Date
July 15, 2025, 11:35 a.m.
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_to_kernel_nofault
[ 81.158794] ================================================================== [ 81.172996] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x204/0x250 [ 81.180370] Read of size 8 at addr ffff000800de4878 by task kunit_try_catch/362 [ 81.187661] [ 81.189146] CPU: 6 UID: 0 PID: 362 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 81.189205] Tainted: [B]=BAD_PAGE, [N]=TEST [ 81.189223] Hardware name: WinLink E850-96 board (DT) [ 81.189250] Call trace: [ 81.189265] show_stack+0x20/0x38 (C) [ 81.189303] dump_stack_lvl+0x8c/0xd0 [ 81.189340] print_report+0x118/0x5d0 [ 81.189371] kasan_report+0xdc/0x128 [ 81.189400] __asan_report_load8_noabort+0x20/0x30 [ 81.189435] copy_to_kernel_nofault+0x204/0x250 [ 81.189472] copy_to_kernel_nofault_oob+0x158/0x418 [ 81.189509] kunit_try_run_case+0x170/0x3f0 [ 81.189541] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 81.189579] kthread+0x328/0x630 [ 81.189609] ret_from_fork+0x10/0x20 [ 81.189643] [ 81.258406] Allocated by task 362: [ 81.261793] kasan_save_stack+0x3c/0x68 [ 81.265610] kasan_save_track+0x20/0x40 [ 81.269429] kasan_save_alloc_info+0x40/0x58 [ 81.273683] __kasan_kmalloc+0xd4/0xd8 [ 81.277415] __kmalloc_cache_noprof+0x16c/0x3c0 [ 81.281929] copy_to_kernel_nofault_oob+0xc8/0x418 [ 81.286704] kunit_try_run_case+0x170/0x3f0 [ 81.290870] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 81.296340] kthread+0x328/0x630 [ 81.299550] ret_from_fork+0x10/0x20 [ 81.303109] [ 81.304587] The buggy address belongs to the object at ffff000800de4800 [ 81.304587] which belongs to the cache kmalloc-128 of size 128 [ 81.317089] The buggy address is located 0 bytes to the right of [ 81.317089] allocated 120-byte region [ffff000800de4800, ffff000800de4878) [ 81.330019] [ 81.331498] The buggy address belongs to the physical page: [ 81.337056] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880de4 [ 81.345038] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 81.352676] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 81.359620] page_type: f5(slab) [ 81.362757] raw: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122 [ 81.370476] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 81.378206] head: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122 [ 81.386014] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 81.393827] head: 0bfffe0000000001 fffffdffe0037901 00000000ffffffff 00000000ffffffff [ 81.401639] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 81.409446] page dumped because: kasan: bad access detected [ 81.415000] [ 81.416476] Memory state around the buggy address: [ 81.421257] ffff000800de4700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 81.428460] ffff000800de4780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.435666] >ffff000800de4800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 81.442864] ^ [ 81.449986] ffff000800de4880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.457191] ffff000800de4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.464392] ================================================================== [ 81.471836] ================================================================== [ 81.478804] BUG: KASAN: slab-out-of-bounds in copy_to_kernel_nofault+0x8c/0x250 [ 81.486095] Write of size 8 at addr ffff000800de4878 by task kunit_try_catch/362 [ 81.493471] [ 81.494956] CPU: 6 UID: 0 PID: 362 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 81.495016] Tainted: [B]=BAD_PAGE, [N]=TEST [ 81.495034] Hardware name: WinLink E850-96 board (DT) [ 81.495053] Call trace: [ 81.495063] show_stack+0x20/0x38 (C) [ 81.495097] dump_stack_lvl+0x8c/0xd0 [ 81.495133] print_report+0x118/0x5d0 [ 81.495164] kasan_report+0xdc/0x128 [ 81.495189] kasan_check_range+0x100/0x1a8 [ 81.495220] __kasan_check_write+0x20/0x30 [ 81.495252] copy_to_kernel_nofault+0x8c/0x250 [ 81.495287] copy_to_kernel_nofault_oob+0x1bc/0x418 [ 81.495323] kunit_try_run_case+0x170/0x3f0 [ 81.495356] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 81.495391] kthread+0x328/0x630 [ 81.495420] ret_from_fork+0x10/0x20 [ 81.495455] [ 81.567515] Allocated by task 362: [ 81.570903] kasan_save_stack+0x3c/0x68 [ 81.574720] kasan_save_track+0x20/0x40 [ 81.578539] kasan_save_alloc_info+0x40/0x58 [ 81.582793] __kasan_kmalloc+0xd4/0xd8 [ 81.586526] __kmalloc_cache_noprof+0x16c/0x3c0 [ 81.591039] copy_to_kernel_nofault_oob+0xc8/0x418 [ 81.595814] kunit_try_run_case+0x170/0x3f0 [ 81.599980] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 81.605450] kthread+0x328/0x630 [ 81.608660] ret_from_fork+0x10/0x20 [ 81.612220] [ 81.613697] The buggy address belongs to the object at ffff000800de4800 [ 81.613697] which belongs to the cache kmalloc-128 of size 128 [ 81.626195] The buggy address is located 0 bytes to the right of [ 81.626195] allocated 120-byte region [ffff000800de4800, ffff000800de4878) [ 81.639128] [ 81.640608] The buggy address belongs to the physical page: [ 81.646164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880de4 [ 81.654147] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 81.661788] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 81.668729] page_type: f5(slab) [ 81.671866] raw: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122 [ 81.679586] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 81.687313] head: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122 [ 81.695124] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 81.702937] head: 0bfffe0000000001 fffffdffe0037901 00000000ffffffff 00000000ffffffff [ 81.710749] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 81.718554] page dumped because: kasan: bad access detected [ 81.724111] [ 81.725585] Memory state around the buggy address: [ 81.730367] ffff000800de4700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 81.737570] ffff000800de4780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.744773] >ffff000800de4800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 81.751974] ^ [ 81.759096] ffff000800de4880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.766301] ffff000800de4900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 81.773502] ==================================================================
Failure - log-parser-boot/internal-error-oops-oops-smp
[ 182.195535] Internal error: Oops: 0000000096000005 [#1] SMP [ 182.201142] Modules linked in: [ 182.204188] CPU: 3 UID: 0 PID: 613 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 182.215296] Tainted: [B]=BAD_PAGE, [N]=TEST [ 182.219454] Hardware name: WinLink E850-96 board (DT) [ 182.224492] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 182.231433] pc : kunit_test_null_dereference+0x70/0x170 [ 182.236640] lr : kunit_generic_run_threadfn_adapter+0x88/0x100 [ 182.242456] sp : ffff80008a6c7d30 [ 182.245754] x29: ffff80008a6c7d90 x28: 0000000000000000 x27: 0000000000000000 [ 182.252872] x26: 1fffe00100316de1 x25: 0000000000000000 x24: 0000000000000004 [ 182.259990] x23: ffff0008018b6f0c x22: ffff80008123e580 x21: ffff000800340008 [ 182.267108] x20: 1ffff000114d8fa6 x19: ffff800087d17990 x18: 00000000e3524fe5 [ 182.274225] x17: ffff8000812401e0 x16: ffff80008123c9b0 x15: ffff80008123260c [ 182.281343] x14: ffff8000809033ec x13: ffff800080018ef8 x12: ffff6001011d111c [ 182.288461] x11: 1fffe001011d111b x10: ffff6001011d111b x9 : ffff800081235d10 [ 182.295579] x8 : ffff80008a6c7c18 x7 : 0000000000000000 x6 : 0000000041b58ab3 [ 182.302697] x5 : ffff7000114d8fa6 x4 : 00000000f1f1f1f1 x3 : 0000000000000003 [ 182.309815] x2 : dfff800000000000 x1 : ffff000808e88000 x0 : ffff800087d17990 [ 182.316936] Call trace: [ 182.319367] kunit_test_null_dereference+0x70/0x170 (P) [ 182.324575] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 182.330041] kthread+0x328/0x630 [ 182.333253] ret_from_fork+0x10/0x20 [ 182.336826] Code: b90004a3 d5384101 52800063 aa0003f3 (39c00042) [ 182.342892] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/panic-multiline-kernel-panic-not-syncing-vfs-unable-to-mount-root-fs-on-unknown-block
[ 286.944104] Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0) [ 286.952347] SMP: stopping secondary CPUs [ 286.956269] Kernel Offset: disabled [ 286.959719] CPU features: 0x20000,00000000,10023140,0400721b [ 286.965362] Memory Limit: none [ 286.968434] ---[ end Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(0,0) ]---
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_krealloc
[ 117.548904] ================================================================== [ 117.549024] BUG: KFENCE: use-after-free read in test_krealloc+0x51c/0x830 [ 117.549024] [ 117.549170] Use-after-free read at 0x(____ptrval____) (in kfence-#221): [ 117.554172] test_krealloc+0x51c/0x830 [ 117.557904] kunit_try_run_case+0x170/0x3f0 [ 117.562071] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 117.567539] kthread+0x328/0x630 [ 117.570751] ret_from_fork+0x10/0x20 [ 117.574310] [ 117.575789] kfence-#221: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 117.575789] [ 117.585426] allocated by task 418 on cpu 5 at 117.548811s (0.036611s ago): [ 117.592300] test_alloc+0x29c/0x628 [ 117.595750] test_krealloc+0xc0/0x830 [ 117.599396] kunit_try_run_case+0x170/0x3f0 [ 117.603563] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 117.609031] kthread+0x328/0x630 [ 117.612246] ret_from_fork+0x10/0x20 [ 117.615804] [ 117.617280] freed by task 418 on cpu 5 at 117.548840s (0.068438s ago): [ 117.623810] krealloc_noprof+0x148/0x360 [ 117.627696] test_krealloc+0x1dc/0x830 [ 117.631427] kunit_try_run_case+0x170/0x3f0 [ 117.635594] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 117.641062] kthread+0x328/0x630 [ 117.644274] ret_from_fork+0x10/0x20 [ 117.647834] [ 117.649320] CPU: 5 UID: 0 PID: 418 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 117.660433] Tainted: [B]=BAD_PAGE, [N]=TEST [ 117.664587] Hardware name: WinLink E850-96 board (DT) [ 117.669624] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_memcache_typesafe_by_rcu
[ 117.324505] ================================================================== [ 117.324652] BUG: KFENCE: use-after-free read in test_memcache_typesafe_by_rcu+0x280/0x560 [ 117.324652] [ 117.324810] Use-after-free read at 0x(____ptrval____) (in kfence-#219): [ 117.325707] test_memcache_typesafe_by_rcu+0x280/0x560 [ 117.330827] kunit_try_run_case+0x170/0x3f0 [ 117.334993] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 117.340462] kthread+0x328/0x630 [ 117.343674] ret_from_fork+0x10/0x20 [ 117.347233] [ 117.348711] kfence-#219: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 117.348711] [ 117.357827] allocated by task 416 on cpu 5 at 117.264810s (0.093014s ago): [ 117.364702] test_alloc+0x230/0x628 [ 117.368153] test_memcache_typesafe_by_rcu+0x15c/0x560 [ 117.373274] kunit_try_run_case+0x170/0x3f0 [ 117.377441] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 117.382910] kthread+0x328/0x630 [ 117.386121] ret_from_fork+0x10/0x20 [ 117.389682] [ 117.391158] freed by task 416 on cpu 5 at 117.264827s (0.126329s ago): [ 117.397683] test_memcache_typesafe_by_rcu+0x1a8/0x560 [ 117.402788] kunit_try_run_case+0x170/0x3f0 [ 117.406955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 117.412423] kthread+0x328/0x630 [ 117.415636] ret_from_fork+0x10/0x20 [ 117.419196] [ 117.420681] CPU: 5 UID: 0 PID: 416 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 117.431793] Tainted: [B]=BAD_PAGE, [N]=TEST [ 117.435948] Hardware name: WinLink E850-96 board (DT) [ 117.440986] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-read-in-test_invalid_access
[ 93.882439] ================================================================== [ 93.882638] BUG: KFENCE: invalid read in test_invalid_access+0xdc/0x1f0 [ 93.882638] [ 93.882788] Invalid read at 0x(____ptrval____): [ 93.883903] test_invalid_access+0xdc/0x1f0 [ 93.888128] kunit_try_run_case+0x170/0x3f0 [ 93.892264] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 93.897733] kthread+0x328/0x630 [ 93.900943] ret_from_fork+0x10/0x20 [ 93.904474] [ 93.905990] CPU: 3 UID: 0 PID: 412 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 93.917101] Tainted: [B]=BAD_PAGE, [N]=TEST [ 93.921258] Hardware name: WinLink E850-96 board (DT) [ 93.926291] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_kmalloc_aligned_oob_write
[ 93.528887] ================================================================== [ 93.529030] BUG: KFENCE: memory corruption in test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 93.529030] [ 93.529179] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#214): [ 93.532862] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 93.538069] kunit_try_run_case+0x170/0x3f0 [ 93.542235] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 93.547704] kthread+0x328/0x630 [ 93.550916] ret_from_fork+0x10/0x20 [ 93.554475] [ 93.555954] kfence-#214: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96 [ 93.555954] [ 93.565590] allocated by task 406 on cpu 4 at 93.528808s (0.036780s ago): [ 93.572375] test_alloc+0x29c/0x628 [ 93.575829] test_kmalloc_aligned_oob_write+0xbc/0x2c0 [ 93.580950] kunit_try_run_case+0x170/0x3f0 [ 93.585117] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 93.590586] kthread+0x328/0x630 [ 93.593797] ret_from_fork+0x10/0x20 [ 93.597358] [ 93.598836] freed by task 406 on cpu 4 at 93.528823s (0.070009s ago): [ 93.605276] test_kmalloc_aligned_oob_write+0x214/0x2c0 [ 93.610464] kunit_try_run_case+0x170/0x3f0 [ 93.614630] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 93.620099] kthread+0x328/0x630 [ 93.623311] ret_from_fork+0x10/0x20 [ 93.626871] [ 93.628357] CPU: 4 UID: 0 PID: 406 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 93.639469] Tainted: [B]=BAD_PAGE, [N]=TEST [ 93.643623] Hardware name: WinLink E850-96 board (DT) [ 93.648660] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_kmalloc_aligned_oob_read
[ 92.796855] ================================================================== [ 92.796996] BUG: KFENCE: out-of-bounds read in test_kmalloc_aligned_oob_read+0x238/0x468 [ 92.796996] [ 92.797154] Out-of-bounds read at 0x(____ptrval____) (105B right of kfence-#207): [ 92.798834] test_kmalloc_aligned_oob_read+0x238/0x468 [ 92.803953] kunit_try_run_case+0x170/0x3f0 [ 92.808120] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 92.813589] kthread+0x328/0x630 [ 92.816801] ret_from_fork+0x10/0x20 [ 92.820359] [ 92.821839] kfence-#207: 0x(____ptrval____)-0x(____ptrval____), size=73, cache=kmalloc-96 [ 92.821839] [ 92.831476] allocated by task 404 on cpu 3 at 92.796818s (0.034654s ago): [ 92.838263] test_alloc+0x29c/0x628 [ 92.841713] test_kmalloc_aligned_oob_read+0x100/0x468 [ 92.846835] kunit_try_run_case+0x170/0x3f0 [ 92.851002] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 92.856470] kthread+0x328/0x630 [ 92.859682] ret_from_fork+0x10/0x20 [ 92.863242] [ 92.864728] CPU: 3 UID: 0 PID: 404 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 92.875840] Tainted: [B]=BAD_PAGE, [N]=TEST [ 92.879995] Hardware name: WinLink E850-96 board (DT) [ 92.885032] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-test_corruption
[ 88.208893] ================================================================== [ 88.209032] BUG: KFENCE: memory corruption in test_corruption+0x1d8/0x378 [ 88.209032] [ 88.209166] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#163): [ 88.209330] test_corruption+0x1d8/0x378 [ 88.212863] kunit_try_run_case+0x170/0x3f0 [ 88.217030] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 88.222499] kthread+0x328/0x630 [ 88.225710] ret_from_fork+0x10/0x20 [ 88.229270] [ 88.230749] kfence-#163: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 88.230749] [ 88.239863] allocated by task 394 on cpu 4 at 88.208814s (0.031047s ago): [ 88.246646] test_alloc+0x230/0x628 [ 88.250103] test_corruption+0x198/0x378 [ 88.254009] kunit_try_run_case+0x170/0x3f0 [ 88.258176] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 88.263644] kthread+0x328/0x630 [ 88.266856] ret_from_fork+0x10/0x20 [ 88.270416] [ 88.271893] freed by task 394 on cpu 4 at 88.208830s (0.063060s ago): [ 88.278332] test_corruption+0x1d8/0x378 [ 88.282220] kunit_try_run_case+0x170/0x3f0 [ 88.286387] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 88.291856] kthread+0x328/0x630 [ 88.295067] ret_from_fork+0x10/0x20 [ 88.298628] [ 88.300113] CPU: 4 UID: 0 PID: 394 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 88.311223] Tainted: [B]=BAD_PAGE, [N]=TEST [ 88.315381] Hardware name: WinLink E850-96 board (DT) [ 88.320418] ================================================================== [ 87.436857] ================================================================== [ 87.436991] BUG: KFENCE: memory corruption in test_corruption+0x278/0x378 [ 87.436991] [ 87.437126] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#156): [ 87.439522] test_corruption+0x278/0x378 [ 87.443427] kunit_try_run_case+0x170/0x3f0 [ 87.447594] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 87.453062] kthread+0x328/0x630 [ 87.456275] ret_from_fork+0x10/0x20 [ 87.459833] [ 87.461313] kfence-#156: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 87.461313] [ 87.470950] allocated by task 392 on cpu 3 at 87.436784s (0.034162s ago): [ 87.477730] test_alloc+0x29c/0x628 [ 87.481187] test_corruption+0xdc/0x378 [ 87.485007] kunit_try_run_case+0x170/0x3f0 [ 87.489173] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 87.494642] kthread+0x328/0x630 [ 87.497854] ret_from_fork+0x10/0x20 [ 87.501414] [ 87.502889] freed by task 392 on cpu 3 at 87.436800s (0.066087s ago): [ 87.509329] test_corruption+0x278/0x378 [ 87.513218] kunit_try_run_case+0x170/0x3f0 [ 87.517385] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 87.522853] kthread+0x328/0x630 [ 87.526065] ret_from_fork+0x10/0x20 [ 87.529626] [ 87.531111] CPU: 3 UID: 0 PID: 392 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 87.542218] Tainted: [B]=BAD_PAGE, [N]=TEST [ 87.546379] Hardware name: WinLink E850-96 board (DT) [ 87.551416] ================================================================== [ 87.984899] ================================================================== [ 87.985037] BUG: KFENCE: memory corruption in test_corruption+0x120/0x378 [ 87.985037] [ 87.985171] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . . . . . . . . . ] (in kfence-#161): [ 87.987570] test_corruption+0x120/0x378 [ 87.991473] kunit_try_run_case+0x170/0x3f0 [ 87.995639] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 88.001108] kthread+0x328/0x630 [ 88.004319] ret_from_fork+0x10/0x20 [ 88.007878] [ 88.009358] kfence-#161: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 88.009358] [ 88.018472] allocated by task 394 on cpu 4 at 87.984825s (0.033645s ago): [ 88.025254] test_alloc+0x230/0x628 [ 88.028712] test_corruption+0xdc/0x378 [ 88.032531] kunit_try_run_case+0x170/0x3f0 [ 88.036698] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 88.042167] kthread+0x328/0x630 [ 88.045378] ret_from_fork+0x10/0x20 [ 88.048939] [ 88.050417] freed by task 394 on cpu 4 at 87.984841s (0.065572s ago): [ 88.056854] test_corruption+0x120/0x378 [ 88.060743] kunit_try_run_case+0x170/0x3f0 [ 88.064909] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 88.070378] kthread+0x328/0x630 [ 88.073590] ret_from_fork+0x10/0x20 [ 88.077150] [ 88.078636] CPU: 4 UID: 0 PID: 394 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 88.089747] Tainted: [B]=BAD_PAGE, [N]=TEST [ 88.093903] Hardware name: WinLink E850-96 board (DT) [ 88.098940] ================================================================== [ 87.764907] ================================================================== [ 87.765042] BUG: KFENCE: memory corruption in test_corruption+0x284/0x378 [ 87.765042] [ 87.765179] Corrupted memory at 0x(____ptrval____) [ ! ] (in kfence-#159): [ 87.765339] test_corruption+0x284/0x378 [ 87.768874] kunit_try_run_case+0x170/0x3f0 [ 87.773041] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 87.778509] kthread+0x328/0x630 [ 87.781721] ret_from_fork+0x10/0x20 [ 87.785280] [ 87.786759] kfence-#159: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 87.786759] [ 87.796395] allocated by task 392 on cpu 3 at 87.764832s (0.031561s ago): [ 87.803177] test_alloc+0x29c/0x628 [ 87.806634] test_corruption+0x198/0x378 [ 87.810540] kunit_try_run_case+0x170/0x3f0 [ 87.814707] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 87.820175] kthread+0x328/0x630 [ 87.823387] ret_from_fork+0x10/0x20 [ 87.826948] [ 87.828426] freed by task 392 on cpu 3 at 87.764848s (0.063574s ago): [ 87.834863] test_corruption+0x284/0x378 [ 87.838751] kunit_try_run_case+0x170/0x3f0 [ 87.842918] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 87.848387] kthread+0x328/0x630 [ 87.851598] ret_from_fork+0x10/0x20 [ 87.855159] [ 87.856645] CPU: 3 UID: 0 PID: 392 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 87.867753] Tainted: [B]=BAD_PAGE, [N]=TEST [ 87.871912] Hardware name: WinLink E850-96 board (DT) [ 87.876949] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_invalid_addr_free
[ 87.228879] ================================================================== [ 87.229019] BUG: KFENCE: invalid free in test_invalid_addr_free+0xec/0x238 [ 87.229019] [ 87.229153] Invalid free of 0x(____ptrval____) (in kfence-#154): [ 87.229256] test_invalid_addr_free+0xec/0x238 [ 87.232589] kunit_try_run_case+0x170/0x3f0 [ 87.236756] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 87.242224] kthread+0x328/0x630 [ 87.245436] ret_from_fork+0x10/0x20 [ 87.248995] [ 87.250474] kfence-#154: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 87.250474] [ 87.259591] allocated by task 390 on cpu 4 at 87.228820s (0.030767s ago): [ 87.266371] test_alloc+0x230/0x628 [ 87.269829] test_invalid_addr_free+0xd4/0x238 [ 87.274255] kunit_try_run_case+0x170/0x3f0 [ 87.278422] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 87.283890] kthread+0x328/0x630 [ 87.287102] ret_from_fork+0x10/0x20 [ 87.290663] [ 87.292147] CPU: 4 UID: 0 PID: 390 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 87.303255] Tainted: [B]=BAD_PAGE, [N]=TEST [ 87.307415] Hardware name: WinLink E850-96 board (DT) [ 87.312453] ================================================================== [ 87.020880] ================================================================== [ 87.021010] BUG: KFENCE: invalid free in test_invalid_addr_free+0x1ac/0x238 [ 87.021010] [ 87.021150] Invalid free of 0x(____ptrval____) (in kfence-#152): [ 87.021253] test_invalid_addr_free+0x1ac/0x238 [ 87.024755] kunit_try_run_case+0x170/0x3f0 [ 87.028921] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 87.034390] kthread+0x328/0x630 [ 87.037601] ret_from_fork+0x10/0x20 [ 87.041161] [ 87.042641] kfence-#152: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 87.042641] [ 87.052274] allocated by task 388 on cpu 3 at 87.020822s (0.031450s ago): [ 87.059059] test_alloc+0x29c/0x628 [ 87.062515] test_invalid_addr_free+0xd4/0x238 [ 87.066942] kunit_try_run_case+0x170/0x3f0 [ 87.071108] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 87.076577] kthread+0x328/0x630 [ 87.079789] ret_from_fork+0x10/0x20 [ 87.083349] [ 87.084835] CPU: 3 UID: 0 PID: 388 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 87.095947] Tainted: [B]=BAD_PAGE, [N]=TEST [ 87.100102] Hardware name: WinLink E850-96 board (DT) [ 87.105139] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-invalid-free-in-test_double_free
[ 86.580891] ================================================================== [ 86.581033] BUG: KFENCE: invalid free in test_double_free+0x1bc/0x238 [ 86.581033] [ 86.581164] Invalid free of 0x(____ptrval____) (in kfence-#148): [ 86.581267] test_double_free+0x1bc/0x238 [ 86.583736] kunit_try_run_case+0x170/0x3f0 [ 86.587903] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 86.593371] kthread+0x328/0x630 [ 86.596582] ret_from_fork+0x10/0x20 [ 86.600141] [ 86.601621] kfence-#148: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 86.601621] [ 86.611258] allocated by task 384 on cpu 4 at 86.580809s (0.030445s ago): [ 86.618039] test_alloc+0x29c/0x628 [ 86.621495] test_double_free+0xd4/0x238 [ 86.625402] kunit_try_run_case+0x170/0x3f0 [ 86.629568] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 86.635037] kthread+0x328/0x630 [ 86.638249] ret_from_fork+0x10/0x20 [ 86.641809] [ 86.643285] freed by task 384 on cpu 4 at 86.580825s (0.062458s ago): [ 86.649724] test_double_free+0x1ac/0x238 [ 86.653700] kunit_try_run_case+0x170/0x3f0 [ 86.657866] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 86.663335] kthread+0x328/0x630 [ 86.666546] ret_from_fork+0x10/0x20 [ 86.670107] [ 86.671593] CPU: 4 UID: 0 PID: 384 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 86.682703] Tainted: [B]=BAD_PAGE, [N]=TEST [ 86.686860] Hardware name: WinLink E850-96 board (DT) [ 86.691897] ================================================================== [ 86.800892] ================================================================== [ 86.801018] BUG: KFENCE: invalid free in test_double_free+0x100/0x238 [ 86.801018] [ 86.801149] Invalid free of 0x(____ptrval____) (in kfence-#150): [ 86.801250] test_double_free+0x100/0x238 [ 86.803723] kunit_try_run_case+0x170/0x3f0 [ 86.807889] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 86.813358] kthread+0x328/0x630 [ 86.816570] ret_from_fork+0x10/0x20 [ 86.820129] [ 86.821609] kfence-#150: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 86.821609] [ 86.830720] allocated by task 386 on cpu 3 at 86.800816s (0.029902s ago): [ 86.837506] test_alloc+0x230/0x628 [ 86.840962] test_double_free+0xd4/0x238 [ 86.844868] kunit_try_run_case+0x170/0x3f0 [ 86.849035] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 86.854503] kthread+0x328/0x630 [ 86.857715] ret_from_fork+0x10/0x20 [ 86.861276] [ 86.862751] freed by task 386 on cpu 3 at 86.800831s (0.061917s ago): [ 86.869192] test_double_free+0xf0/0x238 [ 86.873080] kunit_try_run_case+0x170/0x3f0 [ 86.877246] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 86.882715] kthread+0x328/0x630 [ 86.885927] ret_from_fork+0x10/0x20 [ 86.889486] [ 86.890971] CPU: 3 UID: 0 PID: 386 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 86.902084] Tainted: [B]=BAD_PAGE, [N]=TEST [ 86.906240] Hardware name: WinLink E850-96 board (DT) [ 86.911277] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-use-after-free-read-in-test_use_after_free_read
[ 85.924874] ================================================================== [ 85.925009] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 85.925009] [ 85.925172] Use-after-free read at 0x(____ptrval____) (in kfence-#142): [ 85.925631] test_use_after_free_read+0x114/0x248 [ 85.930317] kunit_try_run_case+0x170/0x3f0 [ 85.934484] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 85.939952] kthread+0x328/0x630 [ 85.943164] ret_from_fork+0x10/0x20 [ 85.946723] [ 85.948203] kfence-#142: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 85.948203] [ 85.957836] allocated by task 376 on cpu 3 at 85.924814s (0.033020s ago): [ 85.964625] test_alloc+0x29c/0x628 [ 85.968077] test_use_after_free_read+0xd0/0x248 [ 85.972678] kunit_try_run_case+0x170/0x3f0 [ 85.976844] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 85.982313] kthread+0x328/0x630 [ 85.985525] ret_from_fork+0x10/0x20 [ 85.989085] [ 85.990563] freed by task 376 on cpu 3 at 85.924831s (0.065728s ago): [ 85.997002] test_use_after_free_read+0x1c0/0x248 [ 86.001670] kunit_try_run_case+0x170/0x3f0 [ 86.005837] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 86.011306] kthread+0x328/0x630 [ 86.014517] ret_from_fork+0x10/0x20 [ 86.018078] [ 86.019564] CPU: 3 UID: 0 PID: 376 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 86.030675] Tainted: [B]=BAD_PAGE, [N]=TEST [ 86.034831] Hardware name: WinLink E850-96 board (DT) [ 86.039866] ================================================================== [ 86.148882] ================================================================== [ 86.149024] BUG: KFENCE: use-after-free read in test_use_after_free_read+0x114/0x248 [ 86.149024] [ 86.149184] Use-after-free read at 0x(____ptrval____) (in kfence-#144): [ 86.149646] test_use_after_free_read+0x114/0x248 [ 86.154332] kunit_try_run_case+0x170/0x3f0 [ 86.158499] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 86.163967] kthread+0x328/0x630 [ 86.167179] ret_from_fork+0x10/0x20 [ 86.170738] [ 86.172218] kfence-#144: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 86.172218] [ 86.181331] allocated by task 378 on cpu 4 at 86.148822s (0.032507s ago): [ 86.188119] test_alloc+0x230/0x628 [ 86.191572] test_use_after_free_read+0xd0/0x248 [ 86.196172] kunit_try_run_case+0x170/0x3f0 [ 86.200338] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 86.205807] kthread+0x328/0x630 [ 86.209019] ret_from_fork+0x10/0x20 [ 86.212580] [ 86.214056] freed by task 378 on cpu 4 at 86.148838s (0.065216s ago): [ 86.220497] test_use_after_free_read+0xf0/0x248 [ 86.225078] kunit_try_run_case+0x170/0x3f0 [ 86.229245] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 86.234713] kthread+0x328/0x630 [ 86.237924] ret_from_fork+0x10/0x20 [ 86.241485] [ 86.242970] CPU: 4 UID: 0 PID: 378 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 86.254078] Tainted: [B]=BAD_PAGE, [N]=TEST [ 86.258238] Hardware name: WinLink E850-96 board (DT) [ 86.263274] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-write-in-test_out_of_bounds_write
[ 85.508858] ================================================================== [ 85.508995] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 85.508995] [ 85.509158] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#138): [ 85.510310] test_out_of_bounds_write+0x100/0x240 [ 85.514997] kunit_try_run_case+0x170/0x3f0 [ 85.519163] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 85.524632] kthread+0x328/0x630 [ 85.527843] ret_from_fork+0x10/0x20 [ 85.531402] [ 85.532882] kfence-#138: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 85.532882] [ 85.542514] allocated by task 372 on cpu 3 at 85.508821s (0.033691s ago): [ 85.549303] test_alloc+0x29c/0x628 [ 85.552756] test_out_of_bounds_write+0xc8/0x240 [ 85.557357] kunit_try_run_case+0x170/0x3f0 [ 85.561524] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 85.566992] kthread+0x328/0x630 [ 85.570204] ret_from_fork+0x10/0x20 [ 85.573765] [ 85.575251] CPU: 3 UID: 0 PID: 372 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 85.586363] Tainted: [B]=BAD_PAGE, [N]=TEST [ 85.590518] Hardware name: WinLink E850-96 board (DT) [ 85.595555] ================================================================== [ 85.716864] ================================================================== [ 85.717008] BUG: KFENCE: out-of-bounds write in test_out_of_bounds_write+0x100/0x240 [ 85.717008] [ 85.717165] Out-of-bounds write at 0x(____ptrval____) (1B left of kfence-#140): [ 85.718324] test_out_of_bounds_write+0x100/0x240 [ 85.723010] kunit_try_run_case+0x170/0x3f0 [ 85.727177] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 85.732645] kthread+0x328/0x630 [ 85.735857] ret_from_fork+0x10/0x20 [ 85.739416] [ 85.740895] kfence-#140: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 85.740895] [ 85.750009] allocated by task 374 on cpu 5 at 85.716828s (0.033178s ago): [ 85.756797] test_alloc+0x230/0x628 [ 85.760249] test_out_of_bounds_write+0xc8/0x240 [ 85.764850] kunit_try_run_case+0x170/0x3f0 [ 85.769016] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 85.774485] kthread+0x328/0x630 [ 85.777697] ret_from_fork+0x10/0x20 [ 85.781257] [ 85.782742] CPU: 5 UID: 0 PID: 374 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 85.793854] Tainted: [B]=BAD_PAGE, [N]=TEST [ 85.798010] Hardware name: WinLink E850-96 board (DT) [ 85.803047] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-out-of-bounds-read-in-test_out_of_bounds_read
[ 84.660823] ================================================================== [ 84.666113] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 84.666113] [ 84.675139] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#130): [ 84.682516] test_out_of_bounds_read+0x1c8/0x3e0 [ 84.687116] kunit_try_run_case+0x170/0x3f0 [ 84.691283] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 84.696751] kthread+0x328/0x630 [ 84.699963] ret_from_fork+0x10/0x20 [ 84.703522] [ 84.704999] kfence-#130: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 84.704999] [ 84.714634] allocated by task 368 on cpu 6 at 84.660792s (0.053839s ago): [ 84.721423] test_alloc+0x29c/0x628 [ 84.724876] test_out_of_bounds_read+0x198/0x3e0 [ 84.729477] kunit_try_run_case+0x170/0x3f0 [ 84.733644] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 84.739112] kthread+0x328/0x630 [ 84.742324] ret_from_fork+0x10/0x20 [ 84.745883] [ 84.747367] CPU: 6 UID: 0 PID: 368 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 84.758478] Tainted: [B]=BAD_PAGE, [N]=TEST [ 84.762637] Hardware name: WinLink E850-96 board (DT) [ 84.767674] ================================================================== [ 85.188812] ================================================================== [ 85.194370] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x1c8/0x3e0 [ 85.194370] [ 85.203397] Out-of-bounds read at 0x(____ptrval____) (32B right of kfence-#135): [ 85.210774] test_out_of_bounds_read+0x1c8/0x3e0 [ 85.215375] kunit_try_run_case+0x170/0x3f0 [ 85.219541] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 85.225010] kthread+0x328/0x630 [ 85.228221] ret_from_fork+0x10/0x20 [ 85.231780] [ 85.233256] kfence-#135: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 85.233256] [ 85.242371] allocated by task 370 on cpu 0 at 85.188786s (0.053583s ago): [ 85.249157] test_alloc+0x230/0x628 [ 85.252613] test_out_of_bounds_read+0x198/0x3e0 [ 85.257214] kunit_try_run_case+0x170/0x3f0 [ 85.261381] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 85.266849] kthread+0x328/0x630 [ 85.270061] ret_from_fork+0x10/0x20 [ 85.273621] [ 85.275103] CPU: 0 UID: 0 PID: 370 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 85.286215] Tainted: [B]=BAD_PAGE, [N]=TEST [ 85.290373] Hardware name: WinLink E850-96 board (DT) [ 85.295409] ================================================================== [ 85.084839] ================================================================== [ 85.084983] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 85.084983] [ 85.085139] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#134): [ 85.086037] test_out_of_bounds_read+0x114/0x3e0 [ 85.090637] kunit_try_run_case+0x170/0x3f0 [ 85.094803] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 85.100272] kthread+0x328/0x630 [ 85.103484] ret_from_fork+0x10/0x20 [ 85.107043] [ 85.108523] kfence-#134: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=test [ 85.108523] [ 85.117636] allocated by task 370 on cpu 0 at 85.084803s (0.032832s ago): [ 85.124423] test_alloc+0x230/0x628 [ 85.127876] test_out_of_bounds_read+0xdc/0x3e0 [ 85.132390] kunit_try_run_case+0x170/0x3f0 [ 85.136556] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 85.142025] kthread+0x328/0x630 [ 85.145237] ret_from_fork+0x10/0x20 [ 85.148797] [ 85.150282] CPU: 0 UID: 0 PID: 370 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 85.161390] Tainted: [B]=BAD_PAGE, [N]=TEST [ 85.165550] Hardware name: WinLink E850-96 board (DT) [ 85.170587] ================================================================== [ 84.556840] ================================================================== [ 84.556985] BUG: KFENCE: out-of-bounds read in test_out_of_bounds_read+0x114/0x3e0 [ 84.556985] [ 84.557144] Out-of-bounds read at 0x(____ptrval____) (1B left of kfence-#129): [ 84.558039] test_out_of_bounds_read+0x114/0x3e0 [ 84.562639] kunit_try_run_case+0x170/0x3f0 [ 84.566805] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 84.572274] kthread+0x328/0x630 [ 84.575486] ret_from_fork+0x10/0x20 [ 84.579045] [ 84.580524] kfence-#129: 0x(____ptrval____)-0x(____ptrval____), size=32, cache=kmalloc-32 [ 84.580524] [ 84.590158] allocated by task 368 on cpu 6 at 84.556804s (0.033352s ago): [ 84.596946] test_alloc+0x29c/0x628 [ 84.600399] test_out_of_bounds_read+0xdc/0x3e0 [ 84.604913] kunit_try_run_case+0x170/0x3f0 [ 84.609079] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 84.614548] kthread+0x328/0x630 [ 84.617760] ret_from_fork+0x10/0x20 [ 84.621320] [ 84.622805] CPU: 6 UID: 0 PID: 368 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 84.633918] Tainted: [B]=BAD_PAGE, [N]=TEST [ 84.638073] Hardware name: WinLink E850-96 board (DT) [ 84.643110] ==================================================================
Failure - log-parser-boot/kfence-bug-kfence-memory-corruption-in-kmalloc_track_caller_oob_right
[ 37.728318] ================================================================== [ 37.751012] BUG: KFENCE: memory corruption in kmalloc_track_caller_oob_right+0x224/0x488 [ 37.751012] [ 37.760559] Corrupted memory at 0x(____ptrval____) [ ! . . . . . . . ] (in kfence-#60): [ 37.768545] kmalloc_track_caller_oob_right+0x224/0x488 [ 37.773753] kunit_try_run_case+0x170/0x3f0 [ 37.777920] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.783388] kthread+0x328/0x630 [ 37.786600] ret_from_fork+0x10/0x20 [ 37.790159] [ 37.791638] kfence-#60: 0x(____ptrval____)-0x(____ptrval____), size=120, cache=kmalloc-128 [ 37.791638] [ 37.801362] allocated by task 223 on cpu 3 at 37.727961s (0.073397s ago): [ 37.808144] kmalloc_track_caller_oob_right+0x184/0x488 [ 37.813336] kunit_try_run_case+0x170/0x3f0 [ 37.817502] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.822971] kthread+0x328/0x630 [ 37.826183] ret_from_fork+0x10/0x20 [ 37.829743] [ 37.831218] freed by task 223 on cpu 3 at 37.728272s (0.102944s ago): [ 37.837661] kmalloc_track_caller_oob_right+0x224/0x488 [ 37.842849] kunit_try_run_case+0x170/0x3f0 [ 37.847016] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.852485] kthread+0x328/0x630 [ 37.855696] ret_from_fork+0x10/0x20 [ 37.859257] [ 37.860741] CPU: 3 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 37.871850] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.876009] Hardware name: WinLink E850-96 board (DT) [ 37.881047] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-strncpy_from_user
[ 83.628439] ================================================================== [ 83.635543] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x3c/0x2a0 [ 83.642398] Write of size 121 at addr ffff000800de4900 by task kunit_try_catch/366 [ 83.649949] [ 83.651432] CPU: 6 UID: 0 PID: 366 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 83.651481] Tainted: [B]=BAD_PAGE, [N]=TEST [ 83.651497] Hardware name: WinLink E850-96 board (DT) [ 83.651517] Call trace: [ 83.651531] show_stack+0x20/0x38 (C) [ 83.651567] dump_stack_lvl+0x8c/0xd0 [ 83.651599] print_report+0x118/0x5d0 [ 83.651628] kasan_report+0xdc/0x128 [ 83.651656] kasan_check_range+0x100/0x1a8 [ 83.651685] __kasan_check_write+0x20/0x30 [ 83.651715] strncpy_from_user+0x3c/0x2a0 [ 83.651748] copy_user_test_oob+0x5c0/0xec8 [ 83.651783] kunit_try_run_case+0x170/0x3f0 [ 83.651811] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 83.651844] kthread+0x328/0x630 [ 83.651873] ret_from_fork+0x10/0x20 [ 83.651907] [ 83.722865] Allocated by task 366: [ 83.726252] kasan_save_stack+0x3c/0x68 [ 83.730070] kasan_save_track+0x20/0x40 [ 83.733889] kasan_save_alloc_info+0x40/0x58 [ 83.738143] __kasan_kmalloc+0xd4/0xd8 [ 83.741875] __kmalloc_noprof+0x198/0x4c8 [ 83.745867] kunit_kmalloc_array+0x34/0x88 [ 83.749948] copy_user_test_oob+0xac/0xec8 [ 83.754028] kunit_try_run_case+0x170/0x3f0 [ 83.758194] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 83.763663] kthread+0x328/0x630 [ 83.766874] ret_from_fork+0x10/0x20 [ 83.770434] [ 83.771909] The buggy address belongs to the object at ffff000800de4900 [ 83.771909] which belongs to the cache kmalloc-128 of size 128 [ 83.784409] The buggy address is located 0 bytes inside of [ 83.784409] allocated 120-byte region [ffff000800de4900, ffff000800de4978) [ 83.796822] [ 83.798299] The buggy address belongs to the physical page: [ 83.803857] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880de4 [ 83.811839] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 83.819477] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 83.826422] page_type: f5(slab) [ 83.829557] raw: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122 [ 83.837279] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 83.845006] head: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122 [ 83.852817] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 83.860630] head: 0bfffe0000000001 fffffdffe0037901 00000000ffffffff 00000000ffffffff [ 83.868442] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 83.876248] page dumped because: kasan: bad access detected [ 83.881803] [ 83.883279] Memory state around the buggy address: [ 83.888057] ffff000800de4800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 83.895262] ffff000800de4880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.902467] >ffff000800de4900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 83.909667] ^ [ 83.916789] ffff000800de4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.923994] ffff000800de4a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.931195] ================================================================== [ 83.938678] ================================================================== [ 83.945607] BUG: KASAN: slab-out-of-bounds in strncpy_from_user+0x270/0x2a0 [ 83.952551] Write of size 1 at addr ffff000800de4978 by task kunit_try_catch/366 [ 83.959927] [ 83.961408] CPU: 6 UID: 0 PID: 366 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 83.961460] Tainted: [B]=BAD_PAGE, [N]=TEST [ 83.961477] Hardware name: WinLink E850-96 board (DT) [ 83.961496] Call trace: [ 83.961510] show_stack+0x20/0x38 (C) [ 83.961544] dump_stack_lvl+0x8c/0xd0 [ 83.961580] print_report+0x118/0x5d0 [ 83.961607] kasan_report+0xdc/0x128 [ 83.961636] __asan_report_store1_noabort+0x20/0x30 [ 83.961669] strncpy_from_user+0x270/0x2a0 [ 83.961700] copy_user_test_oob+0x5c0/0xec8 [ 83.961735] kunit_try_run_case+0x170/0x3f0 [ 83.961766] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 83.961799] kthread+0x328/0x630 [ 83.961828] ret_from_fork+0x10/0x20 [ 83.961859] [ 84.029631] Allocated by task 366: [ 84.033021] kasan_save_stack+0x3c/0x68 [ 84.036836] kasan_save_track+0x20/0x40 [ 84.040655] kasan_save_alloc_info+0x40/0x58 [ 84.044909] __kasan_kmalloc+0xd4/0xd8 [ 84.048641] __kmalloc_noprof+0x198/0x4c8 [ 84.052634] kunit_kmalloc_array+0x34/0x88 [ 84.056714] copy_user_test_oob+0xac/0xec8 [ 84.060794] kunit_try_run_case+0x170/0x3f0 [ 84.064960] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 84.070429] kthread+0x328/0x630 [ 84.073641] ret_from_fork+0x10/0x20 [ 84.077200] [ 84.078675] The buggy address belongs to the object at ffff000800de4900 [ 84.078675] which belongs to the cache kmalloc-128 of size 128 [ 84.091177] The buggy address is located 0 bytes to the right of [ 84.091177] allocated 120-byte region [ffff000800de4900, ffff000800de4978) [ 84.104109] [ 84.105588] The buggy address belongs to the physical page: [ 84.111144] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880de4 [ 84.119126] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 84.126766] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 84.133709] page_type: f5(slab) [ 84.136845] raw: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122 [ 84.144567] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 84.152293] head: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122 [ 84.160104] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 84.167917] head: 0bfffe0000000001 fffffdffe0037901 00000000ffffffff 00000000ffffffff [ 84.175729] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 84.183535] page dumped because: kasan: bad access detected [ 84.189090] [ 84.190566] Memory state around the buggy address: [ 84.195344] ffff000800de4800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 84.202549] ffff000800de4880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.209753] >ffff000800de4900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 84.216955] ^ [ 84.224076] ffff000800de4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.231281] ffff000800de4a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 84.238482] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-copy_user_test_oob
[ 83.322358] ================================================================== [ 83.329470] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x4a0/0xec8 [ 83.336501] Read of size 121 at addr ffff000800de4900 by task kunit_try_catch/366 [ 83.343964] [ 83.345446] CPU: 6 UID: 0 PID: 366 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 83.345500] Tainted: [B]=BAD_PAGE, [N]=TEST [ 83.345517] Hardware name: WinLink E850-96 board (DT) [ 83.345537] Call trace: [ 83.345550] show_stack+0x20/0x38 (C) [ 83.345580] dump_stack_lvl+0x8c/0xd0 [ 83.345614] print_report+0x118/0x5d0 [ 83.345640] kasan_report+0xdc/0x128 [ 83.345665] kasan_check_range+0x100/0x1a8 [ 83.345698] __kasan_check_read+0x20/0x30 [ 83.345727] copy_user_test_oob+0x4a0/0xec8 [ 83.345761] kunit_try_run_case+0x170/0x3f0 [ 83.345795] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 83.345828] kthread+0x328/0x630 [ 83.345856] ret_from_fork+0x10/0x20 [ 83.345888] [ 83.412800] Allocated by task 366: [ 83.416185] kasan_save_stack+0x3c/0x68 [ 83.420005] kasan_save_track+0x20/0x40 [ 83.423824] kasan_save_alloc_info+0x40/0x58 [ 83.428078] __kasan_kmalloc+0xd4/0xd8 [ 83.431810] __kmalloc_noprof+0x198/0x4c8 [ 83.435803] kunit_kmalloc_array+0x34/0x88 [ 83.439883] copy_user_test_oob+0xac/0xec8 [ 83.443963] kunit_try_run_case+0x170/0x3f0 [ 83.448129] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 83.453598] kthread+0x328/0x630 [ 83.456810] ret_from_fork+0x10/0x20 [ 83.460369] [ 83.461846] The buggy address belongs to the object at ffff000800de4900 [ 83.461846] which belongs to the cache kmalloc-128 of size 128 [ 83.474345] The buggy address is located 0 bytes inside of [ 83.474345] allocated 120-byte region [ffff000800de4900, ffff000800de4978) [ 83.486757] [ 83.488235] The buggy address belongs to the physical page: [ 83.493792] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880de4 [ 83.501775] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 83.509413] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 83.516357] page_type: f5(slab) [ 83.519490] raw: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122 [ 83.527215] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 83.534941] head: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122 [ 83.542753] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 83.550565] head: 0bfffe0000000001 fffffdffe0037901 00000000ffffffff 00000000ffffffff [ 83.558377] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 83.566183] page dumped because: kasan: bad access detected [ 83.571738] [ 83.573214] Memory state around the buggy address: [ 83.577992] ffff000800de4800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 83.585197] ffff000800de4880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.592402] >ffff000800de4900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 83.599603] ^ [ 83.606724] ffff000800de4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.613929] ffff000800de4a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.621130] ================================================================== [ 81.786197] ================================================================== [ 81.798593] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x234/0xec8 [ 81.805621] Write of size 121 at addr ffff000800de4900 by task kunit_try_catch/366 [ 81.813171] [ 81.814659] CPU: 6 UID: 0 PID: 366 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 81.814721] Tainted: [B]=BAD_PAGE, [N]=TEST [ 81.814740] Hardware name: WinLink E850-96 board (DT) [ 81.814763] Call trace: [ 81.814777] show_stack+0x20/0x38 (C) [ 81.814817] dump_stack_lvl+0x8c/0xd0 [ 81.814854] print_report+0x118/0x5d0 [ 81.814884] kasan_report+0xdc/0x128 [ 81.814911] kasan_check_range+0x100/0x1a8 [ 81.814944] __kasan_check_write+0x20/0x30 [ 81.814978] copy_user_test_oob+0x234/0xec8 [ 81.815014] kunit_try_run_case+0x170/0x3f0 [ 81.815045] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 81.815082] kthread+0x328/0x630 [ 81.815111] ret_from_fork+0x10/0x20 [ 81.815147] [ 81.882096] Allocated by task 366: [ 81.885480] kasan_save_stack+0x3c/0x68 [ 81.889298] kasan_save_track+0x20/0x40 [ 81.893118] kasan_save_alloc_info+0x40/0x58 [ 81.897371] __kasan_kmalloc+0xd4/0xd8 [ 81.901104] __kmalloc_noprof+0x198/0x4c8 [ 81.905097] kunit_kmalloc_array+0x34/0x88 [ 81.909178] copy_user_test_oob+0xac/0xec8 [ 81.913256] kunit_try_run_case+0x170/0x3f0 [ 81.917423] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 81.922892] kthread+0x328/0x630 [ 81.926104] ret_from_fork+0x10/0x20 [ 81.929662] [ 81.931140] The buggy address belongs to the object at ffff000800de4900 [ 81.931140] which belongs to the cache kmalloc-128 of size 128 [ 81.943641] The buggy address is located 0 bytes inside of [ 81.943641] allocated 120-byte region [ffff000800de4900, ffff000800de4978) [ 81.956051] [ 81.957531] The buggy address belongs to the physical page: [ 81.963087] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880de4 [ 81.971070] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 81.978711] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 81.985652] page_type: f5(slab) [ 81.988789] raw: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122 [ 81.996509] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 82.004238] head: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122 [ 82.012046] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 82.019859] head: 0bfffe0000000001 fffffdffe0037901 00000000ffffffff 00000000ffffffff [ 82.027671] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 82.035478] page dumped because: kasan: bad access detected [ 82.041032] [ 82.042508] Memory state around the buggy address: [ 82.047289] ffff000800de4800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 82.054492] ffff000800de4880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.061695] >ffff000800de4900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 82.068896] ^ [ 82.076018] ffff000800de4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.083224] ffff000800de4a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.090426] ================================================================== [ 82.710049] ================================================================== [ 82.717152] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x3c8/0xec8 [ 82.724183] Read of size 121 at addr ffff000800de4900 by task kunit_try_catch/366 [ 82.731647] [ 82.733131] CPU: 7 UID: 0 PID: 366 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 82.733183] Tainted: [B]=BAD_PAGE, [N]=TEST [ 82.733200] Hardware name: WinLink E850-96 board (DT) [ 82.733222] Call trace: [ 82.733234] show_stack+0x20/0x38 (C) [ 82.733269] dump_stack_lvl+0x8c/0xd0 [ 82.733304] print_report+0x118/0x5d0 [ 82.733332] kasan_report+0xdc/0x128 [ 82.733358] kasan_check_range+0x100/0x1a8 [ 82.733388] __kasan_check_read+0x20/0x30 [ 82.733417] copy_user_test_oob+0x3c8/0xec8 [ 82.733451] kunit_try_run_case+0x170/0x3f0 [ 82.733482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 82.733516] kthread+0x328/0x630 [ 82.733542] ret_from_fork+0x10/0x20 [ 82.733572] [ 82.800483] Allocated by task 366: [ 82.803869] kasan_save_stack+0x3c/0x68 [ 82.807688] kasan_save_track+0x20/0x40 [ 82.811507] kasan_save_alloc_info+0x40/0x58 [ 82.815760] __kasan_kmalloc+0xd4/0xd8 [ 82.819493] __kmalloc_noprof+0x198/0x4c8 [ 82.823486] kunit_kmalloc_array+0x34/0x88 [ 82.827566] copy_user_test_oob+0xac/0xec8 [ 82.831646] kunit_try_run_case+0x170/0x3f0 [ 82.835812] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 82.841281] kthread+0x328/0x630 [ 82.844493] ret_from_fork+0x10/0x20 [ 82.848052] [ 82.849529] The buggy address belongs to the object at ffff000800de4900 [ 82.849529] which belongs to the cache kmalloc-128 of size 128 [ 82.862028] The buggy address is located 0 bytes inside of [ 82.862028] allocated 120-byte region [ffff000800de4900, ffff000800de4978) [ 82.874440] [ 82.875918] The buggy address belongs to the physical page: [ 82.881475] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880de4 [ 82.889457] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 82.897096] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 82.904040] page_type: f5(slab) [ 82.907175] raw: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122 [ 82.914898] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 82.922624] head: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122 [ 82.930435] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 82.938248] head: 0bfffe0000000001 fffffdffe0037901 00000000ffffffff 00000000ffffffff [ 82.946060] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 82.953865] page dumped because: kasan: bad access detected [ 82.959421] [ 82.960897] Memory state around the buggy address: [ 82.965679] ffff000800de4800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 82.972880] ffff000800de4880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.980085] >ffff000800de4900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 82.987286] ^ [ 82.994407] ffff000800de4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.001612] ffff000800de4a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.008813] ================================================================== [ 82.097926] ================================================================== [ 82.104841] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x728/0xec8 [ 82.111865] Read of size 121 at addr ffff000800de4900 by task kunit_try_catch/366 [ 82.119330] [ 82.120815] CPU: 7 UID: 0 PID: 366 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 82.120870] Tainted: [B]=BAD_PAGE, [N]=TEST [ 82.120891] Hardware name: WinLink E850-96 board (DT) [ 82.120911] Call trace: [ 82.120926] show_stack+0x20/0x38 (C) [ 82.120963] dump_stack_lvl+0x8c/0xd0 [ 82.121000] print_report+0x118/0x5d0 [ 82.121030] kasan_report+0xdc/0x128 [ 82.121059] kasan_check_range+0x100/0x1a8 [ 82.121090] __kasan_check_read+0x20/0x30 [ 82.121121] copy_user_test_oob+0x728/0xec8 [ 82.121155] kunit_try_run_case+0x170/0x3f0 [ 82.121187] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 82.121225] kthread+0x328/0x630 [ 82.121254] ret_from_fork+0x10/0x20 [ 82.121290] [ 82.188167] Allocated by task 366: [ 82.191554] kasan_save_stack+0x3c/0x68 [ 82.195372] kasan_save_track+0x20/0x40 [ 82.199190] kasan_save_alloc_info+0x40/0x58 [ 82.203443] __kasan_kmalloc+0xd4/0xd8 [ 82.207176] __kmalloc_noprof+0x198/0x4c8 [ 82.211169] kunit_kmalloc_array+0x34/0x88 [ 82.215248] copy_user_test_oob+0xac/0xec8 [ 82.219328] kunit_try_run_case+0x170/0x3f0 [ 82.223495] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 82.228964] kthread+0x328/0x630 [ 82.232175] ret_from_fork+0x10/0x20 [ 82.235735] [ 82.237211] The buggy address belongs to the object at ffff000800de4900 [ 82.237211] which belongs to the cache kmalloc-128 of size 128 [ 82.249711] The buggy address is located 0 bytes inside of [ 82.249711] allocated 120-byte region [ffff000800de4900, ffff000800de4978) [ 82.262123] [ 82.263602] The buggy address belongs to the physical page: [ 82.269159] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880de4 [ 82.277142] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 82.284781] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 82.291724] page_type: f5(slab) [ 82.294860] raw: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122 [ 82.302580] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 82.310308] head: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122 [ 82.318118] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 82.325931] head: 0bfffe0000000001 fffffdffe0037901 00000000ffffffff 00000000ffffffff [ 82.333743] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 82.341550] page dumped because: kasan: bad access detected [ 82.347104] [ 82.348580] Memory state around the buggy address: [ 82.353359] ffff000800de4800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 82.360563] ffff000800de4880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.367768] >ffff000800de4900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 82.374968] ^ [ 82.382090] ffff000800de4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.389294] ffff000800de4a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.396496] ================================================================== [ 82.404010] ================================================================== [ 82.410910] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x35c/0xec8 [ 82.417938] Write of size 121 at addr ffff000800de4900 by task kunit_try_catch/366 [ 82.425488] [ 82.426973] CPU: 7 UID: 0 PID: 366 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 82.427033] Tainted: [B]=BAD_PAGE, [N]=TEST [ 82.427051] Hardware name: WinLink E850-96 board (DT) [ 82.427073] Call trace: [ 82.427087] show_stack+0x20/0x38 (C) [ 82.427121] dump_stack_lvl+0x8c/0xd0 [ 82.427158] print_report+0x118/0x5d0 [ 82.427186] kasan_report+0xdc/0x128 [ 82.427211] kasan_check_range+0x100/0x1a8 [ 82.427242] __kasan_check_write+0x20/0x30 [ 82.427271] copy_user_test_oob+0x35c/0xec8 [ 82.427306] kunit_try_run_case+0x170/0x3f0 [ 82.427338] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 82.427373] kthread+0x328/0x630 [ 82.427401] ret_from_fork+0x10/0x20 [ 82.427436] [ 82.494414] Allocated by task 366: [ 82.497800] kasan_save_stack+0x3c/0x68 [ 82.501616] kasan_save_track+0x20/0x40 [ 82.505435] kasan_save_alloc_info+0x40/0x58 [ 82.509689] __kasan_kmalloc+0xd4/0xd8 [ 82.513421] __kmalloc_noprof+0x198/0x4c8 [ 82.517414] kunit_kmalloc_array+0x34/0x88 [ 82.521494] copy_user_test_oob+0xac/0xec8 [ 82.525574] kunit_try_run_case+0x170/0x3f0 [ 82.529740] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 82.535209] kthread+0x328/0x630 [ 82.538421] ret_from_fork+0x10/0x20 [ 82.541979] [ 82.543457] The buggy address belongs to the object at ffff000800de4900 [ 82.543457] which belongs to the cache kmalloc-128 of size 128 [ 82.555955] The buggy address is located 0 bytes inside of [ 82.555955] allocated 120-byte region [ffff000800de4900, ffff000800de4978) [ 82.568368] [ 82.569847] The buggy address belongs to the physical page: [ 82.575404] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880de4 [ 82.583387] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 82.591027] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 82.597970] page_type: f5(slab) [ 82.601107] raw: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122 [ 82.608826] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 82.616552] head: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122 [ 82.624363] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 82.632176] head: 0bfffe0000000001 fffffdffe0037901 00000000ffffffff 00000000ffffffff [ 82.639988] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 82.647795] page dumped because: kasan: bad access detected [ 82.653349] [ 82.654825] Memory state around the buggy address: [ 82.659606] ffff000800de4800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 82.666810] ffff000800de4880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.674012] >ffff000800de4900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 82.681214] ^ [ 82.688335] ffff000800de4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.695541] ffff000800de4a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 82.702743] ================================================================== [ 83.016199] ================================================================== [ 83.023225] BUG: KASAN: slab-out-of-bounds in copy_user_test_oob+0x434/0xec8 [ 83.030256] Write of size 121 at addr ffff000800de4900 by task kunit_try_catch/366 [ 83.037806] [ 83.039289] CPU: 6 UID: 0 PID: 366 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 83.039341] Tainted: [B]=BAD_PAGE, [N]=TEST [ 83.039360] Hardware name: WinLink E850-96 board (DT) [ 83.039379] Call trace: [ 83.039392] show_stack+0x20/0x38 (C) [ 83.039425] dump_stack_lvl+0x8c/0xd0 [ 83.039460] print_report+0x118/0x5d0 [ 83.039486] kasan_report+0xdc/0x128 [ 83.039513] kasan_check_range+0x100/0x1a8 [ 83.039543] __kasan_check_write+0x20/0x30 [ 83.039572] copy_user_test_oob+0x434/0xec8 [ 83.039606] kunit_try_run_case+0x170/0x3f0 [ 83.039637] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 83.039675] kthread+0x328/0x630 [ 83.039703] ret_from_fork+0x10/0x20 [ 83.039735] [ 83.106728] Allocated by task 366: [ 83.110117] kasan_save_stack+0x3c/0x68 [ 83.113933] kasan_save_track+0x20/0x40 [ 83.117752] kasan_save_alloc_info+0x40/0x58 [ 83.122006] __kasan_kmalloc+0xd4/0xd8 [ 83.125738] __kmalloc_noprof+0x198/0x4c8 [ 83.129731] kunit_kmalloc_array+0x34/0x88 [ 83.133811] copy_user_test_oob+0xac/0xec8 [ 83.137891] kunit_try_run_case+0x170/0x3f0 [ 83.142057] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 83.147526] kthread+0x328/0x630 [ 83.150738] ret_from_fork+0x10/0x20 [ 83.154297] [ 83.155774] The buggy address belongs to the object at ffff000800de4900 [ 83.155774] which belongs to the cache kmalloc-128 of size 128 [ 83.168274] The buggy address is located 0 bytes inside of [ 83.168274] allocated 120-byte region [ffff000800de4900, ffff000800de4978) [ 83.180685] [ 83.182163] The buggy address belongs to the physical page: [ 83.187721] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880de4 [ 83.195704] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 83.203341] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 83.210286] page_type: f5(slab) [ 83.213419] raw: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122 [ 83.221143] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 83.228870] head: 0bfffe0000000040 ffff000800002a00 dead000000000100 dead000000000122 [ 83.236681] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 83.244494] head: 0bfffe0000000001 fffffdffe0037901 00000000ffffffff 00000000ffffffff [ 83.252305] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 83.260112] page dumped because: kasan: bad access detected [ 83.265667] [ 83.267142] Memory state around the buggy address: [ 83.271920] ffff000800de4800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 83.279125] ffff000800de4880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.286330] >ffff000800de4900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 83.293531] ^ [ 83.300652] ffff000800de4980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.307857] ffff000800de4a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 83.315058] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-vmalloc-out-of-bounds-in-vmalloc_oob
[ 80.734994] ================================================================== [ 80.749391] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x578/0x5d0 [ 80.756071] Read of size 1 at addr ffff800087c8d7f3 by task kunit_try_catch/350 [ 80.763361] [ 80.764845] CPU: 7 UID: 0 PID: 350 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 80.764902] Tainted: [B]=BAD_PAGE, [N]=TEST [ 80.764920] Hardware name: WinLink E850-96 board (DT) [ 80.764942] Call trace: [ 80.764959] show_stack+0x20/0x38 (C) [ 80.764996] dump_stack_lvl+0x8c/0xd0 [ 80.765032] print_report+0x310/0x5d0 [ 80.765061] kasan_report+0xdc/0x128 [ 80.765089] __asan_report_load1_noabort+0x20/0x30 [ 80.765124] vmalloc_oob+0x578/0x5d0 [ 80.765158] kunit_try_run_case+0x170/0x3f0 [ 80.765191] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 80.765229] kthread+0x328/0x630 [ 80.765258] ret_from_fork+0x10/0x20 [ 80.765295] [ 80.828294] The buggy address ffff800087c8d7f3 belongs to a vmalloc virtual mapping [ 80.835933] The buggy address belongs to the physical page: [ 80.841489] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888889 [ 80.849473] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 80.855995] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 80.863713] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 80.871434] page dumped because: kasan: bad access detected [ 80.876987] [ 80.878463] Memory state around the buggy address: [ 80.883242] ffff800087c8d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 80.890446] ffff800087c8d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 80.897650] >ffff800087c8d780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 80.904852] ^ [ 80.911714] ffff800087c8d800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 80.918917] ffff800087c8d880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 80.926120] ================================================================== [ 80.933433] ================================================================== [ 80.940531] BUG: KASAN: vmalloc-out-of-bounds in vmalloc_oob+0x51c/0x5d0 [ 80.947212] Read of size 1 at addr ffff800087c8d7f8 by task kunit_try_catch/350 [ 80.954504] [ 80.955986] CPU: 7 UID: 0 PID: 350 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 80.956042] Tainted: [B]=BAD_PAGE, [N]=TEST [ 80.956057] Hardware name: WinLink E850-96 board (DT) [ 80.956076] Call trace: [ 80.956088] show_stack+0x20/0x38 (C) [ 80.956119] dump_stack_lvl+0x8c/0xd0 [ 80.956156] print_report+0x310/0x5d0 [ 80.956185] kasan_report+0xdc/0x128 [ 80.956212] __asan_report_load1_noabort+0x20/0x30 [ 80.956244] vmalloc_oob+0x51c/0x5d0 [ 80.956275] kunit_try_run_case+0x170/0x3f0 [ 80.956306] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 80.956342] kthread+0x328/0x630 [ 80.956373] ret_from_fork+0x10/0x20 [ 80.956408] [ 81.019435] The buggy address ffff800087c8d7f8 belongs to a vmalloc virtual mapping [ 81.027076] The buggy address belongs to the physical page: [ 81.032632] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888889 [ 81.040615] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 81.047135] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 81.054856] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 81.062575] page dumped because: kasan: bad access detected [ 81.068130] [ 81.069606] Memory state around the buggy address: [ 81.074387] ffff800087c8d680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 81.081589] ffff800087c8d700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 81.088793] >ffff800087c8d780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 f8 [ 81.095995] ^ [ 81.103116] ffff800087c8d800: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 81.110321] ffff800087c8d880: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 [ 81.117522] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_atomics_helper
[ 75.442131] ================================================================== [ 75.449206] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 75.456583] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 75.463961] [ 75.465442] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 75.465492] Tainted: [B]=BAD_PAGE, [N]=TEST [ 75.465508] Hardware name: WinLink E850-96 board (DT) [ 75.465525] Call trace: [ 75.465537] show_stack+0x20/0x38 (C) [ 75.465569] dump_stack_lvl+0x8c/0xd0 [ 75.465600] print_report+0x118/0x5d0 [ 75.465627] kasan_report+0xdc/0x128 [ 75.465655] kasan_check_range+0x100/0x1a8 [ 75.465684] __kasan_check_write+0x20/0x30 [ 75.465713] kasan_atomics_helper+0x1128/0x4858 [ 75.465749] kasan_atomics+0x198/0x2e0 [ 75.465780] kunit_try_run_case+0x170/0x3f0 [ 75.465811] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.465848] kthread+0x328/0x630 [ 75.465874] ret_from_fork+0x10/0x20 [ 75.465904] [ 75.536964] Allocated by task 346: [ 75.540350] kasan_save_stack+0x3c/0x68 [ 75.544168] kasan_save_track+0x20/0x40 [ 75.547988] kasan_save_alloc_info+0x40/0x58 [ 75.552241] __kasan_kmalloc+0xd4/0xd8 [ 75.555973] __kmalloc_cache_noprof+0x16c/0x3c0 [ 75.560487] kasan_atomics+0xb8/0x2e0 [ 75.564133] kunit_try_run_case+0x170/0x3f0 [ 75.568300] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.573768] kthread+0x328/0x630 [ 75.576980] ret_from_fork+0x10/0x20 [ 75.580539] [ 75.582014] The buggy address belongs to the object at ffff00080851b080 [ 75.582014] which belongs to the cache kmalloc-64 of size 64 [ 75.594342] The buggy address is located 0 bytes to the right of [ 75.594342] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 75.607188] [ 75.608664] The buggy address belongs to the physical page: [ 75.614222] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 75.622205] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 75.628716] page_type: f5(slab) [ 75.631848] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 75.639573] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 75.647291] page dumped because: kasan: bad access detected [ 75.652847] [ 75.654322] Memory state around the buggy address: [ 75.659101] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 75.666305] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.673511] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 75.680711] ^ [ 75.685489] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.692694] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.699895] ================================================================== [ 67.255472] ================================================================== [ 67.262523] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 67.269815] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 67.277192] [ 67.278673] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 67.278724] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.278741] Hardware name: WinLink E850-96 board (DT) [ 67.278760] Call trace: [ 67.278773] show_stack+0x20/0x38 (C) [ 67.278804] dump_stack_lvl+0x8c/0xd0 [ 67.278837] print_report+0x118/0x5d0 [ 67.278864] kasan_report+0xdc/0x128 [ 67.278890] kasan_check_range+0x100/0x1a8 [ 67.278920] __kasan_check_write+0x20/0x30 [ 67.278951] kasan_atomics_helper+0x61c/0x4858 [ 67.278982] kasan_atomics+0x198/0x2e0 [ 67.279015] kunit_try_run_case+0x170/0x3f0 [ 67.279046] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.279080] kthread+0x328/0x630 [ 67.279106] ret_from_fork+0x10/0x20 [ 67.279135] [ 67.350107] Allocated by task 346: [ 67.353494] kasan_save_stack+0x3c/0x68 [ 67.357312] kasan_save_track+0x20/0x40 [ 67.361131] kasan_save_alloc_info+0x40/0x58 [ 67.365385] __kasan_kmalloc+0xd4/0xd8 [ 67.369117] __kmalloc_cache_noprof+0x16c/0x3c0 [ 67.373631] kasan_atomics+0xb8/0x2e0 [ 67.377277] kunit_try_run_case+0x170/0x3f0 [ 67.381443] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.386912] kthread+0x328/0x630 [ 67.390124] ret_from_fork+0x10/0x20 [ 67.393683] [ 67.395158] The buggy address belongs to the object at ffff00080851b080 [ 67.395158] which belongs to the cache kmalloc-64 of size 64 [ 67.407485] The buggy address is located 0 bytes to the right of [ 67.407485] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 67.420332] [ 67.421809] The buggy address belongs to the physical page: [ 67.427365] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 67.435350] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 67.441859] page_type: f5(slab) [ 67.444994] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 67.452716] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 67.460435] page dumped because: kasan: bad access detected [ 67.465991] [ 67.467466] Memory state around the buggy address: [ 67.472244] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 67.479449] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.486654] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 67.493855] ^ [ 67.498633] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.505838] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.513039] ================================================================== [ 69.106637] ================================================================== [ 69.113711] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 69.121001] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 69.128379] [ 69.129860] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 69.129910] Tainted: [B]=BAD_PAGE, [N]=TEST [ 69.129927] Hardware name: WinLink E850-96 board (DT) [ 69.129944] Call trace: [ 69.129957] show_stack+0x20/0x38 (C) [ 69.129988] dump_stack_lvl+0x8c/0xd0 [ 69.130021] print_report+0x118/0x5d0 [ 69.130048] kasan_report+0xdc/0x128 [ 69.130077] kasan_check_range+0x100/0x1a8 [ 69.130107] __kasan_check_write+0x20/0x30 [ 69.130137] kasan_atomics_helper+0x934/0x4858 [ 69.130172] kasan_atomics+0x198/0x2e0 [ 69.130204] kunit_try_run_case+0x170/0x3f0 [ 69.130233] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.130267] kthread+0x328/0x630 [ 69.130293] ret_from_fork+0x10/0x20 [ 69.130323] [ 69.201294] Allocated by task 346: [ 69.204682] kasan_save_stack+0x3c/0x68 [ 69.208499] kasan_save_track+0x20/0x40 [ 69.212318] kasan_save_alloc_info+0x40/0x58 [ 69.216572] __kasan_kmalloc+0xd4/0xd8 [ 69.220305] __kmalloc_cache_noprof+0x16c/0x3c0 [ 69.224819] kasan_atomics+0xb8/0x2e0 [ 69.228464] kunit_try_run_case+0x170/0x3f0 [ 69.232631] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.238100] kthread+0x328/0x630 [ 69.241311] ret_from_fork+0x10/0x20 [ 69.244870] [ 69.246346] The buggy address belongs to the object at ffff00080851b080 [ 69.246346] which belongs to the cache kmalloc-64 of size 64 [ 69.258672] The buggy address is located 0 bytes to the right of [ 69.258672] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 69.271519] [ 69.272995] The buggy address belongs to the physical page: [ 69.278551] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 69.286538] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 69.293046] page_type: f5(slab) [ 69.296179] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 69.303904] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 69.311623] page dumped because: kasan: bad access detected [ 69.317178] [ 69.318654] Memory state around the buggy address: [ 69.323432] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 69.330637] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.337841] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 69.345042] ^ [ 69.349821] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.357025] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.364226] ================================================================== [ 73.063867] ================================================================== [ 73.070943] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 73.078320] Read of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 73.085611] [ 73.087093] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 73.087141] Tainted: [B]=BAD_PAGE, [N]=TEST [ 73.087156] Hardware name: WinLink E850-96 board (DT) [ 73.087175] Call trace: [ 73.087186] show_stack+0x20/0x38 (C) [ 73.087216] dump_stack_lvl+0x8c/0xd0 [ 73.087249] print_report+0x118/0x5d0 [ 73.087277] kasan_report+0xdc/0x128 [ 73.087304] __asan_report_load8_noabort+0x20/0x30 [ 73.087337] kasan_atomics_helper+0x3f58/0x4858 [ 73.087374] kasan_atomics+0x198/0x2e0 [ 73.087405] kunit_try_run_case+0x170/0x3f0 [ 73.087435] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.087468] kthread+0x328/0x630 [ 73.087494] ret_from_fork+0x10/0x20 [ 73.087527] [ 73.155228] Allocated by task 346: [ 73.158615] kasan_save_stack+0x3c/0x68 [ 73.162433] kasan_save_track+0x20/0x40 [ 73.166253] kasan_save_alloc_info+0x40/0x58 [ 73.170506] __kasan_kmalloc+0xd4/0xd8 [ 73.174238] __kmalloc_cache_noprof+0x16c/0x3c0 [ 73.178752] kasan_atomics+0xb8/0x2e0 [ 73.182398] kunit_try_run_case+0x170/0x3f0 [ 73.186565] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.192034] kthread+0x328/0x630 [ 73.195245] ret_from_fork+0x10/0x20 [ 73.198804] [ 73.200280] The buggy address belongs to the object at ffff00080851b080 [ 73.200280] which belongs to the cache kmalloc-64 of size 64 [ 73.212606] The buggy address is located 0 bytes to the right of [ 73.212606] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 73.225453] [ 73.226929] The buggy address belongs to the physical page: [ 73.232485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 73.240470] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 73.246980] page_type: f5(slab) [ 73.250113] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 73.257838] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 73.265557] page dumped because: kasan: bad access detected [ 73.271112] [ 73.272588] Memory state around the buggy address: [ 73.277366] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 73.284570] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.291775] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.298976] ^ [ 73.303754] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.310959] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.318160] ================================================================== [ 76.237430] ================================================================== [ 76.244506] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 76.251884] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 76.259261] [ 76.260742] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 76.260791] Tainted: [B]=BAD_PAGE, [N]=TEST [ 76.260806] Hardware name: WinLink E850-96 board (DT) [ 76.260825] Call trace: [ 76.260838] show_stack+0x20/0x38 (C) [ 76.260869] dump_stack_lvl+0x8c/0xd0 [ 76.260901] print_report+0x118/0x5d0 [ 76.260929] kasan_report+0xdc/0x128 [ 76.260957] kasan_check_range+0x100/0x1a8 [ 76.260987] __kasan_check_write+0x20/0x30 [ 76.261019] kasan_atomics_helper+0x126c/0x4858 [ 76.261055] kasan_atomics+0x198/0x2e0 [ 76.261088] kunit_try_run_case+0x170/0x3f0 [ 76.261117] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.261150] kthread+0x328/0x630 [ 76.261176] ret_from_fork+0x10/0x20 [ 76.261204] [ 76.332264] Allocated by task 346: [ 76.335651] kasan_save_stack+0x3c/0x68 [ 76.339469] kasan_save_track+0x20/0x40 [ 76.343288] kasan_save_alloc_info+0x40/0x58 [ 76.347541] __kasan_kmalloc+0xd4/0xd8 [ 76.351274] __kmalloc_cache_noprof+0x16c/0x3c0 [ 76.355788] kasan_atomics+0xb8/0x2e0 [ 76.359434] kunit_try_run_case+0x170/0x3f0 [ 76.363600] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.369069] kthread+0x328/0x630 [ 76.372281] ret_from_fork+0x10/0x20 [ 76.375840] [ 76.377315] The buggy address belongs to the object at ffff00080851b080 [ 76.377315] which belongs to the cache kmalloc-64 of size 64 [ 76.389642] The buggy address is located 0 bytes to the right of [ 76.389642] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 76.402488] [ 76.403964] The buggy address belongs to the physical page: [ 76.409523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 76.417506] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 76.424016] page_type: f5(slab) [ 76.427149] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 76.434873] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 76.442592] page dumped because: kasan: bad access detected [ 76.448148] [ 76.449623] Memory state around the buggy address: [ 76.454401] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 76.461606] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 76.468811] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 76.476012] ^ [ 76.480790] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.487995] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.495196] ================================================================== [ 67.785320] ================================================================== [ 67.792376] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 67.799667] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 67.807045] [ 67.808527] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 67.808577] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.808591] Hardware name: WinLink E850-96 board (DT) [ 67.808609] Call trace: [ 67.808622] show_stack+0x20/0x38 (C) [ 67.808652] dump_stack_lvl+0x8c/0xd0 [ 67.808684] print_report+0x118/0x5d0 [ 67.808712] kasan_report+0xdc/0x128 [ 67.808739] kasan_check_range+0x100/0x1a8 [ 67.808769] __kasan_check_write+0x20/0x30 [ 67.808799] kasan_atomics_helper+0x6ec/0x4858 [ 67.808834] kasan_atomics+0x198/0x2e0 [ 67.808866] kunit_try_run_case+0x170/0x3f0 [ 67.808896] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.808929] kthread+0x328/0x630 [ 67.808956] ret_from_fork+0x10/0x20 [ 67.808989] [ 67.879960] Allocated by task 346: [ 67.883347] kasan_save_stack+0x3c/0x68 [ 67.887165] kasan_save_track+0x20/0x40 [ 67.890985] kasan_save_alloc_info+0x40/0x58 [ 67.895238] __kasan_kmalloc+0xd4/0xd8 [ 67.898971] __kmalloc_cache_noprof+0x16c/0x3c0 [ 67.903484] kasan_atomics+0xb8/0x2e0 [ 67.907130] kunit_try_run_case+0x170/0x3f0 [ 67.911297] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.916765] kthread+0x328/0x630 [ 67.919977] ret_from_fork+0x10/0x20 [ 67.923536] [ 67.925012] The buggy address belongs to the object at ffff00080851b080 [ 67.925012] which belongs to the cache kmalloc-64 of size 64 [ 67.937338] The buggy address is located 0 bytes to the right of [ 67.937338] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 67.950185] [ 67.951661] The buggy address belongs to the physical page: [ 67.957218] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 67.965202] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 67.971712] page_type: f5(slab) [ 67.974845] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 67.982570] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 67.990288] page dumped because: kasan: bad access detected [ 67.995844] [ 67.997319] Memory state around the buggy address: [ 68.002099] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 68.009302] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.016507] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 68.023708] ^ [ 68.028486] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.035691] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.042892] ================================================================== [ 77.032856] ================================================================== [ 77.039809] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 77.047186] Read of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 77.054475] [ 77.055959] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 77.056008] Tainted: [B]=BAD_PAGE, [N]=TEST [ 77.056025] Hardware name: WinLink E850-96 board (DT) [ 77.056044] Call trace: [ 77.056058] show_stack+0x20/0x38 (C) [ 77.056093] dump_stack_lvl+0x8c/0xd0 [ 77.056127] print_report+0x118/0x5d0 [ 77.056157] kasan_report+0xdc/0x128 [ 77.056185] __asan_report_load8_noabort+0x20/0x30 [ 77.056216] kasan_atomics_helper+0x3f04/0x4858 [ 77.056251] kasan_atomics+0x198/0x2e0 [ 77.056283] kunit_try_run_case+0x170/0x3f0 [ 77.056313] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.056346] kthread+0x328/0x630 [ 77.056372] ret_from_fork+0x10/0x20 [ 77.056404] [ 77.124093] Allocated by task 346: [ 77.127479] kasan_save_stack+0x3c/0x68 [ 77.131297] kasan_save_track+0x20/0x40 [ 77.135117] kasan_save_alloc_info+0x40/0x58 [ 77.139370] __kasan_kmalloc+0xd4/0xd8 [ 77.143103] __kmalloc_cache_noprof+0x16c/0x3c0 [ 77.147616] kasan_atomics+0xb8/0x2e0 [ 77.151262] kunit_try_run_case+0x170/0x3f0 [ 77.155429] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.160898] kthread+0x328/0x630 [ 77.164109] ret_from_fork+0x10/0x20 [ 77.167668] [ 77.169144] The buggy address belongs to the object at ffff00080851b080 [ 77.169144] which belongs to the cache kmalloc-64 of size 64 [ 77.181470] The buggy address is located 0 bytes to the right of [ 77.181470] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 77.194317] [ 77.195795] The buggy address belongs to the physical page: [ 77.201351] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 77.209334] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 77.215844] page_type: f5(slab) [ 77.218979] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 77.226702] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 77.234420] page dumped because: kasan: bad access detected [ 77.239976] [ 77.241451] Memory state around the buggy address: [ 77.246230] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 77.253434] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 77.260639] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 77.267840] ^ [ 77.272618] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.279823] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.287024] ================================================================== [ 79.408197] ================================================================== [ 79.415292] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 79.422671] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 79.430047] [ 79.431527] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 79.431575] Tainted: [B]=BAD_PAGE, [N]=TEST [ 79.431592] Hardware name: WinLink E850-96 board (DT) [ 79.431610] Call trace: [ 79.431623] show_stack+0x20/0x38 (C) [ 79.431654] dump_stack_lvl+0x8c/0xd0 [ 79.431688] print_report+0x118/0x5d0 [ 79.431716] kasan_report+0xdc/0x128 [ 79.431743] kasan_check_range+0x100/0x1a8 [ 79.431772] __kasan_check_write+0x20/0x30 [ 79.431803] kasan_atomics_helper+0x16d0/0x4858 [ 79.431838] kasan_atomics+0x198/0x2e0 [ 79.431869] kunit_try_run_case+0x170/0x3f0 [ 79.431897] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 79.431933] kthread+0x328/0x630 [ 79.431959] ret_from_fork+0x10/0x20 [ 79.431988] [ 79.503050] Allocated by task 346: [ 79.506437] kasan_save_stack+0x3c/0x68 [ 79.510255] kasan_save_track+0x20/0x40 [ 79.514074] kasan_save_alloc_info+0x40/0x58 [ 79.518327] __kasan_kmalloc+0xd4/0xd8 [ 79.522060] __kmalloc_cache_noprof+0x16c/0x3c0 [ 79.526574] kasan_atomics+0xb8/0x2e0 [ 79.530220] kunit_try_run_case+0x170/0x3f0 [ 79.534386] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 79.539855] kthread+0x328/0x630 [ 79.543067] ret_from_fork+0x10/0x20 [ 79.546625] [ 79.548101] The buggy address belongs to the object at ffff00080851b080 [ 79.548101] which belongs to the cache kmalloc-64 of size 64 [ 79.560427] The buggy address is located 0 bytes to the right of [ 79.560427] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 79.573274] [ 79.574750] The buggy address belongs to the physical page: [ 79.580307] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 79.588293] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 79.594802] page_type: f5(slab) [ 79.597934] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 79.605659] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 79.613378] page dumped because: kasan: bad access detected [ 79.618933] [ 79.620409] Memory state around the buggy address: [ 79.625187] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 79.632392] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 79.639596] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 79.646797] ^ [ 79.651576] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.658780] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.665981] ================================================================== [ 73.325521] ================================================================== [ 73.332571] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 73.339861] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 73.347239] [ 73.348722] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 73.348769] Tainted: [B]=BAD_PAGE, [N]=TEST [ 73.348784] Hardware name: WinLink E850-96 board (DT) [ 73.348801] Call trace: [ 73.348813] show_stack+0x20/0x38 (C) [ 73.348843] dump_stack_lvl+0x8c/0xd0 [ 73.348876] print_report+0x118/0x5d0 [ 73.348906] kasan_report+0xdc/0x128 [ 73.348932] kasan_check_range+0x100/0x1a8 [ 73.348961] __kasan_check_write+0x20/0x30 [ 73.348991] kasan_atomics_helper+0xe44/0x4858 [ 73.349025] kasan_atomics+0x198/0x2e0 [ 73.349058] kunit_try_run_case+0x170/0x3f0 [ 73.349088] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.349124] kthread+0x328/0x630 [ 73.349150] ret_from_fork+0x10/0x20 [ 73.349179] [ 73.420155] Allocated by task 346: [ 73.423542] kasan_save_stack+0x3c/0x68 [ 73.427360] kasan_save_track+0x20/0x40 [ 73.431179] kasan_save_alloc_info+0x40/0x58 [ 73.435433] __kasan_kmalloc+0xd4/0xd8 [ 73.439165] __kmalloc_cache_noprof+0x16c/0x3c0 [ 73.443679] kasan_atomics+0xb8/0x2e0 [ 73.447325] kunit_try_run_case+0x170/0x3f0 [ 73.451491] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.456960] kthread+0x328/0x630 [ 73.460172] ret_from_fork+0x10/0x20 [ 73.463731] [ 73.465206] The buggy address belongs to the object at ffff00080851b080 [ 73.465206] which belongs to the cache kmalloc-64 of size 64 [ 73.477533] The buggy address is located 0 bytes to the right of [ 73.477533] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 73.490379] [ 73.491855] The buggy address belongs to the physical page: [ 73.497413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 73.505397] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 73.511907] page_type: f5(slab) [ 73.515040] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 73.522764] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 73.530483] page dumped because: kasan: bad access detected [ 73.536038] [ 73.537514] Memory state around the buggy address: [ 73.542292] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 73.549497] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.556702] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.563903] ^ [ 73.568681] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.575885] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.583087] ================================================================== [ 64.347843] ================================================================== [ 64.354928] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 64.362220] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 64.369596] [ 64.371079] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 64.371132] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.371148] Hardware name: WinLink E850-96 board (DT) [ 64.371168] Call trace: [ 64.371182] show_stack+0x20/0x38 (C) [ 64.371216] dump_stack_lvl+0x8c/0xd0 [ 64.371252] print_report+0x118/0x5d0 [ 64.371279] kasan_report+0xdc/0x128 [ 64.371306] kasan_check_range+0x100/0x1a8 [ 64.371337] __kasan_check_write+0x20/0x30 [ 64.371367] kasan_atomics_helper+0x24c/0x4858 [ 64.371400] kasan_atomics+0x198/0x2e0 [ 64.371431] kunit_try_run_case+0x170/0x3f0 [ 64.371464] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.371498] kthread+0x328/0x630 [ 64.371524] ret_from_fork+0x10/0x20 [ 64.371553] [ 64.442512] Allocated by task 346: [ 64.445901] kasan_save_stack+0x3c/0x68 [ 64.449717] kasan_save_track+0x20/0x40 [ 64.453536] kasan_save_alloc_info+0x40/0x58 [ 64.457789] __kasan_kmalloc+0xd4/0xd8 [ 64.461522] __kmalloc_cache_noprof+0x16c/0x3c0 [ 64.466036] kasan_atomics+0xb8/0x2e0 [ 64.469681] kunit_try_run_case+0x170/0x3f0 [ 64.473848] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.479317] kthread+0x328/0x630 [ 64.482529] ret_from_fork+0x10/0x20 [ 64.486088] [ 64.487565] The buggy address belongs to the object at ffff00080851b080 [ 64.487565] which belongs to the cache kmalloc-64 of size 64 [ 64.499890] The buggy address is located 0 bytes to the right of [ 64.499890] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 64.512737] [ 64.514214] The buggy address belongs to the physical page: [ 64.519771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 64.527754] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 64.534264] page_type: f5(slab) [ 64.537397] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 64.545121] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.552840] page dumped because: kasan: bad access detected [ 64.558395] [ 64.559872] Memory state around the buggy address: [ 64.564654] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 64.571854] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.579059] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 64.586260] ^ [ 64.591037] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.598242] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.605443] ================================================================== [ 77.824557] ================================================================== [ 77.831636] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 77.839013] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 77.846391] [ 77.847873] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 77.847920] Tainted: [B]=BAD_PAGE, [N]=TEST [ 77.847937] Hardware name: WinLink E850-96 board (DT) [ 77.847954] Call trace: [ 77.847969] show_stack+0x20/0x38 (C) [ 77.848000] dump_stack_lvl+0x8c/0xd0 [ 77.848031] print_report+0x118/0x5d0 [ 77.848060] kasan_report+0xdc/0x128 [ 77.848089] kasan_check_range+0x100/0x1a8 [ 77.848120] __kasan_check_write+0x20/0x30 [ 77.848151] kasan_atomics_helper+0x14e4/0x4858 [ 77.848186] kasan_atomics+0x198/0x2e0 [ 77.848218] kunit_try_run_case+0x170/0x3f0 [ 77.848248] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.848282] kthread+0x328/0x630 [ 77.848309] ret_from_fork+0x10/0x20 [ 77.848339] [ 77.919393] Allocated by task 346: [ 77.922781] kasan_save_stack+0x3c/0x68 [ 77.926598] kasan_save_track+0x20/0x40 [ 77.930417] kasan_save_alloc_info+0x40/0x58 [ 77.934670] __kasan_kmalloc+0xd4/0xd8 [ 77.938403] __kmalloc_cache_noprof+0x16c/0x3c0 [ 77.942917] kasan_atomics+0xb8/0x2e0 [ 77.946563] kunit_try_run_case+0x170/0x3f0 [ 77.950729] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.956198] kthread+0x328/0x630 [ 77.959410] ret_from_fork+0x10/0x20 [ 77.962969] [ 77.964444] The buggy address belongs to the object at ffff00080851b080 [ 77.964444] which belongs to the cache kmalloc-64 of size 64 [ 77.976771] The buggy address is located 0 bytes to the right of [ 77.976771] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 77.989617] [ 77.991093] The buggy address belongs to the physical page: [ 77.996649] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 78.004635] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 78.011145] page_type: f5(slab) [ 78.014278] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 78.022002] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 78.029721] page dumped because: kasan: bad access detected [ 78.035277] [ 78.036752] Memory state around the buggy address: [ 78.041530] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 78.048735] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 78.055940] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 78.063141] ^ [ 78.067919] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.075124] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.082324] ================================================================== [ 68.050234] ================================================================== [ 68.057303] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858 [ 68.064593] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 68.071971] [ 68.073451] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 68.073500] Tainted: [B]=BAD_PAGE, [N]=TEST [ 68.073516] Hardware name: WinLink E850-96 board (DT) [ 68.073534] Call trace: [ 68.073545] show_stack+0x20/0x38 (C) [ 68.073576] dump_stack_lvl+0x8c/0xd0 [ 68.073608] print_report+0x118/0x5d0 [ 68.073636] kasan_report+0xdc/0x128 [ 68.073664] kasan_check_range+0x100/0x1a8 [ 68.073692] __kasan_check_write+0x20/0x30 [ 68.073723] kasan_atomics_helper+0x760/0x4858 [ 68.073756] kasan_atomics+0x198/0x2e0 [ 68.073791] kunit_try_run_case+0x170/0x3f0 [ 68.073820] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.073852] kthread+0x328/0x630 [ 68.073879] ret_from_fork+0x10/0x20 [ 68.073911] [ 68.144887] Allocated by task 346: [ 68.148274] kasan_save_stack+0x3c/0x68 [ 68.152092] kasan_save_track+0x20/0x40 [ 68.155911] kasan_save_alloc_info+0x40/0x58 [ 68.160164] __kasan_kmalloc+0xd4/0xd8 [ 68.163897] __kmalloc_cache_noprof+0x16c/0x3c0 [ 68.168411] kasan_atomics+0xb8/0x2e0 [ 68.172057] kunit_try_run_case+0x170/0x3f0 [ 68.176223] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.181692] kthread+0x328/0x630 [ 68.184904] ret_from_fork+0x10/0x20 [ 68.188462] [ 68.189938] The buggy address belongs to the object at ffff00080851b080 [ 68.189938] which belongs to the cache kmalloc-64 of size 64 [ 68.202265] The buggy address is located 0 bytes to the right of [ 68.202265] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 68.215111] [ 68.216587] The buggy address belongs to the physical page: [ 68.222145] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 68.230129] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 68.236639] page_type: f5(slab) [ 68.239772] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 68.247496] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 68.255215] page dumped because: kasan: bad access detected [ 68.260770] [ 68.262246] Memory state around the buggy address: [ 68.267024] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 68.274229] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.281434] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 68.288635] ^ [ 68.293413] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.300617] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.307818] ================================================================== [ 70.431290] ================================================================== [ 70.438344] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 70.445721] Read of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 70.453012] [ 70.454493] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 70.454540] Tainted: [B]=BAD_PAGE, [N]=TEST [ 70.454557] Hardware name: WinLink E850-96 board (DT) [ 70.454575] Call trace: [ 70.454588] show_stack+0x20/0x38 (C) [ 70.454618] dump_stack_lvl+0x8c/0xd0 [ 70.454649] print_report+0x118/0x5d0 [ 70.454675] kasan_report+0xdc/0x128 [ 70.454702] __asan_report_load4_noabort+0x20/0x30 [ 70.454735] kasan_atomics_helper+0x3dcc/0x4858 [ 70.454769] kasan_atomics+0x198/0x2e0 [ 70.454801] kunit_try_run_case+0x170/0x3f0 [ 70.454831] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.454865] kthread+0x328/0x630 [ 70.454891] ret_from_fork+0x10/0x20 [ 70.454921] [ 70.522629] Allocated by task 346: [ 70.526016] kasan_save_stack+0x3c/0x68 [ 70.529833] kasan_save_track+0x20/0x40 [ 70.533653] kasan_save_alloc_info+0x40/0x58 [ 70.537907] __kasan_kmalloc+0xd4/0xd8 [ 70.541639] __kmalloc_cache_noprof+0x16c/0x3c0 [ 70.546153] kasan_atomics+0xb8/0x2e0 [ 70.549799] kunit_try_run_case+0x170/0x3f0 [ 70.553965] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.559434] kthread+0x328/0x630 [ 70.562645] ret_from_fork+0x10/0x20 [ 70.566205] [ 70.567680] The buggy address belongs to the object at ffff00080851b080 [ 70.567680] which belongs to the cache kmalloc-64 of size 64 [ 70.580007] The buggy address is located 0 bytes to the right of [ 70.580007] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 70.592853] [ 70.594329] The buggy address belongs to the physical page: [ 70.599888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 70.607871] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 70.614381] page_type: f5(slab) [ 70.617516] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 70.625238] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 70.632957] page dumped because: kasan: bad access detected [ 70.638513] [ 70.639988] Memory state around the buggy address: [ 70.644768] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 70.651971] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.659176] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 70.666377] ^ [ 70.671155] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.678359] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.685560] ================================================================== [ 71.484380] ================================================================== [ 71.491453] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 71.498830] Read of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 71.506121] [ 71.507604] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 71.507655] Tainted: [B]=BAD_PAGE, [N]=TEST [ 71.507671] Hardware name: WinLink E850-96 board (DT) [ 71.507690] Call trace: [ 71.507703] show_stack+0x20/0x38 (C) [ 71.507732] dump_stack_lvl+0x8c/0xd0 [ 71.507765] print_report+0x118/0x5d0 [ 71.507794] kasan_report+0xdc/0x128 [ 71.507821] __asan_report_load4_noabort+0x20/0x30 [ 71.507852] kasan_atomics_helper+0x3de4/0x4858 [ 71.507887] kasan_atomics+0x198/0x2e0 [ 71.507918] kunit_try_run_case+0x170/0x3f0 [ 71.507948] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.507983] kthread+0x328/0x630 [ 71.508007] ret_from_fork+0x10/0x20 [ 71.508040] [ 71.575738] Allocated by task 346: [ 71.579126] kasan_save_stack+0x3c/0x68 [ 71.582943] kasan_save_track+0x20/0x40 [ 71.586763] kasan_save_alloc_info+0x40/0x58 [ 71.591016] __kasan_kmalloc+0xd4/0xd8 [ 71.594748] __kmalloc_cache_noprof+0x16c/0x3c0 [ 71.599262] kasan_atomics+0xb8/0x2e0 [ 71.602908] kunit_try_run_case+0x170/0x3f0 [ 71.607074] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.612543] kthread+0x328/0x630 [ 71.615755] ret_from_fork+0x10/0x20 [ 71.619314] [ 71.620790] The buggy address belongs to the object at ffff00080851b080 [ 71.620790] which belongs to the cache kmalloc-64 of size 64 [ 71.633116] The buggy address is located 0 bytes to the right of [ 71.633116] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 71.645963] [ 71.647440] The buggy address belongs to the physical page: [ 71.652997] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 71.660980] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 71.667490] page_type: f5(slab) [ 71.670624] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 71.678348] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 71.686066] page dumped because: kasan: bad access detected [ 71.691622] [ 71.693097] Memory state around the buggy address: [ 71.697876] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 71.705080] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.712285] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 71.719486] ^ [ 71.724264] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.731469] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.738670] ================================================================== [ 64.612779] ================================================================== [ 64.619857] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 64.627146] Read of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 64.634436] [ 64.635918] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 64.635972] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.635990] Hardware name: WinLink E850-96 board (DT) [ 64.636011] Call trace: [ 64.636023] show_stack+0x20/0x38 (C) [ 64.636057] dump_stack_lvl+0x8c/0xd0 [ 64.636092] print_report+0x118/0x5d0 [ 64.636120] kasan_report+0xdc/0x128 [ 64.636147] kasan_check_range+0x100/0x1a8 [ 64.636178] __kasan_check_read+0x20/0x30 [ 64.636207] kasan_atomics_helper+0x2b0/0x4858 [ 64.636240] kasan_atomics+0x198/0x2e0 [ 64.636272] kunit_try_run_case+0x170/0x3f0 [ 64.636301] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.636337] kthread+0x328/0x630 [ 64.636365] ret_from_fork+0x10/0x20 [ 64.636396] [ 64.707265] Allocated by task 346: [ 64.710654] kasan_save_stack+0x3c/0x68 [ 64.714470] kasan_save_track+0x20/0x40 [ 64.718289] kasan_save_alloc_info+0x40/0x58 [ 64.722542] __kasan_kmalloc+0xd4/0xd8 [ 64.726275] __kmalloc_cache_noprof+0x16c/0x3c0 [ 64.730789] kasan_atomics+0xb8/0x2e0 [ 64.734435] kunit_try_run_case+0x170/0x3f0 [ 64.738601] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.744070] kthread+0x328/0x630 [ 64.747282] ret_from_fork+0x10/0x20 [ 64.750841] [ 64.752318] The buggy address belongs to the object at ffff00080851b080 [ 64.752318] which belongs to the cache kmalloc-64 of size 64 [ 64.764643] The buggy address is located 0 bytes to the right of [ 64.764643] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 64.777489] [ 64.778967] The buggy address belongs to the physical page: [ 64.784525] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 64.792508] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 64.799017] page_type: f5(slab) [ 64.802153] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 64.809874] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.817593] page dumped because: kasan: bad access detected [ 64.823149] [ 64.824624] Memory state around the buggy address: [ 64.829407] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 64.836607] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.843812] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 64.851012] ^ [ 64.855791] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.862995] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.870196] ================================================================== [ 65.665882] ================================================================== [ 65.672967] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858 [ 65.680254] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 65.687632] [ 65.689115] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 65.689165] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.689180] Hardware name: WinLink E850-96 board (DT) [ 65.689199] Call trace: [ 65.689211] show_stack+0x20/0x38 (C) [ 65.689242] dump_stack_lvl+0x8c/0xd0 [ 65.689275] print_report+0x118/0x5d0 [ 65.689302] kasan_report+0xdc/0x128 [ 65.689328] kasan_check_range+0x100/0x1a8 [ 65.689359] __kasan_check_write+0x20/0x30 [ 65.689390] kasan_atomics_helper+0x3ac/0x4858 [ 65.689425] kasan_atomics+0x198/0x2e0 [ 65.689459] kunit_try_run_case+0x170/0x3f0 [ 65.689490] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.689527] kthread+0x328/0x630 [ 65.689553] ret_from_fork+0x10/0x20 [ 65.689584] [ 65.760548] Allocated by task 346: [ 65.763935] kasan_save_stack+0x3c/0x68 [ 65.767753] kasan_save_track+0x20/0x40 [ 65.771572] kasan_save_alloc_info+0x40/0x58 [ 65.775825] __kasan_kmalloc+0xd4/0xd8 [ 65.779558] __kmalloc_cache_noprof+0x16c/0x3c0 [ 65.784071] kasan_atomics+0xb8/0x2e0 [ 65.787717] kunit_try_run_case+0x170/0x3f0 [ 65.791884] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.797353] kthread+0x328/0x630 [ 65.800564] ret_from_fork+0x10/0x20 [ 65.804123] [ 65.805599] The buggy address belongs to the object at ffff00080851b080 [ 65.805599] which belongs to the cache kmalloc-64 of size 64 [ 65.817926] The buggy address is located 0 bytes to the right of [ 65.817926] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 65.830772] [ 65.832251] The buggy address belongs to the physical page: [ 65.837807] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 65.845790] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 65.852299] page_type: f5(slab) [ 65.855433] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 65.863157] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.870879] page dumped because: kasan: bad access detected [ 65.876431] [ 65.877907] Memory state around the buggy address: [ 65.882688] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.889890] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.897095] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 65.904296] ^ [ 65.909073] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.916278] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.923479] ================================================================== [ 73.590418] ================================================================== [ 73.597497] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 73.604875] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 73.612253] [ 73.613734] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 73.613780] Tainted: [B]=BAD_PAGE, [N]=TEST [ 73.613799] Hardware name: WinLink E850-96 board (DT) [ 73.613817] Call trace: [ 73.613828] show_stack+0x20/0x38 (C) [ 73.613858] dump_stack_lvl+0x8c/0xd0 [ 73.613890] print_report+0x118/0x5d0 [ 73.613917] kasan_report+0xdc/0x128 [ 73.613946] __asan_report_store8_noabort+0x20/0x30 [ 73.613980] kasan_atomics_helper+0x3e5c/0x4858 [ 73.614015] kasan_atomics+0x198/0x2e0 [ 73.614049] kunit_try_run_case+0x170/0x3f0 [ 73.614077] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.614111] kthread+0x328/0x630 [ 73.614138] ret_from_fork+0x10/0x20 [ 73.614169] [ 73.681956] Allocated by task 346: [ 73.685343] kasan_save_stack+0x3c/0x68 [ 73.689161] kasan_save_track+0x20/0x40 [ 73.692981] kasan_save_alloc_info+0x40/0x58 [ 73.697234] __kasan_kmalloc+0xd4/0xd8 [ 73.700967] __kmalloc_cache_noprof+0x16c/0x3c0 [ 73.705480] kasan_atomics+0xb8/0x2e0 [ 73.709126] kunit_try_run_case+0x170/0x3f0 [ 73.713293] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.718762] kthread+0x328/0x630 [ 73.721974] ret_from_fork+0x10/0x20 [ 73.725532] [ 73.727008] The buggy address belongs to the object at ffff00080851b080 [ 73.727008] which belongs to the cache kmalloc-64 of size 64 [ 73.739334] The buggy address is located 0 bytes to the right of [ 73.739334] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 73.752181] [ 73.753657] The buggy address belongs to the physical page: [ 73.759214] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 73.767198] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 73.773708] page_type: f5(slab) [ 73.776842] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 73.784566] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 73.792284] page dumped because: kasan: bad access detected [ 73.797840] [ 73.799316] Memory state around the buggy address: [ 73.804094] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 73.811299] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.818503] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.825704] ^ [ 73.830482] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.837687] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.844888] ================================================================== [ 73.852243] ================================================================== [ 73.859299] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 73.866591] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 73.873968] [ 73.875451] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 73.875502] Tainted: [B]=BAD_PAGE, [N]=TEST [ 73.875519] Hardware name: WinLink E850-96 board (DT) [ 73.875538] Call trace: [ 73.875550] show_stack+0x20/0x38 (C) [ 73.875580] dump_stack_lvl+0x8c/0xd0 [ 73.875612] print_report+0x118/0x5d0 [ 73.875641] kasan_report+0xdc/0x128 [ 73.875669] kasan_check_range+0x100/0x1a8 [ 73.875699] __kasan_check_write+0x20/0x30 [ 73.875729] kasan_atomics_helper+0xeb8/0x4858 [ 73.875763] kasan_atomics+0x198/0x2e0 [ 73.875795] kunit_try_run_case+0x170/0x3f0 [ 73.875825] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.875862] kthread+0x328/0x630 [ 73.875889] ret_from_fork+0x10/0x20 [ 73.875920] [ 73.946883] Allocated by task 346: [ 73.950270] kasan_save_stack+0x3c/0x68 [ 73.954088] kasan_save_track+0x20/0x40 [ 73.957907] kasan_save_alloc_info+0x40/0x58 [ 73.962161] __kasan_kmalloc+0xd4/0xd8 [ 73.965893] __kmalloc_cache_noprof+0x16c/0x3c0 [ 73.970407] kasan_atomics+0xb8/0x2e0 [ 73.974053] kunit_try_run_case+0x170/0x3f0 [ 73.978220] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 73.983688] kthread+0x328/0x630 [ 73.986900] ret_from_fork+0x10/0x20 [ 73.990459] [ 73.991934] The buggy address belongs to the object at ffff00080851b080 [ 73.991934] which belongs to the cache kmalloc-64 of size 64 [ 74.004261] The buggy address is located 0 bytes to the right of [ 74.004261] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 74.017108] [ 74.018585] The buggy address belongs to the physical page: [ 74.024142] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 74.032126] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 74.038635] page_type: f5(slab) [ 74.041770] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 74.049492] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 74.057211] page dumped because: kasan: bad access detected [ 74.062767] [ 74.064242] Memory state around the buggy address: [ 74.069021] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 74.076225] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.083430] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 74.090631] ^ [ 74.095409] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.102614] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.109815] ================================================================== [ 69.901434] ================================================================== [ 69.908490] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 69.915781] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 69.923159] [ 69.924639] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 69.924688] Tainted: [B]=BAD_PAGE, [N]=TEST [ 69.924705] Hardware name: WinLink E850-96 board (DT) [ 69.924722] Call trace: [ 69.924735] show_stack+0x20/0x38 (C) [ 69.924767] dump_stack_lvl+0x8c/0xd0 [ 69.924799] print_report+0x118/0x5d0 [ 69.924825] kasan_report+0xdc/0x128 [ 69.924852] kasan_check_range+0x100/0x1a8 [ 69.924881] __kasan_check_write+0x20/0x30 [ 69.924913] kasan_atomics_helper+0xa6c/0x4858 [ 69.924948] kasan_atomics+0x198/0x2e0 [ 69.924980] kunit_try_run_case+0x170/0x3f0 [ 69.925014] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.925048] kthread+0x328/0x630 [ 69.925076] ret_from_fork+0x10/0x20 [ 69.925107] [ 69.996074] Allocated by task 346: [ 69.999462] kasan_save_stack+0x3c/0x68 [ 70.003279] kasan_save_track+0x20/0x40 [ 70.007099] kasan_save_alloc_info+0x40/0x58 [ 70.011352] __kasan_kmalloc+0xd4/0xd8 [ 70.015085] __kmalloc_cache_noprof+0x16c/0x3c0 [ 70.019598] kasan_atomics+0xb8/0x2e0 [ 70.023244] kunit_try_run_case+0x170/0x3f0 [ 70.027411] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.032880] kthread+0x328/0x630 [ 70.036091] ret_from_fork+0x10/0x20 [ 70.039650] [ 70.041125] The buggy address belongs to the object at ffff00080851b080 [ 70.041125] which belongs to the cache kmalloc-64 of size 64 [ 70.053452] The buggy address is located 0 bytes to the right of [ 70.053452] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 70.066299] [ 70.067775] The buggy address belongs to the physical page: [ 70.073332] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 70.081318] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 70.087826] page_type: f5(slab) [ 70.090963] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 70.098684] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 70.106402] page dumped because: kasan: bad access detected [ 70.111958] [ 70.113433] Memory state around the buggy address: [ 70.118212] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 70.125416] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.132621] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 70.139822] ^ [ 70.144600] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.151805] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.159006] ================================================================== [ 64.877495] ================================================================== [ 64.884610] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 64.891986] Read of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 64.899276] [ 64.900758] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 64.900811] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.900825] Hardware name: WinLink E850-96 board (DT) [ 64.900846] Call trace: [ 64.900862] show_stack+0x20/0x38 (C) [ 64.900896] dump_stack_lvl+0x8c/0xd0 [ 64.900932] print_report+0x118/0x5d0 [ 64.900959] kasan_report+0xdc/0x128 [ 64.900985] __asan_report_load4_noabort+0x20/0x30 [ 64.901016] kasan_atomics_helper+0x40fc/0x4858 [ 64.901051] kasan_atomics+0x198/0x2e0 [ 64.901086] kunit_try_run_case+0x170/0x3f0 [ 64.901117] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.901152] kthread+0x328/0x630 [ 64.901180] ret_from_fork+0x10/0x20 [ 64.901214] [ 64.968892] Allocated by task 346: [ 64.972280] kasan_save_stack+0x3c/0x68 [ 64.976098] kasan_save_track+0x20/0x40 [ 64.979917] kasan_save_alloc_info+0x40/0x58 [ 64.984171] __kasan_kmalloc+0xd4/0xd8 [ 64.987903] __kmalloc_cache_noprof+0x16c/0x3c0 [ 64.992417] kasan_atomics+0xb8/0x2e0 [ 64.996063] kunit_try_run_case+0x170/0x3f0 [ 65.000229] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.005698] kthread+0x328/0x630 [ 65.008910] ret_from_fork+0x10/0x20 [ 65.012469] [ 65.013946] The buggy address belongs to the object at ffff00080851b080 [ 65.013946] which belongs to the cache kmalloc-64 of size 64 [ 65.026270] The buggy address is located 0 bytes to the right of [ 65.026270] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 65.039117] [ 65.040596] The buggy address belongs to the physical page: [ 65.046152] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 65.054135] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 65.060645] page_type: f5(slab) [ 65.063781] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 65.071502] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.079222] page dumped because: kasan: bad access detected [ 65.084776] [ 65.086252] Memory state around the buggy address: [ 65.091036] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.098235] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.105440] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 65.112641] ^ [ 65.117419] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.124623] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.131824] ================================================================== [ 67.520354] ================================================================== [ 67.527450] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 67.534740] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 67.542118] [ 67.543599] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 67.543646] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.543660] Hardware name: WinLink E850-96 board (DT) [ 67.543679] Call trace: [ 67.543690] show_stack+0x20/0x38 (C) [ 67.543723] dump_stack_lvl+0x8c/0xd0 [ 67.543753] print_report+0x118/0x5d0 [ 67.543778] kasan_report+0xdc/0x128 [ 67.543805] kasan_check_range+0x100/0x1a8 [ 67.543834] __kasan_check_write+0x20/0x30 [ 67.543865] kasan_atomics_helper+0x684/0x4858 [ 67.543900] kasan_atomics+0x198/0x2e0 [ 67.543932] kunit_try_run_case+0x170/0x3f0 [ 67.543960] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.543994] kthread+0x328/0x630 [ 67.544021] ret_from_fork+0x10/0x20 [ 67.544051] [ 67.615034] Allocated by task 346: [ 67.618421] kasan_save_stack+0x3c/0x68 [ 67.622239] kasan_save_track+0x20/0x40 [ 67.626058] kasan_save_alloc_info+0x40/0x58 [ 67.630311] __kasan_kmalloc+0xd4/0xd8 [ 67.634044] __kmalloc_cache_noprof+0x16c/0x3c0 [ 67.638558] kasan_atomics+0xb8/0x2e0 [ 67.642204] kunit_try_run_case+0x170/0x3f0 [ 67.646370] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.651839] kthread+0x328/0x630 [ 67.655050] ret_from_fork+0x10/0x20 [ 67.658610] [ 67.660085] The buggy address belongs to the object at ffff00080851b080 [ 67.660085] which belongs to the cache kmalloc-64 of size 64 [ 67.672412] The buggy address is located 0 bytes to the right of [ 67.672412] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 67.685258] [ 67.686734] The buggy address belongs to the physical page: [ 67.692291] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 67.700276] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 67.706786] page_type: f5(slab) [ 67.709919] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 67.717643] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 67.725362] page dumped because: kasan: bad access detected [ 67.730917] [ 67.732393] Memory state around the buggy address: [ 67.737171] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 67.744376] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.751581] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 67.758782] ^ [ 67.763560] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.770764] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.777965] ================================================================== [ 66.725664] ================================================================== [ 66.732672] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 66.739962] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 66.747338] [ 66.748824] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 66.748877] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.748892] Hardware name: WinLink E850-96 board (DT) [ 66.748912] Call trace: [ 66.748924] show_stack+0x20/0x38 (C) [ 66.748956] dump_stack_lvl+0x8c/0xd0 [ 66.748989] print_report+0x118/0x5d0 [ 66.749018] kasan_report+0xdc/0x128 [ 66.749044] kasan_check_range+0x100/0x1a8 [ 66.749075] __kasan_check_write+0x20/0x30 [ 66.749107] kasan_atomics_helper+0x54c/0x4858 [ 66.749142] kasan_atomics+0x198/0x2e0 [ 66.749174] kunit_try_run_case+0x170/0x3f0 [ 66.749204] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.749240] kthread+0x328/0x630 [ 66.749267] ret_from_fork+0x10/0x20 [ 66.749296] [ 66.820255] Allocated by task 346: [ 66.823641] kasan_save_stack+0x3c/0x68 [ 66.827459] kasan_save_track+0x20/0x40 [ 66.831278] kasan_save_alloc_info+0x40/0x58 [ 66.835532] __kasan_kmalloc+0xd4/0xd8 [ 66.839264] __kmalloc_cache_noprof+0x16c/0x3c0 [ 66.843778] kasan_atomics+0xb8/0x2e0 [ 66.847424] kunit_try_run_case+0x170/0x3f0 [ 66.851590] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.857059] kthread+0x328/0x630 [ 66.860271] ret_from_fork+0x10/0x20 [ 66.863830] [ 66.865305] The buggy address belongs to the object at ffff00080851b080 [ 66.865305] which belongs to the cache kmalloc-64 of size 64 [ 66.877632] The buggy address is located 0 bytes to the right of [ 66.877632] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 66.890479] [ 66.891956] The buggy address belongs to the physical page: [ 66.897513] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 66.905496] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 66.912006] page_type: f5(slab) [ 66.915143] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 66.922863] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.930582] page dumped because: kasan: bad access detected [ 66.936137] [ 66.937613] Memory state around the buggy address: [ 66.942393] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 66.949596] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.956801] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 66.964002] ^ [ 66.968780] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.975984] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.983186] ================================================================== [ 65.139165] ================================================================== [ 65.146240] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 65.153526] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 65.160904] [ 65.162386] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 65.162439] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.162455] Hardware name: WinLink E850-96 board (DT) [ 65.162476] Call trace: [ 65.162489] show_stack+0x20/0x38 (C) [ 65.162524] dump_stack_lvl+0x8c/0xd0 [ 65.162558] print_report+0x118/0x5d0 [ 65.162585] kasan_report+0xdc/0x128 [ 65.162613] kasan_check_range+0x100/0x1a8 [ 65.162642] __kasan_check_write+0x20/0x30 [ 65.162674] kasan_atomics_helper+0x32c/0x4858 [ 65.162710] kasan_atomics+0x198/0x2e0 [ 65.162742] kunit_try_run_case+0x170/0x3f0 [ 65.162773] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.162809] kthread+0x328/0x630 [ 65.162837] ret_from_fork+0x10/0x20 [ 65.162868] [ 65.233819] Allocated by task 346: [ 65.237207] kasan_save_stack+0x3c/0x68 [ 65.241024] kasan_save_track+0x20/0x40 [ 65.244844] kasan_save_alloc_info+0x40/0x58 [ 65.249097] __kasan_kmalloc+0xd4/0xd8 [ 65.252830] __kmalloc_cache_noprof+0x16c/0x3c0 [ 65.257343] kasan_atomics+0xb8/0x2e0 [ 65.260989] kunit_try_run_case+0x170/0x3f0 [ 65.265156] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.270625] kthread+0x328/0x630 [ 65.273836] ret_from_fork+0x10/0x20 [ 65.277395] [ 65.278872] The buggy address belongs to the object at ffff00080851b080 [ 65.278872] which belongs to the cache kmalloc-64 of size 64 [ 65.291198] The buggy address is located 0 bytes to the right of [ 65.291198] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 65.304044] [ 65.305522] The buggy address belongs to the physical page: [ 65.311079] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 65.319061] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 65.325571] page_type: f5(slab) [ 65.328704] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 65.336429] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.344148] page dumped because: kasan: bad access detected [ 65.349703] [ 65.351179] Memory state around the buggy address: [ 65.355962] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.363161] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.370366] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 65.377567] ^ [ 65.382345] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.389550] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.396751] ================================================================== [ 65.930841] ================================================================== [ 65.937891] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 65.945180] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 65.952559] [ 65.954042] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 65.954093] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.954109] Hardware name: WinLink E850-96 board (DT) [ 65.954127] Call trace: [ 65.954139] show_stack+0x20/0x38 (C) [ 65.954170] dump_stack_lvl+0x8c/0xd0 [ 65.954202] print_report+0x118/0x5d0 [ 65.954229] kasan_report+0xdc/0x128 [ 65.954257] kasan_check_range+0x100/0x1a8 [ 65.954285] __kasan_check_write+0x20/0x30 [ 65.954314] kasan_atomics_helper+0x414/0x4858 [ 65.954348] kasan_atomics+0x198/0x2e0 [ 65.954380] kunit_try_run_case+0x170/0x3f0 [ 65.954409] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.954445] kthread+0x328/0x630 [ 65.954472] ret_from_fork+0x10/0x20 [ 65.954502] [ 66.025474] Allocated by task 346: [ 66.028862] kasan_save_stack+0x3c/0x68 [ 66.032679] kasan_save_track+0x20/0x40 [ 66.036498] kasan_save_alloc_info+0x40/0x58 [ 66.040752] __kasan_kmalloc+0xd4/0xd8 [ 66.044484] __kmalloc_cache_noprof+0x16c/0x3c0 [ 66.048998] kasan_atomics+0xb8/0x2e0 [ 66.052644] kunit_try_run_case+0x170/0x3f0 [ 66.056810] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.062279] kthread+0x328/0x630 [ 66.065491] ret_from_fork+0x10/0x20 [ 66.069050] [ 66.070525] The buggy address belongs to the object at ffff00080851b080 [ 66.070525] which belongs to the cache kmalloc-64 of size 64 [ 66.082852] The buggy address is located 0 bytes to the right of [ 66.082852] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 66.095699] [ 66.097176] The buggy address belongs to the physical page: [ 66.102732] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 66.110716] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 66.117226] page_type: f5(slab) [ 66.120360] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 66.128084] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.135802] page dumped because: kasan: bad access detected [ 66.141358] [ 66.142833] Memory state around the buggy address: [ 66.147614] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 66.154816] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.162022] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 66.169222] ^ [ 66.174000] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.181205] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.188406] ================================================================== [ 64.083106] ================================================================== [ 64.090179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 64.097467] Read of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 64.104756] [ 64.106240] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 64.106297] Tainted: [B]=BAD_PAGE, [N]=TEST [ 64.106314] Hardware name: WinLink E850-96 board (DT) [ 64.106335] Call trace: [ 64.106347] show_stack+0x20/0x38 (C) [ 64.106382] dump_stack_lvl+0x8c/0xd0 [ 64.106416] print_report+0x118/0x5d0 [ 64.106445] kasan_report+0xdc/0x128 [ 64.106473] kasan_check_range+0x100/0x1a8 [ 64.106505] __kasan_check_read+0x20/0x30 [ 64.106538] kasan_atomics_helper+0x1ec/0x4858 [ 64.106572] kasan_atomics+0x198/0x2e0 [ 64.106604] kunit_try_run_case+0x170/0x3f0 [ 64.106638] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.106674] kthread+0x328/0x630 [ 64.106704] ret_from_fork+0x10/0x20 [ 64.106736] [ 64.177585] Allocated by task 346: [ 64.180973] kasan_save_stack+0x3c/0x68 [ 64.184790] kasan_save_track+0x20/0x40 [ 64.188610] kasan_save_alloc_info+0x40/0x58 [ 64.192863] __kasan_kmalloc+0xd4/0xd8 [ 64.196596] __kmalloc_cache_noprof+0x16c/0x3c0 [ 64.201109] kasan_atomics+0xb8/0x2e0 [ 64.204755] kunit_try_run_case+0x170/0x3f0 [ 64.208921] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 64.214390] kthread+0x328/0x630 [ 64.217602] ret_from_fork+0x10/0x20 [ 64.221161] [ 64.222638] The buggy address belongs to the object at ffff00080851b080 [ 64.222638] which belongs to the cache kmalloc-64 of size 64 [ 64.234965] The buggy address is located 0 bytes to the right of [ 64.234965] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 64.247810] [ 64.249288] The buggy address belongs to the physical page: [ 64.254845] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 64.262829] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 64.269339] page_type: f5(slab) [ 64.272476] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 64.280194] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.287913] page dumped because: kasan: bad access detected [ 64.293469] [ 64.294944] Memory state around the buggy address: [ 64.299726] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 64.306927] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.314132] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 64.321333] ^ [ 64.326111] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.333316] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.340517] ================================================================== [ 76.502548] ================================================================== [ 76.509607] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 76.516983] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 76.524362] [ 76.525843] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 76.525897] Tainted: [B]=BAD_PAGE, [N]=TEST [ 76.525911] Hardware name: WinLink E850-96 board (DT) [ 76.525931] Call trace: [ 76.525944] show_stack+0x20/0x38 (C) [ 76.525976] dump_stack_lvl+0x8c/0xd0 [ 76.526010] print_report+0x118/0x5d0 [ 76.526040] kasan_report+0xdc/0x128 [ 76.526068] kasan_check_range+0x100/0x1a8 [ 76.526097] __kasan_check_write+0x20/0x30 [ 76.526127] kasan_atomics_helper+0x12d8/0x4858 [ 76.526161] kasan_atomics+0x198/0x2e0 [ 76.526194] kunit_try_run_case+0x170/0x3f0 [ 76.526227] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.526261] kthread+0x328/0x630 [ 76.526288] ret_from_fork+0x10/0x20 [ 76.526319] [ 76.597364] Allocated by task 346: [ 76.600751] kasan_save_stack+0x3c/0x68 [ 76.604569] kasan_save_track+0x20/0x40 [ 76.608388] kasan_save_alloc_info+0x40/0x58 [ 76.612642] __kasan_kmalloc+0xd4/0xd8 [ 76.616374] __kmalloc_cache_noprof+0x16c/0x3c0 [ 76.620888] kasan_atomics+0xb8/0x2e0 [ 76.624534] kunit_try_run_case+0x170/0x3f0 [ 76.628700] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.634169] kthread+0x328/0x630 [ 76.637381] ret_from_fork+0x10/0x20 [ 76.640940] [ 76.642415] The buggy address belongs to the object at ffff00080851b080 [ 76.642415] which belongs to the cache kmalloc-64 of size 64 [ 76.654742] The buggy address is located 0 bytes to the right of [ 76.654742] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 76.667589] [ 76.669064] The buggy address belongs to the physical page: [ 76.674622] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 76.682606] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 76.689116] page_type: f5(slab) [ 76.692249] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 76.699973] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 76.707692] page dumped because: kasan: bad access detected [ 76.713248] [ 76.714723] Memory state around the buggy address: [ 76.719501] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 76.726706] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 76.733911] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 76.741112] ^ [ 76.745890] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.753095] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.760296] ================================================================== [ 78.089662] ================================================================== [ 78.096735] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 78.104114] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 78.111491] [ 78.112973] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 78.113022] Tainted: [B]=BAD_PAGE, [N]=TEST [ 78.113038] Hardware name: WinLink E850-96 board (DT) [ 78.113054] Call trace: [ 78.113067] show_stack+0x20/0x38 (C) [ 78.113097] dump_stack_lvl+0x8c/0xd0 [ 78.113130] print_report+0x118/0x5d0 [ 78.113156] kasan_report+0xdc/0x128 [ 78.113183] kasan_check_range+0x100/0x1a8 [ 78.113213] __kasan_check_write+0x20/0x30 [ 78.113243] kasan_atomics_helper+0x154c/0x4858 [ 78.113277] kasan_atomics+0x198/0x2e0 [ 78.113311] kunit_try_run_case+0x170/0x3f0 [ 78.113342] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 78.113376] kthread+0x328/0x630 [ 78.113402] ret_from_fork+0x10/0x20 [ 78.113436] [ 78.184493] Allocated by task 346: [ 78.187880] kasan_save_stack+0x3c/0x68 [ 78.191698] kasan_save_track+0x20/0x40 [ 78.195517] kasan_save_alloc_info+0x40/0x58 [ 78.199771] __kasan_kmalloc+0xd4/0xd8 [ 78.203503] __kmalloc_cache_noprof+0x16c/0x3c0 [ 78.208017] kasan_atomics+0xb8/0x2e0 [ 78.211663] kunit_try_run_case+0x170/0x3f0 [ 78.215829] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 78.221298] kthread+0x328/0x630 [ 78.224510] ret_from_fork+0x10/0x20 [ 78.228069] [ 78.229545] The buggy address belongs to the object at ffff00080851b080 [ 78.229545] which belongs to the cache kmalloc-64 of size 64 [ 78.241871] The buggy address is located 0 bytes to the right of [ 78.241871] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 78.254718] [ 78.256194] The buggy address belongs to the physical page: [ 78.261752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 78.269735] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 78.276245] page_type: f5(slab) [ 78.279380] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 78.287102] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 78.294821] page dumped because: kasan: bad access detected [ 78.300377] [ 78.301852] Memory state around the buggy address: [ 78.306635] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 78.313835] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 78.321040] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 78.328241] ^ [ 78.333019] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.340223] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.347424] ================================================================== [ 63.552524] ================================================================== [ 63.566748] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 63.574123] Read of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 63.581413] [ 63.582901] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 63.582957] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.582977] Hardware name: WinLink E850-96 board (DT) [ 63.582998] Call trace: [ 63.583011] show_stack+0x20/0x38 (C) [ 63.583050] dump_stack_lvl+0x8c/0xd0 [ 63.583088] print_report+0x118/0x5d0 [ 63.583122] kasan_report+0xdc/0x128 [ 63.583150] __asan_report_load4_noabort+0x20/0x30 [ 63.583182] kasan_atomics_helper+0x40a8/0x4858 [ 63.583216] kasan_atomics+0x198/0x2e0 [ 63.583249] kunit_try_run_case+0x170/0x3f0 [ 63.583283] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.583319] kthread+0x328/0x630 [ 63.583349] ret_from_fork+0x10/0x20 [ 63.583388] [ 63.651034] Allocated by task 346: [ 63.654420] kasan_save_stack+0x3c/0x68 [ 63.658235] kasan_save_track+0x20/0x40 [ 63.662055] kasan_save_alloc_info+0x40/0x58 [ 63.666308] __kasan_kmalloc+0xd4/0xd8 [ 63.670041] __kmalloc_cache_noprof+0x16c/0x3c0 [ 63.674554] kasan_atomics+0xb8/0x2e0 [ 63.678202] kunit_try_run_case+0x170/0x3f0 [ 63.682367] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.687836] kthread+0x328/0x630 [ 63.691047] ret_from_fork+0x10/0x20 [ 63.694607] [ 63.696085] The buggy address belongs to the object at ffff00080851b080 [ 63.696085] which belongs to the cache kmalloc-64 of size 64 [ 63.708412] The buggy address is located 0 bytes to the right of [ 63.708412] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 63.721255] [ 63.722735] The buggy address belongs to the physical page: [ 63.728290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 63.736275] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.742784] page_type: f5(slab) [ 63.745920] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 63.753640] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 63.761362] page dumped because: kasan: bad access detected [ 63.766914] [ 63.768391] Memory state around the buggy address: [ 63.773171] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 63.780373] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 63.787579] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 63.794778] ^ [ 63.799557] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.806761] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 63.813964] ================================================================== [ 68.580085] ================================================================== [ 68.587156] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 68.594446] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 68.601825] [ 68.603305] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 68.603353] Tainted: [B]=BAD_PAGE, [N]=TEST [ 68.603368] Hardware name: WinLink E850-96 board (DT) [ 68.603386] Call trace: [ 68.603397] show_stack+0x20/0x38 (C) [ 68.603430] dump_stack_lvl+0x8c/0xd0 [ 68.603460] print_report+0x118/0x5d0 [ 68.603489] kasan_report+0xdc/0x128 [ 68.603517] kasan_check_range+0x100/0x1a8 [ 68.603545] __kasan_check_write+0x20/0x30 [ 68.603575] kasan_atomics_helper+0x894/0x4858 [ 68.603610] kasan_atomics+0x198/0x2e0 [ 68.603643] kunit_try_run_case+0x170/0x3f0 [ 68.603674] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.603708] kthread+0x328/0x630 [ 68.603735] ret_from_fork+0x10/0x20 [ 68.603766] [ 68.674740] Allocated by task 346: [ 68.678127] kasan_save_stack+0x3c/0x68 [ 68.681945] kasan_save_track+0x20/0x40 [ 68.685764] kasan_save_alloc_info+0x40/0x58 [ 68.690018] __kasan_kmalloc+0xd4/0xd8 [ 68.693750] __kmalloc_cache_noprof+0x16c/0x3c0 [ 68.698264] kasan_atomics+0xb8/0x2e0 [ 68.701910] kunit_try_run_case+0x170/0x3f0 [ 68.706076] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.711545] kthread+0x328/0x630 [ 68.714757] ret_from_fork+0x10/0x20 [ 68.718316] [ 68.719791] The buggy address belongs to the object at ffff00080851b080 [ 68.719791] which belongs to the cache kmalloc-64 of size 64 [ 68.732118] The buggy address is located 0 bytes to the right of [ 68.732118] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 68.744965] [ 68.746440] The buggy address belongs to the physical page: [ 68.751998] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 68.759982] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 68.766493] page_type: f5(slab) [ 68.769625] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 68.777349] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 68.785068] page dumped because: kasan: bad access detected [ 68.790623] [ 68.792099] Memory state around the buggy address: [ 68.796879] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 68.804082] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.811287] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 68.818488] ^ [ 68.823266] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.830471] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.837672] ================================================================== [ 70.957844] ================================================================== [ 70.964898] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 70.972277] Read of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 70.979567] [ 70.981049] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 70.981096] Tainted: [B]=BAD_PAGE, [N]=TEST [ 70.981112] Hardware name: WinLink E850-96 board (DT) [ 70.981131] Call trace: [ 70.981144] show_stack+0x20/0x38 (C) [ 70.981177] dump_stack_lvl+0x8c/0xd0 [ 70.981211] print_report+0x118/0x5d0 [ 70.981238] kasan_report+0xdc/0x128 [ 70.981264] __asan_report_load4_noabort+0x20/0x30 [ 70.981296] kasan_atomics_helper+0x3dbc/0x4858 [ 70.981329] kasan_atomics+0x198/0x2e0 [ 70.981364] kunit_try_run_case+0x170/0x3f0 [ 70.981393] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.981426] kthread+0x328/0x630 [ 70.981451] ret_from_fork+0x10/0x20 [ 70.981482] [ 71.049184] Allocated by task 346: [ 71.052571] kasan_save_stack+0x3c/0x68 [ 71.056388] kasan_save_track+0x20/0x40 [ 71.060208] kasan_save_alloc_info+0x40/0x58 [ 71.064461] __kasan_kmalloc+0xd4/0xd8 [ 71.068194] __kmalloc_cache_noprof+0x16c/0x3c0 [ 71.072707] kasan_atomics+0xb8/0x2e0 [ 71.076353] kunit_try_run_case+0x170/0x3f0 [ 71.080520] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.085988] kthread+0x328/0x630 [ 71.089200] ret_from_fork+0x10/0x20 [ 71.092759] [ 71.094235] The buggy address belongs to the object at ffff00080851b080 [ 71.094235] which belongs to the cache kmalloc-64 of size 64 [ 71.106562] The buggy address is located 0 bytes to the right of [ 71.106562] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 71.119408] [ 71.120885] The buggy address belongs to the physical page: [ 71.126442] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 71.134425] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 71.140935] page_type: f5(slab) [ 71.144070] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 71.151793] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 71.159512] page dumped because: kasan: bad access detected [ 71.165067] [ 71.166543] Memory state around the buggy address: [ 71.171321] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 71.178526] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.185730] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 71.192931] ^ [ 71.197709] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.204914] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.212115] ================================================================== [ 72.537508] ================================================================== [ 72.544562] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 72.551939] Read of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 72.559230] [ 72.560712] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 72.560765] Tainted: [B]=BAD_PAGE, [N]=TEST [ 72.560780] Hardware name: WinLink E850-96 board (DT) [ 72.560799] Call trace: [ 72.560812] show_stack+0x20/0x38 (C) [ 72.560843] dump_stack_lvl+0x8c/0xd0 [ 72.560877] print_report+0x118/0x5d0 [ 72.560902] kasan_report+0xdc/0x128 [ 72.560928] __asan_report_load4_noabort+0x20/0x30 [ 72.560959] kasan_atomics_helper+0x3e04/0x4858 [ 72.560994] kasan_atomics+0x198/0x2e0 [ 72.561026] kunit_try_run_case+0x170/0x3f0 [ 72.561058] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.561091] kthread+0x328/0x630 [ 72.561117] ret_from_fork+0x10/0x20 [ 72.561147] [ 72.628848] Allocated by task 346: [ 72.632234] kasan_save_stack+0x3c/0x68 [ 72.636052] kasan_save_track+0x20/0x40 [ 72.639871] kasan_save_alloc_info+0x40/0x58 [ 72.644125] __kasan_kmalloc+0xd4/0xd8 [ 72.647858] __kmalloc_cache_noprof+0x16c/0x3c0 [ 72.652371] kasan_atomics+0xb8/0x2e0 [ 72.656017] kunit_try_run_case+0x170/0x3f0 [ 72.660184] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.665652] kthread+0x328/0x630 [ 72.668864] ret_from_fork+0x10/0x20 [ 72.672423] [ 72.673898] The buggy address belongs to the object at ffff00080851b080 [ 72.673898] which belongs to the cache kmalloc-64 of size 64 [ 72.686225] The buggy address is located 0 bytes to the right of [ 72.686225] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 72.699072] [ 72.700549] The buggy address belongs to the physical page: [ 72.706106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 72.714091] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 72.720599] page_type: f5(slab) [ 72.723735] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 72.731457] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 72.739176] page dumped because: kasan: bad access detected [ 72.744731] [ 72.746206] Memory state around the buggy address: [ 72.750985] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 72.758189] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.765394] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 72.772595] ^ [ 72.777373] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.784578] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.791779] ================================================================== [ 76.767609] ================================================================== [ 76.774707] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 76.782084] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 76.789462] [ 76.790944] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 76.790991] Tainted: [B]=BAD_PAGE, [N]=TEST [ 76.791005] Hardware name: WinLink E850-96 board (DT) [ 76.791024] Call trace: [ 76.791037] show_stack+0x20/0x38 (C) [ 76.791068] dump_stack_lvl+0x8c/0xd0 [ 76.791101] print_report+0x118/0x5d0 [ 76.791129] kasan_report+0xdc/0x128 [ 76.791157] kasan_check_range+0x100/0x1a8 [ 76.791186] __kasan_check_write+0x20/0x30 [ 76.791217] kasan_atomics_helper+0x1384/0x4858 [ 76.791254] kasan_atomics+0x198/0x2e0 [ 76.791287] kunit_try_run_case+0x170/0x3f0 [ 76.791316] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.791350] kthread+0x328/0x630 [ 76.791376] ret_from_fork+0x10/0x20 [ 76.791406] [ 76.862464] Allocated by task 346: [ 76.865851] kasan_save_stack+0x3c/0x68 [ 76.869669] kasan_save_track+0x20/0x40 [ 76.873488] kasan_save_alloc_info+0x40/0x58 [ 76.877742] __kasan_kmalloc+0xd4/0xd8 [ 76.881475] __kmalloc_cache_noprof+0x16c/0x3c0 [ 76.885988] kasan_atomics+0xb8/0x2e0 [ 76.889634] kunit_try_run_case+0x170/0x3f0 [ 76.893801] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.899269] kthread+0x328/0x630 [ 76.902481] ret_from_fork+0x10/0x20 [ 76.906040] [ 76.907515] The buggy address belongs to the object at ffff00080851b080 [ 76.907515] which belongs to the cache kmalloc-64 of size 64 [ 76.919842] The buggy address is located 0 bytes to the right of [ 76.919842] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 76.932689] [ 76.934165] The buggy address belongs to the physical page: [ 76.939722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 76.947706] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 76.954216] page_type: f5(slab) [ 76.957349] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 76.965074] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 76.972792] page dumped because: kasan: bad access detected [ 76.978348] [ 76.979823] Memory state around the buggy address: [ 76.984602] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 76.991807] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 76.999011] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 77.006212] ^ [ 77.010990] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.018195] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.025396] ================================================================== [ 72.010956] ================================================================== [ 72.018010] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 72.025384] Read of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 72.032676] [ 72.034157] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 72.034204] Tainted: [B]=BAD_PAGE, [N]=TEST [ 72.034220] Hardware name: WinLink E850-96 board (DT) [ 72.034239] Call trace: [ 72.034252] show_stack+0x20/0x38 (C) [ 72.034286] dump_stack_lvl+0x8c/0xd0 [ 72.034319] print_report+0x118/0x5d0 [ 72.034347] kasan_report+0xdc/0x128 [ 72.034375] __asan_report_load4_noabort+0x20/0x30 [ 72.034407] kasan_atomics_helper+0x3dd8/0x4858 [ 72.034441] kasan_atomics+0x198/0x2e0 [ 72.034473] kunit_try_run_case+0x170/0x3f0 [ 72.034502] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.034536] kthread+0x328/0x630 [ 72.034562] ret_from_fork+0x10/0x20 [ 72.034593] [ 72.102292] Allocated by task 346: [ 72.105680] kasan_save_stack+0x3c/0x68 [ 72.109498] kasan_save_track+0x20/0x40 [ 72.113317] kasan_save_alloc_info+0x40/0x58 [ 72.117570] __kasan_kmalloc+0xd4/0xd8 [ 72.121303] __kmalloc_cache_noprof+0x16c/0x3c0 [ 72.125817] kasan_atomics+0xb8/0x2e0 [ 72.129463] kunit_try_run_case+0x170/0x3f0 [ 72.133629] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.139098] kthread+0x328/0x630 [ 72.142310] ret_from_fork+0x10/0x20 [ 72.145868] [ 72.147345] The buggy address belongs to the object at ffff00080851b080 [ 72.147345] which belongs to the cache kmalloc-64 of size 64 [ 72.159671] The buggy address is located 0 bytes to the right of [ 72.159671] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 72.172517] [ 72.173995] The buggy address belongs to the physical page: [ 72.179551] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 72.187536] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 72.194045] page_type: f5(slab) [ 72.197178] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 72.204902] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 72.212621] page dumped because: kasan: bad access detected [ 72.218176] [ 72.219652] Memory state around the buggy address: [ 72.224430] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 72.231635] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.238840] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 72.246040] ^ [ 72.250818] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.258023] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.265224] ================================================================== [ 79.146609] ================================================================== [ 79.153664] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 79.161043] Read of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 79.168332] [ 79.169815] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 79.169864] Tainted: [B]=BAD_PAGE, [N]=TEST [ 79.169880] Hardware name: WinLink E850-96 board (DT) [ 79.169897] Call trace: [ 79.169910] show_stack+0x20/0x38 (C) [ 79.169940] dump_stack_lvl+0x8c/0xd0 [ 79.169973] print_report+0x118/0x5d0 [ 79.170002] kasan_report+0xdc/0x128 [ 79.170030] __asan_report_load8_noabort+0x20/0x30 [ 79.170063] kasan_atomics_helper+0x3df4/0x4858 [ 79.170098] kasan_atomics+0x198/0x2e0 [ 79.170130] kunit_try_run_case+0x170/0x3f0 [ 79.170160] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 79.170194] kthread+0x328/0x630 [ 79.170221] ret_from_fork+0x10/0x20 [ 79.170251] [ 79.237949] Allocated by task 346: [ 79.241336] kasan_save_stack+0x3c/0x68 [ 79.245154] kasan_save_track+0x20/0x40 [ 79.248974] kasan_save_alloc_info+0x40/0x58 [ 79.253227] __kasan_kmalloc+0xd4/0xd8 [ 79.256960] __kmalloc_cache_noprof+0x16c/0x3c0 [ 79.261474] kasan_atomics+0xb8/0x2e0 [ 79.265119] kunit_try_run_case+0x170/0x3f0 [ 79.269286] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 79.274755] kthread+0x328/0x630 [ 79.277966] ret_from_fork+0x10/0x20 [ 79.281525] [ 79.283001] The buggy address belongs to the object at ffff00080851b080 [ 79.283001] which belongs to the cache kmalloc-64 of size 64 [ 79.295327] The buggy address is located 0 bytes to the right of [ 79.295327] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 79.308174] [ 79.309650] The buggy address belongs to the physical page: [ 79.315207] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 79.323193] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 79.329701] page_type: f5(slab) [ 79.332835] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 79.340559] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 79.348278] page dumped because: kasan: bad access detected [ 79.353833] [ 79.355309] Memory state around the buggy address: [ 79.360088] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 79.367292] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 79.374497] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 79.381697] ^ [ 79.386475] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.393680] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.400881] ================================================================== [ 69.371579] ================================================================== [ 69.378637] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 69.385927] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 69.393306] [ 69.394787] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 69.394834] Tainted: [B]=BAD_PAGE, [N]=TEST [ 69.394850] Hardware name: WinLink E850-96 board (DT) [ 69.394868] Call trace: [ 69.394878] show_stack+0x20/0x38 (C) [ 69.394909] dump_stack_lvl+0x8c/0xd0 [ 69.394940] print_report+0x118/0x5d0 [ 69.394970] kasan_report+0xdc/0x128 [ 69.394997] kasan_check_range+0x100/0x1a8 [ 69.395027] __kasan_check_write+0x20/0x30 [ 69.395057] kasan_atomics_helper+0x99c/0x4858 [ 69.395091] kasan_atomics+0x198/0x2e0 [ 69.395124] kunit_try_run_case+0x170/0x3f0 [ 69.395154] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.395186] kthread+0x328/0x630 [ 69.395212] ret_from_fork+0x10/0x20 [ 69.395243] [ 69.466221] Allocated by task 346: [ 69.469608] kasan_save_stack+0x3c/0x68 [ 69.473426] kasan_save_track+0x20/0x40 [ 69.477245] kasan_save_alloc_info+0x40/0x58 [ 69.481499] __kasan_kmalloc+0xd4/0xd8 [ 69.485231] __kmalloc_cache_noprof+0x16c/0x3c0 [ 69.489745] kasan_atomics+0xb8/0x2e0 [ 69.493391] kunit_try_run_case+0x170/0x3f0 [ 69.497558] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.503026] kthread+0x328/0x630 [ 69.506238] ret_from_fork+0x10/0x20 [ 69.509797] [ 69.511272] The buggy address belongs to the object at ffff00080851b080 [ 69.511272] which belongs to the cache kmalloc-64 of size 64 [ 69.523599] The buggy address is located 0 bytes to the right of [ 69.523599] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 69.536446] [ 69.537923] The buggy address belongs to the physical page: [ 69.543480] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 69.551465] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 69.557973] page_type: f5(slab) [ 69.561106] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 69.568831] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 69.576549] page dumped because: kasan: bad access detected [ 69.582105] [ 69.583580] Memory state around the buggy address: [ 69.588362] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 69.595563] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.602768] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 69.609969] ^ [ 69.614747] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.621952] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.629153] ================================================================== [ 77.294358] ================================================================== [ 77.301435] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 77.308812] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 77.316190] [ 77.317672] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 77.317722] Tainted: [B]=BAD_PAGE, [N]=TEST [ 77.317738] Hardware name: WinLink E850-96 board (DT) [ 77.317756] Call trace: [ 77.317771] show_stack+0x20/0x38 (C) [ 77.317803] dump_stack_lvl+0x8c/0xd0 [ 77.317835] print_report+0x118/0x5d0 [ 77.317864] kasan_report+0xdc/0x128 [ 77.317892] kasan_check_range+0x100/0x1a8 [ 77.317923] __kasan_check_write+0x20/0x30 [ 77.317954] kasan_atomics_helper+0x1414/0x4858 [ 77.317988] kasan_atomics+0x198/0x2e0 [ 77.318021] kunit_try_run_case+0x170/0x3f0 [ 77.318050] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.318084] kthread+0x328/0x630 [ 77.318109] ret_from_fork+0x10/0x20 [ 77.318139] [ 77.389193] Allocated by task 346: [ 77.392579] kasan_save_stack+0x3c/0x68 [ 77.396397] kasan_save_track+0x20/0x40 [ 77.400217] kasan_save_alloc_info+0x40/0x58 [ 77.404470] __kasan_kmalloc+0xd4/0xd8 [ 77.408203] __kmalloc_cache_noprof+0x16c/0x3c0 [ 77.412716] kasan_atomics+0xb8/0x2e0 [ 77.416362] kunit_try_run_case+0x170/0x3f0 [ 77.420529] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.425997] kthread+0x328/0x630 [ 77.429209] ret_from_fork+0x10/0x20 [ 77.432768] [ 77.434243] The buggy address belongs to the object at ffff00080851b080 [ 77.434243] which belongs to the cache kmalloc-64 of size 64 [ 77.446571] The buggy address is located 0 bytes to the right of [ 77.446571] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 77.459417] [ 77.460893] The buggy address belongs to the physical page: [ 77.466450] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 77.474435] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 77.480944] page_type: f5(slab) [ 77.484077] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 77.491802] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 77.499521] page dumped because: kasan: bad access detected [ 77.505076] [ 77.506552] Memory state around the buggy address: [ 77.511330] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 77.518535] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 77.525739] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 77.532940] ^ [ 77.537718] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.544923] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.552124] ================================================================== [ 70.692895] ================================================================== [ 70.699971] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 70.707262] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 70.714640] [ 70.716124] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 70.716174] Tainted: [B]=BAD_PAGE, [N]=TEST [ 70.716190] Hardware name: WinLink E850-96 board (DT) [ 70.716207] Call trace: [ 70.716221] show_stack+0x20/0x38 (C) [ 70.716252] dump_stack_lvl+0x8c/0xd0 [ 70.716283] print_report+0x118/0x5d0 [ 70.716311] kasan_report+0xdc/0x128 [ 70.716337] kasan_check_range+0x100/0x1a8 [ 70.716367] __kasan_check_write+0x20/0x30 [ 70.716398] kasan_atomics_helper+0xb70/0x4858 [ 70.716431] kasan_atomics+0x198/0x2e0 [ 70.716463] kunit_try_run_case+0x170/0x3f0 [ 70.716493] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.716526] kthread+0x328/0x630 [ 70.716553] ret_from_fork+0x10/0x20 [ 70.716586] [ 70.787556] Allocated by task 346: [ 70.790942] kasan_save_stack+0x3c/0x68 [ 70.794760] kasan_save_track+0x20/0x40 [ 70.798579] kasan_save_alloc_info+0x40/0x58 [ 70.802833] __kasan_kmalloc+0xd4/0xd8 [ 70.806566] __kmalloc_cache_noprof+0x16c/0x3c0 [ 70.811079] kasan_atomics+0xb8/0x2e0 [ 70.814725] kunit_try_run_case+0x170/0x3f0 [ 70.818892] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.824361] kthread+0x328/0x630 [ 70.827572] ret_from_fork+0x10/0x20 [ 70.831131] [ 70.832607] The buggy address belongs to the object at ffff00080851b080 [ 70.832607] which belongs to the cache kmalloc-64 of size 64 [ 70.844934] The buggy address is located 0 bytes to the right of [ 70.844934] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 70.857780] [ 70.859256] The buggy address belongs to the physical page: [ 70.864813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 70.872797] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 70.879308] page_type: f5(slab) [ 70.882441] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 70.890165] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 70.897884] page dumped because: kasan: bad access detected [ 70.903439] [ 70.904915] Memory state around the buggy address: [ 70.909694] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 70.916898] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.924103] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 70.931303] ^ [ 70.936082] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.943286] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.950487] ================================================================== [ 75.972350] ================================================================== [ 75.979407] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 75.986783] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 75.994161] [ 75.995645] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 75.995693] Tainted: [B]=BAD_PAGE, [N]=TEST [ 75.995708] Hardware name: WinLink E850-96 board (DT) [ 75.995726] Call trace: [ 75.995739] show_stack+0x20/0x38 (C) [ 75.995769] dump_stack_lvl+0x8c/0xd0 [ 75.995803] print_report+0x118/0x5d0 [ 75.995831] kasan_report+0xdc/0x128 [ 75.995856] kasan_check_range+0x100/0x1a8 [ 75.995885] __kasan_check_write+0x20/0x30 [ 75.995915] kasan_atomics_helper+0x11f8/0x4858 [ 75.995951] kasan_atomics+0x198/0x2e0 [ 75.995984] kunit_try_run_case+0x170/0x3f0 [ 75.996013] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.996047] kthread+0x328/0x630 [ 75.996074] ret_from_fork+0x10/0x20 [ 75.996104] [ 76.067164] Allocated by task 346: [ 76.070551] kasan_save_stack+0x3c/0x68 [ 76.074369] kasan_save_track+0x20/0x40 [ 76.078188] kasan_save_alloc_info+0x40/0x58 [ 76.082441] __kasan_kmalloc+0xd4/0xd8 [ 76.086174] __kmalloc_cache_noprof+0x16c/0x3c0 [ 76.090688] kasan_atomics+0xb8/0x2e0 [ 76.094334] kunit_try_run_case+0x170/0x3f0 [ 76.098500] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 76.103969] kthread+0x328/0x630 [ 76.107181] ret_from_fork+0x10/0x20 [ 76.110740] [ 76.112215] The buggy address belongs to the object at ffff00080851b080 [ 76.112215] which belongs to the cache kmalloc-64 of size 64 [ 76.124542] The buggy address is located 0 bytes to the right of [ 76.124542] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 76.137389] [ 76.138864] The buggy address belongs to the physical page: [ 76.144423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 76.152407] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 76.158916] page_type: f5(slab) [ 76.162049] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 76.169773] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 76.177492] page dumped because: kasan: bad access detected [ 76.183047] [ 76.184523] Memory state around the buggy address: [ 76.189301] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 76.196506] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 76.203711] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 76.210912] ^ [ 76.215690] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.222894] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 76.230095] ================================================================== [ 72.799096] ================================================================== [ 72.806190] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 72.813480] Read of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 72.820771] [ 72.822253] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 72.822301] Tainted: [B]=BAD_PAGE, [N]=TEST [ 72.822318] Hardware name: WinLink E850-96 board (DT) [ 72.822336] Call trace: [ 72.822350] show_stack+0x20/0x38 (C) [ 72.822380] dump_stack_lvl+0x8c/0xd0 [ 72.822412] print_report+0x118/0x5d0 [ 72.822437] kasan_report+0xdc/0x128 [ 72.822464] kasan_check_range+0x100/0x1a8 [ 72.822493] __kasan_check_read+0x20/0x30 [ 72.822523] kasan_atomics_helper+0xdd4/0x4858 [ 72.822558] kasan_atomics+0x198/0x2e0 [ 72.822590] kunit_try_run_case+0x170/0x3f0 [ 72.822621] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.822655] kthread+0x328/0x630 [ 72.822680] ret_from_fork+0x10/0x20 [ 72.822709] [ 72.893600] Allocated by task 346: [ 72.896987] kasan_save_stack+0x3c/0x68 [ 72.900805] kasan_save_track+0x20/0x40 [ 72.904625] kasan_save_alloc_info+0x40/0x58 [ 72.908878] __kasan_kmalloc+0xd4/0xd8 [ 72.912610] __kmalloc_cache_noprof+0x16c/0x3c0 [ 72.917124] kasan_atomics+0xb8/0x2e0 [ 72.920770] kunit_try_run_case+0x170/0x3f0 [ 72.924937] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.930405] kthread+0x328/0x630 [ 72.933617] ret_from_fork+0x10/0x20 [ 72.937176] [ 72.938652] The buggy address belongs to the object at ffff00080851b080 [ 72.938652] which belongs to the cache kmalloc-64 of size 64 [ 72.950980] The buggy address is located 0 bytes to the right of [ 72.950980] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 72.963825] [ 72.965301] The buggy address belongs to the physical page: [ 72.970858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 72.978842] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 72.985352] page_type: f5(slab) [ 72.988485] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 72.996210] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 73.003928] page dumped because: kasan: bad access detected [ 73.009484] [ 73.010959] Memory state around the buggy address: [ 73.015738] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 73.022942] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 73.030147] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 73.037348] ^ [ 73.042126] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.049331] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 73.056532] ================================================================== [ 74.117132] ================================================================== [ 74.124226] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 74.131516] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 74.138894] [ 74.140378] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 74.140426] Tainted: [B]=BAD_PAGE, [N]=TEST [ 74.140443] Hardware name: WinLink E850-96 board (DT) [ 74.140462] Call trace: [ 74.140474] show_stack+0x20/0x38 (C) [ 74.140505] dump_stack_lvl+0x8c/0xd0 [ 74.140537] print_report+0x118/0x5d0 [ 74.140565] kasan_report+0xdc/0x128 [ 74.140591] kasan_check_range+0x100/0x1a8 [ 74.140621] __kasan_check_write+0x20/0x30 [ 74.140653] kasan_atomics_helper+0xf20/0x4858 [ 74.140689] kasan_atomics+0x198/0x2e0 [ 74.140721] kunit_try_run_case+0x170/0x3f0 [ 74.140750] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.140783] kthread+0x328/0x630 [ 74.140810] ret_from_fork+0x10/0x20 [ 74.140840] [ 74.211810] Allocated by task 346: [ 74.215196] kasan_save_stack+0x3c/0x68 [ 74.219014] kasan_save_track+0x20/0x40 [ 74.222834] kasan_save_alloc_info+0x40/0x58 [ 74.227087] __kasan_kmalloc+0xd4/0xd8 [ 74.230820] __kmalloc_cache_noprof+0x16c/0x3c0 [ 74.235334] kasan_atomics+0xb8/0x2e0 [ 74.238979] kunit_try_run_case+0x170/0x3f0 [ 74.243146] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.248615] kthread+0x328/0x630 [ 74.251826] ret_from_fork+0x10/0x20 [ 74.255385] [ 74.256861] The buggy address belongs to the object at ffff00080851b080 [ 74.256861] which belongs to the cache kmalloc-64 of size 64 [ 74.269188] The buggy address is located 0 bytes to the right of [ 74.269188] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 74.282034] [ 74.283510] The buggy address belongs to the physical page: [ 74.289067] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 74.297053] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 74.303562] page_type: f5(slab) [ 74.306695] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 74.314419] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 74.322138] page dumped because: kasan: bad access detected [ 74.327693] [ 74.329169] Memory state around the buggy address: [ 74.333947] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 74.341152] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.348356] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 74.355557] ^ [ 74.360336] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.367540] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.374741] ================================================================== [ 66.195751] ================================================================== [ 66.202817] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 66.210107] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 66.217485] [ 66.218966] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 66.219015] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.219032] Hardware name: WinLink E850-96 board (DT) [ 66.219051] Call trace: [ 66.219064] show_stack+0x20/0x38 (C) [ 66.219096] dump_stack_lvl+0x8c/0xd0 [ 66.219128] print_report+0x118/0x5d0 [ 66.219156] kasan_report+0xdc/0x128 [ 66.219183] kasan_check_range+0x100/0x1a8 [ 66.219213] __kasan_check_write+0x20/0x30 [ 66.219243] kasan_atomics_helper+0x47c/0x4858 [ 66.219276] kasan_atomics+0x198/0x2e0 [ 66.219308] kunit_try_run_case+0x170/0x3f0 [ 66.219336] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.219370] kthread+0x328/0x630 [ 66.219398] ret_from_fork+0x10/0x20 [ 66.219426] [ 66.290401] Allocated by task 346: [ 66.293788] kasan_save_stack+0x3c/0x68 [ 66.297606] kasan_save_track+0x20/0x40 [ 66.301425] kasan_save_alloc_info+0x40/0x58 [ 66.305678] __kasan_kmalloc+0xd4/0xd8 [ 66.309411] __kmalloc_cache_noprof+0x16c/0x3c0 [ 66.313925] kasan_atomics+0xb8/0x2e0 [ 66.317571] kunit_try_run_case+0x170/0x3f0 [ 66.321737] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.327206] kthread+0x328/0x630 [ 66.330418] ret_from_fork+0x10/0x20 [ 66.333977] [ 66.335452] The buggy address belongs to the object at ffff00080851b080 [ 66.335452] which belongs to the cache kmalloc-64 of size 64 [ 66.347779] The buggy address is located 0 bytes to the right of [ 66.347779] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 66.360625] [ 66.362103] The buggy address belongs to the physical page: [ 66.367659] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 66.375643] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 66.382153] page_type: f5(slab) [ 66.385286] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 66.393010] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.400730] page dumped because: kasan: bad access detected [ 66.406285] [ 66.407760] Memory state around the buggy address: [ 66.412540] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 66.419743] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.426948] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 66.434149] ^ [ 66.438926] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.446131] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.453332] ================================================================== [ 80.461693] ================================================================== [ 80.468748] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 80.476126] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 80.483504] [ 80.484986] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 80.485035] Tainted: [B]=BAD_PAGE, [N]=TEST [ 80.485049] Hardware name: WinLink E850-96 board (DT) [ 80.485067] Call trace: [ 80.485080] show_stack+0x20/0x38 (C) [ 80.485110] dump_stack_lvl+0x8c/0xd0 [ 80.485146] print_report+0x118/0x5d0 [ 80.485173] kasan_report+0xdc/0x128 [ 80.485201] kasan_check_range+0x100/0x1a8 [ 80.485232] __kasan_check_write+0x20/0x30 [ 80.485261] kasan_atomics_helper+0x17ec/0x4858 [ 80.485297] kasan_atomics+0x198/0x2e0 [ 80.485331] kunit_try_run_case+0x170/0x3f0 [ 80.485363] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 80.485397] kthread+0x328/0x630 [ 80.485424] ret_from_fork+0x10/0x20 [ 80.485455] [ 80.556506] Allocated by task 346: [ 80.559893] kasan_save_stack+0x3c/0x68 [ 80.563711] kasan_save_track+0x20/0x40 [ 80.567531] kasan_save_alloc_info+0x40/0x58 [ 80.571784] __kasan_kmalloc+0xd4/0xd8 [ 80.575516] __kmalloc_cache_noprof+0x16c/0x3c0 [ 80.580030] kasan_atomics+0xb8/0x2e0 [ 80.583676] kunit_try_run_case+0x170/0x3f0 [ 80.587842] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 80.593311] kthread+0x328/0x630 [ 80.596523] ret_from_fork+0x10/0x20 [ 80.600082] [ 80.601558] The buggy address belongs to the object at ffff00080851b080 [ 80.601558] which belongs to the cache kmalloc-64 of size 64 [ 80.613884] The buggy address is located 0 bytes to the right of [ 80.613884] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 80.626730] [ 80.628207] The buggy address belongs to the physical page: [ 80.633765] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 80.641748] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 80.648258] page_type: f5(slab) [ 80.651394] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 80.659115] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 80.666834] page dumped because: kasan: bad access detected [ 80.672389] [ 80.673865] Memory state around the buggy address: [ 80.678644] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 80.685848] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 80.693052] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 80.700254] ^ [ 80.705032] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.712237] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.719437] ================================================================== [ 63.821307] ================================================================== [ 63.828374] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 63.835751] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 63.843128] [ 63.844613] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 63.844669] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.844684] Hardware name: WinLink E850-96 board (DT) [ 63.844705] Call trace: [ 63.844715] show_stack+0x20/0x38 (C) [ 63.844749] dump_stack_lvl+0x8c/0xd0 [ 63.844784] print_report+0x118/0x5d0 [ 63.844813] kasan_report+0xdc/0x128 [ 63.844842] __asan_report_store4_noabort+0x20/0x30 [ 63.844877] kasan_atomics_helper+0x3f7c/0x4858 [ 63.844911] kasan_atomics+0x198/0x2e0 [ 63.844944] kunit_try_run_case+0x170/0x3f0 [ 63.844976] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.845010] kthread+0x328/0x630 [ 63.845038] ret_from_fork+0x10/0x20 [ 63.845069] [ 63.912832] Allocated by task 346: [ 63.916219] kasan_save_stack+0x3c/0x68 [ 63.920037] kasan_save_track+0x20/0x40 [ 63.923856] kasan_save_alloc_info+0x40/0x58 [ 63.928110] __kasan_kmalloc+0xd4/0xd8 [ 63.931842] __kmalloc_cache_noprof+0x16c/0x3c0 [ 63.936356] kasan_atomics+0xb8/0x2e0 [ 63.940004] kunit_try_run_case+0x170/0x3f0 [ 63.944169] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.949637] kthread+0x328/0x630 [ 63.952849] ret_from_fork+0x10/0x20 [ 63.956408] [ 63.957885] The buggy address belongs to the object at ffff00080851b080 [ 63.957885] which belongs to the cache kmalloc-64 of size 64 [ 63.970210] The buggy address is located 0 bytes to the right of [ 63.970210] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 63.983057] [ 63.984535] The buggy address belongs to the physical page: [ 63.990092] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 63.998076] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 64.004584] page_type: f5(slab) [ 64.007719] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 64.015442] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 64.023162] page dumped because: kasan: bad access detected [ 64.028716] [ 64.030192] Memory state around the buggy address: [ 64.034970] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 64.042174] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 64.049379] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 64.056580] ^ [ 64.061358] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.068563] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 64.075765] ================================================================== [ 71.219457] ================================================================== [ 71.226526] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 71.233817] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 71.241195] [ 71.242677] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 71.242726] Tainted: [B]=BAD_PAGE, [N]=TEST [ 71.242742] Hardware name: WinLink E850-96 board (DT) [ 71.242762] Call trace: [ 71.242773] show_stack+0x20/0x38 (C) [ 71.242803] dump_stack_lvl+0x8c/0xd0 [ 71.242837] print_report+0x118/0x5d0 [ 71.242865] kasan_report+0xdc/0x128 [ 71.242891] kasan_check_range+0x100/0x1a8 [ 71.242918] __kasan_check_write+0x20/0x30 [ 71.242949] kasan_atomics_helper+0xc08/0x4858 [ 71.242984] kasan_atomics+0x198/0x2e0 [ 71.243016] kunit_try_run_case+0x170/0x3f0 [ 71.243044] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.243078] kthread+0x328/0x630 [ 71.243101] ret_from_fork+0x10/0x20 [ 71.243132] [ 71.314110] Allocated by task 346: [ 71.317497] kasan_save_stack+0x3c/0x68 [ 71.321315] kasan_save_track+0x20/0x40 [ 71.325134] kasan_save_alloc_info+0x40/0x58 [ 71.329388] __kasan_kmalloc+0xd4/0xd8 [ 71.333120] __kmalloc_cache_noprof+0x16c/0x3c0 [ 71.337634] kasan_atomics+0xb8/0x2e0 [ 71.341280] kunit_try_run_case+0x170/0x3f0 [ 71.345446] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.350915] kthread+0x328/0x630 [ 71.354127] ret_from_fork+0x10/0x20 [ 71.357686] [ 71.359161] The buggy address belongs to the object at ffff00080851b080 [ 71.359161] which belongs to the cache kmalloc-64 of size 64 [ 71.371488] The buggy address is located 0 bytes to the right of [ 71.371488] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 71.384335] [ 71.385811] The buggy address belongs to the physical page: [ 71.391367] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 71.399352] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 71.405862] page_type: f5(slab) [ 71.408995] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 71.416719] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 71.424438] page dumped because: kasan: bad access detected [ 71.429993] [ 71.431469] Memory state around the buggy address: [ 71.436248] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 71.443452] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.450657] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 71.457858] ^ [ 71.462636] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.469841] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.477041] ================================================================== [ 79.934944] ================================================================== [ 79.942020] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 79.949397] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 79.956775] [ 79.958258] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 79.958304] Tainted: [B]=BAD_PAGE, [N]=TEST [ 79.958322] Hardware name: WinLink E850-96 board (DT) [ 79.958340] Call trace: [ 79.958354] show_stack+0x20/0x38 (C) [ 79.958385] dump_stack_lvl+0x8c/0xd0 [ 79.958415] print_report+0x118/0x5d0 [ 79.958443] kasan_report+0xdc/0x128 [ 79.958470] kasan_check_range+0x100/0x1a8 [ 79.958499] __kasan_check_write+0x20/0x30 [ 79.958530] kasan_atomics_helper+0x175c/0x4858 [ 79.958565] kasan_atomics+0x198/0x2e0 [ 79.958596] kunit_try_run_case+0x170/0x3f0 [ 79.958625] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 79.958658] kthread+0x328/0x630 [ 79.958685] ret_from_fork+0x10/0x20 [ 79.958714] [ 80.029779] Allocated by task 346: [ 80.033165] kasan_save_stack+0x3c/0x68 [ 80.036983] kasan_save_track+0x20/0x40 [ 80.040802] kasan_save_alloc_info+0x40/0x58 [ 80.045055] __kasan_kmalloc+0xd4/0xd8 [ 80.048788] __kmalloc_cache_noprof+0x16c/0x3c0 [ 80.053302] kasan_atomics+0xb8/0x2e0 [ 80.056947] kunit_try_run_case+0x170/0x3f0 [ 80.061114] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 80.066583] kthread+0x328/0x630 [ 80.069795] ret_from_fork+0x10/0x20 [ 80.073354] [ 80.074829] The buggy address belongs to the object at ffff00080851b080 [ 80.074829] which belongs to the cache kmalloc-64 of size 64 [ 80.087156] The buggy address is located 0 bytes to the right of [ 80.087156] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 80.100003] [ 80.101479] The buggy address belongs to the physical page: [ 80.107036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 80.115020] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 80.121530] page_type: f5(slab) [ 80.124662] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 80.132387] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 80.140106] page dumped because: kasan: bad access detected [ 80.145662] [ 80.147137] Memory state around the buggy address: [ 80.151916] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 80.159120] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 80.166325] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 80.173526] ^ [ 80.178304] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.185508] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.192710] ================================================================== [ 65.404077] ================================================================== [ 65.411163] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 65.418541] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 65.425917] [ 65.427400] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 65.427449] Tainted: [B]=BAD_PAGE, [N]=TEST [ 65.427464] Hardware name: WinLink E850-96 board (DT) [ 65.427484] Call trace: [ 65.427495] show_stack+0x20/0x38 (C) [ 65.427524] dump_stack_lvl+0x8c/0xd0 [ 65.427559] print_report+0x118/0x5d0 [ 65.427588] kasan_report+0xdc/0x128 [ 65.427614] __asan_report_store4_noabort+0x20/0x30 [ 65.427647] kasan_atomics_helper+0x3f94/0x4858 [ 65.427681] kasan_atomics+0x198/0x2e0 [ 65.427713] kunit_try_run_case+0x170/0x3f0 [ 65.427747] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.427781] kthread+0x328/0x630 [ 65.427806] ret_from_fork+0x10/0x20 [ 65.427836] [ 65.495621] Allocated by task 346: [ 65.499008] kasan_save_stack+0x3c/0x68 [ 65.502826] kasan_save_track+0x20/0x40 [ 65.506645] kasan_save_alloc_info+0x40/0x58 [ 65.510899] __kasan_kmalloc+0xd4/0xd8 [ 65.514631] __kmalloc_cache_noprof+0x16c/0x3c0 [ 65.519145] kasan_atomics+0xb8/0x2e0 [ 65.522791] kunit_try_run_case+0x170/0x3f0 [ 65.526958] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 65.532426] kthread+0x328/0x630 [ 65.535638] ret_from_fork+0x10/0x20 [ 65.539197] [ 65.540672] The buggy address belongs to the object at ffff00080851b080 [ 65.540672] which belongs to the cache kmalloc-64 of size 64 [ 65.552999] The buggy address is located 0 bytes to the right of [ 65.552999] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 65.565845] [ 65.567325] The buggy address belongs to the physical page: [ 65.572880] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 65.580863] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 65.587373] page_type: f5(slab) [ 65.590507] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 65.598231] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 65.605949] page dumped because: kasan: bad access detected [ 65.611505] [ 65.612980] Memory state around the buggy address: [ 65.617761] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 65.624963] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 65.632168] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 65.639369] ^ [ 65.644147] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.651352] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 65.658553] ================================================================== [ 80.200043] ================================================================== [ 80.207121] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 80.214498] Read of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 80.221789] [ 80.223270] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 80.223319] Tainted: [B]=BAD_PAGE, [N]=TEST [ 80.223334] Hardware name: WinLink E850-96 board (DT) [ 80.223349] Call trace: [ 80.223362] show_stack+0x20/0x38 (C) [ 80.223393] dump_stack_lvl+0x8c/0xd0 [ 80.223426] print_report+0x118/0x5d0 [ 80.223455] kasan_report+0xdc/0x128 [ 80.223482] __asan_report_load8_noabort+0x20/0x30 [ 80.223514] kasan_atomics_helper+0x3e20/0x4858 [ 80.223551] kasan_atomics+0x198/0x2e0 [ 80.223583] kunit_try_run_case+0x170/0x3f0 [ 80.223611] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 80.223644] kthread+0x328/0x630 [ 80.223670] ret_from_fork+0x10/0x20 [ 80.223702] [ 80.291406] Allocated by task 346: [ 80.294793] kasan_save_stack+0x3c/0x68 [ 80.298611] kasan_save_track+0x20/0x40 [ 80.302430] kasan_save_alloc_info+0x40/0x58 [ 80.306683] __kasan_kmalloc+0xd4/0xd8 [ 80.310416] __kmalloc_cache_noprof+0x16c/0x3c0 [ 80.314930] kasan_atomics+0xb8/0x2e0 [ 80.318576] kunit_try_run_case+0x170/0x3f0 [ 80.322742] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 80.328211] kthread+0x328/0x630 [ 80.331423] ret_from_fork+0x10/0x20 [ 80.334982] [ 80.336457] The buggy address belongs to the object at ffff00080851b080 [ 80.336457] which belongs to the cache kmalloc-64 of size 64 [ 80.348784] The buggy address is located 0 bytes to the right of [ 80.348784] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 80.361630] [ 80.363106] The buggy address belongs to the physical page: [ 80.368662] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 80.376648] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 80.383158] page_type: f5(slab) [ 80.386291] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 80.394015] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 80.401734] page dumped because: kasan: bad access detected [ 80.407289] [ 80.408765] Memory state around the buggy address: [ 80.413543] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 80.420748] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 80.427953] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 80.435154] ^ [ 80.439932] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.447137] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 80.454338] ================================================================== [ 68.315174] ================================================================== [ 68.322230] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 68.329520] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 68.336898] [ 68.338379] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 68.338432] Tainted: [B]=BAD_PAGE, [N]=TEST [ 68.338449] Hardware name: WinLink E850-96 board (DT) [ 68.338466] Call trace: [ 68.338478] show_stack+0x20/0x38 (C) [ 68.338509] dump_stack_lvl+0x8c/0xd0 [ 68.338543] print_report+0x118/0x5d0 [ 68.338570] kasan_report+0xdc/0x128 [ 68.338596] kasan_check_range+0x100/0x1a8 [ 68.338627] __kasan_check_write+0x20/0x30 [ 68.338656] kasan_atomics_helper+0x7cc/0x4858 [ 68.338690] kasan_atomics+0x198/0x2e0 [ 68.338721] kunit_try_run_case+0x170/0x3f0 [ 68.338751] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.338782] kthread+0x328/0x630 [ 68.338808] ret_from_fork+0x10/0x20 [ 68.338837] [ 68.409813] Allocated by task 346: [ 68.413200] kasan_save_stack+0x3c/0x68 [ 68.417018] kasan_save_track+0x20/0x40 [ 68.420838] kasan_save_alloc_info+0x40/0x58 [ 68.425091] __kasan_kmalloc+0xd4/0xd8 [ 68.428823] __kmalloc_cache_noprof+0x16c/0x3c0 [ 68.433337] kasan_atomics+0xb8/0x2e0 [ 68.436983] kunit_try_run_case+0x170/0x3f0 [ 68.441150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.446618] kthread+0x328/0x630 [ 68.449830] ret_from_fork+0x10/0x20 [ 68.453389] [ 68.454865] The buggy address belongs to the object at ffff00080851b080 [ 68.454865] which belongs to the cache kmalloc-64 of size 64 [ 68.467191] The buggy address is located 0 bytes to the right of [ 68.467191] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 68.480038] [ 68.481516] The buggy address belongs to the physical page: [ 68.487072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 68.495055] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 68.501566] page_type: f5(slab) [ 68.504700] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 68.512423] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 68.520142] page dumped because: kasan: bad access detected [ 68.525697] [ 68.527172] Memory state around the buggy address: [ 68.531951] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 68.539156] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 68.546360] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 68.553561] ^ [ 68.558339] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.565544] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 68.572745] ================================================================== [ 74.647003] ================================================================== [ 74.654079] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 74.661369] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 74.668747] [ 74.670229] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 74.670276] Tainted: [B]=BAD_PAGE, [N]=TEST [ 74.670293] Hardware name: WinLink E850-96 board (DT) [ 74.670312] Call trace: [ 74.670325] show_stack+0x20/0x38 (C) [ 74.670355] dump_stack_lvl+0x8c/0xd0 [ 74.670386] print_report+0x118/0x5d0 [ 74.670414] kasan_report+0xdc/0x128 [ 74.670441] kasan_check_range+0x100/0x1a8 [ 74.670470] __kasan_check_write+0x20/0x30 [ 74.670502] kasan_atomics_helper+0xff0/0x4858 [ 74.670537] kasan_atomics+0x198/0x2e0 [ 74.670571] kunit_try_run_case+0x170/0x3f0 [ 74.670600] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.670635] kthread+0x328/0x630 [ 74.670661] ret_from_fork+0x10/0x20 [ 74.670691] [ 74.741663] Allocated by task 346: [ 74.745050] kasan_save_stack+0x3c/0x68 [ 74.748868] kasan_save_track+0x20/0x40 [ 74.752687] kasan_save_alloc_info+0x40/0x58 [ 74.756940] __kasan_kmalloc+0xd4/0xd8 [ 74.760673] __kmalloc_cache_noprof+0x16c/0x3c0 [ 74.765187] kasan_atomics+0xb8/0x2e0 [ 74.768832] kunit_try_run_case+0x170/0x3f0 [ 74.772999] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.778468] kthread+0x328/0x630 [ 74.781680] ret_from_fork+0x10/0x20 [ 74.785239] [ 74.786714] The buggy address belongs to the object at ffff00080851b080 [ 74.786714] which belongs to the cache kmalloc-64 of size 64 [ 74.799041] The buggy address is located 0 bytes to the right of [ 74.799041] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 74.811887] [ 74.813363] The buggy address belongs to the physical page: [ 74.818920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 74.826905] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 74.833415] page_type: f5(slab) [ 74.836549] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 74.844272] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 74.851992] page dumped because: kasan: bad access detected [ 74.857546] [ 74.859022] Memory state around the buggy address: [ 74.863800] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 74.871005] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.878210] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 74.885411] ^ [ 74.890189] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.897393] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.904595] ================================================================== [ 75.177033] ================================================================== [ 75.184106] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 75.191483] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 75.198861] [ 75.200342] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 75.200392] Tainted: [B]=BAD_PAGE, [N]=TEST [ 75.200407] Hardware name: WinLink E850-96 board (DT) [ 75.200426] Call trace: [ 75.200441] show_stack+0x20/0x38 (C) [ 75.200472] dump_stack_lvl+0x8c/0xd0 [ 75.200505] print_report+0x118/0x5d0 [ 75.200533] kasan_report+0xdc/0x128 [ 75.200559] kasan_check_range+0x100/0x1a8 [ 75.200588] __kasan_check_write+0x20/0x30 [ 75.200620] kasan_atomics_helper+0x10c0/0x4858 [ 75.200656] kasan_atomics+0x198/0x2e0 [ 75.200689] kunit_try_run_case+0x170/0x3f0 [ 75.200716] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.200749] kthread+0x328/0x630 [ 75.200776] ret_from_fork+0x10/0x20 [ 75.200807] [ 75.271863] Allocated by task 346: [ 75.275250] kasan_save_stack+0x3c/0x68 [ 75.279068] kasan_save_track+0x20/0x40 [ 75.282887] kasan_save_alloc_info+0x40/0x58 [ 75.287141] __kasan_kmalloc+0xd4/0xd8 [ 75.290874] __kmalloc_cache_noprof+0x16c/0x3c0 [ 75.295387] kasan_atomics+0xb8/0x2e0 [ 75.299033] kunit_try_run_case+0x170/0x3f0 [ 75.303200] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.308668] kthread+0x328/0x630 [ 75.311880] ret_from_fork+0x10/0x20 [ 75.315439] [ 75.316914] The buggy address belongs to the object at ffff00080851b080 [ 75.316914] which belongs to the cache kmalloc-64 of size 64 [ 75.329241] The buggy address is located 0 bytes to the right of [ 75.329241] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 75.342088] [ 75.343564] The buggy address belongs to the physical page: [ 75.349121] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 75.357105] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 75.363615] page_type: f5(slab) [ 75.366748] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 75.374472] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 75.382191] page dumped because: kasan: bad access detected [ 75.387747] [ 75.389223] Memory state around the buggy address: [ 75.394001] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 75.401206] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.408410] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 75.415611] ^ [ 75.420389] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.427594] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.434795] ================================================================== [ 69.636484] ================================================================== [ 69.643564] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 69.650854] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 69.658232] [ 69.659713] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 69.659763] Tainted: [B]=BAD_PAGE, [N]=TEST [ 69.659778] Hardware name: WinLink E850-96 board (DT) [ 69.659796] Call trace: [ 69.659809] show_stack+0x20/0x38 (C) [ 69.659839] dump_stack_lvl+0x8c/0xd0 [ 69.659870] print_report+0x118/0x5d0 [ 69.659898] kasan_report+0xdc/0x128 [ 69.659924] kasan_check_range+0x100/0x1a8 [ 69.659954] __kasan_check_write+0x20/0x30 [ 69.659984] kasan_atomics_helper+0xa04/0x4858 [ 69.660020] kasan_atomics+0x198/0x2e0 [ 69.660051] kunit_try_run_case+0x170/0x3f0 [ 69.660079] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.660115] kthread+0x328/0x630 [ 69.660142] ret_from_fork+0x10/0x20 [ 69.660173] [ 69.731148] Allocated by task 346: [ 69.734535] kasan_save_stack+0x3c/0x68 [ 69.738353] kasan_save_track+0x20/0x40 [ 69.742172] kasan_save_alloc_info+0x40/0x58 [ 69.746426] __kasan_kmalloc+0xd4/0xd8 [ 69.750158] __kmalloc_cache_noprof+0x16c/0x3c0 [ 69.754672] kasan_atomics+0xb8/0x2e0 [ 69.758318] kunit_try_run_case+0x170/0x3f0 [ 69.762484] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 69.767953] kthread+0x328/0x630 [ 69.771164] ret_from_fork+0x10/0x20 [ 69.774724] [ 69.776199] The buggy address belongs to the object at ffff00080851b080 [ 69.776199] which belongs to the cache kmalloc-64 of size 64 [ 69.788526] The buggy address is located 0 bytes to the right of [ 69.788526] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 69.801372] [ 69.802848] The buggy address belongs to the physical page: [ 69.808405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 69.816390] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 69.822900] page_type: f5(slab) [ 69.826033] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 69.833757] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 69.841476] page dumped because: kasan: bad access detected [ 69.847031] [ 69.848507] Memory state around the buggy address: [ 69.853287] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 69.860490] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.867695] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 69.874896] ^ [ 69.879674] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.886879] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.894079] ================================================================== [ 66.460722] ================================================================== [ 66.467745] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 66.475034] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 66.482412] [ 66.483893] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 66.483943] Tainted: [B]=BAD_PAGE, [N]=TEST [ 66.483960] Hardware name: WinLink E850-96 board (DT) [ 66.483981] Call trace: [ 66.483995] show_stack+0x20/0x38 (C) [ 66.484026] dump_stack_lvl+0x8c/0xd0 [ 66.484058] print_report+0x118/0x5d0 [ 66.484087] kasan_report+0xdc/0x128 [ 66.484114] kasan_check_range+0x100/0x1a8 [ 66.484143] __kasan_check_write+0x20/0x30 [ 66.484173] kasan_atomics_helper+0x4e4/0x4858 [ 66.484207] kasan_atomics+0x198/0x2e0 [ 66.484238] kunit_try_run_case+0x170/0x3f0 [ 66.484270] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.484306] kthread+0x328/0x630 [ 66.484334] ret_from_fork+0x10/0x20 [ 66.484365] [ 66.555327] Allocated by task 346: [ 66.558714] kasan_save_stack+0x3c/0x68 [ 66.562532] kasan_save_track+0x20/0x40 [ 66.566351] kasan_save_alloc_info+0x40/0x58 [ 66.570605] __kasan_kmalloc+0xd4/0xd8 [ 66.574338] __kmalloc_cache_noprof+0x16c/0x3c0 [ 66.578851] kasan_atomics+0xb8/0x2e0 [ 66.582497] kunit_try_run_case+0x170/0x3f0 [ 66.586664] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 66.592132] kthread+0x328/0x630 [ 66.595344] ret_from_fork+0x10/0x20 [ 66.598903] [ 66.600379] The buggy address belongs to the object at ffff00080851b080 [ 66.600379] which belongs to the cache kmalloc-64 of size 64 [ 66.612705] The buggy address is located 0 bytes to the right of [ 66.612705] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 66.625552] [ 66.627029] The buggy address belongs to the physical page: [ 66.632585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 66.640571] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 66.647079] page_type: f5(slab) [ 66.650212] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 66.657936] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 66.665656] page dumped because: kasan: bad access detected [ 66.671211] [ 66.672687] Memory state around the buggy address: [ 66.677468] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 66.684669] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.691874] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 66.699075] ^ [ 66.703853] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.711058] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 66.718259] ================================================================== [ 75.707229] ================================================================== [ 75.714306] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 75.721683] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 75.729061] [ 75.730543] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 75.730590] Tainted: [B]=BAD_PAGE, [N]=TEST [ 75.730604] Hardware name: WinLink E850-96 board (DT) [ 75.730622] Call trace: [ 75.730634] show_stack+0x20/0x38 (C) [ 75.730665] dump_stack_lvl+0x8c/0xd0 [ 75.730699] print_report+0x118/0x5d0 [ 75.730727] kasan_report+0xdc/0x128 [ 75.730755] kasan_check_range+0x100/0x1a8 [ 75.730785] __kasan_check_write+0x20/0x30 [ 75.730814] kasan_atomics_helper+0x1190/0x4858 [ 75.730850] kasan_atomics+0x198/0x2e0 [ 75.730883] kunit_try_run_case+0x170/0x3f0 [ 75.730912] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.730944] kthread+0x328/0x630 [ 75.730970] ret_from_fork+0x10/0x20 [ 75.731002] [ 75.802064] Allocated by task 346: [ 75.805451] kasan_save_stack+0x3c/0x68 [ 75.809268] kasan_save_track+0x20/0x40 [ 75.813088] kasan_save_alloc_info+0x40/0x58 [ 75.817341] __kasan_kmalloc+0xd4/0xd8 [ 75.821074] __kmalloc_cache_noprof+0x16c/0x3c0 [ 75.825587] kasan_atomics+0xb8/0x2e0 [ 75.829233] kunit_try_run_case+0x170/0x3f0 [ 75.833400] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.838868] kthread+0x328/0x630 [ 75.842080] ret_from_fork+0x10/0x20 [ 75.845639] [ 75.847115] The buggy address belongs to the object at ffff00080851b080 [ 75.847115] which belongs to the cache kmalloc-64 of size 64 [ 75.859442] The buggy address is located 0 bytes to the right of [ 75.859442] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 75.872288] [ 75.873764] The buggy address belongs to the physical page: [ 75.879323] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 75.887307] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 75.893816] page_type: f5(slab) [ 75.896950] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 75.904673] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 75.912392] page dumped because: kasan: bad access detected [ 75.917947] [ 75.919423] Memory state around the buggy address: [ 75.924201] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 75.931406] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.938610] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 75.945811] ^ [ 75.950589] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.957794] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.964995] ================================================================== [ 74.382103] ================================================================== [ 74.389152] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 74.396444] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 74.403821] [ 74.405302] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 74.405350] Tainted: [B]=BAD_PAGE, [N]=TEST [ 74.405366] Hardware name: WinLink E850-96 board (DT) [ 74.405384] Call trace: [ 74.405397] show_stack+0x20/0x38 (C) [ 74.405428] dump_stack_lvl+0x8c/0xd0 [ 74.405460] print_report+0x118/0x5d0 [ 74.405488] kasan_report+0xdc/0x128 [ 74.405515] kasan_check_range+0x100/0x1a8 [ 74.405544] __kasan_check_write+0x20/0x30 [ 74.405576] kasan_atomics_helper+0xf88/0x4858 [ 74.405611] kasan_atomics+0x198/0x2e0 [ 74.405644] kunit_try_run_case+0x170/0x3f0 [ 74.405674] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.405708] kthread+0x328/0x630 [ 74.405735] ret_from_fork+0x10/0x20 [ 74.405768] [ 74.476736] Allocated by task 346: [ 74.480123] kasan_save_stack+0x3c/0x68 [ 74.483941] kasan_save_track+0x20/0x40 [ 74.487760] kasan_save_alloc_info+0x40/0x58 [ 74.492014] __kasan_kmalloc+0xd4/0xd8 [ 74.495746] __kmalloc_cache_noprof+0x16c/0x3c0 [ 74.500260] kasan_atomics+0xb8/0x2e0 [ 74.503906] kunit_try_run_case+0x170/0x3f0 [ 74.508073] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.513541] kthread+0x328/0x630 [ 74.516753] ret_from_fork+0x10/0x20 [ 74.520312] [ 74.521788] The buggy address belongs to the object at ffff00080851b080 [ 74.521788] which belongs to the cache kmalloc-64 of size 64 [ 74.534114] The buggy address is located 0 bytes to the right of [ 74.534114] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 74.546961] [ 74.548437] The buggy address belongs to the physical page: [ 74.553996] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 74.561979] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 74.568488] page_type: f5(slab) [ 74.571624] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 74.579346] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 74.587065] page dumped because: kasan: bad access detected [ 74.592620] [ 74.594095] Memory state around the buggy address: [ 74.598876] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 74.606078] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 74.613283] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 74.620484] ^ [ 74.625262] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.632467] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 74.639669] ================================================================== [ 74.911950] ================================================================== [ 74.919008] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 74.926384] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 74.933761] [ 74.935241] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 74.935290] Tainted: [B]=BAD_PAGE, [N]=TEST [ 74.935306] Hardware name: WinLink E850-96 board (DT) [ 74.935324] Call trace: [ 74.935337] show_stack+0x20/0x38 (C) [ 74.935370] dump_stack_lvl+0x8c/0xd0 [ 74.935402] print_report+0x118/0x5d0 [ 74.935432] kasan_report+0xdc/0x128 [ 74.935458] kasan_check_range+0x100/0x1a8 [ 74.935487] __kasan_check_write+0x20/0x30 [ 74.935517] kasan_atomics_helper+0x1058/0x4858 [ 74.935552] kasan_atomics+0x198/0x2e0 [ 74.935582] kunit_try_run_case+0x170/0x3f0 [ 74.935612] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 74.935645] kthread+0x328/0x630 [ 74.935669] ret_from_fork+0x10/0x20 [ 74.935700] [ 75.006763] Allocated by task 346: [ 75.010150] kasan_save_stack+0x3c/0x68 [ 75.013968] kasan_save_track+0x20/0x40 [ 75.017787] kasan_save_alloc_info+0x40/0x58 [ 75.022040] __kasan_kmalloc+0xd4/0xd8 [ 75.025773] __kmalloc_cache_noprof+0x16c/0x3c0 [ 75.030287] kasan_atomics+0xb8/0x2e0 [ 75.033933] kunit_try_run_case+0x170/0x3f0 [ 75.038099] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 75.043568] kthread+0x328/0x630 [ 75.046780] ret_from_fork+0x10/0x20 [ 75.050339] [ 75.051814] The buggy address belongs to the object at ffff00080851b080 [ 75.051814] which belongs to the cache kmalloc-64 of size 64 [ 75.064141] The buggy address is located 0 bytes to the right of [ 75.064141] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 75.076988] [ 75.078463] The buggy address belongs to the physical page: [ 75.084021] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 75.092005] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 75.098515] page_type: f5(slab) [ 75.101650] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 75.109372] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 75.117091] page dumped because: kasan: bad access detected [ 75.122646] [ 75.124122] Memory state around the buggy address: [ 75.128900] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 75.136105] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 75.143310] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 75.150511] ^ [ 75.155289] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.162494] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 75.169695] ================================================================== [ 78.354760] ================================================================== [ 78.361836] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 78.369215] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 78.376591] [ 78.378073] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 78.378121] Tainted: [B]=BAD_PAGE, [N]=TEST [ 78.378137] Hardware name: WinLink E850-96 board (DT) [ 78.378156] Call trace: [ 78.378170] show_stack+0x20/0x38 (C) [ 78.378202] dump_stack_lvl+0x8c/0xd0 [ 78.378235] print_report+0x118/0x5d0 [ 78.378263] kasan_report+0xdc/0x128 [ 78.378290] kasan_check_range+0x100/0x1a8 [ 78.378319] __kasan_check_write+0x20/0x30 [ 78.378350] kasan_atomics_helper+0x15b4/0x4858 [ 78.378385] kasan_atomics+0x198/0x2e0 [ 78.378417] kunit_try_run_case+0x170/0x3f0 [ 78.378447] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 78.378480] kthread+0x328/0x630 [ 78.378506] ret_from_fork+0x10/0x20 [ 78.378537] [ 78.449593] Allocated by task 346: [ 78.452980] kasan_save_stack+0x3c/0x68 [ 78.456798] kasan_save_track+0x20/0x40 [ 78.460618] kasan_save_alloc_info+0x40/0x58 [ 78.464871] __kasan_kmalloc+0xd4/0xd8 [ 78.468604] __kmalloc_cache_noprof+0x16c/0x3c0 [ 78.473117] kasan_atomics+0xb8/0x2e0 [ 78.476763] kunit_try_run_case+0x170/0x3f0 [ 78.480930] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 78.486398] kthread+0x328/0x630 [ 78.489610] ret_from_fork+0x10/0x20 [ 78.493169] [ 78.494644] The buggy address belongs to the object at ffff00080851b080 [ 78.494644] which belongs to the cache kmalloc-64 of size 64 [ 78.506971] The buggy address is located 0 bytes to the right of [ 78.506971] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 78.519818] [ 78.521294] The buggy address belongs to the physical page: [ 78.526851] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 78.534835] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 78.541345] page_type: f5(slab) [ 78.544478] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 78.552202] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 78.559921] page dumped because: kasan: bad access detected [ 78.565477] [ 78.566952] Memory state around the buggy address: [ 78.571731] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 78.578935] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 78.586140] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 78.593341] ^ [ 78.598119] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.605324] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.612525] ================================================================== [ 66.990526] ================================================================== [ 66.997597] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 67.004888] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 67.012265] [ 67.013748] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 67.013795] Tainted: [B]=BAD_PAGE, [N]=TEST [ 67.013811] Hardware name: WinLink E850-96 board (DT) [ 67.013830] Call trace: [ 67.013842] show_stack+0x20/0x38 (C) [ 67.013873] dump_stack_lvl+0x8c/0xd0 [ 67.013906] print_report+0x118/0x5d0 [ 67.013934] kasan_report+0xdc/0x128 [ 67.013961] kasan_check_range+0x100/0x1a8 [ 67.013990] __kasan_check_write+0x20/0x30 [ 67.014021] kasan_atomics_helper+0x5b4/0x4858 [ 67.014056] kasan_atomics+0x198/0x2e0 [ 67.014087] kunit_try_run_case+0x170/0x3f0 [ 67.014117] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.014149] kthread+0x328/0x630 [ 67.014177] ret_from_fork+0x10/0x20 [ 67.014207] [ 67.085182] Allocated by task 346: [ 67.088568] kasan_save_stack+0x3c/0x68 [ 67.092385] kasan_save_track+0x20/0x40 [ 67.096205] kasan_save_alloc_info+0x40/0x58 [ 67.100458] __kasan_kmalloc+0xd4/0xd8 [ 67.104191] __kmalloc_cache_noprof+0x16c/0x3c0 [ 67.108705] kasan_atomics+0xb8/0x2e0 [ 67.112350] kunit_try_run_case+0x170/0x3f0 [ 67.116517] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 67.121986] kthread+0x328/0x630 [ 67.125198] ret_from_fork+0x10/0x20 [ 67.128757] [ 67.130232] The buggy address belongs to the object at ffff00080851b080 [ 67.130232] which belongs to the cache kmalloc-64 of size 64 [ 67.142558] The buggy address is located 0 bytes to the right of [ 67.142558] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 67.155405] [ 67.156883] The buggy address belongs to the physical page: [ 67.162439] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 67.170422] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 67.176933] page_type: f5(slab) [ 67.180066] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 67.187790] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 67.195509] page dumped because: kasan: bad access detected [ 67.201064] [ 67.202540] Memory state around the buggy address: [ 67.207318] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 67.214523] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 67.221728] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 67.228928] ^ [ 67.233706] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.240911] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 67.248112] ================================================================== [ 77.559481] ================================================================== [ 77.566535] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 77.573912] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 77.581291] [ 77.582773] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 77.582822] Tainted: [B]=BAD_PAGE, [N]=TEST [ 77.582838] Hardware name: WinLink E850-96 board (DT) [ 77.582858] Call trace: [ 77.582870] show_stack+0x20/0x38 (C) [ 77.582902] dump_stack_lvl+0x8c/0xd0 [ 77.582935] print_report+0x118/0x5d0 [ 77.582964] kasan_report+0xdc/0x128 [ 77.582992] kasan_check_range+0x100/0x1a8 [ 77.583023] __kasan_check_write+0x20/0x30 [ 77.583053] kasan_atomics_helper+0x147c/0x4858 [ 77.583088] kasan_atomics+0x198/0x2e0 [ 77.583122] kunit_try_run_case+0x170/0x3f0 [ 77.583151] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.583184] kthread+0x328/0x630 [ 77.583212] ret_from_fork+0x10/0x20 [ 77.583242] [ 77.654293] Allocated by task 346: [ 77.657680] kasan_save_stack+0x3c/0x68 [ 77.661498] kasan_save_track+0x20/0x40 [ 77.665317] kasan_save_alloc_info+0x40/0x58 [ 77.669570] __kasan_kmalloc+0xd4/0xd8 [ 77.673303] __kmalloc_cache_noprof+0x16c/0x3c0 [ 77.677817] kasan_atomics+0xb8/0x2e0 [ 77.681462] kunit_try_run_case+0x170/0x3f0 [ 77.685629] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 77.691097] kthread+0x328/0x630 [ 77.694309] ret_from_fork+0x10/0x20 [ 77.697868] [ 77.699344] The buggy address belongs to the object at ffff00080851b080 [ 77.699344] which belongs to the cache kmalloc-64 of size 64 [ 77.711671] The buggy address is located 0 bytes to the right of [ 77.711671] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 77.724517] [ 77.725993] The buggy address belongs to the physical page: [ 77.731552] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 77.739535] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 77.746045] page_type: f5(slab) [ 77.749179] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 77.756902] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 77.764621] page dumped because: kasan: bad access detected [ 77.770176] [ 77.771652] Memory state around the buggy address: [ 77.776434] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 77.783635] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 77.790839] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 77.798040] ^ [ 77.802818] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.810023] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 77.817224] ================================================================== [ 68.845010] ================================================================== [ 68.852083] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 68.859461] Read of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 68.866751] [ 68.868231] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 68.868280] Tainted: [B]=BAD_PAGE, [N]=TEST [ 68.868297] Hardware name: WinLink E850-96 board (DT) [ 68.868315] Call trace: [ 68.868329] show_stack+0x20/0x38 (C) [ 68.868359] dump_stack_lvl+0x8c/0xd0 [ 68.868393] print_report+0x118/0x5d0 [ 68.868422] kasan_report+0xdc/0x128 [ 68.868449] __asan_report_load4_noabort+0x20/0x30 [ 68.868481] kasan_atomics_helper+0x42d8/0x4858 [ 68.868515] kasan_atomics+0x198/0x2e0 [ 68.868550] kunit_try_run_case+0x170/0x3f0 [ 68.868582] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.868616] kthread+0x328/0x630 [ 68.868641] ret_from_fork+0x10/0x20 [ 68.868672] [ 68.936368] Allocated by task 346: [ 68.939755] kasan_save_stack+0x3c/0x68 [ 68.943573] kasan_save_track+0x20/0x40 [ 68.947392] kasan_save_alloc_info+0x40/0x58 [ 68.951646] __kasan_kmalloc+0xd4/0xd8 [ 68.955378] __kmalloc_cache_noprof+0x16c/0x3c0 [ 68.959892] kasan_atomics+0xb8/0x2e0 [ 68.963538] kunit_try_run_case+0x170/0x3f0 [ 68.967704] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 68.973173] kthread+0x328/0x630 [ 68.976385] ret_from_fork+0x10/0x20 [ 68.979944] [ 68.981419] The buggy address belongs to the object at ffff00080851b080 [ 68.981419] which belongs to the cache kmalloc-64 of size 64 [ 68.993746] The buggy address is located 0 bytes to the right of [ 68.993746] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 69.006592] [ 69.008070] The buggy address belongs to the physical page: [ 69.013626] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 69.021611] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 69.028120] page_type: f5(slab) [ 69.031254] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 69.038977] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 69.046696] page dumped because: kasan: bad access detected [ 69.052251] [ 69.053727] Memory state around the buggy address: [ 69.058506] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 69.065710] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 69.072915] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 69.080116] ^ [ 69.084894] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.092099] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 69.099300] ================================================================== [ 70.166324] ================================================================== [ 70.173417] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 70.180707] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 70.188085] [ 70.189568] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 70.189619] Tainted: [B]=BAD_PAGE, [N]=TEST [ 70.189634] Hardware name: WinLink E850-96 board (DT) [ 70.189652] Call trace: [ 70.189666] show_stack+0x20/0x38 (C) [ 70.189698] dump_stack_lvl+0x8c/0xd0 [ 70.189730] print_report+0x118/0x5d0 [ 70.189757] kasan_report+0xdc/0x128 [ 70.189785] kasan_check_range+0x100/0x1a8 [ 70.189816] __kasan_check_write+0x20/0x30 [ 70.189845] kasan_atomics_helper+0xad4/0x4858 [ 70.189879] kasan_atomics+0x198/0x2e0 [ 70.189910] kunit_try_run_case+0x170/0x3f0 [ 70.189940] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.189974] kthread+0x328/0x630 [ 70.190000] ret_from_fork+0x10/0x20 [ 70.190030] [ 70.261001] Allocated by task 346: [ 70.264388] kasan_save_stack+0x3c/0x68 [ 70.268205] kasan_save_track+0x20/0x40 [ 70.272025] kasan_save_alloc_info+0x40/0x58 [ 70.276279] __kasan_kmalloc+0xd4/0xd8 [ 70.280011] __kmalloc_cache_noprof+0x16c/0x3c0 [ 70.284525] kasan_atomics+0xb8/0x2e0 [ 70.288171] kunit_try_run_case+0x170/0x3f0 [ 70.292337] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 70.297806] kthread+0x328/0x630 [ 70.301018] ret_from_fork+0x10/0x20 [ 70.304577] [ 70.306052] The buggy address belongs to the object at ffff00080851b080 [ 70.306052] which belongs to the cache kmalloc-64 of size 64 [ 70.318379] The buggy address is located 0 bytes to the right of [ 70.318379] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 70.331225] [ 70.332701] The buggy address belongs to the physical page: [ 70.338258] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 70.346243] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 70.352753] page_type: f5(slab) [ 70.355886] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 70.363610] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 70.371329] page dumped because: kasan: bad access detected [ 70.376884] [ 70.378360] Memory state around the buggy address: [ 70.383138] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 70.390343] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 70.397548] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 70.404749] ^ [ 70.409526] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.416731] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 70.423933] ================================================================== [ 72.272557] ================================================================== [ 72.279635] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 72.286926] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 72.294304] [ 72.295785] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 72.295832] Tainted: [B]=BAD_PAGE, [N]=TEST [ 72.295848] Hardware name: WinLink E850-96 board (DT) [ 72.295866] Call trace: [ 72.295880] show_stack+0x20/0x38 (C) [ 72.295913] dump_stack_lvl+0x8c/0xd0 [ 72.295945] print_report+0x118/0x5d0 [ 72.295971] kasan_report+0xdc/0x128 [ 72.296000] kasan_check_range+0x100/0x1a8 [ 72.296029] __kasan_check_write+0x20/0x30 [ 72.296060] kasan_atomics_helper+0xd3c/0x4858 [ 72.296095] kasan_atomics+0x198/0x2e0 [ 72.296129] kunit_try_run_case+0x170/0x3f0 [ 72.296160] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.296192] kthread+0x328/0x630 [ 72.296218] ret_from_fork+0x10/0x20 [ 72.296247] [ 72.367219] Allocated by task 346: [ 72.370606] kasan_save_stack+0x3c/0x68 [ 72.374424] kasan_save_track+0x20/0x40 [ 72.378244] kasan_save_alloc_info+0x40/0x58 [ 72.382497] __kasan_kmalloc+0xd4/0xd8 [ 72.386229] __kmalloc_cache_noprof+0x16c/0x3c0 [ 72.390743] kasan_atomics+0xb8/0x2e0 [ 72.394389] kunit_try_run_case+0x170/0x3f0 [ 72.398555] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 72.404025] kthread+0x328/0x630 [ 72.407236] ret_from_fork+0x10/0x20 [ 72.410795] [ 72.412270] The buggy address belongs to the object at ffff00080851b080 [ 72.412270] which belongs to the cache kmalloc-64 of size 64 [ 72.424597] The buggy address is located 0 bytes to the right of [ 72.424597] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 72.437444] [ 72.438920] The buggy address belongs to the physical page: [ 72.444477] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 72.452464] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 72.458971] page_type: f5(slab) [ 72.462104] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 72.469829] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 72.477548] page dumped because: kasan: bad access detected [ 72.483103] [ 72.484578] Memory state around the buggy address: [ 72.489358] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 72.496562] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 72.503766] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 72.510967] ^ [ 72.515745] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.522950] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.530151] ================================================================== [ 78.881488] ================================================================== [ 78.888564] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 78.895941] Write of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 78.903319] [ 78.904800] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 78.904850] Tainted: [B]=BAD_PAGE, [N]=TEST [ 78.904865] Hardware name: WinLink E850-96 board (DT) [ 78.904883] Call trace: [ 78.904894] show_stack+0x20/0x38 (C) [ 78.904924] dump_stack_lvl+0x8c/0xd0 [ 78.904956] print_report+0x118/0x5d0 [ 78.904984] kasan_report+0xdc/0x128 [ 78.905009] kasan_check_range+0x100/0x1a8 [ 78.905039] __kasan_check_write+0x20/0x30 [ 78.905069] kasan_atomics_helper+0x1644/0x4858 [ 78.905106] kasan_atomics+0x198/0x2e0 [ 78.905137] kunit_try_run_case+0x170/0x3f0 [ 78.905167] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 78.905201] kthread+0x328/0x630 [ 78.905225] ret_from_fork+0x10/0x20 [ 78.905255] [ 78.976322] Allocated by task 346: [ 78.979708] kasan_save_stack+0x3c/0x68 [ 78.983526] kasan_save_track+0x20/0x40 [ 78.987346] kasan_save_alloc_info+0x40/0x58 [ 78.991599] __kasan_kmalloc+0xd4/0xd8 [ 78.995332] __kmalloc_cache_noprof+0x16c/0x3c0 [ 78.999846] kasan_atomics+0xb8/0x2e0 [ 79.003491] kunit_try_run_case+0x170/0x3f0 [ 79.007658] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 79.013127] kthread+0x328/0x630 [ 79.016338] ret_from_fork+0x10/0x20 [ 79.019898] [ 79.021373] The buggy address belongs to the object at ffff00080851b080 [ 79.021373] which belongs to the cache kmalloc-64 of size 64 [ 79.033699] The buggy address is located 0 bytes to the right of [ 79.033699] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 79.046546] [ 79.048023] The buggy address belongs to the physical page: [ 79.053579] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 79.061565] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 79.068074] page_type: f5(slab) [ 79.071207] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 79.078931] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 79.086649] page dumped because: kasan: bad access detected [ 79.092205] [ 79.093680] Memory state around the buggy address: [ 79.098459] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 79.105664] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 79.112868] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 79.120069] ^ [ 79.124847] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.132052] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.139253] ================================================================== [ 71.746008] ================================================================== [ 71.753081] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 71.760371] Write of size 4 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 71.767749] [ 71.769230] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 71.769277] Tainted: [B]=BAD_PAGE, [N]=TEST [ 71.769293] Hardware name: WinLink E850-96 board (DT) [ 71.769311] Call trace: [ 71.769323] show_stack+0x20/0x38 (C) [ 71.769354] dump_stack_lvl+0x8c/0xd0 [ 71.769388] print_report+0x118/0x5d0 [ 71.769416] kasan_report+0xdc/0x128 [ 71.769444] kasan_check_range+0x100/0x1a8 [ 71.769473] __kasan_check_write+0x20/0x30 [ 71.769502] kasan_atomics_helper+0xca0/0x4858 [ 71.769537] kasan_atomics+0x198/0x2e0 [ 71.769568] kunit_try_run_case+0x170/0x3f0 [ 71.769596] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.769628] kthread+0x328/0x630 [ 71.769655] ret_from_fork+0x10/0x20 [ 71.769685] [ 71.840665] Allocated by task 346: [ 71.844052] kasan_save_stack+0x3c/0x68 [ 71.847870] kasan_save_track+0x20/0x40 [ 71.851689] kasan_save_alloc_info+0x40/0x58 [ 71.855942] __kasan_kmalloc+0xd4/0xd8 [ 71.859675] __kmalloc_cache_noprof+0x16c/0x3c0 [ 71.864189] kasan_atomics+0xb8/0x2e0 [ 71.867835] kunit_try_run_case+0x170/0x3f0 [ 71.872001] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 71.877470] kthread+0x328/0x630 [ 71.880682] ret_from_fork+0x10/0x20 [ 71.884240] [ 71.885716] The buggy address belongs to the object at ffff00080851b080 [ 71.885716] which belongs to the cache kmalloc-64 of size 64 [ 71.898043] The buggy address is located 0 bytes to the right of [ 71.898043] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 71.910889] [ 71.912365] The buggy address belongs to the physical page: [ 71.917922] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 71.925907] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 71.932417] page_type: f5(slab) [ 71.935550] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 71.943274] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 71.950993] page dumped because: kasan: bad access detected [ 71.956548] [ 71.958024] Memory state around the buggy address: [ 71.962802] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 71.970007] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 71.977212] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 71.984412] ^ [ 71.989190] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 71.996395] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 72.003596] ================================================================== [ 78.619883] ================================================================== [ 78.626936] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 78.634313] Read of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 78.641604] [ 78.643086] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 78.643136] Tainted: [B]=BAD_PAGE, [N]=TEST [ 78.643150] Hardware name: WinLink E850-96 board (DT) [ 78.643168] Call trace: [ 78.643182] show_stack+0x20/0x38 (C) [ 78.643214] dump_stack_lvl+0x8c/0xd0 [ 78.643248] print_report+0x118/0x5d0 [ 78.643276] kasan_report+0xdc/0x128 [ 78.643304] __asan_report_load8_noabort+0x20/0x30 [ 78.643337] kasan_atomics_helper+0x3db0/0x4858 [ 78.643372] kasan_atomics+0x198/0x2e0 [ 78.643403] kunit_try_run_case+0x170/0x3f0 [ 78.643435] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 78.643470] kthread+0x328/0x630 [ 78.643496] ret_from_fork+0x10/0x20 [ 78.643526] [ 78.711221] Allocated by task 346: [ 78.714608] kasan_save_stack+0x3c/0x68 [ 78.718426] kasan_save_track+0x20/0x40 [ 78.722246] kasan_save_alloc_info+0x40/0x58 [ 78.726499] __kasan_kmalloc+0xd4/0xd8 [ 78.730231] __kmalloc_cache_noprof+0x16c/0x3c0 [ 78.734745] kasan_atomics+0xb8/0x2e0 [ 78.738391] kunit_try_run_case+0x170/0x3f0 [ 78.742558] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 78.748026] kthread+0x328/0x630 [ 78.751238] ret_from_fork+0x10/0x20 [ 78.754797] [ 78.756273] The buggy address belongs to the object at ffff00080851b080 [ 78.756273] which belongs to the cache kmalloc-64 of size 64 [ 78.768599] The buggy address is located 0 bytes to the right of [ 78.768599] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 78.781446] [ 78.782922] The buggy address belongs to the physical page: [ 78.788479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 78.796465] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 78.802973] page_type: f5(slab) [ 78.806106] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 78.813831] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 78.821549] page dumped because: kasan: bad access detected [ 78.827105] [ 78.828580] Memory state around the buggy address: [ 78.833360] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 78.840563] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 78.847768] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 78.854969] ^ [ 78.859747] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.866952] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 78.874153] ================================================================== [ 79.673345] ================================================================== [ 79.680392] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 79.687771] Read of size 8 at addr ffff00080851b0b0 by task kunit_try_catch/346 [ 79.695061] [ 79.696543] CPU: 2 UID: 0 PID: 346 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 79.696592] Tainted: [B]=BAD_PAGE, [N]=TEST [ 79.696608] Hardware name: WinLink E850-96 board (DT) [ 79.696628] Call trace: [ 79.696641] show_stack+0x20/0x38 (C) [ 79.696673] dump_stack_lvl+0x8c/0xd0 [ 79.696706] print_report+0x118/0x5d0 [ 79.696735] kasan_report+0xdc/0x128 [ 79.696762] __asan_report_load8_noabort+0x20/0x30 [ 79.696794] kasan_atomics_helper+0x3e10/0x4858 [ 79.696830] kasan_atomics+0x198/0x2e0 [ 79.696864] kunit_try_run_case+0x170/0x3f0 [ 79.696895] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 79.696929] kthread+0x328/0x630 [ 79.696956] ret_from_fork+0x10/0x20 [ 79.696988] [ 79.764679] Allocated by task 346: [ 79.768065] kasan_save_stack+0x3c/0x68 [ 79.771883] kasan_save_track+0x20/0x40 [ 79.775702] kasan_save_alloc_info+0x40/0x58 [ 79.779955] __kasan_kmalloc+0xd4/0xd8 [ 79.783688] __kmalloc_cache_noprof+0x16c/0x3c0 [ 79.788201] kasan_atomics+0xb8/0x2e0 [ 79.791847] kunit_try_run_case+0x170/0x3f0 [ 79.796014] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 79.801483] kthread+0x328/0x630 [ 79.804695] ret_from_fork+0x10/0x20 [ 79.808254] [ 79.809729] The buggy address belongs to the object at ffff00080851b080 [ 79.809729] which belongs to the cache kmalloc-64 of size 64 [ 79.822056] The buggy address is located 0 bytes to the right of [ 79.822056] allocated 48-byte region [ffff00080851b080, ffff00080851b0b0) [ 79.834902] [ 79.836378] The buggy address belongs to the physical page: [ 79.841936] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 79.849921] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 79.856430] page_type: f5(slab) [ 79.859563] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 79.867287] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 79.875006] page dumped because: kasan: bad access detected [ 79.880561] [ 79.882037] Memory state around the buggy address: [ 79.886818] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 79.894020] ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 79.901225] >ffff00080851b080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 79.908426] ^ [ 79.913204] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.920408] ffff00080851b180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 79.927609] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_test_and_modifyconstprop
[ 61.391854] ================================================================== [ 61.398896] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 61.407837] Read of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342 [ 61.415127] [ 61.416609] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 61.416658] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.416672] Hardware name: WinLink E850-96 board (DT) [ 61.416691] Call trace: [ 61.416702] show_stack+0x20/0x38 (C) [ 61.416735] dump_stack_lvl+0x8c/0xd0 [ 61.416766] print_report+0x118/0x5d0 [ 61.416793] kasan_report+0xdc/0x128 [ 61.416821] __asan_report_load8_noabort+0x20/0x30 [ 61.416853] kasan_bitops_test_and_modify.constprop.0+0xa00/0xbc0 [ 61.416891] kasan_bitops_generic+0x11c/0x1c8 [ 61.416925] kunit_try_run_case+0x170/0x3f0 [ 61.416954] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.416988] kthread+0x328/0x630 [ 61.417015] ret_from_fork+0x10/0x20 [ 61.417045] [ 61.486914] Allocated by task 342: [ 61.490300] kasan_save_stack+0x3c/0x68 [ 61.494119] kasan_save_track+0x20/0x40 [ 61.497938] kasan_save_alloc_info+0x40/0x58 [ 61.502192] __kasan_kmalloc+0xd4/0xd8 [ 61.505924] __kmalloc_cache_noprof+0x16c/0x3c0 [ 61.510438] kasan_bitops_generic+0xa0/0x1c8 [ 61.514691] kunit_try_run_case+0x170/0x3f0 [ 61.518858] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.524326] kthread+0x328/0x630 [ 61.527538] ret_from_fork+0x10/0x20 [ 61.531098] [ 61.532573] The buggy address belongs to the object at ffff000806093fe0 [ 61.532573] which belongs to the cache kmalloc-16 of size 16 [ 61.544899] The buggy address is located 8 bytes inside of [ 61.544899] allocated 9-byte region [ffff000806093fe0, ffff000806093fe9) [ 61.557138] [ 61.558616] The buggy address belongs to the physical page: [ 61.564171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093 [ 61.572157] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.578666] page_type: f5(slab) [ 61.581798] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 61.589523] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 61.597242] page dumped because: kasan: bad access detected [ 61.602798] [ 61.604273] Memory state around the buggy address: [ 61.609052] ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 61.616256] ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 61.623461] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 61.630662] ^ [ 61.637263] ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 61.644467] ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 61.651668] ================================================================== [ 62.196825] ================================================================== [ 62.203920] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 62.212860] Write of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342 [ 62.220236] [ 62.221717] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 62.221765] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.221781] Hardware name: WinLink E850-96 board (DT) [ 62.221800] Call trace: [ 62.221813] show_stack+0x20/0x38 (C) [ 62.221844] dump_stack_lvl+0x8c/0xd0 [ 62.221875] print_report+0x118/0x5d0 [ 62.221905] kasan_report+0xdc/0x128 [ 62.221933] kasan_check_range+0x100/0x1a8 [ 62.221962] __kasan_check_write+0x20/0x30 [ 62.221993] kasan_bitops_test_and_modify.constprop.0+0x25c/0xbc0 [ 62.222033] kasan_bitops_generic+0x11c/0x1c8 [ 62.222068] kunit_try_run_case+0x170/0x3f0 [ 62.222095] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.222129] kthread+0x328/0x630 [ 62.222156] ret_from_fork+0x10/0x20 [ 62.222188] [ 62.295409] Allocated by task 342: [ 62.298794] kasan_save_stack+0x3c/0x68 [ 62.302614] kasan_save_track+0x20/0x40 [ 62.306433] kasan_save_alloc_info+0x40/0x58 [ 62.310686] __kasan_kmalloc+0xd4/0xd8 [ 62.314419] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.318933] kasan_bitops_generic+0xa0/0x1c8 [ 62.323186] kunit_try_run_case+0x170/0x3f0 [ 62.327353] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.332821] kthread+0x328/0x630 [ 62.336033] ret_from_fork+0x10/0x20 [ 62.339592] [ 62.341068] The buggy address belongs to the object at ffff000806093fe0 [ 62.341068] which belongs to the cache kmalloc-16 of size 16 [ 62.353394] The buggy address is located 8 bytes inside of [ 62.353394] allocated 9-byte region [ffff000806093fe0, ffff000806093fe9) [ 62.365633] [ 62.367112] The buggy address belongs to the physical page: [ 62.372667] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093 [ 62.380651] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.387161] page_type: f5(slab) [ 62.390294] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 62.398018] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 62.405737] page dumped because: kasan: bad access detected [ 62.411292] [ 62.412768] Memory state around the buggy address: [ 62.417546] ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 62.424751] ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 62.431955] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 62.439157] ^ [ 62.445757] ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 62.452962] ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 62.460163] ================================================================== [ 62.734692] ================================================================== [ 62.741757] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 62.750699] Write of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342 [ 62.758075] [ 62.759560] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 62.759608] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.759626] Hardware name: WinLink E850-96 board (DT) [ 62.759642] Call trace: [ 62.759655] show_stack+0x20/0x38 (C) [ 62.759686] dump_stack_lvl+0x8c/0xd0 [ 62.759718] print_report+0x118/0x5d0 [ 62.759745] kasan_report+0xdc/0x128 [ 62.759771] kasan_check_range+0x100/0x1a8 [ 62.759799] __kasan_check_write+0x20/0x30 [ 62.759830] kasan_bitops_test_and_modify.constprop.0+0x334/0xbc0 [ 62.759868] kasan_bitops_generic+0x11c/0x1c8 [ 62.759903] kunit_try_run_case+0x170/0x3f0 [ 62.759933] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.759965] kthread+0x328/0x630 [ 62.759991] ret_from_fork+0x10/0x20 [ 62.760022] [ 62.833248] Allocated by task 342: [ 62.836634] kasan_save_stack+0x3c/0x68 [ 62.840453] kasan_save_track+0x20/0x40 [ 62.844272] kasan_save_alloc_info+0x40/0x58 [ 62.848525] __kasan_kmalloc+0xd4/0xd8 [ 62.852258] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.856772] kasan_bitops_generic+0xa0/0x1c8 [ 62.861025] kunit_try_run_case+0x170/0x3f0 [ 62.865192] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.870661] kthread+0x328/0x630 [ 62.873872] ret_from_fork+0x10/0x20 [ 62.877431] [ 62.878907] The buggy address belongs to the object at ffff000806093fe0 [ 62.878907] which belongs to the cache kmalloc-16 of size 16 [ 62.891233] The buggy address is located 8 bytes inside of [ 62.891233] allocated 9-byte region [ffff000806093fe0, ffff000806093fe9) [ 62.903472] [ 62.904950] The buggy address belongs to the physical page: [ 62.910507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093 [ 62.918490] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.925000] page_type: f5(slab) [ 62.928134] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 62.935857] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 62.943576] page dumped because: kasan: bad access detected [ 62.949131] [ 62.950607] Memory state around the buggy address: [ 62.955386] ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 62.962590] ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 62.969795] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 62.976996] ^ [ 62.983596] ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 62.990801] ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 62.998002] ================================================================== [ 63.005373] ================================================================== [ 63.012413] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 63.021353] Read of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342 [ 63.028644] [ 63.030126] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 63.030175] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.030190] Hardware name: WinLink E850-96 board (DT) [ 63.030207] Call trace: [ 63.030221] show_stack+0x20/0x38 (C) [ 63.030253] dump_stack_lvl+0x8c/0xd0 [ 63.030285] print_report+0x118/0x5d0 [ 63.030315] kasan_report+0xdc/0x128 [ 63.030343] __asan_report_load8_noabort+0x20/0x30 [ 63.030377] kasan_bitops_test_and_modify.constprop.0+0xa3c/0xbc0 [ 63.030415] kasan_bitops_generic+0x11c/0x1c8 [ 63.030448] kunit_try_run_case+0x170/0x3f0 [ 63.030478] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.030512] kthread+0x328/0x630 [ 63.030537] ret_from_fork+0x10/0x20 [ 63.030566] [ 63.100431] Allocated by task 342: [ 63.103817] kasan_save_stack+0x3c/0x68 [ 63.107636] kasan_save_track+0x20/0x40 [ 63.111455] kasan_save_alloc_info+0x40/0x58 [ 63.115709] __kasan_kmalloc+0xd4/0xd8 [ 63.119442] __kmalloc_cache_noprof+0x16c/0x3c0 [ 63.123955] kasan_bitops_generic+0xa0/0x1c8 [ 63.128209] kunit_try_run_case+0x170/0x3f0 [ 63.132375] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.137844] kthread+0x328/0x630 [ 63.141056] ret_from_fork+0x10/0x20 [ 63.144614] [ 63.146090] The buggy address belongs to the object at ffff000806093fe0 [ 63.146090] which belongs to the cache kmalloc-16 of size 16 [ 63.158417] The buggy address is located 8 bytes inside of [ 63.158417] allocated 9-byte region [ffff000806093fe0, ffff000806093fe9) [ 63.170656] [ 63.172133] The buggy address belongs to the physical page: [ 63.177689] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093 [ 63.185673] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.192183] page_type: f5(slab) [ 63.195317] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 63.203041] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 63.210760] page dumped because: kasan: bad access detected [ 63.216315] [ 63.217791] Memory state around the buggy address: [ 63.222570] ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 63.229773] ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 63.236978] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 63.244179] ^ [ 63.250780] ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 63.257985] ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 63.265186] ================================================================== [ 63.272531] ================================================================== [ 63.279597] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 63.288536] Read of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342 [ 63.295828] [ 63.297308] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 63.297358] Tainted: [B]=BAD_PAGE, [N]=TEST [ 63.297375] Hardware name: WinLink E850-96 board (DT) [ 63.297394] Call trace: [ 63.297406] show_stack+0x20/0x38 (C) [ 63.297437] dump_stack_lvl+0x8c/0xd0 [ 63.297470] print_report+0x118/0x5d0 [ 63.297497] kasan_report+0xdc/0x128 [ 63.297524] __asan_report_load8_noabort+0x20/0x30 [ 63.297555] kasan_bitops_test_and_modify.constprop.0+0xa84/0xbc0 [ 63.297594] kasan_bitops_generic+0x11c/0x1c8 [ 63.297628] kunit_try_run_case+0x170/0x3f0 [ 63.297657] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.297689] kthread+0x328/0x630 [ 63.297716] ret_from_fork+0x10/0x20 [ 63.297746] [ 63.367614] Allocated by task 342: [ 63.371000] kasan_save_stack+0x3c/0x68 [ 63.374819] kasan_save_track+0x20/0x40 [ 63.378639] kasan_save_alloc_info+0x40/0x58 [ 63.382892] __kasan_kmalloc+0xd4/0xd8 [ 63.386625] __kmalloc_cache_noprof+0x16c/0x3c0 [ 63.391139] kasan_bitops_generic+0xa0/0x1c8 [ 63.395392] kunit_try_run_case+0x170/0x3f0 [ 63.399559] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 63.405027] kthread+0x328/0x630 [ 63.408239] ret_from_fork+0x10/0x20 [ 63.411798] [ 63.413274] The buggy address belongs to the object at ffff000806093fe0 [ 63.413274] which belongs to the cache kmalloc-16 of size 16 [ 63.425600] The buggy address is located 8 bytes inside of [ 63.425600] allocated 9-byte region [ffff000806093fe0, ffff000806093fe9) [ 63.437839] [ 63.439317] The buggy address belongs to the physical page: [ 63.444873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093 [ 63.452857] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 63.459367] page_type: f5(slab) [ 63.462500] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 63.470224] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 63.477943] page dumped because: kasan: bad access detected [ 63.483499] [ 63.484974] Memory state around the buggy address: [ 63.489752] ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 63.496957] ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 63.504162] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 63.511362] ^ [ 63.517963] ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 63.525168] ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 63.532369] ================================================================== [ 61.929693] ================================================================== [ 61.936735] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 61.945675] Read of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342 [ 61.952966] [ 61.954447] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 61.954495] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.954512] Hardware name: WinLink E850-96 board (DT) [ 61.954529] Call trace: [ 61.954541] show_stack+0x20/0x38 (C) [ 61.954572] dump_stack_lvl+0x8c/0xd0 [ 61.954604] print_report+0x118/0x5d0 [ 61.954632] kasan_report+0xdc/0x128 [ 61.954658] __asan_report_load8_noabort+0x20/0x30 [ 61.954692] kasan_bitops_test_and_modify.constprop.0+0xa48/0xbc0 [ 61.954730] kasan_bitops_generic+0x11c/0x1c8 [ 61.954763] kunit_try_run_case+0x170/0x3f0 [ 61.954792] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.954824] kthread+0x328/0x630 [ 61.954851] ret_from_fork+0x10/0x20 [ 61.954884] [ 62.024753] Allocated by task 342: [ 62.028139] kasan_save_stack+0x3c/0x68 [ 62.031958] kasan_save_track+0x20/0x40 [ 62.035777] kasan_save_alloc_info+0x40/0x58 [ 62.040031] __kasan_kmalloc+0xd4/0xd8 [ 62.043763] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.048277] kasan_bitops_generic+0xa0/0x1c8 [ 62.052531] kunit_try_run_case+0x170/0x3f0 [ 62.056697] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.062166] kthread+0x328/0x630 [ 62.065377] ret_from_fork+0x10/0x20 [ 62.068936] [ 62.070412] The buggy address belongs to the object at ffff000806093fe0 [ 62.070412] which belongs to the cache kmalloc-16 of size 16 [ 62.082738] The buggy address is located 8 bytes inside of [ 62.082738] allocated 9-byte region [ffff000806093fe0, ffff000806093fe9) [ 62.094977] [ 62.096455] The buggy address belongs to the physical page: [ 62.102011] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093 [ 62.109995] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.116505] page_type: f5(slab) [ 62.119638] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 62.127363] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 62.135081] page dumped because: kasan: bad access detected [ 62.140637] [ 62.142112] Memory state around the buggy address: [ 62.146892] ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 62.154095] ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 62.161300] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 62.168501] ^ [ 62.175102] ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 62.182307] ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 62.189508] ================================================================== [ 62.467535] ================================================================== [ 62.474574] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 62.483515] Read of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342 [ 62.490805] [ 62.492288] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 62.492334] Tainted: [B]=BAD_PAGE, [N]=TEST [ 62.492352] Hardware name: WinLink E850-96 board (DT) [ 62.492370] Call trace: [ 62.492382] show_stack+0x20/0x38 (C) [ 62.492413] dump_stack_lvl+0x8c/0xd0 [ 62.492446] print_report+0x118/0x5d0 [ 62.492473] kasan_report+0xdc/0x128 [ 62.492501] __asan_report_load8_noabort+0x20/0x30 [ 62.492532] kasan_bitops_test_and_modify.constprop.0+0xacc/0xbc0 [ 62.492570] kasan_bitops_generic+0x11c/0x1c8 [ 62.492605] kunit_try_run_case+0x170/0x3f0 [ 62.492632] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.492667] kthread+0x328/0x630 [ 62.492693] ret_from_fork+0x10/0x20 [ 62.492726] [ 62.562592] Allocated by task 342: [ 62.565978] kasan_save_stack+0x3c/0x68 [ 62.569797] kasan_save_track+0x20/0x40 [ 62.573616] kasan_save_alloc_info+0x40/0x58 [ 62.577870] __kasan_kmalloc+0xd4/0xd8 [ 62.581602] __kmalloc_cache_noprof+0x16c/0x3c0 [ 62.586116] kasan_bitops_generic+0xa0/0x1c8 [ 62.590369] kunit_try_run_case+0x170/0x3f0 [ 62.594537] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 62.600005] kthread+0x328/0x630 [ 62.603217] ret_from_fork+0x10/0x20 [ 62.606775] [ 62.608251] The buggy address belongs to the object at ffff000806093fe0 [ 62.608251] which belongs to the cache kmalloc-16 of size 16 [ 62.620578] The buggy address is located 8 bytes inside of [ 62.620578] allocated 9-byte region [ffff000806093fe0, ffff000806093fe9) [ 62.632817] [ 62.634296] The buggy address belongs to the physical page: [ 62.639851] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093 [ 62.647834] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 62.654344] page_type: f5(slab) [ 62.657477] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 62.665202] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 62.672920] page dumped because: kasan: bad access detected [ 62.678476] [ 62.679951] Memory state around the buggy address: [ 62.684730] ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 62.691934] ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 62.699139] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 62.706340] ^ [ 62.712941] ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 62.720145] ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 62.727346] ================================================================== [ 61.659020] ================================================================== [ 61.666079] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 61.675020] Write of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342 [ 61.682397] [ 61.683878] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 61.683924] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.683940] Hardware name: WinLink E850-96 board (DT) [ 61.683958] Call trace: [ 61.683968] show_stack+0x20/0x38 (C) [ 61.683997] dump_stack_lvl+0x8c/0xd0 [ 61.684028] print_report+0x118/0x5d0 [ 61.684055] kasan_report+0xdc/0x128 [ 61.684082] kasan_check_range+0x100/0x1a8 [ 61.684110] __kasan_check_write+0x20/0x30 [ 61.684141] kasan_bitops_test_and_modify.constprop.0+0x1d8/0xbc0 [ 61.684180] kasan_bitops_generic+0x11c/0x1c8 [ 61.684213] kunit_try_run_case+0x170/0x3f0 [ 61.684243] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.684277] kthread+0x328/0x630 [ 61.684302] ret_from_fork+0x10/0x20 [ 61.684332] [ 61.757569] Allocated by task 342: [ 61.760956] kasan_save_stack+0x3c/0x68 [ 61.764774] kasan_save_track+0x20/0x40 [ 61.768594] kasan_save_alloc_info+0x40/0x58 [ 61.772847] __kasan_kmalloc+0xd4/0xd8 [ 61.776580] __kmalloc_cache_noprof+0x16c/0x3c0 [ 61.781093] kasan_bitops_generic+0xa0/0x1c8 [ 61.785347] kunit_try_run_case+0x170/0x3f0 [ 61.789514] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.794982] kthread+0x328/0x630 [ 61.798194] ret_from_fork+0x10/0x20 [ 61.801753] [ 61.803229] The buggy address belongs to the object at ffff000806093fe0 [ 61.803229] which belongs to the cache kmalloc-16 of size 16 [ 61.815555] The buggy address is located 8 bytes inside of [ 61.815555] allocated 9-byte region [ffff000806093fe0, ffff000806093fe9) [ 61.827794] [ 61.829272] The buggy address belongs to the physical page: [ 61.834827] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093 [ 61.842811] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.849321] page_type: f5(slab) [ 61.852454] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 61.860179] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 61.867898] page dumped because: kasan: bad access detected [ 61.873453] [ 61.874929] Memory state around the buggy address: [ 61.879707] ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 61.886911] ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 61.894117] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 61.901317] ^ [ 61.907918] ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 61.915123] ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 61.922324] ================================================================== [ 61.121365] ================================================================== [ 61.128414] BUG: KASAN: slab-out-of-bounds in kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 61.137267] Write of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342 [ 61.144645] [ 61.146126] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 61.146176] Tainted: [B]=BAD_PAGE, [N]=TEST [ 61.146194] Hardware name: WinLink E850-96 board (DT) [ 61.146212] Call trace: [ 61.146223] show_stack+0x20/0x38 (C) [ 61.146257] dump_stack_lvl+0x8c/0xd0 [ 61.146291] print_report+0x118/0x5d0 [ 61.146320] kasan_report+0xdc/0x128 [ 61.146348] kasan_check_range+0x100/0x1a8 [ 61.146377] __kasan_check_write+0x20/0x30 [ 61.146408] kasan_bitops_test_and_modify.constprop.0+0xfc/0xbc0 [ 61.146446] kasan_bitops_generic+0x11c/0x1c8 [ 61.146479] kunit_try_run_case+0x170/0x3f0 [ 61.146509] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.146542] kthread+0x328/0x630 [ 61.146568] ret_from_fork+0x10/0x20 [ 61.146599] [ 61.219730] Allocated by task 342: [ 61.223116] kasan_save_stack+0x3c/0x68 [ 61.226935] kasan_save_track+0x20/0x40 [ 61.230755] kasan_save_alloc_info+0x40/0x58 [ 61.235008] __kasan_kmalloc+0xd4/0xd8 [ 61.238740] __kmalloc_cache_noprof+0x16c/0x3c0 [ 61.243254] kasan_bitops_generic+0xa0/0x1c8 [ 61.247508] kunit_try_run_case+0x170/0x3f0 [ 61.251674] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 61.257143] kthread+0x328/0x630 [ 61.260355] ret_from_fork+0x10/0x20 [ 61.263914] [ 61.265389] The buggy address belongs to the object at ffff000806093fe0 [ 61.265389] which belongs to the cache kmalloc-16 of size 16 [ 61.277716] The buggy address is located 8 bytes inside of [ 61.277716] allocated 9-byte region [ffff000806093fe0, ffff000806093fe9) [ 61.289955] [ 61.291432] The buggy address belongs to the physical page: [ 61.296989] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093 [ 61.304973] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.311482] page_type: f5(slab) [ 61.314615] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 61.322340] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 61.330058] page dumped because: kasan: bad access detected [ 61.335614] [ 61.337090] Memory state around the buggy address: [ 61.341868] ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 61.349073] ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 61.356277] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 61.363478] ^ [ 61.370079] ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 61.377284] ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 61.384485] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kasan_bitops_modifyconstprop
[ 59.782788] ================================================================== [ 59.789893] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 59.798052] Write of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342 [ 59.805429] [ 59.806912] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 59.806963] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.806981] Hardware name: WinLink E850-96 board (DT) [ 59.807001] Call trace: [ 59.807014] show_stack+0x20/0x38 (C) [ 59.807047] dump_stack_lvl+0x8c/0xd0 [ 59.807081] print_report+0x118/0x5d0 [ 59.807109] kasan_report+0xdc/0x128 [ 59.807134] kasan_check_range+0x100/0x1a8 [ 59.807165] __kasan_check_write+0x20/0x30 [ 59.807196] kasan_bitops_modify.constprop.0+0x320/0xbc0 [ 59.807234] kasan_bitops_generic+0x110/0x1c8 [ 59.807268] kunit_try_run_case+0x170/0x3f0 [ 59.807298] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.807333] kthread+0x328/0x630 [ 59.807359] ret_from_fork+0x10/0x20 [ 59.807392] [ 59.879820] Allocated by task 342: [ 59.883207] kasan_save_stack+0x3c/0x68 [ 59.887025] kasan_save_track+0x20/0x40 [ 59.890844] kasan_save_alloc_info+0x40/0x58 [ 59.895098] __kasan_kmalloc+0xd4/0xd8 [ 59.898830] __kmalloc_cache_noprof+0x16c/0x3c0 [ 59.903344] kasan_bitops_generic+0xa0/0x1c8 [ 59.907597] kunit_try_run_case+0x170/0x3f0 [ 59.911764] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.917233] kthread+0x328/0x630 [ 59.920444] ret_from_fork+0x10/0x20 [ 59.924003] [ 59.925479] The buggy address belongs to the object at ffff000806093fe0 [ 59.925479] which belongs to the cache kmalloc-16 of size 16 [ 59.937806] The buggy address is located 8 bytes inside of [ 59.937806] allocated 9-byte region [ffff000806093fe0, ffff000806093fe9) [ 59.950044] [ 59.951523] The buggy address belongs to the physical page: [ 59.957079] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093 [ 59.965063] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.971572] page_type: f5(slab) [ 59.974707] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 59.982429] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 59.990148] page dumped because: kasan: bad access detected [ 59.995704] [ 59.997179] Memory state around the buggy address: [ 60.001959] ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 60.009162] ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 60.016367] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 60.023568] ^ [ 60.030168] ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 60.037373] ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 60.044575] ================================================================== [ 59.248090] ================================================================== [ 59.255178] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 59.263337] Read of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342 [ 59.270628] [ 59.272111] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 59.272164] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.272178] Hardware name: WinLink E850-96 board (DT) [ 59.272198] Call trace: [ 59.272209] show_stack+0x20/0x38 (C) [ 59.272239] dump_stack_lvl+0x8c/0xd0 [ 59.272276] print_report+0x118/0x5d0 [ 59.272303] kasan_report+0xdc/0x128 [ 59.272331] __asan_report_load8_noabort+0x20/0x30 [ 59.272361] kasan_bitops_modify.constprop.0+0xa80/0xbc0 [ 59.272399] kasan_bitops_generic+0x110/0x1c8 [ 59.272434] kunit_try_run_case+0x170/0x3f0 [ 59.272463] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.272498] kthread+0x328/0x630 [ 59.272525] ret_from_fork+0x10/0x20 [ 59.272558] [ 59.341634] Allocated by task 342: [ 59.345021] kasan_save_stack+0x3c/0x68 [ 59.348838] kasan_save_track+0x20/0x40 [ 59.352658] kasan_save_alloc_info+0x40/0x58 [ 59.356911] __kasan_kmalloc+0xd4/0xd8 [ 59.360644] __kmalloc_cache_noprof+0x16c/0x3c0 [ 59.365157] kasan_bitops_generic+0xa0/0x1c8 [ 59.369411] kunit_try_run_case+0x170/0x3f0 [ 59.373578] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.379046] kthread+0x328/0x630 [ 59.382258] ret_from_fork+0x10/0x20 [ 59.385817] [ 59.387293] The buggy address belongs to the object at ffff000806093fe0 [ 59.387293] which belongs to the cache kmalloc-16 of size 16 [ 59.399619] The buggy address is located 8 bytes inside of [ 59.399619] allocated 9-byte region [ffff000806093fe0, ffff000806093fe9) [ 59.411858] [ 59.413336] The buggy address belongs to the physical page: [ 59.418893] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093 [ 59.426877] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.433386] page_type: f5(slab) [ 59.436520] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 59.444243] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 59.451963] page dumped because: kasan: bad access detected [ 59.457517] [ 59.458992] Memory state around the buggy address: [ 59.463771] ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 59.470976] ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 59.478180] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 59.485381] ^ [ 59.491984] ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 59.499188] ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 59.506388] ================================================================== [ 60.051887] ================================================================== [ 60.058986] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 60.067145] Read of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342 [ 60.074435] [ 60.075918] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 60.075970] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.075986] Hardware name: WinLink E850-96 board (DT) [ 60.076004] Call trace: [ 60.076016] show_stack+0x20/0x38 (C) [ 60.076047] dump_stack_lvl+0x8c/0xd0 [ 60.076080] print_report+0x118/0x5d0 [ 60.076108] kasan_report+0xdc/0x128 [ 60.076136] __asan_report_load8_noabort+0x20/0x30 [ 60.076168] kasan_bitops_modify.constprop.0+0xaec/0xbc0 [ 60.076203] kasan_bitops_generic+0x110/0x1c8 [ 60.076237] kunit_try_run_case+0x170/0x3f0 [ 60.076268] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.076303] kthread+0x328/0x630 [ 60.076328] ret_from_fork+0x10/0x20 [ 60.076361] [ 60.145441] Allocated by task 342: [ 60.148827] kasan_save_stack+0x3c/0x68 [ 60.152646] kasan_save_track+0x20/0x40 [ 60.156465] kasan_save_alloc_info+0x40/0x58 [ 60.160719] __kasan_kmalloc+0xd4/0xd8 [ 60.164451] __kmalloc_cache_noprof+0x16c/0x3c0 [ 60.168965] kasan_bitops_generic+0xa0/0x1c8 [ 60.173218] kunit_try_run_case+0x170/0x3f0 [ 60.177385] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.182854] kthread+0x328/0x630 [ 60.186065] ret_from_fork+0x10/0x20 [ 60.189624] [ 60.191100] The buggy address belongs to the object at ffff000806093fe0 [ 60.191100] which belongs to the cache kmalloc-16 of size 16 [ 60.203427] The buggy address is located 8 bytes inside of [ 60.203427] allocated 9-byte region [ffff000806093fe0, ffff000806093fe9) [ 60.215665] [ 60.217145] The buggy address belongs to the physical page: [ 60.222700] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093 [ 60.230684] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.237193] page_type: f5(slab) [ 60.240327] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 60.248050] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 60.255769] page dumped because: kasan: bad access detected [ 60.261324] [ 60.262800] Memory state around the buggy address: [ 60.267582] ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 60.274783] ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 60.281988] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 60.289189] ^ [ 60.295790] ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 60.302995] ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 60.310195] ================================================================== [ 58.978986] ================================================================== [ 58.986087] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 58.994243] Write of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342 [ 59.001623] [ 59.003106] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 59.003158] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.003175] Hardware name: WinLink E850-96 board (DT) [ 59.003195] Call trace: [ 59.003210] show_stack+0x20/0x38 (C) [ 59.003242] dump_stack_lvl+0x8c/0xd0 [ 59.003276] print_report+0x118/0x5d0 [ 59.003306] kasan_report+0xdc/0x128 [ 59.003332] kasan_check_range+0x100/0x1a8 [ 59.003361] __kasan_check_write+0x20/0x30 [ 59.003391] kasan_bitops_modify.constprop.0+0x1dc/0xbc0 [ 59.003427] kasan_bitops_generic+0x110/0x1c8 [ 59.003461] kunit_try_run_case+0x170/0x3f0 [ 59.003494] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.003530] kthread+0x328/0x630 [ 59.003558] ret_from_fork+0x10/0x20 [ 59.003591] [ 59.076012] Allocated by task 342: [ 59.079400] kasan_save_stack+0x3c/0x68 [ 59.083218] kasan_save_track+0x20/0x40 [ 59.087037] kasan_save_alloc_info+0x40/0x58 [ 59.091290] __kasan_kmalloc+0xd4/0xd8 [ 59.095023] __kmalloc_cache_noprof+0x16c/0x3c0 [ 59.099536] kasan_bitops_generic+0xa0/0x1c8 [ 59.103790] kunit_try_run_case+0x170/0x3f0 [ 59.107956] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.113426] kthread+0x328/0x630 [ 59.116637] ret_from_fork+0x10/0x20 [ 59.120196] [ 59.121672] The buggy address belongs to the object at ffff000806093fe0 [ 59.121672] which belongs to the cache kmalloc-16 of size 16 [ 59.133998] The buggy address is located 8 bytes inside of [ 59.133998] allocated 9-byte region [ffff000806093fe0, ffff000806093fe9) [ 59.146237] [ 59.147717] The buggy address belongs to the physical page: [ 59.153272] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093 [ 59.161256] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.167764] page_type: f5(slab) [ 59.170901] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 59.178622] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 59.186342] page dumped because: kasan: bad access detected [ 59.191897] [ 59.193371] Memory state around the buggy address: [ 59.198150] ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 59.205354] ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 59.212559] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 59.219760] ^ [ 59.226361] ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 59.233566] ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 59.240767] ================================================================== [ 58.442024] ================================================================== [ 58.451373] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 58.459529] Write of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342 [ 58.466908] [ 58.468392] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 58.468446] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.468463] Hardware name: WinLink E850-96 board (DT) [ 58.468484] Call trace: [ 58.468497] show_stack+0x20/0x38 (C) [ 58.468534] dump_stack_lvl+0x8c/0xd0 [ 58.468569] print_report+0x118/0x5d0 [ 58.468597] kasan_report+0xdc/0x128 [ 58.468625] kasan_check_range+0x100/0x1a8 [ 58.468654] __kasan_check_write+0x20/0x30 [ 58.468685] kasan_bitops_modify.constprop.0+0x100/0xbc0 [ 58.468722] kasan_bitops_generic+0x110/0x1c8 [ 58.468754] kunit_try_run_case+0x170/0x3f0 [ 58.468787] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.468823] kthread+0x328/0x630 [ 58.468849] ret_from_fork+0x10/0x20 [ 58.468884] [ 58.541299] Allocated by task 342: [ 58.544684] kasan_save_stack+0x3c/0x68 [ 58.548504] kasan_save_track+0x20/0x40 [ 58.552323] kasan_save_alloc_info+0x40/0x58 [ 58.556576] __kasan_kmalloc+0xd4/0xd8 [ 58.560308] __kmalloc_cache_noprof+0x16c/0x3c0 [ 58.564822] kasan_bitops_generic+0xa0/0x1c8 [ 58.569076] kunit_try_run_case+0x170/0x3f0 [ 58.573242] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.578711] kthread+0x328/0x630 [ 58.581923] ret_from_fork+0x10/0x20 [ 58.585482] [ 58.586960] The buggy address belongs to the object at ffff000806093fe0 [ 58.586960] which belongs to the cache kmalloc-16 of size 16 [ 58.599286] The buggy address is located 8 bytes inside of [ 58.599286] allocated 9-byte region [ffff000806093fe0, ffff000806093fe9) [ 58.611523] [ 58.613001] The buggy address belongs to the physical page: [ 58.618559] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093 [ 58.626542] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.633052] page_type: f5(slab) [ 58.636189] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 58.643908] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 58.651627] page dumped because: kasan: bad access detected [ 58.657182] [ 58.658657] Memory state around the buggy address: [ 58.663436] ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 58.670641] ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 58.677845] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 58.685046] ^ [ 58.691648] ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 58.698852] ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 58.706053] ================================================================== [ 59.513707] ================================================================== [ 59.520800] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 59.528959] Write of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342 [ 59.536335] [ 59.537818] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 59.537871] Tainted: [B]=BAD_PAGE, [N]=TEST [ 59.537889] Hardware name: WinLink E850-96 board (DT) [ 59.537908] Call trace: [ 59.537919] show_stack+0x20/0x38 (C) [ 59.537952] dump_stack_lvl+0x8c/0xd0 [ 59.537986] print_report+0x118/0x5d0 [ 59.538014] kasan_report+0xdc/0x128 [ 59.538042] kasan_check_range+0x100/0x1a8 [ 59.538070] __kasan_check_write+0x20/0x30 [ 59.538101] kasan_bitops_modify.constprop.0+0x2b4/0xbc0 [ 59.538138] kasan_bitops_generic+0x110/0x1c8 [ 59.538172] kunit_try_run_case+0x170/0x3f0 [ 59.538202] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.538239] kthread+0x328/0x630 [ 59.538265] ret_from_fork+0x10/0x20 [ 59.538299] [ 59.610728] Allocated by task 342: [ 59.614113] kasan_save_stack+0x3c/0x68 [ 59.617932] kasan_save_track+0x20/0x40 [ 59.621751] kasan_save_alloc_info+0x40/0x58 [ 59.626004] __kasan_kmalloc+0xd4/0xd8 [ 59.629737] __kmalloc_cache_noprof+0x16c/0x3c0 [ 59.634251] kasan_bitops_generic+0xa0/0x1c8 [ 59.638504] kunit_try_run_case+0x170/0x3f0 [ 59.642671] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 59.648140] kthread+0x328/0x630 [ 59.651351] ret_from_fork+0x10/0x20 [ 59.654910] [ 59.656386] The buggy address belongs to the object at ffff000806093fe0 [ 59.656386] which belongs to the cache kmalloc-16 of size 16 [ 59.668712] The buggy address is located 8 bytes inside of [ 59.668712] allocated 9-byte region [ffff000806093fe0, ffff000806093fe9) [ 59.680951] [ 59.682429] The buggy address belongs to the physical page: [ 59.687987] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093 [ 59.695970] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 59.702479] page_type: f5(slab) [ 59.705614] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 59.713336] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 59.721055] page dumped because: kasan: bad access detected [ 59.726610] [ 59.728086] Memory state around the buggy address: [ 59.732864] ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 59.740069] ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 59.747274] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 59.754475] ^ [ 59.761075] ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 59.768280] ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 59.775482] ================================================================== [ 58.713374] ================================================================== [ 58.720466] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 58.728623] Read of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342 [ 58.735913] [ 58.737398] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 58.737453] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.737472] Hardware name: WinLink E850-96 board (DT) [ 58.737491] Call trace: [ 58.737505] show_stack+0x20/0x38 (C) [ 58.737540] dump_stack_lvl+0x8c/0xd0 [ 58.737575] print_report+0x118/0x5d0 [ 58.737605] kasan_report+0xdc/0x128 [ 58.737631] __asan_report_load8_noabort+0x20/0x30 [ 58.737664] kasan_bitops_modify.constprop.0+0xa44/0xbc0 [ 58.737702] kasan_bitops_generic+0x110/0x1c8 [ 58.737736] kunit_try_run_case+0x170/0x3f0 [ 58.737768] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.737805] kthread+0x328/0x630 [ 58.737833] ret_from_fork+0x10/0x20 [ 58.737868] [ 58.806919] Allocated by task 342: [ 58.810307] kasan_save_stack+0x3c/0x68 [ 58.814124] kasan_save_track+0x20/0x40 [ 58.817943] kasan_save_alloc_info+0x40/0x58 [ 58.822197] __kasan_kmalloc+0xd4/0xd8 [ 58.825930] __kmalloc_cache_noprof+0x16c/0x3c0 [ 58.830443] kasan_bitops_generic+0xa0/0x1c8 [ 58.834697] kunit_try_run_case+0x170/0x3f0 [ 58.838864] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.844332] kthread+0x328/0x630 [ 58.847544] ret_from_fork+0x10/0x20 [ 58.851103] [ 58.852578] The buggy address belongs to the object at ffff000806093fe0 [ 58.852578] which belongs to the cache kmalloc-16 of size 16 [ 58.864908] The buggy address is located 8 bytes inside of [ 58.864908] allocated 9-byte region [ffff000806093fe0, ffff000806093fe9) [ 58.877144] [ 58.878623] The buggy address belongs to the physical page: [ 58.884179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093 [ 58.892164] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.898671] page_type: f5(slab) [ 58.901807] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 58.909529] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 58.917249] page dumped because: kasan: bad access detected [ 58.922803] [ 58.924279] Memory state around the buggy address: [ 58.929060] ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 58.936261] ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 58.943466] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 58.950667] ^ [ 58.957268] ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 58.964473] ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 58.971674] ================================================================== [ 60.317502] ================================================================== [ 60.324606] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 60.332766] Write of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342 [ 60.340143] [ 60.341625] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 60.341674] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.341689] Hardware name: WinLink E850-96 board (DT) [ 60.341706] Call trace: [ 60.341716] show_stack+0x20/0x38 (C) [ 60.341747] dump_stack_lvl+0x8c/0xd0 [ 60.341778] print_report+0x118/0x5d0 [ 60.341807] kasan_report+0xdc/0x128 [ 60.341833] kasan_check_range+0x100/0x1a8 [ 60.341862] __kasan_check_write+0x20/0x30 [ 60.341893] kasan_bitops_modify.constprop.0+0x344/0xbc0 [ 60.341929] kasan_bitops_generic+0x110/0x1c8 [ 60.341963] kunit_try_run_case+0x170/0x3f0 [ 60.341993] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.342026] kthread+0x328/0x630 [ 60.342051] ret_from_fork+0x10/0x20 [ 60.342081] [ 60.414534] Allocated by task 342: [ 60.417921] kasan_save_stack+0x3c/0x68 [ 60.421739] kasan_save_track+0x20/0x40 [ 60.425558] kasan_save_alloc_info+0x40/0x58 [ 60.429812] __kasan_kmalloc+0xd4/0xd8 [ 60.433544] __kmalloc_cache_noprof+0x16c/0x3c0 [ 60.438058] kasan_bitops_generic+0xa0/0x1c8 [ 60.442312] kunit_try_run_case+0x170/0x3f0 [ 60.446478] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.451947] kthread+0x328/0x630 [ 60.455159] ret_from_fork+0x10/0x20 [ 60.458718] [ 60.460193] The buggy address belongs to the object at ffff000806093fe0 [ 60.460193] which belongs to the cache kmalloc-16 of size 16 [ 60.472520] The buggy address is located 8 bytes inside of [ 60.472520] allocated 9-byte region [ffff000806093fe0, ffff000806093fe9) [ 60.484759] [ 60.486238] The buggy address belongs to the physical page: [ 60.491794] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093 [ 60.499777] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.506286] page_type: f5(slab) [ 60.509419] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 60.517144] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 60.524862] page dumped because: kasan: bad access detected [ 60.530418] [ 60.531893] Memory state around the buggy address: [ 60.536672] ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 60.543876] ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 60.551081] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 60.558282] ^ [ 60.564883] ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 60.572087] ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 60.579289] ================================================================== [ 60.855751] ================================================================== [ 60.862794] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 60.870953] Read of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342 [ 60.878242] [ 60.879724] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 60.879773] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.879790] Hardware name: WinLink E850-96 board (DT) [ 60.879808] Call trace: [ 60.879821] show_stack+0x20/0x38 (C) [ 60.879853] dump_stack_lvl+0x8c/0xd0 [ 60.879885] print_report+0x118/0x5d0 [ 60.879913] kasan_report+0xdc/0x128 [ 60.879941] __asan_report_load8_noabort+0x20/0x30 [ 60.879973] kasan_bitops_modify.constprop.0+0xa20/0xbc0 [ 60.880010] kasan_bitops_generic+0x110/0x1c8 [ 60.880045] kunit_try_run_case+0x170/0x3f0 [ 60.880077] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.880110] kthread+0x328/0x630 [ 60.880135] ret_from_fork+0x10/0x20 [ 60.880166] [ 60.949248] Allocated by task 342: [ 60.952634] kasan_save_stack+0x3c/0x68 [ 60.956453] kasan_save_track+0x20/0x40 [ 60.960272] kasan_save_alloc_info+0x40/0x58 [ 60.964526] __kasan_kmalloc+0xd4/0xd8 [ 60.968258] __kmalloc_cache_noprof+0x16c/0x3c0 [ 60.972773] kasan_bitops_generic+0xa0/0x1c8 [ 60.977026] kunit_try_run_case+0x170/0x3f0 [ 60.981192] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.986661] kthread+0x328/0x630 [ 60.989872] ret_from_fork+0x10/0x20 [ 60.993432] [ 60.994907] The buggy address belongs to the object at ffff000806093fe0 [ 60.994907] which belongs to the cache kmalloc-16 of size 16 [ 61.007234] The buggy address is located 8 bytes inside of [ 61.007234] allocated 9-byte region [ffff000806093fe0, ffff000806093fe9) [ 61.019473] [ 61.020950] The buggy address belongs to the physical page: [ 61.026508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093 [ 61.034492] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 61.041000] page_type: f5(slab) [ 61.044137] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 61.051858] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 61.059576] page dumped because: kasan: bad access detected [ 61.065132] [ 61.066607] Memory state around the buggy address: [ 61.071386] ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 61.078590] ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 61.085795] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 61.092996] ^ [ 61.099597] ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 61.106802] ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 61.114003] ================================================================== [ 60.586604] ================================================================== [ 60.593700] BUG: KASAN: slab-out-of-bounds in kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 60.601858] Write of size 8 at addr ffff000806093fe8 by task kunit_try_catch/342 [ 60.609236] [ 60.610719] CPU: 7 UID: 0 PID: 342 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 60.610768] Tainted: [B]=BAD_PAGE, [N]=TEST [ 60.610782] Hardware name: WinLink E850-96 board (DT) [ 60.610800] Call trace: [ 60.610813] show_stack+0x20/0x38 (C) [ 60.610847] dump_stack_lvl+0x8c/0xd0 [ 60.610881] print_report+0x118/0x5d0 [ 60.610909] kasan_report+0xdc/0x128 [ 60.610935] kasan_check_range+0x100/0x1a8 [ 60.610967] __kasan_check_write+0x20/0x30 [ 60.610997] kasan_bitops_modify.constprop.0+0x3b0/0xbc0 [ 60.611034] kasan_bitops_generic+0x110/0x1c8 [ 60.611066] kunit_try_run_case+0x170/0x3f0 [ 60.611095] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.611131] kthread+0x328/0x630 [ 60.611157] ret_from_fork+0x10/0x20 [ 60.611190] [ 60.683627] Allocated by task 342: [ 60.687013] kasan_save_stack+0x3c/0x68 [ 60.690832] kasan_save_track+0x20/0x40 [ 60.694652] kasan_save_alloc_info+0x40/0x58 [ 60.698905] __kasan_kmalloc+0xd4/0xd8 [ 60.702638] __kmalloc_cache_noprof+0x16c/0x3c0 [ 60.707151] kasan_bitops_generic+0xa0/0x1c8 [ 60.711405] kunit_try_run_case+0x170/0x3f0 [ 60.715571] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 60.721040] kthread+0x328/0x630 [ 60.724252] ret_from_fork+0x10/0x20 [ 60.727811] [ 60.729286] The buggy address belongs to the object at ffff000806093fe0 [ 60.729286] which belongs to the cache kmalloc-16 of size 16 [ 60.741613] The buggy address is located 8 bytes inside of [ 60.741613] allocated 9-byte region [ffff000806093fe0, ffff000806093fe9) [ 60.753852] [ 60.755332] The buggy address belongs to the physical page: [ 60.760887] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886093 [ 60.768871] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 60.775379] page_type: f5(slab) [ 60.778514] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 60.786237] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 60.793955] page dumped because: kasan: bad access detected [ 60.799511] [ 60.800987] Memory state around the buggy address: [ 60.805768] ffff000806093e80: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 60.812969] ffff000806093f00: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 60.820174] >ffff000806093f80: fa fb fc fc fa fb fc fc fa fb fc fc 00 01 fc fc [ 60.827375] ^ [ 60.833976] ffff000806094000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 60.841181] ffff000806094080: fb fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb [ 60.848382] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strnlen
[ 58.138114] ================================================================== [ 58.145128] BUG: KASAN: slab-use-after-free in strnlen+0x80/0x88 [ 58.151115] Read of size 1 at addr ffff0008085305d0 by task kunit_try_catch/340 [ 58.158405] [ 58.159887] CPU: 0 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 58.159942] Tainted: [B]=BAD_PAGE, [N]=TEST [ 58.159957] Hardware name: WinLink E850-96 board (DT) [ 58.159974] Call trace: [ 58.159988] show_stack+0x20/0x38 (C) [ 58.160022] dump_stack_lvl+0x8c/0xd0 [ 58.160057] print_report+0x118/0x5d0 [ 58.160084] kasan_report+0xdc/0x128 [ 58.160112] __asan_report_load1_noabort+0x20/0x30 [ 58.160145] strnlen+0x80/0x88 [ 58.160172] kasan_strings+0x478/0xb00 [ 58.160206] kunit_try_run_case+0x170/0x3f0 [ 58.160237] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.160271] kthread+0x328/0x630 [ 58.160299] ret_from_fork+0x10/0x20 [ 58.160330] [ 58.226546] Allocated by task 340: [ 58.229934] kasan_save_stack+0x3c/0x68 [ 58.233751] kasan_save_track+0x20/0x40 [ 58.237570] kasan_save_alloc_info+0x40/0x58 [ 58.241824] __kasan_kmalloc+0xd4/0xd8 [ 58.245556] __kmalloc_cache_noprof+0x16c/0x3c0 [ 58.250070] kasan_strings+0xc8/0xb00 [ 58.253716] kunit_try_run_case+0x170/0x3f0 [ 58.257883] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.263351] kthread+0x328/0x630 [ 58.266563] ret_from_fork+0x10/0x20 [ 58.270122] [ 58.271598] Freed by task 340: [ 58.274638] kasan_save_stack+0x3c/0x68 [ 58.278455] kasan_save_track+0x20/0x40 [ 58.282274] kasan_save_free_info+0x4c/0x78 [ 58.286441] __kasan_slab_free+0x6c/0x98 [ 58.290347] kfree+0x214/0x3c8 [ 58.293385] kasan_strings+0x24c/0xb00 [ 58.297118] kunit_try_run_case+0x170/0x3f0 [ 58.301285] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.306755] kthread+0x328/0x630 [ 58.309965] ret_from_fork+0x10/0x20 [ 58.313524] [ 58.315000] The buggy address belongs to the object at ffff0008085305c0 [ 58.315000] which belongs to the cache kmalloc-32 of size 32 [ 58.327326] The buggy address is located 16 bytes inside of [ 58.327326] freed 32-byte region [ffff0008085305c0, ffff0008085305e0) [ 58.339392] [ 58.340870] The buggy address belongs to the physical page: [ 58.346426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888530 [ 58.354409] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.360919] page_type: f5(slab) [ 58.364052] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 58.371777] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 58.379495] page dumped because: kasan: bad access detected [ 58.385051] [ 58.386526] Memory state around the buggy address: [ 58.391306] ffff000808530480: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 58.398509] ffff000808530500: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 58.405714] >ffff000808530580: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 58.412915] ^ [ 58.418735] ffff000808530600: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 58.425939] ffff000808530680: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 58.433140] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strlen
[ 57.835942] ================================================================== [ 57.842874] BUG: KASAN: slab-use-after-free in strlen+0xa8/0xb0 [ 57.848774] Read of size 1 at addr ffff0008085305d0 by task kunit_try_catch/340 [ 57.856065] [ 57.857549] CPU: 0 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 57.857600] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.857616] Hardware name: WinLink E850-96 board (DT) [ 57.857635] Call trace: [ 57.857649] show_stack+0x20/0x38 (C) [ 57.857683] dump_stack_lvl+0x8c/0xd0 [ 57.857717] print_report+0x118/0x5d0 [ 57.857744] kasan_report+0xdc/0x128 [ 57.857774] __asan_report_load1_noabort+0x20/0x30 [ 57.857805] strlen+0xa8/0xb0 [ 57.857832] kasan_strings+0x418/0xb00 [ 57.857862] kunit_try_run_case+0x170/0x3f0 [ 57.857895] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.857929] kthread+0x328/0x630 [ 57.857956] ret_from_fork+0x10/0x20 [ 57.857987] [ 57.924120] Allocated by task 340: [ 57.927507] kasan_save_stack+0x3c/0x68 [ 57.931325] kasan_save_track+0x20/0x40 [ 57.935144] kasan_save_alloc_info+0x40/0x58 [ 57.939398] __kasan_kmalloc+0xd4/0xd8 [ 57.943130] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.947644] kasan_strings+0xc8/0xb00 [ 57.951290] kunit_try_run_case+0x170/0x3f0 [ 57.955457] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.960925] kthread+0x328/0x630 [ 57.964137] ret_from_fork+0x10/0x20 [ 57.967696] [ 57.969171] Freed by task 340: [ 57.972213] kasan_save_stack+0x3c/0x68 [ 57.976029] kasan_save_track+0x20/0x40 [ 57.979849] kasan_save_free_info+0x4c/0x78 [ 57.984015] __kasan_slab_free+0x6c/0x98 [ 57.987921] kfree+0x214/0x3c8 [ 57.990960] kasan_strings+0x24c/0xb00 [ 57.994692] kunit_try_run_case+0x170/0x3f0 [ 57.998859] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 58.004329] kthread+0x328/0x630 [ 58.007539] ret_from_fork+0x10/0x20 [ 58.011098] [ 58.012573] The buggy address belongs to the object at ffff0008085305c0 [ 58.012573] which belongs to the cache kmalloc-32 of size 32 [ 58.024900] The buggy address is located 16 bytes inside of [ 58.024900] freed 32-byte region [ffff0008085305c0, ffff0008085305e0) [ 58.036966] [ 58.038443] The buggy address belongs to the physical page: [ 58.044000] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888530 [ 58.051985] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 58.058494] page_type: f5(slab) [ 58.061630] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 58.069352] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 58.077069] page dumped because: kasan: bad access detected [ 58.082625] [ 58.084100] Memory state around the buggy address: [ 58.088881] ffff000808530480: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 58.096083] ffff000808530500: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 58.103288] >ffff000808530580: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 58.110489] ^ [ 58.116308] ffff000808530600: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 58.123513] ffff000808530680: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 58.130714] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kasan_strings
[ 57.535778] ================================================================== [ 57.542794] BUG: KASAN: slab-use-after-free in kasan_strings+0x95c/0xb00 [ 57.549475] Read of size 1 at addr ffff0008085305d0 by task kunit_try_catch/340 [ 57.556765] [ 57.558250] CPU: 0 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 57.558305] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.558322] Hardware name: WinLink E850-96 board (DT) [ 57.558344] Call trace: [ 57.558358] show_stack+0x20/0x38 (C) [ 57.558392] dump_stack_lvl+0x8c/0xd0 [ 57.558425] print_report+0x118/0x5d0 [ 57.558454] kasan_report+0xdc/0x128 [ 57.558482] __asan_report_load1_noabort+0x20/0x30 [ 57.558516] kasan_strings+0x95c/0xb00 [ 57.558547] kunit_try_run_case+0x170/0x3f0 [ 57.558577] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.558610] kthread+0x328/0x630 [ 57.558639] ret_from_fork+0x10/0x20 [ 57.558674] [ 57.621869] Allocated by task 340: [ 57.625255] kasan_save_stack+0x3c/0x68 [ 57.629072] kasan_save_track+0x20/0x40 [ 57.632892] kasan_save_alloc_info+0x40/0x58 [ 57.637145] __kasan_kmalloc+0xd4/0xd8 [ 57.640878] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.645392] kasan_strings+0xc8/0xb00 [ 57.649037] kunit_try_run_case+0x170/0x3f0 [ 57.653204] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.658673] kthread+0x328/0x630 [ 57.661885] ret_from_fork+0x10/0x20 [ 57.665444] [ 57.666919] Freed by task 340: [ 57.669959] kasan_save_stack+0x3c/0x68 [ 57.673777] kasan_save_track+0x20/0x40 [ 57.677596] kasan_save_free_info+0x4c/0x78 [ 57.681763] __kasan_slab_free+0x6c/0x98 [ 57.685669] kfree+0x214/0x3c8 [ 57.688707] kasan_strings+0x24c/0xb00 [ 57.692440] kunit_try_run_case+0x170/0x3f0 [ 57.696606] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.702076] kthread+0x328/0x630 [ 57.705287] ret_from_fork+0x10/0x20 [ 57.708846] [ 57.710321] The buggy address belongs to the object at ffff0008085305c0 [ 57.710321] which belongs to the cache kmalloc-32 of size 32 [ 57.722648] The buggy address is located 16 bytes inside of [ 57.722648] freed 32-byte region [ffff0008085305c0, ffff0008085305e0) [ 57.734713] [ 57.736193] The buggy address belongs to the physical page: [ 57.741748] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888530 [ 57.749732] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.756241] page_type: f5(slab) [ 57.759376] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 57.767098] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 57.774817] page dumped because: kasan: bad access detected [ 57.780372] [ 57.781848] Memory state around the buggy address: [ 57.786629] ffff000808530480: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 57.793831] ffff000808530500: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 57.801036] >ffff000808530580: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 57.808236] ^ [ 57.814056] ffff000808530600: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 57.821261] ffff000808530680: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 57.828462] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-strcmp
[ 57.216899] ================================================================== [ 57.240543] BUG: KASAN: slab-use-after-free in strcmp+0xc0/0xc8 [ 57.246440] Read of size 1 at addr ffff0008085305d0 by task kunit_try_catch/340 [ 57.253731] [ 57.255218] CPU: 0 UID: 0 PID: 340 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 57.255274] Tainted: [B]=BAD_PAGE, [N]=TEST [ 57.255293] Hardware name: WinLink E850-96 board (DT) [ 57.255316] Call trace: [ 57.255332] show_stack+0x20/0x38 (C) [ 57.255369] dump_stack_lvl+0x8c/0xd0 [ 57.255406] print_report+0x118/0x5d0 [ 57.255437] kasan_report+0xdc/0x128 [ 57.255465] __asan_report_load1_noabort+0x20/0x30 [ 57.255501] strcmp+0xc0/0xc8 [ 57.255526] kasan_strings+0x340/0xb00 [ 57.255559] kunit_try_run_case+0x170/0x3f0 [ 57.255591] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.255628] kthread+0x328/0x630 [ 57.255654] ret_from_fork+0x10/0x20 [ 57.255690] [ 57.321788] Allocated by task 340: [ 57.325175] kasan_save_stack+0x3c/0x68 [ 57.328990] kasan_save_track+0x20/0x40 [ 57.332811] kasan_save_alloc_info+0x40/0x58 [ 57.337063] __kasan_kmalloc+0xd4/0xd8 [ 57.340796] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.345309] kasan_strings+0xc8/0xb00 [ 57.348955] kunit_try_run_case+0x170/0x3f0 [ 57.353122] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.358591] kthread+0x328/0x630 [ 57.361802] ret_from_fork+0x10/0x20 [ 57.365361] [ 57.366838] Freed by task 340: [ 57.369876] kasan_save_stack+0x3c/0x68 [ 57.373694] kasan_save_track+0x20/0x40 [ 57.377514] kasan_save_free_info+0x4c/0x78 [ 57.381680] __kasan_slab_free+0x6c/0x98 [ 57.385587] kfree+0x214/0x3c8 [ 57.388625] kasan_strings+0x24c/0xb00 [ 57.392357] kunit_try_run_case+0x170/0x3f0 [ 57.396524] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.401994] kthread+0x328/0x630 [ 57.405204] ret_from_fork+0x10/0x20 [ 57.408763] [ 57.410240] The buggy address belongs to the object at ffff0008085305c0 [ 57.410240] which belongs to the cache kmalloc-32 of size 32 [ 57.422567] The buggy address is located 16 bytes inside of [ 57.422567] freed 32-byte region [ffff0008085305c0, ffff0008085305e0) [ 57.434631] [ 57.436110] The buggy address belongs to the physical page: [ 57.441666] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888530 [ 57.449651] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.456160] page_type: f5(slab) [ 57.459294] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 57.467016] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 57.474737] page dumped because: kasan: bad access detected [ 57.480290] [ 57.481765] Memory state around the buggy address: [ 57.486545] ffff000808530480: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 57.493748] ffff000808530500: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 57.500953] >ffff000808530580: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 57.508154] ^ [ 57.513974] ffff000808530600: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 57.521178] ffff000808530680: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 57.528379] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-memcmp
[ 56.915088] ================================================================== [ 56.925355] BUG: KASAN: slab-out-of-bounds in memcmp+0x198/0x1d8 [ 56.931342] Read of size 1 at addr ffff00080851c558 by task kunit_try_catch/338 [ 56.938631] [ 56.940117] CPU: 2 UID: 0 PID: 338 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 56.940176] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.940193] Hardware name: WinLink E850-96 board (DT) [ 56.940215] Call trace: [ 56.940229] show_stack+0x20/0x38 (C) [ 56.940265] dump_stack_lvl+0x8c/0xd0 [ 56.940299] print_report+0x118/0x5d0 [ 56.940329] kasan_report+0xdc/0x128 [ 56.940357] __asan_report_load1_noabort+0x20/0x30 [ 56.940394] memcmp+0x198/0x1d8 [ 56.940421] kasan_memcmp+0x16c/0x300 [ 56.940456] kunit_try_run_case+0x170/0x3f0 [ 56.940490] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.940527] kthread+0x328/0x630 [ 56.940557] ret_from_fork+0x10/0x20 [ 56.940594] [ 57.006778] Allocated by task 338: [ 57.010162] kasan_save_stack+0x3c/0x68 [ 57.013979] kasan_save_track+0x20/0x40 [ 57.017797] kasan_save_alloc_info+0x40/0x58 [ 57.022050] __kasan_kmalloc+0xd4/0xd8 [ 57.025783] __kmalloc_cache_noprof+0x16c/0x3c0 [ 57.030297] kasan_memcmp+0xbc/0x300 [ 57.033857] kunit_try_run_case+0x170/0x3f0 [ 57.038023] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 57.043491] kthread+0x328/0x630 [ 57.046703] ret_from_fork+0x10/0x20 [ 57.050262] [ 57.051741] The buggy address belongs to the object at ffff00080851c540 [ 57.051741] which belongs to the cache kmalloc-32 of size 32 [ 57.064067] The buggy address is located 0 bytes to the right of [ 57.064067] allocated 24-byte region [ffff00080851c540, ffff00080851c558) [ 57.076911] [ 57.078389] The buggy address belongs to the physical page: [ 57.083947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851c [ 57.091930] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 57.098441] page_type: f5(slab) [ 57.101576] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 57.109295] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 57.117017] page dumped because: kasan: bad access detected [ 57.122569] [ 57.124045] Memory state around the buggy address: [ 57.128827] ffff00080851c400: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 57.136030] ffff00080851c480: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 57.143233] >ffff00080851c500: 00 00 00 fc fc fc fc fc 00 00 00 fc fc fc fc fc [ 57.150434] ^ [ 57.156514] ffff00080851c580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.163720] ffff00080851c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 57.170921] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_right
[ 56.690341] ================================================================== [ 56.700010] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_right+0x2dc/0x340 [ 56.707562] Read of size 1 at addr ffff800089667b4a by task kunit_try_catch/334 [ 56.714850] [ 56.716336] CPU: 2 UID: 0 PID: 334 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 56.716390] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.716408] Hardware name: WinLink E850-96 board (DT) [ 56.716430] Call trace: [ 56.716441] show_stack+0x20/0x38 (C) [ 56.716478] dump_stack_lvl+0x8c/0xd0 [ 56.716518] print_report+0x310/0x5d0 [ 56.716545] kasan_report+0xdc/0x128 [ 56.716569] __asan_report_load1_noabort+0x20/0x30 [ 56.716604] kasan_alloca_oob_right+0x2dc/0x340 [ 56.716635] kunit_try_run_case+0x170/0x3f0 [ 56.716667] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.716702] kthread+0x328/0x630 [ 56.716731] ret_from_fork+0x10/0x20 [ 56.716766] [ 56.780737] The buggy address belongs to stack of task kunit_try_catch/334 [ 56.787612] [ 56.789068] The buggy address ffff800089667b4a belongs to a vmalloc virtual mapping [ 56.796711] The buggy address belongs to the physical page: [ 56.802267] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8887ec [ 56.810250] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.816770] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 56.824491] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 56.832211] page dumped because: kasan: bad access detected [ 56.837765] [ 56.839240] Memory state around the buggy address: [ 56.844022] ffff800089667a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 56.851225] ffff800089667a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 56.858428] >ffff800089667b00: 00 00 00 00 ca ca ca ca 00 02 cb cb cb cb cb cb [ 56.865629] ^ [ 56.871189] ffff800089667b80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 56.878393] ffff800089667c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 56.885596] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-alloca-out-of-bounds-in-kasan_alloca_oob_left
[ 56.486244] ================================================================== [ 56.495499] BUG: KASAN: alloca-out-of-bounds in kasan_alloca_oob_left+0x2b8/0x310 [ 56.502962] Read of size 1 at addr ffff800089647b5f by task kunit_try_catch/332 [ 56.510253] [ 56.511737] CPU: 0 UID: 0 PID: 332 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 56.511800] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.511818] Hardware name: WinLink E850-96 board (DT) [ 56.511840] Call trace: [ 56.511853] show_stack+0x20/0x38 (C) [ 56.511888] dump_stack_lvl+0x8c/0xd0 [ 56.511926] print_report+0x310/0x5d0 [ 56.511955] kasan_report+0xdc/0x128 [ 56.511981] __asan_report_load1_noabort+0x20/0x30 [ 56.512013] kasan_alloca_oob_left+0x2b8/0x310 [ 56.512046] kunit_try_run_case+0x170/0x3f0 [ 56.512079] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.512115] kthread+0x328/0x630 [ 56.512145] ret_from_fork+0x10/0x20 [ 56.512179] [ 56.576054] The buggy address belongs to stack of task kunit_try_catch/332 [ 56.582930] [ 56.584383] The buggy address ffff800089647b5f belongs to a vmalloc virtual mapping [ 56.592025] The buggy address belongs to the physical page: [ 56.597582] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8887d7 [ 56.605566] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.612088] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 56.619806] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 56.627528] page dumped because: kasan: bad access detected [ 56.633080] [ 56.634556] Memory state around the buggy address: [ 56.639337] ffff800089647a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 56.646539] ffff800089647a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 56.653743] >ffff800089647b00: 00 00 00 00 00 00 00 00 ca ca ca ca 00 02 cb cb [ 56.660945] ^ [ 56.667024] ffff800089647b80: cb cb cb cb 00 00 00 00 f1 f1 f1 f1 01 f2 04 f2 [ 56.674230] ffff800089647c00: 00 f2 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 56.681431] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-kmalloc_large_uaf
[ 38.420473] ================================================================== [ 38.430518] BUG: KASAN: use-after-free in kmalloc_large_uaf+0x2cc/0x2f8 [ 38.437113] Read of size 1 at addr ffff0008062c4000 by task kunit_try_catch/229 [ 38.444403] [ 38.445889] CPU: 2 UID: 0 PID: 229 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 38.445942] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.445957] Hardware name: WinLink E850-96 board (DT) [ 38.445977] Call trace: [ 38.445992] show_stack+0x20/0x38 (C) [ 38.446025] dump_stack_lvl+0x8c/0xd0 [ 38.446059] print_report+0x118/0x5d0 [ 38.446085] kasan_report+0xdc/0x128 [ 38.446111] __asan_report_load1_noabort+0x20/0x30 [ 38.446143] kmalloc_large_uaf+0x2cc/0x2f8 [ 38.446174] kunit_try_run_case+0x170/0x3f0 [ 38.446207] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.446243] kthread+0x328/0x630 [ 38.446270] ret_from_fork+0x10/0x20 [ 38.446302] [ 38.509857] The buggy address belongs to the physical page: [ 38.515413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8862c4 [ 38.523397] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.529919] raw: 0bfffe0000000000 fffffdffe018b208 ffff00085af65fc0 0000000000000000 [ 38.537637] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 38.545357] page dumped because: kasan: bad access detected [ 38.550912] [ 38.552387] Memory state around the buggy address: [ 38.557170] ffff0008062c3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.564370] ffff0008062c3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.571576] >ffff0008062c4000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.578775] ^ [ 38.581991] ffff0008062c4080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.589196] ffff0008062c4100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.596398] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-stack-out-of-bounds-in-kasan_stack_oob
[ 56.252390] ================================================================== [ 56.266860] BUG: KASAN: stack-out-of-bounds in kasan_stack_oob+0x238/0x270 [ 56.273712] Read of size 1 at addr ffff800089627c2a by task kunit_try_catch/330 [ 56.281002] [ 56.282488] CPU: 3 UID: 0 PID: 330 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 56.282544] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.282561] Hardware name: WinLink E850-96 board (DT) [ 56.282583] Call trace: [ 56.282597] show_stack+0x20/0x38 (C) [ 56.282635] dump_stack_lvl+0x8c/0xd0 [ 56.282671] print_report+0x310/0x5d0 [ 56.282699] kasan_report+0xdc/0x128 [ 56.282726] __asan_report_load1_noabort+0x20/0x30 [ 56.282758] kasan_stack_oob+0x238/0x270 [ 56.282789] kunit_try_run_case+0x170/0x3f0 [ 56.282819] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.282856] kthread+0x328/0x630 [ 56.282889] ret_from_fork+0x10/0x20 [ 56.282923] [ 56.346282] The buggy address belongs to stack of task kunit_try_catch/330 [ 56.353139] and is located at offset 138 in frame: [ 56.357998] kasan_stack_oob+0x0/0x270 [ 56.361736] [ 56.363206] This frame has 4 objects: [ 56.366857] [48, 49) '__assertion' [ 56.366881] [64, 72) 'array' [ 56.370325] [96, 112) '__assertion' [ 56.373279] [128, 138) 'stack_array' [ 56.376835] [ 56.381957] The buggy address ffff800089627c2a belongs to a vmalloc virtual mapping [ 56.389599] The buggy address belongs to the physical page: [ 56.395155] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8887c2 [ 56.403139] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 56.409660] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 56.417378] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 56.425100] page dumped because: kasan: bad access detected [ 56.430653] [ 56.432128] Memory state around the buggy address: [ 56.436909] ffff800089627b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 56.444111] ffff800089627b80: 00 00 00 00 f1 f1 f1 f1 f1 f1 01 f2 00 f2 f2 f2 [ 56.451318] >ffff800089627c00: 00 00 f2 f2 00 02 f3 f3 00 00 00 00 00 00 00 00 [ 56.458517] ^ [ 56.463035] ffff800089627c80: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 f2 f2 [ 56.470239] ffff800089627d00: 00 00 f2 f2 00 00 f3 f3 00 00 00 00 00 00 00 00 [ 56.477440] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-global-out-of-bounds-in-kasan_global_oob_right
[ 56.043920] ================================================================== [ 56.054535] BUG: KASAN: global-out-of-bounds in kasan_global_oob_right+0x230/0x270 [ 56.062084] Read of size 1 at addr ffff800087b5870d by task kunit_try_catch/326 [ 56.069374] [ 56.070858] CPU: 0 UID: 0 PID: 326 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 56.070914] Tainted: [B]=BAD_PAGE, [N]=TEST [ 56.070933] Hardware name: WinLink E850-96 board (DT) [ 56.070957] Call trace: [ 56.070972] show_stack+0x20/0x38 (C) [ 56.071006] dump_stack_lvl+0x8c/0xd0 [ 56.071041] print_report+0x310/0x5d0 [ 56.071069] kasan_report+0xdc/0x128 [ 56.071096] __asan_report_load1_noabort+0x20/0x30 [ 56.071132] kasan_global_oob_right+0x230/0x270 [ 56.071164] kunit_try_run_case+0x170/0x3f0 [ 56.071198] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 56.071235] kthread+0x328/0x630 [ 56.071268] ret_from_fork+0x10/0x20 [ 56.071302] [ 56.135260] The buggy address belongs to the variable: [ 56.140380] global_array+0xd/0x40 [ 56.143765] [ 56.145241] The buggy address ffff800087b5870d belongs to a vmalloc virtual mapping [ 56.152883] The buggy address belongs to the physical page: [ 56.158441] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x87b58 [ 56.166336] flags: 0x3fffe0000002000(reserved|node=0|zone=0|lastcpupid=0x1ffff) [ 56.173639] raw: 03fffe0000002000 fffffdffc01ed608 fffffdffc01ed608 0000000000000000 [ 56.181358] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 56.189080] page dumped because: kasan: bad access detected [ 56.194632] [ 56.196108] Memory state around the buggy address: [ 56.200887] ffff800087b58600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 56.208091] ffff800087b58680: 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9 f9 [ 56.215295] >ffff800087b58700: 00 02 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 [ 56.222496] ^ [ 56.225972] ffff800087b58780: 00 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 [ 56.233179] ffff800087b58800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 56.240378] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-mempool_kmalloc_invalid_free_helper
[ 55.803572] ================================================================== [ 55.813740] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 55.821723] Free of addr ffff0008062cc001 by task kunit_try_catch/324 [ 55.828144] [ 55.829631] CPU: 2 UID: 0 PID: 324 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 55.829686] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.829702] Hardware name: WinLink E850-96 board (DT) [ 55.829724] Call trace: [ 55.829738] show_stack+0x20/0x38 (C) [ 55.829773] dump_stack_lvl+0x8c/0xd0 [ 55.829809] print_report+0x118/0x5d0 [ 55.829843] kasan_report_invalid_free+0xc0/0xe8 [ 55.829873] __kasan_mempool_poison_object+0xfc/0x150 [ 55.829904] mempool_free+0x28c/0x328 [ 55.829939] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 55.829978] mempool_kmalloc_large_invalid_free+0xc0/0x118 [ 55.830016] kunit_try_run_case+0x170/0x3f0 [ 55.830050] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.830086] kthread+0x328/0x630 [ 55.830115] ret_from_fork+0x10/0x20 [ 55.830152] [ 55.905578] The buggy address belongs to the physical page: [ 55.911134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8862cc [ 55.919117] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 55.926757] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 55.933700] page_type: f8(unknown) [ 55.937096] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 55.944816] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 55.952544] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 55.960354] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 55.968167] head: 0bfffe0000000002 fffffdffe018b301 00000000ffffffff 00000000ffffffff [ 55.975979] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 55.983787] page dumped because: kasan: bad access detected [ 55.989340] [ 55.990816] Memory state around the buggy address: [ 55.995596] ffff0008062cbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 56.002799] ffff0008062cbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 56.010004] >ffff0008062cc000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 56.017204] ^ [ 56.020420] ffff0008062cc080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 56.027625] ffff0008062cc100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 56.034827] ================================================================== [ 55.476400] ================================================================== [ 55.486920] BUG: KASAN: invalid-free in mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 55.494903] Free of addr ffff00080245a301 by task kunit_try_catch/322 [ 55.501326] [ 55.502813] CPU: 0 UID: 0 PID: 322 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 55.502872] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.502888] Hardware name: WinLink E850-96 board (DT) [ 55.502912] Call trace: [ 55.502924] show_stack+0x20/0x38 (C) [ 55.502958] dump_stack_lvl+0x8c/0xd0 [ 55.502992] print_report+0x118/0x5d0 [ 55.503023] kasan_report_invalid_free+0xc0/0xe8 [ 55.503052] check_slab_allocation+0xfc/0x108 [ 55.503091] __kasan_mempool_poison_object+0x78/0x150 [ 55.503122] mempool_free+0x28c/0x328 [ 55.503154] mempool_kmalloc_invalid_free_helper+0x118/0x2a8 [ 55.503190] mempool_kmalloc_invalid_free+0xc0/0x118 [ 55.503222] kunit_try_run_case+0x170/0x3f0 [ 55.503253] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.503289] kthread+0x328/0x630 [ 55.503319] ret_from_fork+0x10/0x20 [ 55.503353] [ 55.582577] Allocated by task 322: [ 55.585964] kasan_save_stack+0x3c/0x68 [ 55.589780] kasan_save_track+0x20/0x40 [ 55.593600] kasan_save_alloc_info+0x40/0x58 [ 55.597853] __kasan_mempool_unpoison_object+0x11c/0x180 [ 55.603148] remove_element+0x130/0x1f8 [ 55.606967] mempool_alloc_preallocated+0x58/0xc0 [ 55.611656] mempool_kmalloc_invalid_free_helper+0x94/0x2a8 [ 55.617210] mempool_kmalloc_invalid_free+0xc0/0x118 [ 55.622158] kunit_try_run_case+0x170/0x3f0 [ 55.626325] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.631793] kthread+0x328/0x630 [ 55.635005] ret_from_fork+0x10/0x20 [ 55.638564] [ 55.640042] The buggy address belongs to the object at ffff00080245a300 [ 55.640042] which belongs to the cache kmalloc-128 of size 128 [ 55.652542] The buggy address is located 1 bytes inside of [ 55.652542] 128-byte region [ffff00080245a300, ffff00080245a380) [ 55.664084] [ 55.665565] The buggy address belongs to the physical page: [ 55.671123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88245a [ 55.679104] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 55.686745] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 55.693686] page_type: f5(slab) [ 55.696823] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 55.704542] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.712269] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 55.720080] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 55.727893] head: 0bfffe0000000001 fffffdffe0091681 00000000ffffffff 00000000ffffffff [ 55.735705] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 55.743512] page dumped because: kasan: bad access detected [ 55.749066] [ 55.750543] Memory state around the buggy address: [ 55.755322] ffff00080245a200: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 55.762524] ffff00080245a280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.769729] >ffff00080245a300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 55.776930] ^ [ 55.780145] ffff00080245a380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.787352] ffff00080245a400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 55.794553] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-mempool_double_free_helper
[ 55.042254] ================================================================== [ 55.052293] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 55.059407] Free of addr ffff000808728000 by task kunit_try_catch/318 [ 55.065830] [ 55.067316] CPU: 7 UID: 0 PID: 318 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 55.067372] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.067389] Hardware name: WinLink E850-96 board (DT) [ 55.067410] Call trace: [ 55.067423] show_stack+0x20/0x38 (C) [ 55.067455] dump_stack_lvl+0x8c/0xd0 [ 55.067490] print_report+0x118/0x5d0 [ 55.067519] kasan_report_invalid_free+0xc0/0xe8 [ 55.067550] __kasan_mempool_poison_object+0x14c/0x150 [ 55.067582] mempool_free+0x28c/0x328 [ 55.067614] mempool_double_free_helper+0x150/0x2e8 [ 55.067647] mempool_kmalloc_large_double_free+0xc0/0x118 [ 55.067682] kunit_try_run_case+0x170/0x3f0 [ 55.067713] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.067747] kthread+0x328/0x630 [ 55.067775] ret_from_fork+0x10/0x20 [ 55.067812] [ 55.142481] The buggy address belongs to the physical page: [ 55.148038] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888728 [ 55.156021] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 55.163661] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 55.170603] page_type: f8(unknown) [ 55.174000] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 55.181719] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 55.189447] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 55.197257] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 55.205071] head: 0bfffe0000000002 fffffdffe021ca01 00000000ffffffff 00000000ffffffff [ 55.212883] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 55.220688] page dumped because: kasan: bad access detected [ 55.226244] [ 55.227719] Memory state around the buggy address: [ 55.232501] ffff000808727f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 55.239702] ffff000808727f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 55.246909] >ffff000808728000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 55.254108] ^ [ 55.257323] ffff000808728080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 55.264528] ffff000808728100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 55.271730] ================================================================== [ 54.667233] ================================================================== [ 54.677037] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 54.684155] Free of addr ffff00080244df00 by task kunit_try_catch/316 [ 54.690575] [ 54.692060] CPU: 0 UID: 0 PID: 316 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 54.692115] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.692133] Hardware name: WinLink E850-96 board (DT) [ 54.692154] Call trace: [ 54.692167] show_stack+0x20/0x38 (C) [ 54.692203] dump_stack_lvl+0x8c/0xd0 [ 54.692236] print_report+0x118/0x5d0 [ 54.692263] kasan_report_invalid_free+0xc0/0xe8 [ 54.692294] check_slab_allocation+0xd4/0x108 [ 54.692333] __kasan_mempool_poison_object+0x78/0x150 [ 54.692365] mempool_free+0x28c/0x328 [ 54.692397] mempool_double_free_helper+0x150/0x2e8 [ 54.692431] mempool_kmalloc_double_free+0xc0/0x118 [ 54.692466] kunit_try_run_case+0x170/0x3f0 [ 54.692496] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.692531] kthread+0x328/0x630 [ 54.692561] ret_from_fork+0x10/0x20 [ 54.692596] [ 54.770958] Allocated by task 316: [ 54.774345] kasan_save_stack+0x3c/0x68 [ 54.778160] kasan_save_track+0x20/0x40 [ 54.781980] kasan_save_alloc_info+0x40/0x58 [ 54.786233] __kasan_mempool_unpoison_object+0x11c/0x180 [ 54.791530] remove_element+0x130/0x1f8 [ 54.795348] mempool_alloc_preallocated+0x58/0xc0 [ 54.800035] mempool_double_free_helper+0x94/0x2e8 [ 54.804809] mempool_kmalloc_double_free+0xc0/0x118 [ 54.809670] kunit_try_run_case+0x170/0x3f0 [ 54.813837] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.819306] kthread+0x328/0x630 [ 54.822517] ret_from_fork+0x10/0x20 [ 54.826076] [ 54.827552] Freed by task 316: [ 54.830592] kasan_save_stack+0x3c/0x68 [ 54.834409] kasan_save_track+0x20/0x40 [ 54.838229] kasan_save_free_info+0x4c/0x78 [ 54.842395] __kasan_mempool_poison_object+0xc0/0x150 [ 54.847430] mempool_free+0x28c/0x328 [ 54.851076] mempool_double_free_helper+0x100/0x2e8 [ 54.855937] mempool_kmalloc_double_free+0xc0/0x118 [ 54.860798] kunit_try_run_case+0x170/0x3f0 [ 54.864964] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.870433] kthread+0x328/0x630 [ 54.873645] ret_from_fork+0x10/0x20 [ 54.877204] [ 54.878681] The buggy address belongs to the object at ffff00080244df00 [ 54.878681] which belongs to the cache kmalloc-128 of size 128 [ 54.891182] The buggy address is located 0 bytes inside of [ 54.891182] 128-byte region [ffff00080244df00, ffff00080244df80) [ 54.902724] [ 54.904204] The buggy address belongs to the physical page: [ 54.909760] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88244c [ 54.917744] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 54.925384] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 54.932326] page_type: f5(slab) [ 54.935464] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 54.943182] raw: 0000000000000000 0000000000200020 00000000f5000000 0000000000000000 [ 54.950909] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 54.958720] head: 0000000000000000 0000000000200020 00000000f5000000 0000000000000000 [ 54.966533] head: 0bfffe0000000001 fffffdffe0091301 00000000ffffffff 00000000ffffffff [ 54.974344] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 54.982152] page dumped because: kasan: bad access detected [ 54.987706] [ 54.989181] Memory state around the buggy address: [ 54.993965] ffff00080244de00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 55.001166] ffff00080244de80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.008369] >ffff00080244df00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 55.015570] ^ [ 55.018785] ffff00080244df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 55.025992] ffff00080244e000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 55.033191] ================================================================== [ 55.281456] ================================================================== [ 55.291350] BUG: KASAN: double-free in mempool_double_free_helper+0x150/0x2e8 [ 55.298466] Free of addr ffff0008062cc000 by task kunit_try_catch/320 [ 55.304889] [ 55.306377] CPU: 2 UID: 0 PID: 320 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 55.306433] Tainted: [B]=BAD_PAGE, [N]=TEST [ 55.306451] Hardware name: WinLink E850-96 board (DT) [ 55.306477] Call trace: [ 55.306491] show_stack+0x20/0x38 (C) [ 55.306527] dump_stack_lvl+0x8c/0xd0 [ 55.306564] print_report+0x118/0x5d0 [ 55.306592] kasan_report_invalid_free+0xc0/0xe8 [ 55.306623] __kasan_mempool_poison_pages+0xe0/0xe8 [ 55.306656] mempool_free+0x24c/0x328 [ 55.306688] mempool_double_free_helper+0x150/0x2e8 [ 55.306723] mempool_page_alloc_double_free+0xbc/0x118 [ 55.306762] kunit_try_run_case+0x170/0x3f0 [ 55.306794] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 55.306830] kthread+0x328/0x630 [ 55.306860] ret_from_fork+0x10/0x20 [ 55.306893] [ 55.381020] The buggy address belongs to the physical page: [ 55.386575] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8862cc [ 55.394560] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 55.401082] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 55.408800] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 55.416521] page dumped because: kasan: bad access detected [ 55.422074] [ 55.423550] Memory state around the buggy address: [ 55.428331] ffff0008062cbf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 55.435532] ffff0008062cbf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 55.442739] >ffff0008062cc000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 55.449938] ^ [ 55.453154] ffff0008062cc080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 55.460358] ffff0008062cc100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 55.467561] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-mempool_uaf_helper
[ 54.499193] ================================================================== [ 54.499379] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 54.499503] Read of size 1 at addr ffff00080506c000 by task kunit_try_catch/314 [ 54.501862] [ 54.503351] CPU: 3 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 54.503414] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.503431] Hardware name: WinLink E850-96 board (DT) [ 54.503455] Call trace: [ 54.503468] show_stack+0x20/0x38 (C) [ 54.503505] dump_stack_lvl+0x8c/0xd0 [ 54.503541] print_report+0x118/0x5d0 [ 54.503570] kasan_report+0xdc/0x128 [ 54.503598] __asan_report_load1_noabort+0x20/0x30 [ 54.503635] mempool_uaf_helper+0x314/0x340 [ 54.503667] mempool_page_alloc_uaf+0xc0/0x118 [ 54.503705] kunit_try_run_case+0x170/0x3f0 [ 54.503734] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.503768] kthread+0x328/0x630 [ 54.503796] ret_from_fork+0x10/0x20 [ 54.503830] [ 54.571831] The buggy address belongs to the physical page: [ 54.577386] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88506c [ 54.585371] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.591891] raw: 0bfffe0000000000 0000000000000000 dead000000000122 0000000000000000 [ 54.599611] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 54.607331] page dumped because: kasan: bad access detected [ 54.612885] [ 54.614360] Memory state around the buggy address: [ 54.619144] ffff00080506bf00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 54.626343] ffff00080506bf80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 54.633548] >ffff00080506c000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 54.640749] ^ [ 54.643964] ffff00080506c080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 54.651169] ffff00080506c100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 54.658372] ================================================================== [ 53.918341] ================================================================== [ 53.927805] BUG: KASAN: use-after-free in mempool_uaf_helper+0x314/0x340 [ 53.934488] Read of size 1 at addr ffff000803ec8000 by task kunit_try_catch/310 [ 53.941778] [ 53.943263] CPU: 0 UID: 0 PID: 310 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 53.943321] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.943337] Hardware name: WinLink E850-96 board (DT) [ 53.943361] Call trace: [ 53.943374] show_stack+0x20/0x38 (C) [ 53.943409] dump_stack_lvl+0x8c/0xd0 [ 53.943445] print_report+0x118/0x5d0 [ 53.943471] kasan_report+0xdc/0x128 [ 53.943497] __asan_report_load1_noabort+0x20/0x30 [ 53.943531] mempool_uaf_helper+0x314/0x340 [ 53.943565] mempool_kmalloc_large_uaf+0xc4/0x120 [ 53.943602] kunit_try_run_case+0x170/0x3f0 [ 53.943634] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.943667] kthread+0x328/0x630 [ 53.943694] ret_from_fork+0x10/0x20 [ 53.943729] [ 54.012003] The buggy address belongs to the physical page: [ 54.017560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x883ec8 [ 54.025544] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 54.033183] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 54.040126] page_type: f8(unknown) [ 54.043522] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 54.051243] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 54.058970] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 54.066780] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 54.074593] head: 0bfffe0000000002 fffffdffe00fb201 00000000ffffffff 00000000ffffffff [ 54.082405] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 54.090213] page dumped because: kasan: bad access detected [ 54.095766] [ 54.097241] Memory state around the buggy address: [ 54.102025] ffff000803ec7f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 54.109224] ffff000803ec7f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 54.116429] >ffff000803ec8000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 54.123630] ^ [ 54.126846] ffff000803ec8080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 54.134050] ffff000803ec8100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 54.141253] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-mempool_uaf_helper
[ 53.565724] ================================================================== [ 53.565908] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 53.572425] Read of size 1 at addr ffff000801af8400 by task kunit_try_catch/308 [ 53.579716] [ 53.581204] CPU: 3 UID: 0 PID: 308 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 53.581262] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.581281] Hardware name: WinLink E850-96 board (DT) [ 53.581308] Call trace: [ 53.581322] show_stack+0x20/0x38 (C) [ 53.581358] dump_stack_lvl+0x8c/0xd0 [ 53.581394] print_report+0x118/0x5d0 [ 53.581424] kasan_report+0xdc/0x128 [ 53.581453] __asan_report_load1_noabort+0x20/0x30 [ 53.581485] mempool_uaf_helper+0x314/0x340 [ 53.581516] mempool_kmalloc_uaf+0xc4/0x120 [ 53.581548] kunit_try_run_case+0x170/0x3f0 [ 53.581579] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.581615] kthread+0x328/0x630 [ 53.581644] ret_from_fork+0x10/0x20 [ 53.581679] [ 53.649421] Allocated by task 308: [ 53.652805] kasan_save_stack+0x3c/0x68 [ 53.656623] kasan_save_track+0x20/0x40 [ 53.660443] kasan_save_alloc_info+0x40/0x58 [ 53.664696] __kasan_mempool_unpoison_object+0x11c/0x180 [ 53.669991] remove_element+0x130/0x1f8 [ 53.673810] mempool_alloc_preallocated+0x58/0xc0 [ 53.678498] mempool_uaf_helper+0xa4/0x340 [ 53.682578] mempool_kmalloc_uaf+0xc4/0x120 [ 53.686744] kunit_try_run_case+0x170/0x3f0 [ 53.690911] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.696380] kthread+0x328/0x630 [ 53.699591] ret_from_fork+0x10/0x20 [ 53.703150] [ 53.704627] Freed by task 308: [ 53.707666] kasan_save_stack+0x3c/0x68 [ 53.711484] kasan_save_track+0x20/0x40 [ 53.715303] kasan_save_free_info+0x4c/0x78 [ 53.719470] __kasan_mempool_poison_object+0xc0/0x150 [ 53.724504] mempool_free+0x28c/0x328 [ 53.728150] mempool_uaf_helper+0x104/0x340 [ 53.732316] mempool_kmalloc_uaf+0xc4/0x120 [ 53.736483] kunit_try_run_case+0x170/0x3f0 [ 53.740650] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.746119] kthread+0x328/0x630 [ 53.749332] ret_from_fork+0x10/0x20 [ 53.752889] [ 53.754368] The buggy address belongs to the object at ffff000801af8400 [ 53.754368] which belongs to the cache kmalloc-128 of size 128 [ 53.766867] The buggy address is located 0 bytes inside of [ 53.766867] freed 128-byte region [ffff000801af8400, ffff000801af8480) [ 53.778930] [ 53.780410] The buggy address belongs to the physical page: [ 53.785967] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881af8 [ 53.793950] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 53.801589] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 53.808532] page_type: f5(slab) [ 53.811669] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 53.819388] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.827116] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 53.834926] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 53.842739] head: 0bfffe0000000001 fffffdffe006be01 00000000ffffffff 00000000ffffffff [ 53.850551] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 53.858357] page dumped because: kasan: bad access detected [ 53.863911] [ 53.865387] Memory state around the buggy address: [ 53.870169] ffff000801af8300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 53.877372] ffff000801af8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.884575] >ffff000801af8400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 53.891776] ^ [ 53.894991] ffff000801af8480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.902196] ffff000801af8500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 53.909399] ================================================================== [ 54.150847] ================================================================== [ 54.160182] BUG: KASAN: slab-use-after-free in mempool_uaf_helper+0x314/0x340 [ 54.167295] Read of size 1 at addr ffff0008048cd240 by task kunit_try_catch/312 [ 54.174584] [ 54.176071] CPU: 2 UID: 0 PID: 312 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 54.176126] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.176143] Hardware name: WinLink E850-96 board (DT) [ 54.176166] Call trace: [ 54.176181] show_stack+0x20/0x38 (C) [ 54.176215] dump_stack_lvl+0x8c/0xd0 [ 54.176251] print_report+0x118/0x5d0 [ 54.176279] kasan_report+0xdc/0x128 [ 54.176304] __asan_report_load1_noabort+0x20/0x30 [ 54.176340] mempool_uaf_helper+0x314/0x340 [ 54.176373] mempool_slab_uaf+0xc0/0x118 [ 54.176407] kunit_try_run_case+0x170/0x3f0 [ 54.176440] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.176474] kthread+0x328/0x630 [ 54.176504] ret_from_fork+0x10/0x20 [ 54.176542] [ 54.244030] Allocated by task 312: [ 54.247417] kasan_save_stack+0x3c/0x68 [ 54.251233] kasan_save_track+0x20/0x40 [ 54.255052] kasan_save_alloc_info+0x40/0x58 [ 54.259305] __kasan_mempool_unpoison_object+0xbc/0x180 [ 54.264513] remove_element+0x16c/0x1f8 [ 54.268334] mempool_alloc_preallocated+0x58/0xc0 [ 54.273020] mempool_uaf_helper+0xa4/0x340 [ 54.277100] mempool_slab_uaf+0xc0/0x118 [ 54.281006] kunit_try_run_case+0x170/0x3f0 [ 54.285173] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.290642] kthread+0x328/0x630 [ 54.293853] ret_from_fork+0x10/0x20 [ 54.297412] [ 54.298889] Freed by task 312: [ 54.301927] kasan_save_stack+0x3c/0x68 [ 54.305746] kasan_save_track+0x20/0x40 [ 54.309565] kasan_save_free_info+0x4c/0x78 [ 54.313731] __kasan_mempool_poison_object+0xc0/0x150 [ 54.318766] mempool_free+0x28c/0x328 [ 54.322412] mempool_uaf_helper+0x104/0x340 [ 54.326579] mempool_slab_uaf+0xc0/0x118 [ 54.330484] kunit_try_run_case+0x170/0x3f0 [ 54.334651] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.340120] kthread+0x328/0x630 [ 54.343332] ret_from_fork+0x10/0x20 [ 54.346891] [ 54.348368] The buggy address belongs to the object at ffff0008048cd240 [ 54.348368] which belongs to the cache test_cache of size 123 [ 54.360781] The buggy address is located 0 bytes inside of [ 54.360781] freed 123-byte region [ffff0008048cd240, ffff0008048cd2bb) [ 54.372845] [ 54.374324] The buggy address belongs to the physical page: [ 54.379881] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8848cd [ 54.387865] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.394374] page_type: f5(slab) [ 54.397511] raw: 0bfffe0000000000 ffff00080188e640 dead000000000122 0000000000000000 [ 54.405230] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 54.412950] page dumped because: kasan: bad access detected [ 54.418504] [ 54.419979] Memory state around the buggy address: [ 54.424761] ffff0008048cd100: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.431964] ffff0008048cd180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 54.439167] >ffff0008048cd200: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 54.446368] ^ [ 54.451667] ffff0008048cd280: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.458872] ffff0008048cd300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.466074] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-mempool_oob_right_helper
[ 53.277156] ================================================================== [ 53.287105] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 53.294653] Read of size 1 at addr ffff0008086382bb by task kunit_try_catch/306 [ 53.301941] [ 53.303428] CPU: 5 UID: 0 PID: 306 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 53.303489] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.303507] Hardware name: WinLink E850-96 board (DT) [ 53.303531] Call trace: [ 53.303545] show_stack+0x20/0x38 (C) [ 53.303581] dump_stack_lvl+0x8c/0xd0 [ 53.303616] print_report+0x118/0x5d0 [ 53.303646] kasan_report+0xdc/0x128 [ 53.303673] __asan_report_load1_noabort+0x20/0x30 [ 53.303707] mempool_oob_right_helper+0x2ac/0x2f0 [ 53.303742] mempool_slab_oob_right+0xc0/0x118 [ 53.303775] kunit_try_run_case+0x170/0x3f0 [ 53.303807] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.303842] kthread+0x328/0x630 [ 53.303870] ret_from_fork+0x10/0x20 [ 53.303904] [ 53.372428] Allocated by task 306: [ 53.375815] kasan_save_stack+0x3c/0x68 [ 53.379631] kasan_save_track+0x20/0x40 [ 53.383450] kasan_save_alloc_info+0x40/0x58 [ 53.387704] __kasan_mempool_unpoison_object+0xbc/0x180 [ 53.392912] remove_element+0x16c/0x1f8 [ 53.396731] mempool_alloc_preallocated+0x58/0xc0 [ 53.401419] mempool_oob_right_helper+0x98/0x2f0 [ 53.406019] mempool_slab_oob_right+0xc0/0x118 [ 53.410446] kunit_try_run_case+0x170/0x3f0 [ 53.414613] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.420082] kthread+0x328/0x630 [ 53.423293] ret_from_fork+0x10/0x20 [ 53.426852] [ 53.428330] The buggy address belongs to the object at ffff000808638240 [ 53.428330] which belongs to the cache test_cache of size 123 [ 53.440744] The buggy address is located 0 bytes to the right of [ 53.440744] allocated 123-byte region [ffff000808638240, ffff0008086382bb) [ 53.453675] [ 53.455154] The buggy address belongs to the physical page: [ 53.460710] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888638 [ 53.468693] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.475204] page_type: f5(slab) [ 53.478341] raw: 0bfffe0000000000 ffff000801e0a640 dead000000000122 0000000000000000 [ 53.486060] raw: 0000000000000000 0000000080150015 00000000f5000000 0000000000000000 [ 53.493780] page dumped because: kasan: bad access detected [ 53.499334] [ 53.500810] Memory state around the buggy address: [ 53.505593] ffff000808638180: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 53.512792] ffff000808638200: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 53.519997] >ffff000808638280: 00 00 00 00 00 00 00 03 fc fc fc fc fc fc fc fc [ 53.527198] ^ [ 53.532237] ffff000808638300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.539441] ffff000808638380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.546642] ================================================================== [ 52.740078] ================================================================== [ 52.740248] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 52.740386] Read of size 1 at addr ffff000801b9e273 by task kunit_try_catch/302 [ 52.746828] [ 52.748315] CPU: 7 UID: 0 PID: 302 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 52.748374] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.748389] Hardware name: WinLink E850-96 board (DT) [ 52.748413] Call trace: [ 52.748428] show_stack+0x20/0x38 (C) [ 52.748465] dump_stack_lvl+0x8c/0xd0 [ 52.748502] print_report+0x118/0x5d0 [ 52.748531] kasan_report+0xdc/0x128 [ 52.748560] __asan_report_load1_noabort+0x20/0x30 [ 52.748595] mempool_oob_right_helper+0x2ac/0x2f0 [ 52.748627] mempool_kmalloc_oob_right+0xc4/0x120 [ 52.748659] kunit_try_run_case+0x170/0x3f0 [ 52.748689] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.748724] kthread+0x328/0x630 [ 52.748752] ret_from_fork+0x10/0x20 [ 52.748786] [ 52.817575] Allocated by task 302: [ 52.820962] kasan_save_stack+0x3c/0x68 [ 52.824778] kasan_save_track+0x20/0x40 [ 52.828598] kasan_save_alloc_info+0x40/0x58 [ 52.832851] __kasan_mempool_unpoison_object+0x11c/0x180 [ 52.838146] remove_element+0x130/0x1f8 [ 52.841965] mempool_alloc_preallocated+0x58/0xc0 [ 52.846653] mempool_oob_right_helper+0x98/0x2f0 [ 52.851253] mempool_kmalloc_oob_right+0xc4/0x120 [ 52.855941] kunit_try_run_case+0x170/0x3f0 [ 52.860108] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.865576] kthread+0x328/0x630 [ 52.868788] ret_from_fork+0x10/0x20 [ 52.872347] [ 52.873825] The buggy address belongs to the object at ffff000801b9e200 [ 52.873825] which belongs to the cache kmalloc-128 of size 128 [ 52.886326] The buggy address is located 0 bytes to the right of [ 52.886326] allocated 115-byte region [ffff000801b9e200, ffff000801b9e273) [ 52.899256] [ 52.900736] The buggy address belongs to the physical page: [ 52.906294] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881b9e [ 52.914275] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 52.921916] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 52.928858] page_type: f5(slab) [ 52.931995] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 52.939714] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.947442] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 52.955252] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 52.963064] head: 0bfffe0000000001 fffffdffe006e781 00000000ffffffff 00000000ffffffff [ 52.970876] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 52.978683] page dumped because: kasan: bad access detected [ 52.984237] [ 52.985713] Memory state around the buggy address: [ 52.990496] ffff000801b9e100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 52.997698] ffff000801b9e180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.004902] >ffff000801b9e200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 53.012102] ^ [ 53.018963] ffff000801b9e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.026167] ffff000801b9e300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 53.033368] ================================================================== [ 53.042274] ================================================================== [ 53.052296] BUG: KASAN: slab-out-of-bounds in mempool_oob_right_helper+0x2ac/0x2f0 [ 53.059845] Read of size 1 at addr ffff00080506e001 by task kunit_try_catch/304 [ 53.067136] [ 53.068624] CPU: 3 UID: 0 PID: 304 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 53.068675] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.068692] Hardware name: WinLink E850-96 board (DT) [ 53.068714] Call trace: [ 53.068727] show_stack+0x20/0x38 (C) [ 53.068764] dump_stack_lvl+0x8c/0xd0 [ 53.068800] print_report+0x118/0x5d0 [ 53.068829] kasan_report+0xdc/0x128 [ 53.068854] __asan_report_load1_noabort+0x20/0x30 [ 53.068887] mempool_oob_right_helper+0x2ac/0x2f0 [ 53.068923] mempool_kmalloc_large_oob_right+0xc4/0x120 [ 53.068960] kunit_try_run_case+0x170/0x3f0 [ 53.068990] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.069027] kthread+0x328/0x630 [ 53.069059] ret_from_fork+0x10/0x20 [ 53.069097] [ 53.138404] The buggy address belongs to the physical page: [ 53.143962] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88506c [ 53.151948] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 53.159585] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 53.166527] page_type: f8(unknown) [ 53.169926] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 53.177644] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 53.185372] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 53.193181] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 53.200995] head: 0bfffe0000000002 fffffdffe0141b01 00000000ffffffff 00000000ffffffff [ 53.208807] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 53.216614] page dumped because: kasan: bad access detected [ 53.222168] [ 53.223643] Memory state around the buggy address: [ 53.228425] ffff00080506df00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 53.235626] ffff00080506df80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 53.242833] >ffff00080506e000: 01 fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 53.250032] ^ [ 53.253248] ffff00080506e080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 53.260452] ffff00080506e100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 53.267655] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_double_destroy
[ 51.843655] ================================================================== [ 51.843841] BUG: KASAN: slab-use-after-free in kmem_cache_double_destroy+0x174/0x300 [ 51.843977] Read of size 1 at addr ffff000801afa140 by task kunit_try_catch/296 [ 51.847538] [ 51.849025] CPU: 3 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 51.849082] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.849101] Hardware name: WinLink E850-96 board (DT) [ 51.849124] Call trace: [ 51.849138] show_stack+0x20/0x38 (C) [ 51.849175] dump_stack_lvl+0x8c/0xd0 [ 51.849210] print_report+0x118/0x5d0 [ 51.849238] kasan_report+0xdc/0x128 [ 51.849262] __kasan_check_byte+0x54/0x70 [ 51.849289] kmem_cache_destroy+0x34/0x218 [ 51.849323] kmem_cache_double_destroy+0x174/0x300 [ 51.849359] kunit_try_run_case+0x170/0x3f0 [ 51.849391] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.849428] kthread+0x328/0x630 [ 51.849456] ret_from_fork+0x10/0x20 [ 51.849491] [ 51.916981] Allocated by task 296: [ 51.920369] kasan_save_stack+0x3c/0x68 [ 51.924184] kasan_save_track+0x20/0x40 [ 51.928004] kasan_save_alloc_info+0x40/0x58 [ 51.932258] __kasan_slab_alloc+0xa8/0xb0 [ 51.936250] kmem_cache_alloc_noprof+0x10c/0x398 [ 51.940851] __kmem_cache_create_args+0x178/0x280 [ 51.945538] kmem_cache_double_destroy+0xc0/0x300 [ 51.950226] kunit_try_run_case+0x170/0x3f0 [ 51.954394] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.959861] kthread+0x328/0x630 [ 51.963072] ret_from_fork+0x10/0x20 [ 51.966632] [ 51.968109] Freed by task 296: [ 51.971147] kasan_save_stack+0x3c/0x68 [ 51.974965] kasan_save_track+0x20/0x40 [ 51.978785] kasan_save_free_info+0x4c/0x78 [ 51.982951] __kasan_slab_free+0x6c/0x98 [ 51.986857] kmem_cache_free+0x260/0x468 [ 51.990763] slab_kmem_cache_release+0x38/0x50 [ 51.995190] kmem_cache_release+0x1c/0x30 [ 51.999183] kobject_put+0x17c/0x420 [ 52.002742] sysfs_slab_release+0x1c/0x30 [ 52.006735] kmem_cache_destroy+0x118/0x218 [ 52.010902] kmem_cache_double_destroy+0x128/0x300 [ 52.015676] kunit_try_run_case+0x170/0x3f0 [ 52.019843] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.025312] kthread+0x328/0x630 [ 52.028524] ret_from_fork+0x10/0x20 [ 52.032082] [ 52.033559] The buggy address belongs to the object at ffff000801afa140 [ 52.033559] which belongs to the cache kmem_cache of size 208 [ 52.045974] The buggy address is located 0 bytes inside of [ 52.045974] freed 208-byte region [ffff000801afa140, ffff000801afa210) [ 52.058037] [ 52.059517] The buggy address belongs to the physical page: [ 52.065073] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881afa [ 52.073056] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 52.080697] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 52.087638] page_type: f5(slab) [ 52.090775] raw: 0bfffe0000000040 ffff000800002000 dead000000000122 0000000000000000 [ 52.098494] raw: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000 [ 52.106222] head: 0bfffe0000000040 ffff000800002000 dead000000000122 0000000000000000 [ 52.114032] head: 0000000000000000 0000000080190019 00000000f5000000 0000000000000000 [ 52.121845] head: 0bfffe0000000001 fffffdffe006be81 00000000ffffffff 00000000ffffffff [ 52.129657] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 52.137465] page dumped because: kasan: bad access detected [ 52.143018] [ 52.144493] Memory state around the buggy address: [ 52.149277] ffff000801afa000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 52.156476] ffff000801afa080: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 52.163681] >ffff000801afa100: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 52.170882] ^ [ 52.176181] ffff000801afa180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 52.183386] ffff000801afa200: fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.190587] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmem_cache_rcu_uaf
[ 51.436853] ================================================================== [ 51.437046] BUG: KASAN: slab-use-after-free in kmem_cache_rcu_uaf+0x388/0x468 [ 51.437175] Read of size 1 at addr ffff000801b9e000 by task kunit_try_catch/294 [ 51.440560] [ 51.442047] CPU: 6 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 51.442112] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.442128] Hardware name: WinLink E850-96 board (DT) [ 51.442149] Call trace: [ 51.442163] show_stack+0x20/0x38 (C) [ 51.442197] dump_stack_lvl+0x8c/0xd0 [ 51.442237] print_report+0x118/0x5d0 [ 51.442266] kasan_report+0xdc/0x128 [ 51.442295] __asan_report_load1_noabort+0x20/0x30 [ 51.442329] kmem_cache_rcu_uaf+0x388/0x468 [ 51.442360] kunit_try_run_case+0x170/0x3f0 [ 51.442393] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.442429] kthread+0x328/0x630 [ 51.442458] ret_from_fork+0x10/0x20 [ 51.442493] [ 51.506099] Allocated by task 294: [ 51.509488] kasan_save_stack+0x3c/0x68 [ 51.513302] kasan_save_track+0x20/0x40 [ 51.517123] kasan_save_alloc_info+0x40/0x58 [ 51.521375] __kasan_slab_alloc+0xa8/0xb0 [ 51.525368] kmem_cache_alloc_noprof+0x10c/0x398 [ 51.529968] kmem_cache_rcu_uaf+0x12c/0x468 [ 51.534135] kunit_try_run_case+0x170/0x3f0 [ 51.538302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.543772] kthread+0x328/0x630 [ 51.546982] ret_from_fork+0x10/0x20 [ 51.550541] [ 51.552018] Freed by task 0: [ 51.554885] kasan_save_stack+0x3c/0x68 [ 51.558700] kasan_save_track+0x20/0x40 [ 51.562520] kasan_save_free_info+0x4c/0x78 [ 51.566687] __kasan_slab_free+0x6c/0x98 [ 51.570593] slab_free_after_rcu_debug+0xd4/0x2f8 [ 51.575280] rcu_core+0x9f4/0x1e20 [ 51.578666] rcu_core_si+0x18/0x30 [ 51.582051] handle_softirqs+0x374/0xb28 [ 51.585957] __do_softirq+0x1c/0x28 [ 51.589429] [ 51.590906] Last potentially related work creation: [ 51.595768] kasan_save_stack+0x3c/0x68 [ 51.599585] kasan_record_aux_stack+0xb4/0xc8 [ 51.603927] kmem_cache_free+0x120/0x468 [ 51.607833] kmem_cache_rcu_uaf+0x16c/0x468 [ 51.611999] kunit_try_run_case+0x170/0x3f0 [ 51.616165] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.621634] kthread+0x328/0x630 [ 51.624846] ret_from_fork+0x10/0x20 [ 51.628404] [ 51.629881] The buggy address belongs to the object at ffff000801b9e000 [ 51.629881] which belongs to the cache test_cache of size 200 [ 51.642297] The buggy address is located 0 bytes inside of [ 51.642297] freed 200-byte region [ffff000801b9e000, ffff000801b9e0c8) [ 51.654359] [ 51.655839] The buggy address belongs to the physical page: [ 51.661395] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881b9e [ 51.669378] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 51.677018] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 51.683961] page_type: f5(slab) [ 51.687097] raw: 0bfffe0000000040 ffff000801b9c000 dead000000000122 0000000000000000 [ 51.694818] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 51.702546] head: 0bfffe0000000040 ffff000801b9c000 dead000000000122 0000000000000000 [ 51.710354] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 51.718167] head: 0bfffe0000000001 fffffdffe006e781 00000000ffffffff 00000000ffffffff [ 51.725979] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 51.733786] page dumped because: kasan: bad access detected [ 51.739342] [ 51.740816] Memory state around the buggy address: [ 51.745596] ffff000801b9df00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.752800] ffff000801b9df80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.760005] >ffff000801b9e000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 51.767205] ^ [ 51.770420] ffff000801b9e080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 51.777625] ffff000801b9e100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.784827] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kmem_cache_invalid_free
[ 51.037951] ================================================================== [ 51.038150] BUG: KASAN: invalid-free in kmem_cache_invalid_free+0x184/0x3c8 [ 51.044256] Free of addr ffff000801afc001 by task kunit_try_catch/292 [ 51.050680] [ 51.052165] CPU: 3 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 51.052226] Tainted: [B]=BAD_PAGE, [N]=TEST [ 51.052242] Hardware name: WinLink E850-96 board (DT) [ 51.052265] Call trace: [ 51.052277] show_stack+0x20/0x38 (C) [ 51.052311] dump_stack_lvl+0x8c/0xd0 [ 51.052347] print_report+0x118/0x5d0 [ 51.052376] kasan_report_invalid_free+0xc0/0xe8 [ 51.052406] check_slab_allocation+0xfc/0x108 [ 51.052443] __kasan_slab_pre_free+0x2c/0x48 [ 51.052478] kmem_cache_free+0xf0/0x468 [ 51.052513] kmem_cache_invalid_free+0x184/0x3c8 [ 51.052545] kunit_try_run_case+0x170/0x3f0 [ 51.052578] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.052613] kthread+0x328/0x630 [ 51.052638] ret_from_fork+0x10/0x20 [ 51.052671] [ 51.125331] Allocated by task 292: [ 51.128717] kasan_save_stack+0x3c/0x68 [ 51.132535] kasan_save_track+0x20/0x40 [ 51.136353] kasan_save_alloc_info+0x40/0x58 [ 51.140607] __kasan_slab_alloc+0xa8/0xb0 [ 51.144600] kmem_cache_alloc_noprof+0x10c/0x398 [ 51.149200] kmem_cache_invalid_free+0x12c/0x3c8 [ 51.153801] kunit_try_run_case+0x170/0x3f0 [ 51.157967] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 51.163436] kthread+0x328/0x630 [ 51.166648] ret_from_fork+0x10/0x20 [ 51.170206] [ 51.171684] The buggy address belongs to the object at ffff000801afc000 [ 51.171684] which belongs to the cache test_cache of size 200 [ 51.184099] The buggy address is located 1 bytes inside of [ 51.184099] 200-byte region [ffff000801afc000, ffff000801afc0c8) [ 51.195640] [ 51.197120] The buggy address belongs to the physical page: [ 51.202675] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881afc [ 51.210659] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 51.218299] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 51.225242] page_type: f5(slab) [ 51.228377] raw: 0bfffe0000000040 ffff000801afa000 dead000000000122 0000000000000000 [ 51.236098] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 51.243826] head: 0bfffe0000000040 ffff000801afa000 dead000000000122 0000000000000000 [ 51.251636] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 51.259449] head: 0bfffe0000000001 fffffdffe006bf01 00000000ffffffff 00000000ffffffff [ 51.267260] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 51.275068] page dumped because: kasan: bad access detected [ 51.280621] [ 51.282097] Memory state around the buggy address: [ 51.286879] ffff000801afbf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.294080] ffff000801afbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.301288] >ffff000801afc000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 51.308486] ^ [ 51.311701] ffff000801afc080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 51.318906] ffff000801afc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.326108] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kmem_cache_double_free
[ 50.696627] ================================================================== [ 50.696807] BUG: KASAN: double-free in kmem_cache_double_free+0x190/0x3c8 [ 50.696933] Free of addr ffff000802458000 by task kunit_try_catch/290 [ 50.698339] [ 50.699827] CPU: 0 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 50.699886] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.699905] Hardware name: WinLink E850-96 board (DT) [ 50.699927] Call trace: [ 50.699941] show_stack+0x20/0x38 (C) [ 50.699977] dump_stack_lvl+0x8c/0xd0 [ 50.700011] print_report+0x118/0x5d0 [ 50.700041] kasan_report_invalid_free+0xc0/0xe8 [ 50.700072] check_slab_allocation+0xd4/0x108 [ 50.700110] __kasan_slab_pre_free+0x2c/0x48 [ 50.700143] kmem_cache_free+0xf0/0x468 [ 50.700177] kmem_cache_double_free+0x190/0x3c8 [ 50.700208] kunit_try_run_case+0x170/0x3f0 [ 50.700240] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.700275] kthread+0x328/0x630 [ 50.700303] ret_from_fork+0x10/0x20 [ 50.700342] [ 50.772906] Allocated by task 290: [ 50.776292] kasan_save_stack+0x3c/0x68 [ 50.780108] kasan_save_track+0x20/0x40 [ 50.783928] kasan_save_alloc_info+0x40/0x58 [ 50.788181] __kasan_slab_alloc+0xa8/0xb0 [ 50.792174] kmem_cache_alloc_noprof+0x10c/0x398 [ 50.796775] kmem_cache_double_free+0x12c/0x3c8 [ 50.801289] kunit_try_run_case+0x170/0x3f0 [ 50.805455] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.810924] kthread+0x328/0x630 [ 50.814135] ret_from_fork+0x10/0x20 [ 50.817694] [ 50.819170] Freed by task 290: [ 50.822208] kasan_save_stack+0x3c/0x68 [ 50.826027] kasan_save_track+0x20/0x40 [ 50.829847] kasan_save_free_info+0x4c/0x78 [ 50.834014] __kasan_slab_free+0x6c/0x98 [ 50.837920] kmem_cache_free+0x260/0x468 [ 50.841826] kmem_cache_double_free+0x140/0x3c8 [ 50.846340] kunit_try_run_case+0x170/0x3f0 [ 50.850507] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.855975] kthread+0x328/0x630 [ 50.859187] ret_from_fork+0x10/0x20 [ 50.862746] [ 50.864223] The buggy address belongs to the object at ffff000802458000 [ 50.864223] which belongs to the cache test_cache of size 200 [ 50.876638] The buggy address is located 0 bytes inside of [ 50.876638] 200-byte region [ffff000802458000, ffff0008024580c8) [ 50.888180] [ 50.889659] The buggy address belongs to the physical page: [ 50.895215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882458 [ 50.903199] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 50.910839] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 50.917781] page_type: f5(slab) [ 50.920918] raw: 0bfffe0000000040 ffff000802435e00 dead000000000122 0000000000000000 [ 50.928637] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 50.936365] head: 0bfffe0000000040 ffff000802435e00 dead000000000122 0000000000000000 [ 50.944175] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 50.951988] head: 0bfffe0000000001 fffffdffe0091601 00000000ffffffff 00000000ffffffff [ 50.959800] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 50.967607] page dumped because: kasan: bad access detected [ 50.973161] [ 50.974638] Memory state around the buggy address: [ 50.979416] ffff000802457f00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.986619] ffff000802457f80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 50.993826] >ffff000802458000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 51.001025] ^ [ 51.004241] ffff000802458080: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 51.011446] ffff000802458100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 51.018648] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-out-of-bounds-in-kmalloc_memmove_negative_size
[ 45.611029] ================================================================== [ 45.620863] BUG: KASAN: out-of-bounds in kmalloc_memmove_negative_size+0x154/0x2e0 [ 45.628410] Read of size 18446744073709551614 at addr ffff00080696ef84 by task kunit_try_catch/261 [ 45.637351] [ 45.638837] CPU: 2 UID: 0 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 45.638891] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.638909] Hardware name: WinLink E850-96 board (DT) [ 45.638930] Call trace: [ 45.638942] show_stack+0x20/0x38 (C) [ 45.638977] dump_stack_lvl+0x8c/0xd0 [ 45.639016] print_report+0x118/0x5d0 [ 45.639048] kasan_report+0xdc/0x128 [ 45.639075] kasan_check_range+0x100/0x1a8 [ 45.639105] __asan_memmove+0x3c/0x98 [ 45.639135] kmalloc_memmove_negative_size+0x154/0x2e0 [ 45.639169] kunit_try_run_case+0x170/0x3f0 [ 45.639200] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.639234] kthread+0x328/0x630 [ 45.639261] ret_from_fork+0x10/0x20 [ 45.639296] [ 45.706795] Allocated by task 261: [ 45.710183] kasan_save_stack+0x3c/0x68 [ 45.713998] kasan_save_track+0x20/0x40 [ 45.717818] kasan_save_alloc_info+0x40/0x58 [ 45.722071] __kasan_kmalloc+0xd4/0xd8 [ 45.725804] __kmalloc_cache_noprof+0x16c/0x3c0 [ 45.730317] kmalloc_memmove_negative_size+0xb0/0x2e0 [ 45.735352] kunit_try_run_case+0x170/0x3f0 [ 45.739521] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.744988] kthread+0x328/0x630 [ 45.748199] ret_from_fork+0x10/0x20 [ 45.751758] [ 45.753237] The buggy address belongs to the object at ffff00080696ef80 [ 45.753237] which belongs to the cache kmalloc-64 of size 64 [ 45.765563] The buggy address is located 4 bytes inside of [ 45.765563] 64-byte region [ffff00080696ef80, ffff00080696efc0) [ 45.777018] [ 45.778497] The buggy address belongs to the physical page: [ 45.784054] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88696e [ 45.792038] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 45.798547] page_type: f5(slab) [ 45.801683] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 45.809403] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 45.817123] page dumped because: kasan: bad access detected [ 45.822677] [ 45.824153] Memory state around the buggy address: [ 45.828934] ffff00080696ee80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 45.836137] ffff00080696ef00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 45.843341] >ffff00080696ef80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 45.850541] ^ [ 45.853759] ffff00080696f000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 45.860962] ffff00080696f080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 45.868164] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmem_cache_oob
[ 50.350922] ================================================================== [ 50.360462] BUG: KASAN: slab-out-of-bounds in kmem_cache_oob+0x344/0x430 [ 50.367141] Read of size 1 at addr ffff0008024560c8 by task kunit_try_catch/288 [ 50.374432] [ 50.375918] CPU: 0 UID: 0 PID: 288 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 50.375972] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.375988] Hardware name: WinLink E850-96 board (DT) [ 50.376009] Call trace: [ 50.376022] show_stack+0x20/0x38 (C) [ 50.376057] dump_stack_lvl+0x8c/0xd0 [ 50.376092] print_report+0x118/0x5d0 [ 50.376120] kasan_report+0xdc/0x128 [ 50.376149] __asan_report_load1_noabort+0x20/0x30 [ 50.376180] kmem_cache_oob+0x344/0x430 [ 50.376209] kunit_try_run_case+0x170/0x3f0 [ 50.376239] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.376274] kthread+0x328/0x630 [ 50.376302] ret_from_fork+0x10/0x20 [ 50.376335] [ 50.439625] Allocated by task 288: [ 50.443011] kasan_save_stack+0x3c/0x68 [ 50.446827] kasan_save_track+0x20/0x40 [ 50.450646] kasan_save_alloc_info+0x40/0x58 [ 50.454899] __kasan_slab_alloc+0xa8/0xb0 [ 50.458892] kmem_cache_alloc_noprof+0x10c/0x398 [ 50.463493] kmem_cache_oob+0x12c/0x430 [ 50.467312] kunit_try_run_case+0x170/0x3f0 [ 50.471479] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.476949] kthread+0x328/0x630 [ 50.480159] ret_from_fork+0x10/0x20 [ 50.483718] [ 50.485196] The buggy address belongs to the object at ffff000802456000 [ 50.485196] which belongs to the cache test_cache of size 200 [ 50.497609] The buggy address is located 0 bytes to the right of [ 50.497609] allocated 200-byte region [ffff000802456000, ffff0008024560c8) [ 50.510541] [ 50.512021] The buggy address belongs to the physical page: [ 50.517577] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882456 [ 50.525560] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 50.533201] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 50.540143] page_type: f5(slab) [ 50.543279] raw: 0bfffe0000000040 ffff000802435cc0 dead000000000122 0000000000000000 [ 50.550998] raw: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 50.558727] head: 0bfffe0000000040 ffff000802435cc0 dead000000000122 0000000000000000 [ 50.566536] head: 0000000000000000 00000000801f001f 00000000f5000000 0000000000000000 [ 50.574349] head: 0bfffe0000000001 fffffdffe0091581 00000000ffffffff 00000000ffffffff [ 50.582161] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 50.589968] page dumped because: kasan: bad access detected [ 50.595522] [ 50.596997] Memory state around the buggy address: [ 50.601778] ffff000802455f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.608982] ffff000802456000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 50.616185] >ffff000802456080: 00 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc [ 50.623386] ^ [ 50.628947] ffff000802456100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.636151] ffff000802456180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.643351] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-workqueue_uaf
[ 50.005093] ================================================================== [ 50.012380] BUG: KASAN: slab-use-after-free in workqueue_uaf+0x480/0x4a8 [ 50.019058] Read of size 8 at addr ffff000808530100 by task kunit_try_catch/281 [ 50.026347] [ 50.027834] CPU: 3 UID: 0 PID: 281 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 50.027898] Tainted: [B]=BAD_PAGE, [N]=TEST [ 50.027915] Hardware name: WinLink E850-96 board (DT) [ 50.027937] Call trace: [ 50.027954] show_stack+0x20/0x38 (C) [ 50.027989] dump_stack_lvl+0x8c/0xd0 [ 50.028025] print_report+0x118/0x5d0 [ 50.028052] kasan_report+0xdc/0x128 [ 50.028078] __asan_report_load8_noabort+0x20/0x30 [ 50.028112] workqueue_uaf+0x480/0x4a8 [ 50.028142] kunit_try_run_case+0x170/0x3f0 [ 50.028174] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.028212] kthread+0x328/0x630 [ 50.028242] ret_from_fork+0x10/0x20 [ 50.028274] [ 50.091453] Allocated by task 281: [ 50.094839] kasan_save_stack+0x3c/0x68 [ 50.098655] kasan_save_track+0x20/0x40 [ 50.102476] kasan_save_alloc_info+0x40/0x58 [ 50.106728] __kasan_kmalloc+0xd4/0xd8 [ 50.110460] __kmalloc_cache_noprof+0x16c/0x3c0 [ 50.114974] workqueue_uaf+0x13c/0x4a8 [ 50.118706] kunit_try_run_case+0x170/0x3f0 [ 50.122873] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.128342] kthread+0x328/0x630 [ 50.131553] ret_from_fork+0x10/0x20 [ 50.135112] [ 50.136589] Freed by task 9: [ 50.139456] kasan_save_stack+0x3c/0x68 [ 50.143272] kasan_save_track+0x20/0x40 [ 50.147092] kasan_save_free_info+0x4c/0x78 [ 50.151258] __kasan_slab_free+0x6c/0x98 [ 50.155165] kfree+0x214/0x3c8 [ 50.158203] workqueue_uaf_work+0x18/0x30 [ 50.162195] process_one_work+0x530/0xf98 [ 50.166189] worker_thread+0x618/0xf38 [ 50.169921] kthread+0x328/0x630 [ 50.173133] ret_from_fork+0x10/0x20 [ 50.176691] [ 50.178169] Last potentially related work creation: [ 50.183031] kasan_save_stack+0x3c/0x68 [ 50.186848] kasan_record_aux_stack+0xb4/0xc8 [ 50.191188] __queue_work+0x65c/0xfe0 [ 50.194833] queue_work_on+0xbc/0xf8 [ 50.198393] workqueue_uaf+0x210/0x4a8 [ 50.202126] kunit_try_run_case+0x170/0x3f0 [ 50.206292] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 50.211761] kthread+0x328/0x630 [ 50.214972] ret_from_fork+0x10/0x20 [ 50.218531] [ 50.220007] The buggy address belongs to the object at ffff000808530100 [ 50.220007] which belongs to the cache kmalloc-32 of size 32 [ 50.232337] The buggy address is located 0 bytes inside of [ 50.232337] freed 32-byte region [ffff000808530100, ffff000808530120) [ 50.244312] [ 50.245792] The buggy address belongs to the physical page: [ 50.251348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888530 [ 50.259332] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 50.265841] page_type: f5(slab) [ 50.268978] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 50.276696] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 50.284419] page dumped because: kasan: bad access detected [ 50.289971] [ 50.291446] Memory state around the buggy address: [ 50.296227] ffff000808530000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 50.303429] ffff000808530080: 00 00 00 fc fc fc fc fc 00 00 00 07 fc fc fc fc [ 50.310634] >ffff000808530100: fa fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 50.317835] ^ [ 50.321051] ffff000808530180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.328257] ffff000808530200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 50.335457] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-rcu_uaf_reclaim
[ 49.632706] ================================================================== [ 49.632875] BUG: KASAN: slab-use-after-free in rcu_uaf_reclaim+0x64/0x70 [ 49.632992] Read of size 4 at addr ffff000808530040 by task swapper/0/0 [ 49.634946] [ 49.636433] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 49.636486] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.636503] Hardware name: WinLink E850-96 board (DT) [ 49.636524] Call trace: [ 49.636539] show_stack+0x20/0x38 (C) [ 49.636575] dump_stack_lvl+0x8c/0xd0 [ 49.636609] print_report+0x118/0x5d0 [ 49.636639] kasan_report+0xdc/0x128 [ 49.636666] __asan_report_load4_noabort+0x20/0x30 [ 49.636698] rcu_uaf_reclaim+0x64/0x70 [ 49.636726] rcu_core+0x9f4/0x1e20 [ 49.636758] rcu_core_si+0x18/0x30 [ 49.636788] handle_softirqs+0x374/0xb28 [ 49.636822] __do_softirq+0x1c/0x28 [ 49.636850] ____do_softirq+0x18/0x30 [ 49.636882] call_on_irq_stack+0x24/0x30 [ 49.636909] do_softirq_own_stack+0x24/0x38 [ 49.636939] __irq_exit_rcu+0x1fc/0x318 [ 49.636968] irq_exit_rcu+0x1c/0x80 [ 49.636997] el1_interrupt+0x38/0x58 [ 49.637033] el1h_64_irq_handler+0x18/0x28 [ 49.637067] el1h_64_irq+0x6c/0x70 [ 49.637093] arch_local_irq_enable+0x4/0x8 (P) [ 49.637128] do_idle+0x384/0x4e8 [ 49.637158] cpu_startup_entry+0x64/0x80 [ 49.637189] rest_init+0x160/0x188 [ 49.637218] start_kernel+0x30c/0x3d0 [ 49.637251] __primary_switched+0x8c/0xa0 [ 49.637283] [ 49.749703] Allocated by task 279: [ 49.753091] kasan_save_stack+0x3c/0x68 [ 49.756906] kasan_save_track+0x20/0x40 [ 49.760726] kasan_save_alloc_info+0x40/0x58 [ 49.764979] __kasan_kmalloc+0xd4/0xd8 [ 49.768712] __kmalloc_cache_noprof+0x16c/0x3c0 [ 49.773226] rcu_uaf+0xb0/0x2d8 [ 49.776350] kunit_try_run_case+0x170/0x3f0 [ 49.780517] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.785986] kthread+0x328/0x630 [ 49.789197] ret_from_fork+0x10/0x20 [ 49.792757] [ 49.794233] Freed by task 0: [ 49.797097] kasan_save_stack+0x3c/0x68 [ 49.800916] kasan_save_track+0x20/0x40 [ 49.804736] kasan_save_free_info+0x4c/0x78 [ 49.808902] __kasan_slab_free+0x6c/0x98 [ 49.812808] kfree+0x214/0x3c8 [ 49.815847] rcu_uaf_reclaim+0x28/0x70 [ 49.819579] rcu_core+0x9f4/0x1e20 [ 49.822965] rcu_core_si+0x18/0x30 [ 49.826351] handle_softirqs+0x374/0xb28 [ 49.830256] __do_softirq+0x1c/0x28 [ 49.833728] [ 49.835204] Last potentially related work creation: [ 49.840064] kasan_save_stack+0x3c/0x68 [ 49.843884] kasan_record_aux_stack+0xb4/0xc8 [ 49.848225] __call_rcu_common.constprop.0+0x74/0x8c8 [ 49.853259] call_rcu+0x18/0x30 [ 49.856384] rcu_uaf+0x14c/0x2d8 [ 49.859596] kunit_try_run_case+0x170/0x3f0 [ 49.863763] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.869231] kthread+0x328/0x630 [ 49.872443] ret_from_fork+0x10/0x20 [ 49.876002] [ 49.877479] The buggy address belongs to the object at ffff000808530040 [ 49.877479] which belongs to the cache kmalloc-32 of size 32 [ 49.889806] The buggy address is located 0 bytes inside of [ 49.889806] freed 32-byte region [ffff000808530040, ffff000808530060) [ 49.901783] [ 49.903261] The buggy address belongs to the physical page: [ 49.908819] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888530 [ 49.916803] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 49.923312] page_type: f5(slab) [ 49.926450] raw: 0bfffe0000000000 ffff000800002780 dead000000000122 0000000000000000 [ 49.934167] raw: 0000000000000000 0000000080400040 00000000f5000000 0000000000000000 [ 49.941889] page dumped because: kasan: bad access detected [ 49.947441] [ 49.948917] Memory state around the buggy address: [ 49.953700] ffff00080852ff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 49.960900] ffff00080852ff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 49.968105] >ffff000808530000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 49.975306] ^ [ 49.980605] ffff000808530080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.987809] ffff000808530100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.995012] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-ksize_uaf
[ 48.595577] ================================================================== [ 48.605627] BUG: KASAN: slab-use-after-free in ksize_uaf+0x168/0x5f8 [ 48.611962] Read of size 1 at addr ffff00080244dc00 by task kunit_try_catch/277 [ 48.619250] [ 48.620736] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 48.620790] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.620806] Hardware name: WinLink E850-96 board (DT) [ 48.620826] Call trace: [ 48.620842] show_stack+0x20/0x38 (C) [ 48.620875] dump_stack_lvl+0x8c/0xd0 [ 48.620911] print_report+0x118/0x5d0 [ 48.620941] kasan_report+0xdc/0x128 [ 48.620967] __kasan_check_byte+0x54/0x70 [ 48.620995] ksize+0x30/0x88 [ 48.621030] ksize_uaf+0x168/0x5f8 [ 48.621058] kunit_try_run_case+0x170/0x3f0 [ 48.621087] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.621122] kthread+0x328/0x630 [ 48.621151] ret_from_fork+0x10/0x20 [ 48.621182] [ 48.686091] Allocated by task 277: [ 48.689478] kasan_save_stack+0x3c/0x68 [ 48.693294] kasan_save_track+0x20/0x40 [ 48.697113] kasan_save_alloc_info+0x40/0x58 [ 48.701367] __kasan_kmalloc+0xd4/0xd8 [ 48.705099] __kmalloc_cache_noprof+0x16c/0x3c0 [ 48.709613] ksize_uaf+0xb8/0x5f8 [ 48.712912] kunit_try_run_case+0x170/0x3f0 [ 48.717078] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.722548] kthread+0x328/0x630 [ 48.725759] ret_from_fork+0x10/0x20 [ 48.729318] [ 48.730793] Freed by task 277: [ 48.733833] kasan_save_stack+0x3c/0x68 [ 48.737651] kasan_save_track+0x20/0x40 [ 48.741470] kasan_save_free_info+0x4c/0x78 [ 48.745637] __kasan_slab_free+0x6c/0x98 [ 48.749543] kfree+0x214/0x3c8 [ 48.752581] ksize_uaf+0x11c/0x5f8 [ 48.755967] kunit_try_run_case+0x170/0x3f0 [ 48.760133] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.765602] kthread+0x328/0x630 [ 48.768814] ret_from_fork+0x10/0x20 [ 48.772373] [ 48.773850] The buggy address belongs to the object at ffff00080244dc00 [ 48.773850] which belongs to the cache kmalloc-128 of size 128 [ 48.786348] The buggy address is located 0 bytes inside of [ 48.786348] freed 128-byte region [ffff00080244dc00, ffff00080244dc80) [ 48.798414] [ 48.799894] The buggy address belongs to the physical page: [ 48.805449] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88244c [ 48.813433] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 48.821073] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 48.828016] page_type: f5(slab) [ 48.831153] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 48.838872] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.846599] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 48.854410] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.862222] head: 0bfffe0000000001 fffffdffe0091301 00000000ffffffff 00000000ffffffff [ 48.870034] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 48.877842] page dumped because: kasan: bad access detected [ 48.883395] [ 48.884871] Memory state around the buggy address: [ 48.889654] ffff00080244db00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 48.896855] ffff00080244db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.904058] >ffff00080244dc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 48.911259] ^ [ 48.914475] ffff00080244dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.921679] ffff00080244dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.928882] ================================================================== [ 49.271892] ================================================================== [ 49.278880] BUG: KASAN: slab-use-after-free in ksize_uaf+0x544/0x5f8 [ 49.285215] Read of size 1 at addr ffff00080244dc78 by task kunit_try_catch/277 [ 49.292504] [ 49.293989] CPU: 6 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 49.294042] Tainted: [B]=BAD_PAGE, [N]=TEST [ 49.294057] Hardware name: WinLink E850-96 board (DT) [ 49.294081] Call trace: [ 49.294095] show_stack+0x20/0x38 (C) [ 49.294128] dump_stack_lvl+0x8c/0xd0 [ 49.294165] print_report+0x118/0x5d0 [ 49.294193] kasan_report+0xdc/0x128 [ 49.294220] __asan_report_load1_noabort+0x20/0x30 [ 49.294254] ksize_uaf+0x544/0x5f8 [ 49.294283] kunit_try_run_case+0x170/0x3f0 [ 49.294316] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.294351] kthread+0x328/0x630 [ 49.294378] ret_from_fork+0x10/0x20 [ 49.294410] [ 49.357261] Allocated by task 277: [ 49.360648] kasan_save_stack+0x3c/0x68 [ 49.364464] kasan_save_track+0x20/0x40 [ 49.368284] kasan_save_alloc_info+0x40/0x58 [ 49.372537] __kasan_kmalloc+0xd4/0xd8 [ 49.376269] __kmalloc_cache_noprof+0x16c/0x3c0 [ 49.380784] ksize_uaf+0xb8/0x5f8 [ 49.384082] kunit_try_run_case+0x170/0x3f0 [ 49.388249] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.393718] kthread+0x328/0x630 [ 49.396930] ret_from_fork+0x10/0x20 [ 49.400488] [ 49.401964] Freed by task 277: [ 49.405002] kasan_save_stack+0x3c/0x68 [ 49.408822] kasan_save_track+0x20/0x40 [ 49.412641] kasan_save_free_info+0x4c/0x78 [ 49.416808] __kasan_slab_free+0x6c/0x98 [ 49.420714] kfree+0x214/0x3c8 [ 49.423752] ksize_uaf+0x11c/0x5f8 [ 49.427137] kunit_try_run_case+0x170/0x3f0 [ 49.431304] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.436772] kthread+0x328/0x630 [ 49.439984] ret_from_fork+0x10/0x20 [ 49.443543] [ 49.445019] The buggy address belongs to the object at ffff00080244dc00 [ 49.445019] which belongs to the cache kmalloc-128 of size 128 [ 49.457520] The buggy address is located 120 bytes inside of [ 49.457520] freed 128-byte region [ffff00080244dc00, ffff00080244dc80) [ 49.469758] [ 49.471236] The buggy address belongs to the physical page: [ 49.476795] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88244c [ 49.484778] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 49.492416] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 49.499359] page_type: f5(slab) [ 49.502494] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 49.510215] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.517942] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 49.525753] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.533566] head: 0bfffe0000000001 fffffdffe0091301 00000000ffffffff 00000000ffffffff [ 49.541378] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 49.549184] page dumped because: kasan: bad access detected [ 49.554739] [ 49.556215] Memory state around the buggy address: [ 49.560994] ffff00080244db00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 49.568198] ffff00080244db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.575404] >ffff00080244dc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 49.582604] ^ [ 49.589725] ffff00080244dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.596930] ffff00080244dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.604131] ================================================================== [ 48.936266] ================================================================== [ 48.943294] BUG: KASAN: slab-use-after-free in ksize_uaf+0x598/0x5f8 [ 48.949629] Read of size 1 at addr ffff00080244dc00 by task kunit_try_catch/277 [ 48.956918] [ 48.958403] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 48.958456] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.958473] Hardware name: WinLink E850-96 board (DT) [ 48.958493] Call trace: [ 48.958507] show_stack+0x20/0x38 (C) [ 48.958538] dump_stack_lvl+0x8c/0xd0 [ 48.958572] print_report+0x118/0x5d0 [ 48.958599] kasan_report+0xdc/0x128 [ 48.958626] __asan_report_load1_noabort+0x20/0x30 [ 48.958657] ksize_uaf+0x598/0x5f8 [ 48.958687] kunit_try_run_case+0x170/0x3f0 [ 48.958717] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.958753] kthread+0x328/0x630 [ 48.958779] ret_from_fork+0x10/0x20 [ 48.958807] [ 49.021674] Allocated by task 277: [ 49.025061] kasan_save_stack+0x3c/0x68 [ 49.028879] kasan_save_track+0x20/0x40 [ 49.032698] kasan_save_alloc_info+0x40/0x58 [ 49.036952] __kasan_kmalloc+0xd4/0xd8 [ 49.040684] __kmalloc_cache_noprof+0x16c/0x3c0 [ 49.045199] ksize_uaf+0xb8/0x5f8 [ 49.048497] kunit_try_run_case+0x170/0x3f0 [ 49.052663] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.058134] kthread+0x328/0x630 [ 49.061344] ret_from_fork+0x10/0x20 [ 49.064903] [ 49.066379] Freed by task 277: [ 49.069417] kasan_save_stack+0x3c/0x68 [ 49.073236] kasan_save_track+0x20/0x40 [ 49.077055] kasan_save_free_info+0x4c/0x78 [ 49.081222] __kasan_slab_free+0x6c/0x98 [ 49.085128] kfree+0x214/0x3c8 [ 49.088167] ksize_uaf+0x11c/0x5f8 [ 49.091552] kunit_try_run_case+0x170/0x3f0 [ 49.095718] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 49.101187] kthread+0x328/0x630 [ 49.104399] ret_from_fork+0x10/0x20 [ 49.107958] [ 49.109433] The buggy address belongs to the object at ffff00080244dc00 [ 49.109433] which belongs to the cache kmalloc-128 of size 128 [ 49.121934] The buggy address is located 0 bytes inside of [ 49.121934] freed 128-byte region [ffff00080244dc00, ffff00080244dc80) [ 49.133999] [ 49.135477] The buggy address belongs to the physical page: [ 49.141035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88244c [ 49.149018] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 49.156658] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 49.163600] page_type: f5(slab) [ 49.166735] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 49.174457] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.182183] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 49.189994] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 49.197808] head: 0bfffe0000000001 fffffdffe0091301 00000000ffffffff 00000000ffffffff [ 49.205620] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 49.213425] page dumped because: kasan: bad access detected [ 49.218981] [ 49.220456] Memory state around the buggy address: [ 49.225237] ffff00080244db00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 49.232439] ffff00080244db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.239643] >ffff00080244dc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 49.246845] ^ [ 49.250060] ffff00080244dc80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.257265] ffff00080244dd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 49.264468] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-ksize_unpoisons_memory
[ 48.293796] ================================================================== [ 48.300682] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 48.308057] Read of size 1 at addr ffff00080244db7f by task kunit_try_catch/275 [ 48.315348] [ 48.316834] CPU: 3 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 48.316890] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.316908] Hardware name: WinLink E850-96 board (DT) [ 48.316927] Call trace: [ 48.316939] show_stack+0x20/0x38 (C) [ 48.316974] dump_stack_lvl+0x8c/0xd0 [ 48.317008] print_report+0x118/0x5d0 [ 48.317035] kasan_report+0xdc/0x128 [ 48.317060] __asan_report_load1_noabort+0x20/0x30 [ 48.317090] ksize_unpoisons_memory+0x690/0x740 [ 48.317123] kunit_try_run_case+0x170/0x3f0 [ 48.317152] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.317185] kthread+0x328/0x630 [ 48.317211] ret_from_fork+0x10/0x20 [ 48.317242] [ 48.381234] Allocated by task 275: [ 48.384620] kasan_save_stack+0x3c/0x68 [ 48.388437] kasan_save_track+0x20/0x40 [ 48.392257] kasan_save_alloc_info+0x40/0x58 [ 48.396510] __kasan_kmalloc+0xd4/0xd8 [ 48.400244] __kmalloc_cache_noprof+0x16c/0x3c0 [ 48.404757] ksize_unpoisons_memory+0xc0/0x740 [ 48.409183] kunit_try_run_case+0x170/0x3f0 [ 48.413350] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.418819] kthread+0x328/0x630 [ 48.422031] ret_from_fork+0x10/0x20 [ 48.425591] [ 48.427066] The buggy address belongs to the object at ffff00080244db00 [ 48.427066] which belongs to the cache kmalloc-128 of size 128 [ 48.439568] The buggy address is located 12 bytes to the right of [ 48.439568] allocated 115-byte region [ffff00080244db00, ffff00080244db73) [ 48.452586] [ 48.454064] The buggy address belongs to the physical page: [ 48.459622] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88244c [ 48.467605] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 48.475245] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 48.482186] page_type: f5(slab) [ 48.485324] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 48.493043] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.500770] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 48.508581] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.516394] head: 0bfffe0000000001 fffffdffe0091301 00000000ffffffff 00000000ffffffff [ 48.524206] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 48.532013] page dumped because: kasan: bad access detected [ 48.537567] [ 48.539043] Memory state around the buggy address: [ 48.543824] ffff00080244da00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 48.551026] ffff00080244da80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.558230] >ffff00080244db00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 48.565431] ^ [ 48.572553] ffff00080244db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.579758] ffff00080244dc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.586959] ================================================================== [ 47.993134] ================================================================== [ 48.000083] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 48.007457] Read of size 1 at addr ffff00080244db78 by task kunit_try_catch/275 [ 48.014747] [ 48.016232] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 48.016285] Tainted: [B]=BAD_PAGE, [N]=TEST [ 48.016304] Hardware name: WinLink E850-96 board (DT) [ 48.016325] Call trace: [ 48.016337] show_stack+0x20/0x38 (C) [ 48.016368] dump_stack_lvl+0x8c/0xd0 [ 48.016404] print_report+0x118/0x5d0 [ 48.016431] kasan_report+0xdc/0x128 [ 48.016458] __asan_report_load1_noabort+0x20/0x30 [ 48.016489] ksize_unpoisons_memory+0x618/0x740 [ 48.016521] kunit_try_run_case+0x170/0x3f0 [ 48.016553] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.016585] kthread+0x328/0x630 [ 48.016615] ret_from_fork+0x10/0x20 [ 48.016649] [ 48.080631] Allocated by task 275: [ 48.084018] kasan_save_stack+0x3c/0x68 [ 48.087835] kasan_save_track+0x20/0x40 [ 48.091654] kasan_save_alloc_info+0x40/0x58 [ 48.095907] __kasan_kmalloc+0xd4/0xd8 [ 48.099640] __kmalloc_cache_noprof+0x16c/0x3c0 [ 48.104154] ksize_unpoisons_memory+0xc0/0x740 [ 48.108581] kunit_try_run_case+0x170/0x3f0 [ 48.112747] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 48.118216] kthread+0x328/0x630 [ 48.121428] ret_from_fork+0x10/0x20 [ 48.124986] [ 48.126465] The buggy address belongs to the object at ffff00080244db00 [ 48.126465] which belongs to the cache kmalloc-128 of size 128 [ 48.138965] The buggy address is located 5 bytes to the right of [ 48.138965] allocated 115-byte region [ffff00080244db00, ffff00080244db73) [ 48.151896] [ 48.153374] The buggy address belongs to the physical page: [ 48.158932] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88244c [ 48.166915] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 48.174555] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 48.181496] page_type: f5(slab) [ 48.184633] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 48.192353] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.200080] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 48.207891] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 48.215704] head: 0bfffe0000000001 fffffdffe0091301 00000000ffffffff 00000000ffffffff [ 48.223516] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 48.231323] page dumped because: kasan: bad access detected [ 48.236877] [ 48.238354] Memory state around the buggy address: [ 48.243132] ffff00080244da00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 48.250336] ffff00080244da80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.257540] >ffff00080244db00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 48.264741] ^ [ 48.271863] ffff00080244db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.279068] ffff00080244dc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 48.286270] ================================================================== [ 47.690046] ================================================================== [ 47.699739] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 47.707112] Read of size 1 at addr ffff00080244db73 by task kunit_try_catch/275 [ 47.714404] [ 47.715890] CPU: 0 UID: 0 PID: 275 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 47.715947] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.715966] Hardware name: WinLink E850-96 board (DT) [ 47.715988] Call trace: [ 47.716001] show_stack+0x20/0x38 (C) [ 47.716036] dump_stack_lvl+0x8c/0xd0 [ 47.716074] print_report+0x118/0x5d0 [ 47.716100] kasan_report+0xdc/0x128 [ 47.716126] __asan_report_load1_noabort+0x20/0x30 [ 47.716160] ksize_unpoisons_memory+0x628/0x740 [ 47.716194] kunit_try_run_case+0x170/0x3f0 [ 47.716224] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.716261] kthread+0x328/0x630 [ 47.716290] ret_from_fork+0x10/0x20 [ 47.716325] [ 47.780288] Allocated by task 275: [ 47.783676] kasan_save_stack+0x3c/0x68 [ 47.787492] kasan_save_track+0x20/0x40 [ 47.791311] kasan_save_alloc_info+0x40/0x58 [ 47.795564] __kasan_kmalloc+0xd4/0xd8 [ 47.799298] __kmalloc_cache_noprof+0x16c/0x3c0 [ 47.803811] ksize_unpoisons_memory+0xc0/0x740 [ 47.808238] kunit_try_run_case+0x170/0x3f0 [ 47.812404] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.817873] kthread+0x328/0x630 [ 47.821086] ret_from_fork+0x10/0x20 [ 47.824644] [ 47.826121] The buggy address belongs to the object at ffff00080244db00 [ 47.826121] which belongs to the cache kmalloc-128 of size 128 [ 47.838623] The buggy address is located 0 bytes to the right of [ 47.838623] allocated 115-byte region [ffff00080244db00, ffff00080244db73) [ 47.851553] [ 47.853033] The buggy address belongs to the physical page: [ 47.858590] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88244c [ 47.866572] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 47.874212] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 47.881155] page_type: f5(slab) [ 47.884291] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 47.892011] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.899739] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 47.907548] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 47.915361] head: 0bfffe0000000001 fffffdffe0091301 00000000ffffffff 00000000ffffffff [ 47.923173] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 47.930981] page dumped because: kasan: bad access detected [ 47.936534] [ 47.938010] Memory state around the buggy address: [ 47.942792] ffff00080244da00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 47.949995] ffff00080244da80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.957199] >ffff00080244db00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 47.964399] ^ [ 47.971260] ffff00080244db80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.978466] ffff00080244dc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.985667] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-double-free-in-kfree_sensitive
[ 47.373723] ================================================================== [ 47.380817] BUG: KASAN: double-free in kfree_sensitive+0x3c/0xb0 [ 47.386804] Free of addr ffff000806c788c0 by task kunit_try_catch/273 [ 47.393227] [ 47.394710] CPU: 5 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 47.394762] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.394779] Hardware name: WinLink E850-96 board (DT) [ 47.394796] Call trace: [ 47.394809] show_stack+0x20/0x38 (C) [ 47.394840] dump_stack_lvl+0x8c/0xd0 [ 47.394875] print_report+0x118/0x5d0 [ 47.394902] kasan_report_invalid_free+0xc0/0xe8 [ 47.394932] check_slab_allocation+0xd4/0x108 [ 47.394968] __kasan_slab_pre_free+0x2c/0x48 [ 47.395001] kfree+0xe8/0x3c8 [ 47.395030] kfree_sensitive+0x3c/0xb0 [ 47.395060] kmalloc_double_kzfree+0x168/0x308 [ 47.395095] kunit_try_run_case+0x170/0x3f0 [ 47.395123] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.395158] kthread+0x328/0x630 [ 47.395186] ret_from_fork+0x10/0x20 [ 47.395215] [ 47.470569] Allocated by task 273: [ 47.473955] kasan_save_stack+0x3c/0x68 [ 47.477774] kasan_save_track+0x20/0x40 [ 47.481594] kasan_save_alloc_info+0x40/0x58 [ 47.485847] __kasan_kmalloc+0xd4/0xd8 [ 47.489579] __kmalloc_cache_noprof+0x16c/0x3c0 [ 47.494093] kmalloc_double_kzfree+0xb8/0x308 [ 47.498433] kunit_try_run_case+0x170/0x3f0 [ 47.502600] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.508069] kthread+0x328/0x630 [ 47.511280] ret_from_fork+0x10/0x20 [ 47.514840] [ 47.516315] Freed by task 273: [ 47.519353] kasan_save_stack+0x3c/0x68 [ 47.523173] kasan_save_track+0x20/0x40 [ 47.526992] kasan_save_free_info+0x4c/0x78 [ 47.531159] __kasan_slab_free+0x6c/0x98 [ 47.535065] kfree+0x214/0x3c8 [ 47.538103] kfree_sensitive+0x80/0xb0 [ 47.541835] kmalloc_double_kzfree+0x11c/0x308 [ 47.546263] kunit_try_run_case+0x170/0x3f0 [ 47.550429] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.555898] kthread+0x328/0x630 [ 47.559110] ret_from_fork+0x10/0x20 [ 47.562669] [ 47.564144] The buggy address belongs to the object at ffff000806c788c0 [ 47.564144] which belongs to the cache kmalloc-16 of size 16 [ 47.576471] The buggy address is located 0 bytes inside of [ 47.576471] 16-byte region [ffff000806c788c0, ffff000806c788d0) [ 47.587928] [ 47.589406] The buggy address belongs to the physical page: [ 47.594963] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886c78 [ 47.602946] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.609456] page_type: f5(slab) [ 47.612591] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 47.620313] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 47.628032] page dumped because: kasan: bad access detected [ 47.633588] [ 47.635063] Memory state around the buggy address: [ 47.639842] ffff000806c78780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 47.647046] ffff000806c78800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 47.654251] >ffff000806c78880: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc [ 47.661452] ^ [ 47.666751] ffff000806c78900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.673955] ffff000806c78980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.681156] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_double_kzfree
[ 47.058133] ================================================================== [ 47.071883] BUG: KASAN: slab-use-after-free in kmalloc_double_kzfree+0x168/0x308 [ 47.079259] Read of size 1 at addr ffff000806c788c0 by task kunit_try_catch/273 [ 47.086547] [ 47.088033] CPU: 5 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 47.088090] Tainted: [B]=BAD_PAGE, [N]=TEST [ 47.088108] Hardware name: WinLink E850-96 board (DT) [ 47.088133] Call trace: [ 47.088149] show_stack+0x20/0x38 (C) [ 47.088183] dump_stack_lvl+0x8c/0xd0 [ 47.088217] print_report+0x118/0x5d0 [ 47.088246] kasan_report+0xdc/0x128 [ 47.088273] __kasan_check_byte+0x54/0x70 [ 47.088302] kfree_sensitive+0x30/0xb0 [ 47.088336] kmalloc_double_kzfree+0x168/0x308 [ 47.088369] kunit_try_run_case+0x170/0x3f0 [ 47.088398] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.088437] kthread+0x328/0x630 [ 47.088464] ret_from_fork+0x10/0x20 [ 47.088498] [ 47.155298] Allocated by task 273: [ 47.158685] kasan_save_stack+0x3c/0x68 [ 47.162501] kasan_save_track+0x20/0x40 [ 47.166322] kasan_save_alloc_info+0x40/0x58 [ 47.170574] __kasan_kmalloc+0xd4/0xd8 [ 47.174306] __kmalloc_cache_noprof+0x16c/0x3c0 [ 47.178820] kmalloc_double_kzfree+0xb8/0x308 [ 47.183162] kunit_try_run_case+0x170/0x3f0 [ 47.187328] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.192796] kthread+0x328/0x630 [ 47.196008] ret_from_fork+0x10/0x20 [ 47.199566] [ 47.201043] Freed by task 273: [ 47.204080] kasan_save_stack+0x3c/0x68 [ 47.207900] kasan_save_track+0x20/0x40 [ 47.211719] kasan_save_free_info+0x4c/0x78 [ 47.215886] __kasan_slab_free+0x6c/0x98 [ 47.219793] kfree+0x214/0x3c8 [ 47.222830] kfree_sensitive+0x80/0xb0 [ 47.226563] kmalloc_double_kzfree+0x11c/0x308 [ 47.230990] kunit_try_run_case+0x170/0x3f0 [ 47.235156] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 47.240625] kthread+0x328/0x630 [ 47.243836] ret_from_fork+0x10/0x20 [ 47.247395] [ 47.248873] The buggy address belongs to the object at ffff000806c788c0 [ 47.248873] which belongs to the cache kmalloc-16 of size 16 [ 47.261201] The buggy address is located 0 bytes inside of [ 47.261201] freed 16-byte region [ffff000806c788c0, ffff000806c788d0) [ 47.273176] [ 47.274654] The buggy address belongs to the physical page: [ 47.280213] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x886c78 [ 47.288196] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 47.294707] page_type: f5(slab) [ 47.297843] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 47.305561] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 47.313283] page dumped because: kasan: bad access detected [ 47.318835] [ 47.320311] Memory state around the buggy address: [ 47.325091] ffff000806c78780: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 47.332294] ffff000806c78800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 47.339498] >ffff000806c78880: fa fb fc fc fa fb fc fc fa fb fc fc fc fc fc fc [ 47.346699] ^ [ 47.351998] ffff000806c78900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.359203] ffff000806c78980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.366404] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-invalid-free-in-kfree
[ 38.605328] ================================================================== [ 38.614542] BUG: KASAN: invalid-free in kfree+0x270/0x3c8 [ 38.619924] Free of addr ffff0008062c4001 by task kunit_try_catch/231 [ 38.626344] [ 38.627831] CPU: 2 UID: 0 PID: 231 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 38.627889] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.627904] Hardware name: WinLink E850-96 board (DT) [ 38.627928] Call trace: [ 38.627940] show_stack+0x20/0x38 (C) [ 38.627973] dump_stack_lvl+0x8c/0xd0 [ 38.628007] print_report+0x118/0x5d0 [ 38.628037] kasan_report_invalid_free+0xc0/0xe8 [ 38.628067] __kasan_kfree_large+0x5c/0xa8 [ 38.628096] free_large_kmalloc+0x68/0x150 [ 38.628127] kfree+0x270/0x3c8 [ 38.628154] kmalloc_large_invalid_free+0x108/0x270 [ 38.628186] kunit_try_run_case+0x170/0x3f0 [ 38.628217] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.628252] kthread+0x328/0x630 [ 38.628282] ret_from_fork+0x10/0x20 [ 38.628314] [ 38.700044] The buggy address belongs to the physical page: [ 38.705601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8862c4 [ 38.713585] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 38.721225] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 38.728167] page_type: f8(unknown) [ 38.731564] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 38.739283] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 38.747011] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 38.754821] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 38.762634] head: 0bfffe0000000002 fffffdffe018b101 00000000ffffffff 00000000ffffffff [ 38.770446] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 38.778253] page dumped because: kasan: bad access detected [ 38.783807] [ 38.785282] Memory state around the buggy address: [ 38.790063] ffff0008062c3f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.797266] ffff0008062c3f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.804472] >ffff0008062c4000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.811671] ^ [ 38.814887] ffff0008062c4080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.822092] ffff0008062c4100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.829293] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf2
[ 46.753329] ================================================================== [ 46.762858] BUG: KASAN: slab-use-after-free in kmalloc_uaf2+0x3f4/0x468 [ 46.769453] Read of size 1 at addr ffff000807fd0228 by task kunit_try_catch/269 [ 46.776744] [ 46.778230] CPU: 3 UID: 0 PID: 269 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 46.778283] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.778300] Hardware name: WinLink E850-96 board (DT) [ 46.778323] Call trace: [ 46.778337] show_stack+0x20/0x38 (C) [ 46.778371] dump_stack_lvl+0x8c/0xd0 [ 46.778404] print_report+0x118/0x5d0 [ 46.778435] kasan_report+0xdc/0x128 [ 46.778462] __asan_report_load1_noabort+0x20/0x30 [ 46.778495] kmalloc_uaf2+0x3f4/0x468 [ 46.778524] kunit_try_run_case+0x170/0x3f0 [ 46.778555] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.778590] kthread+0x328/0x630 [ 46.778620] ret_from_fork+0x10/0x20 [ 46.778654] [ 46.841762] Allocated by task 269: [ 46.845149] kasan_save_stack+0x3c/0x68 [ 46.848964] kasan_save_track+0x20/0x40 [ 46.852783] kasan_save_alloc_info+0x40/0x58 [ 46.857037] __kasan_kmalloc+0xd4/0xd8 [ 46.860769] __kmalloc_cache_noprof+0x16c/0x3c0 [ 46.865283] kmalloc_uaf2+0xc4/0x468 [ 46.868843] kunit_try_run_case+0x170/0x3f0 [ 46.873009] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.878477] kthread+0x328/0x630 [ 46.881689] ret_from_fork+0x10/0x20 [ 46.885248] [ 46.886724] Freed by task 269: [ 46.889764] kasan_save_stack+0x3c/0x68 [ 46.893581] kasan_save_track+0x20/0x40 [ 46.897401] kasan_save_free_info+0x4c/0x78 [ 46.901567] __kasan_slab_free+0x6c/0x98 [ 46.905475] kfree+0x214/0x3c8 [ 46.908511] kmalloc_uaf2+0x134/0x468 [ 46.912158] kunit_try_run_case+0x170/0x3f0 [ 46.916324] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.921793] kthread+0x328/0x630 [ 46.925005] ret_from_fork+0x10/0x20 [ 46.928563] [ 46.930041] The buggy address belongs to the object at ffff000807fd0200 [ 46.930041] which belongs to the cache kmalloc-64 of size 64 [ 46.942369] The buggy address is located 40 bytes inside of [ 46.942369] freed 64-byte region [ffff000807fd0200, ffff000807fd0240) [ 46.954431] [ 46.955911] The buggy address belongs to the physical page: [ 46.961466] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x887fd0 [ 46.969450] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.975961] page_type: f5(slab) [ 46.979097] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 46.986816] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 46.994537] page dumped because: kasan: bad access detected [ 47.000090] [ 47.001566] Memory state around the buggy address: [ 47.006348] ffff000807fd0100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.013550] ffff000807fd0180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.020753] >ffff000807fd0200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 47.027954] ^ [ 47.032472] ffff000807fd0280: 00 00 00 00 00 03 fc fc fc fc fc fc fc fc fc fc [ 47.039677] ffff000807fd0300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 47.046879] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_memset
[ 46.447763] ================================================================== [ 46.456789] BUG: KASAN: slab-use-after-free in kmalloc_uaf_memset+0x170/0x310 [ 46.463903] Write of size 33 at addr ffff00080851b000 by task kunit_try_catch/267 [ 46.471367] [ 46.472852] CPU: 2 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 46.472907] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.472925] Hardware name: WinLink E850-96 board (DT) [ 46.472946] Call trace: [ 46.472959] show_stack+0x20/0x38 (C) [ 46.472992] dump_stack_lvl+0x8c/0xd0 [ 46.473027] print_report+0x118/0x5d0 [ 46.473058] kasan_report+0xdc/0x128 [ 46.473085] kasan_check_range+0x100/0x1a8 [ 46.473114] __asan_memset+0x34/0x78 [ 46.473142] kmalloc_uaf_memset+0x170/0x310 [ 46.473172] kunit_try_run_case+0x170/0x3f0 [ 46.473203] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.473237] kthread+0x328/0x630 [ 46.473270] ret_from_fork+0x10/0x20 [ 46.473302] [ 46.539768] Allocated by task 267: [ 46.543156] kasan_save_stack+0x3c/0x68 [ 46.546972] kasan_save_track+0x20/0x40 [ 46.550791] kasan_save_alloc_info+0x40/0x58 [ 46.555045] __kasan_kmalloc+0xd4/0xd8 [ 46.558777] __kmalloc_cache_noprof+0x16c/0x3c0 [ 46.563291] kmalloc_uaf_memset+0xb8/0x310 [ 46.567371] kunit_try_run_case+0x170/0x3f0 [ 46.571538] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.577006] kthread+0x328/0x630 [ 46.580218] ret_from_fork+0x10/0x20 [ 46.583777] [ 46.585252] Freed by task 267: [ 46.588292] kasan_save_stack+0x3c/0x68 [ 46.592110] kasan_save_track+0x20/0x40 [ 46.595930] kasan_save_free_info+0x4c/0x78 [ 46.600096] __kasan_slab_free+0x6c/0x98 [ 46.604003] kfree+0x214/0x3c8 [ 46.607040] kmalloc_uaf_memset+0x11c/0x310 [ 46.611207] kunit_try_run_case+0x170/0x3f0 [ 46.615374] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.620844] kthread+0x328/0x630 [ 46.624054] ret_from_fork+0x10/0x20 [ 46.627613] [ 46.629089] The buggy address belongs to the object at ffff00080851b000 [ 46.629089] which belongs to the cache kmalloc-64 of size 64 [ 46.641418] The buggy address is located 0 bytes inside of [ 46.641418] freed 64-byte region [ffff00080851b000, ffff00080851b040) [ 46.653394] [ 46.654873] The buggy address belongs to the physical page: [ 46.660429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88851b [ 46.668415] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.674923] page_type: f5(slab) [ 46.678060] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 46.685779] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 46.693501] page dumped because: kasan: bad access detected [ 46.699054] [ 46.700528] Memory state around the buggy address: [ 46.705310] ffff00080851af00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 46.712513] ffff00080851af80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 46.719718] >ffff00080851b000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.726917] ^ [ 46.730133] ffff00080851b080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.737337] ffff00080851b100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.744540] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf
[ 46.145603] ================================================================== [ 46.155489] BUG: KASAN: slab-use-after-free in kmalloc_uaf+0x300/0x338 [ 46.161996] Read of size 1 at addr ffff000802754728 by task kunit_try_catch/265 [ 46.169287] [ 46.170774] CPU: 3 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 46.170827] Tainted: [B]=BAD_PAGE, [N]=TEST [ 46.170845] Hardware name: WinLink E850-96 board (DT) [ 46.170869] Call trace: [ 46.170884] show_stack+0x20/0x38 (C) [ 46.170920] dump_stack_lvl+0x8c/0xd0 [ 46.170957] print_report+0x118/0x5d0 [ 46.170986] kasan_report+0xdc/0x128 [ 46.171014] __asan_report_load1_noabort+0x20/0x30 [ 46.171046] kmalloc_uaf+0x300/0x338 [ 46.171076] kunit_try_run_case+0x170/0x3f0 [ 46.171107] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.171143] kthread+0x328/0x630 [ 46.171171] ret_from_fork+0x10/0x20 [ 46.171208] [ 46.234218] Allocated by task 265: [ 46.237606] kasan_save_stack+0x3c/0x68 [ 46.241421] kasan_save_track+0x20/0x40 [ 46.245242] kasan_save_alloc_info+0x40/0x58 [ 46.249494] __kasan_kmalloc+0xd4/0xd8 [ 46.253227] __kmalloc_cache_noprof+0x16c/0x3c0 [ 46.257740] kmalloc_uaf+0xb8/0x338 [ 46.261212] kunit_try_run_case+0x170/0x3f0 [ 46.265379] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.270848] kthread+0x328/0x630 [ 46.274059] ret_from_fork+0x10/0x20 [ 46.277618] [ 46.279095] Freed by task 265: [ 46.282132] kasan_save_stack+0x3c/0x68 [ 46.285952] kasan_save_track+0x20/0x40 [ 46.289771] kasan_save_free_info+0x4c/0x78 [ 46.293938] __kasan_slab_free+0x6c/0x98 [ 46.297844] kfree+0x214/0x3c8 [ 46.300882] kmalloc_uaf+0x11c/0x338 [ 46.304441] kunit_try_run_case+0x170/0x3f0 [ 46.308608] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.314076] kthread+0x328/0x630 [ 46.317288] ret_from_fork+0x10/0x20 [ 46.320847] [ 46.322326] The buggy address belongs to the object at ffff000802754720 [ 46.322326] which belongs to the cache kmalloc-16 of size 16 [ 46.334652] The buggy address is located 8 bytes inside of [ 46.334652] freed 16-byte region [ffff000802754720, ffff000802754730) [ 46.346628] [ 46.348106] The buggy address belongs to the physical page: [ 46.353663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882754 [ 46.361647] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.368156] page_type: f5(slab) [ 46.371293] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 46.379013] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 46.386734] page dumped because: kasan: bad access detected [ 46.392287] [ 46.393762] Memory state around the buggy address: [ 46.398543] ffff000802754600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 46.405745] ffff000802754680: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 46.412950] >ffff000802754700: fa fb fc fc fa fb fc fc fc fc fc fc fc fc fc fc [ 46.420151] ^ [ 46.424668] ffff000802754780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.431875] ffff000802754800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.439076] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_memmove_invalid_size
[ 45.877147] ================================================================== [ 45.887439] BUG: KASAN: slab-out-of-bounds in kmalloc_memmove_invalid_size+0x154/0x2e0 [ 45.895336] Read of size 64 at addr ffff000805d6fd84 by task kunit_try_catch/263 [ 45.902714] [ 45.904198] CPU: 0 UID: 0 PID: 263 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 45.904252] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.904269] Hardware name: WinLink E850-96 board (DT) [ 45.904291] Call trace: [ 45.904304] show_stack+0x20/0x38 (C) [ 45.904336] dump_stack_lvl+0x8c/0xd0 [ 45.904373] print_report+0x118/0x5d0 [ 45.904400] kasan_report+0xdc/0x128 [ 45.904426] kasan_check_range+0x100/0x1a8 [ 45.904456] __asan_memmove+0x3c/0x98 [ 45.904485] kmalloc_memmove_invalid_size+0x154/0x2e0 [ 45.904523] kunit_try_run_case+0x170/0x3f0 [ 45.904555] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.904591] kthread+0x328/0x630 [ 45.904620] ret_from_fork+0x10/0x20 [ 45.904656] [ 45.972068] Allocated by task 263: [ 45.975456] kasan_save_stack+0x3c/0x68 [ 45.979272] kasan_save_track+0x20/0x40 [ 45.983091] kasan_save_alloc_info+0x40/0x58 [ 45.987345] __kasan_kmalloc+0xd4/0xd8 [ 45.991078] __kmalloc_cache_noprof+0x16c/0x3c0 [ 45.995591] kmalloc_memmove_invalid_size+0xb0/0x2e0 [ 46.000539] kunit_try_run_case+0x170/0x3f0 [ 46.004706] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 46.010175] kthread+0x328/0x630 [ 46.013386] ret_from_fork+0x10/0x20 [ 46.016945] [ 46.018423] The buggy address belongs to the object at ffff000805d6fd80 [ 46.018423] which belongs to the cache kmalloc-64 of size 64 [ 46.030750] The buggy address is located 4 bytes inside of [ 46.030750] allocated 64-byte region [ffff000805d6fd80, ffff000805d6fdc0) [ 46.043073] [ 46.044553] The buggy address belongs to the physical page: [ 46.050109] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885d6f [ 46.058094] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 46.064602] page_type: f5(slab) [ 46.067738] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000 [ 46.075458] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 46.083178] page dumped because: kasan: bad access detected [ 46.088732] [ 46.090208] Memory state around the buggy address: [ 46.094991] ffff000805d6fc80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.102192] ffff000805d6fd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 46.109396] >ffff000805d6fd80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 46.116596] ^ [ 46.121897] ffff000805d6fe00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.129100] ffff000805d6fe80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 46.136302] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_16
[ 45.303861] ================================================================== [ 45.313664] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_16+0x150/0x2f8 [ 45.320951] Write of size 16 at addr ffff000801af8169 by task kunit_try_catch/259 [ 45.328415] [ 45.329901] CPU: 3 UID: 0 PID: 259 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 45.329958] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.329976] Hardware name: WinLink E850-96 board (DT) [ 45.329997] Call trace: [ 45.330009] show_stack+0x20/0x38 (C) [ 45.330043] dump_stack_lvl+0x8c/0xd0 [ 45.330078] print_report+0x118/0x5d0 [ 45.330107] kasan_report+0xdc/0x128 [ 45.330134] kasan_check_range+0x100/0x1a8 [ 45.330164] __asan_memset+0x34/0x78 [ 45.330193] kmalloc_oob_memset_16+0x150/0x2f8 [ 45.330225] kunit_try_run_case+0x170/0x3f0 [ 45.330255] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.330289] kthread+0x328/0x630 [ 45.330317] ret_from_fork+0x10/0x20 [ 45.330354] [ 45.397078] Allocated by task 259: [ 45.400465] kasan_save_stack+0x3c/0x68 [ 45.404281] kasan_save_track+0x20/0x40 [ 45.408100] kasan_save_alloc_info+0x40/0x58 [ 45.412354] __kasan_kmalloc+0xd4/0xd8 [ 45.416086] __kmalloc_cache_noprof+0x16c/0x3c0 [ 45.420600] kmalloc_oob_memset_16+0xb0/0x2f8 [ 45.424940] kunit_try_run_case+0x170/0x3f0 [ 45.429107] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.434576] kthread+0x328/0x630 [ 45.437788] ret_from_fork+0x10/0x20 [ 45.441346] [ 45.442825] The buggy address belongs to the object at ffff000801af8100 [ 45.442825] which belongs to the cache kmalloc-128 of size 128 [ 45.455324] The buggy address is located 105 bytes inside of [ 45.455324] allocated 120-byte region [ffff000801af8100, ffff000801af8178) [ 45.467910] [ 45.469387] The buggy address belongs to the physical page: [ 45.474944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881af8 [ 45.482928] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 45.490568] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 45.497510] page_type: f5(slab) [ 45.500648] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 45.508366] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 45.516094] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 45.523904] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 45.531717] head: 0bfffe0000000001 fffffdffe006be01 00000000ffffffff 00000000ffffffff [ 45.539528] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 45.547337] page dumped because: kasan: bad access detected [ 45.552889] [ 45.554365] Memory state around the buggy address: [ 45.559148] ffff000801af8000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 45.566348] ffff000801af8080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.573553] >ffff000801af8100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 45.580754] ^ [ 45.587875] ffff000801af8180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.595082] ffff000801af8200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.602283] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_8
[ 44.997342] ================================================================== [ 45.006897] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_8+0x150/0x2f8 [ 45.014099] Write of size 8 at addr ffff000801889f71 by task kunit_try_catch/257 [ 45.021474] [ 45.022961] CPU: 2 UID: 0 PID: 257 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 45.023016] Tainted: [B]=BAD_PAGE, [N]=TEST [ 45.023032] Hardware name: WinLink E850-96 board (DT) [ 45.023054] Call trace: [ 45.023068] show_stack+0x20/0x38 (C) [ 45.023101] dump_stack_lvl+0x8c/0xd0 [ 45.023135] print_report+0x118/0x5d0 [ 45.023164] kasan_report+0xdc/0x128 [ 45.023189] kasan_check_range+0x100/0x1a8 [ 45.023222] __asan_memset+0x34/0x78 [ 45.023250] kmalloc_oob_memset_8+0x150/0x2f8 [ 45.023280] kunit_try_run_case+0x170/0x3f0 [ 45.023311] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.023343] kthread+0x328/0x630 [ 45.023371] ret_from_fork+0x10/0x20 [ 45.023405] [ 45.090052] Allocated by task 257: [ 45.093438] kasan_save_stack+0x3c/0x68 [ 45.097254] kasan_save_track+0x20/0x40 [ 45.101075] kasan_save_alloc_info+0x40/0x58 [ 45.105327] __kasan_kmalloc+0xd4/0xd8 [ 45.109059] __kmalloc_cache_noprof+0x16c/0x3c0 [ 45.113573] kmalloc_oob_memset_8+0xb0/0x2f8 [ 45.117827] kunit_try_run_case+0x170/0x3f0 [ 45.121993] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 45.127462] kthread+0x328/0x630 [ 45.130674] ret_from_fork+0x10/0x20 [ 45.134233] [ 45.135710] The buggy address belongs to the object at ffff000801889f00 [ 45.135710] which belongs to the cache kmalloc-128 of size 128 [ 45.148211] The buggy address is located 113 bytes inside of [ 45.148211] allocated 120-byte region [ffff000801889f00, ffff000801889f78) [ 45.160795] [ 45.162273] The buggy address belongs to the physical page: [ 45.167832] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881888 [ 45.175814] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 45.183454] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 45.190397] page_type: f5(slab) [ 45.193534] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 45.201252] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 45.208980] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 45.216790] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 45.224603] head: 0bfffe0000000001 fffffdffe0062201 00000000ffffffff 00000000ffffffff [ 45.232415] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 45.240222] page dumped because: kasan: bad access detected [ 45.245776] [ 45.247252] Memory state around the buggy address: [ 45.252035] ffff000801889e00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 45.259235] ffff000801889e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.266439] >ffff000801889f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 45.273640] ^ [ 45.280762] ffff000801889f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 45.287968] ffff00080188a000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 45.295168] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_4
[ 44.690535] ================================================================== [ 44.700132] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_4+0x150/0x300 [ 44.707331] Write of size 4 at addr ffff000801889e75 by task kunit_try_catch/255 [ 44.714709] [ 44.716195] CPU: 2 UID: 0 PID: 255 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 44.716249] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.716266] Hardware name: WinLink E850-96 board (DT) [ 44.716285] Call trace: [ 44.716298] show_stack+0x20/0x38 (C) [ 44.716332] dump_stack_lvl+0x8c/0xd0 [ 44.716367] print_report+0x118/0x5d0 [ 44.716396] kasan_report+0xdc/0x128 [ 44.716423] kasan_check_range+0x100/0x1a8 [ 44.716452] __asan_memset+0x34/0x78 [ 44.716484] kmalloc_oob_memset_4+0x150/0x300 [ 44.716514] kunit_try_run_case+0x170/0x3f0 [ 44.716543] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.716577] kthread+0x328/0x630 [ 44.716606] ret_from_fork+0x10/0x20 [ 44.716638] [ 44.783286] Allocated by task 255: [ 44.786673] kasan_save_stack+0x3c/0x68 [ 44.790490] kasan_save_track+0x20/0x40 [ 44.794307] kasan_save_alloc_info+0x40/0x58 [ 44.798561] __kasan_kmalloc+0xd4/0xd8 [ 44.802293] __kmalloc_cache_noprof+0x16c/0x3c0 [ 44.806807] kmalloc_oob_memset_4+0xb0/0x300 [ 44.811062] kunit_try_run_case+0x170/0x3f0 [ 44.815227] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.820696] kthread+0x328/0x630 [ 44.823907] ret_from_fork+0x10/0x20 [ 44.827466] [ 44.828944] The buggy address belongs to the object at ffff000801889e00 [ 44.828944] which belongs to the cache kmalloc-128 of size 128 [ 44.841445] The buggy address is located 117 bytes inside of [ 44.841445] allocated 120-byte region [ffff000801889e00, ffff000801889e78) [ 44.854029] [ 44.855508] The buggy address belongs to the physical page: [ 44.861067] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881888 [ 44.869048] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 44.876686] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 44.883630] page_type: f5(slab) [ 44.886767] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 44.894486] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 44.902214] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 44.910024] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 44.917837] head: 0bfffe0000000001 fffffdffe0062201 00000000ffffffff 00000000ffffffff [ 44.925649] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 44.933454] page dumped because: kasan: bad access detected [ 44.939011] [ 44.940487] Memory state around the buggy address: [ 44.945267] ffff000801889d00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 44.952468] ffff000801889d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.959675] >ffff000801889e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 44.966874] ^ [ 44.973996] ffff000801889e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.981201] ffff000801889f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.988404] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_memset_2
[ 44.383695] ================================================================== [ 44.393363] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_memset_2+0x150/0x2f8 [ 44.400567] Write of size 2 at addr ffff000801af8077 by task kunit_try_catch/253 [ 44.407943] [ 44.409428] CPU: 3 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 44.409485] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.409502] Hardware name: WinLink E850-96 board (DT) [ 44.409525] Call trace: [ 44.409539] show_stack+0x20/0x38 (C) [ 44.409574] dump_stack_lvl+0x8c/0xd0 [ 44.409607] print_report+0x118/0x5d0 [ 44.409636] kasan_report+0xdc/0x128 [ 44.409660] kasan_check_range+0x100/0x1a8 [ 44.409686] __asan_memset+0x34/0x78 [ 44.409717] kmalloc_oob_memset_2+0x150/0x2f8 [ 44.409749] kunit_try_run_case+0x170/0x3f0 [ 44.409778] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.409815] kthread+0x328/0x630 [ 44.409842] ret_from_fork+0x10/0x20 [ 44.409876] [ 44.476518] Allocated by task 253: [ 44.479906] kasan_save_stack+0x3c/0x68 [ 44.483722] kasan_save_track+0x20/0x40 [ 44.487542] kasan_save_alloc_info+0x40/0x58 [ 44.491794] __kasan_kmalloc+0xd4/0xd8 [ 44.495527] __kmalloc_cache_noprof+0x16c/0x3c0 [ 44.500041] kmalloc_oob_memset_2+0xb0/0x2f8 [ 44.504294] kunit_try_run_case+0x170/0x3f0 [ 44.508461] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.513930] kthread+0x328/0x630 [ 44.517142] ret_from_fork+0x10/0x20 [ 44.520700] [ 44.522177] The buggy address belongs to the object at ffff000801af8000 [ 44.522177] which belongs to the cache kmalloc-128 of size 128 [ 44.534679] The buggy address is located 119 bytes inside of [ 44.534679] allocated 120-byte region [ffff000801af8000, ffff000801af8078) [ 44.547262] [ 44.548742] The buggy address belongs to the physical page: [ 44.554298] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881af8 [ 44.562281] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 44.569921] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 44.576864] page_type: f5(slab) [ 44.580003] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 44.587720] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 44.595448] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 44.603258] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 44.611071] head: 0bfffe0000000001 fffffdffe006be01 00000000ffffffff 00000000ffffffff [ 44.618882] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 44.626688] page dumped because: kasan: bad access detected [ 44.632243] [ 44.633719] Memory state around the buggy address: [ 44.638504] ffff000801af7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.645704] ffff000801af7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.652908] >ffff000801af8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 44.660108] ^ [ 44.667230] ffff000801af8080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.674434] ffff000801af8100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.681637] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_in_memset
[ 44.077211] ================================================================== [ 44.086249] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_in_memset+0x144/0x2d0 [ 44.093537] Write of size 128 at addr ffff00080244da00 by task kunit_try_catch/251 [ 44.101088] [ 44.102575] CPU: 0 UID: 0 PID: 251 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 44.102630] Tainted: [B]=BAD_PAGE, [N]=TEST [ 44.102645] Hardware name: WinLink E850-96 board (DT) [ 44.102668] Call trace: [ 44.102683] show_stack+0x20/0x38 (C) [ 44.102715] dump_stack_lvl+0x8c/0xd0 [ 44.102750] print_report+0x118/0x5d0 [ 44.102779] kasan_report+0xdc/0x128 [ 44.102804] kasan_check_range+0x100/0x1a8 [ 44.102832] __asan_memset+0x34/0x78 [ 44.102860] kmalloc_oob_in_memset+0x144/0x2d0 [ 44.102891] kunit_try_run_case+0x170/0x3f0 [ 44.102922] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.102955] kthread+0x328/0x630 [ 44.102981] ret_from_fork+0x10/0x20 [ 44.103012] [ 44.169750] Allocated by task 251: [ 44.173139] kasan_save_stack+0x3c/0x68 [ 44.176955] kasan_save_track+0x20/0x40 [ 44.180775] kasan_save_alloc_info+0x40/0x58 [ 44.185028] __kasan_kmalloc+0xd4/0xd8 [ 44.188761] __kmalloc_cache_noprof+0x16c/0x3c0 [ 44.193275] kmalloc_oob_in_memset+0xb0/0x2d0 [ 44.197616] kunit_try_run_case+0x170/0x3f0 [ 44.201781] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 44.207250] kthread+0x328/0x630 [ 44.210462] ret_from_fork+0x10/0x20 [ 44.214021] [ 44.215498] The buggy address belongs to the object at ffff00080244da00 [ 44.215498] which belongs to the cache kmalloc-128 of size 128 [ 44.227998] The buggy address is located 0 bytes inside of [ 44.227998] allocated 120-byte region [ffff00080244da00, ffff00080244da78) [ 44.240409] [ 44.241890] The buggy address belongs to the physical page: [ 44.247446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x88244c [ 44.255429] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 44.263068] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 44.270011] page_type: f5(slab) [ 44.273148] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 44.280867] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 44.288595] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 44.296405] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 44.304218] head: 0bfffe0000000001 fffffdffe0091301 00000000ffffffff 00000000ffffffff [ 44.312030] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 44.319835] page dumped because: kasan: bad access detected [ 44.325391] [ 44.326866] Memory state around the buggy address: [ 44.331648] ffff00080244d900: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 44.338849] ffff00080244d980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.346054] >ffff00080244da00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 44.353255] ^ [ 44.360376] ffff00080244da80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.367581] ffff00080244db00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.374784] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-kmalloc_uaf_16
[ 43.773501] ================================================================== [ 43.782609] BUG: KASAN: slab-use-after-free in kmalloc_uaf_16+0x3bc/0x438 [ 43.789376] Read of size 16 at addr ffff000802d259c0 by task kunit_try_catch/249 [ 43.796753] [ 43.798240] CPU: 2 UID: 0 PID: 249 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 43.798293] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.798308] Hardware name: WinLink E850-96 board (DT) [ 43.798329] Call trace: [ 43.798341] show_stack+0x20/0x38 (C) [ 43.798375] dump_stack_lvl+0x8c/0xd0 [ 43.798411] print_report+0x118/0x5d0 [ 43.798438] kasan_report+0xdc/0x128 [ 43.798464] __asan_report_load16_noabort+0x20/0x30 [ 43.798496] kmalloc_uaf_16+0x3bc/0x438 [ 43.798526] kunit_try_run_case+0x170/0x3f0 [ 43.798558] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.798592] kthread+0x328/0x630 [ 43.798618] ret_from_fork+0x10/0x20 [ 43.798651] [ 43.862031] Allocated by task 249: [ 43.865419] kasan_save_stack+0x3c/0x68 [ 43.869235] kasan_save_track+0x20/0x40 [ 43.873054] kasan_save_alloc_info+0x40/0x58 [ 43.877307] __kasan_kmalloc+0xd4/0xd8 [ 43.881040] __kmalloc_cache_noprof+0x16c/0x3c0 [ 43.885554] kmalloc_uaf_16+0x140/0x438 [ 43.889373] kunit_try_run_case+0x170/0x3f0 [ 43.893540] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.899010] kthread+0x328/0x630 [ 43.902220] ret_from_fork+0x10/0x20 [ 43.905779] [ 43.907255] Freed by task 249: [ 43.910294] kasan_save_stack+0x3c/0x68 [ 43.914112] kasan_save_track+0x20/0x40 [ 43.917933] kasan_save_free_info+0x4c/0x78 [ 43.922098] __kasan_slab_free+0x6c/0x98 [ 43.926004] kfree+0x214/0x3c8 [ 43.929042] kmalloc_uaf_16+0x190/0x438 [ 43.932862] kunit_try_run_case+0x170/0x3f0 [ 43.937029] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.942497] kthread+0x328/0x630 [ 43.945709] ret_from_fork+0x10/0x20 [ 43.949268] [ 43.950745] The buggy address belongs to the object at ffff000802d259c0 [ 43.950745] which belongs to the cache kmalloc-16 of size 16 [ 43.963073] The buggy address is located 0 bytes inside of [ 43.963073] freed 16-byte region [ffff000802d259c0, ffff000802d259d0) [ 43.975049] [ 43.976529] The buggy address belongs to the physical page: [ 43.982084] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882d25 [ 43.990069] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.996578] page_type: f5(slab) [ 43.999714] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 44.007434] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 44.015155] page dumped because: kasan: bad access detected [ 44.020707] [ 44.022183] Memory state around the buggy address: [ 44.026963] ffff000802d25880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 44.034166] ffff000802d25900: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 44.041373] >ffff000802d25980: fa fb fc fc 00 00 fc fc fa fb fc fc fc fc fc fc [ 44.048572] ^ [ 44.053872] ffff000802d25a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.061076] ffff000802d25a80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 44.068276] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_16
[ 43.511740] ================================================================== [ 43.520806] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_16+0x3a0/0x3f8 [ 43.527488] Write of size 16 at addr ffff000802d25960 by task kunit_try_catch/247 [ 43.534951] [ 43.536437] CPU: 2 UID: 0 PID: 247 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 43.536493] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.536508] Hardware name: WinLink E850-96 board (DT) [ 43.536529] Call trace: [ 43.536541] show_stack+0x20/0x38 (C) [ 43.536575] dump_stack_lvl+0x8c/0xd0 [ 43.536610] print_report+0x118/0x5d0 [ 43.536638] kasan_report+0xdc/0x128 [ 43.536662] __asan_report_store16_noabort+0x20/0x30 [ 43.536695] kmalloc_oob_16+0x3a0/0x3f8 [ 43.536725] kunit_try_run_case+0x170/0x3f0 [ 43.536755] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.536788] kthread+0x328/0x630 [ 43.536815] ret_from_fork+0x10/0x20 [ 43.536849] [ 43.600316] Allocated by task 247: [ 43.603704] kasan_save_stack+0x3c/0x68 [ 43.607520] kasan_save_track+0x20/0x40 [ 43.611339] kasan_save_alloc_info+0x40/0x58 [ 43.615593] __kasan_kmalloc+0xd4/0xd8 [ 43.619325] __kmalloc_cache_noprof+0x16c/0x3c0 [ 43.623839] kmalloc_oob_16+0xb4/0x3f8 [ 43.627571] kunit_try_run_case+0x170/0x3f0 [ 43.631738] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.637207] kthread+0x328/0x630 [ 43.640418] ret_from_fork+0x10/0x20 [ 43.643977] [ 43.645455] The buggy address belongs to the object at ffff000802d25960 [ 43.645455] which belongs to the cache kmalloc-16 of size 16 [ 43.657782] The buggy address is located 0 bytes inside of [ 43.657782] allocated 13-byte region [ffff000802d25960, ffff000802d2596d) [ 43.670105] [ 43.671583] The buggy address belongs to the physical page: [ 43.677142] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882d25 [ 43.685125] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.691634] page_type: f5(slab) [ 43.694771] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 43.702490] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 43.710210] page dumped because: kasan: bad access detected [ 43.715764] [ 43.717240] Memory state around the buggy address: [ 43.722023] ffff000802d25800: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 43.729224] ffff000802d25880: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 43.736428] >ffff000802d25900: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 43.743629] ^ [ 43.750229] ffff000802d25980: 00 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.757436] ffff000802d25a00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.764635] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-use-after-free-in-krealloc_uaf
[ 42.831204] ================================================================== [ 42.841133] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x180/0x520 [ 42.847723] Read of size 1 at addr ffff000805058400 by task kunit_try_catch/245 [ 42.855013] [ 42.856500] CPU: 3 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 42.856555] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.856570] Hardware name: WinLink E850-96 board (DT) [ 42.856591] Call trace: [ 42.856605] show_stack+0x20/0x38 (C) [ 42.856641] dump_stack_lvl+0x8c/0xd0 [ 42.856676] print_report+0x118/0x5d0 [ 42.856702] kasan_report+0xdc/0x128 [ 42.856726] __kasan_check_byte+0x54/0x70 [ 42.856752] krealloc_noprof+0x44/0x360 [ 42.856785] krealloc_uaf+0x180/0x520 [ 42.856817] kunit_try_run_case+0x170/0x3f0 [ 42.856846] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.856880] kthread+0x328/0x630 [ 42.856907] ret_from_fork+0x10/0x20 [ 42.856942] [ 42.923069] Allocated by task 245: [ 42.926457] kasan_save_stack+0x3c/0x68 [ 42.930273] kasan_save_track+0x20/0x40 [ 42.934093] kasan_save_alloc_info+0x40/0x58 [ 42.938346] __kasan_kmalloc+0xd4/0xd8 [ 42.942079] __kmalloc_cache_noprof+0x16c/0x3c0 [ 42.946592] krealloc_uaf+0xc8/0x520 [ 42.950151] kunit_try_run_case+0x170/0x3f0 [ 42.954318] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.959786] kthread+0x328/0x630 [ 42.962998] ret_from_fork+0x10/0x20 [ 42.966557] [ 42.968034] Freed by task 245: [ 42.971073] kasan_save_stack+0x3c/0x68 [ 42.974890] kasan_save_track+0x20/0x40 [ 42.978710] kasan_save_free_info+0x4c/0x78 [ 42.982876] __kasan_slab_free+0x6c/0x98 [ 42.986784] kfree+0x214/0x3c8 [ 42.989821] krealloc_uaf+0x12c/0x520 [ 42.993467] kunit_try_run_case+0x170/0x3f0 [ 42.997633] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.003102] kthread+0x328/0x630 [ 43.006313] ret_from_fork+0x10/0x20 [ 43.009873] [ 43.011350] The buggy address belongs to the object at ffff000805058400 [ 43.011350] which belongs to the cache kmalloc-256 of size 256 [ 43.023851] The buggy address is located 0 bytes inside of [ 43.023851] freed 256-byte region [ffff000805058400, ffff000805058500) [ 43.035913] [ 43.037392] The buggy address belongs to the physical page: [ 43.042949] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885058 [ 43.050933] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 43.058573] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 43.065515] page_type: f5(slab) [ 43.068653] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 43.076371] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 43.084099] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 43.091909] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 43.099722] head: 0bfffe0000000002 fffffdffe0141601 00000000ffffffff 00000000ffffffff [ 43.107534] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 43.115342] page dumped because: kasan: bad access detected [ 43.120895] [ 43.122370] Memory state around the buggy address: [ 43.127151] ffff000805058300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.134355] ffff000805058380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.141558] >ffff000805058400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 43.148759] ^ [ 43.151975] ffff000805058480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 43.159179] ffff000805058500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.166382] ================================================================== [ 43.173919] ================================================================== [ 43.180797] BUG: KASAN: slab-use-after-free in krealloc_uaf+0x4c8/0x520 [ 43.187388] Read of size 1 at addr ffff000805058400 by task kunit_try_catch/245 [ 43.194679] [ 43.196165] CPU: 3 UID: 0 PID: 245 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 43.196218] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.196234] Hardware name: WinLink E850-96 board (DT) [ 43.196254] Call trace: [ 43.196266] show_stack+0x20/0x38 (C) [ 43.196298] dump_stack_lvl+0x8c/0xd0 [ 43.196332] print_report+0x118/0x5d0 [ 43.196361] kasan_report+0xdc/0x128 [ 43.196386] __asan_report_load1_noabort+0x20/0x30 [ 43.196415] krealloc_uaf+0x4c8/0x520 [ 43.196446] kunit_try_run_case+0x170/0x3f0 [ 43.196475] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.196507] kthread+0x328/0x630 [ 43.196535] ret_from_fork+0x10/0x20 [ 43.196565] [ 43.259696] Allocated by task 245: [ 43.263084] kasan_save_stack+0x3c/0x68 [ 43.266900] kasan_save_track+0x20/0x40 [ 43.270719] kasan_save_alloc_info+0x40/0x58 [ 43.274973] __kasan_kmalloc+0xd4/0xd8 [ 43.278705] __kmalloc_cache_noprof+0x16c/0x3c0 [ 43.283220] krealloc_uaf+0xc8/0x520 [ 43.286778] kunit_try_run_case+0x170/0x3f0 [ 43.290945] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.296413] kthread+0x328/0x630 [ 43.299625] ret_from_fork+0x10/0x20 [ 43.303184] [ 43.304659] Freed by task 245: [ 43.307699] kasan_save_stack+0x3c/0x68 [ 43.311517] kasan_save_track+0x20/0x40 [ 43.315337] kasan_save_free_info+0x4c/0x78 [ 43.319503] __kasan_slab_free+0x6c/0x98 [ 43.323409] kfree+0x214/0x3c8 [ 43.326448] krealloc_uaf+0x12c/0x520 [ 43.330093] kunit_try_run_case+0x170/0x3f0 [ 43.334260] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.339729] kthread+0x328/0x630 [ 43.342940] ret_from_fork+0x10/0x20 [ 43.346500] [ 43.347976] The buggy address belongs to the object at ffff000805058400 [ 43.347976] which belongs to the cache kmalloc-256 of size 256 [ 43.360477] The buggy address is located 0 bytes inside of [ 43.360477] freed 256-byte region [ffff000805058400, ffff000805058500) [ 43.372540] [ 43.374020] The buggy address belongs to the physical page: [ 43.379575] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885058 [ 43.387559] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 43.395199] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 43.402141] page_type: f5(slab) [ 43.405279] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 43.412998] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 43.420726] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 43.428536] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 43.436349] head: 0bfffe0000000002 fffffdffe0141601 00000000ffffffff 00000000ffffffff [ 43.444161] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 43.451969] page dumped because: kasan: bad access detected [ 43.457521] [ 43.458997] Memory state around the buggy address: [ 43.463780] ffff000805058300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.470980] ffff000805058380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.478185] >ffff000805058400: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 43.485387] ^ [ 43.488602] ffff000805058480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 43.495806] ffff000805058500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.503007] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_less_oob_helper
[ 39.963642] ================================================================== [ 39.970601] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 39.978147] Write of size 1 at addr ffff0008030f84d0 by task kunit_try_catch/239 [ 39.985525] [ 39.987011] CPU: 2 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 39.987063] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.987079] Hardware name: WinLink E850-96 board (DT) [ 39.987097] Call trace: [ 39.987112] show_stack+0x20/0x38 (C) [ 39.987144] dump_stack_lvl+0x8c/0xd0 [ 39.987178] print_report+0x118/0x5d0 [ 39.987206] kasan_report+0xdc/0x128 [ 39.987231] __asan_report_store1_noabort+0x20/0x30 [ 39.987261] krealloc_less_oob_helper+0xb9c/0xc50 [ 39.987294] krealloc_less_oob+0x20/0x38 [ 39.987325] kunit_try_run_case+0x170/0x3f0 [ 39.987357] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.987392] kthread+0x328/0x630 [ 39.987419] ret_from_fork+0x10/0x20 [ 39.987454] [ 40.055576] Allocated by task 239: [ 40.058964] kasan_save_stack+0x3c/0x68 [ 40.062781] kasan_save_track+0x20/0x40 [ 40.066601] kasan_save_alloc_info+0x40/0x58 [ 40.070854] __kasan_krealloc+0x118/0x178 [ 40.074847] krealloc_noprof+0x128/0x360 [ 40.078753] krealloc_less_oob_helper+0x168/0xc50 [ 40.083441] krealloc_less_oob+0x20/0x38 [ 40.087347] kunit_try_run_case+0x170/0x3f0 [ 40.091513] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.096982] kthread+0x328/0x630 [ 40.100194] ret_from_fork+0x10/0x20 [ 40.103753] [ 40.105230] The buggy address belongs to the object at ffff0008030f8400 [ 40.105230] which belongs to the cache kmalloc-256 of size 256 [ 40.117730] The buggy address is located 7 bytes to the right of [ 40.117730] allocated 201-byte region [ffff0008030f8400, ffff0008030f84c9) [ 40.130662] [ 40.132141] The buggy address belongs to the physical page: [ 40.137697] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830f8 [ 40.145681] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 40.153319] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 40.160262] page_type: f5(slab) [ 40.163397] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 40.171120] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 40.178845] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 40.186657] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 40.194470] head: 0bfffe0000000002 fffffdffe00c3e01 00000000ffffffff 00000000ffffffff [ 40.202282] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 40.210088] page dumped because: kasan: bad access detected [ 40.215643] [ 40.217119] Memory state around the buggy address: [ 40.221899] ffff0008030f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.229103] ffff0008030f8400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.236307] >ffff0008030f8480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 40.243508] ^ [ 40.249327] ffff0008030f8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.256532] ffff0008030f8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.263733] ================================================================== [ 40.579009] ================================================================== [ 40.586039] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 40.593591] Write of size 1 at addr ffff0008030f84ea by task kunit_try_catch/239 [ 40.600968] [ 40.602452] CPU: 2 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 40.602505] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.602521] Hardware name: WinLink E850-96 board (DT) [ 40.602540] Call trace: [ 40.602553] show_stack+0x20/0x38 (C) [ 40.602584] dump_stack_lvl+0x8c/0xd0 [ 40.602616] print_report+0x118/0x5d0 [ 40.602642] kasan_report+0xdc/0x128 [ 40.602667] __asan_report_store1_noabort+0x20/0x30 [ 40.602698] krealloc_less_oob_helper+0xae4/0xc50 [ 40.602730] krealloc_less_oob+0x20/0x38 [ 40.602761] kunit_try_run_case+0x170/0x3f0 [ 40.602789] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.602822] kthread+0x328/0x630 [ 40.602848] ret_from_fork+0x10/0x20 [ 40.602877] [ 40.671018] Allocated by task 239: [ 40.674406] kasan_save_stack+0x3c/0x68 [ 40.678223] kasan_save_track+0x20/0x40 [ 40.682044] kasan_save_alloc_info+0x40/0x58 [ 40.686296] __kasan_krealloc+0x118/0x178 [ 40.690289] krealloc_noprof+0x128/0x360 [ 40.694195] krealloc_less_oob_helper+0x168/0xc50 [ 40.698883] krealloc_less_oob+0x20/0x38 [ 40.702789] kunit_try_run_case+0x170/0x3f0 [ 40.706956] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.712424] kthread+0x328/0x630 [ 40.715636] ret_from_fork+0x10/0x20 [ 40.719195] [ 40.720671] The buggy address belongs to the object at ffff0008030f8400 [ 40.720671] which belongs to the cache kmalloc-256 of size 256 [ 40.733171] The buggy address is located 33 bytes to the right of [ 40.733171] allocated 201-byte region [ffff0008030f8400, ffff0008030f84c9) [ 40.746191] [ 40.747669] The buggy address belongs to the physical page: [ 40.753226] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830f8 [ 40.761210] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 40.768848] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 40.775791] page_type: f5(slab) [ 40.778924] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 40.786650] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 40.794375] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 40.802186] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 40.810000] head: 0bfffe0000000002 fffffdffe00c3e01 00000000ffffffff 00000000ffffffff [ 40.817811] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 40.825618] page dumped because: kasan: bad access detected [ 40.831174] [ 40.832648] Memory state around the buggy address: [ 40.837427] ffff0008030f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.844632] ffff0008030f8400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.851835] >ffff0008030f8480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 40.859037] ^ [ 40.865637] ffff0008030f8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.872844] ffff0008030f8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.880043] ================================================================== [ 42.597173] ================================================================== [ 42.604238] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 42.611790] Write of size 1 at addr ffff0008062c60eb by task kunit_try_catch/243 [ 42.619166] [ 42.620650] CPU: 2 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 42.620698] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.620712] Hardware name: WinLink E850-96 board (DT) [ 42.620730] Call trace: [ 42.620742] show_stack+0x20/0x38 (C) [ 42.620776] dump_stack_lvl+0x8c/0xd0 [ 42.620808] print_report+0x118/0x5d0 [ 42.620834] kasan_report+0xdc/0x128 [ 42.620864] __asan_report_store1_noabort+0x20/0x30 [ 42.620895] krealloc_less_oob_helper+0xa58/0xc50 [ 42.620927] krealloc_large_less_oob+0x20/0x38 [ 42.620959] kunit_try_run_case+0x170/0x3f0 [ 42.620987] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.621020] kthread+0x328/0x630 [ 42.621046] ret_from_fork+0x10/0x20 [ 42.621078] [ 42.689740] The buggy address belongs to the physical page: [ 42.695298] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8862c4 [ 42.703279] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 42.710920] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 42.717863] page_type: f8(unknown) [ 42.721256] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 42.728980] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 42.736707] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 42.744518] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 42.752331] head: 0bfffe0000000002 fffffdffe018b101 00000000ffffffff 00000000ffffffff [ 42.760143] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 42.767949] page dumped because: kasan: bad access detected [ 42.773504] [ 42.774980] Memory state around the buggy address: [ 42.779759] ffff0008062c5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 42.786963] ffff0008062c6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 42.794167] >ffff0008062c6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 42.801368] ^ [ 42.807969] ffff0008062c6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 42.815174] ffff0008062c6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 42.822375] ================================================================== [ 42.132586] ================================================================== [ 42.139663] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 42.147213] Write of size 1 at addr ffff0008062c60da by task kunit_try_catch/243 [ 42.154590] [ 42.156075] CPU: 2 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 42.156131] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.156148] Hardware name: WinLink E850-96 board (DT) [ 42.156166] Call trace: [ 42.156179] show_stack+0x20/0x38 (C) [ 42.156211] dump_stack_lvl+0x8c/0xd0 [ 42.156245] print_report+0x118/0x5d0 [ 42.156273] kasan_report+0xdc/0x128 [ 42.156298] __asan_report_store1_noabort+0x20/0x30 [ 42.156331] krealloc_less_oob_helper+0xa80/0xc50 [ 42.156366] krealloc_large_less_oob+0x20/0x38 [ 42.156397] kunit_try_run_case+0x170/0x3f0 [ 42.156427] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.156460] kthread+0x328/0x630 [ 42.156487] ret_from_fork+0x10/0x20 [ 42.156521] [ 42.225164] The buggy address belongs to the physical page: [ 42.230722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8862c4 [ 42.238705] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 42.246345] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 42.253287] page_type: f8(unknown) [ 42.256681] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 42.264404] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 42.272130] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 42.279942] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 42.287755] head: 0bfffe0000000002 fffffdffe018b101 00000000ffffffff 00000000ffffffff [ 42.295567] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 42.303372] page dumped because: kasan: bad access detected [ 42.308928] [ 42.310405] Memory state around the buggy address: [ 42.315185] ffff0008062c5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 42.322388] ffff0008062c6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 42.329591] >ffff0008062c6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 42.336792] ^ [ 42.342872] ffff0008062c6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 42.350077] ffff0008062c6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 42.357279] ================================================================== [ 40.887399] ================================================================== [ 40.894456] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa58/0xc50 [ 40.902006] Write of size 1 at addr ffff0008030f84eb by task kunit_try_catch/239 [ 40.909383] [ 40.910868] CPU: 2 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 40.910921] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.910936] Hardware name: WinLink E850-96 board (DT) [ 40.910956] Call trace: [ 40.910970] show_stack+0x20/0x38 (C) [ 40.911001] dump_stack_lvl+0x8c/0xd0 [ 40.911036] print_report+0x118/0x5d0 [ 40.911062] kasan_report+0xdc/0x128 [ 40.911088] __asan_report_store1_noabort+0x20/0x30 [ 40.911118] krealloc_less_oob_helper+0xa58/0xc50 [ 40.911151] krealloc_less_oob+0x20/0x38 [ 40.911180] kunit_try_run_case+0x170/0x3f0 [ 40.911208] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.911239] kthread+0x328/0x630 [ 40.911262] ret_from_fork+0x10/0x20 [ 40.911293] [ 40.979434] Allocated by task 239: [ 40.982820] kasan_save_stack+0x3c/0x68 [ 40.986639] kasan_save_track+0x20/0x40 [ 40.990458] kasan_save_alloc_info+0x40/0x58 [ 40.994712] __kasan_krealloc+0x118/0x178 [ 40.998705] krealloc_noprof+0x128/0x360 [ 41.002611] krealloc_less_oob_helper+0x168/0xc50 [ 41.007298] krealloc_less_oob+0x20/0x38 [ 41.011204] kunit_try_run_case+0x170/0x3f0 [ 41.015371] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.020840] kthread+0x328/0x630 [ 41.024052] ret_from_fork+0x10/0x20 [ 41.027610] [ 41.029088] The buggy address belongs to the object at ffff0008030f8400 [ 41.029088] which belongs to the cache kmalloc-256 of size 256 [ 41.041586] The buggy address is located 34 bytes to the right of [ 41.041586] allocated 201-byte region [ffff0008030f8400, ffff0008030f84c9) [ 41.054606] [ 41.056086] The buggy address belongs to the physical page: [ 41.061642] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830f8 [ 41.069625] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 41.077264] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 41.084208] page_type: f5(slab) [ 41.087341] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 41.095064] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 41.102790] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 41.110602] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 41.118415] head: 0bfffe0000000002 fffffdffe00c3e01 00000000ffffffff 00000000ffffffff [ 41.126227] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 41.134033] page dumped because: kasan: bad access detected [ 41.139588] [ 41.141063] Memory state around the buggy address: [ 41.145843] ffff0008030f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.153046] ffff0008030f8400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.160251] >ffff0008030f8480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 41.167452] ^ [ 41.174053] ffff0008030f8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.181258] ffff0008030f8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.188459] ================================================================== [ 41.666304] ================================================================== [ 41.676389] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 41.683939] Write of size 1 at addr ffff0008062c60c9 by task kunit_try_catch/243 [ 41.691316] [ 41.692804] CPU: 2 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 41.692859] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.692876] Hardware name: WinLink E850-96 board (DT) [ 41.692896] Call trace: [ 41.692911] show_stack+0x20/0x38 (C) [ 41.692946] dump_stack_lvl+0x8c/0xd0 [ 41.692984] print_report+0x118/0x5d0 [ 41.693013] kasan_report+0xdc/0x128 [ 41.693040] __asan_report_store1_noabort+0x20/0x30 [ 41.693073] krealloc_less_oob_helper+0xa48/0xc50 [ 41.693105] krealloc_large_less_oob+0x20/0x38 [ 41.693136] kunit_try_run_case+0x170/0x3f0 [ 41.693168] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.693202] kthread+0x328/0x630 [ 41.693230] ret_from_fork+0x10/0x20 [ 41.693263] [ 41.761893] The buggy address belongs to the physical page: [ 41.767448] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8862c4 [ 41.775431] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 41.783071] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 41.790012] page_type: f8(unknown) [ 41.793411] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 41.801130] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 41.808859] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 41.816667] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 41.824481] head: 0bfffe0000000002 fffffdffe018b101 00000000ffffffff 00000000ffffffff [ 41.832292] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 41.840100] page dumped because: kasan: bad access detected [ 41.845655] [ 41.847130] Memory state around the buggy address: [ 41.851910] ffff0008062c5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.859113] ffff0008062c6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.866317] >ffff0008062c6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 41.873518] ^ [ 41.879077] ffff0008062c6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 41.886282] ffff0008062c6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 41.893484] ================================================================== [ 41.901051] ================================================================== [ 41.907898] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xb9c/0xc50 [ 41.915445] Write of size 1 at addr ffff0008062c60d0 by task kunit_try_catch/243 [ 41.922822] [ 41.924308] CPU: 2 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 41.924363] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.924380] Hardware name: WinLink E850-96 board (DT) [ 41.924399] Call trace: [ 41.924413] show_stack+0x20/0x38 (C) [ 41.924446] dump_stack_lvl+0x8c/0xd0 [ 41.924480] print_report+0x118/0x5d0 [ 41.924508] kasan_report+0xdc/0x128 [ 41.924533] __asan_report_store1_noabort+0x20/0x30 [ 41.924565] krealloc_less_oob_helper+0xb9c/0xc50 [ 41.924598] krealloc_large_less_oob+0x20/0x38 [ 41.924632] kunit_try_run_case+0x170/0x3f0 [ 41.924663] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.924695] kthread+0x328/0x630 [ 41.924722] ret_from_fork+0x10/0x20 [ 41.924753] [ 41.993397] The buggy address belongs to the physical page: [ 41.998956] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8862c4 [ 42.006938] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 42.014578] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 42.021521] page_type: f8(unknown) [ 42.024914] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 42.032637] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 42.040364] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 42.048175] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 42.055987] head: 0bfffe0000000002 fffffdffe018b101 00000000ffffffff 00000000ffffffff [ 42.063799] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 42.071605] page dumped because: kasan: bad access detected [ 42.077161] [ 42.078637] Memory state around the buggy address: [ 42.083418] ffff0008062c5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 42.090619] ffff0008062c6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 42.097824] >ffff0008062c6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 42.105025] ^ [ 42.110844] ffff0008062c6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 42.118049] ffff0008062c6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 42.125250] ================================================================== [ 40.271112] ================================================================== [ 40.278150] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa80/0xc50 [ 40.285698] Write of size 1 at addr ffff0008030f84da by task kunit_try_catch/239 [ 40.293075] [ 40.294558] CPU: 2 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 40.294611] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.294628] Hardware name: WinLink E850-96 board (DT) [ 40.294646] Call trace: [ 40.294660] show_stack+0x20/0x38 (C) [ 40.294694] dump_stack_lvl+0x8c/0xd0 [ 40.294729] print_report+0x118/0x5d0 [ 40.294757] kasan_report+0xdc/0x128 [ 40.294782] __asan_report_store1_noabort+0x20/0x30 [ 40.294814] krealloc_less_oob_helper+0xa80/0xc50 [ 40.294846] krealloc_less_oob+0x20/0x38 [ 40.294877] kunit_try_run_case+0x170/0x3f0 [ 40.294908] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.294942] kthread+0x328/0x630 [ 40.294970] ret_from_fork+0x10/0x20 [ 40.295003] [ 40.363125] Allocated by task 239: [ 40.366511] kasan_save_stack+0x3c/0x68 [ 40.370329] kasan_save_track+0x20/0x40 [ 40.374148] kasan_save_alloc_info+0x40/0x58 [ 40.378401] __kasan_krealloc+0x118/0x178 [ 40.382394] krealloc_noprof+0x128/0x360 [ 40.386301] krealloc_less_oob_helper+0x168/0xc50 [ 40.390988] krealloc_less_oob+0x20/0x38 [ 40.394894] kunit_try_run_case+0x170/0x3f0 [ 40.399061] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.404529] kthread+0x328/0x630 [ 40.407741] ret_from_fork+0x10/0x20 [ 40.411300] [ 40.412777] The buggy address belongs to the object at ffff0008030f8400 [ 40.412777] which belongs to the cache kmalloc-256 of size 256 [ 40.425277] The buggy address is located 17 bytes to the right of [ 40.425277] allocated 201-byte region [ffff0008030f8400, ffff0008030f84c9) [ 40.438296] [ 40.439776] The buggy address belongs to the physical page: [ 40.445332] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830f8 [ 40.453315] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 40.460955] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 40.467898] page_type: f5(slab) [ 40.471034] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 40.478755] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 40.486482] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 40.494292] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 40.502104] head: 0bfffe0000000002 fffffdffe00c3e01 00000000ffffffff 00000000ffffffff [ 40.509917] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 40.517724] page dumped because: kasan: bad access detected [ 40.523277] [ 40.524753] Memory state around the buggy address: [ 40.529534] ffff0008030f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.536736] ffff0008030f8400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 40.543941] >ffff0008030f8480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 40.551142] ^ [ 40.557222] ffff0008030f8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.564426] ffff0008030f8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.571628] ================================================================== [ 42.364610] ================================================================== [ 42.371691] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xae4/0xc50 [ 42.379241] Write of size 1 at addr ffff0008062c60ea by task kunit_try_catch/243 [ 42.386619] [ 42.388102] CPU: 2 UID: 0 PID: 243 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 42.388156] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.388171] Hardware name: WinLink E850-96 board (DT) [ 42.388187] Call trace: [ 42.388199] show_stack+0x20/0x38 (C) [ 42.388229] dump_stack_lvl+0x8c/0xd0 [ 42.388262] print_report+0x118/0x5d0 [ 42.388288] kasan_report+0xdc/0x128 [ 42.388314] __asan_report_store1_noabort+0x20/0x30 [ 42.388347] krealloc_less_oob_helper+0xae4/0xc50 [ 42.388380] krealloc_large_less_oob+0x20/0x38 [ 42.388412] kunit_try_run_case+0x170/0x3f0 [ 42.388441] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.388474] kthread+0x328/0x630 [ 42.388502] ret_from_fork+0x10/0x20 [ 42.388531] [ 42.457191] The buggy address belongs to the physical page: [ 42.462749] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8862c4 [ 42.470733] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 42.478371] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 42.485314] page_type: f8(unknown) [ 42.488707] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 42.496432] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 42.504158] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 42.511969] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 42.519783] head: 0bfffe0000000002 fffffdffe018b101 00000000ffffffff 00000000ffffffff [ 42.527594] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 42.535400] page dumped because: kasan: bad access detected [ 42.540956] [ 42.542431] Memory state around the buggy address: [ 42.547210] ffff0008062c5f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 42.554414] ffff0008062c6000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 42.561619] >ffff0008062c6080: 00 00 00 00 00 00 00 00 00 01 fe fe fe fe fe fe [ 42.568820] ^ [ 42.575421] ffff0008062c6100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 42.582625] ffff0008062c6180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 42.589828] ================================================================== [ 39.653995] ================================================================== [ 39.663312] BUG: KASAN: slab-out-of-bounds in krealloc_less_oob_helper+0xa48/0xc50 [ 39.670862] Write of size 1 at addr ffff0008030f84c9 by task kunit_try_catch/239 [ 39.678238] [ 39.679725] CPU: 2 UID: 0 PID: 239 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 39.679783] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.679800] Hardware name: WinLink E850-96 board (DT) [ 39.679820] Call trace: [ 39.679833] show_stack+0x20/0x38 (C) [ 39.679870] dump_stack_lvl+0x8c/0xd0 [ 39.679904] print_report+0x118/0x5d0 [ 39.679931] kasan_report+0xdc/0x128 [ 39.679960] __asan_report_store1_noabort+0x20/0x30 [ 39.679992] krealloc_less_oob_helper+0xa48/0xc50 [ 39.680027] krealloc_less_oob+0x20/0x38 [ 39.680056] kunit_try_run_case+0x170/0x3f0 [ 39.680086] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.680121] kthread+0x328/0x630 [ 39.680149] ret_from_fork+0x10/0x20 [ 39.680183] [ 39.748292] Allocated by task 239: [ 39.751677] kasan_save_stack+0x3c/0x68 [ 39.755494] kasan_save_track+0x20/0x40 [ 39.759314] kasan_save_alloc_info+0x40/0x58 [ 39.763567] __kasan_krealloc+0x118/0x178 [ 39.767560] krealloc_noprof+0x128/0x360 [ 39.771466] krealloc_less_oob_helper+0x168/0xc50 [ 39.776154] krealloc_less_oob+0x20/0x38 [ 39.780060] kunit_try_run_case+0x170/0x3f0 [ 39.784226] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.789695] kthread+0x328/0x630 [ 39.792907] ret_from_fork+0x10/0x20 [ 39.796466] [ 39.797944] The buggy address belongs to the object at ffff0008030f8400 [ 39.797944] which belongs to the cache kmalloc-256 of size 256 [ 39.810445] The buggy address is located 0 bytes to the right of [ 39.810445] allocated 201-byte region [ffff0008030f8400, ffff0008030f84c9) [ 39.823375] [ 39.824855] The buggy address belongs to the physical page: [ 39.830412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8830f8 [ 39.838394] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 39.846035] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 39.852976] page_type: f5(slab) [ 39.856114] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 39.863832] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.871561] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 39.879370] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.887183] head: 0bfffe0000000002 fffffdffe00c3e01 00000000ffffffff 00000000ffffffff [ 39.894995] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 39.902801] page dumped because: kasan: bad access detected [ 39.908356] [ 39.909832] Memory state around the buggy address: [ 39.914614] ffff0008030f8380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.921818] ffff0008030f8400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.929021] >ffff0008030f8480: 00 00 00 00 00 00 00 00 00 01 fc fc fc fc fc fc [ 39.936220] ^ [ 39.941780] ffff0008030f8500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.948985] ffff0008030f8580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.956187] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-krealloc_more_oob_helper
[ 41.197351] ================================================================== [ 41.206694] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 41.214240] Write of size 1 at addr ffff0008050620eb by task kunit_try_catch/241 [ 41.221618] [ 41.223104] CPU: 3 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 41.223157] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.223173] Hardware name: WinLink E850-96 board (DT) [ 41.223191] Call trace: [ 41.223205] show_stack+0x20/0x38 (C) [ 41.223238] dump_stack_lvl+0x8c/0xd0 [ 41.223273] print_report+0x118/0x5d0 [ 41.223303] kasan_report+0xdc/0x128 [ 41.223328] __asan_report_store1_noabort+0x20/0x30 [ 41.223362] krealloc_more_oob_helper+0x60c/0x678 [ 41.223394] krealloc_large_more_oob+0x20/0x38 [ 41.223424] kunit_try_run_case+0x170/0x3f0 [ 41.223455] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.223490] kthread+0x328/0x630 [ 41.223516] ret_from_fork+0x10/0x20 [ 41.223549] [ 41.292193] The buggy address belongs to the physical page: [ 41.297750] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885060 [ 41.305733] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 41.313373] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 41.320314] page_type: f8(unknown) [ 41.323712] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 41.331432] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 41.339160] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 41.346970] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 41.354783] head: 0bfffe0000000002 fffffdffe0141801 00000000ffffffff 00000000ffffffff [ 41.362595] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 41.370403] page dumped because: kasan: bad access detected [ 41.375956] [ 41.377431] Memory state around the buggy address: [ 41.382216] ffff000805061f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.389414] ffff000805062000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.396621] >ffff000805062080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 41.403820] ^ [ 41.410421] ffff000805062100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 41.417626] ffff000805062180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 41.424828] ================================================================== [ 41.432329] ================================================================== [ 41.439239] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 41.446790] Write of size 1 at addr ffff0008050620f0 by task kunit_try_catch/241 [ 41.454166] [ 41.455652] CPU: 3 UID: 0 PID: 241 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 41.455704] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.455718] Hardware name: WinLink E850-96 board (DT) [ 41.455737] Call trace: [ 41.455750] show_stack+0x20/0x38 (C) [ 41.455782] dump_stack_lvl+0x8c/0xd0 [ 41.455818] print_report+0x118/0x5d0 [ 41.455847] kasan_report+0xdc/0x128 [ 41.455871] __asan_report_store1_noabort+0x20/0x30 [ 41.455902] krealloc_more_oob_helper+0x5c0/0x678 [ 41.455934] krealloc_large_more_oob+0x20/0x38 [ 41.455966] kunit_try_run_case+0x170/0x3f0 [ 41.455996] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.456029] kthread+0x328/0x630 [ 41.456061] ret_from_fork+0x10/0x20 [ 41.456092] [ 41.524740] The buggy address belongs to the physical page: [ 41.530300] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885060 [ 41.538282] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 41.545922] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 41.552863] page_type: f8(unknown) [ 41.556261] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 41.563980] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 41.571707] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 41.579518] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 41.587331] head: 0bfffe0000000002 fffffdffe0141801 00000000ffffffff 00000000ffffffff [ 41.595143] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 41.602952] page dumped because: kasan: bad access detected [ 41.608504] [ 41.609980] Memory state around the buggy address: [ 41.614762] ffff000805061f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.621963] ffff000805062000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 41.629168] >ffff000805062080: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fe fe [ 41.636369] ^ [ 41.643230] ffff000805062100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 41.650435] ffff000805062180: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 41.657636] ================================================================== [ 39.033478] ================================================================== [ 39.042577] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x60c/0x678 [ 39.050125] Write of size 1 at addr ffff0008050582eb by task kunit_try_catch/237 [ 39.057501] [ 39.058987] CPU: 3 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 39.059043] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.059058] Hardware name: WinLink E850-96 board (DT) [ 39.059079] Call trace: [ 39.059091] show_stack+0x20/0x38 (C) [ 39.059125] dump_stack_lvl+0x8c/0xd0 [ 39.059159] print_report+0x118/0x5d0 [ 39.059186] kasan_report+0xdc/0x128 [ 39.059212] __asan_report_store1_noabort+0x20/0x30 [ 39.059245] krealloc_more_oob_helper+0x60c/0x678 [ 39.059278] krealloc_more_oob+0x20/0x38 [ 39.059309] kunit_try_run_case+0x170/0x3f0 [ 39.059340] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.059374] kthread+0x328/0x630 [ 39.059402] ret_from_fork+0x10/0x20 [ 39.059436] [ 39.127554] Allocated by task 237: [ 39.130941] kasan_save_stack+0x3c/0x68 [ 39.134757] kasan_save_track+0x20/0x40 [ 39.138576] kasan_save_alloc_info+0x40/0x58 [ 39.142830] __kasan_krealloc+0x118/0x178 [ 39.146824] krealloc_noprof+0x128/0x360 [ 39.150729] krealloc_more_oob_helper+0x168/0x678 [ 39.155416] krealloc_more_oob+0x20/0x38 [ 39.159322] kunit_try_run_case+0x170/0x3f0 [ 39.163489] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.168958] kthread+0x328/0x630 [ 39.172170] ret_from_fork+0x10/0x20 [ 39.175728] [ 39.177207] The buggy address belongs to the object at ffff000805058200 [ 39.177207] which belongs to the cache kmalloc-256 of size 256 [ 39.189707] The buggy address is located 0 bytes to the right of [ 39.189707] allocated 235-byte region [ffff000805058200, ffff0008050582eb) [ 39.202637] [ 39.204118] The buggy address belongs to the physical page: [ 39.209674] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885058 [ 39.217657] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 39.225297] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 39.232240] page_type: f5(slab) [ 39.235375] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 39.243095] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.250823] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 39.258633] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.266446] head: 0bfffe0000000002 fffffdffe0141601 00000000ffffffff 00000000ffffffff [ 39.274258] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 39.282065] page dumped because: kasan: bad access detected [ 39.287619] [ 39.289094] Memory state around the buggy address: [ 39.293874] ffff000805058180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.301079] ffff000805058200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.308282] >ffff000805058280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 39.315483] ^ [ 39.322084] ffff000805058300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.329289] ffff000805058380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.336491] ================================================================== [ 39.343824] ================================================================== [ 39.350903] BUG: KASAN: slab-out-of-bounds in krealloc_more_oob_helper+0x5c0/0x678 [ 39.358453] Write of size 1 at addr ffff0008050582f0 by task kunit_try_catch/237 [ 39.365829] [ 39.367315] CPU: 3 UID: 0 PID: 237 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 39.367369] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.367384] Hardware name: WinLink E850-96 board (DT) [ 39.367404] Call trace: [ 39.367418] show_stack+0x20/0x38 (C) [ 39.367451] dump_stack_lvl+0x8c/0xd0 [ 39.367485] print_report+0x118/0x5d0 [ 39.367512] kasan_report+0xdc/0x128 [ 39.367537] __asan_report_store1_noabort+0x20/0x30 [ 39.367567] krealloc_more_oob_helper+0x5c0/0x678 [ 39.367600] krealloc_more_oob+0x20/0x38 [ 39.367629] kunit_try_run_case+0x170/0x3f0 [ 39.367657] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.367690] kthread+0x328/0x630 [ 39.367714] ret_from_fork+0x10/0x20 [ 39.367745] [ 39.435881] Allocated by task 237: [ 39.439268] kasan_save_stack+0x3c/0x68 [ 39.443086] kasan_save_track+0x20/0x40 [ 39.446905] kasan_save_alloc_info+0x40/0x58 [ 39.451159] __kasan_krealloc+0x118/0x178 [ 39.455152] krealloc_noprof+0x128/0x360 [ 39.459058] krealloc_more_oob_helper+0x168/0x678 [ 39.463745] krealloc_more_oob+0x20/0x38 [ 39.467651] kunit_try_run_case+0x170/0x3f0 [ 39.471818] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.477286] kthread+0x328/0x630 [ 39.480498] ret_from_fork+0x10/0x20 [ 39.484057] [ 39.485534] The buggy address belongs to the object at ffff000805058200 [ 39.485534] which belongs to the cache kmalloc-256 of size 256 [ 39.498033] The buggy address is located 5 bytes to the right of [ 39.498033] allocated 235-byte region [ffff000805058200, ffff0008050582eb) [ 39.510966] [ 39.512444] The buggy address belongs to the physical page: [ 39.518001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885058 [ 39.525987] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 39.533623] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 39.540568] page_type: f5(slab) [ 39.543702] raw: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 39.551424] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.559150] head: 0bfffe0000000040 ffff000800002b40 dead000000000122 0000000000000000 [ 39.566962] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.574775] head: 0bfffe0000000002 fffffdffe0141601 00000000ffffffff 00000000ffffffff [ 39.582586] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 39.590392] page dumped because: kasan: bad access detected [ 39.595948] [ 39.597423] Memory state around the buggy address: [ 39.602204] ffff000805058180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.609406] ffff000805058200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 39.616611] >ffff000805058280: 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc fc [ 39.623812] ^ [ 39.630673] ffff000805058300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.637878] ffff000805058380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.645079] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-use-after-free-in-page_alloc_uaf
[ 38.841736] ================================================================== [ 38.856032] BUG: KASAN: use-after-free in page_alloc_uaf+0x328/0x350 [ 38.862366] Read of size 1 at addr ffff0008084c0000 by task kunit_try_catch/235 [ 38.869659] [ 38.871144] CPU: 2 UID: 0 PID: 235 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 38.871202] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.871220] Hardware name: WinLink E850-96 board (DT) [ 38.871242] Call trace: [ 38.871254] show_stack+0x20/0x38 (C) [ 38.871292] dump_stack_lvl+0x8c/0xd0 [ 38.871327] print_report+0x118/0x5d0 [ 38.871356] kasan_report+0xdc/0x128 [ 38.871380] __asan_report_load1_noabort+0x20/0x30 [ 38.871412] page_alloc_uaf+0x328/0x350 [ 38.871443] kunit_try_run_case+0x170/0x3f0 [ 38.871475] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.871511] kthread+0x328/0x630 [ 38.871542] ret_from_fork+0x10/0x20 [ 38.871576] [ 38.934851] The buggy address belongs to the physical page: [ 38.940407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8884c0 [ 38.948390] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.954901] page_type: f0(buddy) [ 38.958122] raw: 0bfffe0000000000 ffff00087f61bd70 ffff00087f61bd70 0000000000000000 [ 38.965842] raw: 0000000000000000 0000000000000006 00000000f0000000 0000000000000000 [ 38.973563] page dumped because: kasan: bad access detected [ 38.979117] [ 38.980592] Memory state around the buggy address: [ 38.985373] ffff0008084bff00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.992576] ffff0008084bff80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 38.999782] >ffff0008084c0000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.006981] ^ [ 39.010196] ffff0008084c0080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.017401] ffff0008084c0100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 39.024604] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_large_oob_right
[ 38.191889] ================================================================== [ 38.201443] BUG: KASAN: slab-out-of-bounds in kmalloc_large_oob_right+0x278/0x2b8 [ 38.208905] Write of size 1 at addr ffff00080506200a by task kunit_try_catch/227 [ 38.216281] [ 38.217768] CPU: 3 UID: 0 PID: 227 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 38.217823] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.217841] Hardware name: WinLink E850-96 board (DT) [ 38.217861] Call trace: [ 38.217877] show_stack+0x20/0x38 (C) [ 38.217912] dump_stack_lvl+0x8c/0xd0 [ 38.217946] print_report+0x118/0x5d0 [ 38.217974] kasan_report+0xdc/0x128 [ 38.218001] __asan_report_store1_noabort+0x20/0x30 [ 38.218032] kmalloc_large_oob_right+0x278/0x2b8 [ 38.218063] kunit_try_run_case+0x170/0x3f0 [ 38.218093] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.218129] kthread+0x328/0x630 [ 38.218157] ret_from_fork+0x10/0x20 [ 38.218193] [ 38.282343] The buggy address belongs to the physical page: [ 38.287899] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x885060 [ 38.295883] head: order:2 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 38.303523] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 38.310465] page_type: f8(unknown) [ 38.313862] raw: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 38.321581] raw: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 38.329309] head: 0bfffe0000000040 0000000000000000 dead000000000122 0000000000000000 [ 38.337119] head: 0000000000000000 0000000000000000 00000000f8000000 0000000000000000 [ 38.344932] head: 0bfffe0000000002 fffffdffe0141801 00000000ffffffff 00000000ffffffff [ 38.352744] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000004 [ 38.360551] page dumped because: kasan: bad access detected [ 38.366105] [ 38.367581] Memory state around the buggy address: [ 38.372362] ffff000805061f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.379564] ffff000805061f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.386768] >ffff000805062000: 00 02 fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 38.393969] ^ [ 38.397445] ffff000805062080: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 38.404650] ffff000805062100: fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe fe [ 38.411853] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_big_oob_right
[ 37.889910] ================================================================== [ 37.900671] BUG: KASAN: slab-out-of-bounds in kmalloc_big_oob_right+0x2a4/0x2f0 [ 37.907954] Write of size 1 at addr ffff000808119f00 by task kunit_try_catch/225 [ 37.915331] [ 37.916817] CPU: 2 UID: 0 PID: 225 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 37.916875] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.916891] Hardware name: WinLink E850-96 board (DT) [ 37.916911] Call trace: [ 37.916924] show_stack+0x20/0x38 (C) [ 37.916959] dump_stack_lvl+0x8c/0xd0 [ 37.916993] print_report+0x118/0x5d0 [ 37.917021] kasan_report+0xdc/0x128 [ 37.917046] __asan_report_store1_noabort+0x20/0x30 [ 37.917077] kmalloc_big_oob_right+0x2a4/0x2f0 [ 37.917107] kunit_try_run_case+0x170/0x3f0 [ 37.917141] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.917175] kthread+0x328/0x630 [ 37.917202] ret_from_fork+0x10/0x20 [ 37.917236] [ 37.981217] Allocated by task 225: [ 37.984603] kasan_save_stack+0x3c/0x68 [ 37.988420] kasan_save_track+0x20/0x40 [ 37.992239] kasan_save_alloc_info+0x40/0x58 [ 37.996492] __kasan_kmalloc+0xd4/0xd8 [ 38.000226] __kmalloc_cache_noprof+0x16c/0x3c0 [ 38.004739] kmalloc_big_oob_right+0xb8/0x2f0 [ 38.009079] kunit_try_run_case+0x170/0x3f0 [ 38.013246] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.018715] kthread+0x328/0x630 [ 38.021927] ret_from_fork+0x10/0x20 [ 38.025486] [ 38.026964] The buggy address belongs to the object at ffff000808118000 [ 38.026964] which belongs to the cache kmalloc-8k of size 8192 [ 38.039463] The buggy address is located 0 bytes to the right of [ 38.039463] allocated 7936-byte region [ffff000808118000, ffff000808119f00) [ 38.052481] [ 38.053961] The buggy address belongs to the physical page: [ 38.059517] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x888118 [ 38.067500] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 38.075141] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 38.082083] page_type: f5(slab) [ 38.085221] raw: 0bfffe0000000040 ffff000800003180 dead000000000122 0000000000000000 [ 38.092939] raw: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 38.100668] head: 0bfffe0000000040 ffff000800003180 dead000000000122 0000000000000000 [ 38.108477] head: 0000000000000000 0000000080020002 00000000f5000000 0000000000000000 [ 38.116290] head: 0bfffe0000000003 fffffdffe0204601 00000000ffffffff 00000000ffffffff [ 38.124102] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 38.131907] page dumped because: kasan: bad access detected [ 38.137463] [ 38.138938] Memory state around the buggy address: [ 38.143721] ffff000808119e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.150921] ffff000808119e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 38.158126] >ffff000808119f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.165327] ^ [ 38.168542] ffff000808119f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.175748] ffff00080811a000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.182948] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_track_caller_oob_right
[ 37.421278] ================================================================== [ 37.430881] BUG: KASAN: slab-out-of-bounds in kmalloc_track_caller_oob_right+0x40c/0x488 [ 37.438952] Write of size 1 at addr ffff000801adde78 by task kunit_try_catch/223 [ 37.446327] [ 37.447814] CPU: 3 UID: 0 PID: 223 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 37.447872] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.447889] Hardware name: WinLink E850-96 board (DT) [ 37.447910] Call trace: [ 37.447923] show_stack+0x20/0x38 (C) [ 37.447956] dump_stack_lvl+0x8c/0xd0 [ 37.447990] print_report+0x118/0x5d0 [ 37.448019] kasan_report+0xdc/0x128 [ 37.448043] __asan_report_store1_noabort+0x20/0x30 [ 37.448076] kmalloc_track_caller_oob_right+0x40c/0x488 [ 37.448110] kunit_try_run_case+0x170/0x3f0 [ 37.448140] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.448175] kthread+0x328/0x630 [ 37.448203] ret_from_fork+0x10/0x20 [ 37.448237] [ 37.512994] Allocated by task 223: [ 37.516381] kasan_save_stack+0x3c/0x68 [ 37.520199] kasan_save_track+0x20/0x40 [ 37.524017] kasan_save_alloc_info+0x40/0x58 [ 37.528271] __kasan_kmalloc+0xd4/0xd8 [ 37.532003] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 37.537559] kmalloc_track_caller_oob_right+0xa8/0x488 [ 37.542680] kunit_try_run_case+0x170/0x3f0 [ 37.546847] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.552315] kthread+0x328/0x630 [ 37.555527] ret_from_fork+0x10/0x20 [ 37.559086] [ 37.560563] The buggy address belongs to the object at ffff000801adde00 [ 37.560563] which belongs to the cache kmalloc-128 of size 128 [ 37.573063] The buggy address is located 0 bytes to the right of [ 37.573063] allocated 120-byte region [ffff000801adde00, ffff000801adde78) [ 37.585995] [ 37.587474] The buggy address belongs to the physical page: [ 37.593033] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881adc [ 37.601014] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 37.608655] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 37.615597] page_type: f5(slab) [ 37.618734] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 37.626453] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.634181] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 37.641991] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.649804] head: 0bfffe0000000001 fffffdffe006b701 00000000ffffffff 00000000ffffffff [ 37.657616] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 37.665424] page dumped because: kasan: bad access detected [ 37.670976] [ 37.672452] Memory state around the buggy address: [ 37.677232] ffff000801addd00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 37.684435] ffff000801addd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.691641] >ffff000801adde00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fc [ 37.698841] ^ [ 37.705963] ffff000801adde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.713167] ffff000801addf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.720370] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_node_oob_right
[ 37.120237] ================================================================== [ 37.129501] BUG: KASAN: slab-out-of-bounds in kmalloc_node_oob_right+0x2f4/0x330 [ 37.136872] Read of size 1 at addr ffff0008080fd000 by task kunit_try_catch/221 [ 37.144162] [ 37.145649] CPU: 2 UID: 0 PID: 221 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 37.145706] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.145723] Hardware name: WinLink E850-96 board (DT) [ 37.145743] Call trace: [ 37.145757] show_stack+0x20/0x38 (C) [ 37.145794] dump_stack_lvl+0x8c/0xd0 [ 37.145826] print_report+0x118/0x5d0 [ 37.145854] kasan_report+0xdc/0x128 [ 37.145880] __asan_report_load1_noabort+0x20/0x30 [ 37.145913] kmalloc_node_oob_right+0x2f4/0x330 [ 37.145944] kunit_try_run_case+0x170/0x3f0 [ 37.145974] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.146009] kthread+0x328/0x630 [ 37.146037] ret_from_fork+0x10/0x20 [ 37.146070] [ 37.210047] Allocated by task 221: [ 37.213435] kasan_save_stack+0x3c/0x68 [ 37.217251] kasan_save_track+0x20/0x40 [ 37.221071] kasan_save_alloc_info+0x40/0x58 [ 37.225324] __kasan_kmalloc+0xd4/0xd8 [ 37.229056] __kmalloc_cache_node_noprof+0x178/0x3d0 [ 37.234004] kmalloc_node_oob_right+0xbc/0x330 [ 37.238431] kunit_try_run_case+0x170/0x3f0 [ 37.242598] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.248066] kthread+0x328/0x630 [ 37.251278] ret_from_fork+0x10/0x20 [ 37.254837] [ 37.256315] The buggy address belongs to the object at ffff0008080fc000 [ 37.256315] which belongs to the cache kmalloc-4k of size 4096 [ 37.268816] The buggy address is located 0 bytes to the right of [ 37.268816] allocated 4096-byte region [ffff0008080fc000, ffff0008080fd000) [ 37.281833] [ 37.283312] The buggy address belongs to the physical page: [ 37.288870] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x8880f8 [ 37.296852] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 37.304493] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 37.311435] page_type: f5(slab) [ 37.314572] raw: 0bfffe0000000040 ffff000800003040 dead000000000122 0000000000000000 [ 37.322291] raw: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 37.330019] head: 0bfffe0000000040 ffff000800003040 dead000000000122 0000000000000000 [ 37.337828] head: 0000000000000000 0000000080040004 00000000f5000000 0000000000000000 [ 37.345642] head: 0bfffe0000000003 fffffdffe0203e01 00000000ffffffff 00000000ffffffff [ 37.353453] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 37.361260] page dumped because: kasan: bad access detected [ 37.366815] [ 37.368290] Memory state around the buggy address: [ 37.373072] ffff0008080fcf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.380273] ffff0008080fcf80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 37.387479] >ffff0008080fd000: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.394679] ^ [ 37.397894] ffff0008080fd080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.405099] ffff0008080fd100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.412301] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_left
[ 36.849810] ================================================================== [ 36.858927] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_left+0x2ec/0x320 [ 36.865785] Read of size 1 at addr ffff0008027546ff by task kunit_try_catch/219 [ 36.873073] [ 36.874559] CPU: 3 UID: 0 PID: 219 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 36.874612] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.874630] Hardware name: WinLink E850-96 board (DT) [ 36.874649] Call trace: [ 36.874666] show_stack+0x20/0x38 (C) [ 36.874701] dump_stack_lvl+0x8c/0xd0 [ 36.874737] print_report+0x118/0x5d0 [ 36.874766] kasan_report+0xdc/0x128 [ 36.874792] __asan_report_load1_noabort+0x20/0x30 [ 36.874826] kmalloc_oob_left+0x2ec/0x320 [ 36.874855] kunit_try_run_case+0x170/0x3f0 [ 36.874886] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.874919] kthread+0x328/0x630 [ 36.874949] ret_from_fork+0x10/0x20 [ 36.874985] [ 36.938436] Allocated by task 35: [ 36.941738] kasan_save_stack+0x3c/0x68 [ 36.945554] kasan_save_track+0x20/0x40 [ 36.949373] kasan_save_alloc_info+0x40/0x58 [ 36.953626] __kasan_kmalloc+0xd4/0xd8 [ 36.957359] __kmalloc_node_track_caller_noprof+0x194/0x4b8 [ 36.962914] kvasprintf+0xe0/0x180 [ 36.966300] __kthread_create_on_node+0x16c/0x350 [ 36.970987] kthread_create_on_node+0xe4/0x130 [ 36.975414] create_worker+0x380/0x6b8 [ 36.979147] worker_thread+0x808/0xf38 [ 36.982879] kthread+0x328/0x630 [ 36.986091] ret_from_fork+0x10/0x20 [ 36.989650] [ 36.991128] The buggy address belongs to the object at ffff0008027546e0 [ 36.991128] which belongs to the cache kmalloc-16 of size 16 [ 37.003454] The buggy address is located 18 bytes to the right of [ 37.003454] allocated 13-byte region [ffff0008027546e0, ffff0008027546ed) [ 37.016386] [ 37.017865] The buggy address belongs to the physical page: [ 37.023423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x882754 [ 37.031405] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.037915] page_type: f5(slab) [ 37.041052] raw: 0bfffe0000000000 ffff000800002640 dead000000000122 0000000000000000 [ 37.048770] raw: 0000000000000000 0000000080800080 00000000f5000000 0000000000000000 [ 37.056491] page dumped because: kasan: bad access detected [ 37.062045] [ 37.063520] Memory state around the buggy address: [ 37.068301] ffff000802754580: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 37.075506] ffff000802754600: fa fb fc fc fa fb fc fc fa fb fc fc fa fb fc fc [ 37.082708] >ffff000802754680: fa fb fc fc fa fb fc fc fa fb fc fc 00 05 fc fc [ 37.089909] ^ [ 37.097031] ffff000802754700: 00 07 fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.104235] ffff000802754780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.111437] ==================================================================
Failure - log-parser-boot/kasan-bug-kasan-slab-out-of-bounds-in-kmalloc_oob_right
[ 35.950369] ================================================================== [ 35.956948] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660 [ 35.963887] Write of size 1 at addr ffff000801889d73 by task kunit_try_catch/217 [ 35.971264] [ 35.972750] CPU: 2 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 35.972800] Tainted: [N]=TEST [ 35.972813] Hardware name: WinLink E850-96 board (DT) [ 35.972837] Call trace: [ 35.972851] show_stack+0x20/0x38 (C) [ 35.972886] dump_stack_lvl+0x8c/0xd0 [ 35.972921] print_report+0x118/0x5d0 [ 35.972948] kasan_report+0xdc/0x128 [ 35.972973] __asan_report_store1_noabort+0x20/0x30 [ 35.973006] kmalloc_oob_right+0x5a4/0x660 [ 35.973039] kunit_try_run_case+0x170/0x3f0 [ 35.973070] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.973105] kthread+0x328/0x630 [ 35.973133] ret_from_fork+0x10/0x20 [ 35.973168] [ 36.035586] Allocated by task 217: [ 36.038974] kasan_save_stack+0x3c/0x68 [ 36.042789] kasan_save_track+0x20/0x40 [ 36.046609] kasan_save_alloc_info+0x40/0x58 [ 36.050862] __kasan_kmalloc+0xd4/0xd8 [ 36.054595] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.059109] kmalloc_oob_right+0xb0/0x660 [ 36.063102] kunit_try_run_case+0x170/0x3f0 [ 36.067268] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.072737] kthread+0x328/0x630 [ 36.075949] ret_from_fork+0x10/0x20 [ 36.079507] [ 36.080985] The buggy address belongs to the object at ffff000801889d00 [ 36.080985] which belongs to the cache kmalloc-128 of size 128 [ 36.093487] The buggy address is located 0 bytes to the right of [ 36.093487] allocated 115-byte region [ffff000801889d00, ffff000801889d73) [ 36.106417] [ 36.107896] The buggy address belongs to the physical page: [ 36.113454] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881888 [ 36.121438] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.129075] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.136019] page_type: f5(slab) [ 36.139155] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 36.146875] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.154603] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 36.162412] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.170225] head: 0bfffe0000000001 fffffdffe0062201 00000000ffffffff 00000000ffffffff [ 36.178038] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 36.185844] page dumped because: kasan: bad access detected [ 36.191398] [ 36.192874] Memory state around the buggy address: [ 36.197654] ffff000801889c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.204858] ffff000801889c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.212062] >ffff000801889d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 36.219263] ^ [ 36.226124] ffff000801889d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.233330] ffff000801889e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.240531] ================================================================== [ 36.253106] ================================================================== [ 36.260241] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660 [ 36.267179] Write of size 1 at addr ffff000801889d78 by task kunit_try_catch/217 [ 36.274557] [ 36.276043] CPU: 2 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 36.276099] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.276117] Hardware name: WinLink E850-96 board (DT) [ 36.276135] Call trace: [ 36.276148] show_stack+0x20/0x38 (C) [ 36.276182] dump_stack_lvl+0x8c/0xd0 [ 36.276216] print_report+0x118/0x5d0 [ 36.276243] kasan_report+0xdc/0x128 [ 36.276268] __asan_report_store1_noabort+0x20/0x30 [ 36.276300] kmalloc_oob_right+0x538/0x660 [ 36.276329] kunit_try_run_case+0x170/0x3f0 [ 36.276358] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.276392] kthread+0x328/0x630 [ 36.276420] ret_from_fork+0x10/0x20 [ 36.276453] [ 36.340095] Allocated by task 217: [ 36.343483] kasan_save_stack+0x3c/0x68 [ 36.347299] kasan_save_track+0x20/0x40 [ 36.351118] kasan_save_alloc_info+0x40/0x58 [ 36.355371] __kasan_kmalloc+0xd4/0xd8 [ 36.359104] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.363618] kmalloc_oob_right+0xb0/0x660 [ 36.367611] kunit_try_run_case+0x170/0x3f0 [ 36.371778] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.377246] kthread+0x328/0x630 [ 36.380458] ret_from_fork+0x10/0x20 [ 36.384017] [ 36.385494] The buggy address belongs to the object at ffff000801889d00 [ 36.385494] which belongs to the cache kmalloc-128 of size 128 [ 36.397994] The buggy address is located 5 bytes to the right of [ 36.397994] allocated 115-byte region [ffff000801889d00, ffff000801889d73) [ 36.410926] [ 36.412405] The buggy address belongs to the physical page: [ 36.417962] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881888 [ 36.425943] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.433584] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.440528] page_type: f5(slab) [ 36.443662] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 36.451384] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.459110] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 36.466922] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.474734] head: 0bfffe0000000001 fffffdffe0062201 00000000ffffffff 00000000ffffffff [ 36.482546] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 36.490352] page dumped because: kasan: bad access detected [ 36.495908] [ 36.497383] Memory state around the buggy address: [ 36.502161] ffff000801889c00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.509366] ffff000801889c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.516571] >ffff000801889d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 36.523772] ^ [ 36.530894] ffff000801889d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.538100] ffff000801889e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.545299] ================================================================== [ 36.552714] ================================================================== [ 36.559712] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660 [ 36.566655] Read of size 1 at addr ffff000801889d80 by task kunit_try_catch/217 [ 36.573945] [ 36.575429] CPU: 2 UID: 0 PID: 217 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 36.575486] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.575503] Hardware name: WinLink E850-96 board (DT) [ 36.575520] Call trace: [ 36.575534] show_stack+0x20/0x38 (C) [ 36.575565] dump_stack_lvl+0x8c/0xd0 [ 36.575602] print_report+0x118/0x5d0 [ 36.575630] kasan_report+0xdc/0x128 [ 36.575654] __asan_report_load1_noabort+0x20/0x30 [ 36.575684] kmalloc_oob_right+0x5d0/0x660 [ 36.575715] kunit_try_run_case+0x170/0x3f0 [ 36.575746] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.575779] kthread+0x328/0x630 [ 36.575804] ret_from_fork+0x10/0x20 [ 36.575837] [ 36.639397] Allocated by task 217: [ 36.642783] kasan_save_stack+0x3c/0x68 [ 36.646600] kasan_save_track+0x20/0x40 [ 36.650419] kasan_save_alloc_info+0x40/0x58 [ 36.654673] __kasan_kmalloc+0xd4/0xd8 [ 36.658405] __kmalloc_cache_noprof+0x16c/0x3c0 [ 36.662919] kmalloc_oob_right+0xb0/0x660 [ 36.666912] kunit_try_run_case+0x170/0x3f0 [ 36.671079] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.676548] kthread+0x328/0x630 [ 36.679759] ret_from_fork+0x10/0x20 [ 36.683318] [ 36.684795] The buggy address belongs to the object at ffff000801889d00 [ 36.684795] which belongs to the cache kmalloc-128 of size 128 [ 36.697294] The buggy address is located 13 bytes to the right of [ 36.697294] allocated 115-byte region [ffff000801889d00, ffff000801889d73) [ 36.710314] [ 36.711793] The buggy address belongs to the physical page: [ 36.717349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x881888 [ 36.725331] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 36.732973] flags: 0xbfffe0000000040(head|node=0|zone=2|lastcpupid=0x1ffff) [ 36.739916] page_type: f5(slab) [ 36.743050] raw: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 36.750772] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.758498] head: 0bfffe0000000040 ffff000800002a00 dead000000000122 0000000000000000 [ 36.766309] head: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.774123] head: 0bfffe0000000001 fffffdffe0062201 00000000ffffffff 00000000ffffffff [ 36.781934] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 36.789740] page dumped because: kasan: bad access detected [ 36.795295] [ 36.796771] Memory state around the buggy address: [ 36.801549] ffff000801889c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.808754] ffff000801889d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 36.815959] >ffff000801889d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.823160] ^ [ 36.826376] ffff000801889e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.833580] ffff000801889e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.840781] ==================================================================
Failure - log-parser-boot/exception-warning-libmathint_log-at-intlog10
------------[ cut here ]------------ [ 183.536592] WARNING: lib/math/int_log.c:120 at intlog10+0x38/0x48, CPU#3: kunit_try_catch/739 [ 183.545097] Modules linked in: [ 183.548144] CPU: 3 UID: 0 PID: 739 Comm: kunit_try_catch Tainted: G B D W N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 183.559257] Tainted: [B]=BAD_PAGE, [D]=DIE, [W]=WARN, [N]=TEST [ 183.565061] Hardware name: WinLink E850-96 board (DT) [ 183.570098] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 183.577038] pc : intlog10+0x38/0x48 [ 183.580511] lr : intlog10_test+0xe4/0x200 [ 183.584503] sp : ffff80008af07c10 [ 183.587802] x29: ffff80008af07c90 x28: 0000000000000000 x27: 0000000000000000 [ 183.594920] x26: 1fffe001004e6101 x25: 0000000000000000 x24: ffff80008af07ce0 [ 183.602038] x23: ffff80008af07d00 x22: 0000000000000000 x21: 1ffff000115e0f82 [ 183.609156] x20: ffff800083c30220 x19: ffff800087d17990 x18: 000000009ee89b57 [ 183.616274] x17: 0000000000000001 x16: ffff00085af83da8 x15: 000000002a2b7ef7 [ 183.623391] x14: 0000000065e19d21 x13: 1fffe0010102e104 x12: ffff700010f64589 [ 183.630510] x11: 1ffff00010f64588 x10: ffff700010f64588 x9 : ffff800081251af4 [ 183.637627] x8 : ffff800087b22c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 183.644745] x5 : ffff7000115e0f82 x4 : 1ffff00010fa2f3b x3 : 1ffff00010786044 [ 183.651863] x2 : 1ffff00010786044 x1 : 0000000000000003 x0 : 0000000000000000 [ 183.658983] Call trace: [ 183.661415] intlog10+0x38/0x48 (P) [ 183.664886] kunit_try_run_case+0x170/0x3f0 [ 183.669052] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 183.674520] kthread+0x328/0x630 [ 183.677733] ret_from_fork+0x10/0x20 [ 183.681295] ---[ end trace 0000000000000000 ]---
Failure - log-parser-boot/exception-warning-libmathint_log-at-intlog2
------------[ cut here ]------------ [ 183.331905] WARNING: lib/math/int_log.c:63 at intlog2+0xd8/0xf8, CPU#6: kunit_try_catch/721 [ 183.340239] Modules linked in: [ 183.343287] CPU: 6 UID: 0 PID: 721 Comm: kunit_try_catch Tainted: G B D N 6.16.0-rc6-next-20250715 #1 PREEMPT [ 183.354400] Tainted: [B]=BAD_PAGE, [D]=DIE, [N]=TEST [ 183.359335] Hardware name: WinLink E850-96 board (DT) [ 183.364372] pstate: 10400005 (nzcV daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 183.371312] pc : intlog2+0xd8/0xf8 [ 183.374700] lr : intlog2_test+0xe4/0x200 [ 183.378604] sp : ffff80008ade7c10 [ 183.381902] x29: ffff80008ade7c90 x28: 0000000000000000 x27: 0000000000000000 [ 183.389020] x26: 1fffe0010094b2c1 x25: 0000000000000000 x24: ffff80008ade7ce0 [ 183.396140] x23: ffff80008ade7d00 x22: 0000000000000000 x21: 1ffff000115bcf82 [ 183.403256] x20: ffff800083c30120 x19: ffff800087d17990 x18: 000000006c55860b [ 183.410374] x17: 0000000000000000 x16: ffff00085afe9da8 x15: 0000000000000000 [ 183.417492] x14: 00000000f1f1f1f1 x13: 1fffe0010102e084 x12: ffff700010f64589 [ 183.424610] x11: 1ffff00010f64588 x10: ffff700010f64588 x9 : ffff800081251cf4 [ 183.431728] x8 : ffff800087b22c43 x7 : 0000000000000001 x6 : 00000000f1f1f1f1 [ 183.438846] x5 : ffff7000115bcf82 x4 : 1ffff00010fa2f3b x3 : 1ffff00010786024 [ 183.445964] x2 : 1ffff00010786024 x1 : 0000000000000003 x0 : 0000000000000000 [ 183.453083] Call trace: [ 183.455516] intlog2+0xd8/0xf8 (P) [ 183.458901] kunit_try_run_case+0x170/0x3f0 [ 183.463064] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 183.468534] kthread+0x328/0x630 [ 183.471746] ret_from_fork+0x10/0x20 [ 183.475307] ---[ end trace 0000000000000000 ]---
Failure - lava/job
(no logs available)
Failure - lava/fastboot-boot
(no logs available)
Failure - lava/auto-login-action
(no logs available)
Failure - lava/login-action
(no logs available)
Failure - boot/gcc-13-lkftconfig-kunit
(no logs available)