0x150 [ 32.673267] mempool_free+0x28c/0x328 [ 32.673305] mempool_uaf_helper+0x104/0x340 [ 32.673342] mempool_slab_uaf+0xc0/0x118 [ 32.673380] kunit_try_run_case+0x170/0x3f0 [ 32.673429] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.673482] kthread+0x328/0x630 [ 32.673514] ret_from_fork+0x10/0x20 [ 32.673974] [ 32.674006] The buggy address belongs to the object at fff00000c64c4240 [ 32.674006] which belongs to the cache test_cache of size 123 [ 32.674080] The buggy address is located 0 bytes inside of [ 32.674080] freed 123-byte region [fff00000c64c4240, fff00000c64c42bb) [ 32.674292] [ 32.674383] The buggy address belongs to the physical page: [ 32.674416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064c4 [ 32.674482] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.674534] page_type: f5(slab) [ 32.674578] raw: 0bfffe0000000000 fff00000c650c140 dead000000000122 0000000000000000 [ 32.674626] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 32.674666] page dumped because: kasan: bad access detected [ 32.674697] [ 32.674714] Memory state around the buggy address: [ 32.674748] fff00000c64c4100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.674991] fff00000c64c4180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.675047] >fff00000c64c4200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 32.675477] ^ [ 32.675657] fff00000c64c4280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.675701] fff00000c64c4300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.675739] ================================================================== [ 32.633815] ================================================================== [ 32.633907] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 32.633976] Read of size 1 at addr fff00000c9147a00 by task kunit_try_catch/259 [ 32.634025] [ 32.634066] CPU: 1 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 32.634154] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.634549] Hardware name: linux,dummy-virt (DT) [ 32.634676] Call trace: [ 32.634703] show_stack+0x20/0x38 (C) [ 32.634757] dump_stack_lvl+0x8c/0xd0 [ 32.635096] print_report+0x118/0x5d0 [ 32.635249] kasan_report+0xdc/0x128 [ 32.635294] __asan_report_load1_noabort+0x20/0x30 [ 32.635345] mempool_uaf_helper+0x314/0x340 [ 32.635471] mempool_kmalloc_uaf+0xc4/0x120 [ 32.635518] kunit_try_run_case+0x170/0x3f0 [ 32.635570] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.635642] kthread+0x328/0x630 [ 32.635693] ret_from_fork+0x10/0x20 [ 32.635874] [ 32.635893] Allocated by task 259: [ 32.635929] kasan_save_stack+0x3c/0x68 [ 32.635986] kasan_save_track+0x20/0x40 [ 32.636167] kasan_save_alloc_info+0x40/0x58 [ 32.636255] __kasan_mempool_unpoison_object+0x11c/0x180 [ 32.636298] remove_element+0x130/0x1f8 [ 32.636336] mempool_alloc_preallocated+0x58/0xc0 [ 32.636383] mempool_uaf_helper+0xa4/0x340 [ 32.636470] mempool_kmalloc_uaf+0xc4/0x120 [ 32.636507] kunit_try_run_case+0x170/0x3f0 [ 32.636544] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.636587] kthread+0x328/0x630 [ 32.636620] ret_from_fork+0x10/0x20 [ 32.636655] [ 32.636675] Freed by task 259: [ 32.636700] kasan_save_stack+0x3c/0x68 [ 32.636738] kasan_save_track+0x20/0x40 [ 32.637278] kasan_save_free_info+0x4c/0x78 [ 32.637548] __kasan_mempool_poison_object+0xc0/0x150 [ 32.637753] mempool_free+0x28c/0x328 [ 32.637806] mempool_uaf_helper+0x104/0x340 [ 32.638030] mempool_kmalloc_uaf+0xc4/0x120 [ 32.638083] kunit_try_run_case+0x170/0x3f0 [ 32.638122] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.638163] kthread+0x328/0x630 [ 32.638197] ret_from_fork+0x10/0x20 [ 32.638233] [ 32.638255] The buggy address belongs to the object at fff00000c9147a00 [ 32.638255] which belongs to the cache kmalloc-128 of size 128 [ 32.638317] The buggy address is located 0 bytes inside of [ 32.638317] freed 128-byte region [fff00000c9147a00, fff00000c9147a80) [ 32.638377] [ 32.638400] The buggy address belongs to the physical page: [ 32.638447] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109147 [ 32.638502] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.638553] page_type: f5(slab) [ 32.638593] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 32.638641] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.638681] page dumped because: kasan: bad access detected [ 32.638722] [ 32.638739] Memory state around the buggy address: [ 32.638773] fff00000c9147900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.639178] fff00000c9147980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.639417] >fff00000c9147a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.639469] ^ [ 32.639534] fff00000c9147a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.639576] fff00000c9147b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.639680] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 32.559482] ================================================================== [ 32.559558] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 32.559636] Read of size 1 at addr fff00000c9147673 by task kunit_try_catch/253 [ 32.559685] [ 32.559730] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 32.559819] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.559847] Hardware name: linux,dummy-virt (DT) [ 32.559883] Call trace: [ 32.559909] show_stack+0x20/0x38 (C) [ 32.559962] dump_stack_lvl+0x8c/0xd0 [ 32.560014] print_report+0x118/0x5d0 [ 32.560058] kasan_report+0xdc/0x128 [ 32.560101] __asan_report_load1_noabort+0x20/0x30 [ 32.560150] mempool_oob_right_helper+0x2ac/0x2f0 [ 32.560201] mempool_kmalloc_oob_right+0xc4/0x120 [ 32.560250] kunit_try_run_case+0x170/0x3f0 [ 32.560300] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.560359] kthread+0x328/0x630 [ 32.560402] ret_from_fork+0x10/0x20 [ 32.560465] [ 32.560483] Allocated by task 253: [ 32.560512] kasan_save_stack+0x3c/0x68 [ 32.560557] kasan_save_track+0x20/0x40 [ 32.560597] kasan_save_alloc_info+0x40/0x58 [ 32.560635] __kasan_mempool_unpoison_object+0x11c/0x180 [ 32.560679] remove_element+0x130/0x1f8 [ 32.560719] mempool_alloc_preallocated+0x58/0xc0 [ 32.560760] mempool_oob_right_helper+0x98/0x2f0 [ 32.560802] mempool_kmalloc_oob_right+0xc4/0x120 [ 32.560845] kunit_try_run_case+0x170/0x3f0 [ 32.560881] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.560924] kthread+0x328/0x630 [ 32.560958] ret_from_fork+0x10/0x20 [ 32.560994] [ 32.561015] The buggy address belongs to the object at fff00000c9147600 [ 32.561015] which belongs to the cache kmalloc-128 of size 128 [ 32.561076] The buggy address is located 0 bytes to the right of [ 32.561076] allocated 115-byte region [fff00000c9147600, fff00000c9147673) [ 32.561139] [ 32.561161] The buggy address belongs to the physical page: [ 32.561195] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109147 [ 32.561252] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.561305] page_type: f5(slab) [ 32.561350] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122 [ 32.561400] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 32.561450] page dumped because: kasan: bad access detected [ 32.561482] [ 32.561501] Memory state around the buggy address: [ 32.561535] fff00000c9147500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 32.561579] fff00000c9147580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.561623] >fff00000c9147600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.561682] ^ [ 32.561744] fff00000c9147680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.561787] fff00000c9147700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 32.561825] ================================================================== [ 32.596888] ================================================================== [ 32.596976] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 32.597046] Read of size 1 at addr fff00000c650a1fb by task kunit_try_catch/257 [ 32.597096] [ 32.597135] CPU: 1 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 32.597224] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.597258] Hardware name: linux,dummy-virt (DT) [ 32.597404] Call trace: [ 32.597452] show_stack+0x20/0x38 (C) [ 32.597614] dump_stack_lvl+0x8c/0xd0 [ 32.597678] print_report+0x118/0x5d0 [ 32.598018] kasan_report+0xdc/0x128 [ 32.598244] __asan_report_load1_noabort+0x20/0x30 [ 32.598300] mempool_oob_right_helper+0x2ac/0x2f0 [ 32.598352] mempool_slab_oob_right+0xc0/0x118 [ 32.598452] kunit_try_run_case+0x170/0x3f0 [ 32.598507] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.598563] kthread+0x328/0x630 [ 32.598806] ret_from_fork+0x10/0x20 [ 32.598914] [ 32.598962] Allocated by task 257: [ 32.598991] kasan_save_stack+0x3c/0x68 [ 32.599038] kasan_save_track+0x20/0x40 [ 32.599428] kasan_save_alloc_info+0x40/0x58 [ 32.599481] __kasan_mempool_unpoison_object+0xbc/0x180 [ 32.599621] remove_element+0x16c/0x1f8 [ 32.599768] mempool_alloc_preallocated+0x58/0xc0 [ 32.599848] mempool_oob_right_helper+0x98/0x2f0 [ 32.599948] mempool_slab_oob_right+0xc0/0x118 [ 32.600004] kunit_try_run_case+0x170/0x3f0 [ 32.600042] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.600087] kthread+0x328/0x630 [ 32.600119] ret_from_fork+0x10/0x20 [ 32.600157] [ 32.600190] The buggy address belongs to the object at fff00000c650a180 [ 32.600190] which belongs to the cache test_cache of size 123 [ 32.600421] The buggy address is located 0 bytes to the right of [ 32.600421] allocated 123-byte region [fff00000c650a180, fff00000c650a1fb) [ 32.600563] [ 32.600587] The buggy address belongs to the physical page: [ 32.600666] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10650a [ 32.601036] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 32.601111] page_type: f5(slab) [ 32.601154] raw: 0bfffe0000000000 fff00000c650c000 dead000000000122 0000000000000000 [ 32.601203] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 32.601244] page dumped because: kasan: bad access detected [ 32.601275] [ 32.601293] Memory state around the buggy address: [ 32.601585] fff00000c650a080: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 32.601730] fff00000c650a100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.601971] >fff00000c650a180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 [ 32.602170] ^ [ 32.602249] fff00000c650a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.602368] fff00000c650a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.602408] ================================================================== [ 32.567455] ================================================================== [ 32.567512] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 32.567567] Read of size 1 at addr fff00000c639a001 by task kunit_try_catch/255 [ 32.567617] [ 32.567648] CPU: 1 UID: 0 PID: 255 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 32.567729] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.567756] Hardware name: linux,dummy-virt (DT) [ 32.567785] Call trace: [ 32.567809] show_stack+0x20/0x38 (C) [ 32.567856] dump_stack_lvl+0x8c/0xd0 [ 32.567902] print_report+0x118/0x5d0 [ 32.567946] kasan_report+0xdc/0x128 [ 32.567988] __asan_report_load1_noabort+0x20/0x30 [ 32.568037] mempool_oob_right_helper+0x2ac/0x2f0 [ 32.568087] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 32.568138] kunit_try_run_case+0x170/0x3f0 [ 32.568184] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 32.568236] kthread+0x328/0x630 [ 32.568278] ret_from_fork+0x10/0x20 [ 32.568326] [ 32.568345] The buggy address belongs to the physical page: [ 32.568377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106398 [ 32.568431] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 32.568491] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 32.568543] page_type: f8(unknown) [ 32.568582] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.568687] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.568737] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 32.568784] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 32.568834] head: 0bfffe0000000002 ffffc1ffc318e601 00000000ffffffff 00000000ffffffff [ 32.568879] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 32.568919] page dumped because: kasan: bad access detected [ 32.568951] [ 32.568970] Memory state around the buggy address: [ 32.569001] fff00000c6399f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.569042] fff00000c6399f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 32.569084] >fff00000c639a000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.569122] ^ [ 32.569149] fff00000c639a080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.569190] fff00000c639a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 32.569229] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 31.996247] ================================================================== [ 31.996333] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300 [ 31.996410] Read of size 1 at addr fff00000c5c5cc80 by task kunit_try_catch/247 [ 31.996475] [ 31.996516] CPU: 0 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 31.996605] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.996631] Hardware name: linux,dummy-virt (DT) [ 31.996665] Call trace: [ 31.996689] show_stack+0x20/0x38 (C) [ 31.996741] dump_stack_lvl+0x8c/0xd0 [ 31.996793] print_report+0x118/0x5d0 [ 31.996839] kasan_report+0xdc/0x128 [ 31.996884] __kasan_check_byte+0x54/0x70 [ 31.996929] kmem_cache_destroy+0x34/0x218 [ 31.996979] kmem_cache_double_destroy+0x174/0x300 [ 31.997032] kunit_try_run_case+0x170/0x3f0 [ 31.997080] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.997133] kthread+0x328/0x630 [ 31.997179] ret_from_fork+0x10/0x20 [ 31.997228] [ 31.997247] Allocated by task 247: [ 31.997277] kasan_save_stack+0x3c/0x68 [ 31.997320] kasan_save_track+0x20/0x40 [ 31.997360] kasan_save_alloc_info+0x40/0x58 [ 31.997399] __kasan_slab_alloc+0xa8/0xb0 [ 31.997444] kmem_cache_alloc_noprof+0x10c/0x398 [ 31.997488] __kmem_cache_create_args+0x178/0x280 [ 31.997528] kmem_cache_double_destroy+0xc0/0x300 [ 31.997570] kunit_try_run_case+0x170/0x3f0 [ 31.997606] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.997653] kthread+0x328/0x630 [ 31.997687] ret_from_fork+0x10/0x20 [ 31.997723] [ 31.997742] Freed by task 247: [ 31.997769] kasan_save_stack+0x3c/0x68 [ 31.997807] kasan_save_track+0x20/0x40 [ 31.997847] kasan_save_free_info+0x4c/0x78 [ 31.997886] __kasan_slab_free+0x6c/0x98 [ 31.997924] kmem_cache_free+0x260/0x468 [ 31.997961] slab_kmem_cache_release+0x38/0x50 [ 31.998003] kmem_cache_release+0x1c/0x30 [ 31.998042] kobject_put+0x17c/0x420 [ 31.998079] sysfs_slab_release+0x1c/0x30 [ 31.998119] kmem_cache_destroy+0x118/0x218 [ 31.998160] kmem_cache_double_destroy+0x128/0x300 [ 31.998202] kunit_try_run_case+0x170/0x3f0 [ 31.998239] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.998282] kthread+0x328/0x630 [ 31.998314] ret_from_fork+0x10/0x20 [ 31.998351] [ 31.998371] The buggy address belongs to the object at fff00000c5c5cc80 [ 31.998371] which belongs to the cache kmem_cache of size 208 [ 31.998427] The buggy address is located 0 bytes inside of [ 31.998427] freed 208-byte region [fff00000c5c5cc80, fff00000c5c5cd50) [ 31.998501] [ 31.998522] The buggy address belongs to the physical page: [ 31.998557] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105c5c [ 31.998612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.998664] page_type: f5(slab) [ 31.998705] raw: 0bfffe0000000000 fff00000c0001000 dead000000000122 0000000000000000 [ 31.998755] raw: 0000000000000000 00000000800c000c 00000000f5000000 0000000000000000 [ 31.998795] page dumped because: kasan: bad access detected [ 31.998828] [ 31.998845] Memory state around the buggy address: [ 31.998878] fff00000c5c5cb80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.998920] fff00000c5c5cc00: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.998964] >fff00000c5c5cc80: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.999002] ^ [ 31.999028] fff00000c5c5cd00: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 31.999071] fff00000c5c5cd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.999115] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 31.858749] ================================================================== [ 31.858847] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468 [ 31.858932] Read of size 1 at addr fff00000c6525000 by task kunit_try_catch/245 [ 31.858982] [ 31.859027] CPU: 0 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 31.859121] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.859149] Hardware name: linux,dummy-virt (DT) [ 31.859181] Call trace: [ 31.859207] show_stack+0x20/0x38 (C) [ 31.859262] dump_stack_lvl+0x8c/0xd0 [ 31.859315] print_report+0x118/0x5d0 [ 31.859359] kasan_report+0xdc/0x128 [ 31.859403] __asan_report_load1_noabort+0x20/0x30 [ 31.859470] kmem_cache_rcu_uaf+0x388/0x468 [ 31.859522] kunit_try_run_case+0x170/0x3f0 [ 31.859574] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.859661] kthread+0x328/0x630 [ 31.859712] ret_from_fork+0x10/0x20 [ 31.859978] [ 31.859999] Allocated by task 245: [ 31.860030] kasan_save_stack+0x3c/0x68 [ 31.860077] kasan_save_track+0x20/0x40 [ 31.860116] kasan_save_alloc_info+0x40/0x58 [ 31.860155] __kasan_slab_alloc+0xa8/0xb0 [ 31.860191] kmem_cache_alloc_noprof+0x10c/0x398 [ 31.860261] kmem_cache_rcu_uaf+0x12c/0x468 [ 31.860302] kunit_try_run_case+0x170/0x3f0 [ 31.860340] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.860390] kthread+0x328/0x630 [ 31.860432] ret_from_fork+0x10/0x20 [ 31.860489] [ 31.860508] Freed by task 0: [ 31.860534] kasan_save_stack+0x3c/0x68 [ 31.860581] kasan_save_track+0x20/0x40 [ 31.860618] kasan_save_free_info+0x4c/0x78 [ 31.860656] __kasan_slab_free+0x6c/0x98 [ 31.860694] slab_free_after_rcu_debug+0xd4/0x2f8 [ 31.860744] rcu_core+0x9f4/0x1e20 [ 31.860782] rcu_core_si+0x18/0x30 [ 31.860815] handle_softirqs+0x374/0xb28 [ 31.860853] __do_softirq+0x1c/0x28 [ 31.860886] [ 31.860905] Last potentially related work creation: [ 31.860962] kasan_save_stack+0x3c/0x68 [ 31.861012] kasan_record_aux_stack+0xb4/0xc8 [ 31.861170] kmem_cache_free+0x120/0x468 [ 31.861207] kmem_cache_rcu_uaf+0x16c/0x468 [ 31.861253] kunit_try_run_case+0x170/0x3f0 [ 31.861430] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.861690] kthread+0x328/0x630 [ 31.861739] ret_from_fork+0x10/0x20 [ 31.861776] [ 31.861796] The buggy address belongs to the object at fff00000c6525000 [ 31.861796] which belongs to the cache test_cache of size 200 [ 31.861855] The buggy address is located 0 bytes inside of [ 31.861855] freed 200-byte region [fff00000c6525000, fff00000c65250c8) [ 31.861917] [ 31.861938] The buggy address belongs to the physical page: [ 31.861971] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106525 [ 31.862029] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.862081] page_type: f5(slab) [ 31.862124] raw: 0bfffe0000000000 fff00000c5c5cb40 dead000000000122 0000000000000000 [ 31.862173] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 31.862214] page dumped because: kasan: bad access detected [ 31.862244] [ 31.862262] Memory state around the buggy address: [ 31.862295] fff00000c6524f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.862339] fff00000c6524f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.862382] >fff00000c6525000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.862417] ^ [ 31.862457] fff00000c6525080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 31.862601] fff00000c6525100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.862708] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 31.264694] ================================================================== [ 31.265197] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 31.265383] Free of addr fff00000c6526001 by task kunit_try_catch/243 [ 31.265539] [ 31.265686] CPU: 0 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 31.265778] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.265805] Hardware name: linux,dummy-virt (DT) [ 31.266146] Call trace: [ 31.266176] show_stack+0x20/0x38 (C) [ 31.266234] dump_stack_lvl+0x8c/0xd0 [ 31.266394] print_report+0x118/0x5d0 [ 31.266450] kasan_report_invalid_free+0xc0/0xe8 [ 31.266608] check_slab_allocation+0xfc/0x108 [ 31.266662] __kasan_slab_pre_free+0x2c/0x48 [ 31.266712] kmem_cache_free+0xf0/0x468 [ 31.266773] kmem_cache_invalid_free+0x184/0x3c8 [ 31.266942] kunit_try_run_case+0x170/0x3f0 [ 31.267090] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.267208] kthread+0x328/0x630 [ 31.267253] ret_from_fork+0x10/0x20 [ 31.267303] [ 31.267323] Allocated by task 243: [ 31.267362] kasan_save_stack+0x3c/0x68 [ 31.267407] kasan_save_track+0x20/0x40 [ 31.267691] kasan_save_alloc_info+0x40/0x58 [ 31.267956] __kasan_slab_alloc+0xa8/0xb0 [ 31.268024] kmem_cache_alloc_noprof+0x10c/0x398 [ 31.268104] kmem_cache_invalid_free+0x12c/0x3c8 [ 31.268168] kunit_try_run_case+0x170/0x3f0 [ 31.268319] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.268371] kthread+0x328/0x630 [ 31.268403] ret_from_fork+0x10/0x20 [ 31.268628] [ 31.268839] The buggy address belongs to the object at fff00000c6526000 [ 31.268839] which belongs to the cache test_cache of size 200 [ 31.268900] The buggy address is located 1 bytes inside of [ 31.268900] 200-byte region [fff00000c6526000, fff00000c65260c8) [ 31.268959] [ 31.268980] The buggy address belongs to the physical page: [ 31.269014] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106526 [ 31.269070] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.269120] page_type: f5(slab) [ 31.269170] raw: 0bfffe0000000000 fff00000c5c5ca00 dead000000000122 0000000000000000 [ 31.269221] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 31.269261] page dumped because: kasan: bad access detected [ 31.269340] [ 31.269406] Memory state around the buggy address: [ 31.269449] fff00000c6525f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.269491] fff00000c6525f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.269533] >fff00000c6526000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.269571] ^ [ 31.269606] fff00000c6526080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 31.269729] fff00000c6526100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.269899] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 31.222850] ================================================================== [ 31.223221] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 31.223536] Free of addr fff00000c6526000 by task kunit_try_catch/241 [ 31.223642] [ 31.223687] CPU: 0 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 31.223779] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.223916] Hardware name: linux,dummy-virt (DT) [ 31.223948] Call trace: [ 31.223972] show_stack+0x20/0x38 (C) [ 31.224025] dump_stack_lvl+0x8c/0xd0 [ 31.224084] print_report+0x118/0x5d0 [ 31.224308] kasan_report_invalid_free+0xc0/0xe8 [ 31.224465] check_slab_allocation+0xd4/0x108 [ 31.224515] __kasan_slab_pre_free+0x2c/0x48 [ 31.224565] kmem_cache_free+0xf0/0x468 [ 31.224613] kmem_cache_double_free+0x190/0x3c8 [ 31.224662] kunit_try_run_case+0x170/0x3f0 [ 31.224957] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.225220] kthread+0x328/0x630 [ 31.225301] ret_from_fork+0x10/0x20 [ 31.225352] [ 31.225370] Allocated by task 241: [ 31.225402] kasan_save_stack+0x3c/0x68 [ 31.225454] kasan_save_track+0x20/0x40 [ 31.225678] kasan_save_alloc_info+0x40/0x58 [ 31.225823] __kasan_slab_alloc+0xa8/0xb0 [ 31.225858] kmem_cache_alloc_noprof+0x10c/0x398 [ 31.225900] kmem_cache_double_free+0x12c/0x3c8 [ 31.226123] kunit_try_run_case+0x170/0x3f0 [ 31.226182] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.226233] kthread+0x328/0x630 [ 31.226368] ret_from_fork+0x10/0x20 [ 31.226403] [ 31.226421] Freed by task 241: [ 31.226507] kasan_save_stack+0x3c/0x68 [ 31.226547] kasan_save_track+0x20/0x40 [ 31.226586] kasan_save_free_info+0x4c/0x78 [ 31.226634] __kasan_slab_free+0x6c/0x98 [ 31.226675] kmem_cache_free+0x260/0x468 [ 31.226714] kmem_cache_double_free+0x140/0x3c8 [ 31.226757] kunit_try_run_case+0x170/0x3f0 [ 31.227024] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.227090] kthread+0x328/0x630 [ 31.227126] ret_from_fork+0x10/0x20 [ 31.227162] [ 31.227193] The buggy address belongs to the object at fff00000c6526000 [ 31.227193] which belongs to the cache test_cache of size 200 [ 31.227254] The buggy address is located 0 bytes inside of [ 31.227254] 200-byte region [fff00000c6526000, fff00000c65260c8) [ 31.227616] [ 31.227722] The buggy address belongs to the physical page: [ 31.227763] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106526 [ 31.227855] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.227993] page_type: f5(slab) [ 31.228068] raw: 0bfffe0000000000 fff00000c5c5c8c0 dead000000000122 0000000000000000 [ 31.228189] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 31.228383] page dumped because: kasan: bad access detected [ 31.228462] [ 31.228522] Memory state around the buggy address: [ 31.228555] fff00000c6525f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.228643] fff00000c6525f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.228690] >fff00000c6526000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 31.228729] ^ [ 31.228756] fff00000c6526080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 31.228798] fff00000c6526100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.228864] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 31.017115] ================================================================== [ 31.017210] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430 [ 31.017593] Read of size 1 at addr fff00000c65270c8 by task kunit_try_catch/239 [ 31.018046] [ 31.018303] CPU: 0 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 31.018396] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.018422] Hardware name: linux,dummy-virt (DT) [ 31.018465] Call trace: [ 31.019078] show_stack+0x20/0x38 (C) [ 31.019754] dump_stack_lvl+0x8c/0xd0 [ 31.020811] print_report+0x118/0x5d0 [ 31.020928] kasan_report+0xdc/0x128 [ 31.021497] __asan_report_load1_noabort+0x20/0x30 [ 31.021685] kmem_cache_oob+0x344/0x430 [ 31.022050] kunit_try_run_case+0x170/0x3f0 [ 31.022115] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.022169] kthread+0x328/0x630 [ 31.022218] ret_from_fork+0x10/0x20 [ 31.022430] [ 31.022522] Allocated by task 239: [ 31.022996] kasan_save_stack+0x3c/0x68 [ 31.023318] kasan_save_track+0x20/0x40 [ 31.023540] kasan_save_alloc_info+0x40/0x58 [ 31.023628] __kasan_slab_alloc+0xa8/0xb0 [ 31.024084] kmem_cache_alloc_noprof+0x10c/0x398 [ 31.024155] kmem_cache_oob+0x12c/0x430 [ 31.024432] kunit_try_run_case+0x170/0x3f0 [ 31.024482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 31.024775] kthread+0x328/0x630 [ 31.025031] ret_from_fork+0x10/0x20 [ 31.025186] [ 31.025213] The buggy address belongs to the object at fff00000c6527000 [ 31.025213] which belongs to the cache test_cache of size 200 [ 31.025272] The buggy address is located 0 bytes to the right of [ 31.025272] allocated 200-byte region [fff00000c6527000, fff00000c65270c8) [ 31.025969] [ 31.025994] The buggy address belongs to the physical page: [ 31.026071] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106527 [ 31.026133] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 31.026650] page_type: f5(slab) [ 31.026694] raw: 0bfffe0000000000 fff00000c5c5c780 dead000000000122 0000000000000000 [ 31.026745] raw: 0000000000000000 00000000800f000f 00000000f5000000 0000000000000000 [ 31.026786] page dumped because: kasan: bad access detected [ 31.026817] [ 31.026834] Memory state around the buggy address: [ 31.027655] fff00000c6526f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 31.028056] fff00000c6527000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 31.028112] >fff00000c6527080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 31.028151] ^ [ 31.028187] fff00000c6527100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.028229] fff00000c6527180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.028267] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 30.992453] ================================================================== [ 30.992615] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 30.992675] Read of size 8 at addr fff00000c6500e00 by task kunit_try_catch/232 [ 30.992726] [ 30.992762] CPU: 0 UID: 0 PID: 232 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.992850] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.992877] Hardware name: linux,dummy-virt (DT) [ 30.992915] Call trace: [ 30.993038] show_stack+0x20/0x38 (C) [ 30.993285] dump_stack_lvl+0x8c/0xd0 [ 30.993367] print_report+0x118/0x5d0 [ 30.993410] kasan_report+0xdc/0x128 [ 30.993468] __asan_report_load8_noabort+0x20/0x30 [ 30.993684] workqueue_uaf+0x480/0x4a8 [ 30.993730] kunit_try_run_case+0x170/0x3f0 [ 30.993777] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.993830] kthread+0x328/0x630 [ 30.994119] ret_from_fork+0x10/0x20 [ 30.994407] [ 30.994430] Allocated by task 232: [ 30.994471] kasan_save_stack+0x3c/0x68 [ 30.994518] kasan_save_track+0x20/0x40 [ 30.994558] kasan_save_alloc_info+0x40/0x58 [ 30.994594] __kasan_kmalloc+0xd4/0xd8 [ 30.994633] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.994913] workqueue_uaf+0x13c/0x4a8 [ 30.994960] kunit_try_run_case+0x170/0x3f0 [ 30.994996] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.995119] kthread+0x328/0x630 [ 30.995225] ret_from_fork+0x10/0x20 [ 30.995325] [ 30.995400] Freed by task 76: [ 30.995428] kasan_save_stack+0x3c/0x68 [ 30.995585] kasan_save_track+0x20/0x40 [ 30.995628] kasan_save_free_info+0x4c/0x78 [ 30.995664] __kasan_slab_free+0x6c/0x98 [ 30.996105] kfree+0x214/0x3c8 [ 30.996141] workqueue_uaf_work+0x18/0x30 [ 30.996180] process_one_work+0x530/0xf98 [ 30.996219] worker_thread+0x618/0xf38 [ 30.996257] kthread+0x328/0x630 [ 30.996290] ret_from_fork+0x10/0x20 [ 30.996327] [ 30.996348] Last potentially related work creation: [ 30.996374] kasan_save_stack+0x3c/0x68 [ 30.996423] kasan_record_aux_stack+0xb4/0xc8 [ 30.996474] __queue_work+0x65c/0xfe0 [ 30.996890] queue_work_on+0xbc/0xf8 [ 30.997166] workqueue_uaf+0x210/0x4a8 [ 30.997205] kunit_try_run_case+0x170/0x3f0 [ 30.997243] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.997288] kthread+0x328/0x630 [ 30.997320] ret_from_fork+0x10/0x20 [ 30.997365] [ 30.997384] The buggy address belongs to the object at fff00000c6500e00 [ 30.997384] which belongs to the cache kmalloc-32 of size 32 [ 30.997605] The buggy address is located 0 bytes inside of [ 30.997605] freed 32-byte region [fff00000c6500e00, fff00000c6500e20) [ 30.997723] [ 30.997743] The buggy address belongs to the physical page: [ 30.997778] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106500 [ 30.997874] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.998073] page_type: f5(slab) [ 30.998287] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 30.998384] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 30.998425] page dumped because: kasan: bad access detected [ 30.998468] [ 30.998507] Memory state around the buggy address: [ 30.998542] fff00000c6500d00: 00 00 03 fc fc fc fc fc 00 00 07 fc fc fc fc fc [ 30.998584] fff00000c6500d80: 00 00 00 fc fc fc fc fc 00 00 00 07 fc fc fc fc [ 30.998627] >fff00000c6500e00: fa fb fb fb fc fc fc fc 00 00 00 fc fc fc fc fc [ 30.998665] ^ [ 30.998693] fff00000c6500e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.998736] fff00000c6500f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.998773] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[ 30.959127] ================================================================== [ 30.959245] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 30.959309] Read of size 4 at addr fff00000c6500bc0 by task swapper/0/0 [ 30.959355] [ 30.959392] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.961994] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.962403] Hardware name: linux,dummy-virt (DT) [ 30.963042] Call trace: [ 30.963585] show_stack+0x20/0x38 (C) [ 30.964043] dump_stack_lvl+0x8c/0xd0 [ 30.964480] print_report+0x118/0x5d0 [ 30.964536] kasan_report+0xdc/0x128 [ 30.965043] __asan_report_load4_noabort+0x20/0x30 [ 30.965541] rcu_uaf_reclaim+0x64/0x70 [ 30.966063] rcu_core+0x9f4/0x1e20 [ 30.966117] rcu_core_si+0x18/0x30 [ 30.966834] handle_softirqs+0x374/0xb28 [ 30.968148] __do_softirq+0x1c/0x28 [ 30.968212] ____do_softirq+0x18/0x30 [ 30.968260] call_on_irq_stack+0x24/0x30 [ 30.968307] do_softirq_own_stack+0x24/0x38 [ 30.968355] __irq_exit_rcu+0x1fc/0x318 [ 30.968401] irq_exit_rcu+0x1c/0x80 [ 30.968822] el1_interrupt+0x38/0x58 [ 30.968884] el1h_64_irq_handler+0x18/0x28 [ 30.968943] el1h_64_irq+0x6c/0x70 [ 30.969051] finish_task_switch.isra.0+0x120/0x5e8 (P) [ 30.969108] __schedule+0xab4/0x2840 [ 30.969156] schedule_idle+0x60/0xa8 [ 30.969200] do_idle+0x2c4/0x4e8 [ 30.969248] cpu_startup_entry+0x64/0x80 [ 30.969295] rest_init+0x160/0x188 [ 30.969339] start_kernel+0x30c/0x3d0 [ 30.969391] __primary_switched+0x8c/0xa0 [ 30.969455] [ 30.970675] Allocated by task 230: [ 30.970715] kasan_save_stack+0x3c/0x68 [ 30.970766] kasan_save_track+0x20/0x40 [ 30.970806] kasan_save_alloc_info+0x40/0x58 [ 30.970845] __kasan_kmalloc+0xd4/0xd8 [ 30.970883] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.970925] rcu_uaf+0xb0/0x2d8 [ 30.971234] kunit_try_run_case+0x170/0x3f0 [ 30.971285] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.971331] kthread+0x328/0x630 [ 30.971839] ret_from_fork+0x10/0x20 [ 30.971952] [ 30.971972] Freed by task 0: [ 30.972154] kasan_save_stack+0x3c/0x68 [ 30.972201] kasan_save_track+0x20/0x40 [ 30.972239] kasan_save_free_info+0x4c/0x78 [ 30.972277] __kasan_slab_free+0x6c/0x98 [ 30.972935] kfree+0x214/0x3c8 [ 30.973837] rcu_uaf_reclaim+0x28/0x70 [ 30.973884] rcu_core+0x9f4/0x1e20 [ 30.973920] rcu_core_si+0x18/0x30 [ 30.973955] handle_softirqs+0x374/0xb28 [ 30.973993] __do_softirq+0x1c/0x28 [ 30.974029] [ 30.974065] Last potentially related work creation: [ 30.974486] kasan_save_stack+0x3c/0x68 [ 30.974536] kasan_record_aux_stack+0xb4/0xc8 [ 30.974576] __call_rcu_common.constprop.0+0x74/0x8c8 [ 30.974620] call_rcu+0x18/0x30 [ 30.974654] rcu_uaf+0x14c/0x2d8 [ 30.974691] kunit_try_run_case+0x170/0x3f0 [ 30.974729] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.974772] kthread+0x328/0x630 [ 30.974805] ret_from_fork+0x10/0x20 [ 30.974848] [ 30.974875] The buggy address belongs to the object at fff00000c6500bc0 [ 30.974875] which belongs to the cache kmalloc-32 of size 32 [ 30.974935] The buggy address is located 0 bytes inside of [ 30.974935] freed 32-byte region [fff00000c6500bc0, fff00000c6500be0) [ 30.974994] [ 30.975014] The buggy address belongs to the physical page: [ 30.975047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106500 [ 30.975100] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.975160] page_type: f5(slab) [ 30.975206] raw: 0bfffe0000000000 fff00000c0001780 dead000000000122 0000000000000000 [ 30.975256] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 30.975297] page dumped because: kasan: bad access detected [ 30.975327] [ 30.975344] Memory state around the buggy address: [ 30.975378] fff00000c6500a80: fa fb fb fb fc fc fc fc 00 00 07 fc fc fc fc fc [ 30.975420] fff00000c6500b00: fa fb fb fb fc fc fc fc 00 00 05 fc fc fc fc fc [ 30.975491] >fff00000c6500b80: 00 00 07 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 30.975530] ^ [ 30.975564] fff00000c6500c00: 00 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.975605] fff00000c6500c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.975644] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 30.882819] ================================================================== [ 30.882870] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 30.882919] Read of size 1 at addr fff00000c64f4d78 by task kunit_try_catch/228 [ 30.883417] [ 30.883479] CPU: 0 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.883832] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.883860] Hardware name: linux,dummy-virt (DT) [ 30.883890] Call trace: [ 30.884317] show_stack+0x20/0x38 (C) [ 30.884526] dump_stack_lvl+0x8c/0xd0 [ 30.884611] print_report+0x118/0x5d0 [ 30.884996] kasan_report+0xdc/0x128 [ 30.885047] __asan_report_load1_noabort+0x20/0x30 [ 30.885458] ksize_uaf+0x544/0x5f8 [ 30.885605] kunit_try_run_case+0x170/0x3f0 [ 30.885800] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.885922] kthread+0x328/0x630 [ 30.885967] ret_from_fork+0x10/0x20 [ 30.886014] [ 30.886034] Allocated by task 228: [ 30.886563] kasan_save_stack+0x3c/0x68 [ 30.886669] kasan_save_track+0x20/0x40 [ 30.886710] kasan_save_alloc_info+0x40/0x58 [ 30.886754] __kasan_kmalloc+0xd4/0xd8 [ 30.886998] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.887322] ksize_uaf+0xb8/0x5f8 [ 30.887544] kunit_try_run_case+0x170/0x3f0 [ 30.887604] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.887689] kthread+0x328/0x630 [ 30.888047] ret_from_fork+0x10/0x20 [ 30.888218] [ 30.888243] Freed by task 228: [ 30.888270] kasan_save_stack+0x3c/0x68 [ 30.888311] kasan_save_track+0x20/0x40 [ 30.888788] kasan_save_free_info+0x4c/0x78 [ 30.888952] __kasan_slab_free+0x6c/0x98 [ 30.889275] kfree+0x214/0x3c8 [ 30.889317] ksize_uaf+0x11c/0x5f8 [ 30.889353] kunit_try_run_case+0x170/0x3f0 [ 30.889390] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.889433] kthread+0x328/0x630 [ 30.889475] ret_from_fork+0x10/0x20 [ 30.889513] [ 30.889535] The buggy address belongs to the object at fff00000c64f4d00 [ 30.889535] which belongs to the cache kmalloc-128 of size 128 [ 30.889593] The buggy address is located 120 bytes inside of [ 30.889593] freed 128-byte region [fff00000c64f4d00, fff00000c64f4d80) [ 30.890124] [ 30.890149] The buggy address belongs to the physical page: [ 30.890421] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f4 [ 30.890496] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.891061] page_type: f5(slab) [ 30.891103] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.891156] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.891197] page dumped because: kasan: bad access detected [ 30.891659] [ 30.891685] Memory state around the buggy address: [ 30.891929] fff00000c64f4c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.892131] fff00000c64f4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.892299] >fff00000c64f4d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.892339] ^ [ 30.892380] fff00000c64f4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.892422] fff00000c64f4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.892473] ================================================================== [ 30.869388] ================================================================== [ 30.870007] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 30.870071] Read of size 1 at addr fff00000c64f4d00 by task kunit_try_catch/228 [ 30.870488] [ 30.870526] CPU: 0 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.870875] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.870919] Hardware name: linux,dummy-virt (DT) [ 30.871131] Call trace: [ 30.871353] show_stack+0x20/0x38 (C) [ 30.871632] dump_stack_lvl+0x8c/0xd0 [ 30.871827] print_report+0x118/0x5d0 [ 30.871909] kasan_report+0xdc/0x128 [ 30.872041] __asan_report_load1_noabort+0x20/0x30 [ 30.872281] ksize_uaf+0x598/0x5f8 [ 30.872511] kunit_try_run_case+0x170/0x3f0 [ 30.872567] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.872942] kthread+0x328/0x630 [ 30.872988] ret_from_fork+0x10/0x20 [ 30.873044] [ 30.873251] Allocated by task 228: [ 30.873367] kasan_save_stack+0x3c/0x68 [ 30.873566] kasan_save_track+0x20/0x40 [ 30.873606] kasan_save_alloc_info+0x40/0x58 [ 30.873653] __kasan_kmalloc+0xd4/0xd8 [ 30.873693] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.873734] ksize_uaf+0xb8/0x5f8 [ 30.874410] kunit_try_run_case+0x170/0x3f0 [ 30.874531] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.874576] kthread+0x328/0x630 [ 30.874873] ret_from_fork+0x10/0x20 [ 30.875551] [ 30.875591] Freed by task 228: [ 30.875760] kasan_save_stack+0x3c/0x68 [ 30.875806] kasan_save_track+0x20/0x40 [ 30.876026] kasan_save_free_info+0x4c/0x78 [ 30.876081] __kasan_slab_free+0x6c/0x98 [ 30.876665] kfree+0x214/0x3c8 [ 30.876771] ksize_uaf+0x11c/0x5f8 [ 30.877201] kunit_try_run_case+0x170/0x3f0 [ 30.877241] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.877288] kthread+0x328/0x630 [ 30.877321] ret_from_fork+0x10/0x20 [ 30.877359] [ 30.877381] The buggy address belongs to the object at fff00000c64f4d00 [ 30.877381] which belongs to the cache kmalloc-128 of size 128 [ 30.878183] The buggy address is located 0 bytes inside of [ 30.878183] freed 128-byte region [fff00000c64f4d00, fff00000c64f4d80) [ 30.878543] [ 30.878593] The buggy address belongs to the physical page: [ 30.878849] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f4 [ 30.878903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.879112] page_type: f5(slab) [ 30.879411] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.879736] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.879778] page dumped because: kasan: bad access detected [ 30.879810] [ 30.879828] Memory state around the buggy address: [ 30.880123] fff00000c64f4c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.880341] fff00000c64f4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.880418] >fff00000c64f4d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.880465] ^ [ 30.880494] fff00000c64f4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.880536] fff00000c64f4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.880574] ================================================================== [ 30.855683] ================================================================== [ 30.855786] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 30.855858] Read of size 1 at addr fff00000c64f4d00 by task kunit_try_catch/228 [ 30.855910] [ 30.855950] CPU: 0 UID: 0 PID: 228 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.856038] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.856471] Hardware name: linux,dummy-virt (DT) [ 30.856562] Call trace: [ 30.856773] show_stack+0x20/0x38 (C) [ 30.857391] dump_stack_lvl+0x8c/0xd0 [ 30.857533] print_report+0x118/0x5d0 [ 30.857580] kasan_report+0xdc/0x128 [ 30.857809] __kasan_check_byte+0x54/0x70 [ 30.858105] ksize+0x30/0x88 [ 30.858190] ksize_uaf+0x168/0x5f8 [ 30.858237] kunit_try_run_case+0x170/0x3f0 [ 30.858283] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.859136] kthread+0x328/0x630 [ 30.859253] ret_from_fork+0x10/0x20 [ 30.859742] [ 30.859913] Allocated by task 228: [ 30.859947] kasan_save_stack+0x3c/0x68 [ 30.860026] kasan_save_track+0x20/0x40 [ 30.860067] kasan_save_alloc_info+0x40/0x58 [ 30.860483] __kasan_kmalloc+0xd4/0xd8 [ 30.860685] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.861097] ksize_uaf+0xb8/0x5f8 [ 30.861220] kunit_try_run_case+0x170/0x3f0 [ 30.861261] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.861696] kthread+0x328/0x630 [ 30.861734] ret_from_fork+0x10/0x20 [ 30.861801] [ 30.861825] Freed by task 228: [ 30.862078] kasan_save_stack+0x3c/0x68 [ 30.862174] kasan_save_track+0x20/0x40 [ 30.862223] kasan_save_free_info+0x4c/0x78 [ 30.862307] __kasan_slab_free+0x6c/0x98 [ 30.862348] kfree+0x214/0x3c8 [ 30.862383] ksize_uaf+0x11c/0x5f8 [ 30.862764] kunit_try_run_case+0x170/0x3f0 [ 30.862992] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.863086] kthread+0x328/0x630 [ 30.863365] ret_from_fork+0x10/0x20 [ 30.863555] [ 30.863744] The buggy address belongs to the object at fff00000c64f4d00 [ 30.863744] which belongs to the cache kmalloc-128 of size 128 [ 30.863858] The buggy address is located 0 bytes inside of [ 30.863858] freed 128-byte region [fff00000c64f4d00, fff00000c64f4d80) [ 30.863919] [ 30.864469] The buggy address belongs to the physical page: [ 30.864689] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f4 [ 30.864837] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.865084] page_type: f5(slab) [ 30.865133] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.865587] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.865647] page dumped because: kasan: bad access detected [ 30.866213] [ 30.866236] Memory state around the buggy address: [ 30.866271] fff00000c64f4c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.866399] fff00000c64f4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.866725] >fff00000c64f4d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.866970] ^ [ 30.867130] fff00000c64f4d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.867568] fff00000c64f4e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.867627] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 30.808702] ================================================================== [ 30.808773] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 30.808854] Read of size 1 at addr fff00000c64f4c73 by task kunit_try_catch/226 [ 30.808905] [ 30.810507] CPU: 0 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.810765] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.810794] Hardware name: linux,dummy-virt (DT) [ 30.811161] Call trace: [ 30.811195] show_stack+0x20/0x38 (C) [ 30.811267] dump_stack_lvl+0x8c/0xd0 [ 30.811368] print_report+0x118/0x5d0 [ 30.811419] kasan_report+0xdc/0x128 [ 30.811476] __asan_report_load1_noabort+0x20/0x30 [ 30.811578] ksize_unpoisons_memory+0x628/0x740 [ 30.811633] kunit_try_run_case+0x170/0x3f0 [ 30.811680] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.812190] kthread+0x328/0x630 [ 30.812548] ret_from_fork+0x10/0x20 [ 30.812794] [ 30.812862] Allocated by task 226: [ 30.812902] kasan_save_stack+0x3c/0x68 [ 30.813141] kasan_save_track+0x20/0x40 [ 30.813181] kasan_save_alloc_info+0x40/0x58 [ 30.813636] __kasan_kmalloc+0xd4/0xd8 [ 30.813695] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.813898] ksize_unpoisons_memory+0xc0/0x740 [ 30.813999] kunit_try_run_case+0x170/0x3f0 [ 30.814040] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.814085] kthread+0x328/0x630 [ 30.814347] ret_from_fork+0x10/0x20 [ 30.814406] [ 30.814449] The buggy address belongs to the object at fff00000c64f4c00 [ 30.814449] which belongs to the cache kmalloc-128 of size 128 [ 30.814930] The buggy address is located 0 bytes to the right of [ 30.814930] allocated 115-byte region [fff00000c64f4c00, fff00000c64f4c73) [ 30.815122] [ 30.815155] The buggy address belongs to the physical page: [ 30.815212] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f4 [ 30.815547] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.815620] page_type: f5(slab) [ 30.815757] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.816073] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.816333] page dumped because: kasan: bad access detected [ 30.816377] [ 30.816602] Memory state around the buggy address: [ 30.816647] fff00000c64f4b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.816698] fff00000c64f4b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.816741] >fff00000c64f4c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.817235] ^ [ 30.817622] fff00000c64f4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.818180] fff00000c64f4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.818221] ================================================================== [ 30.830421] ================================================================== [ 30.830729] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 30.830781] Read of size 1 at addr fff00000c64f4c7f by task kunit_try_catch/226 [ 30.830830] [ 30.830862] CPU: 0 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.830945] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.830971] Hardware name: linux,dummy-virt (DT) [ 30.831002] Call trace: [ 30.831787] show_stack+0x20/0x38 (C) [ 30.832058] dump_stack_lvl+0x8c/0xd0 [ 30.832396] print_report+0x118/0x5d0 [ 30.832455] kasan_report+0xdc/0x128 [ 30.832500] __asan_report_load1_noabort+0x20/0x30 [ 30.832548] ksize_unpoisons_memory+0x690/0x740 [ 30.832598] kunit_try_run_case+0x170/0x3f0 [ 30.832645] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.832695] kthread+0x328/0x630 [ 30.832738] ret_from_fork+0x10/0x20 [ 30.832786] [ 30.832803] Allocated by task 226: [ 30.832829] kasan_save_stack+0x3c/0x68 [ 30.832872] kasan_save_track+0x20/0x40 [ 30.832912] kasan_save_alloc_info+0x40/0x58 [ 30.832950] __kasan_kmalloc+0xd4/0xd8 [ 30.832988] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.833029] ksize_unpoisons_memory+0xc0/0x740 [ 30.833069] kunit_try_run_case+0x170/0x3f0 [ 30.833781] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.834377] kthread+0x328/0x630 [ 30.834491] ret_from_fork+0x10/0x20 [ 30.835001] [ 30.835027] The buggy address belongs to the object at fff00000c64f4c00 [ 30.835027] which belongs to the cache kmalloc-128 of size 128 [ 30.835456] The buggy address is located 12 bytes to the right of [ 30.835456] allocated 115-byte region [fff00000c64f4c00, fff00000c64f4c73) [ 30.835529] [ 30.835880] The buggy address belongs to the physical page: [ 30.836284] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f4 [ 30.836385] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.836449] page_type: f5(slab) [ 30.836877] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.836966] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.837135] page dumped because: kasan: bad access detected [ 30.837167] [ 30.837184] Memory state around the buggy address: [ 30.837215] fff00000c64f4b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.837259] fff00000c64f4b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.837302] >fff00000c64f4c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.837340] ^ [ 30.837953] fff00000c64f4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.838163] fff00000c64f4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.838214] ================================================================== [ 30.820622] ================================================================== [ 30.820677] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 30.820729] Read of size 1 at addr fff00000c64f4c78 by task kunit_try_catch/226 [ 30.820777] [ 30.821660] CPU: 0 UID: 0 PID: 226 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.821774] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.821803] Hardware name: linux,dummy-virt (DT) [ 30.821955] Call trace: [ 30.821979] show_stack+0x20/0x38 (C) [ 30.822032] dump_stack_lvl+0x8c/0xd0 [ 30.822083] print_report+0x118/0x5d0 [ 30.822130] kasan_report+0xdc/0x128 [ 30.822172] __asan_report_load1_noabort+0x20/0x30 [ 30.822222] ksize_unpoisons_memory+0x618/0x740 [ 30.822325] kunit_try_run_case+0x170/0x3f0 [ 30.822374] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.822428] kthread+0x328/0x630 [ 30.823456] ret_from_fork+0x10/0x20 [ 30.823663] [ 30.823681] Allocated by task 226: [ 30.823710] kasan_save_stack+0x3c/0x68 [ 30.824246] kasan_save_track+0x20/0x40 [ 30.824462] kasan_save_alloc_info+0x40/0x58 [ 30.824507] __kasan_kmalloc+0xd4/0xd8 [ 30.824546] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.824744] ksize_unpoisons_memory+0xc0/0x740 [ 30.825174] kunit_try_run_case+0x170/0x3f0 [ 30.825219] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.825379] kthread+0x328/0x630 [ 30.825466] ret_from_fork+0x10/0x20 [ 30.825979] [ 30.826065] The buggy address belongs to the object at fff00000c64f4c00 [ 30.826065] which belongs to the cache kmalloc-128 of size 128 [ 30.826127] The buggy address is located 5 bytes to the right of [ 30.826127] allocated 115-byte region [fff00000c64f4c00, fff00000c64f4c73) [ 30.826191] [ 30.826210] The buggy address belongs to the physical page: [ 30.826266] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f4 [ 30.826784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.826915] page_type: f5(slab) [ 30.827188] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.827637] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.827686] page dumped because: kasan: bad access detected [ 30.827718] [ 30.827737] Memory state around the buggy address: [ 30.827768] fff00000c64f4b00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.827813] fff00000c64f4b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.827855] >fff00000c64f4c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.827893] ^ [ 30.827935] fff00000c64f4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.827977] fff00000c64f4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.828014] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive
[ 30.779430] ================================================================== [ 30.779529] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 30.779922] Free of addr fff00000c648e3e0 by task kunit_try_catch/224 [ 30.779969] [ 30.780270] CPU: 0 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.780361] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.780388] Hardware name: linux,dummy-virt (DT) [ 30.780419] Call trace: [ 30.780454] show_stack+0x20/0x38 (C) [ 30.781394] dump_stack_lvl+0x8c/0xd0 [ 30.781965] print_report+0x118/0x5d0 [ 30.782019] kasan_report_invalid_free+0xc0/0xe8 [ 30.782185] check_slab_allocation+0xd4/0x108 [ 30.782265] __kasan_slab_pre_free+0x2c/0x48 [ 30.782382] kfree+0xe8/0x3c8 [ 30.782429] kfree_sensitive+0x3c/0xb0 [ 30.782510] kmalloc_double_kzfree+0x168/0x308 [ 30.782561] kunit_try_run_case+0x170/0x3f0 [ 30.782863] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.783074] kthread+0x328/0x630 [ 30.783164] ret_from_fork+0x10/0x20 [ 30.783215] [ 30.783618] Allocated by task 224: [ 30.783691] kasan_save_stack+0x3c/0x68 [ 30.783769] kasan_save_track+0x20/0x40 [ 30.784064] kasan_save_alloc_info+0x40/0x58 [ 30.784110] __kasan_kmalloc+0xd4/0xd8 [ 30.784302] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.784870] kmalloc_double_kzfree+0xb8/0x308 [ 30.785498] kunit_try_run_case+0x170/0x3f0 [ 30.785728] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.786071] kthread+0x328/0x630 [ 30.786176] ret_from_fork+0x10/0x20 [ 30.786279] [ 30.786341] Freed by task 224: [ 30.786370] kasan_save_stack+0x3c/0x68 [ 30.786661] kasan_save_track+0x20/0x40 [ 30.786759] kasan_save_free_info+0x4c/0x78 [ 30.786859] __kasan_slab_free+0x6c/0x98 [ 30.787171] kfree+0x214/0x3c8 [ 30.787400] kfree_sensitive+0x80/0xb0 [ 30.787743] kmalloc_double_kzfree+0x11c/0x308 [ 30.787935] kunit_try_run_case+0x170/0x3f0 [ 30.788023] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.788256] kthread+0x328/0x630 [ 30.788296] ret_from_fork+0x10/0x20 [ 30.788569] [ 30.788745] The buggy address belongs to the object at fff00000c648e3e0 [ 30.788745] which belongs to the cache kmalloc-16 of size 16 [ 30.788955] The buggy address is located 0 bytes inside of [ 30.788955] 16-byte region [fff00000c648e3e0, fff00000c648e3f0) [ 30.789014] [ 30.789451] The buggy address belongs to the physical page: [ 30.789617] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10648e [ 30.789684] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.789734] page_type: f5(slab) [ 30.789932] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 30.790567] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 30.790751] page dumped because: kasan: bad access detected [ 30.790811] [ 30.791018] Memory state around the buggy address: [ 30.791086] fff00000c648e280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.791134] fff00000c648e300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.791177] >fff00000c648e380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.791608] ^ [ 30.791765] fff00000c648e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.791812] fff00000c648e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.791852] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[ 30.752593] ================================================================== [ 30.753810] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 30.753971] Read of size 1 at addr fff00000c648e3e0 by task kunit_try_catch/224 [ 30.754020] [ 30.754058] CPU: 0 UID: 0 PID: 224 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.755319] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.755836] Hardware name: linux,dummy-virt (DT) [ 30.756025] Call trace: [ 30.756527] show_stack+0x20/0x38 (C) [ 30.756622] dump_stack_lvl+0x8c/0xd0 [ 30.756670] print_report+0x118/0x5d0 [ 30.757662] kasan_report+0xdc/0x128 [ 30.757832] __kasan_check_byte+0x54/0x70 [ 30.758328] kfree_sensitive+0x30/0xb0 [ 30.759121] kmalloc_double_kzfree+0x168/0x308 [ 30.759193] kunit_try_run_case+0x170/0x3f0 [ 30.759951] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.760024] kthread+0x328/0x630 [ 30.760632] ret_from_fork+0x10/0x20 [ 30.761078] [ 30.761305] Allocated by task 224: [ 30.761552] kasan_save_stack+0x3c/0x68 [ 30.761942] kasan_save_track+0x20/0x40 [ 30.761987] kasan_save_alloc_info+0x40/0x58 [ 30.762027] __kasan_kmalloc+0xd4/0xd8 [ 30.762066] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.762977] kmalloc_double_kzfree+0xb8/0x308 [ 30.763267] kunit_try_run_case+0x170/0x3f0 [ 30.763693] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.763869] kthread+0x328/0x630 [ 30.763903] ret_from_fork+0x10/0x20 [ 30.763941] [ 30.763961] Freed by task 224: [ 30.764859] kasan_save_stack+0x3c/0x68 [ 30.765293] kasan_save_track+0x20/0x40 [ 30.765756] kasan_save_free_info+0x4c/0x78 [ 30.765812] __kasan_slab_free+0x6c/0x98 [ 30.765854] kfree+0x214/0x3c8 [ 30.766465] kfree_sensitive+0x80/0xb0 [ 30.766872] kmalloc_double_kzfree+0x11c/0x308 [ 30.767456] kunit_try_run_case+0x170/0x3f0 [ 30.767519] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.767564] kthread+0x328/0x630 [ 30.767597] ret_from_fork+0x10/0x20 [ 30.767634] [ 30.768389] The buggy address belongs to the object at fff00000c648e3e0 [ 30.768389] which belongs to the cache kmalloc-16 of size 16 [ 30.768469] The buggy address is located 0 bytes inside of [ 30.768469] freed 16-byte region [fff00000c648e3e0, fff00000c648e3f0) [ 30.769078] [ 30.769180] The buggy address belongs to the physical page: [ 30.769219] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10648e [ 30.770508] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.771382] page_type: f5(slab) [ 30.771481] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 30.771731] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 30.771864] page dumped because: kasan: bad access detected [ 30.771967] [ 30.772054] Memory state around the buggy address: [ 30.772127] fff00000c648e280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.772182] fff00000c648e300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.772227] >fff00000c648e380: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.772266] ^ [ 30.772306] fff00000c648e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.773285] fff00000c648e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.773340] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[ 30.711487] ================================================================== [ 30.711873] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 30.712158] Read of size 1 at addr fff00000c6503828 by task kunit_try_catch/220 [ 30.712341] [ 30.712568] CPU: 0 UID: 0 PID: 220 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.713205] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.713999] Hardware name: linux,dummy-virt (DT) [ 30.714040] Call trace: [ 30.714903] show_stack+0x20/0x38 (C) [ 30.715414] dump_stack_lvl+0x8c/0xd0 [ 30.715877] print_report+0x118/0x5d0 [ 30.715923] kasan_report+0xdc/0x128 [ 30.715968] __asan_report_load1_noabort+0x20/0x30 [ 30.716018] kmalloc_uaf2+0x3f4/0x468 [ 30.716066] kunit_try_run_case+0x170/0x3f0 [ 30.716114] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.716167] kthread+0x328/0x630 [ 30.716209] ret_from_fork+0x10/0x20 [ 30.716263] [ 30.716281] Allocated by task 220: [ 30.716310] kasan_save_stack+0x3c/0x68 [ 30.716354] kasan_save_track+0x20/0x40 [ 30.716391] kasan_save_alloc_info+0x40/0x58 [ 30.716429] __kasan_kmalloc+0xd4/0xd8 [ 30.717330] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.717936] kmalloc_uaf2+0xc4/0x468 [ 30.717977] kunit_try_run_case+0x170/0x3f0 [ 30.718106] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.718248] kthread+0x328/0x630 [ 30.718286] ret_from_fork+0x10/0x20 [ 30.718572] [ 30.718846] Freed by task 220: [ 30.719113] kasan_save_stack+0x3c/0x68 [ 30.719225] kasan_save_track+0x20/0x40 [ 30.719265] kasan_save_free_info+0x4c/0x78 [ 30.719304] __kasan_slab_free+0x6c/0x98 [ 30.719673] kfree+0x214/0x3c8 [ 30.719723] kmalloc_uaf2+0x134/0x468 [ 30.719965] kunit_try_run_case+0x170/0x3f0 [ 30.720002] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.720144] kthread+0x328/0x630 [ 30.720180] ret_from_fork+0x10/0x20 [ 30.720654] [ 30.720733] The buggy address belongs to the object at fff00000c6503800 [ 30.720733] which belongs to the cache kmalloc-64 of size 64 [ 30.721129] The buggy address is located 40 bytes inside of [ 30.721129] freed 64-byte region [fff00000c6503800, fff00000c6503840) [ 30.721332] [ 30.721597] The buggy address belongs to the physical page: [ 30.721664] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106503 [ 30.722112] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.722167] page_type: f5(slab) [ 30.722466] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.722521] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.722573] page dumped because: kasan: bad access detected [ 30.722971] [ 30.722991] Memory state around the buggy address: [ 30.723222] fff00000c6503700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.723269] fff00000c6503780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.723311] >fff00000c6503800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.723349] ^ [ 30.723381] fff00000c6503880: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 30.723422] fff00000c6503900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.723801] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 30.693704] ================================================================== [ 30.693784] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 30.693837] Write of size 33 at addr fff00000c6503680 by task kunit_try_catch/218 [ 30.693994] [ 30.694149] CPU: 0 UID: 0 PID: 218 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.694246] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.694273] Hardware name: linux,dummy-virt (DT) [ 30.694303] Call trace: [ 30.694326] show_stack+0x20/0x38 (C) [ 30.694520] dump_stack_lvl+0x8c/0xd0 [ 30.694651] print_report+0x118/0x5d0 [ 30.694786] kasan_report+0xdc/0x128 [ 30.694906] kasan_check_range+0x100/0x1a8 [ 30.695001] __asan_memset+0x34/0x78 [ 30.695097] kmalloc_uaf_memset+0x170/0x310 [ 30.695191] kunit_try_run_case+0x170/0x3f0 [ 30.695239] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.695528] kthread+0x328/0x630 [ 30.695662] ret_from_fork+0x10/0x20 [ 30.695717] [ 30.695872] Allocated by task 218: [ 30.695944] kasan_save_stack+0x3c/0x68 [ 30.695991] kasan_save_track+0x20/0x40 [ 30.696032] kasan_save_alloc_info+0x40/0x58 [ 30.696129] __kasan_kmalloc+0xd4/0xd8 [ 30.696171] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.696212] kmalloc_uaf_memset+0xb8/0x310 [ 30.696279] kunit_try_run_case+0x170/0x3f0 [ 30.696317] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.696358] kthread+0x328/0x630 [ 30.696404] ret_from_fork+0x10/0x20 [ 30.696453] [ 30.696473] Freed by task 218: [ 30.696532] kasan_save_stack+0x3c/0x68 [ 30.696914] kasan_save_track+0x20/0x40 [ 30.697112] kasan_save_free_info+0x4c/0x78 [ 30.697336] __kasan_slab_free+0x6c/0x98 [ 30.697379] kfree+0x214/0x3c8 [ 30.697453] kmalloc_uaf_memset+0x11c/0x310 [ 30.697491] kunit_try_run_case+0x170/0x3f0 [ 30.697528] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.697920] kthread+0x328/0x630 [ 30.697974] ret_from_fork+0x10/0x20 [ 30.698009] [ 30.698029] The buggy address belongs to the object at fff00000c6503680 [ 30.698029] which belongs to the cache kmalloc-64 of size 64 [ 30.698109] The buggy address is located 0 bytes inside of [ 30.698109] freed 64-byte region [fff00000c6503680, fff00000c65036c0) [ 30.698286] [ 30.698306] The buggy address belongs to the physical page: [ 30.698396] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106503 [ 30.698551] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.698655] page_type: f5(slab) [ 30.698711] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.698836] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.698875] page dumped because: kasan: bad access detected [ 30.698905] [ 30.698922] Memory state around the buggy address: [ 30.698954] fff00000c6503580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.699149] fff00000c6503600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.699275] >fff00000c6503680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.699381] ^ [ 30.699961] fff00000c6503700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.700010] fff00000c6503780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.700049] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[ 30.680644] ================================================================== [ 30.680733] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 30.680784] Read of size 1 at addr fff00000c648e3c8 by task kunit_try_catch/216 [ 30.680851] [ 30.680898] CPU: 0 UID: 0 PID: 216 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.680983] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.681010] Hardware name: linux,dummy-virt (DT) [ 30.681040] Call trace: [ 30.681060] show_stack+0x20/0x38 (C) [ 30.681108] dump_stack_lvl+0x8c/0xd0 [ 30.681172] print_report+0x118/0x5d0 [ 30.681318] kasan_report+0xdc/0x128 [ 30.681374] __asan_report_load1_noabort+0x20/0x30 [ 30.681673] kmalloc_uaf+0x300/0x338 [ 30.681856] kunit_try_run_case+0x170/0x3f0 [ 30.681992] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.682079] kthread+0x328/0x630 [ 30.682143] ret_from_fork+0x10/0x20 [ 30.682192] [ 30.682210] Allocated by task 216: [ 30.682239] kasan_save_stack+0x3c/0x68 [ 30.682281] kasan_save_track+0x20/0x40 [ 30.682321] kasan_save_alloc_info+0x40/0x58 [ 30.682834] __kasan_kmalloc+0xd4/0xd8 [ 30.682913] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.683002] kmalloc_uaf+0xb8/0x338 [ 30.683153] kunit_try_run_case+0x170/0x3f0 [ 30.683248] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.683369] kthread+0x328/0x630 [ 30.683457] ret_from_fork+0x10/0x20 [ 30.683542] [ 30.683562] Freed by task 216: [ 30.683589] kasan_save_stack+0x3c/0x68 [ 30.683664] kasan_save_track+0x20/0x40 [ 30.683990] kasan_save_free_info+0x4c/0x78 [ 30.684100] __kasan_slab_free+0x6c/0x98 [ 30.684193] kfree+0x214/0x3c8 [ 30.684319] kmalloc_uaf+0x11c/0x338 [ 30.684621] kunit_try_run_case+0x170/0x3f0 [ 30.684744] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.684864] kthread+0x328/0x630 [ 30.684940] ret_from_fork+0x10/0x20 [ 30.685077] [ 30.685195] The buggy address belongs to the object at fff00000c648e3c0 [ 30.685195] which belongs to the cache kmalloc-16 of size 16 [ 30.685311] The buggy address is located 8 bytes inside of [ 30.685311] freed 16-byte region [fff00000c648e3c0, fff00000c648e3d0) [ 30.685371] [ 30.685671] The buggy address belongs to the physical page: [ 30.685784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10648e [ 30.685867] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.685932] page_type: f5(slab) [ 30.685969] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 30.686046] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 30.686086] page dumped because: kasan: bad access detected [ 30.686147] [ 30.686165] Memory state around the buggy address: [ 30.686198] fff00000c648e280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.686240] fff00000c648e300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.686282] >fff00000c648e380: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc [ 30.686412] ^ [ 30.686644] fff00000c648e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.686764] fff00000c648e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.686886] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 30.670706] ================================================================== [ 30.670954] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0 [ 30.671016] Read of size 64 at addr fff00000c6503404 by task kunit_try_catch/214 [ 30.671073] [ 30.671102] CPU: 0 UID: 0 PID: 214 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.671206] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.671235] Hardware name: linux,dummy-virt (DT) [ 30.671267] Call trace: [ 30.671288] show_stack+0x20/0x38 (C) [ 30.671335] dump_stack_lvl+0x8c/0xd0 [ 30.671384] print_report+0x118/0x5d0 [ 30.671430] kasan_report+0xdc/0x128 [ 30.671730] kasan_check_range+0x100/0x1a8 [ 30.671815] __asan_memmove+0x3c/0x98 [ 30.671938] kmalloc_memmove_invalid_size+0x154/0x2e0 [ 30.671994] kunit_try_run_case+0x170/0x3f0 [ 30.672042] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.672098] kthread+0x328/0x630 [ 30.672141] ret_from_fork+0x10/0x20 [ 30.672296] [ 30.672374] Allocated by task 214: [ 30.672406] kasan_save_stack+0x3c/0x68 [ 30.672462] kasan_save_track+0x20/0x40 [ 30.672740] kasan_save_alloc_info+0x40/0x58 [ 30.672827] __kasan_kmalloc+0xd4/0xd8 [ 30.672870] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.672936] kmalloc_memmove_invalid_size+0xb0/0x2e0 [ 30.672983] kunit_try_run_case+0x170/0x3f0 [ 30.673021] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.673096] kthread+0x328/0x630 [ 30.673150] ret_from_fork+0x10/0x20 [ 30.673212] [ 30.673251] The buggy address belongs to the object at fff00000c6503400 [ 30.673251] which belongs to the cache kmalloc-64 of size 64 [ 30.673322] The buggy address is located 4 bytes inside of [ 30.673322] allocated 64-byte region [fff00000c6503400, fff00000c6503440) [ 30.673457] [ 30.673478] The buggy address belongs to the physical page: [ 30.673513] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106503 [ 30.673682] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.673797] page_type: f5(slab) [ 30.673890] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.673990] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.674085] page dumped because: kasan: bad access detected [ 30.674180] [ 30.674259] Memory state around the buggy address: [ 30.674354] fff00000c6503300: 00 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc [ 30.674460] fff00000c6503380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.674503] >fff00000c6503400: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 30.674541] ^ [ 30.674594] fff00000c6503480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.674637] fff00000c6503500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.674675] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 30.659137] ================================================================== [ 30.659218] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 30.659313] Read of size 18446744073709551614 at addr fff00000c6503204 by task kunit_try_catch/212 [ 30.659395] [ 30.659472] CPU: 0 UID: 0 PID: 212 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.659578] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.659604] Hardware name: linux,dummy-virt (DT) [ 30.659636] Call trace: [ 30.659676] show_stack+0x20/0x38 (C) [ 30.659820] dump_stack_lvl+0x8c/0xd0 [ 30.659873] print_report+0x118/0x5d0 [ 30.659917] kasan_report+0xdc/0x128 [ 30.660160] kasan_check_range+0x100/0x1a8 [ 30.660234] __asan_memmove+0x3c/0x98 [ 30.660478] kmalloc_memmove_negative_size+0x154/0x2e0 [ 30.660653] kunit_try_run_case+0x170/0x3f0 [ 30.660733] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.660878] kthread+0x328/0x630 [ 30.661061] ret_from_fork+0x10/0x20 [ 30.661129] [ 30.661167] Allocated by task 212: [ 30.661215] kasan_save_stack+0x3c/0x68 [ 30.661258] kasan_save_track+0x20/0x40 [ 30.661317] kasan_save_alloc_info+0x40/0x58 [ 30.661361] __kasan_kmalloc+0xd4/0xd8 [ 30.661418] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.661477] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 30.661544] kunit_try_run_case+0x170/0x3f0 [ 30.661600] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.661728] kthread+0x328/0x630 [ 30.661836] ret_from_fork+0x10/0x20 [ 30.661884] [ 30.661906] The buggy address belongs to the object at fff00000c6503200 [ 30.661906] which belongs to the cache kmalloc-64 of size 64 [ 30.661991] The buggy address is located 4 bytes inside of [ 30.661991] 64-byte region [fff00000c6503200, fff00000c6503240) [ 30.662390] [ 30.662418] The buggy address belongs to the physical page: [ 30.662611] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106503 [ 30.662839] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.662980] page_type: f5(slab) [ 30.663047] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.663145] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.663264] page dumped because: kasan: bad access detected [ 30.663354] [ 30.663425] Memory state around the buggy address: [ 30.663516] fff00000c6503100: 00 00 00 00 01 fc fc fc fc fc fc fc fc fc fc fc [ 30.663613] fff00000c6503180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.663693] >fff00000c6503200: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 30.663780] ^ [ 30.663860] fff00000c6503280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.663946] fff00000c6503300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.664001] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[ 30.647561] ================================================================== [ 30.647864] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 30.647943] Write of size 16 at addr fff00000c64f4b69 by task kunit_try_catch/210 [ 30.648036] [ 30.648089] CPU: 0 UID: 0 PID: 210 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.648191] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.648233] Hardware name: linux,dummy-virt (DT) [ 30.648265] Call trace: [ 30.648314] show_stack+0x20/0x38 (C) [ 30.648397] dump_stack_lvl+0x8c/0xd0 [ 30.648460] print_report+0x118/0x5d0 [ 30.648581] kasan_report+0xdc/0x128 [ 30.648721] kasan_check_range+0x100/0x1a8 [ 30.648784] __asan_memset+0x34/0x78 [ 30.648827] kmalloc_oob_memset_16+0x150/0x2f8 [ 30.649114] kunit_try_run_case+0x170/0x3f0 [ 30.649234] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.649318] kthread+0x328/0x630 [ 30.649382] ret_from_fork+0x10/0x20 [ 30.649459] [ 30.649521] Allocated by task 210: [ 30.649576] kasan_save_stack+0x3c/0x68 [ 30.649674] kasan_save_track+0x20/0x40 [ 30.650013] kasan_save_alloc_info+0x40/0x58 [ 30.650147] __kasan_kmalloc+0xd4/0xd8 [ 30.650250] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.650385] kmalloc_oob_memset_16+0xb0/0x2f8 [ 30.650472] kunit_try_run_case+0x170/0x3f0 [ 30.650565] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.650707] kthread+0x328/0x630 [ 30.650761] ret_from_fork+0x10/0x20 [ 30.650799] [ 30.650820] The buggy address belongs to the object at fff00000c64f4b00 [ 30.650820] which belongs to the cache kmalloc-128 of size 128 [ 30.650901] The buggy address is located 105 bytes inside of [ 30.650901] allocated 120-byte region [fff00000c64f4b00, fff00000c64f4b78) [ 30.650962] [ 30.650985] The buggy address belongs to the physical page: [ 30.651258] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f4 [ 30.651343] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.651417] page_type: f5(slab) [ 30.651520] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.651606] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.651713] page dumped because: kasan: bad access detected [ 30.651781] [ 30.651840] Memory state around the buggy address: [ 30.651951] fff00000c64f4a00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.652019] fff00000c64f4a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.652081] >fff00000c64f4b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.652119] ^ [ 30.652158] fff00000c64f4b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.652201] fff00000c64f4c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.652238] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[ 30.635559] ================================================================== [ 30.635613] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 30.635663] Write of size 8 at addr fff00000c64f4a71 by task kunit_try_catch/208 [ 30.635710] [ 30.635741] CPU: 0 UID: 0 PID: 208 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.635822] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.635847] Hardware name: linux,dummy-virt (DT) [ 30.635876] Call trace: [ 30.635897] show_stack+0x20/0x38 (C) [ 30.635943] dump_stack_lvl+0x8c/0xd0 [ 30.635989] print_report+0x118/0x5d0 [ 30.636032] kasan_report+0xdc/0x128 [ 30.636073] kasan_check_range+0x100/0x1a8 [ 30.636117] __asan_memset+0x34/0x78 [ 30.636160] kmalloc_oob_memset_8+0x150/0x2f8 [ 30.636207] kunit_try_run_case+0x170/0x3f0 [ 30.636252] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.636301] kthread+0x328/0x630 [ 30.636342] ret_from_fork+0x10/0x20 [ 30.636389] [ 30.636406] Allocated by task 208: [ 30.636432] kasan_save_stack+0x3c/0x68 [ 30.636523] kasan_save_track+0x20/0x40 [ 30.636561] kasan_save_alloc_info+0x40/0x58 [ 30.636742] __kasan_kmalloc+0xd4/0xd8 [ 30.636893] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.637032] kmalloc_oob_memset_8+0xb0/0x2f8 [ 30.637161] kunit_try_run_case+0x170/0x3f0 [ 30.637261] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.637332] kthread+0x328/0x630 [ 30.637487] ret_from_fork+0x10/0x20 [ 30.637560] [ 30.637580] The buggy address belongs to the object at fff00000c64f4a00 [ 30.637580] which belongs to the cache kmalloc-128 of size 128 [ 30.637658] The buggy address is located 113 bytes inside of [ 30.637658] allocated 120-byte region [fff00000c64f4a00, fff00000c64f4a78) [ 30.637718] [ 30.637903] The buggy address belongs to the physical page: [ 30.637935] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f4 [ 30.637986] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.638033] page_type: f5(slab) [ 30.638140] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.638243] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.638318] page dumped because: kasan: bad access detected [ 30.638396] [ 30.638520] Memory state around the buggy address: [ 30.638608] fff00000c64f4900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.638740] fff00000c64f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.638787] >fff00000c64f4a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.638907] ^ [ 30.639016] fff00000c64f4a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.639097] fff00000c64f4b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.639138] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[ 30.626354] ================================================================== [ 30.626408] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 30.626476] Write of size 4 at addr fff00000c64f4975 by task kunit_try_catch/206 [ 30.626523] [ 30.626553] CPU: 0 UID: 0 PID: 206 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.626899] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.626961] Hardware name: linux,dummy-virt (DT) [ 30.627043] Call trace: [ 30.627087] show_stack+0x20/0x38 (C) [ 30.627143] dump_stack_lvl+0x8c/0xd0 [ 30.627190] print_report+0x118/0x5d0 [ 30.627233] kasan_report+0xdc/0x128 [ 30.627275] kasan_check_range+0x100/0x1a8 [ 30.627329] __asan_memset+0x34/0x78 [ 30.627384] kmalloc_oob_memset_4+0x150/0x300 [ 30.627431] kunit_try_run_case+0x170/0x3f0 [ 30.627489] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.627538] kthread+0x328/0x630 [ 30.627791] ret_from_fork+0x10/0x20 [ 30.627873] [ 30.627891] Allocated by task 206: [ 30.627919] kasan_save_stack+0x3c/0x68 [ 30.627960] kasan_save_track+0x20/0x40 [ 30.627999] kasan_save_alloc_info+0x40/0x58 [ 30.628232] __kasan_kmalloc+0xd4/0xd8 [ 30.628379] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.628495] kmalloc_oob_memset_4+0xb0/0x300 [ 30.628579] kunit_try_run_case+0x170/0x3f0 [ 30.628667] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.628738] kthread+0x328/0x630 [ 30.628772] ret_from_fork+0x10/0x20 [ 30.628923] [ 30.628944] The buggy address belongs to the object at fff00000c64f4900 [ 30.628944] which belongs to the cache kmalloc-128 of size 128 [ 30.629044] The buggy address is located 117 bytes inside of [ 30.629044] allocated 120-byte region [fff00000c64f4900, fff00000c64f4978) [ 30.629194] [ 30.629241] The buggy address belongs to the physical page: [ 30.629298] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f4 [ 30.629398] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.629528] page_type: f5(slab) [ 30.629593] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.629674] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.630039] page dumped because: kasan: bad access detected [ 30.630123] [ 30.630181] Memory state around the buggy address: [ 30.630213] fff00000c64f4800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.630254] fff00000c64f4880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.630293] >fff00000c64f4900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.630478] ^ [ 30.630643] fff00000c64f4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.630769] fff00000c64f4a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.630881] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 30.428706] ================================================================== [ 30.428775] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 30.428977] Read of size 1 at addr fff00000c9a60000 by task kunit_try_catch/186 [ 30.429047] [ 30.429185] CPU: 0 UID: 0 PID: 186 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.429314] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.429662] Hardware name: linux,dummy-virt (DT) [ 30.429788] Call trace: [ 30.429813] show_stack+0x20/0x38 (C) [ 30.429882] dump_stack_lvl+0x8c/0xd0 [ 30.429941] print_report+0x118/0x5d0 [ 30.429987] kasan_report+0xdc/0x128 [ 30.430183] __asan_report_load1_noabort+0x20/0x30 [ 30.430331] page_alloc_uaf+0x328/0x350 [ 30.430575] kunit_try_run_case+0x170/0x3f0 [ 30.430701] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.430913] kthread+0x328/0x630 [ 30.431161] ret_from_fork+0x10/0x20 [ 30.431448] [ 30.431530] The buggy address belongs to the physical page: [ 30.431653] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a60 [ 30.431780] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.432019] page_type: f0(buddy) [ 30.432252] raw: 0bfffe0000000000 fff00000ff616148 fff00000ff616148 0000000000000000 [ 30.432325] raw: 0000000000000000 0000000000000005 00000000f0000000 0000000000000000 [ 30.432485] page dumped because: kasan: bad access detected [ 30.432566] [ 30.432633] Memory state around the buggy address: [ 30.432722] fff00000c9a5ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.432796] fff00000c9a5ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.432869] >fff00000c9a60000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.432906] ^ [ 30.433123] fff00000c9a60080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.433417] fff00000c9a60100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.433633] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[ 30.615754] ================================================================== [ 30.616002] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 30.616122] Write of size 2 at addr fff00000c64f4877 by task kunit_try_catch/204 [ 30.616273] [ 30.616364] CPU: 0 UID: 0 PID: 204 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.616480] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.616506] Hardware name: linux,dummy-virt (DT) [ 30.616535] Call trace: [ 30.616556] show_stack+0x20/0x38 (C) [ 30.616611] dump_stack_lvl+0x8c/0xd0 [ 30.616744] print_report+0x118/0x5d0 [ 30.616944] kasan_report+0xdc/0x128 [ 30.616997] kasan_check_range+0x100/0x1a8 [ 30.617129] __asan_memset+0x34/0x78 [ 30.617313] kmalloc_oob_memset_2+0x150/0x2f8 [ 30.617416] kunit_try_run_case+0x170/0x3f0 [ 30.617499] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.617549] kthread+0x328/0x630 [ 30.617666] ret_from_fork+0x10/0x20 [ 30.617714] [ 30.618136] Allocated by task 204: [ 30.618241] kasan_save_stack+0x3c/0x68 [ 30.618319] kasan_save_track+0x20/0x40 [ 30.618357] kasan_save_alloc_info+0x40/0x58 [ 30.618394] __kasan_kmalloc+0xd4/0xd8 [ 30.618461] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.618503] kmalloc_oob_memset_2+0xb0/0x2f8 [ 30.618541] kunit_try_run_case+0x170/0x3f0 [ 30.618577] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.618619] kthread+0x328/0x630 [ 30.618650] ret_from_fork+0x10/0x20 [ 30.618685] [ 30.618705] The buggy address belongs to the object at fff00000c64f4800 [ 30.618705] which belongs to the cache kmalloc-128 of size 128 [ 30.618759] The buggy address is located 119 bytes inside of [ 30.618759] allocated 120-byte region [fff00000c64f4800, fff00000c64f4878) [ 30.618938] [ 30.618966] The buggy address belongs to the physical page: [ 30.619068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f4 [ 30.619182] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.619229] page_type: f5(slab) [ 30.619266] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.619314] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.619357] page dumped because: kasan: bad access detected [ 30.619387] [ 30.619404] Memory state around the buggy address: [ 30.619542] fff00000c64f4700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.619740] fff00000c64f4780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.619788] >fff00000c64f4800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.619890] ^ [ 30.619978] fff00000c64f4880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.620080] fff00000c64f4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.620143] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 30.600403] ================================================================== [ 30.600484] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 30.600607] Write of size 128 at addr fff00000c64f4700 by task kunit_try_catch/202 [ 30.600793] [ 30.600933] CPU: 0 UID: 0 PID: 202 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.601295] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.601354] Hardware name: linux,dummy-virt (DT) [ 30.601385] Call trace: [ 30.601406] show_stack+0x20/0x38 (C) [ 30.601709] dump_stack_lvl+0x8c/0xd0 [ 30.602341] print_report+0x118/0x5d0 [ 30.602536] kasan_report+0xdc/0x128 [ 30.602586] kasan_check_range+0x100/0x1a8 [ 30.602644] __asan_memset+0x34/0x78 [ 30.602798] kmalloc_oob_in_memset+0x144/0x2d0 [ 30.602846] kunit_try_run_case+0x170/0x3f0 [ 30.602912] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.603234] kthread+0x328/0x630 [ 30.603301] ret_from_fork+0x10/0x20 [ 30.603350] [ 30.603368] Allocated by task 202: [ 30.603395] kasan_save_stack+0x3c/0x68 [ 30.603446] kasan_save_track+0x20/0x40 [ 30.603495] kasan_save_alloc_info+0x40/0x58 [ 30.603533] __kasan_kmalloc+0xd4/0xd8 [ 30.603766] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.604037] kmalloc_oob_in_memset+0xb0/0x2d0 [ 30.604077] kunit_try_run_case+0x170/0x3f0 [ 30.604113] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.604154] kthread+0x328/0x630 [ 30.604499] ret_from_fork+0x10/0x20 [ 30.604564] [ 30.604859] The buggy address belongs to the object at fff00000c64f4700 [ 30.604859] which belongs to the cache kmalloc-128 of size 128 [ 30.605018] The buggy address is located 0 bytes inside of [ 30.605018] allocated 120-byte region [fff00000c64f4700, fff00000c64f4778) [ 30.605092] [ 30.605111] The buggy address belongs to the physical page: [ 30.605268] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f4 [ 30.605644] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.605902] page_type: f5(slab) [ 30.606001] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.606049] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.606087] page dumped because: kasan: bad access detected [ 30.606142] [ 30.606160] Memory state around the buggy address: [ 30.606220] fff00000c64f4600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.606336] fff00000c64f4680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.606502] >fff00000c64f4700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.606719] ^ [ 30.606824] fff00000c64f4780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.606865] fff00000c64f4800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.606901] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[ 30.586079] ================================================================== [ 30.586276] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 30.586361] Read of size 16 at addr fff00000c648e3a0 by task kunit_try_catch/200 [ 30.586742] [ 30.586788] CPU: 0 UID: 0 PID: 200 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.587035] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.587063] Hardware name: linux,dummy-virt (DT) [ 30.587100] Call trace: [ 30.587171] show_stack+0x20/0x38 (C) [ 30.587235] dump_stack_lvl+0x8c/0xd0 [ 30.587399] print_report+0x118/0x5d0 [ 30.587454] kasan_report+0xdc/0x128 [ 30.587497] __asan_report_load16_noabort+0x20/0x30 [ 30.587546] kmalloc_uaf_16+0x3bc/0x438 [ 30.587591] kunit_try_run_case+0x170/0x3f0 [ 30.587646] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.587698] kthread+0x328/0x630 [ 30.588224] ret_from_fork+0x10/0x20 [ 30.588562] [ 30.588586] Allocated by task 200: [ 30.588615] kasan_save_stack+0x3c/0x68 [ 30.588661] kasan_save_track+0x20/0x40 [ 30.588701] kasan_save_alloc_info+0x40/0x58 [ 30.588739] __kasan_kmalloc+0xd4/0xd8 [ 30.588787] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.588827] kmalloc_uaf_16+0x140/0x438 [ 30.589057] kunit_try_run_case+0x170/0x3f0 [ 30.589228] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.589270] kthread+0x328/0x630 [ 30.589302] ret_from_fork+0x10/0x20 [ 30.589657] [ 30.589838] Freed by task 200: [ 30.589905] kasan_save_stack+0x3c/0x68 [ 30.589968] kasan_save_track+0x20/0x40 [ 30.590076] kasan_save_free_info+0x4c/0x78 [ 30.590112] __kasan_slab_free+0x6c/0x98 [ 30.590173] kfree+0x214/0x3c8 [ 30.590207] kmalloc_uaf_16+0x190/0x438 [ 30.590243] kunit_try_run_case+0x170/0x3f0 [ 30.590413] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.590466] kthread+0x328/0x630 [ 30.590498] ret_from_fork+0x10/0x20 [ 30.590532] [ 30.590552] The buggy address belongs to the object at fff00000c648e3a0 [ 30.590552] which belongs to the cache kmalloc-16 of size 16 [ 30.590609] The buggy address is located 0 bytes inside of [ 30.590609] freed 16-byte region [fff00000c648e3a0, fff00000c648e3b0) [ 30.590889] [ 30.590911] The buggy address belongs to the physical page: [ 30.590961] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10648e [ 30.591229] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.591452] page_type: f5(slab) [ 30.591547] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 30.591601] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 30.591690] page dumped because: kasan: bad access detected [ 30.591742] [ 30.591759] Memory state around the buggy address: [ 30.591797] fff00000c648e280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.591887] fff00000c648e300: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.592027] >fff00000c648e380: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 30.592065] ^ [ 30.592131] fff00000c648e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.592297] fff00000c648e480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.592378] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[ 30.557312] ================================================================== [ 30.557383] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 30.557457] Write of size 16 at addr fff00000c648e360 by task kunit_try_catch/198 [ 30.557506] [ 30.557719] CPU: 0 UID: 0 PID: 198 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.557972] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.558051] Hardware name: linux,dummy-virt (DT) [ 30.558127] Call trace: [ 30.558160] show_stack+0x20/0x38 (C) [ 30.558251] dump_stack_lvl+0x8c/0xd0 [ 30.558367] print_report+0x118/0x5d0 [ 30.558502] kasan_report+0xdc/0x128 [ 30.558582] __asan_report_store16_noabort+0x20/0x30 [ 30.558741] kmalloc_oob_16+0x3a0/0x3f8 [ 30.558837] kunit_try_run_case+0x170/0x3f0 [ 30.558898] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.558950] kthread+0x328/0x630 [ 30.559048] ret_from_fork+0x10/0x20 [ 30.559204] [ 30.559224] Allocated by task 198: [ 30.559252] kasan_save_stack+0x3c/0x68 [ 30.559297] kasan_save_track+0x20/0x40 [ 30.559335] kasan_save_alloc_info+0x40/0x58 [ 30.559464] __kasan_kmalloc+0xd4/0xd8 [ 30.559521] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.559598] kmalloc_oob_16+0xb4/0x3f8 [ 30.559746] kunit_try_run_case+0x170/0x3f0 [ 30.559856] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.559996] kthread+0x328/0x630 [ 30.560079] ret_from_fork+0x10/0x20 [ 30.560166] [ 30.560204] The buggy address belongs to the object at fff00000c648e360 [ 30.560204] which belongs to the cache kmalloc-16 of size 16 [ 30.560278] The buggy address is located 0 bytes inside of [ 30.560278] allocated 13-byte region [fff00000c648e360, fff00000c648e36d) [ 30.560384] [ 30.560424] The buggy address belongs to the physical page: [ 30.560465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10648e [ 30.560895] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.561035] page_type: f5(slab) [ 30.561078] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 30.561152] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 30.561528] page dumped because: kasan: bad access detected [ 30.561765] [ 30.561880] Memory state around the buggy address: [ 30.561959] fff00000c648e200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.562029] fff00000c648e280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.562135] >fff00000c648e300: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 30.562193] ^ [ 30.562266] fff00000c648e380: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.562350] fff00000c648e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.562387] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 30.538916] ================================================================== [ 30.538978] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 30.539224] Read of size 1 at addr fff00000c792ec00 by task kunit_try_catch/196 [ 30.539348] [ 30.539402] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.539524] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.539550] Hardware name: linux,dummy-virt (DT) [ 30.539579] Call trace: [ 30.539613] show_stack+0x20/0x38 (C) [ 30.539662] dump_stack_lvl+0x8c/0xd0 [ 30.539780] print_report+0x118/0x5d0 [ 30.539827] kasan_report+0xdc/0x128 [ 30.539992] __kasan_check_byte+0x54/0x70 [ 30.540045] krealloc_noprof+0x44/0x360 [ 30.540092] krealloc_uaf+0x180/0x520 [ 30.540174] kunit_try_run_case+0x170/0x3f0 [ 30.540239] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.540306] kthread+0x328/0x630 [ 30.540368] ret_from_fork+0x10/0x20 [ 30.540417] [ 30.540447] Allocated by task 196: [ 30.540474] kasan_save_stack+0x3c/0x68 [ 30.540534] kasan_save_track+0x20/0x40 [ 30.540643] kasan_save_alloc_info+0x40/0x58 [ 30.540757] __kasan_kmalloc+0xd4/0xd8 [ 30.540823] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.540866] krealloc_uaf+0xc8/0x520 [ 30.540949] kunit_try_run_case+0x170/0x3f0 [ 30.540985] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.541064] kthread+0x328/0x630 [ 30.541097] ret_from_fork+0x10/0x20 [ 30.541138] [ 30.541165] Freed by task 196: [ 30.541191] kasan_save_stack+0x3c/0x68 [ 30.541265] kasan_save_track+0x20/0x40 [ 30.541489] kasan_save_free_info+0x4c/0x78 [ 30.541540] __kasan_slab_free+0x6c/0x98 [ 30.541579] kfree+0x214/0x3c8 [ 30.541613] krealloc_uaf+0x12c/0x520 [ 30.541771] kunit_try_run_case+0x170/0x3f0 [ 30.541897] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.541940] kthread+0x328/0x630 [ 30.541999] ret_from_fork+0x10/0x20 [ 30.542035] [ 30.542056] The buggy address belongs to the object at fff00000c792ec00 [ 30.542056] which belongs to the cache kmalloc-256 of size 256 [ 30.542466] The buggy address is located 0 bytes inside of [ 30.542466] freed 256-byte region [fff00000c792ec00, fff00000c792ed00) [ 30.542642] [ 30.542727] The buggy address belongs to the physical page: [ 30.542795] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c792e600 pfn:0x10792e [ 30.542899] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.542964] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.543012] page_type: f5(slab) [ 30.543420] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.543519] raw: fff00000c792e600 000000008010000f 00000000f5000000 0000000000000000 [ 30.543612] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.543660] head: fff00000c792e600 000000008010000f 00000000f5000000 0000000000000000 [ 30.543958] head: 0bfffe0000000001 ffffc1ffc31e4b81 00000000ffffffff 00000000ffffffff [ 30.544057] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.544172] page dumped because: kasan: bad access detected [ 30.544264] [ 30.544301] Memory state around the buggy address: [ 30.544332] fff00000c792eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.544383] fff00000c792eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.544608] >fff00000c792ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.544688] ^ [ 30.544716] fff00000c792ec80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.544985] fff00000c792ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.545070] ================================================================== [ 30.546202] ================================================================== [ 30.546249] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 30.546297] Read of size 1 at addr fff00000c792ec00 by task kunit_try_catch/196 [ 30.546344] [ 30.546558] CPU: 0 UID: 0 PID: 196 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.546663] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.546689] Hardware name: linux,dummy-virt (DT) [ 30.546719] Call trace: [ 30.546762] show_stack+0x20/0x38 (C) [ 30.546849] dump_stack_lvl+0x8c/0xd0 [ 30.546896] print_report+0x118/0x5d0 [ 30.546940] kasan_report+0xdc/0x128 [ 30.547168] __asan_report_load1_noabort+0x20/0x30 [ 30.547244] krealloc_uaf+0x4c8/0x520 [ 30.547291] kunit_try_run_case+0x170/0x3f0 [ 30.547345] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.547397] kthread+0x328/0x630 [ 30.547450] ret_from_fork+0x10/0x20 [ 30.547497] [ 30.547522] Allocated by task 196: [ 30.547550] kasan_save_stack+0x3c/0x68 [ 30.547599] kasan_save_track+0x20/0x40 [ 30.547637] kasan_save_alloc_info+0x40/0x58 [ 30.547673] __kasan_kmalloc+0xd4/0xd8 [ 30.547738] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.547932] krealloc_uaf+0xc8/0x520 [ 30.547974] kunit_try_run_case+0x170/0x3f0 [ 30.548074] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.548140] kthread+0x328/0x630 [ 30.548206] ret_from_fork+0x10/0x20 [ 30.548247] [ 30.548333] Freed by task 196: [ 30.548425] kasan_save_stack+0x3c/0x68 [ 30.548474] kasan_save_track+0x20/0x40 [ 30.548511] kasan_save_free_info+0x4c/0x78 [ 30.548547] __kasan_slab_free+0x6c/0x98 [ 30.548584] kfree+0x214/0x3c8 [ 30.548616] krealloc_uaf+0x12c/0x520 [ 30.548652] kunit_try_run_case+0x170/0x3f0 [ 30.548686] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.549022] kthread+0x328/0x630 [ 30.549160] ret_from_fork+0x10/0x20 [ 30.549196] [ 30.549215] The buggy address belongs to the object at fff00000c792ec00 [ 30.549215] which belongs to the cache kmalloc-256 of size 256 [ 30.549270] The buggy address is located 0 bytes inside of [ 30.549270] freed 256-byte region [fff00000c792ec00, fff00000c792ed00) [ 30.549556] [ 30.549653] The buggy address belongs to the physical page: [ 30.549731] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c792e600 pfn:0x10792e [ 30.549834] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.549916] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.550011] page_type: f5(slab) [ 30.550087] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.550135] raw: fff00000c792e600 000000008010000f 00000000f5000000 0000000000000000 [ 30.550182] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.550459] head: fff00000c792e600 000000008010000f 00000000f5000000 0000000000000000 [ 30.550606] head: 0bfffe0000000001 ffffc1ffc31e4b81 00000000ffffffff 00000000ffffffff [ 30.550712] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.550830] page dumped because: kasan: bad access detected [ 30.550894] [ 30.550911] Memory state around the buggy address: [ 30.550941] fff00000c792eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.550982] fff00000c792eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.551021] >fff00000c792ec00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.551255] ^ [ 30.551334] fff00000c792ec80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.551414] fff00000c792ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.551555] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 30.485506] ================================================================== [ 30.485563] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 30.485634] Write of size 1 at addr fff00000c792eaea by task kunit_try_catch/190 [ 30.485705] [ 30.485734] CPU: 0 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.485960] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.486675] Hardware name: linux,dummy-virt (DT) [ 30.486774] Call trace: [ 30.486848] show_stack+0x20/0x38 (C) [ 30.486938] dump_stack_lvl+0x8c/0xd0 [ 30.487035] print_report+0x118/0x5d0 [ 30.487136] kasan_report+0xdc/0x128 [ 30.487235] __asan_report_store1_noabort+0x20/0x30 [ 30.487374] krealloc_less_oob_helper+0xae4/0xc50 [ 30.487424] krealloc_less_oob+0x20/0x38 [ 30.487661] kunit_try_run_case+0x170/0x3f0 [ 30.487728] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.487839] kthread+0x328/0x630 [ 30.487937] ret_from_fork+0x10/0x20 [ 30.488200] [ 30.488430] Allocated by task 190: [ 30.488512] kasan_save_stack+0x3c/0x68 [ 30.488598] kasan_save_track+0x20/0x40 [ 30.488712] kasan_save_alloc_info+0x40/0x58 [ 30.488778] __kasan_krealloc+0x118/0x178 [ 30.488813] krealloc_noprof+0x128/0x360 [ 30.489082] krealloc_less_oob_helper+0x168/0xc50 [ 30.489179] krealloc_less_oob+0x20/0x38 [ 30.489242] kunit_try_run_case+0x170/0x3f0 [ 30.489279] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.489342] kthread+0x328/0x630 [ 30.489383] ret_from_fork+0x10/0x20 [ 30.489418] [ 30.489448] The buggy address belongs to the object at fff00000c792ea00 [ 30.489448] which belongs to the cache kmalloc-256 of size 256 [ 30.489510] The buggy address is located 33 bytes to the right of [ 30.489510] allocated 201-byte region [fff00000c792ea00, fff00000c792eac9) [ 30.489572] [ 30.489599] The buggy address belongs to the physical page: [ 30.489662] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c792e600 pfn:0x10792e [ 30.489763] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.489901] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.489957] page_type: f5(slab) [ 30.489994] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.490041] raw: fff00000c792e600 000000008010000f 00000000f5000000 0000000000000000 [ 30.490123] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.490171] head: fff00000c792e600 000000008010000f 00000000f5000000 0000000000000000 [ 30.490325] head: 0bfffe0000000001 ffffc1ffc31e4b81 00000000ffffffff 00000000ffffffff [ 30.490413] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.490503] page dumped because: kasan: bad access detected [ 30.490580] [ 30.490641] Memory state around the buggy address: [ 30.490723] fff00000c792e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.490834] fff00000c792ea00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.490907] >fff00000c792ea80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.490943] ^ [ 30.490997] fff00000c792eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.491042] fff00000c792eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.491131] ================================================================== [ 30.514263] ================================================================== [ 30.514319] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 30.514374] Write of size 1 at addr fff00000c9a5a0c9 by task kunit_try_catch/194 [ 30.514421] [ 30.514536] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.514733] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.514814] Hardware name: linux,dummy-virt (DT) [ 30.514878] Call trace: [ 30.514986] show_stack+0x20/0x38 (C) [ 30.515126] dump_stack_lvl+0x8c/0xd0 [ 30.515271] print_report+0x118/0x5d0 [ 30.515398] kasan_report+0xdc/0x128 [ 30.515463] __asan_report_store1_noabort+0x20/0x30 [ 30.515512] krealloc_less_oob_helper+0xa48/0xc50 [ 30.515562] krealloc_large_less_oob+0x20/0x38 [ 30.515610] kunit_try_run_case+0x170/0x3f0 [ 30.515961] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.516101] kthread+0x328/0x630 [ 30.516185] ret_from_fork+0x10/0x20 [ 30.516317] [ 30.516375] The buggy address belongs to the physical page: [ 30.516432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a58 [ 30.516522] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.516577] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.516673] page_type: f8(unknown) [ 30.516762] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.516819] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.516893] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.517204] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.517309] head: 0bfffe0000000002 ffffc1ffc3269601 00000000ffffffff 00000000ffffffff [ 30.517403] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.517459] page dumped because: kasan: bad access detected [ 30.517685] [ 30.517868] Memory state around the buggy address: [ 30.517943] fff00000c9a59f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.518091] fff00000c9a5a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.518170] >fff00000c9a5a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.518245] ^ [ 30.518319] fff00000c9a5a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.518366] fff00000c9a5a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.518476] ================================================================== [ 30.475992] ================================================================== [ 30.476081] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 30.476133] Write of size 1 at addr fff00000c792ead0 by task kunit_try_catch/190 [ 30.476186] [ 30.476320] CPU: 0 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.476575] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.476604] Hardware name: linux,dummy-virt (DT) [ 30.476633] Call trace: [ 30.476663] show_stack+0x20/0x38 (C) [ 30.476723] dump_stack_lvl+0x8c/0xd0 [ 30.476895] print_report+0x118/0x5d0 [ 30.477003] kasan_report+0xdc/0x128 [ 30.477055] __asan_report_store1_noabort+0x20/0x30 [ 30.477109] krealloc_less_oob_helper+0xb9c/0xc50 [ 30.477291] krealloc_less_oob+0x20/0x38 [ 30.477346] kunit_try_run_case+0x170/0x3f0 [ 30.477390] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.477452] kthread+0x328/0x630 [ 30.477493] ret_from_fork+0x10/0x20 [ 30.477662] [ 30.477682] Allocated by task 190: [ 30.477799] kasan_save_stack+0x3c/0x68 [ 30.477852] kasan_save_track+0x20/0x40 [ 30.477921] kasan_save_alloc_info+0x40/0x58 [ 30.477989] __kasan_krealloc+0x118/0x178 [ 30.478026] krealloc_noprof+0x128/0x360 [ 30.478134] krealloc_less_oob_helper+0x168/0xc50 [ 30.478219] krealloc_less_oob+0x20/0x38 [ 30.478343] kunit_try_run_case+0x170/0x3f0 [ 30.478505] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.478604] kthread+0x328/0x630 [ 30.478681] ret_from_fork+0x10/0x20 [ 30.478778] [ 30.478799] The buggy address belongs to the object at fff00000c792ea00 [ 30.478799] which belongs to the cache kmalloc-256 of size 256 [ 30.478854] The buggy address is located 7 bytes to the right of [ 30.478854] allocated 201-byte region [fff00000c792ea00, fff00000c792eac9) [ 30.478931] [ 30.478951] The buggy address belongs to the physical page: [ 30.479328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c792e600 pfn:0x10792e [ 30.479477] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.479530] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.479647] page_type: f5(slab) [ 30.479784] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.479869] raw: fff00000c792e600 000000008010000f 00000000f5000000 0000000000000000 [ 30.479955] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.480064] head: fff00000c792e600 000000008010000f 00000000f5000000 0000000000000000 [ 30.480198] head: 0bfffe0000000001 ffffc1ffc31e4b81 00000000ffffffff 00000000ffffffff [ 30.480246] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.480304] page dumped because: kasan: bad access detected [ 30.480523] [ 30.480665] Memory state around the buggy address: [ 30.480739] fff00000c792e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.480822] fff00000c792ea00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.480863] >fff00000c792ea80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.480919] ^ [ 30.480962] fff00000c792eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.481005] fff00000c792eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.481041] ================================================================== [ 30.525322] ================================================================== [ 30.525356] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 30.525426] Write of size 1 at addr fff00000c9a5a0ea by task kunit_try_catch/194 [ 30.525540] [ 30.525567] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.525659] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.525684] Hardware name: linux,dummy-virt (DT) [ 30.525712] Call trace: [ 30.525889] show_stack+0x20/0x38 (C) [ 30.525937] dump_stack_lvl+0x8c/0xd0 [ 30.526107] print_report+0x118/0x5d0 [ 30.526287] kasan_report+0xdc/0x128 [ 30.526407] __asan_report_store1_noabort+0x20/0x30 [ 30.526534] krealloc_less_oob_helper+0xae4/0xc50 [ 30.526664] krealloc_large_less_oob+0x20/0x38 [ 30.526796] kunit_try_run_case+0x170/0x3f0 [ 30.526926] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.527064] kthread+0x328/0x630 [ 30.527124] ret_from_fork+0x10/0x20 [ 30.527180] [ 30.527429] The buggy address belongs to the physical page: [ 30.527531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a58 [ 30.527674] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.527781] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.527925] page_type: f8(unknown) [ 30.527990] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.528076] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.528188] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.528311] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.528360] head: 0bfffe0000000002 ffffc1ffc3269601 00000000ffffffff 00000000ffffffff [ 30.528606] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.528818] page dumped because: kasan: bad access detected [ 30.528918] [ 30.528995] Memory state around the buggy address: [ 30.529128] fff00000c9a59f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.529233] fff00000c9a5a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.529330] >fff00000c9a5a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.529379] ^ [ 30.529454] fff00000c9a5a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.529572] fff00000c9a5a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.529609] ================================================================== [ 30.519129] ================================================================== [ 30.519174] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 30.519227] Write of size 1 at addr fff00000c9a5a0d0 by task kunit_try_catch/194 [ 30.519273] [ 30.519309] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.519388] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.519413] Hardware name: linux,dummy-virt (DT) [ 30.519459] Call trace: [ 30.519479] show_stack+0x20/0x38 (C) [ 30.519526] dump_stack_lvl+0x8c/0xd0 [ 30.519725] print_report+0x118/0x5d0 [ 30.519790] kasan_report+0xdc/0x128 [ 30.519839] __asan_report_store1_noabort+0x20/0x30 [ 30.519889] krealloc_less_oob_helper+0xb9c/0xc50 [ 30.519938] krealloc_large_less_oob+0x20/0x38 [ 30.519995] kunit_try_run_case+0x170/0x3f0 [ 30.520041] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.520092] kthread+0x328/0x630 [ 30.520136] ret_from_fork+0x10/0x20 [ 30.520183] [ 30.520202] The buggy address belongs to the physical page: [ 30.520237] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a58 [ 30.520288] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.520335] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.520383] page_type: f8(unknown) [ 30.520420] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.520766] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.520826] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.520978] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.521036] head: 0bfffe0000000002 ffffc1ffc3269601 00000000ffffffff 00000000ffffffff [ 30.521094] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.521170] page dumped because: kasan: bad access detected [ 30.521201] [ 30.521218] Memory state around the buggy address: [ 30.521264] fff00000c9a59f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.521322] fff00000c9a5a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.521420] >fff00000c9a5a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.521475] ^ [ 30.521511] fff00000c9a5a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.521611] fff00000c9a5a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.521704] ================================================================== [ 30.522364] ================================================================== [ 30.522408] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 30.522508] Write of size 1 at addr fff00000c9a5a0da by task kunit_try_catch/194 [ 30.522574] [ 30.522631] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.522711] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.522762] Hardware name: linux,dummy-virt (DT) [ 30.522809] Call trace: [ 30.522873] show_stack+0x20/0x38 (C) [ 30.522939] dump_stack_lvl+0x8c/0xd0 [ 30.523004] print_report+0x118/0x5d0 [ 30.523068] kasan_report+0xdc/0x128 [ 30.523139] __asan_report_store1_noabort+0x20/0x30 [ 30.523188] krealloc_less_oob_helper+0xa80/0xc50 [ 30.523237] krealloc_large_less_oob+0x20/0x38 [ 30.523284] kunit_try_run_case+0x170/0x3f0 [ 30.523503] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.523565] kthread+0x328/0x630 [ 30.523689] ret_from_fork+0x10/0x20 [ 30.523755] [ 30.523804] The buggy address belongs to the physical page: [ 30.523876] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a58 [ 30.523928] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.523972] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.524019] page_type: f8(unknown) [ 30.524055] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.524140] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.524207] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.524262] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.524337] head: 0bfffe0000000002 ffffc1ffc3269601 00000000ffffffff 00000000ffffffff [ 30.524671] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.524788] page dumped because: kasan: bad access detected [ 30.524836] [ 30.524875] Memory state around the buggy address: [ 30.524923] fff00000c9a59f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.524965] fff00000c9a5a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.525042] >fff00000c9a5a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.525079] ^ [ 30.525113] fff00000c9a5a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.525181] fff00000c9a5a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.525245] ================================================================== [ 30.470901] ================================================================== [ 30.470960] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 30.471030] Write of size 1 at addr fff00000c792eac9 by task kunit_try_catch/190 [ 30.471158] [ 30.471192] CPU: 0 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.471274] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.471299] Hardware name: linux,dummy-virt (DT) [ 30.471329] Call trace: [ 30.471350] show_stack+0x20/0x38 (C) [ 30.471397] dump_stack_lvl+0x8c/0xd0 [ 30.471485] print_report+0x118/0x5d0 [ 30.471528] kasan_report+0xdc/0x128 [ 30.471572] __asan_report_store1_noabort+0x20/0x30 [ 30.471622] krealloc_less_oob_helper+0xa48/0xc50 [ 30.471853] krealloc_less_oob+0x20/0x38 [ 30.472001] kunit_try_run_case+0x170/0x3f0 [ 30.472058] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.472151] kthread+0x328/0x630 [ 30.472279] ret_from_fork+0x10/0x20 [ 30.472409] [ 30.472532] Allocated by task 190: [ 30.472603] kasan_save_stack+0x3c/0x68 [ 30.472656] kasan_save_track+0x20/0x40 [ 30.472694] kasan_save_alloc_info+0x40/0x58 [ 30.472730] __kasan_krealloc+0x118/0x178 [ 30.472765] krealloc_noprof+0x128/0x360 [ 30.472814] krealloc_less_oob_helper+0x168/0xc50 [ 30.472863] krealloc_less_oob+0x20/0x38 [ 30.472900] kunit_try_run_case+0x170/0x3f0 [ 30.472935] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.472977] kthread+0x328/0x630 [ 30.473021] ret_from_fork+0x10/0x20 [ 30.473065] [ 30.473084] The buggy address belongs to the object at fff00000c792ea00 [ 30.473084] which belongs to the cache kmalloc-256 of size 256 [ 30.473148] The buggy address is located 0 bytes to the right of [ 30.473148] allocated 201-byte region [fff00000c792ea00, fff00000c792eac9) [ 30.473209] [ 30.473228] The buggy address belongs to the physical page: [ 30.473260] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c792e600 pfn:0x10792e [ 30.473333] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.473405] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.473467] page_type: f5(slab) [ 30.473505] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.473552] raw: fff00000c792e600 000000008010000f 00000000f5000000 0000000000000000 [ 30.473599] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.473646] head: fff00000c792e600 000000008010000f 00000000f5000000 0000000000000000 [ 30.473719] head: 0bfffe0000000001 ffffc1ffc31e4b81 00000000ffffffff 00000000ffffffff [ 30.474079] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.474210] page dumped because: kasan: bad access detected [ 30.474309] [ 30.474460] Memory state around the buggy address: [ 30.474590] fff00000c792e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.474659] fff00000c792ea00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.474727] >fff00000c792ea80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.474832] ^ [ 30.475046] fff00000c792eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.475092] fff00000c792eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.475132] ================================================================== [ 30.492491] ================================================================== [ 30.492545] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 30.492595] Write of size 1 at addr fff00000c792eaeb by task kunit_try_catch/190 [ 30.492642] [ 30.492679] CPU: 0 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.492760] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.492785] Hardware name: linux,dummy-virt (DT) [ 30.492982] Call trace: [ 30.493044] show_stack+0x20/0x38 (C) [ 30.493098] dump_stack_lvl+0x8c/0xd0 [ 30.493145] print_report+0x118/0x5d0 [ 30.493198] kasan_report+0xdc/0x128 [ 30.493242] __asan_report_store1_noabort+0x20/0x30 [ 30.493290] krealloc_less_oob_helper+0xa58/0xc50 [ 30.493339] krealloc_less_oob+0x20/0x38 [ 30.493385] kunit_try_run_case+0x170/0x3f0 [ 30.493462] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.493514] kthread+0x328/0x630 [ 30.493554] ret_from_fork+0x10/0x20 [ 30.493611] [ 30.493676] Allocated by task 190: [ 30.493704] kasan_save_stack+0x3c/0x68 [ 30.494022] kasan_save_track+0x20/0x40 [ 30.494136] kasan_save_alloc_info+0x40/0x58 [ 30.494176] __kasan_krealloc+0x118/0x178 [ 30.494211] krealloc_noprof+0x128/0x360 [ 30.494275] krealloc_less_oob_helper+0x168/0xc50 [ 30.494316] krealloc_less_oob+0x20/0x38 [ 30.494352] kunit_try_run_case+0x170/0x3f0 [ 30.494626] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.494745] kthread+0x328/0x630 [ 30.494816] ret_from_fork+0x10/0x20 [ 30.494918] [ 30.494987] The buggy address belongs to the object at fff00000c792ea00 [ 30.494987] which belongs to the cache kmalloc-256 of size 256 [ 30.495043] The buggy address is located 34 bytes to the right of [ 30.495043] allocated 201-byte region [fff00000c792ea00, fff00000c792eac9) [ 30.495368] [ 30.495501] The buggy address belongs to the physical page: [ 30.495646] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c792e600 pfn:0x10792e [ 30.495715] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.495759] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.496082] page_type: f5(slab) [ 30.496172] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.496269] raw: fff00000c792e600 000000008010000f 00000000f5000000 0000000000000000 [ 30.496363] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.496415] head: fff00000c792e600 000000008010000f 00000000f5000000 0000000000000000 [ 30.496478] head: 0bfffe0000000001 ffffc1ffc31e4b81 00000000ffffffff 00000000ffffffff [ 30.496534] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.496573] page dumped because: kasan: bad access detected [ 30.496605] [ 30.496622] Memory state around the buggy address: [ 30.496652] fff00000c792e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.496692] fff00000c792ea00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.496733] >fff00000c792ea80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.496768] ^ [ 30.496812] fff00000c792eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.496868] fff00000c792eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.496913] ================================================================== [ 30.481732] ================================================================== [ 30.481777] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 30.481896] Write of size 1 at addr fff00000c792eada by task kunit_try_catch/190 [ 30.482045] [ 30.482081] CPU: 0 UID: 0 PID: 190 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.482272] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.482319] Hardware name: linux,dummy-virt (DT) [ 30.482349] Call trace: [ 30.482369] show_stack+0x20/0x38 (C) [ 30.482419] dump_stack_lvl+0x8c/0xd0 [ 30.482482] print_report+0x118/0x5d0 [ 30.482525] kasan_report+0xdc/0x128 [ 30.482585] __asan_report_store1_noabort+0x20/0x30 [ 30.482660] krealloc_less_oob_helper+0xa80/0xc50 [ 30.482715] krealloc_less_oob+0x20/0x38 [ 30.482782] kunit_try_run_case+0x170/0x3f0 [ 30.482846] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.482909] kthread+0x328/0x630 [ 30.482950] ret_from_fork+0x10/0x20 [ 30.482997] [ 30.483015] Allocated by task 190: [ 30.483064] kasan_save_stack+0x3c/0x68 [ 30.483105] kasan_save_track+0x20/0x40 [ 30.483187] kasan_save_alloc_info+0x40/0x58 [ 30.483318] __kasan_krealloc+0x118/0x178 [ 30.483373] krealloc_noprof+0x128/0x360 [ 30.483472] krealloc_less_oob_helper+0x168/0xc50 [ 30.483552] krealloc_less_oob+0x20/0x38 [ 30.483608] kunit_try_run_case+0x170/0x3f0 [ 30.483645] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.483750] kthread+0x328/0x630 [ 30.483808] ret_from_fork+0x10/0x20 [ 30.483843] [ 30.483892] The buggy address belongs to the object at fff00000c792ea00 [ 30.483892] which belongs to the cache kmalloc-256 of size 256 [ 30.483948] The buggy address is located 17 bytes to the right of [ 30.483948] allocated 201-byte region [fff00000c792ea00, fff00000c792eac9) [ 30.484009] [ 30.484027] The buggy address belongs to the physical page: [ 30.484076] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c792e600 pfn:0x10792e [ 30.484178] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.484223] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.484298] page_type: f5(slab) [ 30.484366] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.484415] raw: fff00000c792e600 000000008010000f 00000000f5000000 0000000000000000 [ 30.484561] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.484704] head: fff00000c792e600 000000008010000f 00000000f5000000 0000000000000000 [ 30.484758] head: 0bfffe0000000001 ffffc1ffc31e4b81 00000000ffffffff 00000000ffffffff [ 30.484823] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.484919] page dumped because: kasan: bad access detected [ 30.484956] [ 30.484974] Memory state around the buggy address: [ 30.485031] fff00000c792e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.485117] fff00000c792ea00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.485196] >fff00000c792ea80: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 30.485232] ^ [ 30.485267] fff00000c792eb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.485306] fff00000c792eb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.485342] ================================================================== [ 30.530847] ================================================================== [ 30.530897] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 30.531238] Write of size 1 at addr fff00000c9a5a0eb by task kunit_try_catch/194 [ 30.531350] [ 30.531384] CPU: 0 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.531519] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.531545] Hardware name: linux,dummy-virt (DT) [ 30.531574] Call trace: [ 30.531612] show_stack+0x20/0x38 (C) [ 30.531675] dump_stack_lvl+0x8c/0xd0 [ 30.531740] print_report+0x118/0x5d0 [ 30.531784] kasan_report+0xdc/0x128 [ 30.531831] __asan_report_store1_noabort+0x20/0x30 [ 30.531899] krealloc_less_oob_helper+0xa58/0xc50 [ 30.531949] krealloc_large_less_oob+0x20/0x38 [ 30.531997] kunit_try_run_case+0x170/0x3f0 [ 30.532042] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.532092] kthread+0x328/0x630 [ 30.532143] ret_from_fork+0x10/0x20 [ 30.532190] [ 30.532208] The buggy address belongs to the physical page: [ 30.532237] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a58 [ 30.532287] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.532331] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.532378] page_type: f8(unknown) [ 30.532413] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.532471] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.532518] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.532564] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.532611] head: 0bfffe0000000002 ffffc1ffc3269601 00000000ffffffff 00000000ffffffff [ 30.532657] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.532694] page dumped because: kasan: bad access detected [ 30.532723] [ 30.532751] Memory state around the buggy address: [ 30.532780] fff00000c9a59f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.532820] fff00000c9a5a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.532860] >fff00000c9a5a080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 30.532895] ^ [ 30.532930] fff00000c9a5a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.532969] fff00000c9a5a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.533005] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 30.451901] ================================================================== [ 30.451976] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 30.452040] Write of size 1 at addr fff00000c792e8eb by task kunit_try_catch/188 [ 30.452089] [ 30.452126] CPU: 0 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.452208] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.452233] Hardware name: linux,dummy-virt (DT) [ 30.452264] Call trace: [ 30.452328] show_stack+0x20/0x38 (C) [ 30.453190] dump_stack_lvl+0x8c/0xd0 [ 30.453256] print_report+0x118/0x5d0 [ 30.453303] kasan_report+0xdc/0x128 [ 30.453346] __asan_report_store1_noabort+0x20/0x30 [ 30.453395] krealloc_more_oob_helper+0x60c/0x678 [ 30.453454] krealloc_more_oob+0x20/0x38 [ 30.453500] kunit_try_run_case+0x170/0x3f0 [ 30.454349] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.454422] kthread+0x328/0x630 [ 30.454755] ret_from_fork+0x10/0x20 [ 30.454807] [ 30.454826] Allocated by task 188: [ 30.454854] kasan_save_stack+0x3c/0x68 [ 30.454899] kasan_save_track+0x20/0x40 [ 30.454938] kasan_save_alloc_info+0x40/0x58 [ 30.454976] __kasan_krealloc+0x118/0x178 [ 30.455011] krealloc_noprof+0x128/0x360 [ 30.455049] krealloc_more_oob_helper+0x168/0x678 [ 30.455090] krealloc_more_oob+0x20/0x38 [ 30.455133] kunit_try_run_case+0x170/0x3f0 [ 30.455168] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.455209] kthread+0x328/0x630 [ 30.455240] ret_from_fork+0x10/0x20 [ 30.455275] [ 30.455295] The buggy address belongs to the object at fff00000c792e800 [ 30.455295] which belongs to the cache kmalloc-256 of size 256 [ 30.455351] The buggy address is located 0 bytes to the right of [ 30.455351] allocated 235-byte region [fff00000c792e800, fff00000c792e8eb) [ 30.455412] [ 30.455431] The buggy address belongs to the physical page: [ 30.455510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c792e600 pfn:0x10792e [ 30.455699] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.455745] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.455798] page_type: f5(slab) [ 30.455838] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.455888] raw: fff00000c792e600 000000008010000f 00000000f5000000 0000000000000000 [ 30.455988] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.456555] head: fff00000c792e600 000000008010000f 00000000f5000000 0000000000000000 [ 30.456673] head: 0bfffe0000000001 ffffc1ffc31e4b81 00000000ffffffff 00000000ffffffff [ 30.456737] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.456805] page dumped because: kasan: bad access detected [ 30.456836] [ 30.456853] Memory state around the buggy address: [ 30.456887] fff00000c792e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.457071] fff00000c792e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.457152] >fff00000c792e880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 30.457239] ^ [ 30.457388] fff00000c792e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.457517] fff00000c792e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.457565] ================================================================== [ 30.503457] ================================================================== [ 30.503523] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 30.503587] Write of size 1 at addr fff00000c9a5a0eb by task kunit_try_catch/192 [ 30.503635] [ 30.503667] CPU: 0 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.503763] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.503788] Hardware name: linux,dummy-virt (DT) [ 30.503825] Call trace: [ 30.503846] show_stack+0x20/0x38 (C) [ 30.503895] dump_stack_lvl+0x8c/0xd0 [ 30.503943] print_report+0x118/0x5d0 [ 30.503987] kasan_report+0xdc/0x128 [ 30.504030] __asan_report_store1_noabort+0x20/0x30 [ 30.504079] krealloc_more_oob_helper+0x60c/0x678 [ 30.504127] krealloc_large_more_oob+0x20/0x38 [ 30.504175] kunit_try_run_case+0x170/0x3f0 [ 30.504229] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.504280] kthread+0x328/0x630 [ 30.504322] ret_from_fork+0x10/0x20 [ 30.504368] [ 30.504393] The buggy address belongs to the physical page: [ 30.504424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a58 [ 30.504488] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.504534] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.504582] page_type: f8(unknown) [ 30.504619] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.504667] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.504714] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.504759] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.505134] head: 0bfffe0000000002 ffffc1ffc3269601 00000000ffffffff 00000000ffffffff [ 30.505322] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.505388] page dumped because: kasan: bad access detected [ 30.505451] [ 30.505469] Memory state around the buggy address: [ 30.505500] fff00000c9a59f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.505547] fff00000c9a5a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.505592] >fff00000c9a5a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 30.505664] ^ [ 30.505745] fff00000c9a5a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.505845] fff00000c9a5a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.505914] ================================================================== [ 30.458780] ================================================================== [ 30.458828] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 30.458878] Write of size 1 at addr fff00000c792e8f0 by task kunit_try_catch/188 [ 30.458925] [ 30.458956] CPU: 0 UID: 0 PID: 188 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.459036] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.459121] Hardware name: linux,dummy-virt (DT) [ 30.459165] Call trace: [ 30.459231] show_stack+0x20/0x38 (C) [ 30.459287] dump_stack_lvl+0x8c/0xd0 [ 30.459339] print_report+0x118/0x5d0 [ 30.459451] kasan_report+0xdc/0x128 [ 30.459801] __asan_report_store1_noabort+0x20/0x30 [ 30.459953] krealloc_more_oob_helper+0x5c0/0x678 [ 30.460114] krealloc_more_oob+0x20/0x38 [ 30.460161] kunit_try_run_case+0x170/0x3f0 [ 30.460206] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.460257] kthread+0x328/0x630 [ 30.460299] ret_from_fork+0x10/0x20 [ 30.460346] [ 30.460364] Allocated by task 188: [ 30.461658] kasan_save_stack+0x3c/0x68 [ 30.461883] kasan_save_track+0x20/0x40 [ 30.461922] kasan_save_alloc_info+0x40/0x58 [ 30.461960] __kasan_krealloc+0x118/0x178 [ 30.462600] krealloc_noprof+0x128/0x360 [ 30.462651] krealloc_more_oob_helper+0x168/0x678 [ 30.462692] krealloc_more_oob+0x20/0x38 [ 30.462729] kunit_try_run_case+0x170/0x3f0 [ 30.462765] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.462807] kthread+0x328/0x630 [ 30.462838] ret_from_fork+0x10/0x20 [ 30.462874] [ 30.462893] The buggy address belongs to the object at fff00000c792e800 [ 30.462893] which belongs to the cache kmalloc-256 of size 256 [ 30.462948] The buggy address is located 5 bytes to the right of [ 30.462948] allocated 235-byte region [fff00000c792e800, fff00000c792e8eb) [ 30.463009] [ 30.463028] The buggy address belongs to the physical page: [ 30.463058] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xfff00000c792e600 pfn:0x10792e [ 30.463138] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.463285] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.463365] page_type: f5(slab) [ 30.463468] raw: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.463782] raw: fff00000c792e600 000000008010000f 00000000f5000000 0000000000000000 [ 30.464015] head: 0bfffe0000000040 fff00000c0001b40 dead000000000122 0000000000000000 [ 30.464121] head: fff00000c792e600 000000008010000f 00000000f5000000 0000000000000000 [ 30.464186] head: 0bfffe0000000001 ffffc1ffc31e4b81 00000000ffffffff 00000000ffffffff [ 30.464240] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 30.464279] page dumped because: kasan: bad access detected [ 30.464326] [ 30.464343] Memory state around the buggy address: [ 30.464382] fff00000c792e780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.464423] fff00000c792e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.464476] >fff00000c792e880: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 30.464534] ^ [ 30.464571] fff00000c792e900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.464619] fff00000c792e980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.464665] ================================================================== [ 30.506356] ================================================================== [ 30.506401] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 30.506482] Write of size 1 at addr fff00000c9a5a0f0 by task kunit_try_catch/192 [ 30.506557] [ 30.506606] CPU: 0 UID: 0 PID: 192 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.506726] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.506751] Hardware name: linux,dummy-virt (DT) [ 30.506780] Call trace: [ 30.506799] show_stack+0x20/0x38 (C) [ 30.506846] dump_stack_lvl+0x8c/0xd0 [ 30.506892] print_report+0x118/0x5d0 [ 30.507079] kasan_report+0xdc/0x128 [ 30.507168] __asan_report_store1_noabort+0x20/0x30 [ 30.507223] krealloc_more_oob_helper+0x5c0/0x678 [ 30.507273] krealloc_large_more_oob+0x20/0x38 [ 30.507320] kunit_try_run_case+0x170/0x3f0 [ 30.507365] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.507417] kthread+0x328/0x630 [ 30.507497] ret_from_fork+0x10/0x20 [ 30.507545] [ 30.507582] The buggy address belongs to the physical page: [ 30.507728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a58 [ 30.507860] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.507910] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.507959] page_type: f8(unknown) [ 30.507995] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.508235] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.508354] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.508410] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.508477] head: 0bfffe0000000002 ffffc1ffc3269601 00000000ffffffff 00000000ffffffff [ 30.508543] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.508620] page dumped because: kasan: bad access detected [ 30.508650] [ 30.508703] Memory state around the buggy address: [ 30.508751] fff00000c9a59f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.508797] fff00000c9a5a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.508838] >fff00000c9a5a080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 30.508898] ^ [ 30.508954] fff00000c9a5a100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.509184] fff00000c9a5a180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.509271] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree
[ 30.391658] ================================================================== [ 30.391803] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 30.392068] Free of addr fff00000c92fc001 by task kunit_try_catch/182 [ 30.392131] [ 30.392173] CPU: 0 UID: 0 PID: 182 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.392838] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.392931] Hardware name: linux,dummy-virt (DT) [ 30.393006] Call trace: [ 30.393031] show_stack+0x20/0x38 (C) [ 30.393234] dump_stack_lvl+0x8c/0xd0 [ 30.393445] print_report+0x118/0x5d0 [ 30.393510] kasan_report_invalid_free+0xc0/0xe8 [ 30.393642] __kasan_kfree_large+0x5c/0xa8 [ 30.393746] free_large_kmalloc+0x68/0x150 [ 30.393893] kfree+0x270/0x3c8 [ 30.394024] kmalloc_large_invalid_free+0x108/0x270 [ 30.394098] kunit_try_run_case+0x170/0x3f0 [ 30.394517] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.394661] kthread+0x328/0x630 [ 30.394759] ret_from_fork+0x10/0x20 [ 30.394862] [ 30.395001] The buggy address belongs to the physical page: [ 30.395223] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1092fc [ 30.395553] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.395670] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.395997] page_type: f8(unknown) [ 30.396149] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.396255] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.396388] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.396493] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.396547] head: 0bfffe0000000002 ffffc1ffc324bf01 00000000ffffffff 00000000ffffffff [ 30.396769] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.397069] page dumped because: kasan: bad access detected [ 30.397147] [ 30.397292] Memory state around the buggy address: [ 30.397387] fff00000c92fbf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.397700] fff00000c92fbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.397986] >fff00000c92fc000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.398083] ^ [ 30.398307] fff00000c92fc080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.398421] fff00000c92fc100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.398680] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 30.372065] ================================================================== [ 30.372150] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 30.372946] Read of size 1 at addr fff00000c92fc000 by task kunit_try_catch/180 [ 30.373067] [ 30.373109] CPU: 0 UID: 0 PID: 180 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.373508] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.373543] Hardware name: linux,dummy-virt (DT) [ 30.373601] Call trace: [ 30.373626] show_stack+0x20/0x38 (C) [ 30.373965] dump_stack_lvl+0x8c/0xd0 [ 30.374153] print_report+0x118/0x5d0 [ 30.374296] kasan_report+0xdc/0x128 [ 30.374400] __asan_report_load1_noabort+0x20/0x30 [ 30.374473] kmalloc_large_uaf+0x2cc/0x2f8 [ 30.374755] kunit_try_run_case+0x170/0x3f0 [ 30.375291] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.375378] kthread+0x328/0x630 [ 30.375462] ret_from_fork+0x10/0x20 [ 30.375516] [ 30.375538] The buggy address belongs to the physical page: [ 30.375580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1092fc [ 30.375643] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.375736] raw: 0bfffe0000000000 fff00000da454d00 fff00000da454d00 0000000000000000 [ 30.375784] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 30.375822] page dumped because: kasan: bad access detected [ 30.375853] [ 30.375879] Memory state around the buggy address: [ 30.375911] fff00000c92fbf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.375961] fff00000c92fbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.376001] >fff00000c92fc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.376037] ^ [ 30.376065] fff00000c92fc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.376114] fff00000c92fc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 30.376150] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 30.352015] ================================================================== [ 30.352134] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 30.352551] Write of size 1 at addr fff00000c92fe00a by task kunit_try_catch/178 [ 30.352622] [ 30.352690] CPU: 0 UID: 0 PID: 178 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.353125] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.353161] Hardware name: linux,dummy-virt (DT) [ 30.353289] Call trace: [ 30.353510] show_stack+0x20/0x38 (C) [ 30.353616] dump_stack_lvl+0x8c/0xd0 [ 30.353764] print_report+0x118/0x5d0 [ 30.353811] kasan_report+0xdc/0x128 [ 30.353853] __asan_report_store1_noabort+0x20/0x30 [ 30.353901] kmalloc_large_oob_right+0x278/0x2b8 [ 30.354364] kunit_try_run_case+0x170/0x3f0 [ 30.354488] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.354603] kthread+0x328/0x630 [ 30.354771] ret_from_fork+0x10/0x20 [ 30.354876] [ 30.355113] The buggy address belongs to the physical page: [ 30.355197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1092fc [ 30.355496] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.355647] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.355744] page_type: f8(unknown) [ 30.355851] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.356143] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.356297] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 30.356378] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 30.356649] head: 0bfffe0000000002 ffffc1ffc324bf01 00000000ffffffff 00000000ffffffff [ 30.356816] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 30.356957] page dumped because: kasan: bad access detected [ 30.357197] [ 30.357245] Memory state around the buggy address: [ 30.357415] fff00000c92fdf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.357719] fff00000c92fdf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.357789] >fff00000c92fe000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.357852] ^ [ 30.357937] fff00000c92fe080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.357995] fff00000c92fe100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 30.358068] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 30.329004] ================================================================== [ 30.329482] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 30.329652] Write of size 1 at addr fff00000c658df00 by task kunit_try_catch/176 [ 30.330019] [ 30.330157] CPU: 0 UID: 0 PID: 176 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.330338] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.330499] Hardware name: linux,dummy-virt (DT) [ 30.330590] Call trace: [ 30.330770] show_stack+0x20/0x38 (C) [ 30.330847] dump_stack_lvl+0x8c/0xd0 [ 30.331038] print_report+0x118/0x5d0 [ 30.331289] kasan_report+0xdc/0x128 [ 30.331411] __asan_report_store1_noabort+0x20/0x30 [ 30.331569] kmalloc_big_oob_right+0x2a4/0x2f0 [ 30.331835] kunit_try_run_case+0x170/0x3f0 [ 30.331990] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.332253] kthread+0x328/0x630 [ 30.332399] ret_from_fork+0x10/0x20 [ 30.332660] [ 30.332903] Allocated by task 176: [ 30.333474] kasan_save_stack+0x3c/0x68 [ 30.333710] kasan_save_track+0x20/0x40 [ 30.334038] kasan_save_alloc_info+0x40/0x58 [ 30.334292] __kasan_kmalloc+0xd4/0xd8 [ 30.334507] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.334564] kmalloc_big_oob_right+0xb8/0x2f0 [ 30.334801] kunit_try_run_case+0x170/0x3f0 [ 30.335104] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.335463] kthread+0x328/0x630 [ 30.335662] ret_from_fork+0x10/0x20 [ 30.336025] [ 30.336194] The buggy address belongs to the object at fff00000c658c000 [ 30.336194] which belongs to the cache kmalloc-8k of size 8192 [ 30.336378] The buggy address is located 0 bytes to the right of [ 30.336378] allocated 7936-byte region [fff00000c658c000, fff00000c658df00) [ 30.336566] [ 30.336697] The buggy address belongs to the physical page: [ 30.336754] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106588 [ 30.336919] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.336989] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.337396] page_type: f5(slab) [ 30.337519] raw: 0bfffe0000000040 fff00000c0002280 dead000000000100 dead000000000122 [ 30.337983] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 30.338084] head: 0bfffe0000000040 fff00000c0002280 dead000000000100 dead000000000122 [ 30.338242] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 30.338290] head: 0bfffe0000000003 ffffc1ffc3196201 00000000ffffffff 00000000ffffffff [ 30.338505] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 30.338616] page dumped because: kasan: bad access detected [ 30.338894] [ 30.339105] Memory state around the buggy address: [ 30.339532] fff00000c658de00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.339738] fff00000c658de80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.339986] >fff00000c658df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.340074] ^ [ 30.340208] fff00000c658df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.340254] fff00000c658e000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.340346] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[ 30.309936] ================================================================== [ 30.310009] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 30.310226] Write of size 1 at addr fff00000c64f4578 by task kunit_try_catch/174 [ 30.310290] [ 30.310353] CPU: 0 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.310483] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.310574] Hardware name: linux,dummy-virt (DT) [ 30.310643] Call trace: [ 30.310713] show_stack+0x20/0x38 (C) [ 30.310809] dump_stack_lvl+0x8c/0xd0 [ 30.310887] print_report+0x118/0x5d0 [ 30.310932] kasan_report+0xdc/0x128 [ 30.311238] __asan_report_store1_noabort+0x20/0x30 [ 30.311382] kmalloc_track_caller_oob_right+0x40c/0x488 [ 30.311536] kunit_try_run_case+0x170/0x3f0 [ 30.311604] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.311948] kthread+0x328/0x630 [ 30.312037] ret_from_fork+0x10/0x20 [ 30.312174] [ 30.312276] Allocated by task 174: [ 30.312326] kasan_save_stack+0x3c/0x68 [ 30.312371] kasan_save_track+0x20/0x40 [ 30.312617] kasan_save_alloc_info+0x40/0x58 [ 30.312793] __kasan_kmalloc+0xd4/0xd8 [ 30.312895] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 30.312981] kmalloc_track_caller_oob_right+0xa8/0x488 [ 30.313035] kunit_try_run_case+0x170/0x3f0 [ 30.313098] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.313332] kthread+0x328/0x630 [ 30.313487] ret_from_fork+0x10/0x20 [ 30.313665] [ 30.313719] The buggy address belongs to the object at fff00000c64f4500 [ 30.313719] which belongs to the cache kmalloc-128 of size 128 [ 30.313795] The buggy address is located 0 bytes to the right of [ 30.313795] allocated 120-byte region [fff00000c64f4500, fff00000c64f4578) [ 30.313870] [ 30.313897] The buggy address belongs to the physical page: [ 30.313930] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f4 [ 30.313983] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.314033] page_type: f5(slab) [ 30.314075] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.314173] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.314310] page dumped because: kasan: bad access detected [ 30.314403] [ 30.314493] Memory state around the buggy address: [ 30.314597] fff00000c64f4400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.314681] fff00000c64f4480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.314740] >fff00000c64f4500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.314791] ^ [ 30.314830] fff00000c64f4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.315002] fff00000c64f4600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.315188] ================================================================== [ 30.316350] ================================================================== [ 30.316429] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x418/0x488 [ 30.316597] Write of size 1 at addr fff00000c64f4678 by task kunit_try_catch/174 [ 30.316653] [ 30.316806] CPU: 0 UID: 0 PID: 174 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.316916] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.316943] Hardware name: linux,dummy-virt (DT) [ 30.316978] Call trace: [ 30.317002] show_stack+0x20/0x38 (C) [ 30.317078] dump_stack_lvl+0x8c/0xd0 [ 30.317128] print_report+0x118/0x5d0 [ 30.317172] kasan_report+0xdc/0x128 [ 30.317359] __asan_report_store1_noabort+0x20/0x30 [ 30.317420] kmalloc_track_caller_oob_right+0x418/0x488 [ 30.317511] kunit_try_run_case+0x170/0x3f0 [ 30.317558] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.317609] kthread+0x328/0x630 [ 30.317807] ret_from_fork+0x10/0x20 [ 30.317872] [ 30.317957] Allocated by task 174: [ 30.318024] kasan_save_stack+0x3c/0x68 [ 30.318107] kasan_save_track+0x20/0x40 [ 30.318214] kasan_save_alloc_info+0x40/0x58 [ 30.318313] __kasan_kmalloc+0xd4/0xd8 [ 30.318404] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 30.318502] kmalloc_track_caller_oob_right+0x184/0x488 [ 30.318894] kunit_try_run_case+0x170/0x3f0 [ 30.318992] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.319078] kthread+0x328/0x630 [ 30.319131] ret_from_fork+0x10/0x20 [ 30.319224] [ 30.319262] The buggy address belongs to the object at fff00000c64f4600 [ 30.319262] which belongs to the cache kmalloc-128 of size 128 [ 30.319355] The buggy address is located 0 bytes to the right of [ 30.319355] allocated 120-byte region [fff00000c64f4600, fff00000c64f4678) [ 30.319418] [ 30.319448] The buggy address belongs to the physical page: [ 30.319479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f4 [ 30.319678] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.319836] page_type: f5(slab) [ 30.319879] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.320049] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.320176] page dumped because: kasan: bad access detected [ 30.320268] [ 30.320353] Memory state around the buggy address: [ 30.320453] fff00000c64f4500: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.320533] fff00000c64f4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.320644] >fff00000c64f4600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 30.320723] ^ [ 30.320781] fff00000c64f4680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.321108] fff00000c64f4700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.321331] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 30.296498] ================================================================== [ 30.296629] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 30.296699] Read of size 1 at addr fff00000c9a07000 by task kunit_try_catch/172 [ 30.296813] [ 30.297196] CPU: 0 UID: 0 PID: 172 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.297287] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.297313] Hardware name: linux,dummy-virt (DT) [ 30.297413] Call trace: [ 30.297456] show_stack+0x20/0x38 (C) [ 30.297509] dump_stack_lvl+0x8c/0xd0 [ 30.297558] print_report+0x118/0x5d0 [ 30.297601] kasan_report+0xdc/0x128 [ 30.297765] __asan_report_load1_noabort+0x20/0x30 [ 30.297991] kmalloc_node_oob_right+0x2f4/0x330 [ 30.298099] kunit_try_run_case+0x170/0x3f0 [ 30.298188] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.298269] kthread+0x328/0x630 [ 30.298366] ret_from_fork+0x10/0x20 [ 30.298502] [ 30.298550] Allocated by task 172: [ 30.298615] kasan_save_stack+0x3c/0x68 [ 30.298669] kasan_save_track+0x20/0x40 [ 30.298708] kasan_save_alloc_info+0x40/0x58 [ 30.298744] __kasan_kmalloc+0xd4/0xd8 [ 30.298781] __kmalloc_cache_node_noprof+0x178/0x3d0 [ 30.298830] kmalloc_node_oob_right+0xbc/0x330 [ 30.298869] kunit_try_run_case+0x170/0x3f0 [ 30.298904] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.298945] kthread+0x328/0x630 [ 30.298976] ret_from_fork+0x10/0x20 [ 30.299012] [ 30.299032] The buggy address belongs to the object at fff00000c9a06000 [ 30.299032] which belongs to the cache kmalloc-4k of size 4096 [ 30.299088] The buggy address is located 0 bytes to the right of [ 30.299088] allocated 4096-byte region [fff00000c9a06000, fff00000c9a07000) [ 30.299307] [ 30.299353] The buggy address belongs to the physical page: [ 30.299472] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109a00 [ 30.299753] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 30.299831] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 30.299955] page_type: f5(slab) [ 30.300014] raw: 0bfffe0000000040 fff00000c0002140 dead000000000100 dead000000000122 [ 30.300086] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 30.300142] head: 0bfffe0000000040 fff00000c0002140 dead000000000100 dead000000000122 [ 30.300201] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 30.300702] head: 0bfffe0000000003 ffffc1ffc3268001 00000000ffffffff 00000000ffffffff [ 30.300759] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 30.300808] page dumped because: kasan: bad access detected [ 30.300838] [ 30.300855] Memory state around the buggy address: [ 30.301063] fff00000c9a06f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.301138] fff00000c9a06f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 30.301181] >fff00000c9a07000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.301262] ^ [ 30.301345] fff00000c9a07080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.301428] fff00000c9a07100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.301494] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 30.275131] ================================================================== [ 30.275228] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 30.275310] Read of size 1 at addr fff00000c648e33f by task kunit_try_catch/170 [ 30.275359] [ 30.275955] CPU: 0 UID: 0 PID: 170 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.276320] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.276500] Hardware name: linux,dummy-virt (DT) [ 30.276535] Call trace: [ 30.276564] show_stack+0x20/0x38 (C) [ 30.276627] dump_stack_lvl+0x8c/0xd0 [ 30.276972] print_report+0x118/0x5d0 [ 30.277077] kasan_report+0xdc/0x128 [ 30.277155] __asan_report_load1_noabort+0x20/0x30 [ 30.277210] kmalloc_oob_left+0x2ec/0x320 [ 30.277415] kunit_try_run_case+0x170/0x3f0 [ 30.277516] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.277568] kthread+0x328/0x630 [ 30.277663] ret_from_fork+0x10/0x20 [ 30.277718] [ 30.278074] Allocated by task 111: [ 30.278170] kasan_save_stack+0x3c/0x68 [ 30.278309] kasan_save_track+0x20/0x40 [ 30.278357] kasan_save_alloc_info+0x40/0x58 [ 30.278503] __kasan_kmalloc+0xd4/0xd8 [ 30.278553] __kmalloc_noprof+0x198/0x4c8 [ 30.278601] kunit_kmalloc_array+0x34/0x88 [ 30.278754] test_readerwriter+0x3b0/0x948 [ 30.278829] kunit_try_run_case+0x170/0x3f0 [ 30.278881] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.278923] kthread+0x328/0x630 [ 30.279204] ret_from_fork+0x10/0x20 [ 30.279246] [ 30.279282] Freed by task 113: [ 30.279546] kasan_save_stack+0x3c/0x68 [ 30.279598] kasan_save_track+0x20/0x40 [ 30.279636] kasan_save_free_info+0x4c/0x78 [ 30.280019] __kasan_slab_free+0x6c/0x98 [ 30.280076] kfree+0x214/0x3c8 [ 30.280397] kfree_action_wrapper+0x18/0x30 [ 30.280473] __kunit_action_free+0x58/0x80 [ 30.280509] kunit_remove_resource+0x14c/0x1f8 [ 30.280552] kunit_cleanup+0x6c/0x108 [ 30.280755] kunit_try_run_case_cleanup+0xa4/0xe0 [ 30.280919] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.281156] kthread+0x328/0x630 [ 30.281189] ret_from_fork+0x10/0x20 [ 30.281279] [ 30.281304] The buggy address belongs to the object at fff00000c648e320 [ 30.281304] which belongs to the cache kmalloc-16 of size 16 [ 30.281517] The buggy address is located 15 bytes to the right of [ 30.281517] allocated 16-byte region [fff00000c648e320, fff00000c648e330) [ 30.281587] [ 30.281607] The buggy address belongs to the physical page: [ 30.281709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10648e [ 30.281764] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.281828] page_type: f5(slab) [ 30.281870] raw: 0bfffe0000000000 fff00000c0001640 dead000000000122 0000000000000000 [ 30.281919] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 30.282124] page dumped because: kasan: bad access detected [ 30.282154] [ 30.282194] Memory state around the buggy address: [ 30.282312] fff00000c648e200: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.282353] fff00000c648e280: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 30.282393] >fff00000c648e300: fa fb fc fc fa fb fc fc 00 07 fc fc fc fc fc fc [ 30.282486] ^ [ 30.282552] fff00000c648e380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.282594] fff00000c648e400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.282631] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 30.252516] ================================================================== [ 30.252844] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 30.253789] Write of size 1 at addr fff00000c64f4473 by task kunit_try_catch/168 [ 30.253899] [ 30.254676] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.254820] Tainted: [N]=TEST [ 30.254852] Hardware name: linux,dummy-virt (DT) [ 30.255079] Call trace: [ 30.255255] show_stack+0x20/0x38 (C) [ 30.255394] dump_stack_lvl+0x8c/0xd0 [ 30.255463] print_report+0x118/0x5d0 [ 30.255507] kasan_report+0xdc/0x128 [ 30.255551] __asan_report_store1_noabort+0x20/0x30 [ 30.255600] kmalloc_oob_right+0x5a4/0x660 [ 30.255646] kunit_try_run_case+0x170/0x3f0 [ 30.255695] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.255747] kthread+0x328/0x630 [ 30.255791] ret_from_fork+0x10/0x20 [ 30.255948] [ 30.255985] Allocated by task 168: [ 30.256097] kasan_save_stack+0x3c/0x68 [ 30.256163] kasan_save_track+0x20/0x40 [ 30.256202] kasan_save_alloc_info+0x40/0x58 [ 30.256240] __kasan_kmalloc+0xd4/0xd8 [ 30.256277] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.256319] kmalloc_oob_right+0xb0/0x660 [ 30.256356] kunit_try_run_case+0x170/0x3f0 [ 30.256391] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.256433] kthread+0x328/0x630 [ 30.256475] ret_from_fork+0x10/0x20 [ 30.256529] [ 30.256589] The buggy address belongs to the object at fff00000c64f4400 [ 30.256589] which belongs to the cache kmalloc-128 of size 128 [ 30.256682] The buggy address is located 0 bytes to the right of [ 30.256682] allocated 115-byte region [fff00000c64f4400, fff00000c64f4473) [ 30.256746] [ 30.256827] The buggy address belongs to the physical page: [ 30.257033] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f4 [ 30.257296] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.257595] page_type: f5(slab) [ 30.257917] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.257978] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.258086] page dumped because: kasan: bad access detected [ 30.258126] [ 30.258152] Memory state around the buggy address: [ 30.258370] fff00000c64f4300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.258433] fff00000c64f4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.258500] >fff00000c64f4400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.258556] ^ [ 30.258640] fff00000c64f4480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.258681] fff00000c64f4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.258741] ================================================================== [ 30.263315] ================================================================== [ 30.263359] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 30.263405] Read of size 1 at addr fff00000c64f4480 by task kunit_try_catch/168 [ 30.263485] [ 30.263514] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.263593] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.263619] Hardware name: linux,dummy-virt (DT) [ 30.263648] Call trace: [ 30.263668] show_stack+0x20/0x38 (C) [ 30.263975] dump_stack_lvl+0x8c/0xd0 [ 30.264049] print_report+0x118/0x5d0 [ 30.264094] kasan_report+0xdc/0x128 [ 30.264165] __asan_report_load1_noabort+0x20/0x30 [ 30.264232] kmalloc_oob_right+0x5d0/0x660 [ 30.264280] kunit_try_run_case+0x170/0x3f0 [ 30.264325] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.264384] kthread+0x328/0x630 [ 30.264461] ret_from_fork+0x10/0x20 [ 30.264527] [ 30.264544] Allocated by task 168: [ 30.264571] kasan_save_stack+0x3c/0x68 [ 30.264611] kasan_save_track+0x20/0x40 [ 30.264653] kasan_save_alloc_info+0x40/0x58 [ 30.264691] __kasan_kmalloc+0xd4/0xd8 [ 30.264730] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.264965] kmalloc_oob_right+0xb0/0x660 [ 30.265020] kunit_try_run_case+0x170/0x3f0 [ 30.265057] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.265098] kthread+0x328/0x630 [ 30.265268] ret_from_fork+0x10/0x20 [ 30.265335] [ 30.265374] The buggy address belongs to the object at fff00000c64f4400 [ 30.265374] which belongs to the cache kmalloc-128 of size 128 [ 30.265466] The buggy address is located 13 bytes to the right of [ 30.265466] allocated 115-byte region [fff00000c64f4400, fff00000c64f4473) [ 30.265528] [ 30.265547] The buggy address belongs to the physical page: [ 30.265594] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f4 [ 30.265726] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.265849] page_type: f5(slab) [ 30.265936] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.266020] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.266075] page dumped because: kasan: bad access detected [ 30.266114] [ 30.266131] Memory state around the buggy address: [ 30.266195] fff00000c64f4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.266268] fff00000c64f4400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.266370] >fff00000c64f4480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.266453] ^ [ 30.266480] fff00000c64f4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.266519] fff00000c64f4580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.266589] ================================================================== [ 30.259537] ================================================================== [ 30.259635] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 30.259702] Write of size 1 at addr fff00000c64f4478 by task kunit_try_catch/168 [ 30.259757] [ 30.259788] CPU: 0 UID: 0 PID: 168 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 30.259925] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.259951] Hardware name: linux,dummy-virt (DT) [ 30.260010] Call trace: [ 30.260068] show_stack+0x20/0x38 (C) [ 30.260116] dump_stack_lvl+0x8c/0xd0 [ 30.260502] print_report+0x118/0x5d0 [ 30.260585] kasan_report+0xdc/0x128 [ 30.260670] __asan_report_store1_noabort+0x20/0x30 [ 30.260801] kmalloc_oob_right+0x538/0x660 [ 30.260858] kunit_try_run_case+0x170/0x3f0 [ 30.260932] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.260984] kthread+0x328/0x630 [ 30.261052] ret_from_fork+0x10/0x20 [ 30.261538] [ 30.261593] Allocated by task 168: [ 30.261667] kasan_save_stack+0x3c/0x68 [ 30.261765] kasan_save_track+0x20/0x40 [ 30.261803] kasan_save_alloc_info+0x40/0x58 [ 30.261839] __kasan_kmalloc+0xd4/0xd8 [ 30.261876] __kmalloc_cache_noprof+0x16c/0x3c0 [ 30.261916] kmalloc_oob_right+0xb0/0x660 [ 30.261952] kunit_try_run_case+0x170/0x3f0 [ 30.261988] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.262030] kthread+0x328/0x630 [ 30.262061] ret_from_fork+0x10/0x20 [ 30.262096] [ 30.262114] The buggy address belongs to the object at fff00000c64f4400 [ 30.262114] which belongs to the cache kmalloc-128 of size 128 [ 30.262168] The buggy address is located 5 bytes to the right of [ 30.262168] allocated 115-byte region [fff00000c64f4400, fff00000c64f4473) [ 30.262229] [ 30.262247] The buggy address belongs to the physical page: [ 30.262276] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1064f4 [ 30.262325] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.262370] page_type: f5(slab) [ 30.262406] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 30.262467] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 30.262505] page dumped because: kasan: bad access detected [ 30.262534] [ 30.262551] Memory state around the buggy address: [ 30.262580] fff00000c64f4300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 30.262620] fff00000c64f4380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.262661] >fff00000c64f4400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 30.262696] ^ [ 30.262733] fff00000c64f4480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.262773] fff00000c64f4500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.262808] ==================================================================
Failure - log-parser-boot/exception-warning-libteststest_ratelimit-at-test_ratelimit_stress_child
------------[ cut here ]------------ [ 196.961426] WARNING: lib/tests/test_ratelimit.c:87 at test_ratelimit_stress_child+0x160/0x1b8, CPU#1: test_ratelimit_/1724 [ 196.965047] Modules linked in: [ 196.965288] CPU: 1 UID: 0 PID: 1724 Comm: test_ratelimit_ Tainted: G B D W N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 196.966859] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 196.967630] Hardware name: linux,dummy-virt (DT) [ 196.967996] pstate: 62402009 (nZCv daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 196.968266] pc : test_ratelimit_stress_child+0x160/0x1b8 [ 196.968894] lr : test_ratelimit_stress_child+0x30/0x1b8 [ 196.969578] sp : ffff8000898c7d90 [ 196.970181] x29: ffff8000898c7d90 x28: 0000000000000000 x27: 0000000000000000 [ 196.970997] x26: 1ffe000018f9f721 x25: 0000000000000000 x24: 0000000000000004 [ 196.971344] x23: fff00000c7cfb90c x22: fff00000cb0f4ca8 x21: ffff95f548d6a0c8 [ 196.971698] x20: fff00000c7cfb900 x19: fff00000cb0f4ca8 x18: 000000002bffa41d [ 196.972039] x17: 0000000000000000 x16: fff00000c5b3103c x15: fff00000ff616b48 [ 196.972374] x14: 0000000000018fff x13: 1ffe00001b48a1dd x12: fffd80001b48e459 [ 196.973558] x11: 1ffe00001b48e458 x10: fffd80001b48e458 x9 : ffff95f54b371bfc [ 196.974540] x8 : ffff8000898c7ae8 x7 : 0000000000000001 x6 : ffff8000898c7c00 [ 196.975318] x5 : 0000000000000001 x4 : ffff95f54d6d43e0 x3 : 0000000000000000 [ 196.976046] x2 : 1ffe00001961e999 x1 : 0000000000000000 x0 : 0000000000000000 [ 196.977041] Call trace: [ 196.977464] test_ratelimit_stress_child+0x160/0x1b8 (P) [ 196.978380] kthread+0x328/0x630 [ 196.978945] ret_from_fork+0x10/0x20 [ 196.979344] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-libmathint_log-at-intlog10
------------[ cut here ]------------ [ 109.925297] WARNING: lib/math/int_log.c:120 at intlog10+0x38/0x48, CPU#1: kunit_try_catch/690 [ 109.926313] Modules linked in: [ 109.926582] CPU: 1 UID: 0 PID: 690 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 109.927001] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 109.927326] Hardware name: linux,dummy-virt (DT) [ 109.927619] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 109.927998] pc : intlog10+0x38/0x48 [ 109.928236] lr : intlog10_test+0xe4/0x200 [ 109.928499] sp : ffff800082327c10 [ 109.928708] x29: ffff800082327c90 x28: 0000000000000000 x27: 0000000000000000 [ 109.929135] x26: 1ffe000018cae101 x25: 0000000000000000 x24: ffff800082327ce0 [ 109.929513] x23: ffff800082327d00 x22: 0000000000000000 x21: 1ffff00010464f82 [ 109.930040] x20: ffff95f54b630220 x19: ffff800080087990 x18: 00000000772bffed [ 109.930526] x17: 00000000ceb4896c x16: 00000000e40f5308 x15: 00000000124f3a42 [ 109.930996] x14: 00000000e329dae2 x13: 0000000021b2613a x12: ffff72bea9ea4589 [ 109.931505] x11: 1ffff2bea9ea4588 x10: ffff72bea9ea4588 x9 : ffff95f548c51af4 [ 109.932054] x8 : ffff95f54f522c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 109.932607] x5 : ffff700010464f82 x4 : 1ffff00010010f3b x3 : 1ffff2bea96c6044 [ 109.933062] x2 : 1ffff2bea96c6044 x1 : 0000000000000003 x0 : 0000000000000000 [ 109.933528] Call trace: [ 109.933720] intlog10+0x38/0x48 (P) [ 109.933991] kunit_try_run_case+0x170/0x3f0 [ 109.934210] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 109.934566] kthread+0x328/0x630 [ 109.934936] ret_from_fork+0x10/0x20 [ 109.935265] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-libmathint_log-at-intlog2
------------[ cut here ]------------ [ 109.886236] WARNING: lib/math/int_log.c:63 at intlog2+0xd8/0xf8, CPU#1: kunit_try_catch/672 [ 109.887563] Modules linked in: [ 109.887809] CPU: 1 UID: 0 PID: 672 Comm: kunit_try_catch Tainted: G B D N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 109.888390] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 109.888666] Hardware name: linux,dummy-virt (DT) [ 109.888927] pstate: 12402009 (nzcV daif +PAN -UAO +TCO -DIT -SSBS BTYPE=--) [ 109.889239] pc : intlog2+0xd8/0xf8 [ 109.889449] lr : intlog2_test+0xe4/0x200 [ 109.889770] sp : ffff800082287c10 [ 109.890011] x29: ffff800082287c90 x28: 0000000000000000 x27: 0000000000000000 [ 109.890492] x26: 1ffe000018cae041 x25: 0000000000000000 x24: ffff800082287ce0 [ 109.890895] x23: ffff800082287d00 x22: 0000000000000000 x21: 1ffff00010450f82 [ 109.891304] x20: ffff95f54b630120 x19: ffff800080087990 x18: 00000000e515c74a [ 109.891733] x17: 00000000672eef1f x16: 0000000047765505 x15: 0000000002b88606 [ 109.892124] x14: 000000002cfda917 x13: 000000003ccdbee8 x12: ffff72bea9ea4589 [ 109.892510] x11: 1ffff2bea9ea4588 x10: ffff72bea9ea4588 x9 : ffff95f548c51cf4 [ 109.892967] x8 : ffff95f54f522c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 109.893380] x5 : ffff700010450f82 x4 : 1ffff00010010f3b x3 : 1ffff2bea96c6024 [ 109.893803] x2 : 1ffff2bea96c6024 x1 : 0000000000000003 x0 : 0000000000000000 [ 109.894213] Call trace: [ 109.894394] intlog2+0xd8/0xf8 (P) [ 109.894629] kunit_try_run_case+0x170/0x3f0 [ 109.894895] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 109.895198] kthread+0x328/0x630 [ 109.895390] ret_from_fork+0x10/0x20 [ 109.895759] ---[ end trace 0000000000000000 ]---